Miscellaneous Aspects and Concluding Remarks

It is expected that most users would configure the ioSafe 1513+ in RAID-5 for optimal balance of redundancy and capacity (reflected in ioSafe's decision to ship the units pre-configured with SHR 1-disk fault tolerance). Hence, we performed all our expansion / rebuild testing as well as power consumption evaluation with the unit configured in RAID-5. The disks used for benchmarking (Western Digital WD4000FYYZ) were also used in this section. The table below presents the average power consumption of the unit as well as time taken for various RAID-related activities.

ioSafe 1513+ RAID Expansion and Rebuild / Power Consumption
Activity Duration (HH:MM:SS) Avg. Power (W)
Single Disk Init - 37.9 W
JBOD to RAID-1 Migration 11:40:48 49.59 W
RAID-1 (2D) to RAID-5 (3D) Migration 38:34:47 59.46 W
RAID-5 (3D) to RAID-5 (4D) Expansion 31:33:19 69.95 W
RAID-5 (4D) to RAID-5 (5D) Expansion 33:46:59 81.31 W
RAID-5 (5D) Rebuild 22:57:12 78.89 W

One of the issues that we would like Synology to address is the RAID expansion / migration / rebuild durations. Though we don't have the full corresponding data from similar (read, 5-bay) competing units, the expansion durations with QNAP NAS units and rebuilds with the Seagate NAS units are much shorter compared to the ones in the table above.

Coming to the business end of the review, there are two different aspects of the ioSafe 1513+ to comment upon. The first relates to the software platform from Synology. DSM 5.0 is arguably one of the most full featured COTS NAS operating systems around. Its popularity is even reflected in the fact that specific viruses have been created for the platform (though it is also an indication of the security weaknesses that Synology has been actively patching in the recent past). The mobile apps and NAS packages extend the functionality of the appliance to provide a comprehensive private cloud experience. SMB features such as virtualization certifications / iSCSI support further enhance the appeal of the ioSafe 1513+ for enterprise users. All the plus points of the Synology 1513+ (including the performance, capacity expansion, high availability, hot-swappable fans etc.) translate as-is to the ioSafe 1513+.

The second is obviously related to the chassis design that makes the ioSafe 1513+ one of the most unique products that we have evaluated. ioSafe continues to impress us by scaling the disaster-proofing techniques to handle more and more complicated scenarios every year. The ioSafe 1513+ is an awesome piece of engineering aimed at solving the very relevant issue of protecting data from disasters. Fire protection is rated for 30 minutes at 1550°F (ASTM E-119) and the unit's drives are kept safe even in 10 ft. deep water for 3 days. ioSafe provides the option to purchase a Data Recovery Service (DRS) scheme along with the unit. The DRS period can be extended at a simple rate of $2.99/TB/month. The only points that consumers might complain about are the limited 'qualified hard disks' list, fan noise and the cost of the units. From our evaluation, we believe that the unit is best operated in an air-conditioned server room where fan noise should not be an issue. Some of the qualified hard disks are suitable for usage only at ambient temperatures lower than 30°C, but neither that nor the cost are likely to be factors for SMBs and SMEs that constitute the target market of the ioSafe 1513+.

DSM 5.0: Evaluating iSCSI Performance
Comments Locked

43 Comments

View All Comments

  • jmke - Wednesday, August 13, 2014 - link

    ioSafe is the 3rd party backup copy;
    1st onsite, 2nd offsite, 3rd copy on the ioSafe.

    with almost everything digital, the ioSafe is the equivalent of a... safe :) a high quality classic "fire and waterproof" safe will set you back ~$500-600. Add in the cost of the DS513+ and you get where the price comes from...

    if you can backup offsite reliably! then surely do, ioSafe offers an alternative solution, never bad to have other options :)
  • robb.moore - Thursday, August 14, 2014 - link

    Thx jmke. With this particular system (especially setup on HA), it's viable for many SMB's that the 1513+ be used as primary and maybe glacier or another offsite service be used for maybe a smaller set of tier1, hyper critical files. It's possibly the best of all worlds for RPO/RTO, cost, etc. And if a backhoe takes out your internet connection, you haven't lost all DR capabilities.
    Robb Moore, CEO
    ioSafe Inc.
  • Gonemad - Wednesday, August 13, 2014 - link

    Add some layers of kevlar, a spring-mounted cage, and a internal UPS that calls for 5-minutes safe shutdown. Bulletproof, explosion resistant, power outage resistant. Or shove it in a safe for good measure. I bet there is a market for it. If you change the drives to flash ones, you get even better explosion resistancy.
  • DanNeely - Wednesday, August 13, 2014 - link

    Where are the grill/swimming pool tests?
  • romrunning - Wednesday, August 13, 2014 - link

    Ganesh, did you check to see if this "disaster-resistant" Synology make-over is also "resistant" to SynoLocker (i.e., patched against it)? Someone encrypting all of my files would certainly qualify as a disaster to me! ;)
  • ganeshts - Wednesday, August 13, 2014 - link

    Our review unit came with DSM 5.0 installed, so that is immune to the SynoLocker exploit.

    That said, the lesson from the SynoLocker episode for me was that we might be better off not exposing the unit to the Internet at all. We might end up losing a lot of nice features of DSM, but I think it is worth the peace of mind. In addition, security vulnerabilities exist everywhere. Today, Synology has been exploited - tomorrow, it might be some other NAS vendor.

    I also suspect that the use-case for ioSafe 1513+-like devices involves storing of sensitive data - no IT admin in his right mind would leave ports open from such devices for access from an external network. It would probably be through a VPN or something similar.
  • romrunning - Wednesday, August 13, 2014 - link

    Sadly, I know of some "admins" who do not have the same regard for security. To them, it is just about reacting to the latest request, like "I want to access my files from home and everywhere else". They open it up, and then leave the default basic authentication as-is.

    From experience, I would wager the percentage of those types of admins are a bit higher than you might expect of such a position.
  • gizmo23 - Wednesday, August 13, 2014 - link

    LACP: I thought we moved on to 802.1X about 5 years ago
  • bobbozzo - Wednesday, August 13, 2014 - link

    Something this big would quickly bake if you had it running in a sealed safe.
  • jay401 - Friday, August 15, 2014 - link

    Is it also EMP proof? :)

Log in

Don't have an account? Sign up now