Feeds

Storage vendor bloggers - losing data or losing the plot?

So does EMC's Center really lose data?

High performance access to file storage

Comment Store data in EMC Centera and lose it - that's the claim of NetApp blogger Val Bercovici, and he cites a Symantec support document entitled 'Archiving items in Enterprise Vault may result in an extremely rare data loss situation' to prove it.

Bercovici, who works in the office of the CTO (Chief Technology Officer) at NetApp, blogged last week: "When Symantec publicly declares that EMC Centera (and only EMC Centera) is vulnerable to data loss, the entire industry - and most importantly archiving customers need to stand up and listen."

Indeed it should - except Bercovici was wrong. He was misled by a Symantec support document (tech-note) referring to its - Enterprise Vault product - which has now been updated.

The original version, up to January 26, stated there would be: "Potential data loss if archiving to Centera and running any of the known affected Enterprise Vault versions outlined below (see the What is Affected section)."

The revised version says: "There is a potential for data loss with the known affected Enterprise Vault versions outlined below when configured with an EMC Centera storage partition. The data loss occurs as part of the archiving process but before storing on Centera. (See the What is Affected section)."

Symantec spokesperson Cory Edwards said: "This tech note relates to a known issue with [Symantec's] Enterprise Vault, not EMC Centera This issue is limited to customers running Enterprise Vault and Centera together and is extremely rare. It is limited to a small percentage of archived information which is not converted into a text-based format (eg jpeg). Symantec is working with any EV/Centera customers who might have this issue.

"All customers running Enterprise Vault 8.0 or the latest service pack of older versions of Enterprise Vault will not experience any problems. The tech-note provides appropriate measures for customers to identify the issue and take corrective action."

Bercovici's blog declaring that the Centera users and supporters should consider the whistle blown sparked a vigorous, even aggressive discussion in its comments section. The back story here is that there are strong differences between NetApp and EMC concerning the two companies' approaches to storage, benchmarking and capacity usage. Both have strongly enthusiastic evangelising bloggers, with Chuck Hollis, Global Marketing CTO, being EMC's vigorous champion.

Bercovici took the stance that the Symantec tech-note was the nail Centera's coffin needed, and mentioned previous worries over the content-addressing algorithm used and the possibility of it not generating dependably unique strings to identify data absolutely, also a silent data corruption issue. He put it like this: "Evidence emerged which raised questions about the integrity of EMC's commitment to the integrity of their customers' archives... NetApp has never knowingly sacrificed the integrity of data archived by SnapLock and consequently enjoys a reputation of responsibility in this regard."

The comments took exception to this moral high-grounding and to the pinning of data loss fault to EMC when it was in fact down to a Symantec software bug.

Hollis commented: "Val, you don't seem to be able to write anything unless you're attempting to beat up someone, usually EMC. You've gotten in trouble before with this sort of behavior. Looks like you're heading down the exact same road again."

Bercovici replied to Hollis, saying: "It seems the only trouble I get into is with you and your selectively delicate sensibilities, forcing you to autocratically censor comments from me (with condescending reminders no less) which you don't want appearing on your blog. Regardless, I consider it a compliment either way. I look forward to observing how much EMC is willing to sacrifice your relationship with Symantec here (by throwing them under the bus) in order to cover up the truth about Centera's obvious data porosity."

He confirmed his belief about the supposed data porosity in a later comment: "I can assure you we did a 360 on this Symantec Alert with many experts on all sides (including EMC customers). All of us came to the same conclusion - under certain circumstances (such as recovery from disk or node failure) the Centera will drop archived objects without notification or the ability to retrieve them. This seems to be precisely the use-case highlighted by the Symantec Alert."

(They were wrong, all of them.)

High performance access to file storage

Next page: Zero uncertainty

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.