{"id":8348,"date":"2014-03-28T06:51:43","date_gmt":"2014-03-28T04:51:43","guid":{"rendered":"\/?page_id=8348"},"modified":"2026-02-17T06:56:47","modified_gmt":"2026-02-17T04:56:47","slug":"shared-nothing-architecture-vs-shared-disk-architecture","status":"publish","type":"page","link":"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/shared-nothing-architecture-vs-shared-disk-architecture\/","title":{"rendered":"Shared Nothing vs. Shared Disk Architecture: Choosing the Best HA Cluster"},"content":{"rendered":"<div id=\"pl-8348\"  class=\"panel-layout\" ><div id=\"pg-8348-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-8348-0\" ><div id=\"pgc-8348-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-8348-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-8348-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h1 style=\"text-align: left; color: white; font-size: 38px;\">Shared Nothing vs. Shared Disk Architecture: Choosing the Best HA Cluster<\/h1>\n<h2 style=\"text-align: left; color: white; font-size: 26px;\">SafeKit SANless Clustering: Benefits of Shared Nothing Architecture over Shared Disk<\/h2>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-8348-1\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-8348-1\" ><div id=\"pgc-8348-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-8348-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div data-post-id=\"71458\" class=\"insert-page insert-page-71458 \"><div id=\"pl-71458\"  class=\"panel-layout\" ><div id=\"pg-71458-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-71458-0\" ><div id=\"pgc-71458-0-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-71458-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-71458-0-1-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-71458\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/contact-us-for-safekit\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\t\ud83e\uddd1 Contact us\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-71458-0-2\"  class=\"panel-grid-cell\" ><div id=\"panel-71458-0-2-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-71458\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/safekit-free-trial\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\t\ud83c\udf81 SafeKit free trial\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-71458-0-3\"  class=\"panel-grid-cell\" ><div id=\"panel-71458-0-3-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-71458\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/training.my.evidian.com\/mod\/page\/view.php?id=712\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\t\ud83c\udfc5 Free certification\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-71458-0-4\"  class=\"panel-grid-cell panel-grid-cell-mobile-last\" ><div id=\"panel-71458-0-4-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-71458\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/get-a-quote-safekit-en\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\t\ud83d\udcb0 Perpetual license cost\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-71458-0-5\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-8348-2\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-8348-2\" ><div id=\"pgc-8348-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-8348-2-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h2>Shared nothing architecture vs shared disk architecture for high availability clusters<\/h2>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-8348-3\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-8348-3\" ><div id=\"pgc-8348-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-8348-3-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3>Overview<\/h3>\n<p>This article explores the pros and cons of shared nothing architecture vs shared disk architecture for high availability clusters. We are looking at hardware constraints, impact on application data organization, recovery time, simplicity of implementation.<\/p>\n<p style=\"text-align:center;\"><img decoding=\"async\" src=\"https:\/\/www.evidian.com\/wp-content\/smush-webp\/2023\/02\/file-replication-vs-shared-disk.png.webp\" width=\"200\" alt=\"Shared nothing architecture vs shared disk architecture\"\/><\/p>\n<p>The following comparative tables explain in detail the difference between shared disk architecture and SafeKit, a software clustering product implementing a shared nothing architecture.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-8348-3-1\"  class=\"panel-grid-cell\" ><div id=\"panel-8348-3-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"4\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3>What is a shared disk architecture?<\/h3>\n<p>A shared disk architecture (like with <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/failover-clustering\/clustering-requirements\" target=\"_blank\" rel=\"noopener\">Microsoft failover cluster<\/a>) is based on 2 servers sharing a disk with an automatic application failover in case of hardware of software failures.<\/p>\n<p>This architecture has hardware constraints: the specific external shared storage, the specific cards to install inside the servers, and the specific switches between the servers and the shared storage.<\/p>\n<p>A shared disk architecture has a strong impact on the organization of application data. All application data must be localized in the shared disk for a restart after a failover.<\/p>\n<p>Moreover, on failover, the file system recovery procedure must be executed on the shared disk. This increases the recovery time (RTO).<\/p>\n<p>Finally, the solution is not easy to configure because skills are required to configure the specific hardware. Additionally, application skills are required to configure application data in the shared disk.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-8348-3-2\"  class=\"panel-grid-cell\" ><div id=\"panel-8348-3-2-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"5\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3>What is a shared nothing architecture ?<\/h3>\n<p>A shared nothing architecture (like with <a href=\"\/products\/high-availability-software-for-application-clustering\/\" rel=\"noopener\">SafeKit<\/a>) is based on 2 servers replicating data in real-time with an automatic application failover in case of hardware of software failures.<\/p>\n<p>There are two types of data replication: <a href=\"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/byte-level-file-replication-vs-block-level-disk-replication\/\">byte level file replication vs block level disk replication<\/a>. We consider here byte level file replication because it has many advantages against block level disk replication.<\/p>\n<p>The shared nothing architecture has no hardware constraints: the servers can be physical or virtual with any type of disk organization. Real-time file replication (<a href=\"\/products\/high-availability-software-for-application-clustering\/synchronous-replication-vs-asynchronous-replication\/\">synchronous<\/a> for having 0 data loss) is made through the standard network between servers.<\/p>\n<p>This architecture has no impact on application data organization. For instance, if an application has its data in the system disk, real-time file replication is working.<\/p>\n<p>Recovery time (RTO) in the event of a failover is reduced to the application restart time on the secondary server's replicated files.<\/p>\n<p>Finally, the solution is very simple to configure as only the paths of directories to replicate are configured.<\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-8348-4\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-8348-4\" ><div id=\"pgc-8348-4-0\"  class=\"panel-grid-cell\" ><div id=\"panel-8348-4-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"6\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h2>Pros and cons of shared nothing architecture vs shared disk architecture<\/h2>\n<table class=\"border vertical-middle horizontal-center\" style=\"margin-top: 30px;\" width=\"100%\">\n<tbody>\n<tr>\n<td width=\"50%\"><strong>Shared nothing architecture<\/strong><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.evidian.com\/wp-content\/smush-webp\/2023\/02\/synchronous-replication.png.webp\" alt=\"Shared nothing architecture\" width=\"200\" \/><\/td>\n<td width=\"50%\"><strong>Shared disk architecture<\/strong><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.evidian.com\/wp-content\/smush-webp\/2023\/03\/shared-disk-cluster-1.png.webp\" alt=\"Shared disk architecture\" width=\"200\" \/><\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\"><strong>Product<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a href=\"\/high-availability-software-for-application-clustering\/\">SafeKit on Windows and Linux<\/a><\/td>\n<td>Clustering toolkit for shared disk<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\"><strong>Extra hardware<\/strong><\/td>\n<\/tr>\n<tr>\n<td>No - Use internal disks of servers<\/td>\n<td>Yes - Extra cost with a shared bay of disks<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\"><strong>Application data organization<\/strong><\/td>\n<\/tr>\n<tr>\n<td>0 impact on application data organization with SafeKit.<\/p>\n<p><a href=\"\/products\/high-availability-software-for-application-clustering\/file-replication-byte-level-with-failover-mirror-cluster\/\">Just define directories to replicate in real-time<\/a>.<\/p>\n<p>Even directories inside the system disk can be replicated.<\/td>\n<td>Impact on application data organization.<\/p>\n<p>Special configuration of the application to put its data in a shared disk.<\/p>\n<p>Data in the system disk cannot be recovered.<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\"><strong>Complexity of deployment<\/strong><\/td>\n<\/tr>\n<tr>\n<td>No - install a software on 2 servers<\/td>\n<td>Yes - require specific IT skills to configure OS and shared disk<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\"><strong>Failover<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Just restart the application on the second server.<\/td>\n<td>Switch the shared disk.<\/p>\n<p>Remount the file system.<\/p>\n<p>Pass the recovery procedure on the file system.<\/p>\n<p>And then restart the application.<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\"><strong>Disaster revovery<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Just put the 2 servers in 2 remotes sites connected by an extended LAN.\n<\/td>\n<td>Extra cost with a second bay of disks.<\/p>\n<p>Specific IT skills to configure mirroring of bays across a SAN.\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\"><strong>Quorum and split brain<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Application executed on a single server after a network isolation (split brain).<\/p>\n<p>Coherency of data after a split brain.<\/p>\n<p>No need for a third machine or a quorum disk or a special heartbeat line for split brain.<\/p>\n<p><a href=\"\/products\/high-availability-software-for-application-clustering\/heartbeat-failover-quorum-windows-linux-aix-cluster\/\">More information on heartbeat, failover and quorum<\/a><\/td>\n<td>Require a special quorum disk or a third quorum server to avoid data corruption on split brain<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\"><strong>Suited for<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a href=\"\/products\/high-availability-software-for-application-clustering\/application-clustering-software\/\">Software editors which want to add a simple high availability option to their application<\/a><\/td>\n<td>Enterprise with IT skills in clustering and with large database applications<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-8348-5\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-8348-5\" ><div id=\"pgc-8348-5-0\"  class=\"panel-grid-cell\" ><div id=\"panel-8348-5-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"7\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h2><a name=\"step3\"><\/a>Video comparing a shared disk architecture and a shared nothing architecture when considering disaster recovery<\/h2>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-8348-6\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-8348-6\" ><div id=\"pgc-8348-6-0\"  class=\"panel-grid-cell\" ><div id=\"panel-8348-6-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"8\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3>Video content<\/h3>\n<p>This video first illustrates the work to be done with a shared disk architecture when the two servers of a high availability cluster must be placed on two remote sites.<\/p>\n<p>Next, the video demonstrates the same use case with the SafeKt shared nothing architecture.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-8348-6-1\"  class=\"panel-grid-cell\" ><div id=\"panel-8348-6-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"9\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"video-container\"><iframe src=\"https:\/\/www.youtube-nocookie.com\/embed\/vNMVhsYvGV0?rel=0&amp;vq=hd720&amp;wmode=transparent\" width=\"640\" height=\"360\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-8348-7\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-8348-7\" ><div id=\"pgc-8348-7-0\"  class=\"panel-grid-cell\" ><div id=\"panel-8348-7-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"10\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div data-post-id=\"246517\" class=\"insert-page insert-page-246517 \"><div id=\"pl-246517\"  class=\"panel-layout\" ><div id=\"pg-246517-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-246517-0\" ><div id=\"pgc-246517-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-246517-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<article>\n<header>\n<h2 id=\"hub\">\ud83d\udd0d SafeKit High Availability Navigation Hub<\/h2>\n<\/header>\n<div class=\"table-container-mobile\">\n<table class=\"border vertical-middle\">\n<caption>Explore SafeKit: Features, technical videos, documentation, and free trial<\/caption>\n<thead>\n<tr>\n<th scope=\"col\">Resource Type<\/th>\n<th scope=\"col\">Description<\/th>\n<th scope=\"col\">Direct Link<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<th scope=\"row\"><strong>Key Features<\/strong><\/th>\n<td>Why Choose SafeKit for Simple and Cost-Effective High Availability?<\/td>\n<td>\n        <a href=\"\/products\/high-availability-software-for-application-clustering\/#why-choose-safekit-for-ha\" title=\"Discover SafeKit features for simple and cost-effective high availability\">See Why Choose SafeKit for High Availability<\/a>\n    <\/td>\n<\/tr>\n<tr>\n<th scope=\"row\"><strong>Deployment Model<\/strong><\/th>\n<td>All-in-One SANless HA: Shared-Nothing Software Clustering<\/td>\n<td>\n        <a href=\"\/products\/high-availability-software-for-application-clustering\/#all-in-one-sanless-ha\" title=\"Learn about all-in-one SANless high availability with shared-nothing software clustering\">See SafeKit All-in-One SANless HA<\/a>\n    <\/td>\n<\/tr>\n<tr>\n<th scope=\"row\"><strong>Partners<\/strong><\/th>\n<td>SafeKit: The Benchmark in High Availability for Partners<\/td>\n<td><a title=\"Explore SafeKit high availability partnership opportunities and benchmark solutions\" href=\"\/products\/high-availability-software-for-application-clustering\/#safekit-ha-benchmark-for-partners\">See Why SafeKit Is the HA Benchmark for Partners<\/a><\/td>\n<\/tr>\n<tr>\n<th scope=\"row\"><strong>HA Strategies<\/strong><\/th>\n<td>SafeKit: Infrastructure (VM) vs. Application-Level High Availability<\/td>\n<td><a href=\"\/products\/high-availability-software-for-application-clustering\/#safekit-ha-redundancy-choices\" title=\"Compare VM-level redundancy with SafeKit application-level high availability strategies\">See SafeKit HA &amp; Redundancy: VM vs. Application Level<\/a>\n    <\/td>\n<\/tr>\n<tr>\n<th scope=\"row\"><strong>Technical Specifications<\/strong><\/th>\n<td>Technical Limitations for SafeKit Clustering<\/td>\n<td><a title=\"Technical requirements and limitations for SafeKit application clustering\" href=\"\/products\/high-availability-software-for-application-clustering\/#safekit-ha-limitations\">See SafeKit High Availability Limitations<\/a><\/td>\n<\/tr>\n<tr>\n<th scope=\"row\"><strong>Proof of Concept<\/strong><\/th>\n<td>SafeKit: High Availability Configuration &amp; Failover Demos<\/td>\n<td><a title=\"Step-by-step videos on SafeKit high availability, from installation to automated failover\" href=\"\/products\/high-availability-software-for-application-clustering\/#safekit-failover-tutorials\">See SafeKit Failover Tutorials<\/a><\/td>\n<\/tr>\n<tr>\n<th scope=\"row\"><strong>Architecture<\/strong><\/th>\n<td>How the SafeKit Mirror Cluster works (Real-Time Replication &amp; Failover)<\/td>\n<td><a title=\"See technical architecture and failover mechanism of SafeKit Mirror Cluster\" href=\"\/products\/high-availability-software-for-application-clustering\/#safekit-mirror-cluster\">See SafeKit Mirror Cluster: Real-Time Replication &amp; Failover<\/a><\/td>\n<\/tr>\n<tr>\n<th scope=\"row\"><strong>Architecture<\/strong><\/th>\n<td>How the SafeKit Farm Cluster works (Network Load Balancing & Failover)<\/td>\n<td>\n        <a href=\"\/products\/high-availability-software-for-application-clustering\/#safekit-farm-cluster\" title=\"Technical overview of SafeKit Farm Cluster architecture with network load balancing\">See SafeKit Farm Cluster: Network Load Balancing & Failover<\/a><\/td>\n<\/tr>\n<tr>\n<th scope=\"row\"><strong>Competitive Advantages<\/strong><\/th>\n<td>Comparison: SafeKit vs. Traditional High Availability (HA) Clusters<\/td>\n<td><a href=\"\/products\/high-availability-software-for-application-clustering\/#safekit-ha-comparison\" title=\"Detailed comparison of SafeKit software vs traditional hardware-based HA clusters\">See SafeKit vs. Traditional HA Cluster Comparison<\/a><\/td>\n<\/tr>\n<tr>\n<th scope=\"row\"><strong>Technical Resources<\/strong><\/th>\n<td>SafeKit High Availability: Documentation, Downloads &amp; Trial<\/td>\n<td><a href=\"\/products\/high-availability-software-for-application-clustering\/#safekit-ha-technical-resources\" title=\"Access SafeKit free trial, technical documentation, and high availability white papers\">See SafeKit HA Free Trial &amp; Technical Documentation<\/a><\/td>\n<\/tr>\n<tr>\n<th scope=\"row\"><strong>Pre-configured Solutions<\/strong><\/th>\n<td>SafeKit Application Module Library: Ready-to-Use HA Solutions<\/td>\n<td><a href=\"\/products\/high-availability-software-for-application-clustering\/#safekit-ha-application-modules\" title=\"Browse the library of pre-configured SafeKit modules for automated application failover\">See SafeKit High Availability Application Modules<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/article>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-8348-8\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-8348-8\" ><div id=\"pgc-8348-8-0\"  class=\"panel-grid-cell\" ><div id=\"panel-8348-8-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"11\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div data-post-id=\"71458\" class=\"insert-page insert-page-71458 \"><div id=\"pl-71458\"  class=\"panel-layout\" ><div id=\"pg-71458-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-71458-0\" ><div id=\"pgc-71458-0-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-71458-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-71458-0-1-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-71458\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/contact-us-for-safekit\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\t\ud83e\uddd1 Contact us\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-71458-0-2\"  class=\"panel-grid-cell\" ><div id=\"panel-71458-0-2-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-71458\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/safekit-free-trial\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\t\ud83c\udf81 SafeKit free trial\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-71458-0-3\"  class=\"panel-grid-cell\" ><div id=\"panel-71458-0-3-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-71458\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/training.my.evidian.com\/mod\/page\/view.php?id=712\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\t\ud83c\udfc5 Free certification\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-71458-0-4\"  class=\"panel-grid-cell panel-grid-cell-mobile-last\" ><div id=\"panel-71458-0-4-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-71458\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/get-a-quote-safekit-en\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\t\ud83d\udcb0 Perpetual license cost\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-71458-0-5\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"Shared Nothing vs. Shared Disk Architecture: Choosing the Best HA Cluster SafeKit SANless Clustering: Benefits of Shared Nothing Architecture over Shared Disk","protected":false},"author":3,"featured_media":0,"parent":4484,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-full-screen.php","meta":{"_acf_changed":false,"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"class_list":["post-8348","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Shared Nothing vs. Shared Disk Architecture: Choosing the Best HA Cluster - Evidian<\/title>\n<meta name=\"description\" content=\"Compare shared nothing vs. shared disk architectures for high availability. Learn how SafeKit uses a shared-nothing approach to eliminate SAN costs, simplify failover, and provide synchronous replication without complex hardware constraints.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/shared-nothing-architecture-vs-shared-disk-architecture\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shared Nothing vs. Shared Disk Architecture: Choosing the Best HA Cluster\" \/>\n<meta property=\"og:description\" content=\"Compare shared nothing vs. shared disk architectures for high availability. Learn how SafeKit uses a shared-nothing approach to eliminate SAN costs, simplify failover, and provide synchronous replication without complex hardware constraints.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/shared-nothing-architecture-vs-shared-disk-architecture\/\" \/>\n<meta property=\"og:site_name\" content=\"Evidian\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-17T04:56:47+00:00\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/products\\\/high-availability-software-for-application-clustering\\\/shared-nothing-architecture-vs-shared-disk-architecture\\\/\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/products\\\/high-availability-software-for-application-clustering\\\/shared-nothing-architecture-vs-shared-disk-architecture\\\/\",\"name\":\"Shared Nothing vs. Shared Disk Architecture: Choosing the Best HA Cluster - Evidian\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/products\\\/high-availability-software-for-application-clustering\\\/shared-nothing-architecture-vs-shared-disk-architecture\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/products\\\/high-availability-software-for-application-clustering\\\/shared-nothing-architecture-vs-shared-disk-architecture\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.evidian.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/file-replication-vs-shared-disk.png\",\"datePublished\":\"2014-03-28T04:51:43+00:00\",\"dateModified\":\"2026-02-17T04:56:47+00:00\",\"description\":\"Compare shared nothing vs. shared disk architectures for high availability. Learn how SafeKit uses a shared-nothing approach to eliminate SAN costs, simplify failover, and provide synchronous replication without complex hardware constraints.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/products\\\/high-availability-software-for-application-clustering\\\/shared-nothing-architecture-vs-shared-disk-architecture\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.evidian.com\\\/products\\\/high-availability-software-for-application-clustering\\\/shared-nothing-architecture-vs-shared-disk-architecture\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/products\\\/high-availability-software-for-application-clustering\\\/shared-nothing-architecture-vs-shared-disk-architecture\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/file-replication-vs-shared-disk.png\",\"contentUrl\":\"https:\\\/\\\/www.evidian.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/file-replication-vs-shared-disk.png\",\"width\":838,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/products\\\/high-availability-software-for-application-clustering\\\/shared-nothing-architecture-vs-shared-disk-architecture\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Evidian\",\"item\":\"https:\\\/\\\/www.evidian.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products\",\"item\":\"https:\\\/\\\/www.evidian.com\\\/products\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SafeKit: All-in-One SANless High Availability &amp; Application Clustering Software\",\"item\":\"https:\\\/\\\/www.evidian.com\\\/products\\\/high-availability-software-for-application-clustering\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Shared Nothing vs. Shared Disk Architecture: Choosing the Best HA Cluster\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/#website\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/\",\"name\":\"Evidian\",\"description\":\"The European Leader in Unified Identity, Access Management, and Business Continuity\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.evidian.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/#organization\",\"name\":\"Evidian\",\"alternateName\":\"Evidian\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/evidian-new-blue-1.png\",\"contentUrl\":\"https:\\\/\\\/www.evidian.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/evidian-new-blue-1.png\",\"width\":734,\"height\":200,\"caption\":\"Evidian\"},\"image\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/eviden-cybersecurity\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCJKPuw2SDVNYUjZEJyLbIAA\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Shared Nothing vs. Shared Disk Architecture: Choosing the Best HA Cluster - Evidian","description":"Compare shared nothing vs. shared disk architectures for high availability. Learn how SafeKit uses a shared-nothing approach to eliminate SAN costs, simplify failover, and provide synchronous replication without complex hardware constraints.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/shared-nothing-architecture-vs-shared-disk-architecture\/","og_locale":"en_US","og_type":"article","og_title":"Shared Nothing vs. Shared Disk Architecture: Choosing the Best HA Cluster","og_description":"Compare shared nothing vs. shared disk architectures for high availability. Learn how SafeKit uses a shared-nothing approach to eliminate SAN costs, simplify failover, and provide synchronous replication without complex hardware constraints.","og_url":"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/shared-nothing-architecture-vs-shared-disk-architecture\/","og_site_name":"Evidian","article_modified_time":"2026-02-17T04:56:47+00:00","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/shared-nothing-architecture-vs-shared-disk-architecture\/","url":"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/shared-nothing-architecture-vs-shared-disk-architecture\/","name":"Shared Nothing vs. Shared Disk Architecture: Choosing the Best HA Cluster - Evidian","isPartOf":{"@id":"https:\/\/www.evidian.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/shared-nothing-architecture-vs-shared-disk-architecture\/#primaryimage"},"image":{"@id":"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/shared-nothing-architecture-vs-shared-disk-architecture\/#primaryimage"},"thumbnailUrl":"https:\/\/www.evidian.com\/wp-content\/uploads\/2023\/02\/file-replication-vs-shared-disk.png","datePublished":"2014-03-28T04:51:43+00:00","dateModified":"2026-02-17T04:56:47+00:00","description":"Compare shared nothing vs. shared disk architectures for high availability. Learn how SafeKit uses a shared-nothing approach to eliminate SAN costs, simplify failover, and provide synchronous replication without complex hardware constraints.","breadcrumb":{"@id":"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/shared-nothing-architecture-vs-shared-disk-architecture\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/shared-nothing-architecture-vs-shared-disk-architecture\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/shared-nothing-architecture-vs-shared-disk-architecture\/#primaryimage","url":"https:\/\/www.evidian.com\/wp-content\/uploads\/2023\/02\/file-replication-vs-shared-disk.png","contentUrl":"https:\/\/www.evidian.com\/wp-content\/uploads\/2023\/02\/file-replication-vs-shared-disk.png","width":838,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/shared-nothing-architecture-vs-shared-disk-architecture\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Evidian","item":"https:\/\/www.evidian.com\/"},{"@type":"ListItem","position":2,"name":"Products","item":"https:\/\/www.evidian.com\/products\/"},{"@type":"ListItem","position":3,"name":"SafeKit: All-in-One SANless High Availability &amp; Application Clustering Software","item":"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/"},{"@type":"ListItem","position":4,"name":"Shared Nothing vs. Shared Disk Architecture: Choosing the Best HA Cluster"}]},{"@type":"WebSite","@id":"https:\/\/www.evidian.com\/#website","url":"https:\/\/www.evidian.com\/","name":"Evidian","description":"The European Leader in Unified Identity, Access Management, and Business Continuity","publisher":{"@id":"https:\/\/www.evidian.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.evidian.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.evidian.com\/#organization","name":"Evidian","alternateName":"Evidian","url":"https:\/\/www.evidian.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.evidian.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.evidian.com\/wp-content\/uploads\/2024\/01\/evidian-new-blue-1.png","contentUrl":"https:\/\/www.evidian.com\/wp-content\/uploads\/2024\/01\/evidian-new-blue-1.png","width":734,"height":200,"caption":"Evidian"},"image":{"@id":"https:\/\/www.evidian.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/showcase\/eviden-cybersecurity\/","https:\/\/www.youtube.com\/channel\/UCJKPuw2SDVNYUjZEJyLbIAA"]}]}},"_links":{"self":[{"href":"https:\/\/www.evidian.com\/wp-json\/wp\/v2\/pages\/8348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.evidian.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.evidian.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.evidian.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.evidian.com\/wp-json\/wp\/v2\/comments?post=8348"}],"version-history":[{"count":0,"href":"https:\/\/www.evidian.com\/wp-json\/wp\/v2\/pages\/8348\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.evidian.com\/wp-json\/wp\/v2\/pages\/4484"}],"wp:attachment":[{"href":"https:\/\/www.evidian.com\/wp-json\/wp\/v2\/media?parent=8348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}