Author
Updated
14 May 2024Form Number
LP1937PDF size
17 pages, 157 KBAbstract
The ThinkSystem P5336 Read Intensive NVMe SSDs are general-purpose yet high-capacity drives with a PCIe 4.0 x4 interface. They are designed for greater performance and storage capcity in a cost-effective design, and to support a broader set of workloads. These drives offer SED encryption as standard to ensure data security, even when the drive is removed from the server.
This product guide introduces the drives and describes their features and specifications, and provides compatibility information. This guide is intended for technical specialists, sales specialists, sales engineers, IT architects, and other IT professionals who want to learn more about the P5336 SSDs and consider their use in IT solutions.
Change History
Changes in the May 14, 2024 update:
- Added the following drives:
- ThinkSystem 2.5" U.2 P5336 7.68TB Read Intensive NVMe PCIe 4.0 x4 HS SSD, 4XB7A95047
- ThinkSystem 2.5" U.2 P5336 15.36TB Read Intensive NVMe PCIe 4.0 x4 HS SSD, 4XB7A95048
Introduction
The ThinkSystem P5336 Read Intensive NVMe SSDs are general-purpose yet high-capacity drives with a PCIe 4.0 x4 interface. They are designed for greater performance and storage capcity in a cost-effective design, and to support a broader set of workloads. These drives offer SED encryption as standard to ensure data security, even when the drive is removed from the server.
The P5336 SSDs are based on Intel-developed controller and firmware. Rigorous qualification and compatibility testing by Lenovo ensures a highly reliable SSD.
SED support: All drives listed in this product guide include SED drive encryption. Our naming convention for new drives doesn’t include SED in the name.
Figure 1. ThinkSystem P5336 Read Intensive NVMe SSDs (without the ThinkSystem hot-swap tray)
Did You Know?
QLC (quad-level cell) is a high-capacity implementation of NAND flash memory technology. QLC means that 4 bits of data is stored in each memory cell which results in more cost-effective drives and larger drive capacities. The target workloads for QLC-based SSDs are sequential read-intensive workloads. For such workloads, QLC SSDs are an excellent cost-effective candidate for replacing 10K RPM HDDs.
Lenovo Read Intensive SSDs like the P5336 SSDs are suitable for read-intensive and general-purpose data center workloads, however their NVMe PCIe interface means the drives also offer high performance. Overall, these SSDs provide outstanding IOPS/watt and cost/IOPS for enterprise solutions.
Part number information
The following table lists the ordering part numbers and feature codes for the P5336 SSDs.
The part numbers for the drives include the following items:
- One drive with a hot-swap tray attached
- Publication package
Features
Non-Volatile Memory Express (NVMe) is PCIe high performance SSD technology that provides high I/O throughput and low latency. NVMe interfaces remove SAS/SATA bottlenecks and unleash all of the capabilities of contemporary NAND flash memory. Each NVMe PCI SSD has direct PCIe x4 connection, which provides at significantly greater bandwidth and lower latency than SATA/SAS-based SSD solutions. NVMe drives are also optimized for heavy multi-threaded workloads by using internal parallelism and many other improvements, such as enlarged I/O queues.
The P5336 SSDs have the following key characteristics:
- Based on the Solidigm D5-P5336 SSDs
- PCIe 4.0 connection for each NVMe drive
- Compliant with Trusted Computing Group Opal 2.01 Security Subsystem Class cryptographic standard (TCG Opal 2.01 SSC)
- Quad Level Cell QLC 3D NAND Flash Memory
- Available in capacities up to 61.44 TB
- Suitable for read-intensive workloads
- Variable sector size and end-to-end data-path protection
- Enhanced power-loss data protection
- Thermal throttling and monitoring
- SMART health reporting
- Supports the following specifications:
- PCI Express Base Specification Rev. 4.0
- NVM Express 2.0
- NVM Express Management Interface 1.2
The key metric for solid state drives is their endurance (life expectancy). SSDs have a huge, but finite, number of program/erase (P/E) cycles, which determines how long the drives can perform write operations and thus their life expectancy. Write Intensive SSDs have better endurance than Mixed Use SSDs, which in turn have better endurance than Read Intensive SSDs.
SSD write endurance is typically measured by the number of program/erase cycles that the drive can incur over its lifetime, which is listed as TBW in the device specification. The TBW value that is assigned to a solid-state device is the total bytes of written data that a drive can be guaranteed to complete. Reaching this limit does not cause the drive to immediately fail; the TBW simply denotes the maximum number of writes that can be guaranteed.
A solid-state device does not fail upon reaching the specified TBW, but at some point after surpassing the TBW value (and based on manufacturing variance margins), the drive reaches the end-of-life point, at which time the drive goes into read-only mode. Because of such behavior, careful planning must be done to use SSDs in the application environments to ensure that the TBW of the drive is not exceeded before the required life expectancy.
For example, the 30.72 TB P5336 drive has an endurance of 31,500 TB of total bytes written (TBW). This means that for full operation over five years, write workload must be limited to no more than 17,260 GB of writes per day, which is equivalent to 0.56 full drive writes per day (DWPD). For the device to last three years, the drive write workload must be limited to no more than 28,767 GB of writes per day, which is equivalent to 0.9 full drive writes per day.
The benefits of drive encryption
All ThinkSystem P5336 Read Intensive NVMe SSDs support drive encryption.
Self-encrypting drives (SEDs) provide benefits in three main ways:
- By encrypting data on-the-fly at the drive level with no performance impact
- By providing instant secure erasure (cryptographic erasure, thereby making the data no longer readable)
- By enabling auto-locking to secure active data if a drive is misplaced or stolen from a system while in use
The following sections describe the benefits in more details.
Automatic encryption
It is vital that a company keep its data secure. With the threat of data loss due to physical theft or improper inventory practices, it is important that the data be encrypted. However, challenges with performance, scalability, and complexity have led IT departments to push back against security policies that require the use of encryption. In addition, encryption has been viewed as risky by those unfamiliar with key management, a process for ensuring a company can always decrypt its own data. Self-encrypting drives comprehensively resolve these issues, making encryption both easy and affordable.
When the self-encrypting drive is in normal use, its owner need not maintain authentication keys (otherwise known as credentials or passwords) in order to access the data on the drive. The self-encrypting drive will encrypt data being written to the drive and decrypt data being read from it, all without requiring an authentication key from the owner.
Drive retirement and disposal
When hard drives are retired and moved outside the physically protected data center into the hands of others, the data on those drives is put at significant risk. IT departments retire drives for a variety of reasons, including:
- Returning drives for warranty, repair, or expired lease agreements
- Removal and disposal of drives
- Repurposing drives for other storage duties
Nearly all drives eventually leave the data center and their owner's control. Corporate data resides on such drives, and when most leave the data center, the data they contain is still readable. Even data that has been striped across many drives in a RAID array is vulnerable to data theft because just a typical single stripe in today’s high-capacity arrays is large enough to expose for example, hundreds of names and bank account numbers.
In an effort to avoid data breaches and the ensuing customer notifications required by data privacy laws, companies use different methods to erase the data on retired drives before they leave the premises and potentially fall into the wrong hands. Current retirement practices that are designed to make data unreadable rely on significant human involvement in the process, and are thus subject to both technical and human failure.
The drawbacks of today’s drive retirement practices include the following:
- Overwriting drive data is expensive, tying up valuable system resources for days. No notification of completion is generated by the drive, and overwriting won’t cover reallocated sectors, leaving that data exposed.
- Methods that include degaussing or physically shredding a drive are expensive. It is difficult to ensure the degauss strength is optimized for the drive type, potentially leaving readable data on the drive. Physically shredding the drive is environmentally hazardous, and neither practice allows the drive to be returned for warranty or expired lease.
- Some companies have concluded the only way to securely retire drives is to keep them in their control, storing them indefinitely in warehouses. But this is not truly secure because a large volume of drives coupled with human involvement inevitably leads to some drives being lost or stolen.
- Professional disposal services is an expensive option and includes the cost of reconciling the services as well as internal reports and auditing. Transporting of the drives also has the potential of putting the data at risk.
Self-encrypting drives eliminate the need to overwrite, destroy, or store retired drives. When the drive is to be retired, it can be cryptographically erased, a process that is nearly instantaneous regardless of the capacity of the drive.
Instant secure erase
The self-encrypting drive provides instant data encryption key destruction via cryptographic erasure. When it is time to retire or repurpose the drive, the owner sends a command to the drive to perform a cryptographic erasure. Cryptographic erasure simply replaces the encryption key inside the encrypted drive, making it impossible to ever decrypt the data encrypted with the deleted key.
Self-encrypting drives reduce IT operating expenses by reducing asset control challenges and disposal costs. Data security with self-encrypting drives helps ensure compliance with privacy regulations without hindering IT efficiency. So called "Safe Harbor" clauses in government regulations allow companies to not have to notify customers of occurrences of data theft if that data was encrypted and therefore unreadable.
Furthermore, self-encrypting drives simplify decommissioning and preserve hardware value for returns and repurposing by:
- Eliminating the need to overwrite or destroy the drive
- Securing warranty returns and expired lease returns
- Enabling drives to be repurposed securely
Auto-locking
Insider theft or misplacement is a growing concern for businesses of all sizes; in addition, managers of branch offices and small businesses without strong physical security face greater vulnerability to external theft. Self-encrypting drives include a feature called auto-lock mode to help secure active data against theft.
Using a self-encrypting drive when auto-lock mode is enabled simply requires securing the drive with an authentication key. When secured in this manner, the drive’s data encryption key is locked whenever the drive is powered down. In other words, the moment the self-encrypting drive is switched off or unplugged, it automatically locks down the drive’s data.
When the self-encrypting drive is then powered back on, it requires authentication before being able to unlock its encryption key and read any data on the drive, thus protecting against misplacement and theft.
While using self-encrypting drives just for the instant secure erase is an extremely efficient and effective means to help securely retire a drive, using self-encrypting drives in auto-lock mode provides even more advantages. From the moment the drive or system is removed from the data center (with or without authorization), the drive is locked. No advance thought or action is required from the data center administrator to protect the data. This helps prevent a breach should the drive be mishandled and helps secure the data against the threat of insider or outside theft.
Technical specifications
The following table present technical specifications for the P5336 SSDs. Note that the performance data and power consumption is based on a PCIe 4.0 host interface.
* Latency measured using 4 KB transfer size with queue depth = 1 on a random workload.
Server support
The following tables list the ThinkSystem servers that are compatible.
Storage controller support
NVMe PCIe SSDs require a NVMe drive backplane and some form of PCIe connection to processors. PCIe connections can take the form of either an adapter (PCIe Interposer or PCIe extender/switch adapter) or simply a cable that connects to an onboard NVMe connector.
PCIe 3.0 support: The P5336 SSDs offer a PCIe 4.0 host interface, however they are backward compatible with a PCIe 3.0 host interface. Note however that servers with a PCIe 3.0 host interface will not see the same performance levels (especially sequential read and write rates). Some ThinkSystem NVMe switch adapters also provide a PCIe 3.0 host interface to attached drives.
Consult the relevant server product guide for details about required components for NVMe drive support.
Operating system support
The P5336 SSDs support the following operating systems:
Tip: These tables are automatically generated based on data from Lenovo ServerProven.
VMware vSAN certification: The drives listed in this product guide are VMware vSAN certified, however in the VMware Compatibility Guide (VCG), they are listed under the drive vendor company name instead of Lenovo. To check a drive for vSAN certification, search the VCG using the Supplier part number as listed in Table 1 in the Part number information section.
IBM SKLM Key Management support
To effectively manage a large deployment of SEDs in Lenovo servers, IBM Security Key Lifecycle Manager (SKLM) offers a centralized key management solution. Certain Lenovo servers support Features on Demand (FoD) license upgrades that enable SKLM support.
The following table lists the part numbers and feature codes to enable SKLM support in the management processor of the server.
The IBM Security Key Lifecycle Manager software is available from Lenovo using the ordering information listed in the following table.
The following tables list the ThinkSystem servers that support the FoD upgrades for SKLM support.
Warranty
The P5336 SSDs carry a 1-year, customer-replaceable unit (CRU) limited warranty. When installed in a supported Lenovo server, these drives assume the system’s base warranty and any warranty upgrade.
Solid State Memory cells have an intrinsic, finite number of program/erase cycles that each cell can incur. As a result, each solid state device has a maximum amount of program/erase cycles to which it can be subjected. The warranty for Lenovo solid state drives (SSDs) is limited to drives that have not reached the maximum guaranteed number of program/erase cycles, as documented in the Official Published Specifications for the SSD product. A drive that reaches this limit may fail to operate according to its Specifications.
Physical specifications
The P5336 SSDs have the following physical dimensions and weight:
- Height: 15 mm (0.6 in.)
- Width: 70 mm (2.8 in.)
- Depth: 100 mm (4.0 in.)
- Weight: 146 g (5.15 oz)
Operating environment
The P5336 SSDs are supported in the following environment:
- Temperature
- Operational: 0 to 70 °C at 0 to 3,048 m (0 to 10,000 ft)
- Non-operating: -55 °C to 95 °C
- Relative humidity:
- Operating: 5 to 90% (non-condensing)
- Non-operating: 5 to 95% (non-condensing)
- Maximum altitude
- Operating: 3,048 m (10,000 ft)
- Non-operating: 12,192 m (40,000 ft)
- Shock:
- Operating: 1,000 G (Max) at 0.5 ms
- Non-operating: 1,000 G (Max) at 0.5 ms
- Vibration:
- Operating: 2.17 GRMS (5-700 Hz)
- Non-operating: 3.13 GRMS (5-800 Hz)
Agency approvals
The P5336 SSDs conform to the following regulations:
- FCC Title 47, Part 15B, Class B
- CA/CSA-CEI/IEC CISPR 22:02
- EN 55024: 1998
- EN 55022: 2006
- EN-60950-1 2nd Edition
- UL/CSA EN-60950-1 2nd Edition
- Low Voltage Directive 2006/95/EC
- C-Tick: AS/NZS3584
- BSMI: CNS 13438
- KCC Article 11.1
- RoHS DIRECTIVE 2011/65/EU
- WEEE Directive 2002/96/EC
Related publications and links
For more information, see the following documents:
- Storage Options for ThinkSystem Servers
https://lenovopress.com/lp0761-storage-options-for-thinksystem-servers - ServerProven
https://serverproven.lenovo.com/ - Solidigm D5-P5336 product page
https://www.solidigm.com/products/data-center/d5/p5336.html
Trademarks
Lenovo and the Lenovo logo are trademarks or registered trademarks of Lenovo in the United States, other countries, or both. A current list of Lenovo trademarks is available on the Web at https://www.lenovo.com/us/en/legal/copytrade/.
The following terms are trademarks of Lenovo in the United States, other countries, or both:
Lenovo®
ServerProven®
System x®
ThinkSystem®
The following terms are trademarks of other companies:
AMD is a trademark of Advanced Micro Devices, Inc.
Intel® and Xeon® are trademarks of Intel Corporation or its subsidiaries.
Linux® is the trademark of Linus Torvalds in the U.S. and other countries.
Microsoft®, Windows Server®, and Windows® are trademarks of Microsoft Corporation in the United States, other countries, or both.
Other company, product, or service names may be trademarks or service marks of others.
Configure and Buy
Full Change History
Changes in the May 14, 2024 update:
- Added the following drives:
- ThinkSystem 2.5" U.2 P5336 7.68TB Read Intensive NVMe PCIe 4.0 x4 HS SSD, 4XB7A95047
- ThinkSystem 2.5" U.2 P5336 15.36TB Read Intensive NVMe PCIe 4.0 x4 HS SSD, 4XB7A95048
First published: April 23, 2024
Course Detail
Employees Only Content
The content in this document with a is only visible to employees who are logged in. Logon using your Lenovo ITcode and password via Lenovo single-signon (SSO).
The author of the document has determined that this content is classified as Lenovo Internal and should not be normally be made available to people who are not employees or contractors. This includes partners, customers, and competitors. The reasons may vary and you should reach out to the authors of the document for clarification, if needed. Be cautious about sharing this content with others as it may contain sensitive information.
Any visitor to the Lenovo Press web site who is not logged on will not be able to see this employee-only content. This content is excluded from search engine indexes and will not appear in any search results.
For all users, including logged-in employees, this employee-only content does not appear in the PDF version of this document.
This functionality is cookie based. The web site will normally remember your login state between browser sessions, however, if you clear cookies at the end of a session or work in an Incognito/Private browser window, then you will need to log in each time.
If you have any questions about this feature of the Lenovo Press web, please email David Watts at dwatts@lenovo.com.