SlideShare a Scribd company logo
1 of 17
Download to read offline
Performing Non-Disruptive
Data Migration with Intelligent
File Virtualization
Data migrations are a common occurrence for many
organizations as they manage growing amounts of file
data. Intelligent file virtualization is an elegant solution
that reduces the disruption, operational overhead, and
risk inherent with any type of data migration project.
by Renny Shen
Product Marketing Manager
White Paper
2
White Paper
Performing Non-Disruptive Data Migration with Intelligent File Virtualization
Contents
Introduction	3
The Foundation: Intelligent File Virtualization	 3
How It Works	 3
Deploying File Virtualization	 5
Non-Disruptive Data Migration with ARX	 6
How It Works	 6
Creating a Migration Policy	 8
Classifying the Data	 8
Types of Migrations	 9
Setting the Schedule	 11
Advantages of the F5 Approach	 12
Traditional Approaches	 12
Advantages of ARX	 15
Conclusion	17
3
White Paper
Performing Non-Disruptive Data Migration with Intelligent File Virtualization
Introduction
Data migrations are a fact of life for enterprise IT organizations. The term data
migration refers to any movement of data; there are many types of migrations,
ranging from small, frequent events to large, one-time projects. Organizations plan
migrations for a number of reasons, such as to re-provision storage capacity or to
transition between storage systems. Regardless of the size or reason, every migration
event has the potential to disrupt user access and cause business downtime.
This disruption carries a real and measurable cost to business, including reduced user
productivity and lost revenue. It imposes an operational overhead on IT staff, who
must perform more upfront planning, negotiate acceptable downtime windows
with users, reconfigure affected client systems, and correct any errors that arise over
the course of the migration. And because the amount of business data continues to
grow exponentially, the need to migrate that data—and the associated business
costs and IT overhead—will only increase over time.
F5®
ARX®
intelligent file virtualization enables organizations to migrate file data in
a non-disruptive manner. By virtualizing the file storage environment, ARX devices
decouple the logical access to files from their physical locations on storage, allowing
files to be moved between heterogeneous file storage resources without disrupting
access or requiring business downtime. This reduces the amount of time, the
overhead for IT staff, and the costs associated with any data migration.
The Foundation: Intelligent File
Virtualization
Intelligent file virtualization provides the layer in the network that decouples
the logical access to files from their physical locations. With this layer in place,
administrators can move data and change storage resources without the disruption
otherwise associated with these actions.
How It Works
Intelligent file virtualization aggregates existing file systems (regardless of whether
they reside in NAS devices, file servers, or cloud storage gateways) into a Global
Namespace. Every storage device presents a namespace—a collection of physical
network file systems, such as CIFS shares and NFS exports—to authorized clients.
3
4
White Paper
Performing Non-Disruptive Data Migration with Intelligent File Virtualization
A Global Namespace virtualizes the individual namespaces and federates multiple
physical file systems into virtual ones. After the environment has been virtualized,
clients and applications can access the virtual shares and exports in the Global
Namespace rather than the physical ones on the file storage devices themselves.
The intelligent file virtualization layer does not introduce a new file system. Rather,
clients continue to access existing file systems through industry-standard Common
Internet File System (CIFS) and/or Network File System (NFS) protocols. By virtualizing
access to file data, administrators can move that data between heterogeneous
storage devices freely, without interrupting access to it, and without affecting the
client or application mappings to it.
To understand how this process works, consider Figure 1, which depicts data flow
without virtualization. In this example, the client has two separate drive mappings to
the two network shares. When the client requests file1.doc, FS-1 sends the file to
the client. Similarly, when the client requests file3.doc, FS-2 fulfills this request.
Client FS-1
FS-2
home
user
file1.doc
file2.doc
public
file3.doc
user on ‘FS-1home’ (U:)
public on ‘FS-2’ (V:)
Figure 1: File access without virtualization
With ARX deployed, the client only needs to maintain a single drive mapping to
the virtual share in the Global Namespace, as shown in Figure 2. The data flow is
concealed from the client behind the ARX device. In effect, the ARX device behaves
as a CIFS and NFS proxy for any file access requests through the virtual share. When
the client requests file1.doc, the ARX device proxies that request to FS-1. The
response from FS-1 is then forwarded back to the client. When the client requests
file3.doc, the ARX device proxies that request to FS-2. The response from FS-2 is
then forwarded back to the client. From the client’s perspective, both files appear
to exist in the same location.
5
White Paper
Performing Non-Disruptive Data Migration with Intelligent File Virtualization
Client
FS-1
FS-2
home
user
public
file3.doc
ARX4000
ARX
ARX4000
global
home
public
global on ‘ARX’ (G:)
file1.doc
file2.doc
Figure 2: File access with virtualization
Deploying File Virtualization
Figures 1 and 2 provide a conceptual overview of how file virtualization compares
to a traditional file storage environment. However, most organizations already have
an existing file storage environment that they want to virtualize. ARX provides
significant flexibility to an administrator when creating a Global Namespace and
designing how logical file access maps to physical storage capacity. However, the
simplest method is often to take over the existing namespace. In this scenario, an
administrator virtualizes the source file server by moving the name of the file server
to the ARX device, renaming the file server, and making any appropriate DNS or
Active Directory changes. Once this is complete, clients are transparently directed to
the ARX device instead of the file server. This approach guarantees that client file
access—the Universal Naming Convention (UNC) path, including server name, share
name, and file path, as well as shortcuts and object links—is preserved both during
and after the migration.
6
White Paper
Performing Non-Disruptive Data Migration with Intelligent File Virtualization
Non-Disruptive Data Migration
with ARX
ARX provides the ability to migrate files between heterogeneous file storage
resources without disrupting client access to those files, as well as schedulable
policies that automate the movement of files from the source to destination
file systems.
How It Works
In an environment virtualized by ARX, files can be migrated between physical file
systems or storage devices without affecting client drive mappings. This is because
clients retain the same logical drive mapping to a virtual share, regardless of the
physical location of a file. Clients now access files through the virtual share rather
than to the physical file storage devices themselves. This section illustrates how this
works with a simple example involving a one-to-one migration in an environment
virtualized by ARX. In this scenario, the entire contents of the source file system on
FS-1 are migrated to the destination file system on FS-2.
Before starting the migration, the administrator provisions the destination file
system from FS-2 into the Global Namespace as shown in Figure 3. ARX
automatically creates the appropriate directory structure in the new file system.
The client is unaware that a second physical file system has been added.
Client
global on ‘ARX’ (G:)
FS-1
FS-2
ARX4000
ARX
ARX4000
home
user
global
home
home
user
home
user
file1.doc
file2.doc
Figure 3: Adding the migration destination
7
White Paper
Performing Non-Disruptive Data Migration with Intelligent File Virtualization
ARX preserves client access to files during the migration. In Figure 4, file1.doc has
been migrated to FS-2, while file2.doc remains on FS-1. At this point, the client can
still access both of its files through the Global Namespace. If the client requests
file2.doc, the ARX device forwards that request to FS-1. The response from FS-1 is
then forwarded to the client. If the client requests file1.doc, ARX now forwards
that request to FS-2. The response from FS-2 is then forwarded to the client.
Client
FS-1
FS-2
home
user
file2.doc
home
user
file1.doc
ARX4000
ARX
ARX4000
home
user
global
home
global on ‘ARX’ (G:)
ARX’s inline policy will also automatically place any new files created during the
migration on the destination file system. In Figure 5, the client has created a new
file, file3.doc. Rather than place the file on FS-1 and then migrate it afterwards,
ARX automatically places the file on FS-2 as it is created.
Client
FS-1
FS-2
home
user
file2.doc
ARX4000
ARX
ARX4000
home
user
global
home
global on ‘ARX’ (G:)
home
user
file1.doc
file3.doc
Figure 4: Accessing files during the migration
Figure 5: Inline placement of new files
8
White Paper
Performing Non-Disruptive Data Migration with Intelligent File Virtualization
All file movement occurs behind the ARX device and is hidden from the client,
which continues to access its files through the same logical drive mappings. ARX
keeps track of the current physical location of every file, and it proxies any file access
through the Global Namespace to the appropriate location on either FS-1 or FS-2.
In addition, it preserves the UNC path, including server name, share name, and file
path, as well as shortcuts and object links, as part of the migration, eliminating the
need to reconfigure the client after the migration.
Creating a Migration Policy
ARX performs all file movement using schedulable and configurable data
management policies. These policies provide administrators with a significant
amount of flexibility in determining how the data migration will be performed by:
•	 Specifying what files to move.
•	 Specifying where to move files.
•	 Specifying when to move files.
Classifying the Data
One-to-one migration offers the simplest migration scenario, where every file is
migrated from a source file system to an identical destination. However, there are
many scenarios in which an organization may not want to perform a one-to-one
data migration. For example, file systems tend to become cluttered over time, and a
migration event provides an opportunity to reorganize and optimize the data layout.
Rather than individually specify how every file should be migrated, administrators
can create policies to automate that process. ARX policies can be based on a
number of file attributes, including age, type, size, name, and directory. With these
attributes, administrators can instruct the ARX device to migrate different sets of
files or directories to different destinations.
To understand why this would be useful, consider the case of user home directories
in a large organization. In the beginning, every user’s home directory may be
provisioned from a single file storage device. However, as that device reaches
capacity, new users may have their home directories provisioned from a variety of
devices across the environment. As part of a data migration, this organization may
want to consolidate all of its user home directories in a single file system on the new
9
White Paper
Performing Non-Disruptive Data Migration with Intelligent File Virtualization
device, or on different physical file systems accessed through a single virtual one.
With ARX, an administrator can easily accomplish this by creating a migration policy.
Types of Migrations
ARX also provides flexibility in specifying the sources and destinations to and from
which files will be migrated. Depending on the project requirements, a migration
will follow one of three paths: one-to-one, many-to-one, or one-to-many.
Regardless of the migration path, ARX preserves the logical namespace presentation
to users and applications. Client systems access their files in the same manner
before, during, and after the migration, greatly simplifying even complex data
migration projects.
One-to-one
A one-to-one migration is the simplest form of a data migration. In this scenario,
the entire contents and directory structure of a source file system are migrated to
the destination. Common examples of a one-to-one migration are a hardware
transition, such as when an old NAS device is replaced with a newer model, and a
re-provisioning event, in which a client’s data is migrated to a larger network share.
Many-to-one
Also referred to as a “fan-in” migration, a many-to-one migration involves
consolidating the entire contents and directory structures of multiple source file
systems into a single destination. Shown in Figure 6, this is a common scenario for
a NAS consolidation project, where the contents of multiple file servers are migrated
to a smaller number of NAS devices. In addition to preserving user access to files,
ARX can also perform a detailed file system collision analysis prior to the migration
to identify files and directories that are not unique and that require manual
intervention in order to merge.
10
White Paper
Performing Non-Disruptive Data Migration with Intelligent File Virtualization
Client
FS-2
FS-1
home
home
user
home
user
ARX4000
ARX
ARX4000
global on ‘ARX’ (G:)
public
public
NAS-1
global
home
public
Figure 6: Example of a many-to-one migration
One-to-many
A one-to-many migration, also called a “fan-out” migration, involves distributing the
contents of the source file system to multiple destination file systems. As shown in
Figure 7, this may be the result of the need to break apart a large file system into
multiple smaller ones, or to put structure back into data sets that were merged due to
space restrictions. For example, an organization may have started with a file system
dedicated to a single department, but subsequently added top-level folders for other
departments as they ran out of space on their respective file systems. In a one-to-
many migration, the ARX policy can identify different types of files based on their
attributes, such as directories, and migrate them to different destination file systems.
11
White Paper
Performing Non-Disruptive Data Migration with Intelligent File Virtualization
Client
FS-2
FS-3
FS-1
dept_a
ARX4000
ARX
ARX4000
global on ‘ARX’ (G:)
dept_b
dept_a
dept_b
global
dept_a
dept_b
Figure 7: Example of a one-to-many migration
Setting the Schedule
While ARX can migrate files in a non-disruptive manner, preserving the access
method for users and applications, organizations may still choose to perform the
migration during off-hours or at other specific times for two reasons:
•	 A migration may involve an old file server that is already overwhelmed, and
the additional load on the file server is unacceptable during peak business
hours while it is busy fulfilling client requests.
•	 In a virtualized environment, backups are typically performed against the
physical file systems. Any data migration should be coordinated with the
organization’s backup policy. Especially with large migrations, organizations
may wish to schedule the migration to occur outside of the defined backup
window to minimize its effect on backup operations.
When creating a data migration policy, an administrator can either initiate the
operation immediately or schedule it to occur at a future time. A schedule enables
the administrator to define when the ARX device will evaluate which files meet
the policy criteria, and when file movement actually takes place. For example, an
administrator may prefer the migration to occur on weeknights between midnight
12
White Paper
Performing Non-Disruptive Data Migration with Intelligent File Virtualization
and 4 a.m., to avoid both inconveniencing users and the weekend backup window.
In this case, ARX would start (or continue) the migration every weeknight at
midnight and pause at 4 a.m.
Advantages of the F5 Approach
ARX offers a number of advantages over traditional migration approaches. To
understand these advantages, it is necessary to explore traditional data migration
in a little more depth.
Traditional Approaches
Today, organizations migrate data by using a combination of manual tools and
processes. Most migration tools are limited in operation and focus on the replication
of data from a source to a destination file system. For these tools, preserving client
access to affected files and directories during or after the migration is not a primary
function, so they typically do not provide any mechanism for redirecting concurrent
file access. Clients continue accessing the source file system while the replication
is in process, requiring the migration tool to make multiple passes to continually
replicate the most recent changes to the destination. To complete the replication
process, the tool requires a final pass to replicate any remaining changes, during
which all client access must be quiesced. When the replication is complete,
administrators must then reconfigure affected client systems to access their files
at the new location.
Figure 8 demonstrates the steps of a migration of a single network share. This
example involves the transition of a file server, FS-1, and the migration of all existing
data to a new system. The migration is complicated by a client system that is
continuously accessing one or more files stored in a single network share on FS-1.
As a result, the migration tool must make several passes, each time scanning the
source and destination file systems and comparing their contents to identify new or
recently modified files to migrate:
13
White Paper
Performing Non-Disruptive Data Migration with Intelligent File Virtualization
Client FS-1
FS-2
public
file1.doc
file2.doc
public on ‘FS-1’ (p:)
public on ‘FS-2’ (p:)
Pass 1 Pass 2–Pass N Final Pass
public
file2.doc
file3.doc
file1.doc
public
file2.doc
file3.doc
file1.doc
public
file1.doc
public
file2.doc
file1.doc
public
file2.doc
file3.doc
file1.doc
1 2 3
4
Figure 8: Example of a traditional data migration (see discussion of each step below)
1.	 In its initial pass, the migration tool scans the source file system on FS-1 and
discovers two files. File2.doc is currently being modified and cannot be
migrated. Therefore, the tool can only replicate file1.doc to FS-2.
2.	 	In Pass 2, the migration tool scans the source file system on FS-1 to determine
what files have changed since the initial pass and discovers three files. File2.doc
is no longer being modified and can be migrated. However, the client has
created a new file, file3.doc, and has modified file1.doc. Both of these are
currently being used. Therefore, the tool can only replicate file2.doc to FS-2.
3.	 Because the client is continuously accessing files in the source file system, the
migration tool will never be able to replicate every file to the destination. Not
only that, each pass requires the tool to scan the entire source file system and
determine what files have changed and need to be replicated. Depending on
the size of the file system and the number of files, this process can take a
significant amount of time. At some point, the administrator will determine
that the source file system needs to be quiesced in order to make a final pass.
14
White Paper
Performing Non-Disruptive Data Migration with Intelligent File Virtualization
The migration tool performs a final scan of the source file system and replicates
any new or recently modified file to FS-2. Note that all client access to the
source file system is halted during the downtime window.
4.	 Now that the destination contains the most recent replica of every file, FS-1
can be removed and the client can be transitioned to FS-2. The administrator
must reconfigure the client system to access files on FS-2 before normal
operations can resume. In addition, the administrator must now also fix any
errors that arose from the migration. This step requires that all client access to
the source file system be halted.
The workflow in Figure 8 shows that data migrations performed using traditional
migration tools and processes share several characteristics:
•	 Multiple passes. Traditional replication-based migration tools scan the
source file system to determine what files must be copied; any changes that
occur afterward are not copied to the destination. However, users and
applications continue to create new files and modify existing files on the
source file system while the migration is ongoing. As a result, most data
migrations will require multiple passes. While subsequent passes will likely
have to replicate a decreasing set of file changes to the destination, they still
need to perform a full scan of the source and destination file systems.
•	 Downtime window. To guarantee that all of the changes are propagated to
the destination, traditional data migrations require the source file system to
be quiesced for the final pass. Users and applications cannot access their files
on either the source or destination file systems during the downtime window.
Because each pass requires a full scan of the source file system, the downtime
window may be significant, especially for larger file systems.
•	 Client reconfiguration. Because traditional out-of-band migration tools do
not provide any method for redirecting client access, any client system that
may potentially attempt to access the affected files must be reconfigured to
do so at the new location, or the original name must be transferred to the
new target. Depending on the number of clients and the number of drive
mappings for each, this can represent significant operational overhead at the
end of the migration.
In addition, note that Figure 8 depicts the migration of a single file system. In an
enterprise file storage environment, file servers typically present a number of active
file systems with a significantly larger amount of data. Migrating a file server requires
coordinating this process across every file system on the server. This means that
15
White Paper
Performing Non-Disruptive Data Migration with Intelligent File Virtualization
every file system must be quiesced for the final pass, increasing both the amount
of data that must be replicated and the length of the downtime window.
Migrations between heterogeneous devices
Another important aspect of traditional migration tools is the difference in
supported capabilities between the source and destination storage devices.
Although every file storage device communicates through industry-standard CIFS
and NFS protocols, individual platforms may implement each protocol in a slightly
different manner. In addition, many devices include features that are specific to
that platform or other platforms from that vendor.
Most traditional migration tools cannot detect or mitigate differences between
storage devices. Migrating files to a device that provides a lower level of support
for a feature, such as persistent Access Control Lists (ACLs), can potentially lead to
security degradation or even data loss. However, organizations may not be aware
that any degradation has occurred until after the migration has been performed.
Advantages of ARX
ARX has several advantages over the traditional data migration approach:
•	 Non-disruptive migration. Administrators can migrate files between
different file systems, storage devices, or vendors without adversely affecting
users and applications. ARX preserves the logical access to files regardless of
their current physical locations. As a result, there is no need for a downtime
window to migrate changes or reconfigure client systems.
•	 Inline policy. Because an ARX device is inline, it can automatically steer new
file creation to the destination file system. With traditional out-of-band
migration tools, administrators have to continually rescan the source file
system to detect recent changes to replicate on a subsequent replication pass.
•	 Faster migrations. Because ARX can migrate files non-disruptively,
administrators can perform data migrations at any time, even during business
hours. This increases the window available to migrate data, and reduces the
total time required to complete a data migration project. In addition, multiple
migration policies can be scheduled to occur in parallel, further reducing the
time required.
•	 Lower IT overhead. With ARX, administrators don’t need to employ
manual tools and processes to perform their data migrations. ARX provides
schedulable migration policies that automate file movement, while the Global
16
White Paper
Performing Non-Disruptive Data Migration with Intelligent File Virtualization
Namespace preserves client access to files during and after the migration.
Not only does this eliminate the need to reconfigure client systems after the
migration has been performed, it also simplifies complex migration projects
between multiple file systems and storage devices.
•	 Heterogeneity. ARX provides true multi-vendor data migration capabilities
for both CIFS and NFS environments, preserving file attributes and permissions
between different storage devices, platforms, and vendors. ARX can also
migrate multi-protocol data sets on file storage devices that support
simultaneous CIFS and NFS access to the same files, preserving both sets
of permissions. Most traditional migration tools can only preserve one set
of permissions.
•	 Fewer errors. ARX preserves all server and network share names when
performing a migration, reducing the number of errors that arise from broken
links embedded within migrated files.
•	 Lower risk. In addition to reducing the potential number of errors, ARX
provides several features that further mitigate the inherent risk of data
migrations. Prior to the migration, the ARX device examines both source and
destination file systems for differences in supported capabilities, and warns
administrators of incompatibilities before the migration is initiated. In addition,
it provides a detailed file system collision analysis to eliminate the chance of
accidental data loss when performing many-to-one migrations.
White Paper
Performing Non-Disruptive Data Migration with Intelligent File Virtualization
F5 Networks, Inc.
Corporate Headquarters
info@f5.com
F5 Networks, Inc. 	 401 Elliott Avenue West, Seattle, WA 98119	 888-882-4447	 www.f5.com
F5 Networks
Asia-Pacific
apacinfo@f5.com
F5 Networks Ltd.
Europe/Middle-East/Africa
emeainfo@f5.com
F5 Networks
Japan K.K.
f5j-info@f5.com
©2012 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, and IT agility. Your way., are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified
at f5.com. Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, express or implied, claimed by F5. CS01-00086 0212
Conclusion
IT organizations are faced with the constant challenge of migrating data. The
amount of data under management is rapidly growing, forcing organizations into
a never-ending routine of migrating data to balance utilization, reprovision file
systems, and transition between storage devices. However, traditional tools and
processes are limited in operation and cannot mitigate the disruption to client
access. As a result, traditional data migrations tend to be operationally disruptive,
resource-intensive, and error-prone.
ARX provides an elegant approach to data management that eliminates the
disruption associated with migrating file data in heterogeneous environments.
ARX preserves client access to files during and after the migration, removing the
downtime requirement and the need to reconfigure client systems, as well as
reducing the incidence of errors. This allows organizations to perform any type
of data migration project in less time, at lower cost, and with reduced risk.

More Related Content

What's hot

What is active directory
What is active directoryWhat is active directory
What is active directoryAdeel Khurram
 
Introduction to Active Directory
Introduction to Active DirectoryIntroduction to Active Directory
Introduction to Active Directorythoms1i
 
Deep semantic understanding
Deep semantic understandingDeep semantic understanding
Deep semantic understandingsidra ali
 
Centralizing users’ authentication at Active Directory level 
Centralizing users’ authentication at Active Directory level Centralizing users’ authentication at Active Directory level 
Centralizing users’ authentication at Active Directory level Hossein Sarshar
 
2017 10-oow-fma-application-containers-v01-final
2017 10-oow-fma-application-containers-v01-final2017 10-oow-fma-application-containers-v01-final
2017 10-oow-fma-application-containers-v01-finalMarkus Flechtner
 
Introduction to Database Log Analysis
Introduction to Database Log AnalysisIntroduction to Database Log Analysis
Introduction to Database Log AnalysisAnton Chuvakin
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directorythebigredhemi
 
Comparison oracle windows_linux
Comparison oracle windows_linuxComparison oracle windows_linux
Comparison oracle windows_linuxslidethanks
 
Introduction_of_ADDS
Introduction_of_ADDSIntroduction_of_ADDS
Introduction_of_ADDSHarsh Sethi
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storageIGEEKS TECHNOLOGIES
 
Comparative study of no sql document, column store databases and evaluation o...
Comparative study of no sql document, column store databases and evaluation o...Comparative study of no sql document, column store databases and evaluation o...
Comparative study of no sql document, column store databases and evaluation o...ijdms
 
Nas and san
Nas and sanNas and san
Nas and sansongaco
 
active-directory-domain-services
active-directory-domain-servicesactive-directory-domain-services
active-directory-domain-services202066
 
Active directory ii
Active directory   iiActive directory   ii
Active directory iideshvikas
 
New Features Sql 2008
New Features Sql 2008New Features Sql 2008
New Features Sql 2008tomerl
 
MCSA 70-410 5 introduction to active directory and basic installation
MCSA 70-410 5 introduction to active directory and basic installationMCSA 70-410 5 introduction to active directory and basic installation
MCSA 70-410 5 introduction to active directory and basic installationTarek Amer
 
Overview of oracle database
Overview of oracle databaseOverview of oracle database
Overview of oracle databaseSamar Prasad
 

What's hot (20)

Oracle database introduction
Oracle database introductionOracle database introduction
Oracle database introduction
 
What is active directory
What is active directoryWhat is active directory
What is active directory
 
Introduction to Active Directory
Introduction to Active DirectoryIntroduction to Active Directory
Introduction to Active Directory
 
Deep semantic understanding
Deep semantic understandingDeep semantic understanding
Deep semantic understanding
 
Centralizing users’ authentication at Active Directory level 
Centralizing users’ authentication at Active Directory level Centralizing users’ authentication at Active Directory level 
Centralizing users’ authentication at Active Directory level 
 
2017 10-oow-fma-application-containers-v01-final
2017 10-oow-fma-application-containers-v01-final2017 10-oow-fma-application-containers-v01-final
2017 10-oow-fma-application-containers-v01-final
 
Introduction to Database Log Analysis
Introduction to Database Log AnalysisIntroduction to Database Log Analysis
Introduction to Database Log Analysis
 
70 640 Lesson03 Ppt 041009
70 640 Lesson03 Ppt 04100970 640 Lesson03 Ppt 041009
70 640 Lesson03 Ppt 041009
 
Oracle Tablespace - Basic
Oracle Tablespace - BasicOracle Tablespace - Basic
Oracle Tablespace - Basic
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 
Comparison oracle windows_linux
Comparison oracle windows_linuxComparison oracle windows_linux
Comparison oracle windows_linux
 
Introduction_of_ADDS
Introduction_of_ADDSIntroduction_of_ADDS
Introduction_of_ADDS
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
 
Comparative study of no sql document, column store databases and evaluation o...
Comparative study of no sql document, column store databases and evaluation o...Comparative study of no sql document, column store databases and evaluation o...
Comparative study of no sql document, column store databases and evaluation o...
 
Nas and san
Nas and sanNas and san
Nas and san
 
active-directory-domain-services
active-directory-domain-servicesactive-directory-domain-services
active-directory-domain-services
 
Active directory ii
Active directory   iiActive directory   ii
Active directory ii
 
New Features Sql 2008
New Features Sql 2008New Features Sql 2008
New Features Sql 2008
 
MCSA 70-410 5 introduction to active directory and basic installation
MCSA 70-410 5 introduction to active directory and basic installationMCSA 70-410 5 introduction to active directory and basic installation
MCSA 70-410 5 introduction to active directory and basic installation
 
Overview of oracle database
Overview of oracle databaseOverview of oracle database
Overview of oracle database
 

Viewers also liked

comparing-approaches-for-web-dns-infrastructure-security-white-paper
comparing-approaches-for-web-dns-infrastructure-security-white-papercomparing-approaches-for-web-dns-infrastructure-security-white-paper
comparing-approaches-for-web-dns-infrastructure-security-white-paperRenny Shen
 
Professional Resume Administrator 1-15
Professional Resume Administrator 1-15Professional Resume Administrator 1-15
Professional Resume Administrator 1-15Teri Vigneau-Gabriel
 
Professional Resume Administrator wo Address 10-3-2016
Professional Resume Administrator wo Address 10-3-2016Professional Resume Administrator wo Address 10-3-2016
Professional Resume Administrator wo Address 10-3-2016Teri Vigneau-Gabriel
 
Dr M. Wahab updated CV in 2016
Dr M. Wahab updated CV in 2016Dr M. Wahab updated CV in 2016
Dr M. Wahab updated CV in 2016Dr Muhammad Wahab
 
F сотню вже зустріли небеса
F сотню вже зустріли небесаF сотню вже зустріли небеса
F сотню вже зустріли небесаOlya Yavorivska
 
CURRICULUM VIT FOR COLLEGES
CURRICULUM VIT FOR COLLEGESCURRICULUM VIT FOR COLLEGES
CURRICULUM VIT FOR COLLEGESlambo alain
 
квадратні корені
квадратні кореніквадратні корені
квадратні кореніOlya Yavorivska
 

Viewers also liked (11)

Kenya volontär
Kenya volontärKenya volontär
Kenya volontär
 
BookletNANO
BookletNANOBookletNANO
BookletNANO
 
comparing-approaches-for-web-dns-infrastructure-security-white-paper
comparing-approaches-for-web-dns-infrastructure-security-white-papercomparing-approaches-for-web-dns-infrastructure-security-white-paper
comparing-approaches-for-web-dns-infrastructure-security-white-paper
 
HM 424-001
HM 424-001HM 424-001
HM 424-001
 
Professional Resume Administrator 1-15
Professional Resume Administrator 1-15Professional Resume Administrator 1-15
Professional Resume Administrator 1-15
 
Professional Resume Administrator wo Address 10-3-2016
Professional Resume Administrator wo Address 10-3-2016Professional Resume Administrator wo Address 10-3-2016
Professional Resume Administrator wo Address 10-3-2016
 
Dr M. Wahab updated CV in 2016
Dr M. Wahab updated CV in 2016Dr M. Wahab updated CV in 2016
Dr M. Wahab updated CV in 2016
 
F сотню вже зустріли небеса
F сотню вже зустріли небесаF сотню вже зустріли небеса
F сотню вже зустріли небеса
 
CURRICULUM VIT FOR COLLEGES
CURRICULUM VIT FOR COLLEGESCURRICULUM VIT FOR COLLEGES
CURRICULUM VIT FOR COLLEGES
 
квадратні корені
квадратні кореніквадратні корені
квадратні корені
 
методичка
методичкаметодичка
методичка
 

Similar to arx-data-migration-wp

PARALLEL FILE SYSTEM FOR LINUX CLUSTERS
PARALLEL FILE SYSTEM FOR LINUX CLUSTERSPARALLEL FILE SYSTEM FOR LINUX CLUSTERS
PARALLEL FILE SYSTEM FOR LINUX CLUSTERSRaheemUnnisa1
 
AliEnFS - A Linux File System For The AliEn Grid Services
AliEnFS - A Linux File System For The AliEn Grid ServicesAliEnFS - A Linux File System For The AliEn Grid Services
AliEnFS - A Linux File System For The AliEn Grid ServicesNathan Mathis
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdfSamiksha880257
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageIGEEKS TECHNOLOGIES
 
Storage Area Networks Unit 3 Notes
Storage Area Networks Unit 3 NotesStorage Area Networks Unit 3 Notes
Storage Area Networks Unit 3 NotesSudarshan Dhondaley
 
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET Journal
 
DataCore vFilO lets users locate files across multiple NAS systems with a sin...
DataCore vFilO lets users locate files across multiple NAS systems with a sin...DataCore vFilO lets users locate files across multiple NAS systems with a sin...
DataCore vFilO lets users locate files across multiple NAS systems with a sin...Principled Technologies
 
DFS PPT.pptx
DFS PPT.pptxDFS PPT.pptx
DFS PPT.pptxVMahesh5
 
Storage Made Easy - M-Stream File Transfer Acceleration
Storage Made Easy - M-Stream File Transfer AccelerationStorage Made Easy - M-Stream File Transfer Acceleration
Storage Made Easy - M-Stream File Transfer AccelerationHybrid Cloud
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...ssuserec8a711
 
Survey of distributed storage system
Survey of distributed storage systemSurvey of distributed storage system
Survey of distributed storage systemZhichao Liang
 
Ch12 OS
Ch12 OSCh12 OS
Ch12 OSC.U
 

Similar to arx-data-migration-wp (20)

PARALLEL FILE SYSTEM FOR LINUX CLUSTERS
PARALLEL FILE SYSTEM FOR LINUX CLUSTERSPARALLEL FILE SYSTEM FOR LINUX CLUSTERS
PARALLEL FILE SYSTEM FOR LINUX CLUSTERS
 
AliEnFS - A Linux File System For The AliEn Grid Services
AliEnFS - A Linux File System For The AliEn Grid ServicesAliEnFS - A Linux File System For The AliEn Grid Services
AliEnFS - A Linux File System For The AliEn Grid Services
 
Document 22.pdf
Document 22.pdfDocument 22.pdf
Document 22.pdf
 
DFSNov1.pptx
DFSNov1.pptxDFSNov1.pptx
DFSNov1.pptx
 
Distributed file systems dfs
Distributed file systems   dfsDistributed file systems   dfs
Distributed file systems dfs
 
Ranjitbanshpal
RanjitbanshpalRanjitbanshpal
Ranjitbanshpal
 
Dos unit 4
Dos unit 4Dos unit 4
Dos unit 4
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdf
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
 
Storage Area Networks Unit 3 Notes
Storage Area Networks Unit 3 NotesStorage Area Networks Unit 3 Notes
Storage Area Networks Unit 3 Notes
 
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
 
DataCore vFilO lets users locate files across multiple NAS systems with a sin...
DataCore vFilO lets users locate files across multiple NAS systems with a sin...DataCore vFilO lets users locate files across multiple NAS systems with a sin...
DataCore vFilO lets users locate files across multiple NAS systems with a sin...
 
DFS PPT.pptx
DFS PPT.pptxDFS PPT.pptx
DFS PPT.pptx
 
191
191191
191
 
Storage Made Easy - M-Stream File Transfer Acceleration
Storage Made Easy - M-Stream File Transfer AccelerationStorage Made Easy - M-Stream File Transfer Acceleration
Storage Made Easy - M-Stream File Transfer Acceleration
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
 
Survey of distributed storage system
Survey of distributed storage systemSurvey of distributed storage system
Survey of distributed storage system
 
OSCh12
OSCh12OSCh12
OSCh12
 
Ch12 OS
Ch12 OSCh12 OS
Ch12 OS
 
OS_Ch12
OS_Ch12OS_Ch12
OS_Ch12
 

arx-data-migration-wp

  • 1. Performing Non-Disruptive Data Migration with Intelligent File Virtualization Data migrations are a common occurrence for many organizations as they manage growing amounts of file data. Intelligent file virtualization is an elegant solution that reduces the disruption, operational overhead, and risk inherent with any type of data migration project. by Renny Shen Product Marketing Manager White Paper
  • 2. 2 White Paper Performing Non-Disruptive Data Migration with Intelligent File Virtualization Contents Introduction 3 The Foundation: Intelligent File Virtualization 3 How It Works 3 Deploying File Virtualization 5 Non-Disruptive Data Migration with ARX 6 How It Works 6 Creating a Migration Policy 8 Classifying the Data 8 Types of Migrations 9 Setting the Schedule 11 Advantages of the F5 Approach 12 Traditional Approaches 12 Advantages of ARX 15 Conclusion 17
  • 3. 3 White Paper Performing Non-Disruptive Data Migration with Intelligent File Virtualization Introduction Data migrations are a fact of life for enterprise IT organizations. The term data migration refers to any movement of data; there are many types of migrations, ranging from small, frequent events to large, one-time projects. Organizations plan migrations for a number of reasons, such as to re-provision storage capacity or to transition between storage systems. Regardless of the size or reason, every migration event has the potential to disrupt user access and cause business downtime. This disruption carries a real and measurable cost to business, including reduced user productivity and lost revenue. It imposes an operational overhead on IT staff, who must perform more upfront planning, negotiate acceptable downtime windows with users, reconfigure affected client systems, and correct any errors that arise over the course of the migration. And because the amount of business data continues to grow exponentially, the need to migrate that data—and the associated business costs and IT overhead—will only increase over time. F5® ARX® intelligent file virtualization enables organizations to migrate file data in a non-disruptive manner. By virtualizing the file storage environment, ARX devices decouple the logical access to files from their physical locations on storage, allowing files to be moved between heterogeneous file storage resources without disrupting access or requiring business downtime. This reduces the amount of time, the overhead for IT staff, and the costs associated with any data migration. The Foundation: Intelligent File Virtualization Intelligent file virtualization provides the layer in the network that decouples the logical access to files from their physical locations. With this layer in place, administrators can move data and change storage resources without the disruption otherwise associated with these actions. How It Works Intelligent file virtualization aggregates existing file systems (regardless of whether they reside in NAS devices, file servers, or cloud storage gateways) into a Global Namespace. Every storage device presents a namespace—a collection of physical network file systems, such as CIFS shares and NFS exports—to authorized clients. 3
  • 4. 4 White Paper Performing Non-Disruptive Data Migration with Intelligent File Virtualization A Global Namespace virtualizes the individual namespaces and federates multiple physical file systems into virtual ones. After the environment has been virtualized, clients and applications can access the virtual shares and exports in the Global Namespace rather than the physical ones on the file storage devices themselves. The intelligent file virtualization layer does not introduce a new file system. Rather, clients continue to access existing file systems through industry-standard Common Internet File System (CIFS) and/or Network File System (NFS) protocols. By virtualizing access to file data, administrators can move that data between heterogeneous storage devices freely, without interrupting access to it, and without affecting the client or application mappings to it. To understand how this process works, consider Figure 1, which depicts data flow without virtualization. In this example, the client has two separate drive mappings to the two network shares. When the client requests file1.doc, FS-1 sends the file to the client. Similarly, when the client requests file3.doc, FS-2 fulfills this request. Client FS-1 FS-2 home user file1.doc file2.doc public file3.doc user on ‘FS-1home’ (U:) public on ‘FS-2’ (V:) Figure 1: File access without virtualization With ARX deployed, the client only needs to maintain a single drive mapping to the virtual share in the Global Namespace, as shown in Figure 2. The data flow is concealed from the client behind the ARX device. In effect, the ARX device behaves as a CIFS and NFS proxy for any file access requests through the virtual share. When the client requests file1.doc, the ARX device proxies that request to FS-1. The response from FS-1 is then forwarded back to the client. When the client requests file3.doc, the ARX device proxies that request to FS-2. The response from FS-2 is then forwarded back to the client. From the client’s perspective, both files appear to exist in the same location.
  • 5. 5 White Paper Performing Non-Disruptive Data Migration with Intelligent File Virtualization Client FS-1 FS-2 home user public file3.doc ARX4000 ARX ARX4000 global home public global on ‘ARX’ (G:) file1.doc file2.doc Figure 2: File access with virtualization Deploying File Virtualization Figures 1 and 2 provide a conceptual overview of how file virtualization compares to a traditional file storage environment. However, most organizations already have an existing file storage environment that they want to virtualize. ARX provides significant flexibility to an administrator when creating a Global Namespace and designing how logical file access maps to physical storage capacity. However, the simplest method is often to take over the existing namespace. In this scenario, an administrator virtualizes the source file server by moving the name of the file server to the ARX device, renaming the file server, and making any appropriate DNS or Active Directory changes. Once this is complete, clients are transparently directed to the ARX device instead of the file server. This approach guarantees that client file access—the Universal Naming Convention (UNC) path, including server name, share name, and file path, as well as shortcuts and object links—is preserved both during and after the migration.
  • 6. 6 White Paper Performing Non-Disruptive Data Migration with Intelligent File Virtualization Non-Disruptive Data Migration with ARX ARX provides the ability to migrate files between heterogeneous file storage resources without disrupting client access to those files, as well as schedulable policies that automate the movement of files from the source to destination file systems. How It Works In an environment virtualized by ARX, files can be migrated between physical file systems or storage devices without affecting client drive mappings. This is because clients retain the same logical drive mapping to a virtual share, regardless of the physical location of a file. Clients now access files through the virtual share rather than to the physical file storage devices themselves. This section illustrates how this works with a simple example involving a one-to-one migration in an environment virtualized by ARX. In this scenario, the entire contents of the source file system on FS-1 are migrated to the destination file system on FS-2. Before starting the migration, the administrator provisions the destination file system from FS-2 into the Global Namespace as shown in Figure 3. ARX automatically creates the appropriate directory structure in the new file system. The client is unaware that a second physical file system has been added. Client global on ‘ARX’ (G:) FS-1 FS-2 ARX4000 ARX ARX4000 home user global home home user home user file1.doc file2.doc Figure 3: Adding the migration destination
  • 7. 7 White Paper Performing Non-Disruptive Data Migration with Intelligent File Virtualization ARX preserves client access to files during the migration. In Figure 4, file1.doc has been migrated to FS-2, while file2.doc remains on FS-1. At this point, the client can still access both of its files through the Global Namespace. If the client requests file2.doc, the ARX device forwards that request to FS-1. The response from FS-1 is then forwarded to the client. If the client requests file1.doc, ARX now forwards that request to FS-2. The response from FS-2 is then forwarded to the client. Client FS-1 FS-2 home user file2.doc home user file1.doc ARX4000 ARX ARX4000 home user global home global on ‘ARX’ (G:) ARX’s inline policy will also automatically place any new files created during the migration on the destination file system. In Figure 5, the client has created a new file, file3.doc. Rather than place the file on FS-1 and then migrate it afterwards, ARX automatically places the file on FS-2 as it is created. Client FS-1 FS-2 home user file2.doc ARX4000 ARX ARX4000 home user global home global on ‘ARX’ (G:) home user file1.doc file3.doc Figure 4: Accessing files during the migration Figure 5: Inline placement of new files
  • 8. 8 White Paper Performing Non-Disruptive Data Migration with Intelligent File Virtualization All file movement occurs behind the ARX device and is hidden from the client, which continues to access its files through the same logical drive mappings. ARX keeps track of the current physical location of every file, and it proxies any file access through the Global Namespace to the appropriate location on either FS-1 or FS-2. In addition, it preserves the UNC path, including server name, share name, and file path, as well as shortcuts and object links, as part of the migration, eliminating the need to reconfigure the client after the migration. Creating a Migration Policy ARX performs all file movement using schedulable and configurable data management policies. These policies provide administrators with a significant amount of flexibility in determining how the data migration will be performed by: • Specifying what files to move. • Specifying where to move files. • Specifying when to move files. Classifying the Data One-to-one migration offers the simplest migration scenario, where every file is migrated from a source file system to an identical destination. However, there are many scenarios in which an organization may not want to perform a one-to-one data migration. For example, file systems tend to become cluttered over time, and a migration event provides an opportunity to reorganize and optimize the data layout. Rather than individually specify how every file should be migrated, administrators can create policies to automate that process. ARX policies can be based on a number of file attributes, including age, type, size, name, and directory. With these attributes, administrators can instruct the ARX device to migrate different sets of files or directories to different destinations. To understand why this would be useful, consider the case of user home directories in a large organization. In the beginning, every user’s home directory may be provisioned from a single file storage device. However, as that device reaches capacity, new users may have their home directories provisioned from a variety of devices across the environment. As part of a data migration, this organization may want to consolidate all of its user home directories in a single file system on the new
  • 9. 9 White Paper Performing Non-Disruptive Data Migration with Intelligent File Virtualization device, or on different physical file systems accessed through a single virtual one. With ARX, an administrator can easily accomplish this by creating a migration policy. Types of Migrations ARX also provides flexibility in specifying the sources and destinations to and from which files will be migrated. Depending on the project requirements, a migration will follow one of three paths: one-to-one, many-to-one, or one-to-many. Regardless of the migration path, ARX preserves the logical namespace presentation to users and applications. Client systems access their files in the same manner before, during, and after the migration, greatly simplifying even complex data migration projects. One-to-one A one-to-one migration is the simplest form of a data migration. In this scenario, the entire contents and directory structure of a source file system are migrated to the destination. Common examples of a one-to-one migration are a hardware transition, such as when an old NAS device is replaced with a newer model, and a re-provisioning event, in which a client’s data is migrated to a larger network share. Many-to-one Also referred to as a “fan-in” migration, a many-to-one migration involves consolidating the entire contents and directory structures of multiple source file systems into a single destination. Shown in Figure 6, this is a common scenario for a NAS consolidation project, where the contents of multiple file servers are migrated to a smaller number of NAS devices. In addition to preserving user access to files, ARX can also perform a detailed file system collision analysis prior to the migration to identify files and directories that are not unique and that require manual intervention in order to merge.
  • 10. 10 White Paper Performing Non-Disruptive Data Migration with Intelligent File Virtualization Client FS-2 FS-1 home home user home user ARX4000 ARX ARX4000 global on ‘ARX’ (G:) public public NAS-1 global home public Figure 6: Example of a many-to-one migration One-to-many A one-to-many migration, also called a “fan-out” migration, involves distributing the contents of the source file system to multiple destination file systems. As shown in Figure 7, this may be the result of the need to break apart a large file system into multiple smaller ones, or to put structure back into data sets that were merged due to space restrictions. For example, an organization may have started with a file system dedicated to a single department, but subsequently added top-level folders for other departments as they ran out of space on their respective file systems. In a one-to- many migration, the ARX policy can identify different types of files based on their attributes, such as directories, and migrate them to different destination file systems.
  • 11. 11 White Paper Performing Non-Disruptive Data Migration with Intelligent File Virtualization Client FS-2 FS-3 FS-1 dept_a ARX4000 ARX ARX4000 global on ‘ARX’ (G:) dept_b dept_a dept_b global dept_a dept_b Figure 7: Example of a one-to-many migration Setting the Schedule While ARX can migrate files in a non-disruptive manner, preserving the access method for users and applications, organizations may still choose to perform the migration during off-hours or at other specific times for two reasons: • A migration may involve an old file server that is already overwhelmed, and the additional load on the file server is unacceptable during peak business hours while it is busy fulfilling client requests. • In a virtualized environment, backups are typically performed against the physical file systems. Any data migration should be coordinated with the organization’s backup policy. Especially with large migrations, organizations may wish to schedule the migration to occur outside of the defined backup window to minimize its effect on backup operations. When creating a data migration policy, an administrator can either initiate the operation immediately or schedule it to occur at a future time. A schedule enables the administrator to define when the ARX device will evaluate which files meet the policy criteria, and when file movement actually takes place. For example, an administrator may prefer the migration to occur on weeknights between midnight
  • 12. 12 White Paper Performing Non-Disruptive Data Migration with Intelligent File Virtualization and 4 a.m., to avoid both inconveniencing users and the weekend backup window. In this case, ARX would start (or continue) the migration every weeknight at midnight and pause at 4 a.m. Advantages of the F5 Approach ARX offers a number of advantages over traditional migration approaches. To understand these advantages, it is necessary to explore traditional data migration in a little more depth. Traditional Approaches Today, organizations migrate data by using a combination of manual tools and processes. Most migration tools are limited in operation and focus on the replication of data from a source to a destination file system. For these tools, preserving client access to affected files and directories during or after the migration is not a primary function, so they typically do not provide any mechanism for redirecting concurrent file access. Clients continue accessing the source file system while the replication is in process, requiring the migration tool to make multiple passes to continually replicate the most recent changes to the destination. To complete the replication process, the tool requires a final pass to replicate any remaining changes, during which all client access must be quiesced. When the replication is complete, administrators must then reconfigure affected client systems to access their files at the new location. Figure 8 demonstrates the steps of a migration of a single network share. This example involves the transition of a file server, FS-1, and the migration of all existing data to a new system. The migration is complicated by a client system that is continuously accessing one or more files stored in a single network share on FS-1. As a result, the migration tool must make several passes, each time scanning the source and destination file systems and comparing their contents to identify new or recently modified files to migrate:
  • 13. 13 White Paper Performing Non-Disruptive Data Migration with Intelligent File Virtualization Client FS-1 FS-2 public file1.doc file2.doc public on ‘FS-1’ (p:) public on ‘FS-2’ (p:) Pass 1 Pass 2–Pass N Final Pass public file2.doc file3.doc file1.doc public file2.doc file3.doc file1.doc public file1.doc public file2.doc file1.doc public file2.doc file3.doc file1.doc 1 2 3 4 Figure 8: Example of a traditional data migration (see discussion of each step below) 1. In its initial pass, the migration tool scans the source file system on FS-1 and discovers two files. File2.doc is currently being modified and cannot be migrated. Therefore, the tool can only replicate file1.doc to FS-2. 2. In Pass 2, the migration tool scans the source file system on FS-1 to determine what files have changed since the initial pass and discovers three files. File2.doc is no longer being modified and can be migrated. However, the client has created a new file, file3.doc, and has modified file1.doc. Both of these are currently being used. Therefore, the tool can only replicate file2.doc to FS-2. 3. Because the client is continuously accessing files in the source file system, the migration tool will never be able to replicate every file to the destination. Not only that, each pass requires the tool to scan the entire source file system and determine what files have changed and need to be replicated. Depending on the size of the file system and the number of files, this process can take a significant amount of time. At some point, the administrator will determine that the source file system needs to be quiesced in order to make a final pass.
  • 14. 14 White Paper Performing Non-Disruptive Data Migration with Intelligent File Virtualization The migration tool performs a final scan of the source file system and replicates any new or recently modified file to FS-2. Note that all client access to the source file system is halted during the downtime window. 4. Now that the destination contains the most recent replica of every file, FS-1 can be removed and the client can be transitioned to FS-2. The administrator must reconfigure the client system to access files on FS-2 before normal operations can resume. In addition, the administrator must now also fix any errors that arose from the migration. This step requires that all client access to the source file system be halted. The workflow in Figure 8 shows that data migrations performed using traditional migration tools and processes share several characteristics: • Multiple passes. Traditional replication-based migration tools scan the source file system to determine what files must be copied; any changes that occur afterward are not copied to the destination. However, users and applications continue to create new files and modify existing files on the source file system while the migration is ongoing. As a result, most data migrations will require multiple passes. While subsequent passes will likely have to replicate a decreasing set of file changes to the destination, they still need to perform a full scan of the source and destination file systems. • Downtime window. To guarantee that all of the changes are propagated to the destination, traditional data migrations require the source file system to be quiesced for the final pass. Users and applications cannot access their files on either the source or destination file systems during the downtime window. Because each pass requires a full scan of the source file system, the downtime window may be significant, especially for larger file systems. • Client reconfiguration. Because traditional out-of-band migration tools do not provide any method for redirecting client access, any client system that may potentially attempt to access the affected files must be reconfigured to do so at the new location, or the original name must be transferred to the new target. Depending on the number of clients and the number of drive mappings for each, this can represent significant operational overhead at the end of the migration. In addition, note that Figure 8 depicts the migration of a single file system. In an enterprise file storage environment, file servers typically present a number of active file systems with a significantly larger amount of data. Migrating a file server requires coordinating this process across every file system on the server. This means that
  • 15. 15 White Paper Performing Non-Disruptive Data Migration with Intelligent File Virtualization every file system must be quiesced for the final pass, increasing both the amount of data that must be replicated and the length of the downtime window. Migrations between heterogeneous devices Another important aspect of traditional migration tools is the difference in supported capabilities between the source and destination storage devices. Although every file storage device communicates through industry-standard CIFS and NFS protocols, individual platforms may implement each protocol in a slightly different manner. In addition, many devices include features that are specific to that platform or other platforms from that vendor. Most traditional migration tools cannot detect or mitigate differences between storage devices. Migrating files to a device that provides a lower level of support for a feature, such as persistent Access Control Lists (ACLs), can potentially lead to security degradation or even data loss. However, organizations may not be aware that any degradation has occurred until after the migration has been performed. Advantages of ARX ARX has several advantages over the traditional data migration approach: • Non-disruptive migration. Administrators can migrate files between different file systems, storage devices, or vendors without adversely affecting users and applications. ARX preserves the logical access to files regardless of their current physical locations. As a result, there is no need for a downtime window to migrate changes or reconfigure client systems. • Inline policy. Because an ARX device is inline, it can automatically steer new file creation to the destination file system. With traditional out-of-band migration tools, administrators have to continually rescan the source file system to detect recent changes to replicate on a subsequent replication pass. • Faster migrations. Because ARX can migrate files non-disruptively, administrators can perform data migrations at any time, even during business hours. This increases the window available to migrate data, and reduces the total time required to complete a data migration project. In addition, multiple migration policies can be scheduled to occur in parallel, further reducing the time required. • Lower IT overhead. With ARX, administrators don’t need to employ manual tools and processes to perform their data migrations. ARX provides schedulable migration policies that automate file movement, while the Global
  • 16. 16 White Paper Performing Non-Disruptive Data Migration with Intelligent File Virtualization Namespace preserves client access to files during and after the migration. Not only does this eliminate the need to reconfigure client systems after the migration has been performed, it also simplifies complex migration projects between multiple file systems and storage devices. • Heterogeneity. ARX provides true multi-vendor data migration capabilities for both CIFS and NFS environments, preserving file attributes and permissions between different storage devices, platforms, and vendors. ARX can also migrate multi-protocol data sets on file storage devices that support simultaneous CIFS and NFS access to the same files, preserving both sets of permissions. Most traditional migration tools can only preserve one set of permissions. • Fewer errors. ARX preserves all server and network share names when performing a migration, reducing the number of errors that arise from broken links embedded within migrated files. • Lower risk. In addition to reducing the potential number of errors, ARX provides several features that further mitigate the inherent risk of data migrations. Prior to the migration, the ARX device examines both source and destination file systems for differences in supported capabilities, and warns administrators of incompatibilities before the migration is initiated. In addition, it provides a detailed file system collision analysis to eliminate the chance of accidental data loss when performing many-to-one migrations.
  • 17. White Paper Performing Non-Disruptive Data Migration with Intelligent File Virtualization F5 Networks, Inc. Corporate Headquarters info@f5.com F5 Networks, Inc. 401 Elliott Avenue West, Seattle, WA 98119 888-882-4447 www.f5.com F5 Networks Asia-Pacific apacinfo@f5.com F5 Networks Ltd. Europe/Middle-East/Africa emeainfo@f5.com F5 Networks Japan K.K. f5j-info@f5.com ©2012 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, and IT agility. Your way., are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com. Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, express or implied, claimed by F5. CS01-00086 0212 Conclusion IT organizations are faced with the constant challenge of migrating data. The amount of data under management is rapidly growing, forcing organizations into a never-ending routine of migrating data to balance utilization, reprovision file systems, and transition between storage devices. However, traditional tools and processes are limited in operation and cannot mitigate the disruption to client access. As a result, traditional data migrations tend to be operationally disruptive, resource-intensive, and error-prone. ARX provides an elegant approach to data management that eliminates the disruption associated with migrating file data in heterogeneous environments. ARX preserves client access to files during and after the migration, removing the downtime requirement and the need to reconfigure client systems, as well as reducing the incidence of errors. This allows organizations to perform any type of data migration project in less time, at lower cost, and with reduced risk.