Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Introduction to Intel ®  SSR212MA Storage System (Condensed) Q3 2005
<ul><ul><li>Learning About Intel ®  Platform SSR212MA </li></ul></ul><ul><ul><ul><li>Understanding the Chassis Architectur...
Introduction to Intel ®  SSR212MA Storage System  Agenda (cont.) <ul><ul><li>System Features and Implementation (cont.) </...
Introduction to Intel ®  SSR212MA Storage System Learning More About Intel Products <ul><ul><li>Intel provides a special w...
Learning About the Intel ®  Storage System SSR212MA <ul><ul><li>Introduction </li></ul></ul><ul><ul><li>Storage System Fea...
Learning About Intel ®  Storage System SSR212MA Introduction  <ul><ul><li>Integrated storage area network (SAN) system inc...
Learning About Intel ®  Storage System SSR212MA  Features: Hardware <ul><ul><li>Support for up to 12 hot-swap SATA hard dr...
Learning About Intel ®  Storage System SSR212MA  Features: Software <ul><ul><li>Product suite provides sophisticated stora...
Learning About Intel ®  Storage System SSR212MA  Features: Software (cont.) <ul><ul><li>Volume management and provisioning...
Learning About Intel ®  Storage System SSR212MA  Storage System Contents <ul><ul><li>2U chassis integrated with </li></ul>...
Learning About Intel ®  Storage System SSR212MA  SAN Software Accessories <ul><li>Scalability package </li></ul><ul><li>Co...
Learning About Intel® Storage System SSR212MA   Spares <ul><ul><li>Cable kit (SATA bundle of 4) </li></ul></ul><ul><ul><li...
Understanding the Intel ®  Storage System SSR212MA Chassis Architecture <ul><ul><li>Chassis design characteristics </li></...
Understanding the Chassis Architecture Chassis Design Characteristics <ul><ul><li>Worldwide regulatory compliance </li></u...
Understanding the Chassis Architecture Overview of the Architecture: Common Chassis Components <ul><ul><li>Enclosures  </l...
Understanding the Chassis Architecture  Enclosures: Internal Components
Understanding the Chassis Architecture  Enclosures: Front View
Understanding the Chassis Architecture  Front Panel: LEDs <ul><ul><li>Power On </li></ul></ul><ul><ul><li>Fault </li></ul>...
Understanding the Chassis Architecture  Hard Drive Bays <ul><ul><li>Supports up to 12 hot-swap SATA hard drives </li></ul>...
Understanding the Chassis Architecture  Hot-Swap SATA Backplane <ul><ul><li>Slots provided for docking up to 12 1.5-GB/s o...
Understanding the Chassis Architecture  Disk On Module (DOM) <ul><ul><li>Ships with one 512-MB Disk On Module (DOM) instal...
Understanding the Chassis Architecture  PCI Expansion Slot <ul><ul><li>One PCI expansion slot – slot 3 </li></ul></ul><ul>...
Understanding the Chassis Architecture  Cooling Subsystem <ul><ul><li>Five 40-mm redundant hot-swappable system fans** </l...
Understanding the Chassis Architecture  Power Subsystem <ul><ul><li>500W 1+1 redundant hot-swappable power supply module (...
Understanding the Chassis Architecture  Security and Management <ul><ul><li>Security </li></ul></ul><ul><ul><ul><li>Chassi...
Understanding the Chassis Architecture  Rack Shelf Mounting <ul><ul><li>Supports cabinets that are 19 inches wide by up to...
The Intel ®  Storage System SSR212MA Board Architecture <ul><li>Tour of the functional subsystems </li></ul><ul><ul><li>In...
Understanding the Intel ®  RAID Controller SRCS28X Architecture <ul><li>Architecture overview </li></ul><ul><ul><li>Concep...
Intel ®  RAID Controller SRCS28X Conceptual Diagram
Intel ®  RAID Controller SRCS28X Summary of Components <ul><ul><li>I/O processor </li></ul></ul><ul><ul><li>SATA chipset <...
Service and Support for the Intel ®  Storage System SSR212MA <ul><ul><li>Installation guides </li></ul></ul><ul><ul><li>Pl...
Service and Support  Installation Guides <ul><li>Available on the Resource CD,  http://support.intel.com/ , and your Intel...
Service and Support  Platform Confidence Test <ul><ul><li>Executable program available via Intel ®  Support  http:// suppo...
Service and Support  SMaRT Tool <ul><ul><li>SMaRT Tool system modules consist of: </li></ul></ul><ul><ul><ul><li>Virtual S...
Service and Support  Technical Support Collateral <ul><ul><li>Product Brief </li></ul></ul><ul><ul><li>Technical Product S...
Introduction to IP SAN Management  <ul><ul><li>IP SAN overview </li></ul></ul><ul><ul><li>Product suite </li></ul></ul>
Introduction to IP SAN Management   Intel ®  Storage System IP SAN Benefits <ul><ul><li>Implementing a full-featured IP SA...
Introduction to IP SAN Management   Network and Storage Layouts Site 1 Site 2 Ethernet or  FC
Introduction to IP SAN Management  Introducing the Product Suite <ul><ul><li>Storage System Module (SSM)  </li></ul></ul><...
Introduction to IP SAN Management   Storage System Module (SSM) <ul><ul><li>High availability and reliability hardware </l...
Introduction to IP SAN Management  Storage System Software <ul><ul><li>Virtualizes multiple storage modules into a storage...
Introduction to IP SAN Management  Storage System Console
Introduction to IP SAN Management   iSCSI Client Driver for Windows <ul><ul><li>Software that connects the server to the v...
Introduction to IP SAN Management  Add-On Modules and Extensions <ul><ul><li>Scalability Package (Clustering) </li></ul></...
Introduction to IP SAN Management  Summary <ul><ul><li>Implementing an IP SAN </li></ul></ul><ul><ul><ul><li>Allows server...
Connecting and Configuring the SSM <ul><ul><li>Connecting to the Storage System Module (SSM) </li></ul></ul><ul><ul><li>Co...
Connecting and Configuring the SSM Installation Documentation <ul><ul><li>Quick Start Guide </li></ul></ul><ul><ul><li>SW ...
Connecting and Configuring the SSM Network Configuration <ul><ul><li>Use the Management Console to set up the SSM IP addre...
Connecting and Configuring the SSM Connecting to the Management Console - Windows <ul><ul><li>On the PC or laptop attached...
Connecting and Configuring the SSM Log In Using the Management Console <ul><ul><li>Press < Enter>  on the Management Conso...
Connecting and Configuring the SSM Setting Up IP Address and Gateway <ul><ul><li>Press <Tab> to navigate to the Network Se...
Connecting and Configuring the SSM Changing the Default Password <ul><ul><li>Press <Tab> to General Settings and press <En...
Connecting and Configuring the SSM Storage System Console Main Window <ul><ul><li>Network View </li></ul></ul><ul><ul><li>...
Connecting and Configuring the SSM Storage System Console Items <ul><ul><li>Primary Volume </li></ul></ul><ul><ul><li>Remo...
Connecting and Configuring the SSM Storage System Console States <ul><ul><li>SSM is manager </li></ul></ul><ul><ul><li>SSM...
Connecting and Configuring the SSM Storage System Console – Hierarchical Structure <ul><li>Available storage modules  - Ar...
Connecting and Configuring the SSM Configuration Categories <ul><ul><li>Under Edit Configuration </li></ul></ul><ul><ul><u...
Connecting and Configuring the SSM Using Module Functions <ul><ul><li>Module Information </li></ul></ul><ul><ul><li>Power ...
Connecting and Configuring the SSM Using Storage Functions
Connecting and Configuring the SSM Monitoring RAID Status <ul><li>There are four RAID states </li></ul><ul><ul><li>Normal ...
Connecting and Configuring the SSM Storage - Powering Drives On/Off <ul><ul><li>Powering On </li></ul></ul><ul><ul><ul><li...
Connecting and Configuring the SSM Using Time Functions – NTP Mode Off
Connecting and Configuring the SSM Using Time Functions – NTP Mode On <ul><ul><li>Preferred </li></ul></ul><ul><ul><ul><li...
Connecting and Configuring the SSM Using Network Functions
Connecting and Configuring the SSM Network -  TCP Status
Connecting and Configuring the SSM Network Interface Failover
Connecting and Configuring the SSM Network Bonding <ul><ul><li>NIC Aggregation and Bonding </li></ul></ul><ul><ul><li>Fail...
Connecting and Configuring the SSM Network - Jumbo Frames <ul><ul><li>Support for jumbo frames </li></ul></ul><ul><ul><ul>...
Connecting and Configuring the SSM SSM Administration - Users and Groups
Connecting and Configuring the SSM Using SNMP <ul><ul><li>Enable SNMP agent </li></ul></ul><ul><ul><li>Set up access contr...
Connecting and Configuring the SSM Using the SNMP MIB <ul><ul><li>Provides read-only access to the SSM and supports MIB-II...
Connecting and Configuring the SSM Using Reports
Connecting and Configuring the SSM Passive Report - RAID Information <ul><ul><li>Module Name - The aggregated IDE drives <...
Connecting and Configuring the SSM Reporting -  Log Files If  technical support requests that you send a copy of a log fil...
Connecting and Configuring the SSM Reporting -   Active Monitoring <ul><ul><li>Choose monitoring variable </li></ul></ul><...
Connecting and Configuring the SSM Summary <ul><ul><li>Set up a HyperTerminal configuration to access the SSM </li></ul></...
Planning for Disk Management <ul><ul><li>Disk configuration </li></ul></ul><ul><ul><li>Disk management for RAID levels </l...
Planning for Disk Management Disk Configuration – SSR316MJ2 <ul><ul><li>Maximum 16 drives (SATA) </li></ul></ul><ul><ul><l...
Planning for Disk Management Disk Configuration – SSR212MA <ul><ul><li>Maximum 12 drives (SATA) </li></ul></ul><ul><ul><li...
Planning for Disk Management Disk Status Indication <ul><ul><li>Drive LED states </li></ul></ul><ul><ul><ul><li>Solid ambe...
Planning for Disk Management   Replacing a Disk Drive <ul><ul><li>Power down the drive, first, using the Storage System Co...
Planning for Disk Management Disk Management <ul><ul><li>Supported RAID levels </li></ul></ul><ul><ul><ul><li>RAID 0 using...
Planning for Disk Management Disk Management for RAID 0 <ul><ul><li>RAID 0 </li></ul></ul><ul><ul><ul><li>Minimum drive re...
Planning for Disk Management Disk Management for RAID 1/10 <ul><ul><li>RAID 1 </li></ul></ul><ul><ul><ul><li>Minimum drive...
Planning for Disk Management Disk Management for RAID 5/50 <ul><ul><li>RAID 5 </li></ul></ul><ul><ul><ul><li>Minimum drive...
Planning for Disk Management Recommended Memory Configuration <ul><ul><li>For optimum performance - 128 MB per 250 GB driv...
Planning for Disk Management Summary <ul><ul><li>The RAID configuration you choose depends upon how you plan to use the SS...
Using Management Groups <ul><ul><li>Managers and virtual managers </li></ul></ul><ul><ul><li>Management groups </li></ul><...
Using Management Groups Management Group Overview <ul><ul><li>Is the container within which you cluster SSMs and create vo...
Using Management Groups Manager Functions <ul><ul><li>Control data replication </li></ul></ul><ul><ul><li>Keep track of sy...
Using Management Groups Stopping Managers <ul><ul><li>Is normal part of removing an SSM from a management group </li></ul>...
Using Management Groups Running Managers <ul><ul><li>To achieve optimum fault tolerance in a management group use the foll...
Using Management Groups Virtual Manager <ul><ul><li>Is a manager that is configured in the management group, but remains u...
Using Management Groups Creating a Management Group <ul><li>Under Add to New or Current Management Group </li></ul><ul><ul...
Using Management Groups Creating a Management Group (cont.) <ul><ul><li>Progress bar on the console tracks the creation pr...
Using Management Groups Editing a Management Group <ul><ul><li>Set/edit the synchronization bandwidth </li></ul></ul><ul><...
Using Management Groups Other Configuration Considerations <ul><ul><li>Reset the management group time if you change the t...
Using Management Groups   Summary <ul><ul><li>Management groups allow you to </li></ul></ul><ul><ul><li>Cluster SSMs </li>...
Using Clusters <ul><ul><li>Overview </li></ul></ul><ul><ul><li>Prerequisites </li></ul></ul><ul><ul><li>Creating a cluster...
Using Clusters Cluster Overview <ul><ul><li>Is a grouping of SSMs, within a management group, from which you create volume...
Using Clusters Cluster Prerequisites <ul><ul><li>Requires a management group </li></ul></ul><ul><ul><li>At least one manag...
Using Clusters Creating a Cluster <ul><ul><li>Cluster name </li></ul></ul><ul><ul><li>Description (optional) </li></ul></u...
Using Clusters Using iSCSI Failover <ul><ul><li>Configure a Virtual IP when using  Microsoft* iSCSI initiator  </li></ul><...
Using Clusters Using a Virtual IP <ul><ul><li>Required for iSCSI Failover </li></ul></ul><ul><ul><li>Configured on per clu...
Using Clusters Adding an SSM to a Cluster <ul><ul><li>Expands the storage for a cluster </li></ul></ul><ul><ul><li>The SSM...
Using Clusters Deleting a Cluster <ul><ul><li>Log in to the Management Group that contains the cluster you want to delete ...
Using Clusters Hot Spare in a Cluster <ul><ul><li>Is not used for data storage – ‘stands by’ in case an SSM in the cluster...
Using Clusters Summary <ul><ul><li>Consists of a sub-grouping of SSMs within a management group </li></ul></ul><ul><ul><li...
Using Volumes <ul><ul><li>Volume architecture </li></ul></ul><ul><ul><li>Volume planning </li></ul></ul><ul><ul><li>Volume...
Using Volumes Overview <ul><ul><li>Logical entity that is comprised of storage on one or more SSMs that is synonymous to  ...
Using Volumes Creating a Volume <ul><ul><li>Type </li></ul></ul><ul><ul><ul><li>Primary </li></ul></ul></ul><ul><ul><ul><l...
Using Volumes Creating a Volume (cont.) <ul><ul><li>Hard threshold </li></ul></ul><ul><ul><ul><li>The amount of physical s...
Using Volumes Planning Volume Size <ul><ul><li>Volume size is the size of the virtual device communicated to the operating...
Using Volumes Types of Volumes <ul><li>Basic </li></ul><ul><ul><li>Size=Hard Threshold, no snapshots, no auto grow </li></...
Using Volumes Planning Data Replication <ul><ul><li>Creates redundant copies of blocks that reside on different SSMs </li>...
Using Volumes How Replication Works The order in which SSMs are added to the cluster determines the order in which copies ...
Using Volumes Managing Volume Growth Capacity <ul><ul><li>Set the soft threshold value to help manage capacity growth by <...
Using Volumes Auto Grow Considerations <ul><li>Auto </li></ul><ul><ul><li>Increments start small, get large rapidly </li><...
Using Volumes Volume Considerations <ul><ul><li>Changing a cluster </li></ul></ul><ul><ul><ul><li>Must reside in the same ...
Using Volumes Authentication Groups <ul><ul><li>Are sets of application servers by </li></ul></ul><ul><ul><ul><li>Name </l...
Using Volumes Creating an Authentication Group <ul><ul><li>Name – case sensitive </li></ul></ul><ul><ul><li>Description - ...
Using Volumes Authentication Group Requirements <ul><ul><li>Prerequisites </li></ul></ul><ul><ul><ul><li>Create one or mor...
Using Volumes Volume Lists <ul><ul><li>Are lists of volumes, each with it’s own security level </li></ul></ul><ul><ul><li>...
Using Volumes Creating a Volume List <ul><ul><li>Name </li></ul></ul><ul><ul><li>Description (optional) </li></ul></ul><ul...
Using Volumes Creating a Volume List (cont.) <ul><ul><li>Set permission level </li></ul></ul>
Using Volumes Associate With an Existing Authentication Group <ul><ul><li>Select Authentication Groups tab </li></ul></ul>...
Using Volumes Associate With an Existing Authentication Group (cont.)
Using Volumes Deleting a Volume <ul><ul><li>Delete a volume to remove that data from the Module and make the space availab...
Using Volumes Volume Summary <ul><ul><li>A volume is a logical entity that is made up of storage on one or more SSMs </li>...
iSCSI <ul><ul><li>iSCSI architecture </li></ul></ul><ul><ul><li>iSCSI security </li></ul></ul>
iSCSI Overview <ul><ul><li>End-to-end protocol for transporting storage I/O block data over an IP network </li></ul></ul><...
iSCSI Ecosystem Microsoft and HP are single OS only.  Cisco and IBM support multiple OS. Microsoft Cisco HP IBM Software I...
iSCSI Architecture Application Servers with software or hardware iSCSI initiators iSCSI Initiators iSCSI Initiators send  ...
iSCSI Features <ul><ul><li>Multiple initiator access to volume </li></ul></ul><ul><ul><ul><li>Target allows connection fro...
iSCSI CHAP Concepts <ul><ul><li>Target secret </li></ul></ul><ul><ul><ul><li>Associated with volume </li></ul></ul></ul><u...
iSCSI CHAP Secrets and Security <ul><ul><li>A secret is essentially a password </li></ul></ul><ul><ul><ul><li>Target secre...
iSCSI Types of CHAP Authentication <ul><ul><li>None </li></ul></ul><ul><ul><ul><li>No CHAP processing </li></ul></ul></ul>...
iSCSI Single Host Authentication with CHAP Not Required
iSCSI Single Host Authentication with One-way CHAP
iSCSI Single Host Authentication with Two-way CHAP
iSCSI Set-up Target and Initiator Secret – SSC <ul><ul><li>Target Secrets have to be between 12 and 24 characters </li></u...
iSCSI MS iSCSI Portal Set-up
iSCSI Authentication Groups
iSCSI   Authentication Groups (cont.)
iSCSI  Set-up Target Secret: MS Initiator
iSCSI  Set-up Initiator Secret: SCC
iSCSI  Set-up Initiator Secret: MS Initiator
iSCSI  iSCSI Volume Identification
iSCSI Summary <ul><ul><li>Is an open source protocol to access a SAN </li></ul></ul><ul><ul><ul><li>Used over Ethernet </l...
Using Snapshots <ul><li>Snapshot architecture </li></ul><ul><li>Creating and configuring snapshots </li></ul><ul><li>Sched...
Using Snapshots Overview <ul><ul><li>Provides a fixed version of a volume for read only access </li></ul></ul><ul><ul><li>...
Using Snapshots   Snapshot Layered Architecture <ul><ul><li>Volume/snapshot relationship can be conceptually thought of as...
User_Data User_Data_ss1 New volume is created to hold any changed blocks Previous volume becomes Snapshot volume and is re...
User_Data New volume is created to hold any changed blocks User_Data Volume composed of MODIFIED Disk Blocks: A’, D, E Sna...
Using Snapshots   Using a Snapshot User_Data User_Data_ss1 User_Data Volume composed of MODIFIED Disk Blocks: A’, D, E Use...
Using Snapshots   Writing to a Snapshot <ul><li>Volume Branching </li></ul><ul><ul><li>Non-persistent changes  </li></ul><...
Using Snapshots Single Versus Scheduled Snapshot <ul><ul><li>Single snapshots </li></ul></ul><ul><ul><ul><li>Deleted when ...
Using Snapshots How a Snapshot Work – Sizing a Snapshot <ul><ul><li>Creates a new volume </li></ul></ul><ul><ul><ul><li>Ho...
Using Snapshots Managing Capacity <ul><ul><li>Set hard thresholds </li></ul></ul><ul><ul><ul><li>Volumes </li></ul></ul></...
Using Snapshots Auto-Grow Snapshots <ul><ul><li>Used in conjunction with scheduled snapshots to manage threshold allocatio...
Using Snapshots Data Mining or Backup Planning <ul><ul><li>Applications </li></ul></ul><ul><ul><ul><li>Source volume for d...
Using Snapshots Protection Against Data Corruption <ul><ul><li>Applications </li></ul></ul><ul><ul><ul><li>Business contin...
Using Snapshots Creating a Snapshot <ul><ul><li>Volume </li></ul></ul><ul><ul><li>Snapshot name </li></ul></ul><ul><ul><li...
Using Snapshots Rolling Back a Volume <ul><ul><li>Replaces the original volume with a read/write copy of the selected snap...
Using Snapshots How a Rollback Works <ul><ul><li>Unplug and eject current volume </li></ul></ul><ul><ul><li>Select rollbac...
Using Snapshots Mounting Snapshots of Basic Disks <ul><ul><li>Create authentication group </li></ul></ul><ul><ul><li>Assoc...
Using Snapshots Mounting Snapshots of Dynamic Disks <ul><ul><li>Create an authentication group </li></ul></ul><ul><ul><li>...
Using Snapshots Scheduling Snapshots Retention Policy
Using Snapshots Scheduling Snapshots Considerations <ul><ul><li>Coordinate retention of snapshots with cluster capacity </...
Using Snapshots Summary <ul><ul><li>Snapshots are used for </li></ul></ul><ul><ul><ul><li>Data mining or backup </li></ul>...
Using Remote Copy <ul><ul><li>Creating a remote snapshots </li></ul></ul><ul><ul><li>Scheduling a remote snapshot </li></u...
Using   Remote   Copy  Overview <ul><ul><li>Utilizes the existing volume and snapshot features along with asynchronous rep...
Using   Remote   Copy  Concepts <ul><ul><li>Primary volume </li></ul></ul><ul><ul><ul><li>Accessed by application server <...
Using   Remote   Copy  Concepts (cont.) <ul><ul><li>Remote copy pair </li></ul></ul><ul><ul><ul><li>Primary and associated...
Using Remote Copy  Procedure <ul><ul><li>Create the primary snapshot for a selected volume at production location. </li></...
Using   Remote   Copy  Prerequisites <ul><ul><li>Log into both management groups </li></ul></ul><ul><ul><ul><li>Primary vo...
Using Remote Copy  Setting the Bandwidth
Using Remote Copy  Designating or Creating a Remote Volume <ul><ul><li>Make an existing volume into a remote volume </li><...
Using Remote Copy  Viewing Remote Snapshots <ul><ul><li>Management group </li></ul></ul><ul><ul><li>Primary snapshot </li>...
Using Remote Copy  Other Remote Snapshot Tasks <ul><ul><li>Canceling a remote snapshot </li></ul></ul><ul><ul><ul><li>If y...
Using Remote Copy  Planning for Remote Snapshot Schedules <ul><ul><li>Recurrence </li></ul></ul><ul><ul><ul><li>When to cr...
Using Remote Copy  Remote Snapshot Schedule Checklist <ul><ul><li>Set snapshot schedule </li></ul></ul><ul><ul><ul><li>Sta...
Using Remote Copy  Creating a Remote Snapshot Schedule Primary Setup Remote Snapshot Schedule
Using Remote Copy  Creating a Remote Snapshot Schedule (cont.) Remote Setup
Using Remote Copy  Summary <ul><ul><li>Use the existing volume and snapshot features along with asynchronous replication a...
Planning   for   Disaster Recovery <ul><ul><li>Virtual manager </li></ul></ul><ul><ul><li>Cluster configuration </li></ul>...
Planning for Disaster Recovery Virtual Manager Overview <ul><ul><li>Minimum requirements for a fault-tolerant storage solu...
Planning for Disaster Recovery Synchronous Replication – Two Sites Primary Site Disaster Recovery Site <ul><ul><li>Configu...
Planning for Disaster Recovery Two SSM Configuration <ul><ul><li>Configure both SSMs to be managers </li></ul></ul><ul><ul...
Planning for Disaster Recovery When Not To Use a Virtual Manager <ul><ul><li>Management group is located within a single s...
Planning for Disaster Recovery Virtual Manager Requirements <ul><ul><li>Is configured in the management group but is not s...
Planning for Disaster Recovery Add/Delete Virtual Manager <ul><ul><li>Add or delete dialog box appears depending on whethe...
Planning for Disaster Recovery Verifying Virtual Manager Yes
Planning for Disaster Recovery Start/Stop Virtual Manager <ul><ul><li>Click the Start Virtual Manager control button </li>...
Planning for Disaster Recovery Configuring a Cluster for Disaster Recovery <ul><ul><li>Best practice </li></ul></ul><ul><u...
Planning for Disaster Recovery DR Cluster Configuration Scenario <ul><ul><li>Naming SSMs </li></ul></ul><ul><ul><ul><li>Us...
Planning for Disaster Recovery DR Cluster Configuration Scenario (cont.) <ul><ul><li>Create the cluster in the desired man...
Planning for Disaster Recovery DR Cluster Configuration Scenario (cont.)
Planning for Disaster Recovery Achieving Cost-Effective Disaster Recovery <ul><ul><li>Using remote copy capability </li></...
Planning for Disaster Recovery Best Practices for Remote Copy and DR <ul><ul><li>Select a recurrence schedule that minimiz...
Planning for Disaster Recovery Summary <ul><ul><li>Explanation of disaster recovery </li></ul></ul><ul><ul><li>Using a Vir...
Performance Tuning <ul><ul><li>Performance factors </li></ul></ul><ul><ul><li>Best practices </li></ul></ul>
Performance Tuning Performance Factors <ul><ul><li>The performance factors include: </li></ul></ul><ul><ul><ul><li>Replica...
Performance Tuning Replication Level <ul><ul><li>One-way (none) replication for volume </li></ul></ul><ul><ul><ul><li>High...
Performance Tuning Performance Configurations <ul><li>-RAID 0 on each SSM, multiple SSMs, 2-way replication </li></ul><ul>...
Performance Tuning Drive Buffering <ul><ul><li>Ability to enable drive buffer, or cache, within the EBSD client driver </l...
Performance Tuning Number of SSMs in Cluster <ul><ul><li>Modular approach to scaling </li></ul></ul><ul><ul><ul><li>Storag...
Performance Tuning Other Performance Factors <ul><ul><li>Network performance </li></ul></ul><ul><ul><li>Multi-threaded app...
Performance Tuning Best Practice for Replication Optimal Reduced Maximum Performance Level Optimal Maximum None Redundancy...
Performance Tuning Best Practice for Drive Buffering <ul><ul><li>Advantages </li></ul></ul><ul><ul><ul><li>Ideal for write...
Performance Tuning Performance Monitor
Summary <ul><ul><li>Performance tuning involves </li></ul></ul><ul><ul><li>Choosing RAID level </li></ul></ul><ul><ul><li>...
Upcoming SlideShare
Loading in …5
×

Mount Adams Lar

1,095 views

Published on

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

Mount Adams Lar

  1. 1. Introduction to Intel ® SSR212MA Storage System (Condensed) Q3 2005
  2. 2. <ul><ul><li>Learning About Intel ® Platform SSR212MA </li></ul></ul><ul><ul><ul><li>Understanding the Chassis Architecture </li></ul></ul></ul><ul><ul><ul><li>Understanding the Board Architecture </li></ul></ul></ul><ul><ul><ul><li>Understanding the RAID Architecture </li></ul></ul></ul><ul><ul><ul><li>Support for SSR212MA </li></ul></ul></ul><ul><ul><li>System Features and Implementation </li></ul></ul><ul><ul><ul><li>Understanding SAN Management Software </li></ul></ul></ul><ul><ul><ul><ul><li>Introduction to IP SAN Management </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Connecting and Configuring the SSM </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Planning for Disk Management </li></ul></ul></ul></ul><ul><ul><ul><li>Provisioning Using SAN Management Software </li></ul></ul></ul><ul><ul><ul><ul><li>Using Management Groups </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Using Clusters </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Using Volumes </li></ul></ul></ul></ul>Introduction to Intel ® SSR212MA Storage System Agenda
  3. 3. Introduction to Intel ® SSR212MA Storage System Agenda (cont.) <ul><ul><li>System Features and Implementation (cont.) </li></ul></ul><ul><ul><ul><li>Configuring Data Transmission Protocols </li></ul></ul></ul><ul><ul><ul><ul><li>iSCSI </li></ul></ul></ul></ul><ul><ul><ul><li>Understanding Data Protection </li></ul></ul></ul><ul><ul><ul><ul><li>Using Snapshots </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Using Remote Copy </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Planning for Disaster Recovery </li></ul></ul></ul></ul><ul><ul><ul><li>Performance Tuning </li></ul></ul></ul>
  4. 4. Introduction to Intel ® SSR212MA Storage System Learning More About Intel Products <ul><ul><li>Intel provides a special website for product support: </li></ul></ul><ul><ul><ul><li>http:// support.intel.com </li></ul></ul></ul><ul><ul><li>Site allows you to </li></ul></ul><ul><ul><ul><li>Download software, drivers, plug-ins and other utilities for Intel ® server products </li></ul></ul></ul><ul><ul><ul><li>Access product-related documentation </li></ul></ul></ul><ul><ul><ul><li>Gain contact information for technical support </li></ul></ul></ul>
  5. 5. Learning About the Intel ® Storage System SSR212MA <ul><ul><li>Introduction </li></ul></ul><ul><ul><li>Storage System Features </li></ul></ul><ul><ul><ul><li>Hardware </li></ul></ul></ul><ul><ul><ul><li>Software </li></ul></ul></ul><ul><ul><li>Storage System Contents </li></ul></ul><ul><ul><li>SAN Software Accessories </li></ul></ul><ul><ul><li>Spares </li></ul></ul>
  6. 6. Learning About Intel ® Storage System SSR212MA Introduction <ul><ul><li>Integrated storage area network (SAN) system includes system board, two SATA Host Bus Adapter cards, backplane, 500W power supply, and 2U chassis </li></ul></ul><ul><ul><li>Flexible design supports up to 12 hard drives </li></ul></ul><ul><ul><li>Software is easy-to-use, with a user-friendly GUI and a wealth of features </li></ul></ul><ul><ul><li>Configured with iSCSI connectivity </li></ul></ul>
  7. 7. Learning About Intel ® Storage System SSR212MA Features: Hardware <ul><ul><li>Support for up to 12 hot-swap SATA hard drives </li></ul></ul><ul><ul><li>Single Intel ® Xeon™ processor </li></ul></ul><ul><ul><li>Two 500W power supply modules in a 1+1 redundant configuration (unit ships with one power supply) </li></ul></ul><ul><ul><li>System cooling </li></ul></ul><ul><ul><ul><li>Five 40-mm hot-swappable redundant fans </li></ul></ul></ul><ul><ul><ul><ul><li>Three dual-rotor </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Two single-rotor </li></ul></ul></ul></ul><ul><ul><ul><li>One 60-mm fan in the power supply enclosure </li></ul></ul></ul><ul><ul><ul><li>Processor wind tunnel assembly </li></ul></ul></ul><ul><ul><li>Includes two SATA Host Bus Adapter cards </li></ul></ul><ul><ul><li>Includes an IDE Disk On Module (DOM) containing the OS and SAN application software </li></ul></ul>
  8. 8. Learning About Intel ® Storage System SSR212MA Features: Software <ul><ul><li>Product suite provides sophisticated storage management </li></ul></ul><ul><ul><ul><li>Storage System Module </li></ul></ul></ul><ul><ul><ul><li>Storage System Engine </li></ul></ul></ul><ul><ul><ul><li>Storage System Console </li></ul></ul></ul><ul><ul><li>Overview of features </li></ul></ul><ul><ul><ul><li>Volume management and provisioning </li></ul></ul></ul><ul><ul><ul><li>Over-subscription (thin provisioning) </li></ul></ul></ul><ul><ul><ul><li>Snapshots </li></ul></ul></ul><ul><ul><ul><li>Security </li></ul></ul></ul>
  9. 9. Learning About Intel ® Storage System SSR212MA Features: Software (cont.) <ul><ul><li>Volume management and provisioning </li></ul></ul><ul><ul><ul><li>Configure and provision volumes </li></ul></ul></ul><ul><ul><ul><li>Manage disk volumes on-the-fly, including hardware and software RAID controllers </li></ul></ul></ul><ul><ul><ul><li>Pool drives within the enclosure for high availability and scalability </li></ul></ul></ul><ul><ul><li>Over-subscription </li></ul></ul><ul><ul><ul><li>Create volumes that are larger than actual drive capacity </li></ul></ul></ul><ul><ul><ul><li>Save upfront disk investment until actually required </li></ul></ul></ul><ul><ul><li>Snapshots </li></ul></ul><ul><ul><ul><li>Manually create single or multiple-volume snapshots </li></ul></ul></ul><ul><ul><ul><li>Can be upgraded to allow for automatic snapshots </li></ul></ul></ul>
  10. 10. Learning About Intel ® Storage System SSR212MA Storage System Contents <ul><ul><li>2U chassis integrated with </li></ul></ul><ul><ul><ul><li>System board </li></ul></ul></ul><ul><ul><ul><li>Two SATA Host Bus Adapter cards with battery backup units </li></ul></ul></ul><ul><ul><ul><li>Single Disk On Module (DOM) attached to IDE </li></ul></ul></ul><ul><ul><ul><li>Control panel assembly </li></ul></ul></ul><ul><ul><ul><li>One 500W power supply module </li></ul></ul></ul><ul><ul><ul><li>Power distribution board </li></ul></ul></ul><ul><ul><ul><li>System cooling module (five system fans) </li></ul></ul></ul><ul><ul><ul><li>Control panel cable </li></ul></ul></ul><ul><ul><ul><li>SATA hard drive cables </li></ul></ul></ul><ul><ul><ul><li>SATA hot-swap backplane </li></ul></ul></ul><ul><ul><li>Serial configuration cable </li></ul></ul><ul><ul><li>Hard drive carriers </li></ul></ul><ul><ul><li>Hard drive labels </li></ul></ul><ul><ul><li>Rail kit </li></ul></ul><ul><ul><li>Quick Start Guide </li></ul></ul><ul><ul><li>Resource CD </li></ul></ul>
  11. 11. Learning About Intel ® Storage System SSR212MA SAN Software Accessories <ul><li>Scalability package </li></ul><ul><li>Configurable snapshot package </li></ul><ul><li>Remote data protection package </li></ul>
  12. 12. Learning About Intel® Storage System SSR212MA Spares <ul><ul><li>Cable kit (SATA bundle of 4) </li></ul></ul><ul><ul><li>Chassis (including power supply enclosure, backplane, SATA cables, interposer board, and front ops panel) </li></ul></ul><ul><ul><li>10x drive carriers (including Torx driver and HDD label set) </li></ul></ul><ul><ul><li>Interposer board (connects fan tray assembly to backplane) </li></ul></ul><ul><ul><li>Power supply cage (includes power distribution board) </li></ul></ul><ul><ul><li>Fan tray assembly (includes fan distribution board) </li></ul></ul><ul><ul><li>Packaging (flattened external box, no internal foam or inserts) </li></ul></ul><ul><ul><li>Intel ® Server Board SE7520JR2 </li></ul></ul><ul><ul><li>Intel Xeon TM processor </li></ul></ul><ul><ul><li>2U three-slot active PCI-X riser for Intel Server Board SE7520JR2 </li></ul></ul><ul><ul><li>Intel RAID Controller SRCS28X </li></ul></ul><ul><ul><li>Battery backup unit for Intel RAID Controller SRCS28X </li></ul></ul><ul><ul><li>500W power supply </li></ul></ul>
  13. 13. Understanding the Intel ® Storage System SSR212MA Chassis Architecture <ul><ul><li>Chassis design characteristics </li></ul></ul><ul><ul><ul><li>Electromagnetic compatibility </li></ul></ul></ul><ul><ul><ul><li>Cooling subsystem design </li></ul></ul></ul><ul><ul><li>Overview of the architecture </li></ul></ul>
  14. 14. Understanding the Chassis Architecture Chassis Design Characteristics <ul><ul><li>Worldwide regulatory compliance </li></ul></ul><ul><ul><ul><li>Electromagnetic compatibility </li></ul></ul></ul><ul><ul><ul><li>Safety </li></ul></ul></ul><ul><ul><li>Cooling subsystem design </li></ul></ul><ul><ul><ul><li>Thermals </li></ul></ul></ul><ul><ul><ul><li>Acoustics </li></ul></ul></ul><ul><ul><ul><li>Environmental limits </li></ul></ul></ul><ul><ul><ul><li>Server management </li></ul></ul></ul><ul><ul><ul><li>Airflow </li></ul></ul></ul>
  15. 15. Understanding the Chassis Architecture Overview of the Architecture: Common Chassis Components <ul><ul><li>Enclosures </li></ul></ul><ul><ul><ul><li>Internal components </li></ul></ul></ul><ul><ul><ul><li>Conceptual diagram </li></ul></ul></ul><ul><ul><ul><li>Front view </li></ul></ul></ul><ul><ul><ul><li>Rear view </li></ul></ul></ul><ul><ul><li>Control panel </li></ul></ul><ul><ul><ul><li>Buttons </li></ul></ul></ul><ul><ul><ul><li>LEDs </li></ul></ul></ul><ul><ul><li>Hard drive bays </li></ul></ul><ul><ul><li>Hard drive carrier </li></ul></ul><ul><ul><li>Hot-swap SATA backplane </li></ul></ul><ul><ul><li>Disk On Module (DOM) </li></ul></ul><ul><ul><li>PCI expansion slot </li></ul></ul><ul><ul><li>Cooling subsystem </li></ul></ul><ul><ul><li>Power subsystem </li></ul></ul><ul><ul><li>Security and management </li></ul></ul>
  16. 16. Understanding the Chassis Architecture Enclosures: Internal Components
  17. 17. Understanding the Chassis Architecture Enclosures: Front View
  18. 18. Understanding the Chassis Architecture Front Panel: LEDs <ul><ul><li>Power On </li></ul></ul><ul><ul><li>Fault </li></ul></ul><ul><ul><li>Enclosure ID </li></ul></ul>
  19. 19. Understanding the Chassis Architecture Hard Drive Bays <ul><ul><li>Supports up to 12 hot-swap SATA hard drives </li></ul></ul><ul><ul><li>All drives must be populated in order, from left to right and top to bottom </li></ul></ul><ul><ul><li>Drives are installed into carriers, which ship with the system </li></ul></ul><ul><ul><li>Once a RAID configuration is set up, if the drives are removed they must be reinstalled in the same location </li></ul></ul><ul><ul><li>Drive labels are included with the system </li></ul></ul>
  20. 20. Understanding the Chassis Architecture Hot-Swap SATA Backplane <ul><ul><li>Slots provided for docking up to 12 1.5-GB/s or 3.0-GB/s SATA hot-swap hard drives </li></ul></ul><ul><ul><li>Two SATA host I 2 C interfaces </li></ul></ul><ul><ul><li>SATA Specification version 1.00 compatible </li></ul></ul><ul><ul><li>Supports SAF-TE commands </li></ul></ul><ul><ul><li>256K external SRAM memory </li></ul></ul><ul><ul><li>Drive status LEDs </li></ul></ul>
  21. 21. Understanding the Chassis Architecture Disk On Module (DOM) <ul><ul><li>Ships with one 512-MB Disk On Module (DOM) installed directly to the SSR212MA baseboard’s IDE connector </li></ul></ul><ul><ul><li>The DOM includes the OS and SAN application software </li></ul></ul><ul><ul><li>System must be powered down before the DOM is removed, or data corruption could occur </li></ul></ul>
  22. 22. Understanding the Chassis Architecture PCI Expansion Slot <ul><ul><li>One PCI expansion slot – slot 3 </li></ul></ul><ul><ul><li>Supports PCI-X 133-MHz cards </li></ul></ul><ul><ul><li>Provides support for expanded Ethernet client connectivity </li></ul></ul>
  23. 23. Understanding the Chassis Architecture Cooling Subsystem <ul><ul><li>Five 40-mm redundant hot-swappable system fans** </li></ul></ul><ul><ul><ul><li>Three dual-rotor </li></ul></ul></ul><ul><ul><ul><li>Two single-rotor </li></ul></ul></ul><ul><ul><li>One 60-mm fan in the power supply enclosure </li></ul></ul><ul><ul><li>Temperature sensor </li></ul></ul><ul><ul><li>Cooling vents in drive carriers and at chassis rear </li></ul></ul><ul><ul><li>Processor wind tunnel installed for processor cooling </li></ul></ul>** See TPS for proper hot-swap procedure.
  24. 24. Understanding the Chassis Architecture Power Subsystem <ul><ul><li>500W 1+1 redundant hot-swappable power supply module (system ships with one power supply) </li></ul></ul><ul><ul><ul><li>One AC line connector per module </li></ul></ul></ul><ul><ul><ul><li>Power factor correction </li></ul></ul></ul><ul><ul><ul><li>Auto-ranging for either 100-127 VAC or 200-240 VAC </li></ul></ul></ul><ul><ul><ul><li>Each module has a single bi-color LED </li></ul></ul></ul><ul><ul><li>Power supply enclosure </li></ul></ul><ul><ul><ul><li>One 60-mm fan </li></ul></ul></ul><ul><ul><ul><li>DC-to-DC converter </li></ul></ul></ul>
  25. 25. Understanding the Chassis Architecture Security and Management <ul><ul><li>Security </li></ul></ul><ul><ul><ul><li>Chassis intrusion detection </li></ul></ul></ul><ul><ul><li>Storage System software module </li></ul></ul><ul><ul><ul><li>Temperature sensor </li></ul></ul></ul><ul><ul><ul><li>Chassis intrusion sensor </li></ul></ul></ul><ul><ul><ul><li>Managed chassis fans </li></ul></ul></ul>
  26. 26. Understanding the Chassis Architecture Rack Shelf Mounting <ul><ul><li>Supports cabinets that are 19 inches wide by up to 36 inches deep </li></ul></ul><ul><ul><li>Rack mounting rails are included with system </li></ul></ul><ul><ul><li>Brackets attach to the front and the rear of the rack </li></ul></ul><ul><ul><li>Designed to conform to the SSI Server Rack spec and EIA 310-D </li></ul></ul>
  27. 27. The Intel ® Storage System SSR212MA Board Architecture <ul><li>Tour of the functional subsystems </li></ul><ul><ul><li>Intel ® E7520 Chipset </li></ul></ul><ul><ul><li>Processor Subsystem(Single Processor Only) </li></ul></ul><ul><ul><li>Memory Subsystem (Up to 16GB but only 4GB used) </li></ul></ul><ul><ul><li>Onboard Devices: </li></ul></ul><ul><ul><ul><li>Video </li></ul></ul></ul><ul><ul><ul><li>Network </li></ul></ul></ul><ul><ul><ul><li>Parallel ATA </li></ul></ul></ul><ul><ul><ul><li>USB </li></ul></ul></ul><ul><ul><ul><li>Legacy I/O </li></ul></ul></ul><ul><ul><ul><li>Serial Port for using the Text User interface. </li></ul></ul></ul><ul><ul><li>Riser Slots </li></ul></ul><ul><ul><li>Power Connectors </li></ul></ul><ul><ul><li>Server Management </li></ul></ul><ul><ul><ul><li>BMCs </li></ul></ul></ul><ul><ul><ul><li>LEDs </li></ul></ul></ul><ul><ul><ul><li>Headers </li></ul></ul></ul><ul><ul><li>Jumpers and additional header </li></ul></ul>
  28. 28. Understanding the Intel ® RAID Controller SRCS28X Architecture <ul><li>Architecture overview </li></ul><ul><ul><li>Conceptual diagram </li></ul></ul><ul><ul><li>Summary of components </li></ul></ul>
  29. 29. Intel ® RAID Controller SRCS28X Conceptual Diagram
  30. 30. Intel ® RAID Controller SRCS28X Summary of Components <ul><ul><li>I/O processor </li></ul></ul><ul><ul><li>SATA chipset </li></ul></ul><ul><ul><li>SATA connectors - 8 </li></ul></ul><ul><ul><li>Cache memory </li></ul></ul><ul><ul><li>Battery backup module </li></ul></ul><ul><ul><li>PCI-X interface </li></ul></ul><ul><ul><li>Flash memory </li></ul></ul><ul><ul><li>Jumpers and connectors </li></ul></ul><ul><ul><li>Audible alarm </li></ul></ul><ul><ul><li>Physical characteristics </li></ul></ul>
  31. 31. Service and Support for the Intel ® Storage System SSR212MA <ul><ul><li>Installation guides </li></ul></ul><ul><ul><li>Platform Confidence Test </li></ul></ul><ul><ul><li>SMaRT Tool </li></ul></ul><ul><ul><li>Technical support </li></ul></ul><ul><ul><ul><li>Collateral </li></ul></ul></ul>
  32. 32. Service and Support Installation Guides <ul><li>Available on the Resource CD, http://support.intel.com/ , and your Intel ® Business Link account (iBL) </li></ul><ul><ul><li>Interposer Board </li></ul></ul><ul><ul><li>Disk on Memory (DOM) </li></ul></ul><ul><ul><li>Rail Kit </li></ul></ul><ul><ul><li>Power Supply Cage </li></ul></ul><ul><ul><li>Cooling Module </li></ul></ul>
  33. 33. Service and Support Platform Confidence Test <ul><ul><li>Executable program available via Intel ® Support http:// support.intel.com / and your Intel Business Link account (iBL) </li></ul></ul><ul><ul><li>Can be used to troubleshoot the system board only </li></ul></ul><ul><ul><li>Customer must create an image on a bootable USB key </li></ul></ul><ul><ul><ul><li>Boot from the USB key </li></ul></ul></ul><ul><ul><ul><li>Follow the prompts </li></ul></ul></ul>
  34. 34. Service and Support SMaRT Tool <ul><ul><li>SMaRT Tool system modules consist of: </li></ul></ul><ul><ul><ul><li>Virtual System Tour (VST) </li></ul></ul></ul><ul><ul><ul><li>“ How To Replace” procedures </li></ul></ul></ul><ul><ul><ul><li>Parts database </li></ul></ul></ul><ul><ul><li>New features for the SSR212MA </li></ul></ul><ul><ul><ul><li>Detailed procedure for performing client SAN configuration routines </li></ul></ul></ul><ul><ul><ul><li>Visuals for VST comprised of CAD models rather than traditional photography </li></ul></ul></ul><ul><ul><ul><li>To decrease cost and TTM, “How To Replace” procedures for “simple” FRUs such as memory and CPU will be linked to online manual </li></ul></ul></ul>
  35. 35. Service and Support Technical Support Collateral <ul><ul><li>Product Brief </li></ul></ul><ul><ul><li>Technical Product Specification (TPS) </li></ul></ul><ul><ul><li>Quick Start User’s Guide (QSG) </li></ul></ul><ul><ul><li>Product Guide </li></ul></ul><ul><ul><li>Specification Update </li></ul></ul><ul><ul><li>Tested Hardware and OS List (THOL) </li></ul></ul><ul><ul><li>Tested Memory List (TML) </li></ul></ul><ul><ul><li>Software User’s Manual </li></ul></ul><ul><ul><li>Software Release Notes </li></ul></ul><ul><ul><li>Interposer Board Installation Guide </li></ul></ul><ul><ul><li>Disk on Memory (DOM) Installation Guide </li></ul></ul><ul><ul><li>Rail Kit Installation Guide </li></ul></ul><ul><ul><li>Power Supply Cage Installation Guide </li></ul></ul><ul><ul><li>Fan Tray Installation Guide </li></ul></ul><ul><ul><li>Product Change Notifications </li></ul></ul>Available via Intel ® Support ( http:// support.intel.com / ) and your Intel Business Link account (iBL)
  36. 36. Introduction to IP SAN Management <ul><ul><li>IP SAN overview </li></ul></ul><ul><ul><li>Product suite </li></ul></ul>
  37. 37. Introduction to IP SAN Management Intel ® Storage System IP SAN Benefits <ul><ul><li>Implementing a full-featured IP SAN </li></ul></ul><ul><ul><ul><li>Utilizes the existing ethernet infrastructure </li></ul></ul></ul><ul><ul><ul><li>Eliminates the learning curve, expensive fibre channel components, and complexity associated with fibre channel (FC) SANs </li></ul></ul></ul><ul><ul><ul><li>Is ideal for Microsoft Exchange or Microsoft SQL Server </li></ul></ul></ul><ul><ul><ul><li>Allows server consolidation, local or geographic disaster recovery, general file services, and disk-to-disk backup projects </li></ul></ul></ul>
  38. 38. Introduction to IP SAN Management Network and Storage Layouts Site 1 Site 2 Ethernet or FC
  39. 39. Introduction to IP SAN Management Introducing the Product Suite <ul><ul><li>Storage System Module (SSM) </li></ul></ul><ul><ul><ul><li>Uses ethernet or fibre channel-based storage devices </li></ul></ul></ul><ul><ul><li>Storage System Engine Software </li></ul></ul><ul><ul><ul><li>Combines with SSMs to provide IP or FC SAN solution </li></ul></ul></ul><ul><ul><li>Centralized Management Console </li></ul></ul><ul><ul><ul><li>A centralized storage management facility </li></ul></ul></ul><ul><ul><li>Standard iSCSI support </li></ul></ul><ul><ul><ul><li>Provides access to storage </li></ul></ul></ul><ul><ul><li>Fibre channel (Qlogic only in first release) support </li></ul></ul><ul><ul><ul><li>Provides access to storage </li></ul></ul></ul>
  40. 40. Introduction to IP SAN Management Storage System Module (SSM) <ul><ul><li>High availability and reliability hardware </li></ul></ul><ul><ul><ul><li>Dual redundant, hot swappable power supplies </li></ul></ul></ul><ul><ul><ul><li>Hot-swappable drives </li></ul></ul></ul><ul><ul><ul><li>Dual NIC connectivity </li></ul></ul></ul><ul><ul><ul><li>Robust power and cooling diagnostics </li></ul></ul></ul><ul><ul><li>Modular hardware package for granular scalability </li></ul></ul><ul><ul><li>Pooled storage with centralized management </li></ul></ul>SSMs
  41. 41. Introduction to IP SAN Management Storage System Software <ul><ul><li>Virtualizes multiple storage modules into a storage pool </li></ul></ul><ul><ul><ul><li>Scales from four terabytes to hundreds of terabytes </li></ul></ul></ul><ul><ul><li>Supports an easy-to-use Graphical User Interface (GUI) </li></ul></ul><ul><ul><li>Provides sophisticated data management features, such as: </li></ul></ul><ul><ul><ul><li>Replication </li></ul></ul></ul><ul><ul><ul><li>Snapshot </li></ul></ul></ul><ul><ul><ul><li>Automated failover </li></ul></ul></ul><ul><ul><ul><li>Storage pooling </li></ul></ul></ul><ul><ul><ul><li>Virtualization </li></ul></ul></ul><ul><ul><ul><li>Remote Copy </li></ul></ul></ul>
  42. 42. Introduction to IP SAN Management Storage System Console
  43. 43. Introduction to IP SAN Management iSCSI Client Driver for Windows <ul><ul><li>Software that connects the server to the volumes created on the SAN </li></ul></ul>
  44. 44. Introduction to IP SAN Management Add-On Modules and Extensions <ul><ul><li>Scalability Package (Clustering) </li></ul></ul><ul><ul><li>Configurable Snapshot Package </li></ul></ul><ul><ul><li>Disaster Recovery Package (Remote Copy) </li></ul></ul>
  45. 45. Introduction to IP SAN Management Summary <ul><ul><li>Implementing an IP SAN </li></ul></ul><ul><ul><ul><li>Allows server consolidation and flexible allocation of storage through the use of the SSC </li></ul></ul></ul><ul><ul><ul><li>Additional storage can be added quickly and easily with no downtime to users </li></ul></ul></ul><ul><ul><ul><li>Data protection and disaster recovery functions can be managed at the volume level </li></ul></ul></ul><ul><ul><ul><li>Survive the loss of a single SSM because replication of all data is at the volume level </li></ul></ul></ul>
  46. 46. Connecting and Configuring the SSM <ul><ul><li>Connecting to the Storage System Module (SSM) </li></ul></ul><ul><ul><li>Configuring the SSM </li></ul></ul>
  47. 47. Connecting and Configuring the SSM Installation Documentation <ul><ul><li>Quick Start Guide </li></ul></ul><ul><ul><li>SW Users Information Guide </li></ul></ul><ul><ul><li>Technical Product Specification </li></ul></ul><ul><ul><li>Release Notes </li></ul></ul>
  48. 48. Connecting and Configuring the SSM Network Configuration <ul><ul><li>Use the Management Console to set up the SSM IP address manually, as summarized below </li></ul></ul><ul><ul><ul><li>Install the hardware and cables </li></ul></ul></ul><ul><ul><ul><li>Power up the module </li></ul></ul></ul><ul><ul><ul><li>Attach a PC or laptop to the SSM serial port with the provided serial cable </li></ul></ul></ul>
  49. 49. Connecting and Configuring the SSM Connecting to the Management Console - Windows <ul><ul><li>On the PC or laptop attached to the SSM, open a session with HyperTerminal or ProComm Plus terminal emulation program </li></ul></ul><ul><ul><li>Configure the following settings in the Windows terminal emulation program </li></ul></ul><ul><ul><ul><li>Bits per second = 19200 </li></ul></ul></ul><ul><ul><ul><li>Data bits = 8 </li></ul></ul></ul><ul><ul><ul><li>Parity = None </li></ul></ul></ul><ul><ul><ul><li>Stop bits = 1 </li></ul></ul></ul><ul><ul><ul><li>Flow or hardware control = None </li></ul></ul></ul><ul><ul><ul><li>Backspace key sends = Del </li></ul></ul></ul><ul><ul><ul><li>Emulation = ANSI </li></ul></ul></ul><ul><ul><li>Press <Enter> when the terminal emulation session is established </li></ul></ul><ul><ul><ul><li>A prompt appears asking you to type “start” </li></ul></ul></ul><ul><ul><li>Type start and press <Enter>. When the session is connected to the SSM, the Management Console window opens </li></ul></ul>
  50. 50. Connecting and Configuring the SSM Log In Using the Management Console <ul><ul><li>Press < Enter> on the Management Console Login screen. The Management Console opens to the Login prompt </li></ul></ul><ul><ul><li>Use the Tab key to move through the fields and menu options in the Management Console </li></ul></ul><ul><ul><li>Type in the User Name and Password found in the Quick Start Guide </li></ul></ul>
  51. 51. Connecting and Configuring the SSM Setting Up IP Address and Gateway <ul><ul><li>Press <Tab> to navigate to the Network Settings window </li></ul></ul><ul><ul><li>The cursor should be in the Hostname field. If not, tab to the field. Press <Backspace> to delete the existing text and type the desired host name. This name displays in the Storage System Console and on the network </li></ul></ul><ul><ul><li>Tab to the 3rd choice - Set IP Address Manually and press <Enter>. The IP Address, Netmask, and Gateway list opens </li></ul></ul><ul><ul><ul><li>Enter the IP address from the planning sheet in the IP Address field </li></ul></ul></ul><ul><ul><ul><li>Enter the netmask from the planning sheet in the Mask field. </li></ul></ul></ul><ul><ul><ul><li>Enter the default gateway or if there is not a gateway, use 0.0.0.0. </li></ul></ul></ul>
  52. 52. Connecting and Configuring the SSM Changing the Default Password <ul><ul><li>Press <Tab> to General Settings and press <Enter>. The General window opens </li></ul></ul><ul><ul><li>Tab to Change Password and press <Enter>. The Change Password window opens </li></ul></ul><ul><ul><li>Type in the new password and tab to the Password Confirm field </li></ul></ul><ul><ul><li>Retype the new password </li></ul></ul><ul><ul><li>Tab to OK and press <Enter>. The General window opens </li></ul></ul><ul><ul><li>Tab to Done and press <Enter>. The Management Console window opens </li></ul></ul><ul><ul><li>Tab to Log Out and press <Enter>. The Management Console entry window is displayed again. </li></ul></ul><ul><ul><li>Exit the terminal emulation session </li></ul></ul><ul><ul><li>Proceed to the installation of the Storage System Console </li></ul></ul>
  53. 53. Connecting and Configuring the SSM Storage System Console Main Window <ul><ul><li>Network View </li></ul></ul><ul><ul><li>Displays all the SSMs on the network </li></ul></ul><ul><ul><li>Tab View </li></ul></ul><ul><ul><li>Presents the functions associated with the selected item in the Network View </li></ul></ul><ul><ul><li>Alerts View – Not Shown </li></ul></ul><ul><ul><li>Provides a message area where alerts arrive from the active monitoring of the SSM </li></ul></ul>
  54. 54. Connecting and Configuring the SSM Storage System Console Items <ul><ul><li>Primary Volume </li></ul></ul><ul><ul><li>Remote Volume </li></ul></ul><ul><ul><li>Snapshot </li></ul></ul><ul><ul><li>Cluster </li></ul></ul><ul><ul><li>Management Group </li></ul></ul>
  55. 55. Connecting and Configuring the SSM Storage System Console States <ul><ul><li>SSM is manager </li></ul></ul><ul><ul><li>SSM is virtual manager </li></ul></ul><ul><ul><li>SSM is logged in </li></ul></ul><ul><ul><li>SSM is hot spare </li></ul></ul><ul><ul><li>Virtual manager not started </li></ul></ul><ul><ul><li>Volume schedule(s) has failed </li></ul></ul><ul><ul><li>Snapshot is primary </li></ul></ul><ul><ul><li>Snapshot is remote </li></ul></ul><ul><ul><li>Remote snapshot pair </li></ul></ul>
  56. 56. Connecting and Configuring the SSM Storage System Console – Hierarchical Structure <ul><li>Available storage modules - Are either available or part of a management group </li></ul><ul><li>Management Groups - Are groups of SSMs within which one or more SSMs are designated as managers </li></ul><ul><li>Clusters - Clusters are sub-groupings of SSMs within a management group </li></ul><ul><li>Volumes - Volumes are data storage areas created on clusters </li></ul><ul><li>Snapshots - Snapshots are read-only copies of volumes created at specific points in time </li></ul>
  57. 57. Connecting and Configuring the SSM Configuration Categories <ul><ul><li>Under Edit Configuration </li></ul></ul><ul><ul><ul><li>Provides specific information on a specific module </li></ul></ul></ul>
  58. 58. Connecting and Configuring the SSM Using Module Functions <ul><ul><li>Module Information </li></ul></ul><ul><ul><li>Power Off </li></ul></ul><ul><ul><li>Feature Registration </li></ul></ul><ul><ul><li>Boot Devices </li></ul></ul><ul><ul><li>Backup & Restore </li></ul></ul>
  59. 59. Connecting and Configuring the SSM Using Storage Functions
  60. 60. Connecting and Configuring the SSM Monitoring RAID Status <ul><li>There are four RAID states </li></ul><ul><ul><li>Normal </li></ul></ul><ul><ul><li>Rebuild </li></ul></ul><ul><ul><li>Degraded </li></ul></ul><ul><ul><li>Off </li></ul></ul>
  61. 61. Connecting and Configuring the SSM Storage - Powering Drives On/Off <ul><ul><li>Powering On </li></ul></ul><ul><ul><ul><li>Select the disk </li></ul></ul></ul><ul><ul><ul><li>Click OK </li></ul></ul></ul><ul><ul><ul><li>Add disk to RAID, if disk is new </li></ul></ul></ul><ul><ul><li>Powering Off </li></ul></ul><ul><ul><ul><li>Select the disk </li></ul></ul></ul><ul><ul><ul><li>Remove disk from RAID, if disk is Active </li></ul></ul></ul><ul><ul><ul><li>Click OK </li></ul></ul></ul>
  62. 62. Connecting and Configuring the SSM Using Time Functions – NTP Mode Off
  63. 63. Connecting and Configuring the SSM Using Time Functions – NTP Mode On <ul><ul><li>Preferred </li></ul></ul><ul><ul><ul><li>Can contact reliably </li></ul></ul></ul><ul><ul><li>Not Preferred </li></ul></ul><ul><ul><ul><li>Used as backup </li></ul></ul></ul>
  64. 64. Connecting and Configuring the SSM Using Network Functions
  65. 65. Connecting and Configuring the SSM Network - TCP Status
  66. 66. Connecting and Configuring the SSM Network Interface Failover
  67. 67. Connecting and Configuring the SSM Network Bonding <ul><ul><li>NIC Aggregation and Bonding </li></ul></ul><ul><ul><li>Failover </li></ul></ul><ul><ul><ul><li>Different Switches </li></ul></ul></ul><ul><ul><li>Aggregation </li></ul></ul><ul><ul><ul><li>802.3ad - Same Switch, Combined Bandwidth, NIC Fault tolerance </li></ul></ul></ul>
  68. 68. Connecting and Configuring the SSM Network - Jumbo Frames <ul><ul><li>Support for jumbo frames </li></ul></ul><ul><ul><ul><li>Larger Packets = Fewer Packets = Lower CPU Load </li></ul></ul></ul>
  69. 69. Connecting and Configuring the SSM SSM Administration - Users and Groups
  70. 70. Connecting and Configuring the SSM Using SNMP <ul><ul><li>Enable SNMP agent </li></ul></ul><ul><ul><li>Set up access control </li></ul></ul><ul><ul><ul><li>Client IP address or </li></ul></ul></ul><ul><ul><ul><li>Resolvable host name </li></ul></ul></ul><ul><ul><li>Add SNMP trap recipients </li></ul></ul>
  71. 71. Connecting and Configuring the SSM Using the SNMP MIB <ul><ul><li>Provides read-only access to the SSM and supports MIB-II compliant objects </li></ul></ul><ul><ul><li>Optionally, load SSM MIB files into the system. They display </li></ul></ul><ul><ul><ul><li>Model number </li></ul></ul></ul><ul><ul><ul><li>Serial number </li></ul></ul></ul><ul><ul><ul><li>Hard disk capacity </li></ul></ul></ul><ul><ul><ul><li>Network parameters </li></ul></ul></ul><ul><ul><ul><li>RAID configuration </li></ul></ul></ul><ul><ul><ul><li>DNS server configuration details </li></ul></ul></ul>
  72. 72. Connecting and Configuring the SSM Using Reports
  73. 73. Connecting and Configuring the SSM Passive Report - RAID Information <ul><ul><li>Module Name - The aggregated IDE drives </li></ul></ul><ul><ul><li>RAID Level – RAID 0, 1/10 or 5/50 </li></ul></ul><ul><ul><li>No. of Disks - The number of disks in the RAID device </li></ul></ul><ul><ul><li>Build/rebuild status - % complete, time remaining </li></ul></ul><ul><ul><li>Chunk Size - The read/write block size for the RAID device </li></ul></ul>
  74. 74. Connecting and Configuring the SSM Reporting - Log Files If technical support requests that you send a copy of a log file, use the Log Files tab to save the log file as a text file.
  75. 75. Connecting and Configuring the SSM Reporting - Active Monitoring <ul><ul><li>Choose monitoring variable </li></ul></ul><ul><ul><li>Choose action(s) </li></ul></ul>
  76. 76. Connecting and Configuring the SSM Summary <ul><ul><li>Set up a HyperTerminal configuration to access the SSM </li></ul></ul><ul><ul><ul><li>Connect with a serial cable </li></ul></ul></ul><ul><ul><ul><li>Assign the naming convention </li></ul></ul></ul><ul><ul><ul><li>Assign IP addresses, subnet masks </li></ul></ul></ul><ul><ul><ul><li>Verify network connectivity </li></ul></ul></ul><ul><ul><li>Use the configuration categories to configure the SSM </li></ul></ul><ul><ul><ul><li>Verify SSM RAID and disks </li></ul></ul></ul><ul><ul><ul><li>Set date/time on SSM </li></ul></ul></ul><ul><ul><ul><li>Recognize default administrative groups and users </li></ul></ul></ul><ul><ul><ul><li>To configure and use SNMP </li></ul></ul></ul><ul><ul><ul><li>Set monitoring parameters and view reports </li></ul></ul></ul><ul><ul><ul><li>Backup/restore the SSM configuration </li></ul></ul></ul>
  77. 77. Planning for Disk Management <ul><ul><li>Disk configuration </li></ul></ul><ul><ul><li>Disk management for RAID levels </li></ul></ul><ul><ul><li>Recommended memory configuration </li></ul></ul>
  78. 78. Planning for Disk Management Disk Configuration – SSR316MJ2 <ul><ul><li>Maximum 16 drives (SATA) </li></ul></ul><ul><ul><li>Drives populated from left to right </li></ul></ul><ul><ul><li>2 Intel ® SRCS28X RAID controller cards in system </li></ul></ul><ul><ul><li>Minimum configuration </li></ul></ul><ul><ul><ul><li>2 drives </li></ul></ul></ul><ul><ul><ul><li>512 MB of RAM </li></ul></ul></ul><ul><ul><ul><li>2 Intel RAID controller cards </li></ul></ul></ul>
  79. 79. Planning for Disk Management Disk Configuration – SSR212MA <ul><ul><li>Maximum 12 drives (SATA) </li></ul></ul><ul><ul><li>Drives populated from left to right, top to bottom </li></ul></ul><ul><ul><li>2 Intel ® SRCS28X RAID controller cards in system </li></ul></ul><ul><ul><li>Minimum configuration </li></ul></ul><ul><ul><ul><li>2 drives </li></ul></ul></ul><ul><ul><ul><li>512 MB of RAM </li></ul></ul></ul><ul><ul><ul><li>2 Intel RAID controller cards </li></ul></ul></ul>
  80. 80. Planning for Disk Management Disk Status Indication <ul><ul><li>Drive LED states </li></ul></ul><ul><ul><ul><li>Solid amber when drive is OFF or Faulty </li></ul></ul></ul><ul><ul><ul><li>For I/O or Identify Drive state or rebuilding stopped - Fast Blink Green (~2.5 Hz) </li></ul></ul></ul><ul><ul><ul><li>OFF when drive is Idle </li></ul></ul></ul><ul><ul><ul><li>For predicted drive fault or rebuilding - Slow Blink Green (1Hz) </li></ul></ul></ul>
  81. 81. Planning for Disk Management Replacing a Disk Drive <ul><ul><li>Power down the drive, first, using the Storage System Console (SSC) </li></ul></ul><ul><ul><li>Pull the handle out fully </li></ul></ul><ul><ul><li>Pull the drive tray out of the SSM </li></ul></ul><ul><ul><li>Replace drive </li></ul></ul><ul><ul><li>Power on the drive using the SSC </li></ul></ul><ul><ul><li>Add disk to array </li></ul></ul>Warning: If you remove a drive whose light is not amber, you may lose data.
  82. 82. Planning for Disk Management Disk Management <ul><ul><li>Supported RAID levels </li></ul></ul><ul><ul><ul><li>RAID 0 using software </li></ul></ul></ul><ul><ul><ul><li>RAID 1/10 using software </li></ul></ul></ul><ul><ul><ul><li>RAID 5/50 using software and hardware </li></ul></ul></ul>
  83. 83. Planning for Disk Management Disk Management for RAID 0 <ul><ul><li>RAID 0 </li></ul></ul><ul><ul><ul><li>Minimum drive requirements = 2 </li></ul></ul></ul><ul><ul><ul><li>SSM storage capacity = n x Drive Capacity (where n is the total number of drives in the system) </li></ul></ul></ul><ul><ul><li>Disk management </li></ul></ul><ul><ul><ul><li>Add 1 drive at a time from left to right in contiguous bay </li></ul></ul></ul><ul><ul><ul><li>System allows adding multiple drives in contiguous bay </li></ul></ul></ul>
  84. 84. Planning for Disk Management Disk Management for RAID 1/10 <ul><ul><li>RAID 1 </li></ul></ul><ul><ul><ul><li>Minimum drive requirements = 2 </li></ul></ul></ul><ul><ul><ul><li>System can lose 1 drive and still ensure data availability & accessibility </li></ul></ul></ul><ul><ul><li>RAID 10 </li></ul></ul><ul><ul><ul><li>Minimum drive requirements = 4 </li></ul></ul></ul><ul><ul><ul><li>System can lose max of n/2 drives in ‘n’ drives system and still ensure data availability & accessibility </li></ul></ul></ul><ul><ul><ul><li>Loss of drives 1 & 2 result in data loss, loss of drives 2 & 3 would not </li></ul></ul></ul><ul><ul><ul><li>Note: when n/2 disks are lost, system will allow I/O as long as SSM is up & running. If recycled in this state, system will come up with RAID in OFF state and will have to be reconfigured </li></ul></ul></ul><ul><ul><li>SSM storage capacity = n/2 x Drive Capacity where n is the total number of drives in the system </li></ul></ul>
  85. 85. Planning for Disk Management Disk Management for RAID 5/50 <ul><ul><li>RAID 5 </li></ul></ul><ul><ul><ul><li>Minimum drive requirements = 4 w/ rotating parity </li></ul></ul></ul><ul><ul><ul><li>System can lose 1 drive and still ensure data availability & accessibility </li></ul></ul></ul><ul><ul><li>RAID 50 (RAID 5 in hardware, 0 in software) </li></ul></ul><ul><ul><ul><li>Minimum drive requirements = 8 </li></ul></ul></ul><ul><ul><ul><li>Multiple RAID 5 groups (drive 1-4, 5-8, 9-12 & 13-16) </li></ul></ul></ul><ul><ul><ul><li>System can lose max of 1 drive in each of RAID 5 group & still ensure data availability and accessibility </li></ul></ul></ul><ul><ul><ul><li>Large drive support </li></ul></ul></ul><ul><ul><li>SSM storage capacity = ¾ x n x Drive Capacity, where n is the total number of drives in the system </li></ul></ul>
  86. 86. Planning for Disk Management Recommended Memory Configuration <ul><ul><li>For optimum performance - 128 MB per 250 GB drive installed </li></ul></ul><ul><ul><ul><li>Up to 4 drives – 512 MB RAM </li></ul></ul></ul><ul><ul><ul><li>5 to 8 drives – 1 GB RAM </li></ul></ul></ul><ul><ul><ul><li>9 to 12 drives – 1.5 GB RAM </li></ul></ul></ul><ul><ul><ul><li>13 to 16 drives – 2 GB RAM </li></ul></ul></ul>
  87. 87. Planning for Disk Management Summary <ul><ul><li>The RAID configuration you choose depends upon how you plan to use the SSM </li></ul></ul><ul><ul><li>Supported RAID levels </li></ul></ul><ul><ul><ul><li>RAID 0 using software </li></ul></ul></ul><ul><ul><ul><li>RAID 1/10 using software </li></ul></ul></ul><ul><ul><ul><li>RAID 5/50 using software and hardware </li></ul></ul></ul><ul><ul><li>The RAID configuration you choose for the SSM depends on your plans for data safety, data availability, and capacity growth </li></ul></ul><ul><ul><li>Use 128 MB of memory per 250 MB disk drive </li></ul></ul>
  88. 88. Using Management Groups <ul><ul><li>Managers and virtual managers </li></ul></ul><ul><ul><li>Management groups </li></ul></ul>
  89. 89. Using Management Groups Management Group Overview <ul><ul><li>Is the container within which you cluster SSMs and create volumes for storage </li></ul></ul><ul><ul><li>Can be used to </li></ul></ul><ul><ul><ul><li>Organize your SSMs into different functional groups (e.g. Oracle Applications) </li></ul></ul></ul><ul><ul><ul><li>Set up clustering managers and virtual managers </li></ul></ul></ul><ul><ul><ul><li>Provide added administrative security </li></ul></ul></ul><ul><ul><ul><li>Prevent unintentional use of storage resources </li></ul></ul></ul><ul><ul><ul><li>Separate sites geographically </li></ul></ul></ul>
  90. 90. Using Management Groups Manager Functions <ul><ul><li>Control data replication </li></ul></ul><ul><ul><li>Keep track of system status </li></ul></ul><ul><ul><li>Coordinate reconfigurations as SSMs are brought up and taken offline </li></ul></ul><ul><ul><li>Resynchronize data when SSMs fail and recover </li></ul></ul>Management Group Tab View
  91. 91. Using Management Groups Stopping Managers <ul><ul><li>Is normal part of removing an SSM from a management group </li></ul></ul><ul><ul><li>Implications of stopping managers include </li></ul></ul><ul><ul><ul><li>Quorum may be decreased </li></ul></ul></ul><ul><ul><ul><li>Fewer copies of configuration data are available </li></ul></ul></ul><ul><ul><ul><li>Fault tolerance may be lost </li></ul></ul></ul><ul><ul><ul><li>Data integrity and security may be compromised </li></ul></ul></ul>
  92. 92. Using Management Groups Running Managers <ul><ul><li>To achieve optimum fault tolerance in a management group use the following guidelines for running managers </li></ul></ul><ul><ul><ul><li>For 1 or 2 SSMs, run 1 manager </li></ul></ul></ul><ul><ul><ul><li>For 3 or 4 SSMs, run 3 managers </li></ul></ul></ul><ul><ul><ul><li>For 5 or more SSMs, run 5 managers </li></ul></ul></ul>
  93. 93. Using Management Groups Virtual Manager <ul><ul><li>Is a manager that is configured in the management group, but remains unassigned to any SSM until needed to regain quorum (majority of managers) </li></ul></ul><ul><ul><li>Supports disaster recovery scenarios by recovering a quorum, ensuring data remains accessible </li></ul></ul><ul><ul><li>Use in the following system configurations </li></ul></ul><ul><ul><ul><li>A management group across two sites </li></ul></ul></ul><ul><ul><ul><li>A management group in a single location with two SSMs </li></ul></ul></ul>
  94. 94. Using Management Groups Creating a Management Group <ul><li>Under Add to New or Current Management Group </li></ul><ul><ul><li>Type management group name </li></ul></ul><ul><ul><li>First unit in group will be a Manager </li></ul></ul><ul><ul><li>Dialog box will show IP addresses of all Managers </li></ul></ul>
  95. 95. Using Management Groups Creating a Management Group (cont.) <ul><ul><li>Progress bar on the console tracks the creation process </li></ul></ul><ul><ul><li>Manager is automatically started on the first SSM assigned </li></ul></ul>New management group with 1 st SSM
  96. 96. Using Management Groups Editing a Management Group <ul><ul><li>Set/edit the synchronization bandwidth </li></ul></ul><ul><ul><ul><li>Maximum rate per second that a manager will devote to non-application processing </li></ul></ul></ul>16384 Kb/Sec = 2MB/Sec 32768 Kb/Sec = 4MB/Sec 32768 Kb/Sec = 40MB/Sec
  97. 97. Using Management Groups Other Configuration Considerations <ul><ul><li>Reset the management group time if you change the time on an SSM running a manager </li></ul></ul><ul><ul><li>Check the Disk Setup window to verify that all the disks in the SSM are active and participating in RAID before adding it to a management group </li></ul></ul><ul><ul><li>SSMs in the management group must have static IP addresses or reserved IP addresses if using DHCP </li></ul></ul><ul><ul><li>Deleting a management group may cause the loss of all data stored on the SSMs in that group! </li></ul></ul>
  98. 98. Using Management Groups Summary <ul><ul><li>Management groups allow you to </li></ul></ul><ul><ul><li>Cluster SSMs </li></ul></ul><ul><ul><li>Create volumes for storage </li></ul></ul><ul><ul><li>Create application groups (e.g., Oracle Apps) </li></ul></ul><ul><ul><li>Enforce added administrative security </li></ul></ul><ul><ul><li>Prevent unintentional use of storage resources </li></ul></ul><ul><ul><li>Separate sites geographically </li></ul></ul>
  99. 99. Using Clusters <ul><ul><li>Overview </li></ul></ul><ul><ul><li>Prerequisites </li></ul></ul><ul><ul><li>Creating a cluster </li></ul></ul><ul><ul><li>Using iSCSI failover </li></ul></ul><ul><ul><li>Using a virtual IP </li></ul></ul><ul><ul><li>Adding an SSM to a cluster </li></ul></ul><ul><ul><li>Deleting a cluster </li></ul></ul><ul><ul><li>Hot spare in a cluster </li></ul></ul><ul><ul><li>Summary </li></ul></ul>
  100. 100. Using Clusters Cluster Overview <ul><ul><li>Is a grouping of SSMs, within a management group, from which you create volumes </li></ul></ul><ul><ul><li>Consider a cluster as a “storage pool” from which you carve volumes </li></ul></ul>
  101. 101. Using Clusters Cluster Prerequisites <ul><ul><li>Requires a management group </li></ul></ul><ul><ul><li>At least one manager </li></ul></ul><ul><ul><li>All the SSMs in a cluster must be configured alike </li></ul></ul><ul><ul><ul><li>Same RAID level </li></ul></ul></ul><ul><ul><li>Can contain SSMs with different capacities </li></ul></ul><ul><ul><ul><li>Cluster will operate equal to the smallest capacity SSM </li></ul></ul></ul>
  102. 102. Using Clusters Creating a Cluster <ul><ul><li>Cluster name </li></ul></ul><ul><ul><li>Description (optional) </li></ul></ul><ul><ul><li>Add from available SSMs </li></ul></ul><ul><ul><li>Hot spare (optional) </li></ul></ul><ul><ul><ul><li>Time out value </li></ul></ul></ul><ul><ul><li>iSCSI virtual IP information </li></ul></ul>
  103. 103. Using Clusters Using iSCSI Failover <ul><ul><li>Configure a Virtual IP when using Microsoft* iSCSI initiator </li></ul></ul><ul><ul><li>Allows access to volumes through other SSMs in the cluster </li></ul></ul><ul><ul><li>Virtual IP </li></ul></ul><ul><ul><ul><li>IP Address </li></ul></ul></ul><ul><ul><ul><li>Subnet Mask </li></ul></ul></ul><ul><ul><ul><li>Default Gateway </li></ul></ul></ul>
  104. 104. Using Clusters Using a Virtual IP <ul><ul><li>Required for iSCSI Failover </li></ul></ul><ul><ul><li>Configured on per cluster basis </li></ul></ul><ul><ul><li>Must be unique to all SSMs on the Network </li></ul></ul><ul><ul><ul><li>It is an “extra” IP </li></ul></ul></ul><ul><ul><li>A single SSM in a cluster will acquire the Virtual IP </li></ul></ul><ul><ul><ul><li>It will then retain it’s own IP plus host the VIP </li></ul></ul></ul><ul><ul><li>When an SSM Failure occurs, VIP Moves to the next available SSM in the cluster within 30 sec </li></ul></ul><ul><ul><li>Initiators must be configured to connect to VIP for Failover to work </li></ul></ul>
  105. 105. Using Clusters Adding an SSM to a Cluster <ul><ul><li>Expands the storage for a cluster </li></ul></ul><ul><ul><li>The SSM must be a member of the management group that already contains the cluster </li></ul></ul><ul><ul><li>Capacity of the SSM should match the capacity of the other SSMs in the cluster </li></ul></ul><ul><ul><ul><li>Adding a smaller capacity SSM reduces the capacity of the entire cluster </li></ul></ul></ul>
  106. 106. Using Clusters Deleting a Cluster <ul><ul><li>Log in to the Management Group that contains the cluster you want to delete </li></ul></ul><ul><ul><li>Select the cluster you want to delete </li></ul></ul><ul><ul><li>Click Delete Cluster on the Details tab. A confirmation message opens. If the message says that the cluster is in use, you must delete the snapshots and volumes on the cluster first </li></ul></ul><ul><ul><li>Click OK. The cluster is deleted and the SSMs return to the management group as available </li></ul></ul>
  107. 107. Using Clusters Hot Spare in a Cluster <ul><ul><li>Is not used for data storage – ‘stands by’ in case an SSM in the cluster goes down </li></ul></ul><ul><ul><li>Is automatically activated by a manager and the data starts to migrate to the new SSM if an SSM in the cluster goes down </li></ul></ul><ul><ul><li>Only 1 per cluster </li></ul></ul><ul><ul><li>The hot spare SSM must be equal to or greater in size than the other SSMs in the cluster </li></ul></ul>Hot Spare Exchange Cluster A cluster must contain at least 3 SSMs to have one SSM designated as a hot spare .
  108. 108. Using Clusters Summary <ul><ul><li>Consists of a sub-grouping of SSMs within a management group </li></ul></ul><ul><ul><li>Consider a cluster as a storage pool from which you carve volumes </li></ul></ul><ul><ul><li>For iSCSI failover use a virtual IP </li></ul></ul><ul><ul><li>Can use an SSM as a hot spare </li></ul></ul>
  109. 109. Using Volumes <ul><ul><li>Volume architecture </li></ul></ul><ul><ul><li>Volume planning </li></ul></ul><ul><ul><li>Volume configuration </li></ul></ul>
  110. 110. Using Volumes Overview <ul><ul><li>Logical entity that is comprised of storage on one or more SSMs that is synonymous to </li></ul></ul><ul><ul><ul><li>LUN </li></ul></ul></ul><ul><ul><ul><li>Virtual disk </li></ul></ul></ul><ul><ul><ul><li>Disk target </li></ul></ul></ul><ul><ul><li>Volume prerequisites </li></ul></ul><ul><ul><ul><li>A management group must exist </li></ul></ul></ul><ul><ul><ul><li>At least one cluster exists in the given management group </li></ul></ul></ul>
  111. 111. Using Volumes Creating a Volume <ul><ul><li>Type </li></ul></ul><ul><ul><ul><li>Primary </li></ul></ul></ul><ul><ul><ul><li>Disaster recovery </li></ul></ul></ul><ul><ul><li>Cluster </li></ul></ul><ul><ul><li>Replication level </li></ul></ul><ul><ul><ul><li>The number of copies of the data to create on SSMs in the cluster </li></ul></ul></ul><ul><ul><li>Replication priority </li></ul></ul><ul><ul><ul><li>Set volume availability if replication level can not be maintained </li></ul></ul></ul><ul><ul><ul><li>Note: Volumes with Availability stay online even if replication is not possible </li></ul></ul></ul><ul><ul><li>Size </li></ul></ul><ul><ul><ul><li>Defaults to total capacity available on the cluster </li></ul></ul></ul><ul><ul><ul><li>The logical storage size of the volume </li></ul></ul></ul>
  112. 112. Using Volumes Creating a Volume (cont.) <ul><ul><li>Hard threshold </li></ul></ul><ul><ul><ul><li>The amount of physical space allocated for actual data storage </li></ul></ul></ul><ul><ul><li>Soft threshold </li></ul></ul><ul><ul><ul><li>The amount of space used on the volume that triggers a warning alert </li></ul></ul></ul><ul><ul><li>Auto Grow </li></ul></ul><ul><ul><ul><li>Volume grows as needed by Auto or Manual </li></ul></ul></ul><ul><ul><li>Checksum </li></ul></ul><ul><ul><ul><li>Whether to use check summing to verify data transmissions </li></ul></ul></ul>
  113. 113. Using Volumes Planning Volume Size <ul><ul><li>Volume size is the size of the virtual device communicated to the operating system and the applications </li></ul></ul><ul><ul><li>Several categories </li></ul></ul><ul><ul><ul><li>Volumes that are smaller than the storage capacity of the clusters </li></ul></ul></ul><ul><ul><ul><li>Volumes that are equal in size to the storage capacity of the cluster </li></ul></ul></ul><ul><ul><ul><li>Volumes that are larger than the storage capacity </li></ul></ul></ul><ul><ul><li>An assigned hard threshold cannot be exceeded </li></ul></ul>
  114. 114. Using Volumes Types of Volumes <ul><li>Basic </li></ul><ul><ul><li>Size=Hard Threshold, no snapshots, no auto grow </li></ul></ul><ul><li>Typical </li></ul><ul><ul><li>Size=Hard Threshold, snapshot schedule enabled, auto grow </li></ul></ul><ul><li>Advanced </li></ul><ul><ul><li>Size>Hard Threshold, snapshot schedule enabled, auto grow </li></ul></ul>
  115. 115. Using Volumes Planning Data Replication <ul><ul><li>Creates redundant copies of blocks that reside on different SSMs </li></ul></ul><ul><ul><li>Up to 3-way replication </li></ul></ul><ul><ul><li>Replication level can not exceed the number of SSMs in the cluster </li></ul></ul><ul><ul><li>Recommended default – 2-way replication </li></ul></ul>3-way, 2-way (recommended) or none 5 or more 3-way, 2-way (recommended) or none 3 or 4 2-way or none. 2 None 1 Replication Levels Allowed Number of SSMs
  116. 116. Using Volumes How Replication Works The order in which SSMs are added to the cluster determines the order in which copies of data are written to the volume. Dynamic Pool Dynamic Pool Dynamic Pool Pool Member 1 RAID 0 Pool Member 2 RAID 0 Pool Member 3 RAID 0 Pool Member 4 RAID 0 B1 B2 B3 B4 B4 4 Blocks of Data Replication = 1 4 Blocks of Data Replication = 2 4 Blocks of Data Replication = 3 B4 B1 B1 B2 B2 B3 B3 B4 B4 B1 B1 B2 B2 B3 B3 B1 B2 B3 B4
  117. 117. Using Volumes Managing Volume Growth Capacity <ul><ul><li>Set the soft threshold value to help manage capacity growth by </li></ul></ul><ul><ul><ul><li>Creating the volume and designating the size </li></ul></ul></ul><ul><ul><ul><li>Setting the hard threshold to the same size as the actual volume size (best practice if not using snapshots) </li></ul></ul></ul><ul><ul><ul><li>Setting the soft threshold lower than the hard threshold </li></ul></ul></ul><ul><ul><ul><li>Increasing the volume size, as well as the hard and soft threshold, when you receive an alert </li></ul></ul></ul><ul><ul><ul><li>Using Auto Grow to adjust size, when needed </li></ul></ul></ul>
  118. 118. Using Volumes Auto Grow Considerations <ul><li>Auto </li></ul><ul><ul><li>Increments start small, get large rapidly </li></ul></ul><ul><ul><li>After max of 10 auto-grows, volume is full-size </li></ul></ul><ul><li>Manual </li></ul><ul><ul><li>Hard & soft threshold are incremented by the same, customer-specified amount </li></ul></ul><ul><ul><li>Increment must at least 1% of volume length or 1MB, whichever is greater </li></ul></ul><ul><ul><li>Avoid the use of tiny increments </li></ul></ul>Volume length 1/2 1/4 1/64 1/8 3/4
  119. 119. Using Volumes Volume Considerations <ul><ul><li>Changing a cluster </li></ul></ul><ul><ul><ul><li>Must reside in the same management group </li></ul></ul></ul><ul><ul><ul><li>Must have sufficient unallocated space for the hard threshold and replication level of the volume being moved </li></ul></ul></ul><ul><ul><li>Changing replication level </li></ul></ul><ul><ul><ul><li>Must have sufficient SSMs and unallocated space to support a new replication level </li></ul></ul></ul><ul><ul><li>Changing volume size </li></ul></ul><ul><ul><ul><li>Must be sufficient unallocated space in the cluster </li></ul></ul></ul><ul><ul><ul><li>Move the volume to a cluster that has enough unallocated space </li></ul></ul></ul><ul><ul><ul><li>Add an SSM to the cluster </li></ul></ul></ul>
  120. 120. Using Volumes Authentication Groups <ul><ul><li>Are sets of application servers by </li></ul></ul><ul><ul><ul><li>Name </li></ul></ul></ul><ul><ul><ul><li>IP address </li></ul></ul></ul><ul><ul><ul><li>Subnet </li></ul></ul></ul><ul><ul><li>Can have a volume list assigned </li></ul></ul><ul><ul><li>Are associated with a management group </li></ul></ul><ul><ul><li>Equivalent to hosts in a router </li></ul></ul>
  121. 121. Using Volumes Creating an Authentication Group <ul><ul><li>Name – case sensitive </li></ul></ul><ul><ul><li>Description - optional </li></ul></ul><ul><ul><li>iSCSI </li></ul></ul><ul><ul><ul><li>Choose access level for group </li></ul></ul></ul><ul><ul><li>CHAP mode </li></ul></ul><ul><ul><li>Fibre Channel </li></ul></ul><ul><ul><ul><li>Requires separate group for each volume </li></ul></ul></ul><ul><ul><ul><li>Choose access level for group </li></ul></ul></ul>
  122. 122. Using Volumes Authentication Group Requirements <ul><ul><li>Prerequisites </li></ul></ul><ul><ul><ul><li>Create one or more authentication groups at the management group level </li></ul></ul></ul><ul><ul><ul><li>Create one or more clusters in that management group </li></ul></ul></ul><ul><ul><ul><li>Create one or more volumes in that cluster </li></ul></ul></ul><ul><ul><li>Requirements for associations to volumes </li></ul></ul><ul><ul><ul><li>Only one authentication group should have read/write access to a volume. Multiple can be assigned but only one will have control </li></ul></ul></ul><ul><ul><ul><li>Multiple authentication groups can have simultaneous read-only access </li></ul></ul></ul>SQL_VOL Backup_App – read/write DB_Report – read-only Accounting – read-only Authentication Groups
  123. 123. Using Volumes Volume Lists <ul><ul><li>Are lists of volumes, each with it’s own security level </li></ul></ul><ul><ul><li>Have one or more Auth Group assigned </li></ul></ul><ul><ul><li>Are associated with a single management group </li></ul></ul><ul><ul><li>Assign access to volumes and grant </li></ul></ul><ul><ul><ul><li>No access </li></ul></ul></ul><ul><ul><ul><li>Read-only access </li></ul></ul></ul><ul><ul><ul><li>Read and Write access </li></ul></ul></ul><ul><ul><li>Equivalent to custom maps in a router </li></ul></ul>
  124. 124. Using Volumes Creating a Volume List <ul><ul><li>Name </li></ul></ul><ul><ul><li>Description (optional) </li></ul></ul><ul><ul><li>Add volumes to the volume list </li></ul></ul>
  125. 125. Using Volumes Creating a Volume List (cont.) <ul><ul><li>Set permission level </li></ul></ul>
  126. 126. Using Volumes Associate With an Existing Authentication Group <ul><ul><li>Select Authentication Groups tab </li></ul></ul><ul><ul><li>Select authentication groups to add to this volume list </li></ul></ul>
  127. 127. Using Volumes Associate With an Existing Authentication Group (cont.)
  128. 128. Using Volumes Deleting a Volume <ul><ul><li>Delete a volume to remove that data from the Module and make the space available </li></ul></ul><ul><ul><li>Delete all snapshots associated with the volume </li></ul></ul><ul><ul><li>Stop applications from accessing the volume </li></ul></ul><ul><ul><li>Disable the drives on the host </li></ul></ul><ul><ul><ul><li>Warnings </li></ul></ul></ul><ul><ul><ul><li>Deleting a volume removes that volume’s data permanently from the SSM </li></ul></ul></ul><ul><ul><ul><li>Deleting a Fibre Channel volume requires a reboot of Windows* server 2000 and Windows* server 2003 systems </li></ul></ul></ul>
  129. 129. Using Volumes Volume Summary <ul><ul><li>A volume is a logical entity that is made up of storage on one or more SSMs </li></ul></ul><ul><ul><li>Volumes can be used as raw data storage or can be formatted with a file system and used by a host or file server </li></ul></ul><ul><ul><li>You create volumes on clusters of one or more modules </li></ul></ul><ul><ul><li>Volumes are assigned a size, hard threshold, and soft threshold </li></ul></ul>
  130. 130. iSCSI <ul><ul><li>iSCSI architecture </li></ul></ul><ul><ul><li>iSCSI security </li></ul></ul>
  131. 131. iSCSI Overview <ul><ul><li>End-to-end protocol for transporting storage I/O block data over an IP network </li></ul></ul><ul><ul><li>Expands and extends SAN storage </li></ul></ul><ul><ul><li>One network platform for LANs, NAS, SANs </li></ul></ul><ul><ul><li>Includes </li></ul></ul><ul><ul><ul><li>Servers (initiators) </li></ul></ul></ul><ul><ul><ul><li>Storage devices (targets) </li></ul></ul></ul><ul><ul><ul><li>Protocol transfer gateway devices </li></ul></ul></ul><ul><ul><ul><li>Ethernet switches </li></ul></ul></ul><ul><ul><ul><li>Ethernet routers </li></ul></ul></ul>
  132. 132. iSCSI Ecosystem Microsoft and HP are single OS only. Cisco and IBM support multiple OS. Microsoft Cisco HP IBM Software Initiators Protocol conversion gateways for bridging FC SANs over IP and providing IP connectivity to FC SANs SANRAD Cisco McData Routers or Gateways Protocol conversion blades on FC switches for IP connectivity to FC SAN McData Cisco Switches with iSCSI blades TCP/IP & iSCSI protocol on a chip. Required for 10 Gig-E. Adaptec Alacritech Intel Siliquent QLogic Silverback iSCSI Chips Used for connecting servers with iSCSI to FC or SCSI disk arrays Stonefly Intransa iSCSI concentrator Competitive storage arrays in the market LeftHand Networks EMC Network Appliance EqualLogic iSCSI-attached Storage Arrays Most of these HBAs are new and only support Windows and Linux. QLogic supports Solaris too. Adaptec QLogic Emulex Intel Hardware/Firmware Adaptors (NICs, HBAs, TOEs) Comments Vendors Product
  133. 133. iSCSI Architecture Application Servers with software or hardware iSCSI initiators iSCSI Initiators iSCSI Initiators send data to any SSM running iSCSI target software Target SSM writes data to all SSMs in the Cluster iSCSI Target Data Map
  134. 134. iSCSI Features <ul><ul><li>Multiple initiator access to volume </li></ul></ul><ul><ul><ul><li>Target allows connection from any number of initiators </li></ul></ul></ul><ul><ul><ul><li>Volume access is controlled by initiator </li></ul></ul></ul><ul><ul><ul><ul><li>Overridden using challenge handshake authentication protocol (CHAP) </li></ul></ul></ul></ul><ul><ul><ul><li>Can be used to host cluster servers such as Oracle* Real Application Clusters </li></ul></ul></ul><ul><ul><li>iSNS </li></ul></ul>
  135. 135. iSCSI CHAP Concepts <ul><ul><li>Target secret </li></ul></ul><ul><ul><ul><li>Associated with volume </li></ul></ul></ul><ul><ul><ul><ul><li>Target authenticates initiator </li></ul></ul></ul></ul><ul><ul><ul><li>Required for initiator use of volume </li></ul></ul></ul><ul><ul><li>Initiator secret </li></ul></ul><ul><ul><ul><li>Associated with iSCSI client </li></ul></ul></ul><ul><ul><ul><ul><li>Initiator authenticates target </li></ul></ul></ul></ul><ul><ul><ul><li>Required for target authentication </li></ul></ul></ul>
  136. 136. iSCSI CHAP Secrets and Security <ul><ul><li>A secret is essentially a password </li></ul></ul><ul><ul><ul><li>Target secret  system password </li></ul></ul></ul><ul><ul><ul><li>Initiator secret  client authenticates system </li></ul></ul></ul><ul><ul><li>Security features </li></ul></ul><ul><ul><ul><li>Secrets are not sent over network </li></ul></ul></ul><ul><ul><ul><ul><li>Challenges are encoded binary strings </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Responses are binary md5 hash values </li></ul></ul></ul></ul><ul><ul><ul><li>Secret must be known at both ends </li></ul></ul></ul><ul><ul><ul><ul><li>Security is in secret management policies </li></ul></ul></ul></ul>
  137. 137. iSCSI Types of CHAP Authentication <ul><ul><li>None </li></ul></ul><ul><ul><ul><li>No CHAP processing </li></ul></ul></ul><ul><ul><ul><li>Disallowed if CHAP configured for target </li></ul></ul></ul><ul><ul><li>One-way </li></ul></ul><ul><ul><ul><li>Only Target authenticates initiator </li></ul></ul></ul><ul><ul><ul><li>Fails if no target secret set </li></ul></ul></ul><ul><ul><li>Two-way </li></ul></ul><ul><ul><ul><li>Initiator authenticates initiator and target </li></ul></ul></ul><ul><ul><ul><li>Fails if no initiator secret set </li></ul></ul></ul><ul><ul><li>No provision for initiator authenticate target only </li></ul></ul>
  138. 138. iSCSI Single Host Authentication with CHAP Not Required
  139. 139. iSCSI Single Host Authentication with One-way CHAP
  140. 140. iSCSI Single Host Authentication with Two-way CHAP
  141. 141. iSCSI Set-up Target and Initiator Secret – SSC <ul><ul><li>Target Secrets have to be between 12 and 24 characters </li></ul></ul>
  142. 142. iSCSI MS iSCSI Portal Set-up
  143. 143. iSCSI Authentication Groups
  144. 144. iSCSI Authentication Groups (cont.)
  145. 145. iSCSI Set-up Target Secret: MS Initiator
  146. 146. iSCSI Set-up Initiator Secret: SCC
  147. 147. iSCSI Set-up Initiator Secret: MS Initiator
  148. 148. iSCSI iSCSI Volume Identification
  149. 149. iSCSI Summary <ul><ul><li>Is an open source protocol to access a SAN </li></ul></ul><ul><ul><ul><li>Used over Ethernet </li></ul></ul></ul><ul><ul><ul><ul><li>LANs </li></ul></ul></ul></ul><ul><ul><ul><ul><li>WANs </li></ul></ul></ul></ul><ul><ul><ul><ul><li>SANs </li></ul></ul></ul></ul><ul><ul><li>Capability to enable several layers of security </li></ul></ul><ul><ul><ul><li>One-way CHAP </li></ul></ul></ul><ul><ul><ul><li>Two-way CHAP </li></ul></ul></ul>
  150. 150. Using Snapshots <ul><li>Snapshot architecture </li></ul><ul><li>Creating and configuring snapshots </li></ul><ul><li>Scheduling snapshots </li></ul><ul><li>Scripting snapshots </li></ul>
  151. 151. Using Snapshots Overview <ul><ul><li>Provides a fixed version of a volume for read only access </li></ul></ul><ul><ul><li>Snapshot Requirements </li></ul></ul><ul><ul><ul><li>Management group </li></ul></ul></ul><ul><ul><ul><li>Cluster </li></ul></ul></ul><ul><ul><ul><li>Created volumes </li></ul></ul></ul><ul><ul><li>Snapshots are used for </li></ul></ul><ul><ul><ul><li>Data mining or backup </li></ul></ul></ul><ul><ul><ul><li>Data or file system preservation </li></ul></ul></ul><ul><ul><ul><li>Protection against data or file system corruption </li></ul></ul></ul><ul><ul><ul><li>File level restore without tape or backup software </li></ul></ul></ul>
  152. 152. Using Snapshots Snapshot Layered Architecture <ul><ul><li>Volume/snapshot relationship can be conceptually thought of as “layers” </li></ul></ul><ul><ul><li>Space is allocated from the storage pool to accommodate snapshots </li></ul></ul><ul><ul><li>User_Data_ss1 is the base line snapshot, the volume is read only </li></ul></ul><ul><ul><li>User_Data_ss2 contains the deltas since User_Data_ss1 was created </li></ul></ul><ul><ul><li>User_Data contains the deltas since User_Data_ss2 was created </li></ul></ul><ul><ul><li>The User_Data volume is comprised of User_Data + User_Data_ss2 + User_Data_ss1 </li></ul></ul>User_Data User_Data_ss1 User_Data_ss2
  153. 153. User_Data User_Data_ss1 New volume is created to hold any changed blocks Previous volume becomes Snapshot volume and is read only Using Snapshots How a Snapshot Works All Operations Transparent to the Operating System and the User Community User_Data Volume composed of Disk Blocks: A, B, C User_Data Volume composed of MODIFIED Disk Blocks User_Data Mounted as Drive U
  154. 154. User_Data New volume is created to hold any changed blocks User_Data Volume composed of MODIFIED Disk Blocks: A’, D, E Snapshot volume becomes read only User_Data_ss2 NEW User_Data Volume composed of MODIFIED Disk Blocks: Using Snapshots How a Snapshot Works (cont.) All Operations Transparent to the Operating System and the User Community User_Data_ss1 Snapshot volume is read only User_Data Volume composed of Disk Blocks: A, B, C User_Data Mounted as Drive U
  155. 155. Using Snapshots Using a Snapshot User_Data User_Data_ss1 User_Data Volume composed of MODIFIED Disk Blocks: A’, D, E User_Data_ss2 NEW User_Data Volume composed of MODIFIED Disk Blocks: An Executive come to the IT department and says they accidentally deleted a file. The file from yesterday is the one they need. With a snapshot you can mount the snapshot on to a server and allow the exec to access a previous version of the file. User_Data Volume composed of Disk Blocks: A, B, C User_Data Mounted as Drive U User_Data-ss2 Mounted as Drive Z
  156. 156. Using Snapshots Writing to a Snapshot <ul><li>Volume Branching </li></ul><ul><ul><li>Non-persistent changes </li></ul></ul><ul><ul><li>Created upon client connect </li></ul></ul><ul><ul><li>Deleted upon deleting snapshot or deleting writable space </li></ul></ul>Volume Snapshot Snapshot Snapshot Writable snapshot
  157. 157. Using Snapshots Single Versus Scheduled Snapshot <ul><ul><li>Single snapshots </li></ul></ul><ul><ul><ul><li>Deleted when no longer needed </li></ul></ul></ul><ul><ul><li>Schedule snapshot </li></ul></ul><ul><ul><ul><li>Series of snapshots up to a specified number </li></ul></ul></ul><ul><ul><ul><li>For a specified time period </li></ul></ul></ul><ul><ul><ul><ul><li>Earliest snapshot is deleted when new one is created </li></ul></ul></ul></ul>
  158. 158. Using Snapshots How a Snapshot Work – Sizing a Snapshot <ul><ul><li>Creates a new volume </li></ul></ul><ul><ul><ul><li>Holds all the changed blocks </li></ul></ul></ul><ul><ul><li>Allocates space in storage pool </li></ul></ul><ul><ul><li>Use the auto grow feature to keep snapshot volume usage close to allocation </li></ul></ul>Original volume Size – 100G HardTh – 100G SoftTh – 80G Snapshot volume Size – 100G HardTh – 5G SoftTh – 2.5G
  159. 159. Using Snapshots Managing Capacity <ul><ul><li>Set hard thresholds </li></ul></ul><ul><ul><ul><li>Volumes </li></ul></ul></ul><ul><ul><ul><li>Snapshots </li></ul></ul></ul><ul><ul><li>Compensate for snapshot deletion </li></ul></ul><ul><ul><ul><li>20% for changes </li></ul></ul></ul>
  160. 160. Using Snapshots Auto-Grow Snapshots <ul><ul><li>Used in conjunction with scheduled snapshots to manage threshold allocation more efficiently </li></ul></ul><ul><ul><li>Hard and soft thresholds automatically grow by a specified number of megabytes </li></ul></ul>Snapshot volume Size – 100G HardTh – 5G SoftTh – 2.5G Auto Grow is set to grow the snapshot volume by 500 MB when the soft threshold is reached Snapshot Growth Size – 100G HardTh – 5.5G SoftTh – 3G
  161. 161. Using Snapshots Data Mining or Backup Planning <ul><ul><li>Applications </li></ul></ul><ul><ul><ul><li>Source volume for data mining and backup </li></ul></ul></ul><ul><ul><ul><li>Data preservation before software upgrade </li></ul></ul></ul><ul><ul><li>Planning </li></ul></ul><ul><ul><ul><li>Sufficient space in cluster to create the snapshot </li></ul></ul></ul><ul><ul><ul><li>Compensating for snapshot deletions </li></ul></ul></ul>
  162. 162. Using Snapshots Protection Against Data Corruption <ul><ul><li>Applications </li></ul></ul><ul><ul><ul><li>Business continuance </li></ul></ul></ul><ul><ul><ul><li>Data protection </li></ul></ul></ul><ul><ul><li>Planning </li></ul></ul><ul><ul><ul><li>Sufficient space in cluster to create the snapshots </li></ul></ul></ul><ul><ul><ul><li>Compensating for snapshot deletions </li></ul></ul></ul><ul><ul><ul><li>Minimum hard threshold size </li></ul></ul></ul>
  163. 163. Using Snapshots Creating a Snapshot <ul><ul><li>Volume </li></ul></ul><ul><ul><li>Snapshot name </li></ul></ul><ul><ul><li>Description (optional) </li></ul></ul><ul><ul><li>Hard threshold </li></ul></ul><ul><ul><ul><li>Setting it smaller than the size of the original volume allows you to create snapshots that require less space on the cluster </li></ul></ul></ul><ul><ul><li>Soft threshold </li></ul></ul><ul><ul><li>Auto Grow </li></ul></ul>
  164. 164. Using Snapshots Rolling Back a Volume <ul><ul><li>Replaces the original volume with a read/write copy of the selected snapshot </li></ul></ul><ul><ul><li>Offers DR support where snapshot is last “known good” state of data </li></ul></ul><ul><ul><li>Snapshot must be verified </li></ul></ul><ul><ul><li>Requires volume name change </li></ul></ul>
  165. 165. Using Snapshots How a Rollback Works <ul><ul><li>Unplug and eject current volume </li></ul></ul><ul><ul><li>Select rollback volume </li></ul></ul><ul><ul><li>Rollback volume twice to preserve naming convention </li></ul></ul>User_Data Mounted as Local Drive User_Data_ss1 Snapshot volume is read only User_Data Volume composed of Disk Blocks: A, B, C User_Data Volume composed of MODIFIED Disk Blocks: A’, D, E Snapshot volume is read only User_Data_ss2 User_Data Volume created to hold any changed blocks User_Data Volume composed of MODIFIED Disk Blocks: A’’, B’, E’, F
  166. 166. Using Snapshots Mounting Snapshots of Basic Disks <ul><ul><li>Create authentication group </li></ul></ul><ul><ul><li>Associate authentication group to snapshot </li></ul></ul><ul><ul><ul><li>Read only </li></ul></ul></ul><ul><ul><li>Configure client access to snapshot </li></ul></ul><ul><ul><ul><li>Read only </li></ul></ul></ul><ul><ul><li>Read only volumes and snapshots appear to be read/write </li></ul></ul>
  167. 167. Using Snapshots Mounting Snapshots of Dynamic Disks <ul><ul><li>Create an authentication group </li></ul></ul><ul><ul><li>Associate authentication group to snapshot </li></ul></ul><ul><ul><ul><li>Read only </li></ul></ul></ul><ul><ul><li>Configure client access to snapshot </li></ul></ul><ul><ul><ul><li>Read only </li></ul></ul></ul><ul><ul><li>Snapshot must have one of the following </li></ul></ul><ul><ul><ul><li>Mounted on separate server as parent volume </li></ul></ul></ul><ul><ul><ul><li>Parent volume must be disabled/deleted </li></ul></ul></ul><ul><ul><li>Import foreign disks if volume is shown as foreign </li></ul></ul>
  168. 168. Using Snapshots Scheduling Snapshots Retention Policy
  169. 169. Using Snapshots Scheduling Snapshots Considerations <ul><ul><li>Coordinate retention of snapshots with cluster capacity </li></ul></ul><ul><ul><li>Sufficient capacity is needed in the cluster for both snapshots </li></ul></ul><ul><ul><ul><li>The scheduled snapshot will not be created </li></ul></ul></ul><ul><ul><ul><li>The schedule will not continue until an existing snapshot is deleted </li></ul></ul></ul><ul><ul><li>Observe the best practices guidelines in the application note for your target application </li></ul></ul>
  170. 170. Using Snapshots Summary <ul><ul><li>Snapshots are used for </li></ul></ul><ul><ul><ul><li>Data mining or backup </li></ul></ul></ul><ul><ul><ul><li>Data or file system preservation before upgrading software </li></ul></ul></ul><ul><ul><ul><li>Protection against data or file system corruption </li></ul></ul></ul><ul><ul><ul><li>File level restore without tape or backup software </li></ul></ul></ul><ul><ul><li>Snapshots can be </li></ul></ul><ul><ul><ul><li>Created </li></ul></ul></ul><ul><ul><ul><li>Deleted </li></ul></ul></ul><ul><ul><ul><li>Edited </li></ul></ul></ul><ul><ul><ul><li>Scripted </li></ul></ul></ul><ul><ul><ul><li>Scheduled </li></ul></ul></ul>
  171. 171. Using Remote Copy <ul><ul><li>Creating a remote snapshots </li></ul></ul><ul><ul><li>Scheduling a remote snapshot </li></ul></ul>
  172. 172. Using Remote Copy Overview <ul><ul><li>Utilizes the existing volume and snapshot features along with asynchronous replication across geographic distance to create remote snapshots </li></ul></ul><ul><ul><li>Use Remote Copy for </li></ul></ul><ul><ul><ul><li>Business continuance/disaster recovery </li></ul></ul></ul><ul><ul><ul><li>Off-site backup and recovery </li></ul></ul></ul><ul><ul><ul><li>Split mirror </li></ul></ul></ul><ul><ul><ul><li>Data migration </li></ul></ul></ul><ul><ul><ul><li>Content distribution </li></ul></ul></ul>
  173. 173. Using Remote Copy Concepts <ul><ul><li>Primary volume </li></ul></ul><ul><ul><ul><li>Accessed by application server </li></ul></ul></ul><ul><ul><ul><li>Backed up with remote IP copy </li></ul></ul></ul><ul><ul><li>Primary snapshot </li></ul></ul><ul><ul><ul><li>Located on primary volume cluster </li></ul></ul></ul><ul><ul><ul><li>Created with remote snapshot </li></ul></ul></ul><ul><ul><li>Remote volume </li></ul></ul><ul><ul><ul><li>Pointer for copy of primary snapshot </li></ul></ul></ul><ul><ul><ul><li>Contains no data </li></ul></ul></ul><ul><ul><li>Remote snapshot </li></ul></ul><ul><ul><ul><li>Located on remote volume cluster </li></ul></ul></ul><ul><ul><ul><li>Copy of primary snapshot </li></ul></ul></ul>
  174. 174. Using Remote Copy Concepts (cont.) <ul><ul><li>Remote copy pair </li></ul></ul><ul><ul><ul><li>Primary and associated remote volume </li></ul></ul></ul><ul><ul><li>Failover </li></ul></ul><ul><ul><ul><li>Transfer of application server operation from primary to remote volume </li></ul></ul></ul><ul><ul><li>Failback </li></ul></ul><ul><ul><ul><li>Restoration of primary volume </li></ul></ul></ul><ul><ul><ul><li>Failover volume converted back to remote volume </li></ul></ul></ul><ul><ul><li>Failover recovery </li></ul></ul><ul><ul><ul><li>User choice for designating primary volume </li></ul></ul></ul><ul><ul><li>Synchronize </li></ul></ul><ul><ul><ul><li>Copy of latest snapshot from primary to remote volume </li></ul></ul></ul>
  175. 175. Using Remote Copy Procedure <ul><ul><li>Create the primary snapshot for a selected volume at production location. </li></ul></ul><ul><ul><li>Create a remote volume at the remote location and then create a remote snapshot linked to the primary snapshot. </li></ul></ul><ul><ul><li>System copies data from the primary snapshot to the remote snapshot. </li></ul></ul>
  176. 176. Using Remote Copy Prerequisites <ul><ul><li>Log into both management groups </li></ul></ul><ul><ul><ul><li>Primary volume </li></ul></ul></ul><ul><ul><ul><li>Target cluster for the remote snapshot </li></ul></ul></ul><ul><ul><li>Set up the bandwidth for copying the remote snapshot </li></ul></ul><ul><ul><li>Designate or create a remote volume </li></ul></ul><ul><ul><li>Ensure enough space is available for the remote snapshot </li></ul></ul>
  177. 177. Using Remote Copy Setting the Bandwidth
  178. 178. Using Remote Copy Designating or Creating a Remote Volume <ul><ul><li>Make an existing volume into a remote volume </li></ul></ul><ul><ul><ul><li>A snapshot of all existing data will be created for that volume </li></ul></ul></ul><ul><ul><ul><li>All the data in that volume will be deleted so that the remote volume will have zero length and zero hard and soft thresholds </li></ul></ul></ul><ul><ul><li>Create a remote volume </li></ul></ul>
  179. 179. Using Remote Copy Viewing Remote Snapshots <ul><ul><li>Management group </li></ul></ul><ul><ul><li>Primary snapshot </li></ul></ul><ul><ul><li>Remote management group </li></ul></ul><ul><ul><li>Remote snapshot </li></ul></ul><ul><ul><li>Status of the copying (% complete) </li></ul></ul>
  180. 180. Using Remote Copy Other Remote Snapshot Tasks <ul><ul><li>Canceling a remote snapshot </li></ul></ul><ul><ul><ul><li>If you cancel a remote snapshot in progress, the remote snapshot is deleted but the primary snapshot remains </li></ul></ul></ul><ul><ul><li>Editing a remote snapshot </li></ul></ul><ul><ul><ul><li>Description </li></ul></ul></ul><ul><ul><ul><li>Hard and soft thresholds </li></ul></ul></ul><ul><ul><li>Deleting a remote snapshot </li></ul></ul><ul><ul><li>Note: When the connection between a primary and remote snapshot is lost, it pauses. When the connection is restored it starts from where it left off </li></ul></ul>
  181. 181. Using Remote Copy Planning for Remote Snapshot Schedules <ul><ul><li>Recurrence </li></ul></ul><ul><ul><ul><li>When to create snapshots </li></ul></ul></ul><ul><ul><li>Thresholds </li></ul></ul><ul><ul><ul><li>Sufficient space for remote snapshots </li></ul></ul></ul><ul><ul><li>Retention </li></ul></ul><ul><ul><ul><li>How long to retain primary and remote snapshots </li></ul></ul></ul><ul><ul><li>Time Required </li></ul></ul><ul><ul><ul><li>Recommended having two remote snapshots of the primary volume </li></ul></ul></ul><ul><ul><ul><li>Increased time </li></ul></ul></ul>
  182. 182. Using Remote Copy Remote Snapshot Schedule Checklist <ul><ul><li>Set snapshot schedule </li></ul></ul><ul><ul><ul><li>Start time </li></ul></ul></ul><ul><ul><ul><li>Recurrence – yes or no </li></ul></ul></ul><ul><ul><li>Primary setup </li></ul></ul><ul><ul><ul><li>Set hard threshold </li></ul></ul></ul><ul><ul><ul><li>Set soft threshold </li></ul></ul></ul><ul><ul><ul><li>Retention </li></ul></ul></ul><ul><ul><ul><ul><li>Set either the maximum number of snapshots or the period of time to retain them </li></ul></ul></ul></ul><ul><ul><li>Remote setup </li></ul></ul><ul><ul><ul><li>Choose management group to contain the remote snapshot </li></ul></ul></ul><ul><ul><ul><li>Choose volume for the remote snapshots </li></ul></ul></ul><ul><ul><ul><li>Retention </li></ul></ul></ul><ul><ul><ul><ul><li>Set either the maximum number of snapshots or the period of time to retain them </li></ul></ul></ul></ul>
  183. 183. Using Remote Copy Creating a Remote Snapshot Schedule Primary Setup Remote Snapshot Schedule
  184. 184. Using Remote Copy Creating a Remote Snapshot Schedule (cont.) Remote Setup
  185. 185. Using Remote Copy Summary <ul><ul><li>Use the existing volume and snapshot features along with asynchronous replication across geographic distance to create remote snapshots </li></ul></ul><ul><ul><li>Creating a remote copy follows a three-step process </li></ul></ul><ul><ul><ul><li>Create a snapshot of the primary volume </li></ul></ul></ul><ul><ul><ul><li>Create a volume at the remote location for a snapshot linked to the primary snapshot </li></ul></ul></ul><ul><ul><ul><li>Copy data from the primary snapshot to the remote snapshot </li></ul></ul></ul>
  186. 186. Planning for Disaster Recovery <ul><ul><li>Virtual manager </li></ul></ul><ul><ul><li>Cluster configuration </li></ul></ul><ul><ul><li>Best practices </li></ul></ul>
  187. 187. Planning for Disaster Recovery Virtual Manager Overview <ul><ul><li>Minimum requirements for a fault-tolerant storage solution </li></ul></ul><ul><ul><ul><li>Two-way replication for data redundancy </li></ul></ul></ul><ul><ul><ul><li>Management group with three configured managers </li></ul></ul></ul><ul><ul><li>Virtual manager is used for two configurations </li></ul></ul><ul><ul><ul><li>Synchronous replication between two sites </li></ul></ul></ul><ul><ul><ul><li>Two SSMs in the management group </li></ul></ul></ul>
  188. 188. Planning for Disaster Recovery Synchronous Replication – Two Sites Primary Site Disaster Recovery Site <ul><ul><li>Configure even number of managers in the management group </li></ul></ul><ul><ul><li>Configure equal number per site </li></ul></ul><ul><ul><li>For this example, configure: </li></ul></ul><ul><ul><ul><li>Four (4) managers, two in each location </li></ul></ul></ul><ul><ul><ul><li>One (1) virtual manager </li></ul></ul></ul>
  189. 189. Planning for Disaster Recovery Two SSM Configuration <ul><ul><li>Configure both SSMs to be managers </li></ul></ul><ul><ul><li>Configure a virtual manager in the management group </li></ul></ul><ul><ul><li>Quorum value for this configuration is three (3) </li></ul></ul>Quorum Value = 3 (1 Manager + 1 Manager + Virtual Manager)
  190. 190. Planning for Disaster Recovery When Not To Use a Virtual Manager <ul><ul><li>Management group is located within a single site with reliable and redundant network connectivity </li></ul></ul><ul><ul><li>Management group is spread across three (3) or more sites with reliable, redundant, and no single point of failure in WAN/MAN links on the network </li></ul></ul><ul><ul><li>Using asynchronous replication between two or more sites </li></ul></ul>Virtual Manager
  191. 191. Planning for Disaster Recovery Virtual Manager Requirements <ul><ul><li>Is configured in the management group but is not started on an SSM until the management group experiences a failure and loss of quorum </li></ul></ul><ul><ul><li>Cannot be added after quorum has been lost </li></ul></ul><ul><ul><li>Management group, or geographical location, with at least one regular manager running </li></ul></ul>
  192. 192. Planning for Disaster Recovery Add/Delete Virtual Manager <ul><ul><li>Add or delete dialog box appears depending on whether or not a virtual manager has been added </li></ul></ul><ul><ul><li>Use virtual manager icon (black triangle) to verify it has been added to the management group </li></ul></ul>Virtual Manager icon
  193. 193. Planning for Disaster Recovery Verifying Virtual Manager Yes
  194. 194. Planning for Disaster Recovery Start/Stop Virtual Manager <ul><ul><li>Click the Start Virtual Manager control button </li></ul></ul><ul><ul><li>Select the SSM to run the virtual manager on </li></ul></ul>
  195. 195. Planning for Disaster Recovery Configuring a Cluster for Disaster Recovery <ul><ul><li>Best practice </li></ul></ul><ul><ul><ul><li>Configure the cluster to have all data replicated at each site </li></ul></ul></ul><ul><ul><ul><li>Configure the managers to correctly handle disaster recovery </li></ul></ul></ul>Sample, Two Site Configuration Denver Boulder
  196. 196. Planning for Disaster Recovery DR Cluster Configuration Scenario <ul><ul><li>Naming SSMs </li></ul></ul><ul><ul><ul><li>Use host names that identify in the Storage System Console where each is located </li></ul></ul></ul><ul><ul><li>Planning Managers/Virtual Manager </li></ul></ul><ul><ul><ul><li>Plan to start two managers per site </li></ul></ul></ul><ul><ul><ul><li>Add a virtual manager to the management group </li></ul></ul></ul>Denver Boulder Denver_1 Denver_2 Boulder_1 Boulder_2
  197. 197. Planning for Disaster Recovery DR Cluster Configuration Scenario (cont.) <ul><ul><li>Create the cluster in the desired management group </li></ul></ul><ul><ul><li>Add the SSMs to the cluster in alternating order </li></ul></ul><ul><ul><ul><li>First SSM – Denver_1 </li></ul></ul></ul><ul><ul><ul><li>Second SSM – Boulder_1 </li></ul></ul></ul><ul><ul><ul><li>Third SSM – Denver_2 </li></ul></ul></ul><ul><ul><ul><li>Fourth SSM – Boulder_2 </li></ul></ul></ul>Boulder Denver_1 Denver_2 Boulder_1 Boulder_2 Volume Replication=2-way One Copy One Copy Denver
  198. 198. Planning for Disaster Recovery DR Cluster Configuration Scenario (cont.)
  199. 199. Planning for Disaster Recovery Achieving Cost-Effective Disaster Recovery <ul><ul><li>Using remote copy capability </li></ul></ul><ul><ul><ul><li>Maintain copies of data volumes at remote sites </li></ul></ul></ul><ul><ul><ul><li>Set up a schedule for creating remote copies </li></ul></ul></ul><ul><ul><ul><li>Access the latest remote copy of your data volumes if a site becomes unavailable </li></ul></ul></ul>10km Fibre Channel DR Challenge
  200. 200. Planning for Disaster Recovery Best Practices for Remote Copy and DR <ul><ul><li>Select a recurrence schedule that minimizes potential for data loss </li></ul></ul><ul><ul><li>Use remote snapshots in conjunction with local synchronous volume replication </li></ul></ul><ul><li>Sample Configuration </li></ul><ul><ul><li>Create a cluster of three SSMs, all with Managers, in the production location. </li></ul></ul><ul><ul><li>Create volumes on the cluster and set the replication level to 3. </li></ul></ul><ul><ul><li>Schedule remote snapshots for: recurrence = 4 hours and retention = 2 days. </li></ul></ul>
  201. 201. Planning for Disaster Recovery Summary <ul><ul><li>Explanation of disaster recovery </li></ul></ul><ul><ul><li>Using a Virtual Manager </li></ul></ul><ul><ul><li>Cluster disaster recovery planning considerations </li></ul></ul><ul><ul><li>Achieving cost-effective disaster recovery using remote copy capabilities </li></ul></ul>
  202. 202. Performance Tuning <ul><ul><li>Performance factors </li></ul></ul><ul><ul><li>Best practices </li></ul></ul>
  203. 203. Performance Tuning Performance Factors <ul><ul><li>The performance factors include: </li></ul></ul><ul><ul><ul><li>Replication level </li></ul></ul></ul><ul><ul><ul><li>RAID Level </li></ul></ul></ul><ul><ul><ul><li>Drive buffering </li></ul></ul></ul><ul><ul><ul><li>Number of drives per Storage System Module (SSM) </li></ul></ul></ul><ul><ul><ul><li>Number of SSMs per cluster </li></ul></ul></ul>
  204. 204. Performance Tuning Replication Level <ul><ul><li>One-way (none) replication for volume </li></ul></ul><ul><ul><ul><li>Highest performance </li></ul></ul></ul><ul><ul><ul><li>No data redundancy </li></ul></ul></ul><ul><ul><li>Two-way replication for volume </li></ul></ul><ul><ul><ul><li>Optimal performance </li></ul></ul></ul><ul><ul><ul><li>Data redundancy </li></ul></ul></ul><ul><ul><li>Three-way replication for volume </li></ul></ul><ul><ul><ul><li>Reduced performance </li></ul></ul></ul><ul><ul><ul><li>Maximum data redundancy </li></ul></ul></ul>
  205. 205. Performance Tuning Performance Configurations <ul><li>-RAID 0 on each SSM, multiple SSMs, 2-way replication </li></ul><ul><li>-RAID 10 on each SSM, multiple SSMs, no replication </li></ul><ul><li>-RAID 5 on each SSM, multiple SSMs, no replication </li></ul><ul><li>-RAID 10 on each SSM, single SSM, no replication </li></ul><ul><li>-RAID 0 on each SSM, multiple SSMs, 3-way replication </li></ul><ul><li>-RAID 5 on each SSM, single SSM, no replication </li></ul>RAID 0 with two-way replication and a minimum of two SSMs provides optimal performance and redundancy Three SSMs is the optimal base configuration for a balance of performance and redundancy. Performance
  206. 206. Performance Tuning Drive Buffering <ul><ul><li>Ability to enable drive buffer, or cache, within the EBSD client driver </li></ul></ul><ul><ul><li>Take advantage of Gigabit Ethernet throughput capabilities </li></ul></ul>
  207. 207. Performance Tuning Number of SSMs in Cluster <ul><ul><li>Modular approach to scaling </li></ul></ul><ul><ul><ul><li>Storage is added to a cluster in discrete chunks </li></ul></ul></ul><ul><ul><ul><li>Each discrete chunk provides more resources </li></ul></ul></ul><ul><ul><li>Performance of the storage pool scales up as one adds more SSMs to a storage pool </li></ul></ul><ul><ul><li>Mount adams does not scale when adding SSMs for sequential applications. Random does scale. </li></ul></ul>
  208. 208. Performance Tuning Other Performance Factors <ul><ul><li>Network performance </li></ul></ul><ul><ul><li>Multi-threaded applications </li></ul></ul><ul><ul><li>Server hardware </li></ul></ul><ul><ul><li>Block size </li></ul></ul><ul><ul><li>File system characteristics </li></ul></ul>
  209. 209. Performance Tuning Best Practice for Replication Optimal Reduced Maximum Performance Level Optimal Maximum None Redundancy Level Two-way Three-way One-way Replication Level Default Redundancy Performance Strategy
  210. 210. Performance Tuning Best Practice for Drive Buffering <ul><ul><li>Advantages </li></ul></ul><ul><ul><ul><li>Ideal for write intensive applications </li></ul></ul></ul><ul><ul><ul><li>Full use of Gigabit Ethernet </li></ul></ul></ul><ul><ul><ul><li>Up to 4x performance increase </li></ul></ul></ul><ul><ul><li>Disadvantages </li></ul></ul><ul><ul><ul><li>Risk of data loss </li></ul></ul></ul><ul><ul><ul><li>Added infrastructure costs </li></ul></ul></ul><ul><ul><ul><ul><li>Uninterruptible power supply (UPS) </li></ul></ul></ul></ul>
  211. 211. Performance Tuning Performance Monitor
  212. 212. Summary <ul><ul><li>Performance tuning involves </li></ul></ul><ul><ul><li>Choosing RAID level </li></ul></ul><ul><ul><li>Deciding whether to use drive buffering </li></ul></ul><ul><ul><li>Selecting the number of SSMs </li></ul></ul><ul><ul><li>Selecting the right strategy </li></ul></ul><ul><ul><ul><li>Performance </li></ul></ul></ul><ul><ul><ul><li>Redundancy </li></ul></ul></ul><ul><ul><li>Knowing your existing infrastructure </li></ul></ul>

×