High Availability and Data Protection with Dell Emc Isilon Scale-Out Nas

High Availability and Data Protection with Dell Emc Isilon Scale-Out Nas

WHITE PAPER HIGH AVAILABILITY AND DATA PROTECTION WITH DELL EMC ISILON SCALE-OUT NAS Abstract This white paper details how Dell EMC Isilon scale-out NAS storage and the Isilon OneFS operating system architecture provide high availability and data protection needed to meet the challenges organizations face as they deal with the deluge of digital content and unstructured data and the growing importance of data protection. July 2018 High1 | High Availability Availability and andData Data Protection Protection with withDell DellEMC EMC Isilon Isilon Scale Scale-out -NoutAS NAS © 2018 Dell Inc. or its subsidiaries. TABLE OF CONTENTS Introduction .......................................................................................................................................... 4 High availability and reliability at the petabyte scale ............................................................................ 4 Areal density and drive rebuild times ................................................................................................................................. 4 Silent data corruption ......................................................................................................................................................... 4 Data protection continuum ................................................................................................................................................. 4 High availability with Isilon ................................................................................................................... 5 Isilon scale-out architecture ............................................................................................................................................... 5 Isilon OneFS architectural overview .................................................................................................................................. 6 Safe writes ........................................................................................................................................................................................ 7 Cluster group management .............................................................................................................................................................. 8 Concurrency and locking .................................................................................................................................................................. 8 File layout ......................................................................................................................................................................................... 8 Flexible protection ............................................................................................................................................................................ 8 Failure domains and resource pools ............................................................................................................................................... 10 Automatic partitioning ..................................................................................................................................................................... 10 Manual node pool management ..................................................................................................................................................... 13 Virtual hot spares ............................................................................................................................................................................ 13 OneFS Fault tolerance ..................................................................................................................................................... 14 File system journal .......................................................................................................................................................................... 14 Proactive device failure .................................................................................................................................................................. 14 Isilon data integrity .......................................................................................................................................................................... 14 Protocol checksums ....................................................................................................................................................................... 14 Dynamic sector repair ..................................................................................................................................................................... 14 MediaScan...................................................................................................................................................................................... 14 IntegrityScan................................................................................................................................................................................... 14 Fault isolation ................................................................................................................................................................................. 15 Accelerated drive rebuilds .............................................................................................................................................................. 15 Automatic drive firmware updates .................................................................................................................................................. 15 Rolling upgrade .............................................................................................................................................................................. 15 Non-disruptive Upgrades ................................................................................................................................................................ 15 Roll Back Capable .......................................................................................................................................................................... 15 Performing the upgrade .................................................................................................................................................................. 16 Isilon data protection ...................................................................................................................................................................... 16 High availability and data protection strategies ................................................................................................................ 17 The Isilon high availability and data protection suite........................................................................................................ 17 Connection load balancing and failover ........................................................................................................................... 18 SmartConnect ................................................................................................................................................................................. 18 2 | High Availability and Data Protection with Dell EMC Isilon Scale-out NAS © 2018 Dell Inc. or its subsidiaries. Snapshots ........................................................................................................................................................................ 19 SnapshotIQ..................................................................................................................................................................................... 19 SnapshotIQ architecture ................................................................................................................................................................. 20 Snapshot scheduling ...................................................................................................................................................................... 21 Snapshot deletes ............................................................................................................................................................................ 21 Snapshot restore ............................................................................................................................................................................ 22 File clones ...................................................................................................................................................................................... 22 SmartDedupe ................................................................................................................................................................... 23 Small File Efficiency for Healthcare PACS ...................................................................................................................... 23 Replication ........................................................................................................................................................................ 23 SyncIQ ............................................................................................................................................................................................ 23 SyncIQ linear restore

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    35 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us