Feeds

Inktank's founder blabs to El Reg about Ceph's ERASURE TIERS

Firefly creeps into frame of Red Hat's $175m Ceph-ie

Application security programs and practises

Red Hat may have just agreed to buy Ceph-backer Inktank, but that hasn't slowed down the open source project.

Late Monday or early Tuesday morning, Ceph's main developer Inktank will release "Firefly", the 0.80 release of the open source Ceph object store and filesystem.

Firefly comes with two features that, like beer and pie [Or wine and cheese, depending on your sensibilities—Ed.], work best together.

These features are data protection tech Erasure Coding and Cache Tiering, the latter helping to put data on the appropriate storage system. When combined, these features give admins a way to more efficiently use their storage systems.

"When used in combination, you can have the cache tier be replicated so it supports all operations, and base tier be erasure codes so it's efficient," explained Inktank's founder Sage Weil in a chat with El Reg.

Besides that, Firefly flaps into view with an experimental storage backend that can store processes from Ceph's object storage daemon (Ceph OSD) into a key-value store for faster access.

These upgrades come less than a week after Inktank announced it had been acquired by Red Hat for $175m. Weil assures us that nothing is going to change, apart from Ceph getting more engineers assigned to it.

The acquisition "absolutely means a larger investment of resources," he says. "Red Hat just spent a lot of money. ... Red Hat has a lot to offer besides pure investment, [such as] depth of knowledge and complementary technologies."

Initially, Inktank hopes to work with Red Hat on broadening support for Ceph within the Red Hat Enterprise Linux kernels.

"As far as core Ceph development, overall distribution of investment in Ceph will be similar to what it was before: we will continue investing in block layer and object layer, particularly OpenStack," he says.

One thing that had caused us to scratch our head about the Red Hat buy was how Ceph will sit alongside Red Hat's Gluster FS.

"Gluster is a similar tech – open platform, scale-out storage, mostly targeted at the file interface," Weil explains. "Ceph and Gluster are complementary."

One way Inktank might work with Gluster is using its various translator engines to add in support for Ceph, letting Gluster work as a front-end that feeds certain types of data down to Ceph.

"The overall mission of the projects and belief of developers remains unchanged: having a fully open, scalable, software-based storage architecture is a disruptive force within the industry," Weil said. A nice notion, and one that rang with a hint of irony as we took his call in our hotel room in Las Vegas where we were attending proprietary storage giant EMC's annual jamboree. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.