IBM Flashsystem A9000 • Product Overview
Total Page:16
File Type:pdf, Size:1020Kb
IBM FlashSystem A9000 Version 12.2 Product Overview IBM GC27-8583-07 Note Before using this document and the product it supports, read the information in “Notices” on page 119. Edition notice Publication number: GC27-8583-07. This publication applies to IBM FlashSystem A9000 version 12.2 and to all subsequent releases and modifications until otherwise indicated in a newer publication. © Copyright IBM Corporation 2016, 2018. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures ................................... vii Tables .................................... ix About this document .............................. xi Intended audience ................................. xi Document conventions................................ xi Related information and publications ........................... xi IBM Publications Center ............................... xii Sending or posting your comments ........................... xii Getting information, help, and service .......................... xiii Chapter 1. Introduction ............................. 1 Architecture ................................... 2 Flash enclosure ................................. 3 Grid controllers ................................. 4 Back-end interconnect ............................... 4 Logical architecture ................................ 4 Functionality ................................... 5 Specifications ................................... 6 Performance ................................... 6 Chapter 2. Flash-optimized data reduction ..................... 7 Data reduction stages ................................ 7 Pattern detection and removal ............................. 9 Inline deduplication ................................ 10 Inline compression ................................. 11 Chapter 3. Flash-optimized data protection .................... 13 Two-dimensional flash RAID ............................. 13 Vaulting mechanism ................................ 15 Scrubbing mechanism ................................ 15 Chapter 4. Flash-optimized data path....................... 17 Chapter 5. Capacity management ........................ 21 Thin provisioning ................................. 22 Allocation limit .................................. 22 Chapter 6. Volumes and snapshots ....................... 25 Volume function and lifecycle ............................. 25 Snapshot function and lifecycle ............................. 27 Creating a snapshot ............................... 28 Locking and unlocking a snapshot........................... 28 Duplicating a snapshot .............................. 29 Creating a snapshot of a snapshot ........................... 29 Formatting a snapshot or a snapshot group........................ 29 Additional snapshot attributes ............................. 30 Redirect-on-Write (ROW) ............................... 31 Full volume copy ................................. 34 Restoring volumes and snapshots ............................ 35 © Copyright IBM Corp. 2016, 2018 iii Chapter 7. Storage pools ............................ 39 Chapter 8. Consistency groups ......................... 41 Snapshot of a consistency group ............................ 42 Consistency group snapshot lifecycle ........................... 43 Chapter 9. Quality of Service (QoS) performance classes .............. 45 Chapter 10. Connectivity with hosts ....................... 47 IP and Ethernet connectivity.............................. 47 Host system attachment ............................... 48 CHAP authentication of iSCSI hosts ........................... 49 Clustering hosts into LUN maps ............................ 51 Chapter 11. Synchronous remote mirroring .................... 53 Remote mirroring basic concepts ............................ 53 Synchronous mirroring operations ............................ 54 Synchronous mirroring configuration and activation options ................... 55 Synchronous mirroring statuses............................. 56 Synchronous mirroring role switchover and role change .................... 59 Role switchover when synchronous mirroring is operational .................. 59 Role change when synchronous mirroring is not operational .................. 60 I/O operations in synchronous mirroring ......................... 61 Coupling synchronization process ............................ 63 Synchronous mirroring of consistency groups ........................ 64 Chapter 12. Asynchronous remote mirroring ................... 65 Asynchronous mirroring highlights ........................... 66 Snapshot-based technology in asynchronous mirroring ..................... 67 Disaster recovery scenarios in asynchronous mirroring ..................... 68 Chapter 13. High availability with HyperSwap ................... 71 Design guidelines ................................. 71 Configuration ................................. 71 Automatic failover scenarios............................. 78 Operating a HyperSwap-based High Availability solution .................... 79 Establishing a HyperSwap relationship ......................... 79 Monitoring a HyperSwap volume ........................... 81 Modifying a HyperSwap volume ........................... 83 High Availability snapshots ............................. 83 Failure detection and recovery ............................ 84 Chapter 14. Volume migration with IBM Hyper-Scale Mobility ............ 87 Volume migration process .............................. 87 Chapter 15. Data-at-rest encryption ....................... 91 Encryption key management schemes .......................... 91 Chapter 16. User roles and permissions ..................... 93 User groups ................................... 94 Predefined users.................................. 95 User information ................................. 95 Chapter 17. User authentication and access control ................ 97 Native authentication ................................ 97 LDAP authentication ................................ 97 LDAP authentication logic .............................. 98 iv IBM FlashSystem A9000 – Product Overview Chapter 18. Multi-tenancy ........................... 101 Working with multi-tenancy ............................. 103 Chapter 19. Management and monitoring .................... 107 Chapter 20. Event reporting and handling .................... 109 Event information ................................. 109 Event notification rules ............................... 110 Event notification destinations ............................. 111 Event notification gateways.............................. 111 Chapter 21. Integration with ISV environments .................. 113 Supporting VMware vStorage extended operations ...................... 113 Integration with Microsoft Azure Site Recovery ....................... 113 Chapter 22. Software upgrade ......................... 115 Preparing for software upgrade ............................ 116 Chapter 23. Remote support and proactive support ................ 117 Notices ................................... 119 Trademarks ................................... 120 Contents v vi IBM FlashSystem A9000 – Product Overview Figures 1. IBM FlashSystem A9000 unit ............................ 1 2. IBM FlashSystem A9000 main components ....................... 2 3. IBM FlashCore technology benefits .......................... 3 4. Data reduction and efficiency ............................ 6 5. Data reduction stages .............................. 8 6. Data reduction process logic ............................ 9 7. Pattern detection and removal ........................... 10 8. Deduplication process .............................. 11 9. IBM compression method - using fixed-size writes .................... 12 10. Variable Stripe RAID technology .......................... 14 11. 2D RAID protection mechanism........................... 14 12. 3 copies of cache data .............................. 15 13. Data path through the different nodes ........................ 18 14. Data path mesh architecture ............................ 19 15. Capacity management hierarchy .......................... 21 16. Volume operations ............................... 26 17. The snapshot life cycle .............................. 27 18. Redirect-on-Write process: the volume's data and pointer .................. 32 19. Redirect-on-Write process: when a snapshot is taken, the header is written first ........... 32 20. The Redirect-on-Write process: the new data is written ................... 33 21. The Redirect-on-Write process: The snapshot points at the old data where the volume points at the new data 34 22. Restoring volumes ............................... 36 23. Restoring snapshots ............................... 37 24. Consistency group creation and options ........................ 41 25. A snapshot is taken for each volume of the consistency group ................ 42 26. Most snapshot operations can be applied to snapshot groups ................. 43 27. A volume, a LUN, and cluster hosts ......................... 51 28. Volume that cannot be mapped to an already mapped LUN ................. 52 29. Mapped volume that cannot be mapped to another LUN .................. 52 30. Synchronous remote mirroring scheme ........................ 54 31. Coupling states and actions ............................ 63 32. Synchronous remote mirroring concept ........................ 65 33. Asynchronous mirroring - no extended response time lag .................. 66