Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:09 PM
George Crump
George Crump

What To Look For In A Primary Storage Refresh

In our last entry we covered how the potential to increase storage utilization may help justify a storage refresh. If you are in a position to refresh your primary storage platform or you think the last entry may help you do that a little sooner than normal, what should you be looking for in your next storage platform?

In our last entry we covered how the potential to increase storage utilization may help justify a storage refresh. If you are in a position to refresh your primary storage platform or you think the last entry may help you do that a little sooner than normal, what should you be looking for in your next storage platform?My first advice is to not get caught in a game of checkers when you should be playing chess. By this I mean just checking off features as you do your comparison. While many vendors will say they have a storage capability there is a difference in the details. Make sure you examine what the storage vendor can do with each of those features.

For the purposes of this entry we'll assume you have knocked out all the basics like support, service and price. You've narrowed your options down to a few key candidates and now are trying to make a decision. These capabilities are in no particular order and may vary based on your priorities.

Thin provisioning should be there to be able to better utilize disk capacity. Look for vendors that are talking about implementing less capacity than you already have. As I eluded to above, all thin provisioning is not equal and the state of the art has advanced to include thin migrations and thin reclamation. With thin provisioning you can allocate whatever the server thinks it needs but only consume disk space as it actually needs it.

Second look for a system that can reduce drive count while at the same time improving performance. Two ways to get here are to look for systems that can wide stripe large capacity drives. Meaning multiple servers have access to all of the drives in the system or look for systems that can leverage Solid State Disk (SSD) to maintain a performance tier without assigning 100's of low capacity drives to a server.

Third along with SSD look for a system that has auto-tiering. While I think you can work around the need for auto-tiering or add the capability to a legacy system, getting a new storage system with this capability may make sense. This does not mean that it has to be auto-tiering in particular, some systems are using SSD to make large read and/or write caches. In many cases this delivers the same results as auto-tiering. The goal is to be able to leverage SSD to create a small active performance tier and SATA to create large persistent tier. As I have written about in other entries there are a lot of ways to achieve this goal, but is it important to factor it into your decision making process.

Power savings is the final area we will touch on in this entry. In active storage a great way to reduce costs is as we discussed in our latest entry on Network Computing, to leverage mechanisms that use less power. That is SSD. The other feature is to utilize MAID technology to reduce the amount of time that the mechanical drives spend spinning. With some sort of tiering capability integrated or added to the storage system, it becomes more realistic to spin drives down as data sits in cache more often.

There are certainly more capabilities to look for in storage refresh and everything tends to be a give and take on this subject. We'll come back to this topic in an upcoming entry for further discussion.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS Build 20210202 and later Q...
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...