Cluster Arch
+ Cluster architectureAccess Tier
- Swift Cluster Architecture
+ Object Storage cluster architecture
@@ -24,33 +24,33 @@
moves data in and out of the system. This tier is composed
of front-end load balancers, ssl- terminators,
authentication services, and it runs the (distributed)
- brain of the object storage system — the proxy server
+ brain of the Object Storage system — the proxy server
processes.
Having the access servers in their own tier enables
read/write access to be scaled out independently of
storage capacity. For example, if the cluster is on the
- public Internet and requires ssl-termination and has high
+ public Internet and requires SSL-termination and has high
demand for data access, many access servers can be
provisioned. However, if the cluster is on a private
network and it is being used primarily for archival
purposes, fewer access servers are needed.
- As this is an HTTP addressable storage service, a load
- balancer can be incorporated into the access tier.
+ A load balancer can be incorporated into the access tier,
+ because this is an HTTP addressable storage service.Typically, this tier comprises a collection of 1U
servers. These machines use a moderate amount of RAM and
- are network I/O intensive. As these systems field each
- incoming API request, it is wise to provision them with
- two high-throughput (10GbE) interfaces. One interface is
+ are network I/O intensive. It is wise to provision them with
+ two high-throughput (10GbE) interfaces, because these systems
+ field each incoming API request. One interface is
used for 'front-end' incoming requests and the other for
- 'back-end' access to the object storage nodes to put and
+ 'back-end' access to the Object Storage nodes to put and
fetch data.
- Factors to Consider
+ Factors to considerFor most publicly facing deployments as well as
private deployments available across a wide-reaching
- corporate network, SSL will be used to encrypt traffic
+ corporate network, SSL is used to encrypt traffic
to the client. SSL adds significant processing load to
- establish sessions between clients; more capacity in
- the access layer will need to be provisioned. SSL may
+ establish sessions between clients; it adds more capacity to
+ the access layer that will need to be provisioned. SSL may
not be required for private deployments on trusted
networks.Storage Nodes
@@ -63,14 +63,14 @@
The next component is the storage servers themselves.
- Generally, most configurations should have each of the
+ Generally, most configurations should provide each of the
five Zones with an equal amount of storage capacity.
Storage nodes use a reasonable amount of memory and CPU.
Metadata needs to be readily available to quickly return
objects. The object stores run services not only to field
incoming requests from the Access Tier, but to also run
replicators, auditors, and reapers. Object stores can be
- provisioned with single gigabit or 10 gigabit network
+ provisioned with a single gigabit or a 10-gigabit network
interface depending on expected workload and desired
performance.Currently, a 2 TB or 3 TB SATA disk delivers