Ibm Xiv Storage System Technical Overview: Americas Advanced Technical Support
Ibm Xiv Storage System Technical Overview: Americas Advanced Technical Support
Ibm Xiv Storage System Technical Overview: Americas Advanced Technical Support
Technical Overview
Americas Advanced Technical Support
Alison Pate patea@us.ibm.com
Brian Sherman bsherman@ca.ibm.com
Hank Sautter sautter@us.ibm.com
Jim Sedgwick jsedgwic@us.ibm.com
Manageability
Installation Planning
Thin Provisioning
High Performance, flexible Snapshots
Remote Replication
Browser based management
Built in Data migration
Switch 1 Switch 2
Software Functions
Thin Provisioning
Snapshot
Synchronous Mirroring
Data Migration
Switching
Node 1 Node 2
Data Module 3
Node 3
User does not plan the layout of the volumes relative to physical drive
resources
– Cluster Maps
• Grouping of several hosts together that have the same mapping to all of the
hosts
• Mapping of volumes to LUN identifiers is defined per cluster
• Applies concurrently to all the hosts in the cluster
• No way to define different mappings for different hosts belonging to the
same cluster
Read and Write cache are implemented as part of the Data Module function
Traditional approach
– Dedicated Hot spare drives
With the IBM XIV Storage System, each disk is utilizing 85% of its space
– The system provides enough hot spare capacity to tolerate a sequence of three disk failures
and one module failure, all while still providing redundancy
Scrubbing
– Early detection of media errors through background testing of disk drive blocks
– One partition is examined every second
Each of the other disks contain 1% of any other disk in other modules
All disks start to send data to each other until the system is fully redundant
again
– Concurrently, 168 disks are reading, 179 disks are writing
Analysis and
Failure occurs Filtering at
XIV Server
Scrubbed
Event event sent
Generated to RETAIN
Escalation to
development
Analysis and
Failure occurs Filtering at
XIV Server
Scrubbed
Event event sent
Generated to RETAIN
Customer SSR
XIV notified
notified (email or dispatched
(via email)
SNMP)
Escalation to Notify account
level 3 or technical
development advisor (TA)
Software Functions
– Thin Provisioning
– Snapshot
– Synchronous Mirroring
– Data Migration
Advantages
– Never resize a volume
– Pay for storage only when really needed
– Never pay because of over-estimation
– Reduce power and cooling costs
– Keep users happy
Considerations
– Used capacity must be monitored carefully
– Additional capacity must be added in time
Snapshot deletion
– Snapshots are deleted in order to provide more physical space for volumes
– Snapshot copy deletion is based on the deletion priority and creation time
Volume locking
• After all clones are deleted
• All volumes in the Storage Pool are locked (read only or no I/O)
• Other Storage Pools are unaffected
Redirect-on-write processing
– Each Data Module handles copy process
• Ensures consistent performance A B C D Original data
– When a write request occurs
• Data originally associated with the source
remains in place
• New data is written to a different location on Snapshot image is set
A B C D
of pointers to source
disk
data.
• After the write request is completed and
acknowledged, original data is associated Redirect on Write Modify A, D
with the Target to ensure T0 integrity
• Newly written data is associated with the A B C D A’ D’
Source
– The original data is never copied
Modified data is
written to a new
A B C D location. Snapshot
pointers still point to
original data.
Source Target
Need to take a consistent point-in-time snapshot of all the
volumes in the group
S2 T2
S3 T3
Using IBM XIV Storage System, one can:
– Take a concurrent Snapshot of all volumes in a group
– Treat the group of Snapshots created as one entity Source Target
S4 T4
Synchronized Volumes
– Remote Mirror is operational
– Deactivate Mirror is atomic
– Switch Roles is possible
Unsynchronized Volumes
– Caused by conditions that prevent writing to the secondary
– Change Roles is possible for recovery
– Synchronization can be initiated in either direction
Inconsistent Volumes
– Secondary state during synchronization process
– Last Consistent snapshot preserves previous state
Documentation
XCLI
– Introduction
– Installation
– Setup
– Commands
Role Based Access Controls
– Introduction
– Roles and Permissions
– User Configurations
– User Groups
– Auditing
GUI
Generate a XCLI config file You choose a unique name to describe system
The command "help command=help format=full" will show the help message of the Nextra system.
The configurations are stored in a file under the user's home directory.
A different file can be specified by -f or --file switch (applicable to configuration
creation, configration deletion, listing configurations and command execution). Alternatively,
the environment variable NEXTRA_CONFIG_FILE, if defined, determines the file's name and path.
set NEXTRA_XCLIUSER=tester
set NEXTRA_XCLIPASSWORD=tester’s_password
:: create a pool
xcli -c %myconfig% pool_create pool=%mypool% size=2400 snapshot_size=600
Application Create snapshots of specifically assigned Typically manage applications that run on a particular application
Administrator volumes or server. Default privileges limited to specific volumes on a server.
Typical functions:
Map their own snapshots to specifically
assigned hosts. Manage backup environments
Delete their own snapshots. – Create snapshot for backups
– Map snapshot to backup server
– Delete snapshot after backup is complete
– Update snapshot for new content within a volume
Storage Has permission to perform all functions Storage managers are responsible for all administration functions.
Administrator on GUI and XCLI except:
Only the predefined administrator,
One predefined Storage Administrator user called: admin
“admin”, can change the passwords of
other users Initial password: adminadmin
Create a user
– Role
• Storage Administrator
• Application Administrator
• Read Only
– Name
• Lower case
– Password
• Case sensitive
• Not shown in user lists
• Users can change their own passwords
• Change via CLI or GUI
• 6-12 characters (a-z, A-Z, 0-9)
– Email
– SMS
– access_all – application admin. user has privileges to all volumes
32 users maximum
Probably
Primary Icons
System
Monitor
Pools
Volumes
Hosts and LUNs
Remote Mirroring
Access
Planning
– Physical Site
– System configuration
Delivery
Install Day Activities
Presale and pre-install Solution Assurance TDAs (previously know as SARs) are mandatory
for all first in customer location orders
– Presale TDA… is a review of a completed solution design prior to presentation to the customer. Technical
SMEs (ATS, CSE, others qualified) who are not involved in the solution design participate to provide
guidance and determine:
• Is the proposal complete and will it work?
• Will it meet customer requirements & expectations?
– Account teams developing the proposal can refer to the Solution Assurance Product Review (SAPR) guide
as a resource to help them prepare a sound proposal.
– Pre-install TDA… takes place after the order is placed and prior to installation. Technical SMEs assist in
evaluating the planning and preparation completed by the account team and customer to insure
readiness to install, implement, and support the solution.
• Account teams utilize the SAPR guide as a planning checklist with the customer in preparation for
a successful installation
• SAPR guide checklist is used during TDA reviews – open issues are identified and actions are logged
and tracked to closure.
The IBM XIV Storage System SAPR Guide will be posted at:
– IBM: http://w3-03.ibm.com/support/assure/assur30i.nsf/WebIndex/SA830
– Partnerworld: http://partners.boulder.ibm.com/src/assur30i.nsf/WebIndex/SA830
For more information and WW Contacts see the Solution Assurance Website:
– IBM: http://w3-03.ibm.com/support/assure/assur30i.nsf/Web/SA
– Partnerworld: http://partners.boulder.ibm.com/src/assur30i.nsf/Web/SA
– Two ventilation tiles in front of Rack 9801 US/Canada/LA/AP line cord Two Both $$ -- 0 / 99
Shipping
– Ship as one unit
– Dimensions
• 105 x 124 x 212 centimeters (41 x 49 x 84 inches)
• Cooling Tiles
• Cable Cutouts
• Service Clearances
Interface Module 4
Interface Module 5
Interface Module 6
Delivery – US only
– Instruct customers to inspect crate
• No external damage
• Tilt and shock indicators
– Trucking company (McCollisters – US only) will uncrate
– Trucking company will wheel system to location of installation
• Clear and level path from truck to building entrance
• No steps
• Clearance for upright rack from truck to building, doors and elevators
• Instruct customers to sign for delivery AFTER all the above is completed
IBM Storage Optimization, Integration, and Data Mobility Services from IBM Global
Technology Services:
– IBM Storage Optimization and Integration Services
• http://www.ibm.com/services/storageopt
– IBM Data Mobility Services
• http://www.ibm.com/services/datamobility
– For additional information or to request these services, visit
• http://www-935.ibm.com/services/us/index.wss/itservice/its/a1000416
IBM Storage Implementation, Data Replication, and Upgrade/Migration Services from IBM
STG Lab Services
– IBM XIV Storage System Smoothstart Planning and Implementation Services
– IBM XIV Storage System Snapshot Replication Configuration Services
– IBM XIV Storage System Upgrade and Migration Services
– For additional information or to request these or other custom services:
• Send an e-mail to storsvcs@us.ibm.com
• Visit the following Web site and click on '"Contact now'" to submit your inquiry or request
– http://www.ibm.com/systems/services/labservices/labservices_storage.html
Not all common law marks used by IBM are listed on this page. Failure of a mark to appear does not mean that IBM does not use the mark nor does it mean that the product is not
actively marketed or is not significant within its relevant market.
Those trademarks followed by ® are registered trademarks of IBM in the United States; all others are trademarks or common law marks of IBM in the United States.
*, AS/400®, e business(logo)®, DBE, ESCO, eServer, FICON, IBM®, IBM (logo)®, iSeries®, MVS, OS/390®, pSeries®, RS/6000®, S/30, VM/ESA®, VSE/ESA,
WebSphere®, xSeries®, z/OS®, zSeries®, z/VM®, System i, System i5, System p, System p5, System x, System z, System z9®, BladeCenter®
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries.
Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license therefrom.
Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.
Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel
Corporation or its subsidiaries in the United States and other countries.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.
ITIL is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office.
IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency, which is now part of the Office of Government Commerce.
* All other products may be trademarks or registered trademarks of their respective companies.
Notes:
Performance is in Internal Throughput Rate (ITR) ratio based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput that any user will
experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed.
Therefore, no assurance can be given that an individual user will achieve throughput improvements equivalent to the performance ratios stated here.
IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply.
All customer examples cited or described in this presentation are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual
environmental costs and performance characteristics will vary depending on individual customer configurations and conditions.
This publication was produced in the United States. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to change without
notice. Consult your local IBM business contact for information on the product or services available in your area.
All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.
Information about non-IBM products is obtained from the manufacturers of those products or their published announcements. IBM has not tested those products and cannot confirm the performance,
compatibility, or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.
Prices subject to change without notice. Contact your IBM representative or Business Partner for the most current pricing in your geography.