Feeds

Alacritech apprehends an NFS anomaly

Wildly unbalanced filer I/O

High performance access to file storage

Alacritech and Avere

Avere's clustered FXT accelerator nodes are an obvious competing technology to Alacritech and is also based on deep analysis of filer I/O patterns. Alacritech says its technology is better – it would, wouldn't it – and seizes upon latency as one point of difference.

Craft said: "This is a key differentiator for us. Our latency is in the 0.2 millisecond range. The best SPEC organisation results is 0.5 milliseconds, with Avere. We're less than half the latency of the competition."

Why is this important? "Latency, aggregated across millions of I/O ops, translates into time."

Alacritech also says that Avere's technology, unlike its own, doesn't fit seamlessly into existing NAS infrastructures. The company says that Avere's tech:

  • Ignores benefits and investment in existing NFS infrastructure;
  • Uses caching to hijack and steal data from back-end;
  • Hides NAS management tools;
  • Relegates NAS back-end to mass storage without intelligence;
  • Now owns mission critical data
  • Has more media, which means more complexity;
  • Risks data loss;
  • Is more difficult to manage;
  • Scalability is limited; and
  • Is cumbersome to configure.

This idea that a front-end cache hijacks and steals data from the back-end filer is certainly a colourful one. It is almost being hinted, I think, unless wishful thinking is happening, that the Alacritech and Avere approaches might even be complementary. One wonders what a combined device might look like and what effect that might have on NAS filers. Perhaps it is a stupid idea, like trying to combine car engine super-charging and turbo-charger in a single super-duper-turbo-charger.

Craft said: "Avere has its strengths. We're not bashing them." But a single Avere FXT device tops out at around 20,000 NFS ops." If you put one in front of a NetApp FAS 3160, which can do about 60,000 NFS ops, you would slow it down, and: "you have to have clustered FXTs to solve that bottleneck ... We are a high-performance caching tier that doesn't do what Avere does."

Alacritech simply wrong

What does Avere say about all this? Rebecca Thompson, Avere's Marketing VP, took each Alacritech point above in turn and said:

•Ignores benefits and investment in existing NFS infrastructure - The Avere product line was designed to work in conjunction with our customer's existing NAS (both NFS as well as CIFS) infrastructure by offloading heavy performance loads, allowing customers to actually extend the lifecycle of their investment by not having to replace filers or add additional drives just for performance.

• Uses caching to hijack and steal data from back-end - Aside from the emotional language (NAS boxes do not have feelings) used, this claim is just simply wrong. That's like saying that the RAM in your PC is hijacking data from your SATA drive. Putting data on the best storage media to meet performance needs improves the overall productivity of an organization, which is why IT exists.

• Hides NAS management tools - False. I'm not even sure how one would be able to do this. We provide additional storage performance monitoring capabilities that customers love, but they still have complete access to whatever tools they use for storage server management.

• Relegates NAS back-end to mass storage without intelligence - False. In fact, we promote the fact that NAS storage servers have excellent data management tools and have engineered our nodes to work in conjunction with existing snapshot and backup schedules.

• Now owns mission critical data - Avere holds the active data set; however all read data still resides on the storage server as well. In the case of write data, it is completely up to the customer what schedule they set for write back (can be from seconds to hours to days) or they can choose to run Avere in write-through mode in which all write data is immediately written back to the filer.

• More media means more complexity - That's the beauty of automatic tiering - the fact that it's automatic reduces the complexity. The tiering algorithms in our software does the work so the storage administrator doesn't have to.

• Risks of data loss - Unlike Alacritech, Avere actually has had HA for its solution since it began shipping. Each node has both an NVRAM card in case of nod failure while holding dirty write data. In addition, each node has a peer within the cluster that it mirrors data to.

• More difficult to manage - Most of our customers claim the opposite, that because our performance monitoring tools give them such good insight into what's going on, it has made their job easier.

• Scalability is limited - One of the primary benefits of a clustered scale-out system is that it can scale by adding nodes. We currently support up to 25 nodes in a cluster, which would give us 90TB of capacity with a 2500 cluster and 13TB with the 2700. In addition, a single cluster can front end up to 24 filers, providing enormous flexibility as well.

• Cumbersome to configure - Just plain not true. We have a simple GUI configuration with only a few inputs required to get up and running. In addition, as new nodes are added, they auto-join the cluster. Avere would be happy to demo this.

Alacritech beta testing

Avere is into its second generation product while Alacritech is still in beta test. The Alacritech pitch is that lots of NetApp and Isilon shops, and EMC and BlueArc shops too, need acceleration – which Alacritech can best provide. The ANX 1500 is being tested in four large customer sites: "two large entertainment companies, a billion dollar EDA (Electronic Design Automation) company, and a multi-national, large high-tech component company in a virtualised environment."

Rainbolt says: "So far it has gone very well for us. There is a lot of interest."

Alacritech says there are three customer environments particularly relevant to its ANX technology: metadata-intensive environments, large sequential block environments, and virtual environments with apps and guest O/S deployed and housed via NFS.

Rainbolt's message for companies with NFS filers in these environments is to have a look at Alacritech's technology. What we want here in El Reg is to see SPEC NFS benchmark comparisons. We expect Alacritech ANX 1500 scores to be very interesting. ®

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
USA opposes 'Schengen cloud' Eurocentric routing plan
All routes should transit America, apparently
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.