Storage Virtualization II. - focusing on block virtualization -

Similar documents
Storage Virtualization II Effective Use of Virtualization - focusing on block virtualization -

Storage Virtualization I What, Why, Where and How? Rob Peglar Xiotech Corporation

SRM: Can You Get What You Want? John Webster, Evaluator Group.

ADVANCED DEDUPLICATION CONCEPTS. Thomas Rivera, BlueArc Gene Nagle, Exar

ADVANCED DATA REDUCTION CONCEPTS

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation

Scaling Data Center Application Infrastructure. Gary Orenstein, Gear6

Tom Sas HP. Author: SNIA - Data Protection & Capacity Optimization (DPCO) Committee

SRM: Can You Get What You Want? John Webster Principal IT Advisor, Illuminata

The File Systems Evolution. Christian Bandulet, Sun Microsystems

Storage Performance Management Overview. Brett Allison, IntelliMagic, Inc.

Restoration Technologies

Overview and Current Topics in Solid State Storage

High Availability Using Fault Tolerance in the SAN. Wendy Betts, IBM Mark Fleming, IBM

LEVERAGING FLASH MEMORY in ENTERPRISE STORAGE

Overview and Current Topics in Solid State Storage

A Promise Kept: Understanding the Monetary and Technical Benefits of STaaS Implementation. Mark Kaufman, Iron Mountain

Trends in Data Protection and Restoration Technologies. Jason Iehl, NetApp

Interoperable Cloud Storage with the CDMI Standard. Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG

Advanced iscsi Management April, 2008

Notes & Lessons Learned from a Field Engineer. Robert M. Smith, Microsoft

Virtualization Practices: Providing a Complete Virtual Solution in a Box

Realizing the Promise of SANs

Virtualization Practices:

Everything You Wanted To Know About Storage (But Were Too Proud To Ask) The Basics

Compute Infrastructure Management: The Future. Fred van den Bosch CTO, EVP Advanced Technology VERITAS Software Corporation

Data Deduplication Methods for Achieving Data Efficiency

The Role of WAN Optimization in Cloud Infrastructures. Josh Tseng, Riverbed

ASPECTS OF DEDUPLICATION. Dominic Kay, Oracle Mark Maybee, Oracle

Storage in combined service/product data infrastructures. Craig Dunwoody CTO, GraphStream Incorporated

Tiered File System without Tiers. Laura Shepard, Isilon

Application Recovery. Andreas Schwegmann / HP

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

Deploying Public, Private, and Hybrid. Storage Cloud Environments

pnfs, parallel storage for grid and enterprise computing Joshua Konkle, NetApp, Inc.

High Availability Using Fault Tolerance in the SAN. Mark S Fleming, IBM

Effective Storage Tiering for Databases

Massively Scalable File Storage. Philippe Nicolas, KerStor

Ron Emerick, Oracle Corporation

Interoperable Cloud Storage with the CDMI Standard. Mark Carlson, SNIA TC and Oracle Co-Chair, SNIA Cloud Storage TWG

EVERYTHING YOU WANTED TO KNOW ABOUT STORAGE, BUT WERE TOO PROUD TO ASK Part Cyan Storage Management. September 28, :00 am PT

INTERNATIONAL STANDARD

Vendor: EMC. Exam Code: E Exam Name: Cloud Infrastructure and Services Exam. Version: Demo

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp

SCSI Security Nuts and Bolts. Ralph Weber, ENDL Texas

Multi-Cloud Storage: Addressing the Need for Portability and Interoperability

A Vendor Agnostic Overview. Walt Hubis Hubis Technical Associates

Microsoft Storage Management

The Evolution of File Systems

HP StorageWorks. EVA Virtualization Adapter administrator guide

Identifying and Eliminating Backup System Bottlenecks: Taking Your Existing Backup System to the Next Level

in Transition to the Cloud David A. Chapa, CTE EVault, a Seagate Company

The Benefits of Solid State in Enterprise Storage Systems. David Dale, NetApp

FUJITSU Storage ETERNUS AF series and ETERNUS DX S4/S3 series Non-Stop Storage Reference Architecture Configuration Guide

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp

EMC Business Continuity for Microsoft Applications

PRESENTATION TITLE GOES HERE

Planning For Persistent Memory In The Data Center. Sarah Jelinek/Intel Corporation

A Crash Course In Wide Area Data Replication. Jacob Farmer, CTO, Cambridge Computer

How NAS Systems Participate in Data Protection. Paul Massiglia, Symantec Corporation

SMI-S Manage all the things!!! Chris Lionetti NetApp

Use Cases for iscsi and FCoE: Where Each Makes Sense

HP Storage Software Solutions

Expert Insights: Expanding the Data Center with FCoE

Veritas Storage Foundation for Windows by Symantec

SNIA Tutorial 1 A CASE FOR FLASH STORAGE HOW TO CHOOSE FLASH STORAGE FOR YOUR APPLICATIONS

LTFS Bulk Transfer Standard PRESENTATION TITLE GOES HERE

Configuring and Managing Virtual Storage

Creating Resources on the ZFS Storage Appliance

Server and Storage Consolidation with iscsi Arrays. David Dale, NetApp Suzanne Morgan, Microsoft

Open Source Storage Management Aperi and SMI-S for Linux

Trends in Data Protection and Restoration Technologies. Jason Iehl, Network Appliance Michael Rowan, Consultant

Fibre Channel vs. iscsi. January 31, 2018

Create a Smarter and More Economic Cloud Storage Architecture. November 7, 2018

Cloud Archive and Long Term Preservation Challenges and Best Practices

Felix Xavier CloudByte Inc.

access addresses/addressing advantages agents allocation analysis

Mobile and Secure Healthcare: Encrypted Objects and Access Control Delegation

Everything You Wanted To Know About Storage: Part Teal The Buffering Pod

Facing an SSS Decision? SNIA Efforts to Evaluate SSS Performance. Ray Lucchesi Silverton Consulting, Inc.

Design and Implementations of FCoE for the DataCenter. Mike Frase, Cisco Systems

Storage and Virtualization: Five Best Practices to Ensure Success. Mike Matchett, Akorri

Storage Area Networks: Performance and Security

Introducing Tegile. Company Overview. Product Overview. Solutions & Use Cases. Partnering with Tegile

The Road to Centralized Management

StarWind Virtual SAN Installation and Configuration of HyperConverged 2 Nodes with Hyper-V Cluster

SNIA Tutorial 3 EVERYTHING YOU WANTED TO KNOW ABOUT STORAGE: Part Teal Queues, Caches and Buffers

EMC Backup and Recovery for Microsoft Exchange 2007

Protecting Microsoft SQL Server databases using IBM Spectrum Protect Plus. Version 1.0

Analysis and Optimization. Carl Waldspurger Irfan Ahmad CloudPhysics, Inc.

Evolution of Fibre Channel. Mark Jones FCIA / Emulex Corporation

Apples to Apples, Pears to Pears in SSS performance Benchmarking. Esther Spanjer, SMART Modular

Business Benefits of Policy Based Data De-Duplication Data Footprint Reduction with Quality of Service (QoS) for Data Protection

Building Backup-to-Disk and Disaster Recovery Solutions with the ReadyDATA 5200

Redefining Microsoft Exchange Management

PRESENTATION TITLE GOES HERE. Understanding Architectural Trade-offs in Object Storage Technologies

HPE Data Replication Solution Service for HPE Business Copy for P9000 XP Disk Array Family

Boost your data protection with NetApp + Veeam. Schahin Golshani Technical Partner Enablement Manager, MENA

Dynamically unify your data center Dell Compellent: Self-optimized, intelligently tiered storage

MONITORING STORAGE PERFORMANCE OF IBM SVC SYSTEMS WITH SENTRY SOFTWARE

Transcription:

Storage Virtualization II Effective Use of Virtualization ti - focusing on block virtualization - Rob Peglar Xiotech Corporation

SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature under the following conditions: i Any slide or slides used must be reproduced without modification The SNIA must be acknowledged as source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. Neither the Author nor the Presenter is an attorney and nothing in this presentation is intended to be nor should be construed as legal advice or opinion. If you need legal advice or legal opinion please contact an attorney. The information presented herein represents the Author's personal opinion and current understanding of the issues involved. The Author, the Presenter, and the SNIA do not assume any responsibility or liability for damages arising out of any reliance on or use of this information. NO WARRANTIES, EXPRESS OR IMPLIED. USE AT YOUR OWN RISK. 2

Abstract/Agenda Virtualization Checklist Background info Implementing Virtualization Step-by-Step Achieving... Through Virtualization Capacity Performance High Availability Storage Virtualization and the SNIA SMI-S Policy-based Service Level Management Q&A 3

Virtualization Checklist Before purchasing and implementing any product the user should be aware that Storage Virtualization is an enabling technology and is a part of the solution Storage Virtualization is a tool for the IT administrator to simplify the management of the storage resources and reduce the complexity of the overall IT infrastructure 4

So, What s the Problem? Storage problems in specific areas, such as: Capacity Availability Performance Flexibility/Change of Attributes Manageability Goals to achieve e through h adoption of virtualization ati Align the storage infrastructure with the Business and IT Objectives of the end user Measure with Service Level Agreements (SLAs) internally and externally defined Implement business plans such as D/R, B/C and strategic plans 5

Implementing Storage Virtualization step-by-step Step 1: Step 2: Step 3: Step 4: Step 5: Step 6: Step 7: Step 8: Starting from a environment Add SAN infrastructure Add Virtualization infrastructure» Out-of-Band example» In-Band example Move volumes to SAN Change Primary/Secondary relationship Establish HA environment Create and Use Single Storage Pool Establish Load Balancing/Multi-pathing Sequence may change from project to project 6

Implementing Storage Virtualization 1. Start - environment = either internal or external direct connect storage devices Primary Volume 7

Implementing Storage Virtualization 2. Create SAN infrastructure FC or iscsi Switch SAN Storage Primary Volume 8

Implementing Storage Virtualization 3a. Add Virtualization Network OOB Software Agents may or may not accompany the Out-of-Band Appliance SAN Storage FC or iscsi Switch Out-of-Band Appliance Primary Volume 9

Implementing Storage Virtualization 3b. Add Virtualization Network InBand No Software Agents necessary FC or iscsi Switch In-Band Appliance SAN Storage Primary Volume The following slides apply both for In-Band and Out-of-Band approaches 10

Implementing Storage Virtualization 4. Mirror volumes to SAN Host-aware Mirroring SAN Storage In-Band / Out-of- Band Appliance Primary Volume Secondary Volume 11

Implementing Storage Virtualization 5. Change Primary/Secondary Host-aware Mirroring SAN Storage In-Band / Out-of- Band Appliance Primary Volume Secondary Volume 12

Implementing Storage Virtualization 6. Establish HA Environment Be aware: Path failover from the host to the network requires host software Path failover from the storage to the network may or may not require host software Use of interswitch links is not an HA technique SAN Storage In-Band / Out-of- Band Appliance HA technology choices: Active/Passive Active/Active N+1 Redundancy Primary Volume Secondary Volume 13

Implementing Storage Virtualization 7. Create Single Storage Pool Be aware: Copy of volumes to SAN may require host-based technique ( may not visible to arrays or network) SAN Storage In-Band / Out-of- Band Appliance NOTE: Some subsystems also have the ability to create a single virtual storage pool Primary Volume Secondary Volume 14

Implementing Storage Virtualization 8. Create Load Balancing Be aware: Load balancing occurs at all three levels and may involve software LB technology choices: Active/Passive Active/Active N+1 Redundancy Primary Volume NOTE: Some applications also have the ability to load balance amongst their own nodes SAN Storage In-Band / Out-of- Band Appliance Secondary Volume

Achieving High Availability in a Virtual environment Network-based Virtualization Do not rely on only one network-based appliance or intelligent switch only Same rule for in-band as for out-of-band There are different methods to protect the engines Active / Passive Active / Active N+1 redundancy N-way distributed ib t d clustering The technique used is vendor-specific 16

Achieving High Availability Example: active/passive appliances or subsystems Server with host-based multi-pathing software SAN switches, zoned Zone 1 Zone 2 Redundant appliances Virtual Volume1 - active Virtual Volume1 - passive Storage Mirrored Storage (performed by appliances or subsystems) 17

Achieving High Availability Example: active/passive appliances or subsystems Server with host-based multi-pathing thi software SAN switches, zoned Virtual Volume1 - active Zone 1 Zone 2 Virtual Volume1 - passive Redundant appliances Storage Mirrored Backend Storage (performed by appliances or subsystems) 18

Achieving High Availability Example: Multiple access of same volume Servers with host-based Multipathing Software Cluster File System Same Volumes are accessed by multiple servers simultaneously requires Cluster File System to avoid data integrity problems Redundant appliances Virtual Volume1 - active Virtual Volume2 - active Expansion of the Redundancy to multiple appliances (N+1) Storage Mirrored Backend Storage (performed by appliances or subsystems) 19

High Availability Considerations for intelligent switches To support high-availability configurations, virtual storage management must be distributed across two or more switches. The switches present a virtual volume/lun to the host(s) for a given LUN presented by the storage array(s) and that LUN may be a virtual disk Host-based multi-pathing software allows active-passive i or active-active access to the virtual volumes presented to the host(s) Allows hosts to access virtual volumes in the presence of a switch failure 20

Achieving High Availability Example with Out-of-Band appliances Cluster File System Servers with host-based Failover Software (host- to-switch failover) Same Volume is accessed by multiple servers simultaneously requires Cluster File System to avoid data integrity problems Out-of-Band Appliances Virtual Volume1 - active Mirrored Backend Storage (performed by the appliance Virtual Volume2 - active or subsystem) 21

Achieving Performance in a Virtual environment Striping / Mirroring Simultaneous reads and/or writes Load Sharing Load Balancing Off-loading host systems Caching (where possible) 22

Achieving Performance Example: In-band appliance SAN Non-Striped Storage Cache SAN In-band appliances Performance Improvement: Striped Storage 1. Striping across multiple disk arrays 2. Caching Technology in the In-Band SAN appliance 23

Achieving dynamic capacity improvements in a virtual environment Eliminate fixed-size LUNs Create dynamic virtual LUNs and expand the LUNs as necessary Requires dynamic volume support on the host(s) Create large virtual LUNs and pools and assign backing (physical) storage to it as the host writes data (Sparse Allocation) Data reduction techniques (dedup, compress, incrementalize) Dynamic growth of Volumes and File Systems simultaneously l 24

Sparse Allocation a.k.a. Thin Provisioning 1. New Volume 2. Initial Filesystem allocation 3. Data Written Unallocated Logical Block Filesystem Metadata Application Data 3. More Data Written 25

Considerations for Thin Provisioning Beware of Thin runaway (array over-subscription) Economic advantage anta varies - reserved ed space % Large thin LUN versus small growing LUN Read thin LUN may present problems Backup, Copy, Duplicate, Replica Vendor-specific treatment when reading unwritten blocks Over-allocate LUN versus over-subscribe system Consider data reduction instead of thin provisioning Be careful what you ask for you may get it! 26

Storage Virtualization and SNIA s Storage Management Initiative (SMI) The following material corresponds with the SNIA SMI-S 1.1.x 27

A Brief Introduction to SMI-S SNIA s strategic initiative to solve end-user operational challenges for Storage Management Passive (Discovery and Monitoring) Active (Storage Configuration; manually and policy- based) Based on Standards WBEM (Web Based Enterprise Management) CIM (Common Management Model) Includes Block Virtualization in its first version 28

Control Path in the SNIA Shared Storage Model Stora age domai in Database (dbms) Application File/record layer Host Network Block aggregation File system (FS) Device Storage devices (disks, ) Block layer Common Model for Agents Agent Agent Agent Agent Agent Agent Standard Protocol for Communication with Managers 29

SMI-S V1.1.x Capabilities 1. Identify key resources in a SAN 2. Identify interconnects between key resources in a SAN 3. Receive asynchronous notification that the configuration in a SAN has changed 4. Identify the health of key resources in a SAN 5. Receive asynchronous notification that the health of a SAN has changed 6. Identify the available performance of interconnects in a SAN 7. Receive asynchronous notification that the performance of a SAN interconnect has changed 8. Identify the zones being forced in as SAN 9. Create/Delete and enable/disable zones in a SAN Block Virtualization 10. Identify the storage volumes in a SAN 11. Create/delete/modify storage volumes in a SAN 12. Identify the connectivity and access rights to Storage Volumes in a SAN 13. Create/delete and enable/disable connectivity and access rights to Storage Volumes in a SAN 14. Allow a site to require the use of authenticated clients 30

SMI-S V1.1.x Disk Storage in the SMI-S JBOD Disk Array Out-of-band Virtualization Disk Storage CIM Area In-band Virtualization CIM Object Profile Logical Volume Manager (LVM) Cluster Still in Physical Package Access Points definition (Host-based) * Location Disk Drive Cluster Extra Capacity Set Software Access Points Location Pool Manipulation, Cap. and Settings Extent Mapping Sharing Disk Drive Backend Ports LUN Creation LUN Mapping & Masking Copy Services Job Control Device Credentials Cluster Extra Capacity Set Software Access Points Location Pool Manip., Cap. & Settings LUN Creation Copy Services Job Control Cluster Extra Capacity Set Software Access Points Location Pool Manip., Cap. & Settings LUN Creation LUN Mapping & Masking Copy Services Job Control CIM Subprofiles System Physical Package Logical Storage Extent Mapping Array Layouts & Sparing LUN Creation Copy Services * LVM info from older draft 1.0.x version; profile will be expanded and moved to SMI-S 1.1 31

Storage Configuration and Pool Manipulation HostedService StorageConfiguration Service System Cluster ElementCapabilities StorageCapabilities OwningJobElement ConcreteJob AffectedJobElement StoragePool AffectedJobElement StorageVolume 32

SMI-S and Storage Virtualization SMI-S is not a virtualization of storage per se It is a virtualization of the management APIs for the different vendor s components. The long term impact of SMI-S on virtualization products is profound! Eliminates the need for proprietary APIs to perform common management tasks such as creating LUNs, manage snapshots or data replication Avoids reverse engineering and its corresponding problems SNIA SMI-S V1.1.x already delivers standard interfaces that use virtualization technologies Will help to establish Policy-based Service Level Management and Automated Storage Resource Management (SRM) 33

Policy-based Service Level el Management What s the role of storage virtualization? ti 34

Policy-based Service Level Management Handles error-prone administrator tasks (such as storage provisioning) automatically Use of Web Services to communicate Pre-defined rules (policies) must be set One critical Service Level Management outcome is efficient i Storage Capacity Planning Dynamic Provisioning Automated Capacity Plan Execution 35

Storage Capacity Planning (Storage on Demand) Monitoring of Storage Capacity Application-centric centric but can be done in fabric or subsystem Threshold Management Definition of rules: What to do, when, to whom Discover free capacity with desired d storage attributes t Assign new storage into the server zone(s) Switch zoning via Web Services or SNIA SMI-S Grant specific server(s) access to the storage LUN Masking via Web Services or SNIA SMI-S Map storage to the server volume(s) (Online!!) Resize / Re-layout the volume (Web Services or SNIA SMI-S) Make larger volume aware to the application Including automatic, ti dynamic growth of file system 36

Policy-based Service Level Management - big picture (I) LAN Other App Servers Mission-critical Database Application Server Virtual Database Volume Critical Capacity Threshold reached Physically allocated Storage for the Database Free Storage 37

Policy-based Service Level Management - big picture (II) LAN Other App Servers Mission-critical Database Application Server Virtual Database Volume After Capacity Extension Physically allocated Storage for the Database Free Storage 38

Storage Virtualization for Policy-based Service Level Management Policy-based Service Level Management must be performed (executed) without any user interaction Once new free storage capacity is discovered, the existing volumes must be resized online without any impact to the application Only Storage Virtualization techniques can assure these requirements coupled with OS involvement 39

Q&A / Feedback Please send any yquestions or comments on this presentation to the SNIA: trackvirtualizationapplication@snia.org Many thanks to the following individuals for their contributions to this tutorial. SNIA Education Committee Frank Bunn Curt Kolovson Ben Kuo John Logan Gene Nagle Nik Simpson Wolfgang Singer David Thiel Joshua Tseng 40