Presentation is loading. Please wait.

Presentation is loading. Please wait.

+ Thriving at Petabyte scale & beyond

Similar presentations


Presentation on theme: "+ Thriving at Petabyte scale & beyond"— Presentation transcript:

1 + Thriving at Petabyte scale & beyond
Software-Defined Object Storage for the POST-RAID era

2 Expansion & Extensibility
Legacy file storage technology is limiting the ability for entities to “scale” Constrained Expansion & Extensibility Rigid & Brittle Durability Restricted Accessibility Web servers and load balancers needed SMB and NFS are not web protocols Limited query and analysis Max out at PB level Data Silos Tedious management Service downtime for upgrades Specialized staff RAID rebuild times too long Backup costs too high Not all data should be treated the same, anyway Traditional storage limits the growth of cloud. File systems max out at a petabyte levels or even less. They require time and attention to backup, maintain, restore, rebuild, expand and they require specialized staff to work on them. The traditional file system method of recovery, RAID, does not scale. It takes the same amount of time to rebuild a 10 TB RAID volume in a 100 TB cluster as it does in a 500 TB Cluster and this is just not practical in real world use. Finally, SMB (CIFS) and NFS are simply not web protocols and require web servers, balancers and many other systems to support the use of their data in the cloud. Why not go to a simpler and more direct model for cloud storage?

3 Multi-protocol ingest support (http, file, S3, Swift, block)
The Need... Multi-protocol ingest support (http, file, S3, Swift, block) Internet accessible, web-scale Ability to run on standard commodity hardware Simple to deploy, manage, scale & evolve Ability to continuously protect any amount of data, natively Secure and Compliant Future-proof (durable & extensible) Our clients are requesting straight forward requirements. Storage that supports object, file and block. Storage that runs on standard hardware and automatically protects data – no matter how much there is. A product that is easy to deploy , simple to scale and evolves with hardware so a forklift upgrade is never required. A software defined storage product that supports existing workloads and enables new data services for the future. We call it, scalable software that works so you can focus on your business.

4 The Solution – Caringo SWARM
CAStor Overview Caringo’s Swarm object storage software: Aggregates the disk capacity across heterogeneous clusters of commodity servers to… Create massively & dynamically scalable multi- tenant storage systems that are… Self-managing, self-healing, high-performance, and durable through time, where Files and their descriptive metadata (i.e. objects) are accessible whenever and wherever they are needed by users, administrators and by data services

5 How We Do It – Efficient Software
Swarm Runs from RAM on any x86 hardware with Linux Tune to any workload Boots from bare metal in minutes works on raw disk level RAM HTTP SNMP CPU No file system, no software install leaves 98% drive capacity for data 98% available NIC A node to Caringo is simply an x86 server with RAM, CPU, NIC and Disk. No exotic hardware is required. You can use 1 Gig E or 10 Gig E. Sata, Sas, Flash - any kind of media. No Caringo code is ever installed on your disks. This leaves up to 98% of the disk for data storage. Isn’t your data what a storage system should have on its disks? Swarm boots from bare metal and there is no file system or OS installation and the only way in or out is via HTTP or SNMP. That’s what we call a node and we’ll call it Node 1.

6 How We Do It – Resource Virtualization
Swarm RAM Node 1 CPU NIC

7 How We Do It – Resource Virtualization
Swarm RAM Node 1 CPU NIC RAM RAM CPU CPU Node 2 can be the same or different. You can use newer hardware or mix and match. The flexibility of Caringo Swarm allows you to configure for your use cases. In this example, there is more of everything (there are reasons to have different configurations which we can help tune to your use case for you). Let’s call this node 2. NIC

8 How We Do It – Resource Virtualization
Swarm RAM Node 1 CPU NIC RAM RAM Node 2 CPU CPU NIC

9 How We Do It – Resource Virtualization
Swarm Node 1 Node 2 Node 3 Node … Add another – node 3, node 4…

10 How We Do It – Emergent Behavior
No single points of failure SWARM follows simple rules to manage a complex system Nodes cooperate to perform processes And you get a swarm. The swarm provides growth and scalability, there are no single points of failure and the nodes cooperate to perform processes. In this manner, the system can create a complex system while based on simple rules. Simplicity means fewer things break, better performance, more robustness and great responsiveness. Improves with size!

11 How We Do It – Encapsulated Data
Metadata stored with data No metadata databases to manage data + metadata Simplicity is key at Caringo and we use it right down to the data level. Remember, simplicity empowers performance, fast recovery and robustness – but it all starts with the data model. Caringo believes in the pure object model. Data plus metadata (information about the data) is encapsulated in an object. There are no metadata databases to manage and the metadata is stored with the object. Simple, consistent and powerful.

12 How We Do It – Encapsulated Data
Object is encapsulated Includes all system, policy and custom metadata The metadata includes system metadata, policy information that you set and custom metadata that you model and design. All this information is encapsulated inside the object. This means when you go to get an object, everything is there.

13 How We Do It – Encapsulated Data
Object is portable & dynamic Decoupled from hardware, location and apps Freeing data to be accessed in multiple ways This gives your objects pure portability and makes data dynamic. Your data is decoupled from location, from hardware, from applications. Anyone with the right authentication and authorization (which is included in the metadata) can get to the data no matter where they are or where the data may be. You never have to know the location of the data or the application that wrote it and you can access it remotely from a mobile device or another computer. Think about this for a moment. Data freed from hardware, location and application means you can use that data in more ways than ever before. There are no multiple places to go to get the metadata, the data, the authentication… everything is inside a Caringo Object. Since Caringo Swarm is based on HTTP, the lingua franca of the internet, where there is internet access, there is access to your data and everything about it. This simple model is the basis for incredible power. This is the power of the Caringo Swarm.

14 Swarm Adapts Swarm lets you grow at the pace you choose and adapts to your requirements or workload Plug in new servers for more capacity & performance - address needs in real time New resources available in minutes Right resources to the right locations Local and geo-distribution Easily retire old hardware site 2 site 1 Swarm site 3 Swarm does not dictate how you grow a cluster. Your business needs do. Multiple clusters can be different configurations. In fact, you can store data differently in different clusters. If you have 2 replicas of an object in your primary cluster, you can store that object as an erasure coded object in the DR cluster. One push of a button on the console lets you retire a node while the system is up and running. That node will distribute its data into the rest of the cluster, wait until all the data has been protected and then shut itself down and wait to be taken out at a time of your choosing. Data can be distributed locally or in a geo-distributed manner. A configuration can be made with 3 different data centers that can lose an entire data center and you can still recover all your data. Caringo brings great flexibilty in the way systems can be configured and of course we are available to assist in planning and implementation.

15 Swarm Protects Swarm automatically manages the data protection you choose Protection per cluster, bucket or at the object level Seamlessly move between replication and erasure coding Store objects with different protection levels on the same server Auto-managed through Lifepoints Protect data based on value Erasure encoding Any SLA Replication Data protection can be done in 2 basic methods: replication and erasure coding. Replication produces an identical replica of your object and stores it on another node. If you lose one node or one disk, you always have a replica to use. The system will quickly re-replicate any lost data. Erasure coding (EC) is a way of splitting up an object into data and parity segments. Similar to a software version of RAID, EC is more flexible, faster and is scalable. In Caringo Swarm, you can choose any EC method. If you choose 5,2 that means there are 5 data segments and 2 parity segments. You can lose any 2 segments (or nodes or disks) and still recover your object. 16,9 means you can lose any 9 segments and still recover your data. There is no single best way to protect data. Caringo provides the flexibility to use the best method for each use case and you can set that down to the object level. With this flexibility, you can support multiple SLAs for multiple customers or clients inside a single cluster. Any object can have any protection associated with it at any time. You can set a default for the cluster or for a tenant or you can set protection down to the object level. You can even change the protection over time through Lifepoints and the system will manage this for you automatically. Caringo is the only vendor that supports the use of replication and erasure coding in the same cluster, in the same nodes with no special purpose nodes or single points of failure.

16 Swarm Repairs Swarm watches for issues and repairs them automatically so you don’t have to Health Processor proactively checks integrity, availability and cardinality Fast Volume Recovery, content aware, repairs only damaged objects Assurance of data quality for the entire enterprise Provides business continuity + + + + + Proactive integrity checking means assurance of data quality for the entire enterprise. Business continuity is dependent on the viability of a company’s data. Caringo assures data quality and thus provides business continuity. Data is an organization’s lifeblood and Caringo takes Assurance of Data Quality seriously.

17 Select the interface and hardware for your workload and use case.
Portfolio Overview Scalable storage software for unified object, file and block CloudScaler HTTP 1.1, Amazon S3 FileScaler SMB, NFS BlockScaler iSCSI (Beta) Adaptable performance for unified storage under a single namespace. Swarm Caringo Select the interface and hardware for your workload and use case. Big Data/Hadoop Archive Enterprise Apps Cloud

18 Add Caringo CSN Software License and annual support/maintenance
It’s Simple…Really! CAStor Overview Mix and Match HW w/ any drive size Grow from one form factor to another, at runtime, incrementally Never forklift upgrade again Ethernet Switches 1Gb or 10Gb Small Medium, Large R420 R720xd or +JBOD Add Caringo Software Capacity Licenses, per TB, and annual support/maintenance Caringo SWARM Object Storage Cluster Small, Medium, Large R420 or VM Add Caringo CSN Software License and annual support/maintenance Caringo Cluster Services Node (Physical or Virtual)

19 Simple…But Powerful! Remote Sites Ingest from many sources*
CAStor Overview Search & Discovery Multi-Tenant STaaS Hadoop Analytics Add Storage Services HTTP S3 Application Gateway File Ingest from many sources* Remote Sites Distribute, Consolidate, Share automatically runtime Scale in any Automate Retention, Protection & Durability down to the object level

20 Object storage - its all about use cases
Video Surveillance (2.5 PBS) File Retention DOD Medical Health Systems (16 PBS) PACS Archiving M2M and analytics (4 PBS) Consumer/enterprise backup-to-cloud service (2+ PBS) S3-like cloud storage services via Swarm & CloudScaler Web content delivery plus hundreds more…

21 Next Steps – Where/How to get Started?
Identify your Target use case(s): See Use Case Slide. If in doubt: “Drain your Filer Swamps” – File System Optimization Tier! Contact your Dell Account Representative for pre-sales support – All Caringo Software & Services are available through Dell OR, Contact Our clients are requesting straight forward requirements. Storage that supports object, file and block. Storage that runs on standard hardware and automatically protects data – no matter how much there is. A product that is easy to deploy , simple to scale and evolves with hardware so a forklift upgrade is never required. A software defined storage product that supports existing workloads and enables new data services for the future. We call it, scalable software that works so you can focus on your business.

22 Software-Defined Object Storage for the POST-RAID era
Thank You Software-Defined Object Storage for the POST-RAID era


Download ppt "+ Thriving at Petabyte scale & beyond"

Similar presentations


Ads by Google