RAID in Shared Website Hosting
The SSD drives which our cutting-edge cloud Internet hosting platform employs for storage function in RAID-Z. This sort of RAID is created to work with the ZFS file system that runs on the platform and it works by using the so-called parity disk - a special drive where info located on the other drives is copied with an additional bit added to it. If one of the disks stops functioning, your Internet sites will continue working from the other ones and once we replace the problematic one, the information that will be cloned on it will be recovered from what is stored on the remaining drives together with the information from the parity disk. This is done so as to be able to recalculate the elements of every file correctly and to validate the integrity of the info cloned on the new drive. This is an additional level of security for the information which you upload to your shared website hosting account in addition to the ZFS file system that compares a special digital fingerprint for each file on all disk drives in real time.
RAID in Semi-dedicated Hosting
The SSD drives which are used for holding any content uploaded to the semi-dedicated hosting accounts which we offer function in RAID-Z. This is a specific setup where one or more disk drives are employed for parity i.e. the system will add an additional bit to any data copied on such a hard drive. In case that a disk fails and is substituted with a new one, what info will be cloned on the latter shall be a combination calculated between the data on the other hard disks and that on the parity one. This is done to ensure that the information on the new drive shall be correct. During the procedure, the RAID will continue working adequately and the faulty drive won't affect the adequate operation of your Internet sites at all. Using SSDs in RAID-Z is an excellent addition to the ZFS file system that runs on our cutting-edge cloud platform with respect to preserving the integrity of your files because ZFS uses special digital identifiers referred to as checksums in order to avoid silent data corruption.