Ceph Open Source Storage Founder Launches Services Startup
By Deni Connor
InformationWeek
A Ceph system is built on industry-standard servers and consists of nodes which handle either file-based, block, or SAN-based or object-based storage. A Ceph cluster consists of a portable operating system interface (POSIX)-compliant file system, storage nodes, a metadata server daemon (or computer program), and monitor daemons that track the state of the cluster and the nodes in the cluster. Ceph uses an algorithm called CRUSH (controlled scalable decentralized placement of replicated data) to define where objects store data in the cluster and also track modified content for placement on the appropriate media.
Ceph can also be deployed as a block-based storage system. In this configuration, Ceph is mounted as a thin-provisioned block device. When data is written to Ceph, it is automatically striped and replicated across the cluster. The Ceph RADOS Block Device (RDB) works with KVM and supports the import and export of virtual machine images and provides snapshot capability.
[ The results are in. Find out why Dell/Compellent Wins Our Storage Evaluation. ]
The system can also serve as a file system where it maps the directories and file names of the file system to objects stored in RADOS clusters. The size of these clusters can be expanded or contracted and the workload is automatically rebalanced.
Like file system clusters such as Gluster and Lustre, Ceph is scalable to multiple exabytes of data. Ceph is included in the Linux kernel and integrated into the OpenStack project.
Because, like other open source projects, Ceph can be difficult to install, configure, and maintain, Inktank became the official sponsor of Ceph and will provide not only installation and configuration, performance testing, and infrastructure assessment services, but support for Ceph itself. The company has developed a community for Ceph users where they can chat about Ceph implementation and other issues.
Ceph was designed by Sage Weil, CEO and founder of Inktank, as part of a PhD thesis at the University of California at Santa Cruz. Weil released Ceph into the open source community in 1997. Weil is also a co-founder of DreamHost, the hosting company that developed Ceph and spun it off to Inktank.
Ceph is named after the UC Santa Cruz mascot, Sammy, a banana slug mollusk. Ceph is short for cephalopods, a class of mollusks. Since nearly all mollusks release ink, it's likely that Inktank's name also derives from UC Santa Cruz's mascot.
Deni Connor is founding analyst for Storage Strategies NOW, an industry analyst firm that focuses on storage, virtualization, and servers.
InformationWeek is conducting a survey on the current state of compliance within the enterprise: How many regulations are in scope? Which are most important? How easy is it to get vendors to toe the line? Upon completion of our survey, you will be eligible to enter a drawing to receive an 32-GB Apple iPod Touch. Take our InformationWeek 2012 Compliance Survey now. Survey ends May 11.
Federal agencies must eliminate 800 data centers over the next five years. Find how they plan to do it in the new all-digital issue of InformationWeek Government. Download it now (registration required).
| To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy. |
Virtual Infrastructure Reports
Informed CIO: VDI Snake Oil Check
You won't lose your shirt on a desktop virtualization initiative, but don't expect it to be simple to build or free of complications. This report examines the three biggest problems when developing a business case for VDI: storage costs, ongoing licensing, and the wisdom of prolonging the investment in PC infrastructure.
Fundamentals: Next-Generation VM Security
Server virtualization creates new security threats while turning the hypervisor into a network black hole, hiding traffic from traditional hardware defenses -- problems a new breed of virtualization-aware security software tackles head-on.
Delegation Delivers Virtualization Savings
IT can't-and shouldn't-maintain absolute control over highly virtualized infrastructures. Instituting a smart role-based control strategy to decentralize management can empower business units to prioritize their own data assets while freeing IT to focus on the next big project.
The Zen of Virtual Maintenance
Server virtualization has many advantages, but it can also lead to chaos. Many organizations have unused or test VMs running on production systems that consume memory, disk and power. This means critical resources may not be available in an emergency: say, when VMs on a failed machine try to move to another server. This can contribute to unplanned downtime and raise maintenance costs. Easy deployment also means business units may come knocking with more demands for applications and services. This report offers five steps to help IT get a handle on their virtual infrastructure.
Pervasive Virtualization: Time to Expand the Paradigm
Extending core virtualization concepts to storage, networking, I/O and application delivery is changing the face of the modern data center. In this Fundamentals report, we'll discuss all these areas in the context of four main precepts of virtualization.
Virtually Protected: Key Steps To Safeguarding Your VM Disk Files
We provide best practices for backing up VM disk files and building a resilient infrastructure that can tolerate hardware and software failures. After all, what's the point of constructing a virtualized infrastructure without a plan to keep systems up and running in case of a glitch--or outright disaster.



Subscribe to RSS