Introduction to Xtremio X2 Storage Array

Total Page:16

File Type:pdf, Size:1020Kb

Introduction to Xtremio X2 Storage Array WHITE PAPER INTRODUCTION TO DELL EMC XTREMIO X2 STORAGE ARRAY A Detailed Review Abstract This white paper introduces the Dell EMC XtremIO X2 Storage Array (with XIOS Version 6.3.0). It provides detailed descriptions of the system architecture, theory of operation, and features. The paper also explains how the unique features of XtremIO—including Inline Data Reduction techniques, scalable performance, and data protection—provide unmatched solutions to today’s data storage problems. November, 2019 Introduction to the Dell EMC XtremIO X2 Storage Array © 2019 Dell Inc. or its subsidiaries. Dell Customer Communication - Confidential Contents Abstract ............................................................................................................................................................. 1 Executive Summary ........................................................................................................................................... 4 Introduction ........................................................................................................................................................ 4 System Overview ............................................................................................................................................... 5 X-Brick ............................................................................................................................................................... 6 Scale-Out Architecture: Linear Expansion of Capacity and Performance ........................................................... 7 Scale-Up Architecture: Capacity Expansion ....................................................................................................... 8 System Architecture .......................................................................................................................................... 8 Theory of Operation ......................................................................................................................................... 10 XtremIO Metadata ............................................................................................................................................................. 10 Mapping Table ................................................................................................................................................................... 11 How the Write I/O Flow Works .......................................................................................................................................... 11 How the Read I/O Flow Works .......................................................................................................................................... 15 System Features ............................................................................................................................................. 15 Inline Data Reduction ........................................................................................................................................................ 16 Inline Data Deduplication .............................................................................................................................................. 16 Inline Data Compression ............................................................................................................................................... 17 Total Data Reduction .................................................................................................................................................... 18 Data Reduction Measurement Mechanisms ..................................................................................................................... 18 Cluster Level Data Savings ........................................................................................................................................... 18 Data Reduction Ratio on Volume Level or VSG (Volume Snapshot Group) ................................................................ 19 Unique Physical Space per Volume or VSG (Volume Snapshot Group) ...................................................................... 19 Copy Efficiency per VSG (Volume Snapshot Group) ................................................................................................... 19 Integrated Copy Data Management (iCDM)...................................................................................................................... 19 XtremIO Virtual Copies (Snapshots) ............................................................................................................................. 21 XtremIO Remote Protection .............................................................................................................................................. 25 XtremIO Metadata-Aware Replication .......................................................................................................................... 25 XtremIO Synchronous Replication ................................................................................................................................ 26 Best Protection .............................................................................................................................................................. 27 Unified View for Local and Remote Protection ............................................................................................................. 28 Consistency Group Protection View ............................................................................................................................. 29 Thin Provisioning ............................................................................................................................................................... 29 XtremIO Data Protection (XDP) ........................................................................................................................................ 30 How XDP Works ........................................................................................................................................................... 31 Data at Rest Encryption .................................................................................................................................................... 32 Scalable Performance ....................................................................................................................................................... 33 Even Data Distribution....................................................................................................................................................... 35 High Availability ................................................................................................................................................................. 36 Non-Disruptive Upgrade .................................................................................................................................................... 37 Scale-Up ............................................................................................................................................................................ 38 2 | Introduction to the Dell EMC XtremIO X2 Storage Array © 2019 Dell Inc. or its subsidiaries. Dell Customer Communication - Confidential Scale-Up Process on a Single X-Brick Cluster ............................................................................................................. 38 Scale-Out .......................................................................................................................................................................... 40 Quality of Service .............................................................................................................................................................. 41 VMware VAAI Integration .................................................................................................................................................. 42 XtremIO Management Server (XMS) ............................................................................................................... 45 System GUI ....................................................................................................................................................................... 46 Command Line Interface ................................................................................................................................................... 47 RESTful API ...................................................................................................................................................................... 47 PowerShell API ................................................................................................................................................................. 48 LDAP/LDAPS .................................................................................................................................................................... 48 Ease of Management ...................................................................................................................................... 48 Replication of Dell EMC XtremIO to a Remote Array ....................................................................................... 49 Dell EMC RecoverPoint....................................................................................................................................................
Recommended publications
  • EMC Recoverpoint ® V4.4 Security Target
    EMC RecoverPoint ® v4.4 Security Target Evaluation Assurance Level (EAL): EAL2+ Doc No: 1926-000-D102 Version: 0.9 16 May 2016 Prepared For: EMC Corporation 176 South Street Hopkinton, MA, USA 01748 Prepared by: EWA-Canada Common Criteria Consulting LLC 1223 Michael Street 15804 Laughlin Ln Ottawa, Ontario, Canada Silver Spring, MD, USA K1J7T2 20906 EMC RecoverPoint® v4.4 Security Target Version: 0.9 CONTENTS 1 SECURITY TARGET INTRODUCTION ............................................. 1 1.1 DOCUMENT ORGANIZATION ............................................................ 1 1.2 SECURITY TARGET REFERENCE ........................................................ 1 1.3 TOE REFERENCE ............................................................................. 2 1.4 TOE OVERVIEW .............................................................................. 2 1.5 TOE DESCRIPTION .......................................................................... 4 2 CONFORMANCE CLAIMS ............................................................... 7 2.1 COMMON CRITERIA CONFORMANCE CLAIM ............................................. 7 2.2 ASSURANCE PACKAGE CLAIM ................................................................ 7 2.3 PROTECTION PROFILE CONFORMANCE CLAIM ......................................... 7 3 SECURITY PROBLEM DEFINITION ........................................................ 8 3.1 THREATS ............................................................................................ 8 3.2 ORGANIZATIONAL SECURITY POLICIES .................................................
    [Show full text]
  • Emc Scaleio Design Considerations and Best Practices
    EMC SCALEIO DESIGN CONSIDERATIONS AND BEST PRACTICES ABSTRACT This white paper provides technical information, best practices, and hardware and software design considerations for planning the deployment of ScaleIO June, 2016 WHITE PAPER To learn more about how EMC products, services, and solutions can help solve your business and IT challenges, contact your local representative or authorized reseller, visit www.emc.com, or explore and compare products in the EMC Store Copyright © 2016 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided “as is.” EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. VMware and <insert other VMware marks in alphabetical order; remove sentence if no VMware marks needed. Remove highlight and brackets> are registered trademarks or trademarks of VMware, Inc. in the United States and/or other jurisdictions. All other trademarks used herein are the property of their respective owners. Part Number HXXXXX <required, see Part numbers below for more info> 2 TABLE
    [Show full text]
  • How to Start Your Disaster Recovery in This “Cloudy” Landscape EMC Proven Professional Knowledge Sharing 2011
    how to start your disaster recovery in this “cloudy” landscape EMC Proven Professional Knowledge Sharing 2011 Roy Mikes Storage and Virtualization Architect Mondriaan Zorggroep [email protected] Table of Contents About This Document 3 Who Should Read This Document? 3 Introduction 4 1. What is a Disaster 6 2. What is a Disaster Recovery Plan (DR plan) 7 2.1. Other benefits of a Disaster Recovery Plan 7 3. Business Impact Analysis (BIA) 8 3.1. Maximum Tolerable Downtime (MTD) 9 3.2. Recovery Time Objective (RTO) 9 3.3. Recovery Point Objective (RPO) 9 4. Data Classification 10 5. Risk Assessment 13 5.1. Component Failure Impact Analysis (CFIA) 16 5.2. Identifying Critical Components 18 5.2.1. Personnel 18 5.2.2. Systems 18 5.3. Dependencies 19 5.4. Redundancy 21 6. Emergency Response Team (ERT) 23 7. Developing a Recovery Strategy 24 7.1. Types of backup 26 7.2. Virtualized Servers and Disaster Recovery 27 7.3. Other thoughts 28 8. Testing Recovery Plans 29 9. Role of virtualization 30 9.1. Role of VMware 31 9.2. Role of EMC 33 9.3. Role of VMware Site Recovery Manager (SRM) 35 10. VMware Site Recovery Manager 36 11. Standardization 41 12. Conclusion 42 References 44 EMC Proven Professional Knowledge Sharing 2 About This Article Despite our best efforts and precautions, disasters of all kind eventually strike an organization, usually unanticipated and unannounced. Natural disasters such as hurricanes, floods, or fires can threaten the very existence of an organization. Well-prepared organizations establish plans, procedures, and protocols to survive the effects that a disaster may have on continuing operations and help facilitate a speedy return to working order.
    [Show full text]
  • SRM 6.9 Administrator Guide
    ADMINISTRATOR GUIDE Storage Resource Monitor Version 6.9 Last Updated: Tuesday, June 4, 2019 © 2019 SolarWinds Worldwide, LLC. All rights reserved. This document may not be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the prior written consent of SolarWinds. All right, title, and interest in and to the software, services, and documentation are and shall remain the exclusive property of SolarWinds, its affiliates, and/or its respective licensors. SOLARWINDS DISCLAIMS ALL WARRANTIES, CONDITIONS, OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON THE DOCUMENTATION, INCLUDING WITHOUT LIMITATION NONINFRINGEMENT, ACCURACY, COMPLETENESS, OR USEFULNESS OF ANY INFORMATION CONTAINED HEREIN. IN NO EVENT SHALL SOLARWINDS, ITS SUPPLIERS, NOR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY, EVEN IF SOLARWINDS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks are the exclusive property of SolarWinds Worldwide, LLC or its affiliates, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks or are registered or pending registration. All other trademarks mentioned herein are used for identification purposes only and are trademarks of (and may be registered
    [Show full text]
  • Asia Pacific
    Enterprise Data Storage Market Insights Future Technologies and Trends Will Drive Market Growth P8CD-72 September 2015 Contents Section Slide Number Scope and Market Overview 3 Enterprise Storage Market Trends 7 Future Technologies in Storage 12 Business Models of Vendors 16 Business Models of OEMs 26 Business Models of Distributors 31 Implications of Storage Trends on Data Centers 39 Frost & Sullivan Story 45 P8CD-72 2 Scope and Market Overview Return to contents P8CD-72 3 Scope of the Study Objectives • To provide an overview of the global enterprise data storage market, focusing on the trends, technology, and business models of major market participants • To understand the trends affecting the global storage market and the implications of these trends on the data center market • Future technologies entering the storage market • To gain a detailed understanding on the distribution structure and channel partner program for key storage vendors EMC and NetApp • To provide an understanding of the business model for ODM/OEMs in terms of service and support capabilities across regions; these include Foxconn and Supermicro ODM: Original Design Manufacturer OEM: Original Equipment Manufacturer Source: Frost & Sullivan P8CD-72 4 Market Overview The enterprise data storage market is changing at a rapid pace. More data is being digitized than ever before and stored on disks of various size capacities. Globally, by 2020, there are expected to be about 26 billion connected devices. These devices would generate large amounts of data that need to be stored and analyzed at some point of time. Storage devices need to be agile, scalable, low cost, able to handle huge data loads, and durable to sustain the huge data growth.
    [Show full text]
  • EMC VIPR CONTROLLER and EMC VIPR SRM Automation and Insight for Multi-Vendor Storage
    tt EMC VIPR CONTROLLER AND EMC VIPR SRM Automation and Insight for Multi-Vendor Storage Today’s storage infrastructures consist of multiple sites using heterogeneous storage ESSENTIALS platforms from different vendors to deliver a wide variety of storage services. Each ViPR Controller storage platform is chosen based on its ability to handle specific workloads, each with • Automate storage provisioning its’ own unique set of APIs, management and monitoring tools. With this diversity, and reclamation tasks for EMC comes the challenge of managing these storage silos efficiently. As the amount of and 3rd party storage data grows, it takes an increasingly large number of specialized IT administrators executing repetitive, manual tasks to deliver static, slow-to-respond storage services. • Deliver storage services via This dynamic is driving end-user investment in shadow IT. Delivering storage services self-service catalog as usual is not a sustainable option for today’s always on, dynamic businesses. • REST-based APIs EMC offers software-defined storage solutions that help organizations drastically • Open source development reduce management overhead through automation across traditional storage silos and ViPR SRM paves the way for rapid deployment of fully integrated next generation scale-out • View relationships and storage architectures. Together EMC® ViPR® Controller and EMC ViPR SRM deliver performance trends across the storage automation and management insight necessary to optimize utilization of data path storage resources, while meeting service levels. Self-service access for customers • Track and analyze storage reduces dependencies on IT, providing an easy to use cloud experience and cost consumption transparency. • Optimize storage resources and EMC VIPR CONTROLLER: SIMPLE.
    [Show full text]
  • Vplex: Interesting Use Cases
    VPLEX: INTERESTING USE CASES EMC Proven Professional Knowledge Sharing 2011 Sandeep Choudhary Puneet Goyal Infrastructure Management Associate Senior Systems Specialist – [email protected] Backup and Storage HCL Comnet [email protected] Table of Contents EXECUTIVE SUMMARY ................................................................................................................................................. 3 WHAT’S NEW IN MY GENERATION? ............................................................................................................................ 3 ABSTRACT..................................................................................................................................................................... 4 INTRODUCTION ............................................................................................................................................................ 6 ARRAY-BASED REPLICATION WITH VPLEX ................................................................................................................... 7 USE CASE 1: BASIC ARRAY-BASED CLONES WITH VPLEX ......................................................................................... 7 USE CASE 2: ADVANCED ARRAY-BASED CLONES WITH VPLEX .............................................................................. 10 USE CASE 3: BASIC ARRAY-BASED RESTORE AND RECOVERY WITH VPLEX ........................................................... 14 USE CASE 4: ADVANCED ARRAY-BASED RESTORE WITH VPLEX............................................................................
    [Show full text]
  • Connected Customers 2 2
    connected customerscare Dear reader ENTER >> 2 2 Dell EMC, a part of Dell Technologies, enables enterprises to reinvent their business through Digital Transformation. EXECUTIVE SUMMARY CHAPTER 1 - The hyper-connected customer CHAPTER 2 - The hyper-targeted customer CHAPTER 3 - The hyper-aware customer CHAPTER 4 - The hyper-protective customer ‘No man is an island.’ Nor is any system, organization or industry. The CONNECTED series dives into this new reality of ‘everything connected’. It gives you the latest insights on digital transformation. Also available: NEXT >> 4 3 EXECUTIVE SUMMARY OVERVIEW Customers have never been smarter. Businesses must be on the level. CHAPTER 1 CHAPTER 2 The way we interact has changed profoundly. This change has also altered us CHAPTER 3 as individuals and it has also transformed business. Today’s customer is a new breed, and businesses must find new and innovative ways to engage that customer. Even more changes lie in wait for us as the generation of digital natives matures and technology breakthroughs accelerate. CHAPTER 4 Business may not be able to prepare for the unknown, but they can learn from their customers and how to best serve them. It’s the age of the connected customer now, and we must adapt. ABOUT << PREVIOUS NEXT >> 6 The hyper age OVERVIEW The modern customer is: • Hyper-connected: never before have humans been connected with each other through so many devices • Hyper-targeted: with the amount of data available on each individual, it is possible to segment customers in CHAPTER 1 unprecedented detail • Hyper-aware: knowledge is only a click or tap away and the modern customer is acutely aware of the value they represent • Hyper-protective: customers want to safeguard their privacy and do not welcome intrusion CHAPTER 2 CHAPTER 3 C CHAPTER 4 90% ACCORDING TO RESEARCH, NINE IN TEN HOUSEHOLD BRANDS IN THE UNITED STATES HAVE CONSISTENTLY LOST CUSTOMER Dear reader LOYALTY SHARE OVER THE PAST 20 YEARS.
    [Show full text]
  • Dell EMC Xtremio Accelerate to Agility Brochure | Dell
    WELCOME TO YOUR MODERN DATA CENTER Transformed by XtremIO The World’s #1 All-Flash Array XTREMIO – MUCH MORE THAN SPEEDS AND FEEDS. IT’S ABOUT BUSINESS TRANSFORMATION. Your data center struggles with competing requirements from your lines of business and the finance, 0110101100 security and IT departments. While 1101100011 some executives want to lower cost 001100 110011 and increase efficiency, others want 001100 110101 00100110 business growth and responsiveness. 10110011 01100011 But today, most data center teams are just trying to keep up with application service levels, complex workflows, 0010011010110 0110110001101 and sprawling infrastructure and support costs. These processes are anything but agile, often requiring: 00100110 • Up to 10x the storage footprint to 10110011 01100011 001100110 support a single application across 011001100 110101010 010101101 its production and non-production 0110101100 lifecycles 1101100011 001100110 • Hours or days to generate analytics 011001100 110101010 on what you need to know now • Long development and testing 100101 011010 cycles where only partial data sets 1010110 and user loads are used in order to contain costs If this seems familiar to you, data storage is likely a bottleneck in your business. There’s a solution. With XtremIO all-flash arrays (AFAs), you can have a dynamic data services platform. XtremIO: Storage reinvented to unlock innovation and agility 2 WHAT’S A MODERN DATA CENTER? ONE THAT MOVES AS FAST AS YOUR BUSINESS. • In IT circles, agility is a common but elusive goal, especially when you are Modern data center benefits from XtremIO managing initiatives such as private/ Infrastructure hybrid cloud, Database-as-a-Service, VDI or broad consolidation for Oracle, • Linear scale-out performance – always consistent, sub- SAP and Microsoft applications.
    [Show full text]
  • Dell EMC : Cloud Insights
    Dell EMC Cloud Insights NetApp September 24, 2021 This PDF was generated from https://docs.netapp.com/us- en/cloudinsights/task_dc_emc_datadomain.html on September 24, 2021. Always check docs.netapp.com for the latest. Table of Contents Dell EMC . 1 DELL EMC Data Domain data collector. 1 Configuring the EMC ECS data collector . 2 Dell EMC Isilon data collector . 3 Dell EMC PowerStore data collector . 4 Dell EMC RecoverPoint data collector . 6 DELL EMC ScaleIO data collector . 7 Configuring the EMC Unity data collector . 8 Dell EMC VMAX and PowerMax Family of Devices data collector . 9 Dell EMC VNX Block Storage (NaviCLI) data collector . 13 DELL EMC VNX File (formerly Celerra Unified Storage System) data collector . 15 Configuring the EMC VNX Unified data collector. 17 Configuring the EMC VPLEX data collector. 18 Dell EMC XtremeIO data collector . 20 Dell EMC DELL EMC Data Domain data collector This data collector gathers inventory and performance information from DELL EMC Data Domain deduplication storage systems. To configure this data collector, there are specific configuration instructions and usage recommendations you must follow. Terminology Cloud Insights acquires the following inventory information from the Data Domain data collector. For each asset type acquired by Cloud Insights, the most common terminology used for this asset is shown. When viewing or troubleshooting this data collector, keep the following terminology in mind: Vendor/Model Term Cloud Insights Term Disk Disk Array Storage FC Port Port File System Internal Volume Quota Quota NFS and CIFS share FileShare Note: These are common terminology mappings only and might not represent every case for this data colletor.
    [Show full text]
  • EMC VPLEX Data Sheet
    VPLEX FOR THE FUTURE READY ENTERPRISE Continuous Availability and Agility OVERVIEW IT organizations worldwide are rapidly moving to all-flash storage to take advantage of BENEFITS the performance, workload consolidation, and the rich data services that lower the total With more 8000 clusters installed cost of ownership. Nevertheless availability of business critical workloads is still a huge worldwide, EMC VPLEX is the most challenge. Planned and unplanned downtime continues to cause severe disruption to trusted availability technology operations and the cost of downtime keeps increasing with each new workload. delivering more than seven nines of availability for more than 50% of EMC VPLEX maximizes the returns on investments in all-flash infrastructure or hybrid Global Fortune 500 companies. arrays by bringing more than seven nines availability to the business critical workloads. VPLEX also creates a flexible storage architecture that gives IT teams the agility they need to respond to rapid business and technology changes while maximizing asset All-flash Always-On: Built for the utilization across active-active datacenters. latest flash storage technology, VPLEX VS6 delivers 2X IOPS at 1/3rd VPLEX enables IT organizations to create datacenter infrastructure that is the latency to ensure business critical applications are never down. Always available even in the face of disasters Agile in responding to business requirements Non-disruptive and agile: VPLEX Non-disruptive when adopting latest storage technology creates a flexible storage architecture that makes it very easy to respond to VPLEX's unique implementation of distributed cache coherency allows the exact same changing business needs. VPLEX data to be read/write accessible across two storage systems at the same time.
    [Show full text]
  • Dell EMC Host Connectivity Guide for Vmware Esxi Server
    Dell EMC Host Connectivity Guide for VMware ESXi Server P/N 300-002-304 REV 52 May 2020 Copyright © 2016-2020 Dell Inc. or its subsidiaries. All rights reserved. Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.” DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE. Dell Technologies, Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners. Published in the USA. Dell EMC Hopkinton, Massachusetts 01748-9103 1-508-435-1000 In North America 1-866-464-7381 www.DellEMC.com 2 Dell EMC Host Connectivity Guide for VMware ESXi Server CONTENTS PREFACE 7 Chapter 1 Introduction to VMware Infrastructure 9 VMware vSphere...............................................................................................10 vSphere 6.0..........................................................................................10 vSphere 6.5..........................................................................................10 vSphere 6.7.......................................................................................... 10 VMware ESXi
    [Show full text]