EMC Storage Resource Management

Similar documents
EMC SRM 3.0 & ViPR 1.1

HP Storage Software Solutions

Ransomware & Modern DR: Risky Business

EMC Ionix ControlCenter (formerly EMC ControlCenter) 6.0 StorageScope

Application Visibility in Virtualized Environment

Powerful Insights with Every Click. FixStream. Agentless Infrastructure Auto-Discovery for Modern IT Operations

IBM Spectrum Control. Monitoring, automation and analytics for data and storage infrastructure optimization

儲存網路, 與時俱進 JASON LIN SENIOR TECHNICAL CONSULTANT BROCADE, TAIWAN

Enabling Fast IT. In the IoE era. Alberto Degradi DCV Sales Leader. November 2014

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

Changing The Conversation: Infrastructure as a Service

Copyright 2018, Oracle and/or its affiliates. All rights reserved.

<Insert Picture Here> Enterprise Data Management using Grid Technology

Brocade Network Advisor

ACCELERATE THE JOURNEY TO YOUR CLOUD

Connect and Transform Your Digital Business with IBM

Dell EMC SAP HANA Appliance Backup and Restore Performance with Dell EMC Data Domain

Taking Control of Your VMware vsphere Environment with Operations Management

Reinvent Your 2013 Security Management Strategy

Cloud Computing Private Cloud

<Insert Picture Here> Managing Oracle Exadata Database Machine with Oracle Enterprise Manager 11g

Zero Trust in Healthcare Centrify Corporations. All Rights Reserved.

IBM Storage Software Strategy

ARUBA AIRWAVE. Visibility and management for multi-vendor access networks DATA SHEET REAL-TIME MONITORING AND VISIBILITY

EMC Simple Support Matrix

Alternative Backup Methods For HP-UX Environments Today and Tomorrow

Welcome. Chris Sortzi, VP of Public Sector RightNow Technologies. March 19, RightNow Technologies, Inc.

Virtualizing SQL Server 2008 Using EMC VNX Series and VMware vsphere 4.1. Reference Architecture

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

Data Protection for Virtualized Environments

Copyright 2015 EMC Corporation. All rights reserved. Published in the USA.

ALERT LOGIC LOG MANAGER & LOG REVIEW

Veritas InfoScale Operations Manager 7.2 Installation and Configuration Guide

ARUBA AIRWAVE. Management and monitoring for multi-vendor campus networks DATA SHEET CONNECTIVITY ANALYTICS REAL-TIME MONITORING AND VISIBILITY RAPIDS

Three Paths To The Cloud. Kirill Kostitsyn

Introducing IBM WebSphere CloudBurst Appliance and IBM WebSphere Application Server Hypervisor Edition

Journey to the Private Cloud

Oracle Enterprise Manager Ops Center 12c Administration Ed 3

IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud VMworld 2017 Content: Not for publicati

EXECUTIVE VIEW. One Identity SafeGuard 2.0. KuppingerCole Report

Enterprise Manager: Scalable Oracle Management

Optimizing and Managing File Storage in Windows Environments

Brocade Network Advisor: Storage Networking

Vblock Architecture Accelerating Deployment of the Private Cloud

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Copyright 2015 EMC Corporation. All rights reserved. Published in the USA.

Introduction to Amazon Cloud & EC2 Overview

Mobility First How Tomorrow Moves for Education

ORACLE ENTERPRISE MANAGER 10g ORACLE DIAGNOSTICS PACK FOR NON-ORACLE MIDDLEWARE

Welcome to Staying Ahead Webinar

Veritas Operations Manager Storage Insight Add-on for Deep Array Discovery and Mapping 4.0 User's Guide

Cisco Storage Media Encryption for Tape

Realizing the Promise of SANs

Copyright 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12

Dell OpenManage Product and Services Guide

Oracle Enterprise Manager Ops Center. Overview. What You Need. Create Oracle Solaris 10 Zones 12c Release 3 ( )

Microsoft Office SharePoint Server 2007

Network-Aware Service Management EMC and Microsoft. Michael Woduschegg Channel and Alliance Manager EMEA Central

EMC Integrated Infrastructure for VMware. Business Continuity

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves

SYMANTEC DATA CENTER SECURITY

OnCommand Unified Manager

Modernize with all-flash

Visual TruView Unified Network and Application Performance Management Focused on the Experience of the End User

Bringing Business Value to Object Oriented Storage

Modernize Your IT with Dell EMC Storage and Data Protection Solutions

Microsoft Operations Manager 2005

Vernetzte Fahrerassistenzsysteme (BMW + AWS ) Hazard Preview

Solution Overview Vectored Event Grid Architecture for Real-Time Intelligent Event Management

EMC VMAX UNISPHERE 360

Managing Oracle Database 12c with Oracle Enterprise Manager 12c

EMC Virtual Infrastructure for Microsoft Applications Data Center Solution

Veritas Disaster Recovery Advisor Release Notes

Riverbed. Rapidly troubleshoot critical application and network issues using real-time infrastructure visualization and monitoring.

CommandCenter Secure Gateway

EMC ControlCenter 6.0. Support Matrix P/N REV A15. EMC Corporation Corporate Headquarters: Hopkinton, MA

DELL EMC VMAX UNISPHERE 360

Unified Computing System Launch. Welcome to Yas Island

Netwrix Auditor. Visibility platform for user behavior analysis and risk mitigation. Mason Takacs Systems Engineer

15-Minute Guide to Effectively Virtualizing Mission-Critical Applications with VMware

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. reserved. Insert Information Protection Policy Classification from Slide 8

Ta kontroll över er data! Christofer Jensen Client Technical Specialist. Stockholm

StarWind Virtual SAN Getting Started

Creating Resources on the ZFS Storage Appliance

Leading Innovation in the Data Center

Sentinet for BizTalk Server SENTINET

Arcserve Unified Data Protection Virtualization Solution Brief

Pervasive Insight. Mission Critical Platform

INTRODUCTION TO THE VVNX COMMUNITY EDITION

Transforming Data Protection with HPE: A Unified Backup and Recovery June 16, Copyright 2016 Vivit Worldwide

StarWind Appliances Quick Start Guide

Oracle Enterprise Manager 12c IBM DB2 Database Plug-in

Migration Best Practices for Oracle Access Manager 10gR3 deployments O R A C L E W H I T E P A P E R M A R C H 2015

VxRack System SDDC Enabling External Services

São Paulo. August,

Dennis Breithaupt Senior Systems Engineer, Enterprise Accounts 2014 Riverbed Technology. All rights reserved.

EMC Storage Monitoring and Reporting

COMMON CRITERIA CERTIFICATION REPORT

VMWARE VREALIZE OPERATIONS MANAGEMENT PACK FOR. NetApp Storage. User Guide

Terremark Overview. Moscow, 17 March 2010

Transcription:

EMC Storage Resource Management Tim Dell EMC Solutions Manager 1

Resource Reporting.Um yeah 2

Storage Resource Management Software Magic Quadrant for Storage Resource Management and SAN Management Software, 2009 EMC recognized by Gartner as having both the most complete vision and highest ability to execute among those selected for its Leaders quadrant Source: Gartner, Inc. Magic Quadrant for SRM and SAN Management Software, June 22, 2009 The Magic Quadrant is copyrighted 2009 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available on EMC.com 3

Challenges Addressed by Storage Resource Management How do you understand what you have in your and storage environment and if it s meeting expectations? Can you diagnose problems across your infrastructure? How do you improve operational efficiency and maximize ROI on capital investments? How do you address change management and compliance requirements? 4

The World of Element Managers.and API Integration 5

The Ionix ControlCenter Family Ionix ControlCenter: A comprehensive family of storage resource management (SRM) applications that integrates the deepest set of storage administration functions across the broadest set of storage resources Ionix ControlCenter family overview Core package offerings SAN Manager Performance Manager StorageScope Add-on options StorageScope File Level Reporter Automated Resource Manager SAN Advisor Comprehensive storage resource management for: Planning Provisioning Monitoring Reporting 6

What s New in Ionix ControlCenter V6.1? Virtual Provisioning Management Symmetrix V-Max Array Support Auto-provisioning groups VLUNs Reporting on Fully Automated Storage Tiering Enhanced Integration with Symmetrix Management Console New SRDF Device Support New Ionix ControlCenter Reporting End-to-End Reporting for Invista StorageScope Query Scheduler EDL Discovery New standard for SRM security with RSA Support for IPv6 Relationship views for HP EVA and IBM DS Series arrays 7

ControlCenter Service Level Definition 8

ControlCenter Service Level Definition 9

ControlCenter Service Level Definition ControlCenter reports host capacity by storage type to understand where capacity resources are dedicated 10

Array Capacity by Storage Type ControlCenter reports on allocated/unallocated capacity within an array by storage type to identify when critical array resources are running low 11

Shared Storage Was Multi-Counted A B 1 10 GB 2 10 GB 3 10 GB 4 10 GB Host(s) Total A 30 GB (1+2+3) B 30 GB (2+3+4) Total 60 GB 12

Shared Storage Setting 13

Shared Storage Setting 14

Example: A Basic Cluster A B 1 10 GB 2 10 GB 3 10 GB 4 10 GB Distributed Single Host Host(s) Total Shared Not Shared Chargeable A 30 GB (1+2+3) 20 GB (2+3) 10 GB (1) 20 GB B 30 GB (2+3+4) 20 GB (2+3) 10 GB (4) 20 GB Chargeable = Not Shared + ½ Shared 15

Example: A Basic Cluster A B 1 10 GB 2 10 GB 3 10 GB 4 10 GB Distributed Single Host Host(s) Total Shared Not Shared Chargeable A 30 GB (1+2+3) 20 GB (2+3) 10 GB (1) 30 GB B 30 GB (2+3+4) 20 GB (2+3) 10 GB (4) 10 GB Chargeable = Not Shared + All/None Shared 16

Next Generation Storage Resource Management 17

Enterprise Storage Management - Future GRC Security Unified Infrastructure Management Critical Business Metrics Business Intelligence Framework IP Network & Ops Management Storage Resource Management Data Protection Heterogeneous Enterprise Management Capacity Analysis Performance Diagnostics Configuration Compliance Replication Backup End to End Resource Discovery and Monitoring Standalone Element Management SMC Unisphere Data Domain / Avamar SAN Fabric Managers 3 rd Party Array & Backup Managers 18

Strategic Drivers for Next-Generation Ionix Storage Software Performance and Scalability Ease of Use, Ease of Deployment Central UI experience; use case focus Agent-less discovery options Integration with EMC Ionix and Storage Solutions Information sharing through open architecture Element management will be managed in-context Extend Broad Platform Coverage via Standard Interfaces 19

Copyright 2009 EMC Corporation. All rights reserved. 20 Strategic Drivers: Ease of Use, Ease of Deployment

Copyright 2009 EMC Corporation. All rights reserved. 21 Strategic Drivers: Ease of Use, Ease of Deployment

Copyright 2009 EMC Corporation. All rights reserved. 22

Copyright 2009 EMC Corporation. All rights reserved. 23

Copyright 2009 EMC Corporation. All rights reserved. 24

Use Case Focus 25

Agentless Discovery Options Option Description Pros Cons Passive Host identity inferred from other sources (i.e. switch) No host credentials needed No host attributes available Host device to LUN link not determined WMI / WS-MAN Remotely access WMI or WS-MAN services No script pushed to host Windows only WMI services must be enabled WS-MAN not available on all Windows OSes Agentless without root access Linux/Unix - SRM7 remotely logs into host and executes script to collect data Windows SRM7 uses WMI to collect information Root access not needed Can collect majority of host attributes Host device to LUN link not determined Requires ssh & scp enabled (linux/unix) Agentless with root access Linux/Unix - SRM7 remotely logs into host and executes script to collect data Windows SRM7 uses WMI to collect information All necessary host information collected Requires root equivalent access Requires ssh & scp enabled (linux/unix) Host Agent Agent installed on host that manages data collection Can customize what information is collected Can collect data as frequently as needed Requires agent to be pushed to each host SRM7 will manage Maintenance of host agent via customer procedures 26

Element Manager Integration 27

Element Manager Integration 28

SRM Architecture HTTPS SRM Appliance Capacity Compliance SRM Application Web UI Element Manager Database Appliance Performance Discovery & Monitoring RDF XML RDBMS CC 6.1 Information Grid Migration HTTP/S Discovery Appliance Discovery Appliance Element Managers SMI, WMI, SSH, etc. Storage Environment EMC CONFIDENTIAL INTERNAL USE ONLY 29

SRM 7 Federation Web UI HTTPS HTTPS Replicated Objects Data Center 1 Data Center 2 EMC CONFIDENTIAL INTERNAL USE ONLY 30

EMC Ionix Storage Capacity Insight Understand how much storage you have, who s using it, and when you ll need to buy more. Monitor and Investigate Storage Utilization Reclaim Wasted Storage Improve Capacity Planning 31

EMC Ionix Storage Performance Insight Actionable management of end-to-end performance issues within your heterogeneous storage environment. Detect & predict performance problems Resolve issues quickly Optimize storage performance Intelligent Performance Data Collection 32

EMC Ionix Storage Configuration Advisor Detects improper configurations through change tracking and policy validation to reduce configuration issues associated with human error. Best Practice Policy Validation Change Tracking Service Analytics 33

Example: Path Redundancy Policy Breach Highlight violation to drill down and see details Select Breach Causes to view SCA s analysis of the source of the breach 34

Example: Path Redundancy Policy Breach Select Map to see the breach in a topology view Highlight violation to drill down and see details Select Breach Causes to view SCA s analysis of the source of the breach Quickly view associated objects and breach source in context 35

6.x to SRM7 Migration 1. Data Collection Policies Create access profile for unique id, password, method combinations Create discovery jobs from DCP entries 2. Performance Data One time extract from existing.btp files on SRM7 setup Daily extract of.btp files to get new perf stats 3. Historical Capacity One-time extract of DSS data on SRM7 setup Going forward SRM7 will collect the necessary capacity attributes User defined STS queries translated to work with SRM7 data model 4. User Defined Groups Existing groups converted to static SRM7 groups Objects not discovered by SRM7 will not be added to UDG 5. Alerts - More work needed on what can be migrated 6. Host agents to be transitioned 7. User Defined Fields 8. User Defined / Custom Names 9. User Groups, Roles and Permissions (Authorization) 10. Element Manager Integration 11. User Management (Authentication) 12. Configuration History 36

Storage Resource Management Software Release Schedule v6 2010 Q1 Q2 Q3 Q4 CC 6.1 UB8 CC 6.1 UB9 1H 2011 CC 6.1 UBx Early Feedback Program Performance Beta Performance Performance Next Gen Capacity Configuration Advisor 2.0 Configuration Advisor 2.1 Configuration Advisor 3.0 Configuration Advisor 3.x Committed Planned Investigating 37

Please evaluate this session: EMC Ionix Control Center For Simplified Management Text to 32075 In the message body, type: EMC2<space>23 then letters from the table below to indicate each response Provide additional comments by adding an * after the response letter and then type to comment Example: EMC2 23a*The speaker did a great job explaining the steps to reaching the cloud Overall rating of this session Highly Valuable Valuable Neutral Somewhat Valuable No Value Please indicate how valuable you found this session. a b c d e 38

THANK YOU 39