High Availability and Data Protection with Dell Emc Isilon Scale-Out Nas

High Availability and Data Protection with Dell Emc Isilon Scale-Out Nas

HIGH AVAILABILITY AND DATA PROTECTION WITH DELL EMC ISILON SCALE-OUT NAS ABSTRACT This white paper details how the Isilon OneFS architecture provides high availability and data protection needed to meet the challenges organizations face as they deal with the deluge of digital content and unstructured data and the growing importance of data protection. September 2016 WHITE PAPER The information in this publication is provided “as is.” DELL EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any DELL EMC software described in this publication requires an applicable software license. DELL EMC2, DELL EMC, the DELL EMC logo are registered trademarks or trademarks of DELL EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. © Copyright 2016 DELL EMC Corporation. All rights reserved. Published in the USA. <09/16> <white paper> <H10588> DELL EMC believes the information in this document is accurate as of its publication date. The information is subject to change without notice. DELL EMC is now part of the Dell group of companies. 2 TABLE OF CONTENTS INTRODUCTION ........................................................................................................................6 HIGH AVAILABILITY AND RELIABILITY AT THE PETABYTE SCALE .................................6 Areal density and drive rebuild times ................................................................................................. 6 Silent data corruption ........................................................................................................................ 6 Data protection continuum ................................................................................................................ 7 HIGH AVAILABILITY WITH DELL EMC ISILON ......................................................................7 Isilon scale-out architecture ............................................................................................................... 7 OneFS architectural overview ........................................................................................................... 8 Safe writes ....................................................................................................................................................9 Cluster group management ..........................................................................................................................9 Concurrency and locking ............................................................................................................................10 File layout ....................................................................................................................................................10 Flexible protection .......................................................................................................................................10 Failure domains and resource pools ...........................................................................................................12 Automatic partitioning ................................................................................................................................. 12 Manual node pool management .................................................................................................................13 Virtual hot spares ........................................................................................................................................13 OneFS fault tolerance ..................................................................................................................... 13 File system journal ......................................................................................................................................13 Proactive device failure ...............................................................................................................................14 Isilon data integrity ......................................................................................................................................14 Protocol checksums ....................................................................................................................................14 Dynamic sector repair ................................................................................................................................. 14 MediaScan ..................................................................................................................................................14 IntegrityScan ...............................................................................................................................................14 Fault isolation ..............................................................................................................................................15 Accelerated drive rebuilds ...........................................................................................................................15 Automatic drive firmware updates ...............................................................................................................15 Rolling upgrade ...........................................................................................................................................15 Non-disruptive Upgrades ............................................................................................................................15 Roll Back Capable ......................................................................................................................................16 Performing the upgrade ..............................................................................................................................16 Isilon data protection ...................................................................................................................................16 3 High availability and data protection strategies ............................................................................... 17 The Isilon high availability and data protection suite ....................................................................... 17 Connection load balancing and failover ........................................................................................... 18 SmartConnect .............................................................................................................................................18 Snapshots ....................................................................................................................................... 19 SnapshotIQ .................................................................................................................................................19 SnapshotIQ architecture .............................................................................................................................19 Snapshot scheduling ...................................................................................................................................20 Snapshot deletes ........................................................................................................................................21 Snapshot restore .........................................................................................................................................21 File clones ...................................................................................................................................................21 SmartDedupe .................................................................................................................................. 22 Small File Efficiency for Healthcare PACS ...................................................................................... 22 Replication ...................................................................................................................................... 22 SyncIQ ........................................................................................................................................................22 SyncIQ linear restore ..................................................................................................................................23 SyncIQ replica protection ............................................................................................................................24 SyncIQ failover and failback .......................................................................................................................24 Continuous replication mode ......................................................................................................................25 Archiving and data security ............................................................................................................. 26 SmartPools .................................................................................................................................................26 CloudPools ...................................................................................................................................... 27 SmartLock ......................................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    34 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us