Welcome!

Eclipse Authors: Pat Romanski, Elizabeth White, Liz McMillan, David H Deans, JP Morgenthal

News Feed Item

Red Hat Adds Sophisticated Tiering and Data Protection Features to its Industry-leading Storage Platform for OpenStack

Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced the availability of its Inktank Ceph Enterprise 1.2 with new features to help customers store and manage an entire spectrum of data – from “hot” mission-critical data to “cold” archival data. The new functionality, coupled with enhancements to the solution’s Calamari management and monitoring platform, make Red Hat’s Inktank Ceph Enterprise storage solution a flexible and cost-effective storage platform for enterprises managing data-intensive applications.

In May, 2014, Red Hat acquired Inktank, provider of Ceph and Inktank Ceph Enterprise open source storage solutions. Inktank Ceph Enterprise delivers world class object and block storage software to enterprises deploying public or private clouds, including many early adopters of OpenStack. Combined with Red Hat’s existing GlusterFS-based file storage offering, the addition of Inktank positions Red Hat as one of the leading providers of open software-defined storage across object, block and file system storage. As part of today’s announcement, Red Hat’s Inktank Ceph Enterprise supports the new Red Hat Enterprise Linux OpenStack Platform 5 to provide a truly integrated OpenStack stack that is delivered from and supported by a single vendor.

According to IDC’s report “Worldwide Cold Storage Ecosystem Taxonomy”, published in March 20141, as data continues to grow at an exponential pace, enterprises increasingly recognize the importance of categorizing and storing data based on frequency of access and relevance, or rather, temperature—with newer or “hot” data sets stored with highest priority and performance. The addition of tiering capabilities to Red Hat’s Inktank Ceph Enterprise 1.2 enables enterprises to more effectively execute management of all data – from mission-critical to archival – providing an opportunity to radically reduce storage costs.

Red Hat’s Inktank Ceph Enterprise now enables users to define pools for storing data densely, and therefore more cost-effectively, as well as caching pools that can deliver high-performance. The new erasure encoded storage pools in Red Hat’s Inktank Ceph Enterprise provide enterprise-scale durability that can lower raw capacity requirements by up to 50 percent2. Additionally, new cache tiering pools enable both hot-to-cold and cold-to-hot data management. By combining the power of these new features, customers can create the right blend of price and performance tailored to their specific needs.

Continuing Red Hat’s commitment to customer choice, Red Hat’s Inktank Ceph Enterprise 1.2 is supported on Red Hat Enterprise Linux 6.5 and 7 and Ubuntu 12.04 and 14.04. Key new features and benefits in Red Hat’s Inktank Ceph Enterprise 1.2 include:

  • Erasure Coding, making Red Hat’s Inktank Ceph Enterprise 1.2 suitable for archive and cold storage use cases by reducing the cost per gig.
  • Cache Tiering, enabling “hot” data to be moved onto high-performance media when it becomes active and “cold” data to be moved onto low-performance media when it is no longer active.
  • Calamari v1.2, updating the Ceph management platform to support management functions. These updates will enable an administrator to manage the core functionality of the reliable autonomic distributed object store (RADOS) storage cluster, including the ability to manage individual storage devices and pool policies. Calamari is an on-premise application with management tools and performance data that simplifies operational management and enables administrators to adapt to changes in their Ceph clusters. In May 2014, Red Hat announced that Calamari had been open sourced as part of the upstream Ceph community.
  • Comprehensive integration with Red Hat Enterprise Linux OpenStack Platform 4 and 5, enabling an integrated OpenStack cloud storage and platform solution that is supported by one vendor.

Supporting Quotes

Neil Levine, director, product management, Storage and Big Data, Red Hat

“Enterprises are under pressure to store expanding amounts of data with limited IT budgets. As part of our commitment to redefining the economics of software-defined storage, the new archiving and tiering functionality in Red Hat’s Inktank Ceph Enterprise 1.2 enables users to define pools for storing data densely, and therefore more cost-effectively, as well as pools that serve data very quickly. And, because these pools all work together, customers can now create the blend of price and performance that’s right for them for both cold and hot data storage.”

Steven Stover, director of engineered solutions. Dell

“Dell and Red Hat have partnered for more than 15 years to bring global customers value with Red Hat open source software solutions across Dell’s enterprise offerings. Red Hat’s Inktank Ceph Enterprise, which delivers a highly scalable, reliable cloud storage solution that can cost-effectively support different types and volumes of enterprise data, can further enterprise customers’ acceleration of OpenStack-based clouds. We look forward to delivering Red Hat’s Inktank Ceph Enterprise 1.2 to our customers in our Dell Red Hat Private Cloud Solutions.”

Additional Resources

Connect with Red Hat

About Red Hat, Inc.

Red Hat is the world's leading provider of open source software solutions, using a community-powered approach to reliable and high-performing cloud, Linux, middleware, storage and virtualization technologies. Red Hat also offers award-winning support, training, and consulting services. As the connective hub in a global network of enterprises, partners, and open source communities, Red Hat helps create relevant, innovative technologies that liberate resources for growth and prepare customers for the future of IT. Learn more at http://www.redhat.com.

Forward-Looking Statements

Certain statements contained in this press release may constitute "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995. Forward-looking statements provide current expectations of future events based on certain assumptions and include any statement that does not directly relate to any historical or current fact. Actual results may differ materially from those indicated by such forward-looking statements as a result of various important factors, including: risks related to delays or reductions in information technology spending; the effects of industry consolidation; the ability of the Company to compete effectively; the integration of acquisitions and the ability to market successfully acquired technologies and products; uncertainty and adverse results in litigation and related settlements; the inability to adequately protect Company intellectual property and the potential for infringement or breach of license claims of or relating to third party intellectual property; the ability to deliver and stimulate demand for new products and technological innovations on a timely basis; risks related to data and information security vulnerabilities; ineffective management of, and control over, the Company's growth and international operations; fluctuations in exchange rates; and changes in and a dependence on key personnel, as well as other factors contained in our most recent Quarterly Report on Form 10-Q (copies of which may be accessed through the Securities and Exchange Commission's website at http://www.sec.gov), including those found therein under the captions "Risk Factors" and "Management's Discussion and Analysis of Financial Condition and Results of Operations". In addition to these factors, actual future performance, outcomes, and results may differ materially because of more general factors including (without limitation) general industry and market conditions and growth rates, economic and political conditions, governmental and public policy changes and the impact of natural disasters such as earthquakes and floods. The forward-looking statements included in this press release represent the Company's views as of the date of this press release and these views could change. However, while the Company may elect to update these forward-looking statements at some point in the future, the Company specifically disclaims any obligation to do so. These forward-looking statements should not be relied upon as representing the Company's views as of any date subsequent to the date of this press release.

Red Hat and Red Hat Enterprise Linux are trademarks of Red Hat, Inc., registered in the U.S. and other countries. Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries. The OpenStack mark is either a registered trademark/service mark or trademark/service mark of the OpenStack Foundation, in the United States and other countries, and is used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.

1 IDC report on Worldwide Cold Storage Ecosystem Taxonomy, March 2014, #246732

2 Relative to industry standard 3x replication; actual savings will vary depending on erasure coding parameters selected

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.