SlideShare a Scribd company logo
1 of 17
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco
Confidential
Cisco
Confidential© 2013 Cisco and/or its affiliates. All rights reserved.
Storage Visibility and
Optimization
A Story of Ceph
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco
ConfidentialCisco ConfidentialCisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved.
Cloud/Big-data Winnovation Team
Alex Holden
ajonasho@cisco.com
Damian Van Vuuren
dvanvuur@cisco.com
Ailing Zhang
ailzhang@cisco.com
Marc Solanas
msolanas@cisco.com
Matt Weeks
maweeks@cisco.com
Pengfei Zhang
penfzhan@cisco.com
Kai Zhang
kazhang2@cisco.com
Xinyuan Huang
xinyuahu@cisco.com
Debo Dutta
dedutta@cisco.com
Yathiraj Udupi
yudupi@cisco.com
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco
Confidential
Cisco
Confidential© 2013 Cisco and/or its affiliates. All rights reserved.
Why do we need storage visibility?
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco
Confidential
OpenStack Storage
Openstack APIs
Cinder
????
Swift Glance
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco
Confidential
The Storage Jungle
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco
Confidential
Why is visibility useful?
Optimal object
distribution
Failure detection
Make underlying
configuration
easier
Performance
tuning
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco
Confidential
Case Study: Ceph
Source: http://ceph.com/docs/master/architecture/
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco
Confidential
Case Study: Ceph
hash(“foo”)
% 128 =
0x3f
“bar’ = 2
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco
Confidential
Visibility in Ceph
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco
Confidential
The visibility we want in Ceph
Visual
monitoring
Object
distribution
OSD real time
status
Visual
management of
crush rules
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco
Confidential
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco
Confidential
Ceph Horizon
Panel Demo
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco
Confidential
Cisco
Confidential© 2013 Cisco and/or its affiliates. All rights reserved.
Use case: Identify bottlenecks
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco
Confidential
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco
Confidential
Optimization
Rebalance storage nodes dynamically
Preview changes (Future work)
Change configuration automatically (Future
work)
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco
Confidential
Conclusion
Reduce downtime
Increase storage performance
Provide analytics and historical data
More insights to follow!
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco
Confidential
Thank you.
Please answer our survey online:

More Related Content

What's hot

ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber SecurityITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber SecurityMartin Thompson
 
Unveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-FiUnveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-FiCisco Service Provider Mobility
 
unSEXY Conf 2013: Ainsley Braun, Tinfoil
unSEXY Conf 2013: Ainsley Braun, TinfoilunSEXY Conf 2013: Ainsley Braun, Tinfoil
unSEXY Conf 2013: Ainsley Braun, Tinfoil500 Startups
 
How Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differentlyHow Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differentlyScott Cressman
 
Feb13 webinar the path to u.s. - japan data transfer compliance - final
Feb13 webinar   the path to u.s. - japan data transfer compliance - finalFeb13 webinar   the path to u.s. - japan data transfer compliance - final
Feb13 webinar the path to u.s. - japan data transfer compliance - finalTrustArc
 
Chris Ward Short Bio and CV 2016 (1)
Chris Ward Short Bio and CV 2016 (1)Chris Ward Short Bio and CV 2016 (1)
Chris Ward Short Bio and CV 2016 (1)Christopher Ward
 
What is this thing called OpenStack
What is this thing called OpenStackWhat is this thing called OpenStack
What is this thing called OpenStackMatthew McKinney
 
Top10 Biggest Security Threats
Top10 Biggest Security ThreatsTop10 Biggest Security Threats
Top10 Biggest Security ThreatsKim Jensen
 
Pascal Louis-Perez, Wealthfront
Pascal Louis-Perez, Wealthfront Pascal Louis-Perez, Wealthfront
Pascal Louis-Perez, Wealthfront Sheila Goodman
 
Tadej Hren: IOT Ransomware
Tadej Hren: IOT RansomwareTadej Hren: IOT Ransomware
Tadej Hren: IOT RansomwareDomen Savič
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurityscoopnewsgroup
 
Scott fantabulous Cisco UCS deck
Scott fantabulous Cisco UCS deckScott fantabulous Cisco UCS deck
Scott fantabulous Cisco UCS deckScott Hanson
 
Ainsley Braun, unSEXY Presentation
Ainsley Braun, unSEXY PresentationAinsley Braun, unSEXY Presentation
Ainsley Braun, unSEXY Presentation500 Startups
 
TOP10 Security Predictions for 2010
TOP10 Security Predictions for 2010TOP10 Security Predictions for 2010
TOP10 Security Predictions for 2010Kim Jensen
 
Guy Smith from Cisco Capital at The Leasing Foundation Third Annual Conference.
Guy Smith from Cisco Capital at The Leasing Foundation Third Annual Conference. Guy Smith from Cisco Capital at The Leasing Foundation Third Annual Conference.
Guy Smith from Cisco Capital at The Leasing Foundation Third Annual Conference. The Leasing Foundation
 

What's hot (20)

ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber SecurityITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
 
Unveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-FiUnveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-Fi
 
unSEXY Conf 2013: Ainsley Braun, Tinfoil
unSEXY Conf 2013: Ainsley Braun, TinfoilunSEXY Conf 2013: Ainsley Braun, Tinfoil
unSEXY Conf 2013: Ainsley Braun, Tinfoil
 
RBAC in Swift
RBAC in SwiftRBAC in Swift
RBAC in Swift
 
How Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differentlyHow Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differently
 
Feb13 webinar the path to u.s. - japan data transfer compliance - final
Feb13 webinar   the path to u.s. - japan data transfer compliance - finalFeb13 webinar   the path to u.s. - japan data transfer compliance - final
Feb13 webinar the path to u.s. - japan data transfer compliance - final
 
Chris Ward Short Bio and CV 2016 (1)
Chris Ward Short Bio and CV 2016 (1)Chris Ward Short Bio and CV 2016 (1)
Chris Ward Short Bio and CV 2016 (1)
 
What is this thing called OpenStack
What is this thing called OpenStackWhat is this thing called OpenStack
What is this thing called OpenStack
 
Top10 Biggest Security Threats
Top10 Biggest Security ThreatsTop10 Biggest Security Threats
Top10 Biggest Security Threats
 
Pascal Louis-Perez, Wealthfront
Pascal Louis-Perez, Wealthfront Pascal Louis-Perez, Wealthfront
Pascal Louis-Perez, Wealthfront
 
Tadej Hren: IOT Ransomware
Tadej Hren: IOT RansomwareTadej Hren: IOT Ransomware
Tadej Hren: IOT Ransomware
 
BGA Eğitim Kataloğu
BGA Eğitim KataloğuBGA Eğitim Kataloğu
BGA Eğitim Kataloğu
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
 
Babies On Black
Babies On BlackBabies On Black
Babies On Black
 
Wenzhou baodi safety equipment co, ltd
Wenzhou baodi safety equipment co, ltdWenzhou baodi safety equipment co, ltd
Wenzhou baodi safety equipment co, ltd
 
Scott fantabulous Cisco UCS deck
Scott fantabulous Cisco UCS deckScott fantabulous Cisco UCS deck
Scott fantabulous Cisco UCS deck
 
Io t1
Io t1Io t1
Io t1
 
Ainsley Braun, unSEXY Presentation
Ainsley Braun, unSEXY PresentationAinsley Braun, unSEXY Presentation
Ainsley Braun, unSEXY Presentation
 
TOP10 Security Predictions for 2010
TOP10 Security Predictions for 2010TOP10 Security Predictions for 2010
TOP10 Security Predictions for 2010
 
Guy Smith from Cisco Capital at The Leasing Foundation Third Annual Conference.
Guy Smith from Cisco Capital at The Leasing Foundation Third Annual Conference. Guy Smith from Cisco Capital at The Leasing Foundation Third Annual Conference.
Guy Smith from Cisco Capital at The Leasing Foundation Third Annual Conference.
 

Viewers also liked

Optimized NFV placement in Openstack Clouds
Optimized NFV placement in Openstack CloudsOptimized NFV placement in Openstack Clouds
Optimized NFV placement in Openstack CloudsYathiraj Udupi, Ph.D.
 
Openstack 2016 Barcelona - Adiuvo Bot – Smart DevOps using bots for effectiv...
Openstack 2016  Barcelona - Adiuvo Bot – Smart DevOps using bots for effectiv...Openstack 2016  Barcelona - Adiuvo Bot – Smart DevOps using bots for effectiv...
Openstack 2016 Barcelona - Adiuvo Bot – Smart DevOps using bots for effectiv...Yathiraj Udupi, Ph.D.
 
Network visibility for efficient Openstack operations
Network visibility for efficient Openstack operationsNetwork visibility for efficient Openstack operations
Network visibility for efficient Openstack operationsYathiraj Udupi, Ph.D.
 
Predictive analytics and Visualization. Towards Data Driven Insights for Open...
Predictive analytics and Visualization. Towards Data Driven Insights for Open...Predictive analytics and Visualization. Towards Data Driven Insights for Open...
Predictive analytics and Visualization. Towards Data Driven Insights for Open...Yathiraj Udupi, Ph.D.
 
Network Monitoring and Analytics
Network Monitoring and AnalyticsNetwork Monitoring and Analytics
Network Monitoring and AnalyticsPLUMgrid
 
The Top 8 Challenges with Network Monitoring
The Top 8 Challenges with Network MonitoringThe Top 8 Challenges with Network Monitoring
The Top 8 Challenges with Network MonitoringHelpSystems
 

Viewers also liked (7)

Optimized NFV placement in Openstack Clouds
Optimized NFV placement in Openstack CloudsOptimized NFV placement in Openstack Clouds
Optimized NFV placement in Openstack Clouds
 
Openstack 2016 Barcelona - Adiuvo Bot – Smart DevOps using bots for effectiv...
Openstack 2016  Barcelona - Adiuvo Bot – Smart DevOps using bots for effectiv...Openstack 2016  Barcelona - Adiuvo Bot – Smart DevOps using bots for effectiv...
Openstack 2016 Barcelona - Adiuvo Bot – Smart DevOps using bots for effectiv...
 
Network visibility for efficient Openstack operations
Network visibility for efficient Openstack operationsNetwork visibility for efficient Openstack operations
Network visibility for efficient Openstack operations
 
Predictive analytics and Visualization. Towards Data Driven Insights for Open...
Predictive analytics and Visualization. Towards Data Driven Insights for Open...Predictive analytics and Visualization. Towards Data Driven Insights for Open...
Predictive analytics and Visualization. Towards Data Driven Insights for Open...
 
Network Monitoring and Analytics
Network Monitoring and AnalyticsNetwork Monitoring and Analytics
Network Monitoring and Analytics
 
The Top 8 Challenges with Network Monitoring
The Top 8 Challenges with Network MonitoringThe Top 8 Challenges with Network Monitoring
The Top 8 Challenges with Network Monitoring
 
OpenStack Israel 2015 keynote
OpenStack Israel 2015 keynoteOpenStack Israel 2015 keynote
OpenStack Israel 2015 keynote
 

Similar to Storage visibility and Optimization. A Story of Ceph

Storage Visibility for Operations - A Ceph Story
Storage Visibility for Operations - A Ceph StoryStorage Visibility for Operations - A Ceph Story
Storage Visibility for Operations - A Ceph StoryDebojyoti Dutta
 
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...Debojyoti Dutta
 
Network Visibility For Openstack Operations
Network Visibility For Openstack OperationsNetwork Visibility For Openstack Operations
Network Visibility For Openstack OperationsDebojyoti Dutta
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldNetworkCollaborators
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyNetworkCollaborators
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...NetworkCollaborators
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4Nur Shiqim Chok
 
Cisco - Revamping and Standardizing Global Marketing and Sales Content
Cisco - Revamping and Standardizing Global Marketing and Sales ContentCisco - Revamping and Standardizing Global Marketing and Sales Content
Cisco - Revamping and Standardizing Global Marketing and Sales ContentCorporate Visions
 
Enterprise Lean-Agile: It’s More Than Scrum
Enterprise Lean-Agile: It’s More Than ScrumEnterprise Lean-Agile: It’s More Than Scrum
Enterprise Lean-Agile: It’s More Than ScrumTechWell
 
Smart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter OrganizationsSmart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter OrganizationsRick Huijbregts
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynoteNur Shiqim Chok
 
From Air Gap to Air Control
From Air Gap to Air ControlFrom Air Gap to Air Control
From Air Gap to Air ControlEnergySec
 
Internet of everything
Internet of everything Internet of everything
Internet of everything Jayesh Pai
 
Mfg workshop security
Mfg workshop   securityMfg workshop   security
Mfg workshop securityRobert Albach
 
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonCisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonIABC Houston
 
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonCisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonEmily Murphy
 
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...NetworkCollaborators
 

Similar to Storage visibility and Optimization. A Story of Ceph (20)

Storage Visibility for Operations - A Ceph Story
Storage Visibility for Operations - A Ceph StoryStorage Visibility for Operations - A Ceph Story
Storage Visibility for Operations - A Ceph Story
 
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
 
Network Visibility For Openstack Operations
Network Visibility For Openstack OperationsNetwork Visibility For Openstack Operations
Network Visibility For Openstack Operations
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
 
Corporate Visions Conference
Corporate Visions ConferenceCorporate Visions Conference
Corporate Visions Conference
 
Cisco - Revamping and Standardizing Global Marketing and Sales Content
Cisco - Revamping and Standardizing Global Marketing and Sales ContentCisco - Revamping and Standardizing Global Marketing and Sales Content
Cisco - Revamping and Standardizing Global Marketing and Sales Content
 
Enterprise Lean-Agile: It’s More Than Scrum
Enterprise Lean-Agile: It’s More Than ScrumEnterprise Lean-Agile: It’s More Than Scrum
Enterprise Lean-Agile: It’s More Than Scrum
 
Smart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter OrganizationsSmart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter Organizations
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynote
 
From Air Gap to Air Control
From Air Gap to Air ControlFrom Air Gap to Air Control
From Air Gap to Air Control
 
Internet of everything
Internet of everything Internet of everything
Internet of everything
 
Internet of everything
Internet of everything Internet of everything
Internet of everything
 
Mfg workshop security
Mfg workshop   securityMfg workshop   security
Mfg workshop security
 
Learn Without Limits in a Connected World
Learn Without Limits in a Connected WorldLearn Without Limits in a Connected World
Learn Without Limits in a Connected World
 
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonCisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
 
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonCisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
 
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

Storage visibility and Optimization. A Story of Ceph

  • 1. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. Storage Visibility and Optimization A Story of Ceph
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialCisco ConfidentialCisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. Cloud/Big-data Winnovation Team Alex Holden ajonasho@cisco.com Damian Van Vuuren dvanvuur@cisco.com Ailing Zhang ailzhang@cisco.com Marc Solanas msolanas@cisco.com Matt Weeks maweeks@cisco.com Pengfei Zhang penfzhan@cisco.com Kai Zhang kazhang2@cisco.com Xinyuan Huang xinyuahu@cisco.com Debo Dutta dedutta@cisco.com Yathiraj Udupi yudupi@cisco.com
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. Why do we need storage visibility?
  • 4. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential OpenStack Storage Openstack APIs Cinder ???? Swift Glance
  • 5. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The Storage Jungle
  • 6. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Why is visibility useful? Optimal object distribution Failure detection Make underlying configuration easier Performance tuning
  • 7. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Case Study: Ceph Source: http://ceph.com/docs/master/architecture/
  • 8. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Case Study: Ceph hash(“foo”) % 128 = 0x3f “bar’ = 2
  • 9. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Visibility in Ceph
  • 10. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The visibility we want in Ceph Visual monitoring Object distribution OSD real time status Visual management of crush rules
  • 11. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 12. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Ceph Horizon Panel Demo
  • 13. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. Use case: Identify bottlenecks
  • 14. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 15. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Optimization Rebalance storage nodes dynamically Preview changes (Future work) Change configuration automatically (Future work)
  • 16. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Conclusion Reduce downtime Increase storage performance Provide analytics and historical data More insights to follow!
  • 17. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Thank you. Please answer our survey online: