RAID in Shared Web Hosting
The SSD drives that our cutting-edge cloud hosting platform uses for storage function in RAID-Z. This type of RAID is developed to work with the ZFS file system that runs on the platform and it uses the so-called parity disk - a special drive where data located on the other drives is duplicated with an extra bit added to it. In case one of the disks stops functioning, your sites shall continue working from the other ones and as soon as we replace the malfunctioning one, the info that will be duplicated on it will be rebuilt from what is stored on the rest of the drives together with the data from the parity disk. This is done in order to be able to recalculate the elements of every single file properly and to verify the integrity of the data duplicated on the new drive. This is one more level of security for the info that you upload to your shared web hosting account in addition to the ZFS file system that compares a special digital fingerprint for each file on all the hard drives in real time.
RAID in Semi-dedicated Hosting
The information uploaded to any semi-dedicated hosting account is saved on SSD drives which work in RAID-Z. One of the drives in type of a configuration is used for parity - each time data is cloned on it, an additional bit is added. If a disk turns out to be faulty, it will be taken out of the RAID without interrupting the operation of the websites because the data will load from the remaining drives, and when a brand new drive is included, the information which will be copied on it will be a mix between the information on the parity disk and data stored on the other hard drives in the RAID. That is done to ensure that the info which is being cloned is correct, so as soon as the new drive is rebuilt, it could be included in the RAID as a production one. This is one more guarantee for the integrity of your data since the ZFS file system that runs on our cloud hosting platform analyzes a unique checksum of all copies of the files on the separate drives to be able to avoid any chance of silent data corruption.