Subscribe Now
Trending News

Blog Post



Ceph is defined as open-source software for storage solutions designed for modern enterprises to store files and objects. It makes it possible to decouple data from physical storage hardware with the help of software abstraction layers, providing fault management capabilities. Moreover, due to its abilities, ceph has been considered ideal for container-based and micro-service workloads such as the cloud since it effectively addresses significant data volume storage needs.
Ceph is a highly scalable architecture, now considered a new norm for object stores and block storage. Another benefit is that it interfaces multiple storage types into a single cluster. Also, it will eliminate the need for multi-storage solutions, eventually reducing the management overheads.

Some of the features of ceph are:

  • It will provide provisioning of blog storage for disk usage optimization.
  • This Provides replication coding for data protection.
    So it will entirely or partially read and write atomic transactions.
  • It will store data as objects within logical storage pools. This can have multiple pools, each with different performance and uses. These pools are divided into groups to scale and handle recovery and rebalancing.
  • Moreover, it is also used for private cloud infrastructure for big data analytics to public cloud storage. It provides access to block storage by mounting the Ceph cluster.

A Ceph Storage Cluster consists of different types of Daemons:

  • Object Storage Devices: It will store the data in the ceph cluster. Apart from this, it also helps in replicating, recovering, coding, and rebalancing data. It is considered as a piece of a CPU or underlying HDD.
  • Metadata Servers: This server stores the directories and ceph file system metadata. Therefore, it also enables using POSIX semantics to access the stored files.
  • Cluster Monitors: They maintain the structure of the cluster state that will keep track of the cluster nodes, cluster configuration, data placement information, and manage authentication.

Related posts