...
There are three types of inputs (Storage Characteristics, Data Protection, and Client Characteristics) required from the customer to determine hardware components. The outcome is displayed under the Results tab in the tabular format, which you can download in YAML if needed.
Storage Characteristics
...
Number of logical objects in millions
Average size of the object in MB
...
There are two types of data protection methods available in Swarm Configurator; you can apply one protection method at a time so choose an option accordingly.
Replication
Number of Replicas – Capacity is based on replicas; therefore, it is recommended to use less number of replicas. Having more replicas of a cluster requires more memory which results in less I/O capacity and makes the data access slower A number of copies of data to be maintained.
Erasure Coding
Data Segments – The A number of data blocks to store the fragmented datasegments created for each logical object.
Parity Segments – A calculated value to restore data from other drives. It is added to the end of each data block to verify the number of bits available in the block is odd or even.number of parity blocks for the given number of data blocks
Segment Size (MB) – The maximum size of each block in MegaBytessegment. The object gets split further if the segment size is more than the maximum size.
Client Characteristics
...
Number of concurrent clients – The number of clients concurrently connected to the storage for accessing data.
Write throughput per client Mbps – The rate at which the client writes in megabits megabytes per second.
Hardware Components
The inputs from the customer are optional for hardware components. If not provided, Swarm Configurator will calculate the required hardware components based on other inputs such as Storage Characteristics, Data Protection Requirements, and Client characteristics, and represent them into three different categories:
Storage Nodes
Elasticsearch
Gateway
...
Outcome
...
Swarm Configurator – Reverse functions opposite to Swarm Configurator wherein inputs for the data protection method and hardware requirements specifications are collected from the customer. Based on given inputs, this tool determines how much storage is neededavailable for the given hardware. It includes:
Logical capacity per node (TB)
Number of objects per node
...
Replication
Number of Replicas – It is recommended to make maximum two or three replicas for faster I/O capacity and less memory load A number of copies of data to be maintained.
Erasure Coding
Data Segments – The number of data blocks to store the fragmented data.
Parity Segments – An encoded value for each data block to ensure that the number of bits assigned to each data block is odd or even. The parity is added at the end of each data block.
Hardware
...
Specification
The input is following inputs are collected from the customer for the following hardware components:
...
Hard drive size in terabytes (TB).
Number of hard drives required for each node
Network speed in Gbps
Number of network ports for on each node
CPU cores required for core on each node (e.g., 32, 64, etc.)
Total RAM required for available on each node in GigaBytes (GB)
...