Value Storage is an economical way for researchers to store large amounts of data remotely. It is offered in terabyte increments (1,024 gigabytes), and is intended for use with large numbers of files and substantial data sets. It offers performance similar to a local disk without the burden of maintaining the drive locally. Value Storage offers flexibility, as you can upgrade the size of your share at any time. It also includes a disaster recovery component, where a snapshot of your data is taken every 24 hours for disaster recovery purposes. Snapshots are stored on another server and can be recovered in a disaster, though snapshots are not intended for restoring deleted files.
Value Storage Lite does not provide a disaster recovery option and is available at a significantly lower price. This solution is not intended for the preservation and analysis of critical research data. Customers are advised to create copies of their data sets using media of their choice. In case of data loss, ITS will not be able to provide assistance and cannot be considered responsible.
Replication is the form of disaster recovery that is built into the Value Storage service. The replication service takes a snapshot of your data every 24 hours. Snapshots are stored on another server and can be recovered in a disaster, but snapshots are not intended for restoring deleted files.
Value Storage is supported on the following operating systems:
See the support page for more information on system requirements and installation procedures.
Value Storage and Value Storage Lite are billed in monthly increments based on the number of terabytes ordered. A ShortCode is required to order the service. Please see the pricing page for the current rates for each service.
Value Storage is a good choice for data that, if disclosed to the general public, poses little or no risk to the University's reputation, resources, services or individuals.
Value Storage is not intended for data that is considered sensitive, private/confidential or critical to the operation of the university. Value Storage may be considered for such data when the customer environment is tightly managed according to the guidance provided below under "What steps can my IT staff take to improve security for my data in Value Storage."
For more information about data classification, see ITS's Safe Computing web site.
Configure all authorized Value Storage clients according to modern hardening guidelines and routinely update them with security fixes.
When ordering or modifying your access to Value Storage, provide only those IP addresses that are allocated to your authorized Value Storage client hosts.
Protect the client IP subnet and physical network from unauthorized access.
Ensure that users are instructed not to share their passwords with others.
Avoid using shared accounts, where multiple users log in with a single username/password.
Restrict the management and editing of password and group files (/etc/passwd, /etc/group) on client hosts to authorized system administrators only (not to users).
Tightly control and monitor root access on client hosts.
For more information on the security of the underlying protocol of Value Storage (NFSv3), see redhat.com's Securing NFS.
Network security always begins with the individual. Always keep passwords secure and never share it with anyone. Shared accounts (where multiple users share one account and password) should not be used. The following safeguards should be in place inside the local computing environment to protect availability and integrity of data, as well as to prevent IP spoofing:
When requesting Value Storage, the staff member submitting the order enters billing details, the desired size of the storage space, and a bit of setup information:
the IP addresses of all the machines that will connect to the share—this ensures that only designated machines will have access to the appropriate data
the name and University ID (UID) number of a person who will serve as primary administrator of the share and grant access to other users
Once the form has been submitted, the Value Storage team e-mails the requestor with information and instructions on how to mount the newly-created share.
The primary administrator (the person whose UID was submitted) then mounts the share on the designated machines and adds permissions to other users who need access (if necessary).
After this setup, the share will appear to users as a drive on their computer, and they will be able to save files to and retrieve them from their Value Storage space as if they were using a local disk.
Please see the Service Level Agreement for all the details about Value Storage.
Once you have completed your order for storage, you can make changes by modifying your request form with updated information. View your list of instances and update the appropriate form to include the updates.
In order to cancel your service, you will need to begin by removing all your files from your storage instance. After the files have been removed, modify your request form to reduce the number of terabytes to zero. View your list of instances and update the appropriate form to reflect this change. Once the request has been processed, the storage team will contact you with a notification that the instance has been deleted.
If you have other questions, see our Support/Help page.