1 EMC Storage Integration with Vmware Vsphere Best Practices
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Using the EMC SRDF Adapter for Vmware Site Recovery Manager
Using the EMC SRDF Adapter for VMware Site Recovery Manager Version 5.0 • SRDF Overview • Installing and Configuring the SRDF SRA • Initiating Test Site Failover Operations • Performing Site Failover/Failback Operations Drew Tonnesen September 2017 VMAX Engineering Copyright © 2017 EMC Corporation. All rights reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date regulatory document for your product line, go to the Technical Documentation and Advisories section on support.emc.com. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. All other trademarks used herein are the property of their respective owners. EMC is now part of the Dell group of companies. Part number H10553.8 2 Using EMC SRDF Adapter for VMware vCenter Site Recovery Manager Contents Preface Chapter 1 Symmetrix Remote Data Facility Introduction ....................................................................................... 14 SRDF overview................................................................................. -
EMC Secure Remote Services 3.18 Site Planning Guide
EMC® Secure Remote Services Release 3.26 Site Planning Guide REV 01 Copyright © 2018 EMC Corporation. All rights reserved. Published in the USA. Published January 2018 EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC2, EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. For the most up-to-date regulatory document for your product line, go to Dell EMC Online Support (https://support.emc.com). 2 EMC Secure Remote Services Site Planning Guide CONTENTS Preface Chapter 1 Overview ESRS architecture........................................................................................ 10 ESRS installation options ...................................................................... 10 Other components ................................................................................ 11 Requirements for ESRS customers......................................................... 11 Supported devices..................................................................................... -
Celerra NSX Data Sheet
DATA SHEET EMC Celerra NSX Series IP Storage Reach new heights of availability and scalability with EMC Celerra NSX Meeting the information-sharing challenge Performance bottlenecks, security issues, and the high cost of data protection and management associated with deploying file servers using general-purpose operating systems become non-issues ® ® The Big Picture with the EMC Celerra NSX. NSX combines commodity CPUs with flexible and sophisticated Data Access in Real Time (DART) file-serving software into a purpose-built, scalable, clustered file server • Ensure no-compromise availability optimized for moving mission-critical data. through integrated advanced clustering, managed as a single device Unparalleled EMC Symmetrix® and CLARiiON® storage technologies, combined with Celerra’s • Receive advanced functionality at no extra impressive I/O system architecture, offer industry-leading availability, scalability, performance, cost with the most comprehensive suite of and ease of management. built-in features • Leverage EMC Celerra’s price/performance With Celerra NSX, you get distributed file services in a centrally managed information storage system. leadership to support large user commu- You can dynamically grow, share, and cost-effectively manage file systems with multi-protocol file nities with an intuitive, GUI-based, single access capabilities. And you take advantage of simultaneous support for NFS, CIFS, and iSCSI proto- point of management for up to eight file server nodes in an advanced clustering cols, concurrently, that -
EMC Solutions Enabler Symmetrix Array Management CLI Version 6.5 Product Guide Contents
EMC® Solutions Enabler Symmetrix® Array Management CLI Version 6.5 Product Guide P/N 300-002-939 REV A05 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.EMC.com Copyright © 2005 - 2008 EMC Corporation. All rights reserved. Published March, 2008 EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. All other trademarks used herein are the property of their respective owners. 2 EMC Solutions Enabler Symmetrix Array Management CLI Version 6.5 Product Guide Contents Preface............................................................................................................................................................... 13 PART 1 Concepts and Procedures Chapter 1 Introduction SYMCLI introduction ........................................................................................................ 18 Symmetrix component overview..................................................................................... 19 Directors -
H8716.2 EMC Symmetrix Vmaxe Storage System, Spec Sheet
EMC SYMMETRIX VMAXe STORAGE SYSTEM EMC® Symmetrix® VMAXe™ with the Enginuity™ operating environment delivers a multi- controller, scale-out architecture with consolidation and efficiency for the enterprise. As the newest member of the Symmetrix series, VMAXe utilizes the same revolutionary EMC Virtual Matrix Architecture™ as EMC VMAX™ systems. SPECIFICATIONS ARCHITECTURE The Virtual Matrix Architecture enables IT departments to build storage systems that tran- scend the physical constraint of competing array architectures. The architecture allows scal- ing of system resources through common and fully redundant building blocks called VMAXe series engines. A single VMAXe engine provides the complete foundation for a high-availability storage array. Each VMAXe engine contains two Symmetrix VMAXe directors and redundant interfaces to the EMC Virtual Matrix™ interconnect. Each Symmetrix VMAXe director consolidates front-end, global memory, and back-end functions, enabling direct memory access to data for opti- mized I/O operations. Up to four VMAXe engines can be interconnected via a set of multiple active fabrics that provide scalable performance and high availability. VMAXe engines can be added non-disruptively to provide linear scale-out of Symmetrix system resources. A single-engine Symmetrix VMAXe can start with as little as 24 drives, scaling up to four engines supporting 1,080 drives for a maximum usable capacity of up to 1.5 petabytes. VMAXe engine one and VMAXe engine two can support up to 240 drives per engine. VMAXe engines three and four can support up to 300 drives per engine. A fully configured 1,080- drive system is comprised of four integrated system bays and three storage bays. -
Using EMC SRDF Adapter for Vmware Site Recovery Manager
Using EMC SRDF Adapter for VMware® Site Recovery Manager Best Practices Planning Abstract VMware Site Recovery Manager provides workflow and business continuity and disaster restart process management for VMware virtual infrastructure. The software leverages storage array replication and communicates to the replication management through a well-defined set of specifications. This white paper discusses the best practices for using VMware® Site Recovery Manager with EMC® SRDF® Adapter. September 2008 Abstract VMware Site Recovery Manager provides workflow and business continuity and disaster restart process management for VMware virtual infrastructure. The software leverages storage array replication and communicates to the replication management through a well-defined set of specifications. This white paper discusses the best practices for using VMware® Site Recovery Manager with EMC® SRDF® Adapter. Copyright © 2008 EMC Corporation. All rights reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date listing of EMC product names, -
Proof, Not Promises: Creating the Trusted Cloud
EMC’S VISION FOR TRUST IN THE CLOUD Proof, not Promises: Creating the Trusted Cloud EXECUTIVE SUMMARY Clouds and virtualization offer powerful new ways to manage and use digital information, but they also create new complexities for organizations in meeting the fundamental challenge of getting the right information to the right people over an infrastructure that they can trust. Why? Because clouds and virtualization irrevocably change the nature of control and visibility. Infrastructure becomes virtual, not physical. People access infrastructure from devices that are outside of IT’s direct control. Information moves with incredible speed across networks and the cloud, making it hard to know where sensitive information resides. And with an IT infrastructure that is virtual and shared via the cloud, organizations must learn new ways to achieve visibility into risks, threats, and compliance performance. The good news is forward-thinking businesses can clear these hurdles today. The formula for building trust in the cloud is to achieve control over and visibility into the cloud’s infrastructure, identities, and information. The technologies needed to establish this level of cloud control and visibility already exist. Organizations are applying these technologies in creative ways to build trusted clouds that can meet the most rigorous security and compliance requirements while delivering the flexibility, fluidity, and massive scale that hold such business promise for organizations worldwide. EMC PERSpecTIVE THE CHALLENGE Over the decades, IT architecture and platform strategies have evolved from mainframe to client-server to the Web. Still, one of the fundamental goals of IT organizations endures: that is, getting the right information to the right people over a trusted infrastructure so information can be leveraged for business advantage. -
VNX - the STORAGE [R]EVOLUTION a COMPARATIVE APPROACH with OTHER STORAGE PLATFORMS Siva Shankari Chandrasekaran Systems Engineer Tata Consultancy Services
VNX - THE STORAGE [R]EVOLUTION A COMPARATIVE APPROACH WITH OTHER STORAGE PLATFORMS Siva Shankari Chandrasekaran Systems Engineer Tata Consultancy Services Table of Contents Introduction ................................................................................................................................ 3 Various Data Access Solutions .................................................................................................. 4 Block Level Access................................................................................................................. 4 File Level Access ................................................................................................................... 4 Object-Based Access ............................................................................................................. 4 Various Storage Network Architectures ...................................................................................... 5 Direct Attached Storage ......................................................................................................... 5 Network Attached Storage ...................................................................................................... 6 Storage Area Network ...........................................................................................................11 Unified Storage Infrastructure ...................................................................................................15 What is VNX? ...........................................................................................................................16 -
Symmetrix Fundamentals
Welcome to Symmetrix Fundamentals. Copyright © 1996, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC2, EMC, Data Domain, RSA, EMC Centera, EMC ControlCenter, EMC LifeLine, EMC OnCourse, EMC Proven, EMC Snap, EMC SourceOne, EMC Storage Administrator, Acartus, Access Logix, AdvantEdge, AlphaStor, ApplicationXtender, ArchiveXtender, Atmos, Authentica, Authentic Problems, Automated Resource Manager, AutoStart, AutoSwap, AVALONidm, Avamar, Captiva, Catalog Solution, C-Clip, Celerra, Celerra Replicator, Centera, CenterStage, CentraStar, ClaimPack, ClaimsEditor, CLARiiON, ClientPak, Codebook Correlation Technology, Common Information Model, Configuration Intelligence, Configuresoft, Connectrix, CopyCross, CopyPoint, Dantz, DatabaseXtender, Direct Matrix Architecture, DiskXtender, DiskXtender 2000, Document Sciences, Documentum, elnput, E-Lab, EmailXaminer, EmailXtender, Enginuity, eRoom, Event Explorer, FarPoint, FirstPass, FLARE, FormWare, -
EMC Secure Remote Services 3.18 Technical Description
DRAFT EMC® Secure Remote Services Release 3.18 Technical Description REV 01 Copyright © 2016 EMC Corporation. All rights reserved. Published in the USA. Published December 2016 EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC2, EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. For the most up-to-date regulatory document for your product line, go to Dell EMC Online Support (https://support.emc.com). 2 EMC Secure Remote Services Technical Description CONTENTS Preface Chapter 1 EMC Secure Remote Services Introduction................................................................................................ 10 Description ................................................................................................. 11 Remote services benefits ...................................................................... 11 Solution security .................................................................................. -
Application Discovery Manager Administration Guide Vcenter Application Discovery Manager 7.0.0
Application Discovery Manager Administration Guide vCenter Application Discovery Manager 7.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document, see http://www.vmware.com/support/pubs. EN-000996-00 Application Discovery Manager Administration Guide You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product updates. If you have comments about this documentation, submit your feedback to: [email protected] Copyright © 2012 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com 2 VMware, Inc. Contents About This Book 7 1 Overview 9 System Architecture 9 Distributed Appliance with Remote Database 11 Virtual Appliance Solution 11 Virtual Appliance Deployment 11 Mirrored Network Traffic 12 vCollector 12 Mixed Environment 12 Where To Go Next 13 Installation of New or Additional ADM Components 13 Licenses 13 Upgrading ADM 13 Migrating to a New Appliance 13 Security -
Complementarity and Substitutability Of
BORROW AND BUY: COMPLEMENTARITY AND SUBSTITUTABILITY OF ACQUIRERS’ ALLIANCES AND TECHNOLOGY ACQUISITIONS A DISSERTATION SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL OF THE UNIVERSITY OF MINNESOTA BY Paul Nary IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY AKS ZAHEER AND ASEEM KAUL, CO-ADVISERS JANUARY 2019 © Paul Nary, 2019 To my parents, who sacrificed so much to give me a better life. i ACKNOWLEDGEMENTS This long journey was only possible because I had the help, support, and love of so many wonderful people. I am grateful to have all of you in my life. I especially cannot possibly express enough gratitude to my parents, Michael and Djenelia, who never doubted me and always supported all of my choices, however imperfect they may have been. Coming to University of Minnesota turned out to be incredibly lucky. I am indebted to faculty members who convinced me to join this PhD program. I am also very fortunate to have convinced Aks Zaheer and Aseem Kaul to be my co-advisors, as I cannot imagine having a better, more complementary pair of mentors. I will always be thankful to them for teaching me all of the intricacies of the field, and setting such high standards for the quality of academic work. They patiently guided me through the process and allowed me to make my own choices, but made sure that I remained on the right trajectory. Throughout the entire experience, they only had my best interests at heart, and for that I will always be thankful. While I started working with Aseem Kaul in my first year, I would have never guessed that he would not only make such a fantastic adviser, but that he would also have a profound impact on my intellectual development as an academic.