Professional Documents
Culture Documents
Storage Virtualization: Rest of Us!
Storage Virtualization: Rest of Us!
Storage n o i t a z i l a Virtu
ems Edition Hitachi Data Syst
A Reference
Rest of Us!
FREE eTips at dummies.com
for the
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Storage Virtualization
FOR
DUMmIES
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Authors Acknowledgments
Adrian De Luca and Mandar Bhide wish to thank Hitachi Data Systems Hubert Yoshida, David Merrill, and Ojay Bahra for their assistance with the writing of this book.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Publishers Acknowledgments
Were proud of this book; please send us your comments through our Dummies online registration form located at http://dummies.custhelp.com. For other comments, please contact our Customer Care Department within the U.S. at 877-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002. For details on how to create a custom For Dummies book for your business or organization, contact bizdev@wiley.com. For information about licensing the For Dummies brand for products or services, contact BrandedRights&Licenses@Wiley.com. Some of the people who helped bring this book to market include the following: Acquisitions, Editorial, and Media Development Senior Project Editor: Zo Wykes Australian Edition Editor: Kerry Davies Editorial Manager: Rev Mengle Business Development Representative: Karen Hattan Custom Publishing Project Specialist: Michael Sullivan Publishing and Editorial for Technology Dummies
Richard Swadley, Vice President and Executive Group Publisher Andy Cummings, Vice President and Publisher Mary Bednarek, Executive Director, Acquisitions Mary C. Corder, Editorial Director
Composition Services
Debbie Stailey, Director of Composition Services
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Table of Contents
Introduction ....................................................... 1
Whats in This Book ...................................................................2 Icons Used in This Book ............................................................3
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
vi
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Foreword
hen I was a young man, fresh out of college, I could throw all my worldly possessions into the back of my Chevrolet and go wherever I needed to be. Since then, I got married, had a family, bought a house, bought furniture, appliances, and tons of other stuff to support my familys lifestyle, and now it would take several truckloads to move me with all my stuff. I have lived in the same community for the past 20 years and have built a life here. It would be difficult for me to move if my work required it. However, with the availability of the Internet and broadband, my workplace has been virtualized and I can do my work without disrupting my life and moving all my stuff. Just like my life, businesses are burdened with tons of stuff, mainly data, that they must store, preserve, protect, and access. That burden is nearly doubling every year and is beginning to strangle businesses, limiting their ability to do their work. Data center managers are handling aging applications that are running on aging infrastructures and facilities that were built when electricity was readily available and carbon footprints were not a concern. They spend more and more of their data center budget on maintaining old systems instead of investing in new systems that are more efficient and environmentally friendly. The reason it is so difficult to modernize IT is the burden of data that must be carried forward with the modernization of applications and infrastructures. Ten years ago, before the turn of the millennium, changes could be made by suspending operations during off hours while data was migrated or transitioned to a new storage platform. Storage frames were directly attached to application servers and capacities were small enough that they could be moved within a day. Since then, the explosion of data, globalization, and online access requires applications to be available around the clock, and suspension of operations must be kept to an absolute minimum. The capacity of storage frames has increased a hundredfold and many more applications now share access to these large storage frames, making it difficult to coordinate downtime for shared storage frames. This makes
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
viii
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
lot has been written, taught, and even debated about virtualization in the information technology industry over the past few years, especially in the server world where it is best known. Vendors like VMware and Microsoft actively promote how their virtualization software provides efficient resource utilization, dynamic capabilities and ease of management, while the hardware vendors fiercely contend to be the company that has the lowest power consumption, better interoperability, and ease of deployment and support. Vendor marchitecture aside, all organizations are looking to improve efficiency, drive up productivity, and maximize every dollar of their IT investments. Virtualization has become an effective way to do more with less, especially in these tough economic times. However, for all the hype generated over virtualization, there remains a considerable number of misconceptions and general confusion. Many people think virtualization is some new whizbang technology when, in fact, the concept has been around a long time, with its origins dating back to the mighty mainframe era. The philosophy of aggregating physical components in a coordinated way to increase systems utilization and efficiency is very mature and has been successfully applied in many areas of IT beyond servers, such as networking and applications. So what about storage virtualization? Can the same benefits be realized when virtualization is applied to the storage area network (SAN)? The fact is that virtualization in the storage environment shares many of the same benefits of server virtualization and, most importantly, is highly complementary, extending agility and cost savings to the data assets. As a reader of this book, you are most likely looking to understand what virtualization is in the storage world, what benefits you are likely to realize, and how best to deploy virtualization in your environment to get the most out of it. Storage Virtualization For Dummies, Hitachi Data Systems Edition, explains the differences in implementation among various vendors and, more specifically, how it is applied by Hitachi.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
Last but not least, no For Dummies book would be complete without a chapter of tens. So Chapter 6 quite succinctly explains the ten best practices for physical configurations, data migrations, and thin, or dynamic, provisioning, and tips for designing your first storage virtualization project.
This icon indicates the information is really for the propeller spinners; you dont need to know all about how this works but you may find it interesting. This icon indicates a resource on the Internet you can look at to get further information.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 1
irtualization is one of the biggest buzzwords of the technology industry right now. But what is virtualization? More importantly, what can virtualization do for you and your company? In this chapter we look at just what virtualization is and how the concept applies in a practical sense to computer storage systems. We also take you on a stroll down memory lane to understand how storage virtualization came about and some of the business considerations that create the need for storage virtualization.
Defining Virtualization
If you look on the Internet, youll find any number of definitions for virtualization as it relates to IT. A general definition of virtualization is: The act of integrating one or more (back-end) services or functions with additional (front-end) functionality for the purpose of providing useful abstractions.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
SANs helped organizations consolidate their storage assets to improve capacity utilization by sharing their storage resource effectively. This simplified management by using common software tools, and enabled replication of critical information over long distances to provide greater levels of protection against data corruption and disaster events. Many larger organizations, typically financial institutions and telecommunication providers, were among the first to implement SANs. Even though these improvements helped organizations extract better value from their storage investments, a number of problems still remained. Islands of SANs were created due to poor interoperability between different vendors and devices, utilization levels were still relatively low due to traditional storage allocation practices being used, and the lack of mobility or replication between different storage vendors meant organizations were still hamstrung.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
10
In response to these challenges, in the early years of the 2000s, storage vendors began to introduce advanced virtualization features into their products. These features went beyond utilization improvements, also providing external connectivity of heterogeneous storage, non-disruptive data migration and mobility features, enhanced business continuity, logical partitioning, tiered storage, and thin provisioning. With thin provisioning (explained further in Chapter 5), the physical capacity of a volume or file system is allocated when applications write data, rather than being pre-allocated at the time of provisioning. Although the need for these capabilities was well understood by vendors, each vendor had a different philosophy on where the virtualization should reside.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
11
sites, as well as customer relationship management (CRM) and sales systems, are all critical to keeping the doors open. If these applications are unavailable for whatever reason, businesses cant service their customers and theyll go elsewhere. The Web has emerged as a source of rich media (images, video, and audio) and continues to grow unabated, with services like Facebook, Flickr, and YouTube creating unprecedented communities and collaboration between people all over the world. This exponential growth, together with the need to access information, has placed huge demands on the IT staff looking after them, especially on their storage infrastructures. With this explosion of new applications and services, the value and importance of the information generated has become more vital. Business intelligence and decision support systems mine information in databases to create valuable knowledge that helps organizations make prudent decisions and stay competitive. Also, with regulatory compliance coming into play, the need to retain and protect corporate data for predetermined periods of time is now inscribed in law. Similarly, the accessibility of information and media from the Internet and Web sites, in particular its availability, determines how successful a business is. If users cant get what they want, when they want it, from their browser in a couple of seconds, then they simply go elsewhere. All this creates several challenges in the storage environment.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
12
Reducing cost
As organizations deploy more and more applications into their environment, with consequent growth of data (often exponentially), many find they need to buy more storage more frequently, putting a real strain on budgets. As more storage is added, without effective storage management tools and processes, more IT people are needed to keep it going, and an unending cycle perpetuates. As more allocation requests are met, more people are needed to monitor the health of the infrastructure and protect the critical information by ensuring it is replicated and can be recovered in the event of a failure, requiring more storage. With IT budgets and headcount staying flat or in many situations actually decreasing, organizations need to find more efficient and automated ways of managing their valuable information assets in the face of static or shrinking resources.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
13
Take email, for example. Most employees take this service for granted as a fast way to communicate between their departments and with customers, send out information or quotations, and approve business decisions. If the email server were to slow down or be unavailable for a couple of days, not only would employees be unhappy, but the organizations productivity would plunge to a standstill. In this highly connected, real-time world, having to resort to traditional forms of communication and paper-based processes would significantly reduce the number of transactions the organization could do and, if the unavailability persisted, could place the business in real jeopardy. Therefore it is imperative that IT staff monitor the health of their infrastructure end to end, including storage, as the key piece to delivering dependable service levels to the business.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
14
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
15
Going green
More than 20 years of research into carbon pollution now strongly suggests that human activity is having a profound impact on the Earths climate. The almost indisputable evidence has now forced many governments to action by implementing tangible strategies and policies that reduce carbon emissions. As one of the many measures to tackle the problem, it calls for countries to implement carbon emissions trading schemes to steadily reduce pollution, but at a cost to businesses. So what has all this got to do with storage? The net effect of these new trading systems, coupled with the fact that the worlds reserves of non-renewable resources are rapidly depleting, means the cost of power is rising. In the past, the cost of powering and cooling data centers was negligible and was often not even factored into the IT budget. However, according to an IDC article in 2008, recent surveys suggest that with continued deployment of applications and data doubling every 18 months, power and cooling costs will grow eightfold by 2010! In another survey, by Gartner Consulting, findings showed that the power consumption required to run and cool data centers accounts for almost a quarter of global carbon dioxide emissions from the information and communication technology sector. And the StorageIO Group reports that storage itself accounts for between 37 and 40 percent of total energy usage from hardware. With business accounting for a substantial share of greenhouse gas pollution, many organizations have developed social responsibility policies to help protect the environment. Demonstrating to customers and their respective industries that they are not only conscious of the issue, but care about being part of the solution, is important for organizations. A number of large multinational companies, such as Citigroup, Vodafone, HSBC, and British Telecom, have already committed to carbon reductions within their companies, some aiming to be carbon neutral altogether.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
16
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 2
n todays modern computer architectures, virtualization exists in almost every layer, from the application to the operating system, server, networks, and storage devices. For example, application clustering technologies such as Microsoft Clusters and Oracles Real Application Clusters (RAC) manage the process of selecting a server to deliver an application without the user knowing which server its coming from. Server virtualization allows you to run multiple operating systems on the same physical hardware platform to improve utilization of the central processing unit (CPU) and memory. Most of these forms of virtualization work together to optimize efficiency throughout the layers of technology. This chapter examines the different forms of storage virtualization and helps you to choose the appropriate type of storage virtualization for your environment. Virtualization can also be implemented in various layers of the storage infrastructure, starting at the operating systems device file through to the host bus adapter, storage network, and storage array, as shown in Figure 2-1. Virtualization concepts can also be implemented within the devices themselves. For example, storage array vendors employ virtualization aspects within devices such as RAID (redundant array of independent disks). RAID groups together physical
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
18
hard disks, spreading the data across all the spindles and slicing them up in chunks called LUNs (logical unit numbers) to deliver to servers. This method provides greater protection against a physical drive failure, so if one were to stop working for whatever reason, the system would not lose any valuable data and continue to work. Similarly, storage network vendors incorporate partitioning capabilities such as zones and virtual storage area networks (VSANs) to separate workloads for management and security purposes.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
19
In the server
Some of the earliest forms of storage virtualization came not from the storage infrastructure, but from within the server, or, more specifically, the servers operating systems. With traditional storage hardware devices that connected directly to servers, the actual magnetic disk was presented to servers and their operating systems as LUNs, where the disk was arranged into sectors comprised of a number of fixedsize blocks. To allow applications to not only store, but find information easily, the operating system arranged these blocks into a file system. Much like a paper-based filing system, a file system is simply a logical way of referencing these blocks into a series of unique files, each with a meaningful name and type so they can be easily accessed. For example, take the file name My_Summer_Break.doc. My_Summer_Break describes what is contained within the file and the extension .doc identifies the file as a document. This naming is a lot more meaningful than just a numeric block number. Although file systems helped to reference information easily, as more and more of them were created, exhausting the storage space of the physical LUN, another LUN would be created and given to the operating system to continue storing files. To know which data was stored on what LUN, the operating system would assign each one a volume number, name, or identifier. In Microsoft Windows you are most likely familiar with a letter given to each volume such as C:\ or D:\, whereas in UNIX these look like /dev/hd0 or /dev/hd1. As applications and users created more files, more volumes were needed to keep up, pretty soon making it very difficult to manage.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
20
Figure 2-2: Logical volume managers (LVMs) store information in file systems.
Also, since LVMs could hide or abstract where the storage was actually coming from, you could present multiple physical disks and perform a striping operation. The technique of data striping takes multiple physical disks, ideally with their own discrete path to the server, breaks up the files into even pieces, and spreads the file across multiple storage devices. Writing and reading data in this way reduces the response time and thereby
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
21
increases the performance. All hard disks have a seek time, which is the time it takes for the information being requested on the spinning disk to arrive under the reading head. By spreading data across multiple disks, the process of finding the information can be done in parallel, thereby reducing the seek time. Although striping greatly helped to retrieve data faster, it did pose a significant risk that, if just one of the disks failed, then effectively the full data could not be retrieved, resulting in corruption. In the 1980s, a new striping method was introduced, RAID, which increased data reliability if disks failed. RAID-1 duplicates all the data across every disk, providing a backup copy for everything. Although this provides high levels of resilience, it is extremely expensive because you need double the amount of storage. RAID-5, shown in Figure 2-3, combines the performance of striping plus parity, which provides recovery in the event of a disk failure. By using a mathematical formula to calculate the parity, if a disk were to fail in the RAID set, then the data can be regenerated and retrieved with no impact. More recently, RAID-6 was introduced to cope with the long regeneration times of large disk drives, writing parity information to two disks instead of one.
Server-based forms of storage virtualization were originally incorporated into operating systems as software and still remain very popular today. Here are the key benefits of this approach: Server-based storage virtualization is highly configurable and flexible since its implemented in the system software. Because most operating systems incorporate this functionality into their system software, it is very cheap. It does not require additional hardware in the storage infrastructure, and works with any devices that can be seen by the operating system.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
22
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
23
virtualization device, never directly with the storage device. The virtualization device analyzes the request, consults its mapping tables, and, in turn, performs I/O to the storage device. These devices not only translate storage requests but are also able to cache data with their on-board memory, provide metrics on data usage, manage replication services, orchestrate data migration, and implement thin provisioning.
Figure 2-4: In-band network storage virtualization is embedded in the I/O path.
The out-of-band approach, sometimes referred to as asymmetric, does not strictly reside in the I/O path like the in-band approach; rather, it works hand in hand with specific virtualizationenabled SAN switches to perform specific look-ups, shown in Figure 2-5. The servers maintain direct interaction with the storage array through the intelligent switch. The out-of-band appliance maintains a map (often referred to as meta-data) of all the storage resources connected in the SAN and instructs the server where to find it. In this two-step process, the server uses
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
24
Figure 2-5: Out-of-band network storage virtualization uses intelligent switches to maintain direct interaction between the servers and the storage arrays.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
25
The virtualization devices are typically servers running system software and requiring as much maintenance as a regular server. Clustering is needed to protect the mapping tables and maintain cache consistency between the nodes, which can be risky. Servers are also limited in the number of storage ports they can support and RAM (random access memory) capacity (as storage is limited in cache). As a result, servers lack scalability. The I/O can suffer from latency, impacting performance and scalability due to the multiple steps required to complete the request, and limited to the amount of memory and CPU available in the appliance nodes. Decoupling the virtualization from the storage once it has been implemented is impossible because all the meta-data resides in the appliance, thereby making it proprietary. Solutions on the market only exist for fibre channel (FC) based SANs. These devices are not suitable for Internet protocol (IP) based SANs, which utilize iSCSI (Internet small computer system interface), NAS, or mainframe servers. Since both approaches are dependent on the SAN, they require additional switch ports, which involves additional zoning complexity. When migrating data between storage systems, the virtualization appliance must read and write the data through the SAN, check status coming back, and maintain a log for any changes during the move that impact performance. All of these add complexity and cost to the SAN, which makes it very difficult to manage the network with registered state change notifications (RSCNs, which notify specified nodes of any major fabric changes), inter-switch chatter, zoning changes, and buffer credit management. SANs are the third leading cause of application failure after human and software errors.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
26
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
27
Figure 2-6: Controller-based storage virtualization allows external storage to appear as if its internal.
This block-based virtualization effectively enables all capabilities of the virtualized storage controller to be extended to the external storage as well. Leveraging mature enterpriseclass features, data can be migrated non-disruptively from one pool to another, and replication can take place between non-like and like storage. In addition, partitioning can be implemented to allocate resources such as ports, cache, and disk pools to particular workloads to maintain quality of service and security, and thin provisioning can reduce storage allocation to other assets. More recently, vendors have introduced clustering capabilities between controllers to provide the ultimate high availability in the unlikely event of a complete storage array failure. Although a few downsides to controller-based virtualization exist, the advantages not only far outweigh them but they also address most of the deficiencies found in server- and networkbased approaches.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
28
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
29
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
30
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 3
hen buying a new car, you dont just consider one aspect, like the upfront cost of purchasing the car itself; you take into consideration multiple factors that determine the overall value for money you are likely to get. You evaluate such things as how much mileage youre likely to get from a tank of gas, what the servicing and insurance costs are, and what safety features are built in to protect you and your precious passengers. The same is true for storage. If the cost of the capacity were the only factor to consider, then the answer would be simple: Buy the disk from the guy who gave you the cheapest price per terabyte! However, the impact of continuous growth in storage capacity on the IT budget can be complex, involving the interplay of a diverse set of costs. If all elements in the storage economics equation arent taken into account, the real cost of a purchasing decision can be decidedly different than intended. In this chapter, we first look into these elements and just how you can measure and evaluate them. Later in the chapter, we explain Hitachis unique Storage Economics model, which
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
32
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
33
Figure 3-1: This return on investment (ROI) over three years shows a breakeven point a little into the second year.
TCO analysis is used when the financial benefits of two or more proposed solutions, or a solution against the status quo, must be assessed. The analysis places the total lifetime operating and purchasing costs of the assets side by side for comparison (see Figure 3-2). IT purchasing best practices, documented by independent analysts, frequently cite the importance of including a TCO analysis in any competitive bid situation. The cost categories chosen for comparison are those deemed most significant, and these frequently vary from one organization to the next.
Figure 3-2: Total cost of ownership (TCO), comparing the status quo with an alternative.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
34
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
35
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
36
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
37
3. Compile a cost reduction roadmap. What will be the impact on the TCO baseline over the short and medium terms? With a rollout plan for each of the cost-saving initiatives, a roadmap can be built that shows the impact on each of the key cost areas year by year. By following this three-stage approach, a tactical plan for addressing the key cost areas and driving long-term TCO reduction can be scheduled and executed.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
38
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 4
torage virtualization can help address many shortcomings of traditional storage infrastructures, enhance the storage investment, and respond to real business problems. Walk into almost any data center with multiple storage platforms from different vendors and youre likely to find low storage utilization, multiple management tools with different interfaces, and disparate storage management practices for each vendors storage. Storage virtualization solutions help you to simplify the storage infrastructure and dramatically improve storage utilization by managing all storage assets as a single pool via a single management interface. Data migrations are part of any ongoing IT operation and are especially intensive during technology refresh cycles. Migration is highly prone to human error and typically needs to be done in very small windows of opportunity. A virtualized storage environment enables an intelligent and dynamic tiered storage solution that allows seamless data migration across storage tiers without impacting users or applications. Intelligent tiered storage solutions help you to simplify infrastructure, ensure quality of service, reduce risk, and align the right storage tier to the right application, thereby reducing capital (CAPEX) and operating (OPEX) expenditure.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
40
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
41
Disk management: The software or device providing storage virtualization becomes a common disk manager in the virtualized environment. Logical disks are created by the virtualization software or device and are mapped to the required host or server, thus providing a common place or way for managing all volumes in the environment.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
42
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
43
Partitioning, the subdivision of components such as disks, cache memory, and ports to configure storage arrays, can assist in ensuring that these critical resources arent overloaded by one application, which may adversely affect another application.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
44
Figure 4-1: This example of a virtualized storage system uses two external storage arrays.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
45
Storage LUNs from ES1 are migrated onto the VSPs internal disks (which are more likely to be high-performance disks). Server B and Server C access storage via the VSP, either internally (for high-performance storage needs) or through storage from ES1 or ES2, which is virtualized. Server A continues to use those LUNs from ES1 storage that are not virtualized behind the VSP. New LUNs will be created within the VSP from its local disks if Server B and Server C need additional high-performance storage to support new production applications. Alternatively, the storage virtualized from ES1 and ES2 can be provisioned to Server B and Server C. Virtual partitioning can create separate areas and isolate the effects of the various workloads from one another. For example, you can define individual storage partitions to isolate management of one servers allocated storage from another servers allocated storage. You can also create cache partitions to assign specific cache amounts to the VSPs internal storage, ES1, and/or ES2.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
46
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
47
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
48
Figure 4-2: In this example, the streaming video is uninterrupted during data migration.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 5
apid storage growth, with its associated requirements for provisioning and management of storage assets, has become a major challenge for information technology. Traditional static provisioning often results in over-provisioning with significant amounts of unused capacity, which negatively impacts storage total cost of ownership (TCO). In this chapter, we look at how internal storage virtualization can improve both application performance and the utilization of storage capacity. We also delve into the management challenges faced by organizations when they implement virtualized storage systems, as well as the tools and functions required to meet them.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
50
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
51
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
52
When combined with storage virtualization, the benefits of dynamic provisioning can be extended to the external virtualized storage to save space and to improve performance through wide striping.
Space saving
Local and remote volume copy services that are thin provisioning-aware consume less capacity. With traditional provisioning, if you have a 2TB volume but only 100GB is actual data, all of the 2TB will still be copied. In some cases, users will create two or more local copies of their primary volumes. With traditional provisioning this would consume lots of capacity by copying empty blocks; thin or dynamic provisioning eliminates this. One technique in dynamic provisioning allows the physical capacity to be reclaimed if not used by an application, even if the capacity is allocated to the application. Using dynamic tiered storage data migration technology, data on a physical thick volume can be migrated to a logical thin volume, and unused allocated space can be reclaimed. This is called zero page reclaim. Thin provisioning can enable more applications and servers per storage system, providing greater levels of consolidation. Since capacity doesnt have to be dedicated and fixed on a pervolume basis with thin provisioning, customers can create more volumes. As a result, more applications and servers can be attached to a single storage system. Due to thin provisionings capacity efficiency, it requires fewer disks, which results in lower power and cooling costs. Often this is essential for data centers that are running out of power, for example.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
53
This phenomenon is well known by database and storage administrators, who have been using host-based volume management software for years to make multiple fibre channel (FC) LUNs appear to an application as a single volume. Thin- or dynamic-provisioned volumes defined over a wide-striped pool of drives can be used to achieve the same performance benefits. A major benefit of large logical pools of capacity is the ability to stripe data across a large number of disk drives. This improves performance significantly, since you can have dozens or hundreds or even thousands of disk drives conducting I/O (input/output) operations simultaneously. Additionally, wide striping significantly reduces performance management tasks. A great deal of time is often needed to analyze, tune, and retune performance with traditional provisioning methods. Wide striping minimizes and potentially eliminates the need to tune and analyze, since it is perpetually optimized for performance.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
54
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
55
Monitor end-to-end performance of not only application, server, SAN, and storage, but also virtualization attributes such as external storage ports, logical partitions, and cache. Provide detailed monitoring and reporting of thin provisioning pools (virtual and physical utilization), as well as the ability to issue alerts when resource thresholds are met. Monitor, prioritize, and even cancel migration and replication tasks to ensure complete control.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
56
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 6
efficiencies
n this book, we give you a pretty good primer on storage virtualization the concepts, benefits, and different types. We examine the value of storage economics to validate the savings that storage virtualization can bring. We also look at how to plan for different techniques and methods used in storage virtualization, such as data migration, tiered storage, and thin, or dynamic, provisioning. In this chapter, we discuss a design methodology and best practices for developing and deploying the storage virtualization technologies.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
58
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
59
system command (such as the Solaris format). When virtualizing an existing LUN, a good practice is to run the format command in order to display the partition table of the native volume. Doing this will allow you to re-create the partitions on the new virtual LUN using the right geometry. After virtualizing the storage, the host may see two disks for the same physical device, one for the virtualized device (target) and the other for the original device (source). Understanding the source device in the controllertargetdevice (such as c1t1d1) combination and correlating it with the target device (say, c2t2d2) is critical after the virtualization and volume migration. This will help keep track of the actual storage model and device, and keep the integrity of the data that resides on the disk. Do not use the Auto Configure option during the formatting as this can modify your disk label.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
60
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
61
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
62
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
63
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
64