Alice in Storageland, or, a guest blog at MapR’s site

‘I could tell you my adventures—beginning from this morning,’ said Alice a little timidly: ‘but it’s no use going back to yesterday, because I was a different person then.’

–Lewis Carroll, “Alice’s Adventures in Wonderland

mapr-blog-snippetI was invited to guest-blog on MapR’s site recently, in preparation for a webcast I’m doing next week with their VP of Partner Strategy, Bill Peterson. MapR is known for a highly technical blog, but I’ve learned and shown that even technical things can be a bit entertaining now and then.

So, after a turn of phrase that brought Lewis Carroll to mind, you can go see a couple of Alice references and, in a strange sort of way, how they fit my evolution into storage administration–not entirely unlike my evolution into business intelligence and big data and most of the other stuff I’ve ever made my living at.

Visit the posting, “It’s no use going back to yesterday’s storage platform for tomorrow’s applications,”  on MapR’s blog site, and if you’d like come through the looking-glass with Bill and I on Wednesday, January 25, 2017, register with the links on that page.

As an aside, I promise that Bill is not the one mentioned in “The Rabbit Sends a Little Bill.”


Photo credit: Public domain image from 1890, per Wikimedia Commons

Disclosure: I work for Cisco; these blogs (rsts11 and rsts11travel) are independent and generally unrelated to my day job. However, in this case, the linked blog post as well as the referenced webinar are part of my day job. The humor is my own, for which I am solely responsible, and not at all sorry. 

Links updated March 20, 2017, due to MapR blog site maintenance.


Introducing (and Expanding) the Asigra Cloud Backup Connector Appliance (from the Asigra Partner Summit)

As some of you know, I’m starting a new job soon working with software vendors integrating their products around Cisco platforms. While it’s not my day job yet, I’ve been pondering some less explored options to look into when I do get settled in.

This week I’m at the Asigra Partner Summit in Toronto, with my blogger/technologist hats on. I was a bit surprised to run into a Cisco 2900 ISR (Integrated Services Router) with a UCS E-Series blade module in it, in the hands-on-labs area of the Summit. For me, at least, it’s the unicorn of Cisco UCS; I’ve seen an E-Series system twice now, and once was in the Cisco booth at Cisco Live this year.

What’s this Cisco UCS E-Series all about?

284666[1]The Cisco UCS E-Series blade gives you a single Xeon E5 processor, three DIMM slots, 1-2 2.5″ form factor drives, a PCIe slot, and the manageability of standalone UCS servers without the infrastructure overhead that would be cost- and space-prohibitive in a single or dual node B-Series or C-Series deployment. It does not integrate with UCSM, although you can run multiple blades in an ISR. It’s an intriguing platform for remote office/branch office (ROBO) environments, with the capability to integrate your routing/switching/firewall/network services with your utility server needs, including backup and recovery.

But what’s it doing at the Asigra Partner Summit?

As it turns out, this “Asigra Cloud Backup Connector Appliance” deploys the Asigra Cloud Backup software with the ISR and E-Series platform. It makes sense, and while I wish I’d thought of it sooner, or they’d thought of it later, it is a pretty cool idea.

You can use the appliance as a standalone device, running Asigra DS-Client and DS-System software to collect and store your backups on internal storage. You can also use it as an aggregator or data collector running DS-Client, which would send the data to your DS-System server elsewhere (perhaps a standalone server on-site, or a datacenter or hosted vault).

The one catch is that you’re a bit limited on the internal storage. Cisco has certified 1TB SATA and 900GB 10K SAS drives for the E140DP blade, which means you’re capped at 2TB raw in the server. Asigra has incorporated deduplication in their backup software for over 20 years, so depending on your data you’ll probably see 8-10TB (or more) capacity, but you may still hit some limits.

How do we get around this capacity limit?

If you want to use your Cloud Backup Connector Appliance as a standalone service, I see two possible paths, but each has its drawbacks.

First, since the drive bays are standard 2.5 SATA form factor, you could install your own aftermarket 1.5TB or 2TB drives, doubling your capacity to 3-4TB raw. This means you’re managing your own disks though, and it could complicate Cisco support (although if you’re tearing into the gear you probably already know this and understand the risks).

Second, since you have a PCIe slot in the server, I could imagine either installing a PCIe flash card (such as the 3.2TB  Fusion-io “Atomic” ioMemory SX300 card just announced last week) or a SATA/SAS storage controller connected to some sort of external array.

There are two downsides to this second option. Cisco has not announced certification of anything but a quad-port Gigabit Ethernet or single-port 10-Gigabit Ethernet controller in the PCIe slot (so you’re blazing your own trail if you swap them out–they should work, but…). And if you put storage in that slot, you can no longer expand networking, and will be limited to two internal (chassis) ports and two external (RJ45) ports for Gigabit Ethernet networking. Oh, and a third concern is that you lose the encapsulation factor with your storage hanging off of the server rather than being inside the server.

As I ponder the pitfalls to the PCIe expansion option, I find myself wishing for a dual-Ethernet / SAS card similar to what Sun used to sell for Ethernet and SCSI back in the day. I think HP had a single port combo as well. Alas, both of those are antiquated and are PCI-X instead of PCIe. You could use FCoE from the 10-Gigabit Ethernet card if you have that infrastructure in place, but that might be beyond branch office scale as well.

So what are you saying, Robert?

I may be overengineering this. I’ve done that before. Dual 10-Gigabit in my home lab, for example.

For a branch office with ~20 500GB desktops, a pile of mobile devices, and a server or two, with judicious backup policies, you’re in good shape with the standard configuration. Remember, you’re deduplicating the OS and common files, compressing the backed-up data, and leaving the door open to expanding your Asigra deployment as your branch offices grow.

And if you choose to, you can run a hypervisor on your E-Series server, with Asigra DS-Client/DS-Server VMs as well as your own servers, to the limits of the hardware (6-core CPU, 48GB RAM). The system can boot from SD card, leaving the internal disk entirely for functional storage and VM data stores.

Where do we go from here?

Even with the 2TB raw disk limitation (which will probably be addressed eventually by Cisco), you have a very functional and featureful option for small offices, remote offices, and even distributed campus backup and recovery aggregation.

You get all the benefits of Asigra’s software solution, including agentless backup of servers and desktops, mobile device support, dedupe and compression, FIPS 140-2 certified encryption at rest and in flight, and Asigra’s R2A (Recovery and Restore Assurance) for ongoing validation of your backed-up data.

And you get the benefits of Cisco’s ISR and E-Series platforms for your networking services and server implementation. You can purchase pre-installed systems through an Asigra Service Provider, or if you already own an ISR with an E-Series server, your Service Provider can install and license Asigra software on your existing gear.


I am attending the Asigra Partner Summit at Asigra’s invitation, as an independent blogger, and the company has paid for my travel and lodging to attend. I have not received any compensation for participating, nor have Asigra requested or required any particular coverage or content. Anything related on or in my twitter feed are my own thoughts and of my own motivation.

Also, while I am a Cisco UCS fanboy and soon to be a Cisco employee, any comments, observations, and opinions on UCS are my own, based on my personal experience as well as publicly available information from Cisco and other vendors. I do not speak for Cisco nor should any of my off-label ideas be taken to imply Cisco approval or even awareness of said musings.

How do you solve a problem like Invicta? PernixData and external high performance cache

PernixData and unconventional flash caching

We spent a captivating two hours at PernixData in San Jose Wednesday. For more general and detailed info on the conversations and related announcements, check out this post by PernixData’s Frank Dennenman on their official blog, and also check out Duncan Epping’s post on YellowBricks.

At a very high and imprecise level, PernixData’s FVP came out last year to provide a caching layer (using flash storage, whether PCI-E or SSD) injected at the vmkernel level on VMware hypervisors. One big development this week was the option to use RAM in place of (or in addition to) flash as a caching layer, but this is unrelated to my thoughts below.

One odd question arose during our conversation with Satyam Vaghani, CTO and co-founder of PernixData. Justin Warren, another delegate, asked the seemingly simple question of whether you could use external flash as cache for a cluster (or clusters) using PernixData’s FVP. Satyam’s answer was a somewhat surprising “yes.”

I thought (once Justin mentioned it) that this was an obvious idea, albeit somewhat niche, and having worked to get scheduled downtime for a hundred servers on several instances in the past year, I could imagine why I might not want to (or be able to) shut down 100 hypervisor blades to install flash into them. If I could put a pile of flash into one or more centrally accessible, high speed/relatively low latency (compared to spinning disk) hosts, or perhaps bring in something like Fusion-io’s Ion Accelerator platform.

I took a bit of ribbing from a couple of other delegates, who didn’t see any situation where this would be useful. You always have plenty of extra spare hypervisor capacity, and flash that can go into those servers, and time and human resources to handle the upgrades, right? If so, I mildly envy you.

So what’s this about Invicta?

Cisco’s UCS Invicta platform (the evolution of WHIPTAIL) is a flash block storage platform based on a Cisco UCS C240-M3S rackmount server with 24 consumer-grade MLC SSD drives. Today its official placement is as a standalone device, managed by Cisco UCS Director, serving FC to UCS servers. The party line is that using it with any other platform or infrastructure is off-label.

I’ve watched a couple of presentations on the Invicta play. It hasn’t yet been clear how Cisco sees it playing against similar products in the market (i.e. Fusion-io Ion Accelerator). When I asked on a couple of occasions on public presentations, the comparison was reduced to Fusion-io ioScale/ioDrive PCIe cards, which is neither a fair, nor an applicable, comparison. You wouldn’t compare Coho Data arrays to single SSD enclosures. So for a month or so I’ve been stuck with the logical progression:

  1. Flash is fast
  2. ???
  3. Buy UCS and Invicta

Last month, word came out that Cisco was selling Invicta arrays against Pure Storage and EMC XtremIO, for heterogeneous environments, which also seems similar to the market for Ion Accelerator. Maybe I called it in the air. Who knows? The platform finally made sense in the present though.

Two great tastes that taste great together?

Wednesday afternoon I started putting the pieces together. Today you can serve up an Invicta appliance as block storage, and probably (I haven’t validated this) access it from a host or hosts running PernixData’s FVP. You’re either dealing with FC or possibly iSCSI. It will serve as well as the competing flash appliances.

But when Cisco gets Invicta integrated into the UCS infrastructure, hopefully with native support for iSCSI and FCoE traffic, you’ll be talking about 10 gigabit connections within the Fabric Interconnect for cache access. You’ll be benefiting from the built-in redundancy, virtual interface mapping and pinning, and control from UCS Manager/UCS Central. You’re keeping your cache within a rack or pod. And if you need to expand the cache you won’t need to open up any of your servers or take them down. You’d be able to put another Invicta system in, map it in, and use it just as the first one is being used.

If you’re not in a Cisco UCS environment, it looks like you could still use Invicta arrays, or Fusion-io, or other pure flash players (even something like a whitebox or channel partner Nexenta array, at least for proof-of-concept).

So where do we go from here?

The pure UCS integration for Invicta is obviously on the long-term roadmap, and hopefully the business units involved see the benefits of true integration at the FI level and move that forward soon.

I’m hoping to get my hands on a trial of FVP, one way or another, and possibly build a small flash appliance in my lab as well as putting some SSDs in my C6100 hypervisor boxes.

It would be interesting to compare the benefits of the internal vs external flash integration, with a conventional 10GBE (non-converged) network. This could provide some insight into a mid-market bolt-on solution, and give some further enlightenment on when and why you might take this option over internal flash. I know that I won’t be able to put a PCIe flash card into my C6100s, unless I give up 10GBE (one PCIe slot per server, darn). Although with FVP’s newly-announced network compression, that might be viable.

What are your thoughts on external server-side cache? Do you think something like this would be useful in an environment you’ve worked with? Feel free to chime in on the comments section below.

This is a post related to Storage Field Day 5, the independent influencer event being held in Silicon Valley April 23-25, 2014. As a delegate to SFD5, I am chosen by the Tech Field Day community and my travel and expenses are covered by Gestalt IT. I am not required to write about any sponsoring vendor, nor is my content reviewed. No compensation has been or will be received for this or other Tech Field Day post. I am a Cisco Champion but all Cisco information below is public knowledge and was received in public channels.