Getting Started
Nominate for the IBM TechXchange Awards by 12 September!
IBM Spectrum Scale requires SSH configuration across it’s cluster for its management and administration. Each administration node must be able to run administration commands without the use of a password and without producing any extraneous messages. Also, most of the administration commands...
In IBM Spectrum Scale 5.0.5, fileset auditing and skip fileset auditing are available. You can choose up to 20 filesets to apply fileset auditing to, which means that file system activity is only audited if it occurs in the specified filesets. Or, you can choose up to 20 filesets to skip fileset...
Acknowledgement to co-creators: Sandeep Patil, Prayas Gupta, Chetan Kulkarni, Prashant Sodhiya, Carl Zetie and Wayne Sawdon. IBM Spectrum Scale is a high performance file and object storage with security features covering from authentication of data to authorization of data to secure data at...
As a user of IBM Spectrum Scale, we need to be aware of the security on our Spectrum Scale cluster. That’s where security posture steps in. It gives us a graphical representation of IBM Spectrum Scale cluster's security aspects in Kibana. This enables IBM Spectrum Scale administrators to quickly...
IBM Spectrum Scale HDFS Transparency implementation integrates both the NameNodes and the DataNodes services and responds to the request as if it were HDFS on IBM Spectrum Scale file system (GPFS). In HDFS, DataNodes contains the local disk for the file system and in order to scale the storage...
Acknowledgement: Thanks to Asmahan Ali , Kumaran Rajaram, & Carl Zetie for their inputs. In an organization there can be different workloads requiring different security posture. As an example, one of the workloads is a high performance computing workload dealing with non-sensitive data...
Today, Artificial Intelligence (AI) & Analytics are ubiquitous across industry verticals. Healthcare & Life Science is one such industry where AI and analytics are being used for everything from drug discovery and personalized precision medicine, to predicting hospital walk in patients...
Threats from cyber attacks are at an all time high. These threat agents can be external, as well as internal, to an organization. Since 'data' is the new oil, most of these attacks are to directed to the data. It is either to illegitimately gain access to the data or to maliciously corrupt the...
“ Data is the new oil ” Like oil has developed the world into a better place data perhaps holds similar potential and is already responsible for most valuable brands in the IT industry. These companies are collecting tremendous data from billions of users and analyzing it to make gadgets and...
2 Comments - no search term matches found in comments.
Ensuring data is secure over the wire as well as on the disk is now a days a common norm. IBM Spectrum Scale provides secure data at rest at filesystem level as well as in motion for it's interface protocols. NFS is one such protocol which allows secure data in motion leveraging Kerberos. When...