beckmarkwith - Fotolia
If you are concerned about whether you need solid-state drives to ensure the best Ceph performance, you can rest assured that SATA is enough -- as long as your network is up to snuff, that is.
Inktank, the company that developed Ceph, has said that SATA disks are fast enough to enable good Ceph performance. You don't need solid-state drives (SSDs) for Ceph because the CRUSH algorithm -- which makes decisions about where to store data in the Ceph object store -- is built to ensure fast access to Ceph storage when many nodes work together. Indeed, the CRUSH algorithm helps deliver the binary objects that are stored in Ceph back to the clients as fast as possible, but the network speed must be sufficient. The minimum network speed is 10 Gigabit, but 40 Gigabit works much better.
In terms of Ceph's storage requirements, you can get the best performance from just a few large machines in your data center that are configured with many disks. But it is important to remember that the journal disk should be separate from object storage devices where the binary object storage takes place. A solid-state-drive-based journal is the fastest option for your journal disk.
The file system that object storage drives use also plays an important role in Ceph performance. It doesn't matter what file system you use because Ceph is file-system agnostic, but you will get the best Ceph performance results from the Btrfs file system. The XFS file system performs well, too, but you should avoid the Ext4 file system.
Tips on Cinder, Swift and other OpenStack storage
Comparing GlusterFS and Ceph
Red Hat's Gluster adds container support, performance enhancements
Dig Deeper on Cloud storage
Related Q&A from Sander van Vugt
Containers in the data center can help maximize server capacity, but there are a few things to consider before a Docker or Kubernetes implementation. Continue Reading
File management is an essential part of working within Linux. Knowing a few basic commands makes it easier to move content and avoid file ... Continue Reading
Linux has a security framework with multiple layers, which makes it hard to maintain permissions and privileges. User-based profiles and whitelisting... Continue Reading