Feeds

Kaminario array slips on protection but won't go down on you

K2 flash box now highly available for enterprises

Securing Web Applications Made Simple and Scalable

Kaminario has added enterprise disk drive array-like protection and availability features to K2, its solid state SAN storage boxes. You won't need to take one of those machines down, ever.

These are built from a grid or cluster of data nodes, blade servers, the K2-D DRAM array, K2-F flash array with Fusion-io ioDrives, and K2-H hybrid DRAM-flash products. The systems scale by adding more data nodes.

Kaminario says this set of availability and protection features is unique and can't be obtained from other flash array vendors, not that you'll lose much data if a flash array's power supply goes phut - but a DRAM array or a hybrid? That's a different and very volatile story.

CEO Dani Golan argues: "Customers need the same level of protection and operational efficiency as legacy storage. Without it solid-state storage can't penetrate the enterprise market."

It is adding N+1 hardware redundancy, automatic failover and non-disruptive operation. It should be fast; there are no spinning disks to slow down failover. The company is also adding something called RAID 10HD, which is mirroring and striping, high-volume snapshots - you can have more than 8,000 of them - and asynchronous replication, both host-based and array-based, so two K2s can keep in step.

The striping and mirroring is over different data nodes and media, providing protection against node failures. In the event of a failed data node, reads and writes use the mirrored nodes with the spare node being brought into play. A demo video shows a K2 data node being pulled out of the array and the system just keeps on working; there's a momentary blip, a couple of seconds, while it reconfigures I/O and presses the spare node into operation, and then just carries on.

Golan said: "In 10 seconds we're back to 85 per cent of the original performance. It sometimes takes hours to recover from a failure like that in legacy storage."

Kaminario recommends using its K2-D, with up to 25TB of DRAM, for write-intensive and latency-sensitive high-end OLTP and DBMS applications. The availability and protection features will reassure customers neither data nor online availability will be lost to hardware or power failures.

The K2-H is for mixed read and write DBMS and analytics situations, with DRAM used for writes and flash for reads. The availability and protection features add reassurance for the DRAM write data as well as for device availability. Ditto for the K2-F which is for read-intensive workloads - DBMS and analytics again - but doesn't have such a requirement for fast writes and won't lose information if there is a flash crash, except for the most recent data that might not have been committed to the flash.

Kaminario is also adding better performance monitoring software.

We asked about deduplication in K2 and there isn't any, Kaminaro prioritising latency, with Golan saying: "The world of storage is becoming more and more random. For that latency is the most important feature. We do 120 microseconds. Deduplication hurts latency significantly. We're very proud of our latency."

The availability and protection features are all up for grabs now, except for array-based replication which is coming in the second half of the year. K2 pricing with the data protection features starts at $20/GB with the K2-F. ®

The Essential Guide to IT Transformation

More from The Register

next story
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.