Data Block Checksum at Hard Disk Level
Deal with silent data corruption through data checksum.
Data Protection at Node Level and Automatic Data Recovery
Data protection is performed among nodes through a multi-replica or erasure coding mechanism; when a component or a node fails, the available space is automatically used, and concurrent data recovery starts among multiple nodes, ensuring that the data redundancy always meets expectations.
Protection at Rack Level
Through rack topology configuration, data is automatically placed on different racks to prevent the cluster from being inaccessible caused by power outage or failure of a single rack, further improving the storage reliability.
High Availability Mechanism for Access Services
Ensures service continuity using mechanisms like iSCSI VIP, NVMe-oF multipathing, and file access IP drift for high availability of access services.
Snapshot Protection
By generating a snapshot for the storage, the data can be quickly restored to the state at the time when the snapshot was taken, ensuring data security.
Cross-Site Active-Active Clustering
Along with high availability configuration at the client, the stretched active-active cluster guarantees zero RPO and near-zero RTO, providing application availability during disasters.
Intelligent Recovery Policy of Business-First
On the premise of ensuring business I/O, adaptively adjust the speed of recovery or migration according to the system load.
Agile Recovery Mechanism
During node upgrade or maintenance, the expected loss of replicas will not trigger data recovery, and the write requests during the offline period of the replicas will complete data recovery with a smaller granularity after the node is restored.
Abnormal Disk Detection and Isolation
Automatically detects and isolates unhealthy, failing or low-life disks to reduce the impact on system performance and operations and maintenance.
Network Fail-Slow Detection and Isolation
Automatically and regularly checks storage and access networks and immediately isolates abnormal nodes and NICs to reduce the impact on system performance.