RAID in Shared Hosting
The SSD drives which our cutting-edge cloud web hosting platform employs for storage function in RAID-Z. This sort of RAID is developed to work with the ZFS file system which runs on the platform and it works by using the so-called parity disk - a specific drive where information stored on the other drives is cloned with an additional bit added to it. If one of the disks fails, your sites shall continue working from the other ones and after we replace the problematic one, the information which will be copied on it will be recovered from what is stored on the rest of the drives along with the info from the parity disk. This is done so as to be able to recalculate the elements of every file correctly and to confirm the integrity of the information duplicated on the new drive. This is another level of security for the content that you upload to your shared hosting account in addition to the ZFS file system which analyzes a special digital fingerprint for every single file on all of the drives in real time.
RAID in Semi-dedicated Servers
The SSD drives which are used for holding any website content uploaded to the semi-dedicated server accounts that we offer function in RAID-Z. This is a special configuration where one or more disk drives are used for parity i.e. the system will add an additional bit to any data copied on this type of a hard drive. In the event that a disk fails and is substituted with a new one, what information will be copied on the latter will be a mix calculated between the data on the remaining drives and that on the parity one. This is done to make sure that the info on the new drive shall be accurate. Throughout the process, the RAID will continue functioning adequately and the faulty drive won't have an impact on the adequate operation of your sites in any way. Working with SSDs in RAID-Z is an impressive addition to the ZFS file system that runs on our advanced cloud platform with regard to preserving the integrity of your files as ZFS uses special digital identifiers called checksums so as to prevent silent data corruption.