Professional Documents
Culture Documents
Copyright 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other VERITAS product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation in the US and/or other countries. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies.
VERITAS Confidential
VERITAS Confidential
VERITAS
Application Uptime
Disaster Recovery
Capacity Planning
VERITAS
Software Services
Storage Infrastructure
Data Protection
High Availability
Active SRM
Storage Plug-ins
NAS
VERITAS
SAN
VERITAS Confidential
IT Storage Challenges
Difficulty managing growth Tight staffing resources Data availability Performance Managing heterogeneous environments Shrinking backup windows
VERITAS Confidential
Escalating IT Costs
It costs more to manage 10 GB of disk than it does to purchase it Less than 50% of UNIX/Windows disk is utilized Planned downtime and un-planned downtime affect application availability which equates to lost revenue
Storage Virtualization
Consumer Consumer Consumer Application Aspects of Storage
Throughput Responsiveness
Capacity
Disk size Number of disks/ path
Performance
Disk seek time Cache hit rate
Physical Aspects of Storage
Availability
MTBF Path redundancy
VERITAS Confidential
Storage Resources
H-P 10.7%
Source: Gartner Dataquest 2001 Storage Management Software Market Share (March 27, 2002)
Industry Leader
Foundation Suite technology is used by 1600 of the Global 2000 Corporations to ensure high availability of their data !!
Volume Manager is SunTone and Windows 2000 Server and Advanced Server Certified
VERITAS Confidential
VERITAS Confidential
Performance Enhancements
VERITAS Confidential
SAN
Advantages
Less metadata locking traffic Lower complexity
VERITAS Confidential
SAN
VERITAS Confidential
JBOD
HDS 99006
SUN T3
IBM Shark
HP
VERITAS Confidential
Quick and non-disruptive migration Lower administration costs Improved manageability Flexible deployment of applications Very Fast-Failover
VERITAS Confidential
Enterprise Applications
Billing systems Proprietary data processing Decision Support Systems
VERITAS Confidential
Moving data Maintaining software images Updating stale data, content and binaries Application load balancing
Enhanced manageability
Easy volume growth Rolling SW upgrades Simple load balancing
VERITAS Confidential
VERITAS Confidential
VERITAS Confidential
VERITAS Confidential
Web Servers
VERITAS Confidential
Web Servers
Email Servers
VERITAS Confidential
CFS
VERITAS Confidential
CFS
CFS
CFS
Email Servers
Seven steps!
VERITAS Confidential
Payroll Sales
Sales
Accounts Inventory
Inventory
VERITAS Confidential
VCS GAB/LLT
VCS GAB/LLT
VERITAS Cluster Server provides Cluster Membership services to Oracle Parallel Server (OPS) Cluster Manager Configurations: 2,4-node, Mid-level Servers, Major Storage Vendors Solaris 2.6/7/8
VERITAS Confidential
SAN
VERITAS Confidential
Makes the physical into logical Looks and acts like a disk Can grow, relayout and move while online
VERITAS Confidential
LAN
Host Server
(Control Console)
data flow
JBOD
Virtualized Disks
VERITAS Confidential
Achieve optimal performance without working for it Spend less time tuning Spend more time on other business critical applications Achieve more efficient I/O operations from the kernel
VERITAS Confidential
Direct Address 0 / Length Direct Address 1 / Length Direct Address 2 / Length Direct Address 3 / Length Direct Address 4 / Length Direct Address 5 / Length Direct Address 6 / Length Direct Address 7 / Length Direct Address 8 / Length Direct Address 9 / Length Single Indirect Block Double Indirect Block
Example: If write is <=256KB, uses the FS cache If write is > 256KB, uses Direct I/O
VERITAS Confidential
Storage Network
VERITAS Confidential
Logs file system changes before they are made Reduces fsck times after a crash from hours to just a few minutes
Parallel fscks ability to run fscks in parallel at boot time increases availability whenever running multiple file systems on a single host
Maintains data integrity Critical for HA environments Enhance performance with Q-Log
VERITAS Confidential
Causes of Downtime
30% of Downtime is planned! Planned Planned 30% 30%
Other 5%
Software 40%
VERITAS Confidential
Online Everything
Reduces planned and unplanned downtime Optimizes I/O performance No interruption of user access to data Analysis of a longer transaction history
VERITAS Confidential
VERITAS FlashSnap
Availability and PerformanceIncreasing Business Efficiencies
VERITAS Confidential
VERITAS FlashSnap
Builds on VxVM and enables the use of point-in-time copies to perform critical operations Option to SANPoint Foundation Suite
Production Server Alternate Host SplitMirror Snapshot
Volume Snapshot
VERITAS Confidential
FastResync
Mirror 1
Mirror 2
/fs/
VERITAS Confidential
Mirrored Volume
FastResync
Data Change Map
Mirror 1
Snapshot
/fs/.
VERITAS Confidential
Split Volume
/fs/.
FastResync
Data Change Map
Mirror 1
Mirror 2
/fs/
VERITAS Confidential
FastResync Volume
Volume Snapshot
VERITAS Confidential
Storage Checkpoints
A point-in-time image of the primary cluster file system /vxfs.... Storage Checkpoint
A B C D E F G
VERITAS Confidential
A A B C D E F G G
VERITAS Confidential
Copy-on-write mechanism first copies the beforeimage to the Storage Checkpoint and then updates the data block in the primary file system Mountable and writable Copy-on-write in place until the next Storage Checkpoint created or the Checkpoint is removed
Standard Recovery
Time 0:00 Full Backup 12:00 24:00
Transactions
15:00
Back in service
FlashSnap Recovery
Time 0:00 Full Backup
10:00
12:00
14:00
24:00
Transactions
15:00
Summary
SANPoint Foundation Suite /HA provides:
Simplified Data Access Architecture Transparent access to shared data with no application modifications A solution that scales as your requirements grow File System accessibility from multiple servers providing high availability Simplified cluster-wide management of shared data
VERITAS Confidential
VERITAS Confidential
VERITAS Confidential
Environment
Databases - Sybase ASE 11.9.2 / 12.0 Applications - Tuxedo / Jolt / MQM / Netscape
VERITAS Confidential
Thank You
VERITAS Confidential