Red Hat 계정으로 회원 프로필, 기본 설정 및 고객 상태에 따라 다음의 서비스에 액세스할 수 있습니다.
아직 등록하지 않으셨습니까? 등록해야 하는 이유:
- 한 곳에서 기술 자료 문서를 탐색하고, 지원 사례와 서브스크립션을 관리하고, 업데이트를 다운로드 할 수 있습니다.
- 조직 내의 사용자를 보고, 계정 정보, 기본 설정 및 권한을 편집할 수 있습니다.
- Red Hat 자격증을 관리하고 시험 내역을 조회하며 자격증 관련 로고 및 문서를 다운로드할 수 있습니다.
Red Hat 계정으로 회원 프로필, 기본 설정 및 자신의 고객 상태에 따른 기타 서비스에 액세스할 수 있습니다.
보안을 위해, 공용 컴퓨터 사용 중에 Red Hat 서비스 이용이 끝난 경우 로그아웃하는 것을 잊지 마십시오.로그아웃
Congratulations to the Gluster Community! In addition to shipping GlusterFS 3.4, the latest release of the open source, scale-out storage system, the Gluster Community has significantly increased its number of projects and contributing developers in just three short months. Since May 2013, the Gluster Community has grown from seven projects for the GlusterFS distribution to more than 30 incubating open software-defined storage projects for big data, demonstrating nearly 300 percent growth in the number of developers.
As an open source community, the Gluster Community was created to drive open software-defined storage. The growth was enabled in part by recent important developments in the Gluster Community, including the introduction of Gluster Community Forge and the formation of The Gluster Community Board that includes eight leading organizations and technology providers in the storage and big data markets. The Gluster Community Forge is a collaborative development web site where like-minded developers and organizations can incubate, develop and collaborate on new open software-defined storage projects. The Gluster Community Forge also helps developers in individual projects independently manage their roadmaps, development, and implementation.
Now available for download, GlusterFS 3.4 offers KVM/QEMU integration, higher performance, and cloud enhancements to provide high reliability, scalability, and data mobility to enterprise users and application developers worldwide.
For virtualization, GlusterFS 3.4 features include QEMU integration with libgfapi, a new Block Device translator, and general performance enhancements for VM image storage for KVM. A new virtualization management user interface, oVirt 3.2, is available with its RESTful API gateway for integration with additional management tools.
For security, GlusterFS 3.4 now supports Server Quorum, SSL encryption, and a multi-threaded Glusterd that also added operating version support. Quorum enables split-brain prevention and resolution for replicated volumes. Security features include support for SSL-based encryption of "in-flight" data, and NFSv3 ACLs, WORM (write once, read many) volume types. The multi-threaded Glusterd allows for better scaling and higher performance, and operating version support for Glusterd enables easier, rolling upgrades and using multiple versions of GlusterFS.
The Gluster Community also recently announced that GlusterFS is OpenStack-ready. This is primarily due to the work started in 2012 with the OpenStack community focused on how OpenStack cloud developers and operators can use GlusterFS to support the three primary OpenStack storage modes. Instructions for using GlusterFS with OpenStack are now documented for the native OpenStack storage interfaces Swift, Cinder, and Glance. This allows OpenStack application developers and service providers to gain the benefits of Gluster's scale-out storage software.
Its an exciting time for the Gluster Community. Again, kudos to the Gluster Community for shipping GlusterFS 3.4 while it greatly expands its project scope, allowing participants to continue to drive open source sofware-defined storage innovation.
Here's how you can get more background:
- For more information on the Gluster Community, visit www.gluster.org
- To download GlusterFS 3.4, visit download.gluster.org.
- To download GlusterFS 3.4 release notes, visit github.com/gluster/
- To interact with The Gluster Community on Twitter, follow @GlusterOrg.
The OpenStack™ Word Mark and OpenStack Logo are either registered trademarks / service marks or trademarks / service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation or the OpenStack community.