Introduction to Swordfish: Scalable Storage Management
RecordedJan 24 201759 mins
Your place is confirmed, we'll send you email reminders
Rajalaxmi Angadi, Intel; Phil Cayton, Intel; Richelle Ahlvers, Broadcom
SNIA Swordfish is an extension of the DMTF Redfish specification to provide a unified approach for the management of storage and services in converged, hyperconverged, hyperscale, and cloud infrastructure environments. Swordfish uses a client-centric approach to develop the dynamic resource models as part of the specification, which describes client needs, management requirements, and use cases.
NVMe-oF currently support fabric transports like RDMA (iWarp, RoCE, IB), TCP, and FC. NVMe / NVMe-oF currently lacks efficient remote configuration and provisioning management mechanisms to enable NVMe-oF scaling to large converged infrastructures – something Redfish and Swordfish can provide.
The SNIA Swordfish specification is currently growing to include full NVMe and NVMe-oF enablement and alignment across DMTF, NVMe, and SNIA for NVMe and NVMe-oF use cases. SNIA members are contributing to specification development and helping to shape the ecosystem. This presentation will provide an overview of the work in progress to map these standards together to ensure NVMe and NVMe-oF environments can be represented entirely in Swordfish and Redfish environments.
Join us! We welcome your feedback, and encourage participation.
Pierre Mouallem, Lenovo; Ahmad Atamhl, Mellanox; Steve Vanderlinden, Lenovo
One of the most important aspects of security is how to protect the data that is just “sitting there.” How easy is it to get to? Who can get to it? If someone does get access to the data, can they read it? These are just a few of the questions that we try to answer when we go through the process of securing data.
Contrary to popular belief, however, securing “data at rest” is not simply encrypting the data. While it is true that data encryption plays a major role in securing “data at rest,” there are several other factors that come into play and are equally as important – if not more so.
For this webcast, we’re going to talk about those other factors (Encryption is deserving of its own, specific webcast). We will present the end-to-end process to securing “data at rest,” and discuss all the factors and trade-offs that must be considered, and some of the general risks that need to be mitigated, discussing:
• How requirements for “data at rest” differ from “data in flight”
• Understanding the costs of ransomware
• How to protect cryptographic keys from malicious actors
• Using key managers to properly manage cryptographic keys
• Strengths and weaknesses of relying on government security recommendations
• The importance of validating data backups... how stable is your media?
Research firm IDC projects that by the end of 2020, the world will generate 44 zettabytes (44 trillion gigabytes) of data per year. Data storage, therefore, is no longer simple, and in the age of cloud maturity and Digital Transformation, storage infrastructure strategies are shifting. With object stores having a very different set of characteristics than file and block storage, it can be confusing to know which is the right strategy that will keep up with an expanding digital universe.
Even small businesses struggle to manage the ever-growing pile of files stored on various networks and systems, so the challenges for enterprise companies can be hard to wrap your head around.
Join this panel of object, file and block storage experts as they discuss:
- The best way to manage unstructured data
- Are there deceptive costs in a file storage strategy?
- Use cases for object storage
Jim Fister, Director, SNIA Persistent Memory Software Enabling
SNIA’s Persistent Memory Hackathon Program enters its second year with 300+ developers up to speed on the latest in programming persistent memory -- and SNIA’s NVDIMM Programming Challenge just announced its first winner of distinction. Join our webcast to learn the latest developments in PM, new resources available to learn more about programming to PM, and a dive into the winning application introduced at the recent Persistent Memory Summit.
QUIC is a new UDP-based transport protocol for the Internet, and specifically, the web. Originally designed and deployed by Google, it already makes up 35% of Google's egress traffic, which corresponds to about 7% of all Internet traffic. The strong interest by many other large Internet players in the ongoing IETF standardization of QUIC is likely to lead to an even greater deployment in the near future. This webcast will highlight:
•Unique design aspects of QUIC
•Differences to the conventional HTTP/TLS/TCP web stack
•Early performance numbers
•Potential side effects of a broader deployment of QUIC
Glyn Bowden, HPE; James Myers, Intel; Alex McDonald, NetApp
Artificial intelligence (AI) and machine learning (ML) have been having quite the impact on most industries in the last couple of years, but what about our own IT industry? In this webcast find out how the rise of machine learning has created a new type of demand on IT operations teams as well as how those same teams can utilize new insights and capabilities driven by machine learning. We will explore:
•The demand on infrastructure
•Storage and data pipelines
•The growing field of IT operations leveraging AI (aka AIOps)
Mark Carlson, Kioxia; Rob Davis, Mellanox; John Kim, Mellanox; Ted Vojnovich, Lenovo
Several SSD and networking vendors have recentl¬y demonstrated ways to connect SSDs directly to an Ethernet network. They propose that deploying Ethernet SSDs will be more scalable, easier to manage, more performant, and/or lower cost than traditional storage networking solutions that use a storage controller (or hyperconverged node) between the SSDs and the network.
Who would want to attach SSDs directly to the network? Are these vendors brilliant or simply trying to solve a problem that doesn’t exist? What are the different solutions that could benefit from Ethernet SSDs? Which protocols would one use to access them? And how do Ethernet SSDs relate to computational storage? Join this SNIA Networking Storage Forum webcast to learn all this and more as SNIA experts discuss:
•What are the appropriate use cases for Ethernet SSDs?
•Why Ethernet SSDs could be appealing and more efficient
•How Ethernet SSDs compare to other forms of storage networking
•Different ways Ethernet SSDs can be accessed, such as JBOF/NBOF, NVMe-oF, and Key Value
•How do Ethernet-attached SSDs enable composable infrastructures?
Chris Evans, Architecting IT; Rick Vanover, Veeam; Alex McDonald, NetApp; John Kim, Mellanox
There are many types of storage technologies, both in how they are interconnected, consumed and designed. Object storage is no different in that it brings its own set of unique characteristics to the market. In this webinar, storage experts Rick Vanover and Chris Evans will explain:
•What object storage is and what it does
•How to use object storage
•Essential characteristics of typical consumption
•Why object storage is important to the future of storage and computing technologies
After you watch the webcast, check out the Q&A blog at https://bit.ly/2xa63fH
Since the initial publication of the National Institute of Standards and Technology (NIST) definition of cloud computing in 2011, international standards development organizations (SDOs) have sought to refine and expand the cloud computing landscape. This webinar will:
•Identify key published and draft cloud standards
•Discuss their interdependencies
•Highlight their importance
•Identify potential future work.
In addition, related technologies such as virtualization, federation, and fog/edge computing will be addressed. Lastly, the relevance of the standards will be explored to help organizations understand ways these documents can be exploited.
Jim Handy, Objective Analysis and Tom Coughlin, Coughlin Associates
Get prepared for SNIA’s Persistent Memory Summit with this webcast from Objective Analysis and Coughlin Associates. Following up on their 2018 groundbreaking report on emerging memories, Jim Handy and Tom Coughlin will update us on 2019 advances in support from SNIA, the launch of Optane memory on DIMMs, new MRAM types, and more. You won’t want to miss their analysis on the progress made, and their perspective on the groundwork that still needs to be covered to bring persistent memory to mainstream computing.
Jim Harris, Intel; Ben Walker, Intel, Tim Lustig, Mellanox
The Storage Performance Development Kit (SPDK) has gained industry-wide recognition as a framework for building highly performant and efficient storage software with a focus on NVMe. This includes software drivers and libraries for building NVMe-oF host and target solutions. In this presentation, technical leaders from SPDK will provide an overview of the project, NVMe-oF use cases that are best suited for SPDK, and insights into how SPDK achieves its storage networking performance and efficiency, discussing:
•Overview of the SPDK project
•Key NVMe-oF use cases for SPDK
•Examples of NVMe-oF use cases not suited for SPDK
•NVMe-oF Target Architecture and Design
•NVMe-oF Host Architecture and Design
After you watch the webcast, check out the Q&A blog at http://bit.ly/SPDKQA
Eric Hibbard, CISSP-ISSAP, ISSMP, ISSEP, CISA, CCSP; Steven W. Teppler, Esq.; Thomas Rivera, Chair, SNIA DPPC
Failing to protect sensitive information can put a lot of people at risk of being exploited by cybercriminals, and can make a company face enormous legal penalties.
The way information is shared and stored can put the information at risk.
It is risky to store personal information on portable devices, which are easily lost or stolen.
In addition, the consequences of a data breach can be devastating. Identity theft could lead to financial losses, and a company could face lawsuits and legal penalties.
This presentation will cover what kinds of personal information must be protected & guidelines for keeping this info safe.
After viewing this session, attendees should:
1. Understand how Privacy is defined
2. Highlight some of the Privacy regulations from around the globe
3. Understand what information to safeguard
4. Understand how these privacy regulations affect organizations that handle personal information
Ross Stenfort, Facebook; Lee Prewitt Microsoft; J Metz, Cisco
What do Hyperscalers like Facebook and Microsoft have in common? They are cloud market leaders using NVMe SSDs in their architectures. Get a close up look into their application requirements and challenges, why they chose NVMe flash for their storage, and how they are successfully deploying NVMe to fuel their businesses.
After you watch the webcast, check out the Q&A blog at http://bit.ly/2DCNhgX
Ted Vojnovich, Lenovo; Fred Bower, Lenovo; Tim Lustig, Mellanox
Software defined storage, or SDS, is growing in popularity in both cloud and enterprise accounts. But what makes it different from traditional storage arrays? Does it really save money? Is it more complicated to support? Is it more scalable or higher-performing? And does it have different networking requirements than traditional storage appliances?
Watch this SNIA webcast to learn:
•How software-defined storage differs from integrated storage appliances
•Whether SDS supports block, file, object, or all three types of storage access
•Potential issues or pitfalls with deploying SDS
•How SDS affects storage networking
•Scale-up vs. scale-out vs. hyperconverged vs. cloud
After you watch the webcast, check out the Q&A blog http://bit.ly/SDS-Q-A
Pierre Mouallem, Lenovo; John Kim, Mellanox; J Metz, Cisco; Steve Vanderlinden, Lenovo
What does it mean to be protected and safe? You need the right people and the right technology. This presentation is going to go into the broad introduction of security principles in general. This will include some of the main aspects of security, including defining the terms that you must know, if you hope to have a good grasp of what makes something secure or not. We’ll be talking about the scope of security, including threats, vulnerabilities, and attacks – and what that means in real storage terms. In this live webcast we will cover:
•Protecting the data (Keeping “the bad” out)
•Threat landscape, Bad actors/hackers
•Attack vectors, attack surfaces, vulnerabilities
•Physical security issues
•Layers of protection (encryption – last line of defense)
•Remediation after a breach/incident
After you watch the webcast, check out the Q&A blog: http://bit.ly/2JQ1s5L
Ingo Fuchs, NetApp; Paul Burt, NetApp, Mike Jochimsen, Kaminario
Kubernetes is great for running stateless workloads, like web servers. It’ll run health checks, restart containers when they crash, and do all sorts of other wonderful things. So, what about stateful workloads?
This webcast will take a look at when it’s appropriate to run a stateful workload in cluster, or out. We’ll discuss the best options for running a workload like a database on the cloud, or in the cluster, and what’s needed to set that up.
•Running a database on a VM and connecting it to Kubernetes as a service
•Running a database in Kubernetes using a `stateful set`
•Running a database in Kubernetes using an Operator
•Running a database on a cloud managed service
After you watch the webcast, check out our Kubernetes Links & Resources blog at http://bit.ly/KubeLinks and our webcast Q&A blog at http://bit.ly/KubeQuestions
Alex McDonald, Vice-Chair SNIA EMEA, and Office of the CTO, NetApp; Paul Talbut, General Manager, SNIA EMEA
The SNIA EMEA Storage Developer Conference (SDC) will return to Tel Aviv in early February 2020.
SDC EMEA is organised by SNIA, the non-profit industry association responsible for data storage standards and education, and the conference is designed to provide an open and independent platform for technical education and knowledge sharing amongst the local storage development community.
SDC is built by developers – for developers.
This session will offer a preview of what is planned for the 2020 agenda ahead of the call for presentations and will also give potential sponsors the information they need to be able to budget for their participation in the event. If you have attended previously as a delegate, this is a great opportunity to learn more about how you can raise your profile as a speaker or get your company involved as a sponsor. There will be time allocated during the webcast to ask questions about the options available. Companies who have significant storage development teams will learn why this conference is valuable to the local technical community and why they should be directly engaged.
Michelle Tidwell, Program Director, IBM; Tom Clark, Distinguished Engineer, IBM; Matt Levan, Storage Solutions Architect, IBM
As enterprises move to a hybrid multi-cloud world, they are faced with many challenges. Decisions surrounding what technologies to use is one, but they are also seeing a transformation in traditional IT roles. The storage admins are asked to be more cloud savvy while new roles of cloud admins are emerging to handle the complexities of deploying simple and efficient clouds. Meanwhile, both these roles are asked to ensure a self-service environment is architected so that application developers can get resources needed to develop cutting edge apps not in weeks, days or hours, but in minutes.
In part one of this three part series, we covered the high level aspects of Kubernetes. This presentation will discuss key capabilities IT vendors are creating based on open source technologies such as Docker and Kubernetes to build self-service infrastructure to support hybrid multi-cloud deployments.We’ll cover:
•Persistent storage and how to specify it
•Ensuring application portability between Private and Public Clouds
•Building a self-service infrastructure (Helm, Operators)
•Selecting Block, File, Object (Traditional Storage, SDS)
After you watch the webcast, check out the Q&A blog here: http://bit.ly/2M3IVpm
Eden KIm, CEO, Calypso Systems; Jim Fister, SNIA Solid State Storage Initiative
Real-world digital workloads often behave very differently from what might be expected. The equipment used in a computing system may function differently than anticipated. Unknown quirks in complicated software and operations running alongside the workload may be doing more or less than the user initially supposed. To truly understand what is happening, the right approach is to test and monitor the systems’ behaviors as real code is executed. By using measured data designers, vendors and service personnel can pinpoint the actual limits and bottlenecks that a particular workload is experiencing. Join the SNIA Solid State Storage Special Interest Group to learn how to be a part of the real-world workload revolution
Swordfish School: Introduction to SNIA Swordfish™ Features and Profiles
Ready to ride the wave to what’s next in storage management? As a part of an ongoing series of educational materials to help speed your SNIA Swordfish™ implementation in this Swordfish School webcast, Storage standards expert Richelle Ahlvers (Broadcom Inc.) will provide an introduction to the Features and Profiles concepts, describe how they work together, and talk about how to use both Features and Profiles when implementing Swordfish.
Features are used by implementations to advertise to clients what functionality they are able to support. Profiles are detailed descriptions that describe down to the individual property level what functionality is required for implementations to advertise Features. The Profiles are used for in-depth analysis during development, making it easy for clients to determine which Features to require for different configurations. They are also used to determine certification / conformance requirements.
About SNIA Swordfish™
Designed with IT administrators and DevOps engineers in mind to provide simplified and scalable storage management for data center environments, SNIA Swordfish™ is a standard that defines the management of data storage and services as an extension to the Distributed Management Task Force’s (DMTF) Redfish application programming interface specification. Unlike proprietary interfaces, Swordfish is open and easy-to-adopt with broad industry support.
Your one stop shop for everything SNIA Swordfish is https://www.snia.org/swordfish.
The Storage Networking Industry Association (SNIA) is a non-profit organization made up of member companies spanning information technology. A globally recognized and trusted authority, SNIA’s mission is to lead the storage industry in developing and promoting vendor-neutral architectures, standards and educational services that facilitate the efficient management, movement and security of information.