Welcome!

Server Monitoring Authors: Yeshim Deniz, Liz McMillan, Pat Romanski, Carmen Gonzalez, Ken Schwaber

News Feed Item

Red Hat Adds Sophisticated Tiering and Data Protection Features to its Industry-leading Storage Platform for OpenStack

Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced the availability of its Inktank Ceph Enterprise 1.2 with new features to help customers store and manage an entire spectrum of data – from “hot” mission-critical data to “cold” archival data. The new functionality, coupled with enhancements to the solution’s Calamari management and monitoring platform, make Red Hat’s Inktank Ceph Enterprise storage solution a flexible and cost-effective storage platform for enterprises managing data-intensive applications.

In May, 2014, Red Hat acquired Inktank, provider of Ceph and Inktank Ceph Enterprise open source storage solutions. Inktank Ceph Enterprise delivers world class object and block storage software to enterprises deploying public or private clouds, including many early adopters of OpenStack. Combined with Red Hat’s existing GlusterFS-based file storage offering, the addition of Inktank positions Red Hat as one of the leading providers of open software-defined storage across object, block and file system storage. As part of today’s announcement, Red Hat’s Inktank Ceph Enterprise supports the new Red Hat Enterprise Linux OpenStack Platform 5 to provide a truly integrated OpenStack stack that is delivered from and supported by a single vendor.

According to IDC’s report “Worldwide Cold Storage Ecosystem Taxonomy”, published in March 20141, as data continues to grow at an exponential pace, enterprises increasingly recognize the importance of categorizing and storing data based on frequency of access and relevance, or rather, temperature—with newer or “hot” data sets stored with highest priority and performance. The addition of tiering capabilities to Red Hat’s Inktank Ceph Enterprise 1.2 enables enterprises to more effectively execute management of all data – from mission-critical to archival – providing an opportunity to radically reduce storage costs.

Red Hat’s Inktank Ceph Enterprise now enables users to define pools for storing data densely, and therefore more cost-effectively, as well as caching pools that can deliver high-performance. The new erasure encoded storage pools in Red Hat’s Inktank Ceph Enterprise provide enterprise-scale durability that can lower raw capacity requirements by up to 50 percent2. Additionally, new cache tiering pools enable both hot-to-cold and cold-to-hot data management. By combining the power of these new features, customers can create the right blend of price and performance tailored to their specific needs.

Continuing Red Hat’s commitment to customer choice, Red Hat’s Inktank Ceph Enterprise 1.2 is supported on Red Hat Enterprise Linux 6.5 and 7 and Ubuntu 12.04 and 14.04. Key new features and benefits in Red Hat’s Inktank Ceph Enterprise 1.2 include:

  • Erasure Coding, making Red Hat’s Inktank Ceph Enterprise 1.2 suitable for archive and cold storage use cases by reducing the cost per gig.
  • Cache Tiering, enabling “hot” data to be moved onto high-performance media when it becomes active and “cold” data to be moved onto low-performance media when it is no longer active.
  • Calamari v1.2, updating the Ceph management platform to support management functions. These updates will enable an administrator to manage the core functionality of the reliable autonomic distributed object store (RADOS) storage cluster, including the ability to manage individual storage devices and pool policies. Calamari is an on-premise application with management tools and performance data that simplifies operational management and enables administrators to adapt to changes in their Ceph clusters. In May 2014, Red Hat announced that Calamari had been open sourced as part of the upstream Ceph community.
  • Comprehensive integration with Red Hat Enterprise Linux OpenStack Platform 4 and 5, enabling an integrated OpenStack cloud storage and platform solution that is supported by one vendor.

Supporting Quotes

Neil Levine, director, product management, Storage and Big Data, Red Hat

“Enterprises are under pressure to store expanding amounts of data with limited IT budgets. As part of our commitment to redefining the economics of software-defined storage, the new archiving and tiering functionality in Red Hat’s Inktank Ceph Enterprise 1.2 enables users to define pools for storing data densely, and therefore more cost-effectively, as well as pools that serve data very quickly. And, because these pools all work together, customers can now create the blend of price and performance that’s right for them for both cold and hot data storage.”

Steven Stover, director of engineered solutions. Dell

“Dell and Red Hat have partnered for more than 15 years to bring global customers value with Red Hat open source software solutions across Dell’s enterprise offerings. Red Hat’s Inktank Ceph Enterprise, which delivers a highly scalable, reliable cloud storage solution that can cost-effectively support different types and volumes of enterprise data, can further enterprise customers’ acceleration of OpenStack-based clouds. We look forward to delivering Red Hat’s Inktank Ceph Enterprise 1.2 to our customers in our Dell Red Hat Private Cloud Solutions.”

Additional Resources

Connect with Red Hat

About Red Hat, Inc.

Red Hat is the world's leading provider of open source software solutions, using a community-powered approach to reliable and high-performing cloud, Linux, middleware, storage and virtualization technologies. Red Hat also offers award-winning support, training, and consulting services. As the connective hub in a global network of enterprises, partners, and open source communities, Red Hat helps create relevant, innovative technologies that liberate resources for growth and prepare customers for the future of IT. Learn more at http://www.redhat.com.

Forward-Looking Statements

Certain statements contained in this press release may constitute "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995. Forward-looking statements provide current expectations of future events based on certain assumptions and include any statement that does not directly relate to any historical or current fact. Actual results may differ materially from those indicated by such forward-looking statements as a result of various important factors, including: risks related to delays or reductions in information technology spending; the effects of industry consolidation; the ability of the Company to compete effectively; the integration of acquisitions and the ability to market successfully acquired technologies and products; uncertainty and adverse results in litigation and related settlements; the inability to adequately protect Company intellectual property and the potential for infringement or breach of license claims of or relating to third party intellectual property; the ability to deliver and stimulate demand for new products and technological innovations on a timely basis; risks related to data and information security vulnerabilities; ineffective management of, and control over, the Company's growth and international operations; fluctuations in exchange rates; and changes in and a dependence on key personnel, as well as other factors contained in our most recent Quarterly Report on Form 10-Q (copies of which may be accessed through the Securities and Exchange Commission's website at http://www.sec.gov), including those found therein under the captions "Risk Factors" and "Management's Discussion and Analysis of Financial Condition and Results of Operations". In addition to these factors, actual future performance, outcomes, and results may differ materially because of more general factors including (without limitation) general industry and market conditions and growth rates, economic and political conditions, governmental and public policy changes and the impact of natural disasters such as earthquakes and floods. The forward-looking statements included in this press release represent the Company's views as of the date of this press release and these views could change. However, while the Company may elect to update these forward-looking statements at some point in the future, the Company specifically disclaims any obligation to do so. These forward-looking statements should not be relied upon as representing the Company's views as of any date subsequent to the date of this press release.

Red Hat and Red Hat Enterprise Linux are trademarks of Red Hat, Inc., registered in the U.S. and other countries. Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries. The OpenStack mark is either a registered trademark/service mark or trademark/service mark of the OpenStack Foundation, in the United States and other countries, and is used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.

1 IDC report on Worldwide Cold Storage Ecosystem Taxonomy, March 2014, #246732

2 Relative to industry standard 3x replication; actual savings will vary depending on erasure coding parameters selected

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...