Q

Should RAID 5 configurations include different disk volumes?

Steve Pinder at GlassHouse Technologies (UK) Ltd, answers this question from a SearchStorage.co.UK reader regarding RAID 5 configurations: I have a server with four drives and I want to install a RAID 5 configuration. Do I need to keep one disk at a different volume, not RAID 5, to run the OS?

Q. I have a server with four drives and I want to install a RAID 5 configuration. Do I need to keep one disk at a different volume, not RAID 5, to run the OS?

A. To get your preferred layout, you would need to create a 3+1 RAID 5 volume with three disks' worth of capacity available for storage and one disk's worth of capacity used for the parity calculations. Using a separate volume for the operating system (OS) is recommended for some servers, but this depends a lot on the workload of the application that will reside on the host.

In your situation, however, you're constrained by the number of drives available. I would never recommend creating an OS drive that has no resilience -- this would force you to use two of your available four drives for the OS in a mirrored (RAID 1) configuration. This would leave only two drives remaining for data, which would again need to be configured as RAID 1, leaving you unable to utilise your preferred RAID 5 configuration and having only ¼ of the available disk space for data.

My recommendation would be to create a 3+1 RAID 5 RAID group and then put the OS and data on this volume.

This was last published in June 2009

Read more on SAN, NAS, solid state, RAID

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close