The document discusses Fujitsu's ETERNUS CD10000 storage appliance, which combines the open source Ceph storage system software with Fujitsu enhancements and hardware to make Ceph more scalable, reliable, and easy to manage for enterprise use. Some key benefits of the ETERNUS CD10000 noted in the document include unlimited scalability, lower total cost of ownership, seamless centralized management, and the ability to integrate additional storage applications on top of the platform.
OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)The Linux Foundation
The talk covers several technologies and best practices to managing Security Vulnerabilities, which are told as interconnected stories.
We will cover how the largest clouds in production came together through the Xen Project to develop an industry leading open source security process to manage software vulnerabilities effectively, how those vendors collaborated to stop cloud reboots through Live Patching and how security and CPU vendors collaborated to protect against 0-day vulnerabilities and advanced persistent threats using hardware assisted virtual machine introspection. Finally, we will also provide information how you can use tools such as CVE Details to assess how secure an open source technology is relative to another, such that you don't have to rely solely on security stories from the technology press.
The talk will cover how these technologies work, the limitations and challenges which still remain and how they are used in practice using examples of Xen Project based products and installations. We will also cover how these technologies impact software vulnerability management processes and system administrators.
Dealing with data storage pain points? Learn why a true Software-defined Storage solution is ideal for improving application performance, managing diversity and migrating between different vendors, models and generations of storage devices.
OSSEU18: From Handcraft to Unikraft: Simpler Unikernelization of Your Applica...The Linux Foundation
Unikernels have produced impressive performance, including fast instantiation times, tiny memory footprints, and high consolidation, plus potentially a reduced attack surface and easier certification. Their main drawback is that they require applications to be manually ported to the underlying minimal OS; this means both expert work and considerable amount of time.
In this talk we present Unikraft, an incubator project under the auspices of the Xen Project and the Linux Foundation aimed at automating the process of building customized images tailored to specific applications and thus significantly reducing development time. Unikraft decomposes the OS into elementary pieces (e.g., schedulers, memory allocators, drivers, etc.) that users can pick and choose from. It then builds images tailored to the needs of specific applications as well as the target platform (e.g., KVM, Xen) and architecture (e.g., ARM or x86).
Note: also see https://www.slideshare.net/xen_com_mgr/ossna18-xen-beginners-training-exercise-script
The Xen Project supports some of the biggest clouds in production today and is moving into new industries, like security and automotive. Usually, you will use Xen indirectly as part of a commercial product, a distro, a hosting or cloud service and only indirectly use Xen. By following this session you will learn how Xen and virtualization work under the hood exploring high-level topics like architecture concepts related to virtualization to more technical attributes of the hypervisor like memory management (ballooning), virtual CPUs, scheduling, pinning, saving/restoring and migrating VMs.
OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)The Linux Foundation
The talk covers several technologies and best practices to managing Security Vulnerabilities, which are told as interconnected stories.
We will cover how the largest clouds in production came together through the Xen Project to develop an industry leading open source security process to manage software vulnerabilities effectively, how those vendors collaborated to stop cloud reboots through Live Patching and how security and CPU vendors collaborated to protect against 0-day vulnerabilities and advanced persistent threats using hardware assisted virtual machine introspection. Finally, we will also provide information how you can use tools such as CVE Details to assess how secure an open source technology is relative to another, such that you don't have to rely solely on security stories from the technology press.
The talk will cover how these technologies work, the limitations and challenges which still remain and how they are used in practice using examples of Xen Project based products and installations. We will also cover how these technologies impact software vulnerability management processes and system administrators.
Dealing with data storage pain points? Learn why a true Software-defined Storage solution is ideal for improving application performance, managing diversity and migrating between different vendors, models and generations of storage devices.
OSSEU18: From Handcraft to Unikraft: Simpler Unikernelization of Your Applica...The Linux Foundation
Unikernels have produced impressive performance, including fast instantiation times, tiny memory footprints, and high consolidation, plus potentially a reduced attack surface and easier certification. Their main drawback is that they require applications to be manually ported to the underlying minimal OS; this means both expert work and considerable amount of time.
In this talk we present Unikraft, an incubator project under the auspices of the Xen Project and the Linux Foundation aimed at automating the process of building customized images tailored to specific applications and thus significantly reducing development time. Unikraft decomposes the OS into elementary pieces (e.g., schedulers, memory allocators, drivers, etc.) that users can pick and choose from. It then builds images tailored to the needs of specific applications as well as the target platform (e.g., KVM, Xen) and architecture (e.g., ARM or x86).
Note: also see https://www.slideshare.net/xen_com_mgr/ossna18-xen-beginners-training-exercise-script
The Xen Project supports some of the biggest clouds in production today and is moving into new industries, like security and automotive. Usually, you will use Xen indirectly as part of a commercial product, a distro, a hosting or cloud service and only indirectly use Xen. By following this session you will learn how Xen and virtualization work under the hood exploring high-level topics like architecture concepts related to virtualization to more technical attributes of the hypervisor like memory management (ballooning), virtual CPUs, scheduling, pinning, saving/restoring and migrating VMs.
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...The Linux Foundation
Safety certification is one of the essential requirements for software to be used in highly regulated industries. The Xen Project, a secure and stable hypervisor that is used in many different markets, has been exploring the feasibility of building safety certified products on top of Xen for a year, looking at key aspects of its code base and development practices.
In this session, we will lay out the motivation and challenges of making safety certification achievable in open source and the Xen Project. We will outline the process the project has followed thus far and highlight lessons learned along the way. The talk will cover technical enablers, necessary process and tooling changes and community challenges offering an in-depth review of how Xen Project is approaching this exciting and and challenging goal.
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...The Linux Foundation
This presentation covers a real-world case study of Bitdefender Hypervisor Introspection (HVI) that is based on Xen Project software. On April 14th, The Shadow Brokers released the Eternalblue exploit toolkit, which exploited an SMBv1 vulnerability across a wide range of Windows operating systems. The exploit was most famously used as a propagation mechanism for the WannaCryransomware. HVI prevented exploitation attempts with no prior knowledge of the exploit or underlying vulnerability. This talk will cover the exploit mechanism, how HVI detects its actions, and illustrate some of the advantages of HVI built through open source collaboration. Audience members will takeaway a better understanding of this type of exploit and how something like hypervisor introspection and security through a hypervisor approach can help companies avoid these types of new exploits.
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMPEMC
This white paper provides an overview of EMC's industry-leading backup and recovery solutions for NAS systems. It also explains how EMC's backup solutions complement snapshots for optimized data protection across the enterprise.
Scale17x: Thinking outside of the conceived tech comfort zoneThe Linux Foundation
The Xen Project is used by more than 10 million users, powers some of the largest clouds on the planet, and is starting to build momentum in embedded and safety-conscious market segments. It is also nearly 16 years old.
The Xen Project’s success and longevity can be attributed to its flexible architecture, but more importantly to enabling community members to contribute ideas and code, even if they are not core to the project's main use-case. This has brought Xen far beyond server virtualization.
Lars will share how the project has supported new technologies and ideas, which may include some really interesting things you might not know about Xen (especially around defense applications), and will derive best practices that may help other projects.
In this report, the author will take you through detailed steps of on-site backup using Acronis
true image server edition on MS windows vista and Ms windows 03 server, this lab experiment
takes us through three different backup procedures, and then the restoration of these backed up
data using the same software.
This software is considered as layer 7 in the classification of disaster recover /business
continuity planning layers, but it is still provide us with all the on-site backup procedures ,security
options for our archives ,and a bootable zone in case of operating systems failure .
Going through this lab will help the reader to better understand or give a general image of how
the backup /recovery process take place using one of the available software for backup & recovery.
Detailed information of all the steps taken to accomplish the Lab is explained in this report with the
screen shots
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...The Linux Foundation
Safety certification is one of the essential requirements for software to be used in highly regulated industries. The Xen Project, a secure and stable hypervisor that is used in many different markets, has been exploring the feasibility of building safety certified products on top of Xen for a year, looking at key aspects of its code base and development practices.
In this session, we will lay out the motivation and challenges of making safety certification achievable in open source and the Xen Project. We will outline the process the project has followed thus far and highlight lessons learned along the way. The talk will cover technical enablers, necessary process and tooling changes and community challenges offering an in-depth review of how Xen Project is approaching this exciting and and challenging goal.
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...The Linux Foundation
This presentation covers a real-world case study of Bitdefender Hypervisor Introspection (HVI) that is based on Xen Project software. On April 14th, The Shadow Brokers released the Eternalblue exploit toolkit, which exploited an SMBv1 vulnerability across a wide range of Windows operating systems. The exploit was most famously used as a propagation mechanism for the WannaCryransomware. HVI prevented exploitation attempts with no prior knowledge of the exploit or underlying vulnerability. This talk will cover the exploit mechanism, how HVI detects its actions, and illustrate some of the advantages of HVI built through open source collaboration. Audience members will takeaway a better understanding of this type of exploit and how something like hypervisor introspection and security through a hypervisor approach can help companies avoid these types of new exploits.
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMPEMC
This white paper provides an overview of EMC's industry-leading backup and recovery solutions for NAS systems. It also explains how EMC's backup solutions complement snapshots for optimized data protection across the enterprise.
Scale17x: Thinking outside of the conceived tech comfort zoneThe Linux Foundation
The Xen Project is used by more than 10 million users, powers some of the largest clouds on the planet, and is starting to build momentum in embedded and safety-conscious market segments. It is also nearly 16 years old.
The Xen Project’s success and longevity can be attributed to its flexible architecture, but more importantly to enabling community members to contribute ideas and code, even if they are not core to the project's main use-case. This has brought Xen far beyond server virtualization.
Lars will share how the project has supported new technologies and ideas, which may include some really interesting things you might not know about Xen (especially around defense applications), and will derive best practices that may help other projects.
In this report, the author will take you through detailed steps of on-site backup using Acronis
true image server edition on MS windows vista and Ms windows 03 server, this lab experiment
takes us through three different backup procedures, and then the restoration of these backed up
data using the same software.
This software is considered as layer 7 in the classification of disaster recover /business
continuity planning layers, but it is still provide us with all the on-site backup procedures ,security
options for our archives ,and a bootable zone in case of operating systems failure .
Going through this lab will help the reader to better understand or give a general image of how
the backup /recovery process take place using one of the available software for backup & recovery.
Detailed information of all the steps taken to accomplish the Lab is explained in this report with the
screen shots
Pivotal has setup and operationalized 1000 node Hadoop cluster called the Analytics Workbench. It takes special setup and skills to manage such a large deployment. This session shares how we set it up and how you will manage it.
T12.Fujitsu World Tour India 2016-Your Datacenter‘s backboneFujitsu India
Growing complexity in business processes have a direct impact on your company's storage , data protection and archival architecture. Understand from our senior Storage expert as how can you manage these challenges while achieving your cost goals
Software Defined Storage. While the growth of software defined storage isn’t good news for traditional vendors, it is very good news for IT Managers, IT teams, who stand to gain unlimited scale, reduced costs, reduce risks and non-proprietary management. Open source means the end of vendor lock-in with true cloud portability and a solid foundation for future infrastructure.
Before you make the plunge, take into consideration every aspect of your VDI project: user experience, admin time, storage capacity, and ongoing costs related to datacenter space. Our experiences with Dell EMC PowerEdge FX2s enclosures outfitted with PowerEdge FC630 compute modules and Dell EMC XtremIO arrays show that this solution is a compelling one for VDI deployments. The Dell EMC XtremIO solution supported 6,000 virtual desktops with a good user experience, offered flexibility by supporting both full and linked clones, recomposed the desktops quickly and easily, and reduced data dramatically through inline deduplication and compression. And it did all this in less than a single rack of datacenter space, to keep server sprawl in check and costs down.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Ceph Day SF 2015 - Building your own disaster? The safe way to make Ceph ready!
1. Copyright 2014 FUJITSU
FUJITSU ETERNUS CD10000 (CD10K)
The safe way to make Ceph storage enterprise ready!
BYOD – Build your own disaster?
Alex Lam
Vice President, Enterprise Business
March 12, 2015
2. 1
3rd Platform: Intersection of Mobile, Cloud, Social and
Big Data
Source: IDC 12/12
From 2013 through 2020, 90% of IT industry
growth will be driven by 3rd Platform
technologies, that today represent just 22% of
ICT spending
Services will be build on innovative mash-ups of
cloud, mobile devices/apps, social technologies,
big data/analytics, and more
Data Center Transforming
Converged systems will account for over
1/3 of enterprise cloud deployments by
2016
Software-defined networks will penetrate
35% of Ethernet switching in the data
center
Growing importance of mega DC, Service
Copyright 2014 FUJITSU
3. 2
3rd Platform creates challenges for Traditional Storage
Copyright 2014 FUJITSU
3rd Platform – What is required from Storage
Manageability
Central management
of huge storage
amounts
Unified multi
protocol access
(block, file, object)
Seamless introduction
of new storage
Reliability
Full redundancy
Self healing
Geographical dispersion
Fast rebuild
Scalability
Practically unlimited
scalability in terms of
performance & capacity
No bottlenecks
No hot spots
4. 3
PB divide is creating need for new storage architectures
Traditional RAID systems face their limits
when crossing the petabyte divide
High RAID rebuild times, high risk
Exponentially rising costs for HA
Over or under provisioning
due to unexpected data growth
Extreme data migration duration
Significant issues with (planned) downtime
Costs per capacity
Performance issues
Need for new architectures
0.5PB 1PB 10PB 20PB 100PB
Traditional RAID systems
New storage architectures
Copyright 2014 FUJITSU
5. 4
A new Paradigm shift:
Distributed, scale-out Storage
Classical scale-up, RAID storage
System is divided into RAID groups providing
efficient data protection
Issues with rebuild times of large capacity disks
Protection against system failures requires
external add-ons
Limited performance scalability inhibits
full capacity utilization of systems
Issues with performance hot-spots
Distributed scale-out storage
Data are broadly distributed over disks and nodes
delivering high I/O speed even with slow disks
Protection against disk and node failures is achieved
by creating 2, 3, 4 … n replicas of data
Distributed file system avoids central bottlenecks
Adding nodes provides linear performance scalability
Fault tolerance and online migration of nodes
is part of the design → Zero down time
Copyright 2014 FUJITSU
6. 5
Ceph storage system software: a leading technology
of distributed storage
Ceph is an open source, software defined storage platform
Designed to present object, block, and file storage from a
distributed x86 compute cluster, scalable to the Exabyte level
Data are replicated over disks and nodes, delivering fault tolerance
The system is designed to be both self-healing and self-managing
Objective is to reduce investment and operational costs
Ceph is part of the OpenStack project
Ceph software is the core storage element
of the OpenStack project
OpenStack enables IT organizations building private
and public cloud environments with open source software
Copyright 2014 FUJITSU
7. 6
Key Scalability Enabler for Ceph:
CRUSH Data Placement
Controlled Replication Under Scalable Hashing (CRUSH)
Metadata computed instead of stored
Almost no central lookups
No hot spots
Pseudo-random, uniform (weighted) distribution
Dynamic adaption to infrastructure changes
Adding devices has no significant impact on data mapping
Infrastructure aware algorithm
Placement based on physical infrastructure
E.g., devices, servers, cabinets, rows, DCs, etc.
Easy and flexible placement rules
"Three replicas, different cabinets, same row"
Quickly adjusts to failures
Automatic and fast recovery from lost disks
CRUSH
Copyright 2014 FUJITSU
8. 7
A model for dynamic "clouds" – how nature overcomes
the central access bottleneck
The fishes represents the objects
The swarm including the fishes
represents the object storage
What happens if …
Swarm of fishes represents the cluster
Copyright 2014 FUJITSU
9. 8
A model for dynamic "clouds" in nature
Dolphins attack the fish swarm
Copyright 2014 FUJITSU
10. 9
A model for dynamic "clouds" in nature
Some of the fishes are hunted
and eaten by the dolphins but …
The fish swarm will resist the
attack and the cluster remains
After a time the fish swarm
formation will regenerate
Copyright 2014 FUJITSU
11. 10
How CEPH Overcomes the Central Access Bottleneck
Disks assume the role of
fish in the storage swarm
Every disk is represented by an
OSD (Object Storage Daemon)
Clients can directly access the
data without a central instance
The fish swarm represents the
data. A single fish cannot influence
the rest of the population
End-user
Copyright 2014 FUJITSU
13. 12
Building Storage with Ceph looks simple
Copyright 2015 FUJITSU
Ceph SW
+ some servers
+ network
= storage
14. 13
Building Storage with Ceph looks simple – but……
Many Complexities exist:
Rightsizing server, disk types, network
bandwidth
Silos of management tools (HW, SW..)
Keeping Ceph versions in synch with
versions of server HW, OS, connectivity,
drivers in sync
Management of maintenance and support
contracts of components
Troubleshooting
Copyright 2014 FUJITSU
Build Ceph source storage yourself
15. 14
Is managing Ceph based storage easy?
1) Deployment of servers….
2) Connecting servers….
3) Operating servers….
4) Provisioning Ceph on Servers….
5) Operating Ceph….
6) Testing compatibility of Ceph with servers and
network….
7) Testing performance….
8) Updating Ceph on each server….
9) Start new compatibility and performance tests
after each update….
10) Get trained for management tools for each
component….
Copyright 2014 FUJITSU
16. 15
ETERNUS CD10000 – Making Ceph enterprise ready
Build Ceph open source storage yourself Out of the box ETERNUS CD1000
robust platform
incl. support
incl. maintenance
Single point of contact
ETERNUS CD10000 combines open source storage with enterprise–class quality of service
Copyright 2014 FUJITSU
17. 16
How do we move CEPH from Shadow IT to Mainstream
in the Enterprise?
Although based on open source software, ETERNUS CD10000
is a fully integrated and quality assured storage system
End-to-end maintenance, consisting upgrades and troubleshooting for
the complete system from one source
Adding functionality where Ceph has gaps (e.g. VMware, SNMP)
Integrated management of Ceph and hardware functions increases
operational efficiency and makes Ceph simpler to use
Performance-optimized sizing and architecture avoid bottlenecks
during operation, maintenance and failure recovery
Adding integrated apps on top of the system
Copyright 2014 FUJITSU
ETERNUS CD10000 makes Ceph enterprise-ready
19. 18
ETERNUS CD10000 – Key Characteristics
Copyright 2015 FUJITSU
ETERNUS CD10000
ETERNUS
CD10000
Unlimited
Scalability
TCO
optimized
The new
unified
Immortal
System
Zero
Downtime
20. 19
Fujitsu’s enhancements on top of open source CEPH
Copyright 2013 FUJITSU
Ceph Open Source Software
Ceph Enterprise Distribution
(Inktank)
Ceph Enriched Enterprise
Functionality (VSM from Intel)
CD10000 Appliance (Fujitsu
Enhancements in SW + HW)
Specific workload Apps (e.g.
irod for Archiving)
Fujitsu
enhancements
21. 20
Unlimited Scalability
Cluster of storage nodes
Capacity and performance scales by
adding storage nodes
Three different node types enable
differentiated service levels
Density, capacity optimized
Performance optimized
Optimized for small scale dev & test
1st version of CD10000 can scale from
4 to 224 nodes
Scales up to 50+ Petabyte!
Copyright 2014 FUJITSU
Basic node 12 TB Performance node 35 TB Capacity node 252 TB
22. 21
One Storage System – seamless management
ETERNUS CD10000 delivers one seamless
management for the complete stack
Central Ceph software deployment
Central storage node management
Central network management
Central log file management
Central cluster management
Central configuration, administration and
maintenance
SNMP integration of all nodes and
network components
Copyright 2014 FUJITSU
23. 22
Seamless management drives productivity
Manual Ceph Installation
Setting-up a 4 node Ceph cluster with 15 OSDs: 1.5 – 2 admin days
Adding an additional node: 3 to 12 admin hrs (1/2 a day)
Vs.
Automated Installation through ETERNUS CD10000
Setting-up a 4 node Ceph cluster with 15 OSDs: 1 hour
Adding an additional node: 0.5 hour
Copyright 2014 FUJITSU
24. 23
TCO optimized
Based on x86 industry standard architectures
Based on open source software (Ceph)
High-availability and self-optimizing functions are part
of the design at no extra costs
Highly automated and fully integrated management
reduces operational efforts
Online maintenance and technology refresh reduce
costs of downtime dramatically
Extreme long lifecycle delivers investment protection
End-to-end design an maintenance from Fujitsu
reduces, evaluation, integration, maintenance costs
Copyright 2014 FUJITSU
Better service levels at reduced costs – business centric storage
25. 24
Adding and Integrating Apps
The ETERNUS CD10000 architecture
enables the integration of apps
Fujitsu is working with customers and
software vendors to integrate selected
storage apps
E.g. archiving, sync & share, data
discovery, cloud apps…
Copyright 2014 FUJITSU
Cloud
Services
Sync
& Share
Archive
iRODS
data
discovery
ETERNUSCD10000
Object Level
Access
Block Level
Access
File Level
Access
Central Management
Ceph Storage System S/W and Fujitsu
Extensions
10GbE Frontend Network
Fast Interconnect Network
PerformanceNodes
CapacityNodes
26. 25
Typical usage areas
Data volumes
500TB and beyond
Exponential and
unknown data growth
Typical usage areas
(Cloud) service providers
Telecommunications providers
Financial institutions
R&D, public institutions, universities
Companies with
large R&D activities
Public institutions with
huge document repositories
Media, broadcasting/
streaming companies
Business analytics tasks
needing fast access to large
scale of (historical) data
Copyright 2014 FUJITSU
27. 26
How ETERNUS CD10000 supports cloud biz
Cloud IT Trading Platform
An European provider operates a trading platform for cloud
resources (CPU, RAM, Storage)
Cloud IT Resources Supplier
The Darmstadt data center (DARZ) offers
storage capacity via the trading platform
Using ETERNUS CD10000 to provide storage
resources for an unpredictable demand
ETERNUS
CD10000
Copyright 2015 FUJITSU
28. 27
The FUJITSU difference
Most easy to deploy and operate Ceph package in the industry
Bringing simplicity to Ceph/Open Stack. The appliance hides complexity.
Complete Enterprise Class Services – best service package in the industry
For break fix of HW, SW, installation, even operation, from one vendor
More functionality – the most complete Ceph based storage device in the industry
Using Inktank + Intel’s VSM + Fujitsu own IP add ons
App concept for hyperconverged solutions
• E.g. Archiving, Backup, Synch&Share
Copyright 2014 FUJITSU
Accelerate time-to-deployment & improve TCO with the Fujitsu ETERNUS CD10000