IBM XIV Storage System: Product Overview Chapter 15
Total Page:16
File Type:pdf, Size:1020Kb
IBM XIV Storage System Version 11.5.1 Product Overview GC27-3912-07 Note Before using this information and the product it supports, read the information in “Notices” on page 187. This edition applies to version 11.5.1 of IBM XIV Storage System and to all subsequent releases and modifications until otherwise indicated in new editions. This edition replaces GC27-3912-06. © Copyright IBM Corporation 2008, 2015. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures ..............vii Excluding LUN0............15 Advanced host attachment .........16 Tables ...............ix CHAP authentication of iSCSI hosts ......16 Clustering hosts into LUN maps .......17 Volume mappings exceptions .......19 Introduction .............xi Supporting VMWare extended operations ....20 Purpose and scope ............xi Writing zeroes ............20 Document version ...........xi Hardware-assisted locking ........21 Intended audience ...........xi Fast copy ..............21 Accessibility .............xi QoS performance classes ..........21 Notices used in this document .......xi Updating the call home contact list ......23 Document conventions .........xii Host system attachment commands ......23 Terms and abbreviations .........xii Getting information, help, and service .....xii Chapter 3. Volumes and Snapshots How to send your comments ........xii overview ..............25 Chapter 1. Overview: The IBM XIV The volume life cycle ...........25 Support for Symantec Storage Foundation Thin Storage System ...........1 Reclamation .............26 Features and functionality ..........1 Snapshots ...............27 Hardware overview ............2 Redirect on write ...........27 Hardware components ..........2 Storage utilization ...........30 Supported interfaces ...........3 The snapshot auto-delete priority ......30 Management options ..........5 Snapshot name and association .......30 Reliability ...............5 The snapshot lifecycle ..........30 Redundant components and no single point of Snapshot and snapshot group format .....35 failure ...............5 Accepting the electronic license.......37 Data mirroring.............5 Self-healing mechanisms .........5 Chapter 4. Consistency groups Protected cache ............6 Redundant power ...........6 overview ..............39 SSD cache drives ............6 Creating a consistency group ........39 Performance ..............7 Taking a snapshot of a Consistency Group ....39 Functionality ..............7 The snapshot group life cycle ........41 Snapshot management ..........7 Restoring a consistency group ........42 Consistency groups for snapshots ......8 Storage pools .............8 Chapter 5. Storage pools overview. 43 Remote monitoring and diagnostics......8 Protecting snapshots on a Storage Pool level . 44 SNMP ...............8 Thin provisioning ............44 Multipathing .............8 Instant space reclamation .........46 Automatic event notifications ........8 Management through GUI and CLI......9 Chapter 6. Synchronous remote External replication mechanisms .......9 mirroring ..............49 Upgradability .............9 Remote mirroring basic concepts .......49 Remote mirroring operation .........50 Chapter 2. Connectivity .......11 Configuration options ...........51 IP and Ethernet connectivity .........11 Volume configuration ..........51 Ethernet ports ............11 Communication errors..........52 IPv6 certification............11 Coupling activation...........52 Management connectivity ........12 Synchronous mirroring statuses........53 Field technician ports ..........13 Link status .............53 Configuration guidelines summary .....14 Operational status ...........54 Host system attachment ..........14 Synchronization status..........54 Balanced traffic and no single point of failure . 14 I/O operations .............55 Dynamic rate adaptation .........15 Synchronization process ..........56 Attaching volumes to hosts ........15 State diagram.............56 © Copyright IBM Corp. 2008, 2015 iii Coupling recovery ...........57 Initiating failover and failback operations for Uncommitted data ...........57 testing...............124 Constraints and limitations ........57 Last-consistent snapshots .........58 Chapter 9. IBM Hyper-Scale Mobility 127 Secondary locked error status .......59 What is IBM Hyper-Scale Mobility ......127 Role switchover .............60 IBM Hyper-Scale Mobility definitions .....128 Role switchover when remote mirroring is Technological overview ..........128 operational .............60 A walkthrough the IBM Hyper-Scale Mobility Role switchover when remote mirroring is process ...............130 nonoperational ............60 [Stage 1:] Planning for IBM Hyper-Scale Resumption of remote mirroring after role Mobility ..............131 change ...............62 [Stage 2:] Setting up the IBM Hyper-Scale Miscellaneous .............63 Mobility process ...........136 Remote mirroring and consistency groups . 63 [Stage 3:] Migration tracking .......138 Using remote mirroring for media error recovery 64 [Stage 4:] Establishing a Proxy.......139 Supported configurations .........64 [Stage 5:] Cleanup ...........140 I/O performance versus synchronization speed [Stage 6:] Post completion ........141 optimization .............64 IBM Hyper-Scale Mobility CLI commands....141 Implications regarding other commands ....64 Data migration .............143 Data migration overview ........143 Chapter 7. Asynchronous remote I/O handling in data migration ......144 mirroring ..............67 Data migration stages .........145 Chapter scope .............68 Handling failures ...........146 Features highlights ...........68 Terminology .............70 Chapter 10. Data encryption at rest 147 Specifications .............70 HIPAA compatibility ...........147 Technological overview ..........71 What is data-at-rest encryption .......148 Replication scheme ...........71 SED GUI documentation .........150 Snapshot-based technology ........72 Mirroring special snapshots ........73 Chapter 11. Event handling .....151 Initializing the mirroring .........73 Event information ............151 The sync job .............75 Viewing events .............152 Mirroring schedules and intervals ......76 Defining events notification rules.......152 The mirror snapshot (ad-hoc sync job) ....77 Alerting events configuration limitations . 153 Determining replication and mirror states . 78 Defining destinations ...........153 Walking through the asynchronous mirroring Defining gateways............153 process ...............88 Peers roles..............94 Chapter 12. Access control .....155 Activating the mirroring .........95 Mirroring consistency groups ........97 User roles and permission levels .......155 Setting a consistency group to be mirrored . 98 Predefined users ...........156 Setting-up a mirrored consistency group....99 Application administrator ........157 Adding a mirrored volume to a mirrored Authentication methods ..........159 consistency group ...........99 Native authentication..........159 Removing a volume from a mirrored consistency LDAP-authentication ..........160 group...............99 Switching between LDAP and native Administering asynchronous mirroring tasks . 100 authentication modes..........165 Accommodating disaster recovery scenarios . 100 Access control commands .........166 Overview of select asynchronous mirroring Glossary of access control concepts ......168 commands .............105 Chapter 13. Multi-Tenancy ......169 Chapter 8. Multi-site mirroring ....109 What is multi-tenancy ..........169 Multi-site mirroring terminology .......109 Technological overview ..........171 Multi-site mirroring technological overview . 110 Working with multi-tenancy ........171 Multi-site mirroring use cases ........112 Operating multi-tenancy via the GUI .....173 Creating a multi-site mirror........113 Multi-tenancy XCLI commands .......173 Master failover ............114 Master failback ............119 Chapter 14. VMware Virtual Volumes Fire drill on the substitute master .....120 andXIV..............175 Substitute master failure and failback ....122 Prerequisites for working with VVols .....175 iv IBM XIV Storage System: Product Overview Chapter 15. Non-disruptive code load 177 Index ...............191 Preparing for code load ..........178 Glossary .............181 Notices ..............187 Trademarks ..............189 Contents v vi IBM XIV Storage System: Product Overview Figures 1. IBM XIV Storage System ........2 28. Determining the asynchronous mirroring 2. The IBM XIV Storage System Interfaces . 4 status – example part 2 ........81 3. A Volume, a LUN and clustered Hosts . 18 29. Determining Asynchronous mirroring status – 4. You can't map a volume to a LUN that is example part 3 ...........82 already mapped ...........19 30. The deletion priority of the depleting storage 5. You can't map a volume to a LUN, if the issetto3.............84 volume is already mapped. .......19 31. The deletion priority of the depleting storage 6. Host system attachment commands ....24 issetto4.............84 7. Volume operations ..........26 32. The deletion priority of the depleting storage 8. The Redirect-on-Write process: the volume's issetto0.............85 data and pointer ...........28 33. Asynchronous mirroring walkthrough – Part 1 89 9. The Redirect-on-Write process: when a 34. Asynchronous mirroring walkthrough – Part 2 89 snapshot is taken the header is written first . 28 35. Asynchronous mirroring walkthrough – Part 3