Professional Documents
Culture Documents
0
Student Notebook
Uempty
SVC system IP
Notes:
Click Manage System in the navigation tree of the Service Assistant to open the System
Information pane. Within the system edit boxes specify the cluster name (also known as system
name) and the cluster IP network information.
Next, click the Create System button to cause the cluster to be created.
The terms SVC cluster and SVC system are used interchangeably. SVC system is favored during
system setup.
© Copyright IBM Corp. 2011, 2014 Unit 2. SVC planning and cluster initialization 2-91
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Cluster:
NAVY_SVC
Notes:
After the single node SVC cluster has been created the System Information pane displays the name
and the IP address of the cluster. The visual shows a cluster named NAVY_SVC has been created.
It has a cluster management address of 10.6.76.60. However, this front panel will only display the
system name on the second line as indicated. The node status has changed from candidate to
active.
Uempty
superuser
passw0rd
Notes:
The IBM SAN Volume Controller GUI is used to complete the cluster setup. Open the browser to
https://management_IP_address. The SVC GUI recognizes that the configuration of the cluster is in
its initial stages and will start the System Setup Wizard upon initial contact with the cluster.
Log in to initialize the cluster using the default username superuser and the default password is
passw0rd with a zero in place of the letter “o”. This is also the default login credentials used for
accessing the management GUI, unless otherwise.
With SVC v7, the opportunity to change the default password for the superuser is prompted
immediately after initial login. With SVC v6, the superuser’s password can be changed during
system setup.
© Copyright IBM Corp. 2011, 2014 Unit 2. SVC planning and cluster initialization 2-93
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The Welcome to System Setup page of the System Setup Wizard opens and is followed by the
ensuing sequence of tasks to complete system setup is listed.
During the initial setup of the system the installation wizard asks for various information that you
should have created during planning and have available during this installation process. If you do
not have this information ready or choose not to configure some of these settings during the
installation process you can configure them later through the management GUI.
Uempty
Notes:
The License agreement is the first step. Read and accept the license agreement to be able to
continue the configuration. In addition, the Licensed Functions pane enables the specification of the
additional licenses purchased to expand the base functions included with the SVC. These
expanded functions include:
• Virtualization: The number of terabytes licensed to be virtualized by this system.
• FlashCopy: The licensed capacity for FlashCopy mappings. The used capacity for FlashCopy is
the sum of the capacity of source volumes defined in FlashCopy mappings.
• Global and Metro Mirror: The licensed capacity for Metro Mirror and Global Mirror relationships.
The used capacity is the sum of the capacities of all the volumes defined in Metro or Global
Mirror relationships
• Real-time Compression: The number of terabytes licensed for compression.
When the Apply and Next > button is clicked, the GUI generates the necessary CLI commands to
update the license settings.
© Copyright IBM Corp. 2011, 2014 Unit 2. SVC planning and cluster initialization 2-95
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Figure 2-84. System Setup Wizard: System name, date and time SNV13.0
Notes:
The system or cluster name can be changed during system setup. If you have more than one
system in your environment it would be best to define names by which they can easily be
determined.
Next, date and time can be set either manually or with an NTP server.
Click the Apply and Next > button to cause the GUI to generate and display the SVC CLI
commands used to achieve the desired settings specified in the panels.
Uempty
Notes:
With the v7.3 release, during the initial configuration of the system the GUI now features the ability
to create a stretched system. From the Stretch System window of the GUI, if you choose to create
a stretched system during the initial configuration, you will need to specify the sites that are
included. These are the mandatory three sites needed for a stretched cluster implementation.
• Site1: Production site 1
• Site2: Production site 2
• Site3: A site at a different location can be added to house the quorum disk
You can also enable a stretched system after the cluster is completed using the GUI System Details
option.
© Copyright IBM Corp. 2011, 2014 Unit 2. SVC planning and cluster initialization 2-97
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The next step of the system setup process is to add the remaining candidate nodes since the
cluster only consists of one node at this point.
Each node belongs to one and only one I/O group and two nodes comprise an I/O group. Up to four
I/O groups comprise an SVC cluster and they are known as io_grp0, io_grp1, io_grp2, and io_grp3.
I/O groups are populated with nodes in sequence starting with io_grp0. Click the empty slot in the
io_grp0 enclosure to start the add node process and select a node from the Add Node drop down
list.
An appropriate name can be specified for the node being added and click Add Node. The
addnode command is generated by the GUI to add the node to I/O group 0.
All the nodes in the cluster must run the same level of SVC code. When a node is being added to
the cluster its software level is verified. If a mismatch is discovered the Cluster software is shipped
to the joining node for installation which will cause the add node process to potentially take up to 30
minutes.
Uempty
Notes:
As displayed by the system rack, at this point the cluster is comprised of a single I/O group with two
nodes; node1 (default name) and NODE2.
Additional candidate nodes (two in the example scenario) can be added by clicking the empty node
slots in sequence for the next I/O group. Alternatively, these nodes can be added after initial system
setup has completed.
Click Apply and Next > to continue with system setup.
If you return to the Service Assistant GUI of node1, you would now see that both node1 and node2
are active in the cluster. The other two nodes still are in candidate status.
© Copyright IBM Corp. 2011, 2014 Unit 2. SVC planning and cluster initialization 2-99
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Once the nodes have been added you have the option to assign external storage devices to the
sites.
Uempty
Notes:
Return to System Setup: The next step in the sequence is to set up Call Home contact details and
configure the email settings to be used (email address, SMTP server) for event notification. These
options can also be specified and updated after system setup.
Ensure that the email server accepts SMTP traffic because some enterprises do not permit SMTP
traffic especially if the destination email address is outside the enterprise.
© Copyright IBM Corp. 2011, 2014 Unit 2. SVC planning and cluster initialization 2-101
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Review the setting values in the Summary pane. Click the Finish button to complete system setup.
Uempty
SVC cluster IP
Function
icons
© Copyright IBM Corporation 2011, 2014
Notes:
After the initial configuration is finished the cluster GUI opens to the Monitoring > System view. A
system rack containing the nodes of the cluster is shown. The rack implicitly conveys that a
maximum of four I/O groups or eight nodes can form one SVC cluster.
The SVC cluster name and code level are displayed at the bottom of the system rack. Clicking it
opens a notebook with general information about the cluster as well as cluster capacity usage data.
The cylindrical column next to the rack provides cursor sensitive displays of physical, allocated, and
virtual capacity values for the cluster.
The navigation tree on the left of the panel contains function icons. Each icon provides a menu of
functions. The bread crumbs across the top of the panel identifies the navigation path taken, from
cluster name > function icon name > menu within function with a quick navigation drop-down
list to navigate within the function. The GUI opening view from system setup is cluster name >
Monitoring > System.
The SVC cluster name is always shown at the root of the navigation path. In environments with
multiple SVC clusters, it is important to verify which SVC cluster is being configured or investigated.
© Copyright IBM Corp. 2011, 2014 Unit 2. SVC planning and cluster initialization 2-103
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Figure 2-92. Add nodes after SVC system has been created SNV13.0
Notes:
Additional nodes can be added to an existing cluster by clicking a node slot in the I/O group
enclosure of the system rack. After SAN zoning is updated, candidate nodes can then be detected
and added.
In this example, two more candidate nodes are being added to io_grp1 - NODE3 and NODE4.
Uempty
Notes:
Both nodes of io_grp1 have been added to the cluster to complete the 4-node cluster configuration
of the example environment.
Clicking the io_grp1 enclosure area opens the properties notebook for io_grp1. The Real-time
Compression active indicator can be found here; as well as the bitmap space used for various
advanced functions (this will be addressed in subsequent units of this course).
© Copyright IBM Corp. 2011, 2014 Unit 2. SVC planning and cluster initialization 2-105
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
SVC v7.2:
• From the system graphical
view, select a node and then
select the Manage tab.
• Enter node name and click
the Save button.
Notes:
With the v7.3 release, to rename a node you will now have to select System Detail, expand the
view and highlight the node you wish to rename. Then select from the Action menu, Rename
Node.
With the v7.2 release, to rename the node, select the Manage tab of its notebook and type a new
name in the edit box. Clicking the Save button causes the GUI to generate the chnode -name
command to change its name NODE1.
In general, changing an object name is not a concern as SVC processing is done by object IDs, not
object names. One exception is the case of changing the name of a node if the iSCSI protocol is
being used for host data access to the node.
Be aware that the SVC node name is part of the node’s IQN name. Thus changing the node name
requires more planning as the iSCSI host connections need to be updated; otherwise, it might
cause an iSCSI-connected hosts to lose access to their volumes.
Uempty
Overview of
managed
resources
Notes:
IBM SAN Volume Controller includes an easy-to-use management GUI to help monitored,
managed, and configured for IBM Storwize family of products. You can easily access the GUI using
a supported web browser, and entering the system management IP address.
After you have successfully logged in to the management GUI, the Home window is displayed
showing the Overview panel.
The Overview panel contains three main sections for navigating through the management tool.
1. On the far left of the window are eight function icons.
2. In the middle of the window is a diagram that illustrates a task flow of how storage is
provisioned, as well as existing configuration. You can hover over the icons or click an icon to
provides extended help references.
3. The Status Indicators that is located at the bottom of the window, provide information about
Capacity usage, Compression ratio, Running Tasks and the Health Status of the system. The
Status Indicators are visible from all panels in the GUI.
Resources managed by the cluster are itemized and updated dynamically.
© Copyright IBM Corp. 2011, 2014 Unit 2. SVC planning and cluster initialization 2-107
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The functions icons were grouped to show all of the options available. You can hover the cursor
over any one of the eight function icons to display the associated menu options. You can use the
various function icons to examine available storage, create storage pools, create host objects,
create volumes and map volumes to host object, create user access, update system software, and
configure network settings.
Uempty
Keywords
• Physical planning
• Logical planning
• IBM SAN Volume Controller 2145-DH8
• IBM SAN Volume Controller 2145-24F
• IBM SAN Volume Controller 2145-CG8 / 2145-CF8
• IBM SAN Volume Controller 2145 UPS
• Back-end storage
• SAN Zoning
• Fabric zoning
• Virtualization
• Technician port
• Cluster initialization
• Cluster system
• Service Assistant Tool
• SAN Volume Controller GUI
• Secure Shell (SSH) key
• Stretched System
• MDisks
• Storage pool
• Worldwide Node Name
• Worldwide port name
© Copyright IBM Corporation 2011, 2014
Notes:
Listed are keywords that were used in this unit.
© Copyright IBM Corp. 2011, 2014 Unit 2. SVC planning and cluster initialization 2-109
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint (1 of 2)
1. Which of the following SVC 2145 nodes require a 2145 UPS unit
a. 2145-CG8
b. 2145-CF8
c. 2145-GA4
d. 2145-DH8
3. True or False: To access the SVC GUI, a user name with a password
must be defined. To access the SVC CLI, a user name can be defined
with a password or SSH key; or both.
© Copyright IBM Corporation 2011, 2014
Notes:
Write your answers here:
Uempty
Checkpoint (2 of 2)
4. True or False: The SVC cluster is defined as a SCSI host to an
attaching storage system so that LUNs of the storage system can be
assigned to the SVC. These LUNs become MDisks in the SVC.
5. True or False: Fibre Channel hosts are defined to the SVC by their
HBA WWPNs.
Notes:
Write your answers here:
© Copyright IBM Corp. 2011, 2014 Unit 2. SVC planning and cluster initialization 2-111
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit summary
Having completed this unit, you should be able to:
• Determine planning and implementation requirements associated with
the SAN Volume Controller (SVC)
• Implement the physical hardware and cable requirements for the SVC
2145 nodes
• Implement the logical configuration of IP addresses, network
connections, zoning fabrics, and storage attachment to the SVC 2145
nodes
• Integrate the SVC 2145-DH8 into an existing SVC environment
• Execute SVC cluster creation using the Technician port, front panel, or
remotely using the Service Assistant interface
• Identify the basic usage and functionality of IBM SAN Volume Controller
GUI menu
• Implement user creation, authentication, and SSH key generation to
facilitate access to the SVC system management
Notes:
Uempty
Unit 3. SVC storage provisioning
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
After completing this unit, you should be able to:
• Identify storage resources to be assigned to host systems
• Summarize process of defining storage array
• Execute GUI and CLI operations to create storage resources
• Coordinate the placement of SVC quorum disks and designate
the active quorum disk if desired
• Implement the external storage MDisk allocation to facilitate
I/O load balancing across zoned storage ports
Notes:
Uempty
Notes:
This topic examines the storage array structure, by defining the components of the array.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Managed disks
(unit of storage Assignable
Storage servers
virtualized by storage capacity
to be virtualized
system) to host
* SVC 2145-CG8, F8, and 2145-24F expansion enclosure internal drives are displayed
with in the GUI as internal drives
© Copyright IBM Corporation 2011, 2014
Notes:
The SVC GUI Overview diagram illustrates the components that need to be configured. Clicking the
icons in this area provides extended help references including a link to a short video presentation to
explain the topic in more detail.
Uempty
Notes:
SVC can use any supported external SSD storage device or provide its own internal SSD storage.
Internal storage is the RAID-protected storage that is directly attached to the system using the drive
slots in the front of the node or with the expansion enclosure. The system automatically detects the
drives that are attached to it.
For SVC 2145-CG8, or 2145-CF8 nodes, one or more pairs of nodes can contain 0 - 4 flash drives
per node. The drives are only visible to the SVC system to which they are installed.
For the SVC 2145-DH8 nodes support up to two (optional) expansion enclosures for each I/O
group, with one expansion enclosure attached to each node in the I/O group, delivering up to 48
flash drives of internal raw capacity per I/O group.
The SVC node manages external storage subsystems using the SAN or FCoE connections. These
are storage devices that are discovered out on the fabric and presented as external disk systems to
the SVC node.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
– Member
– Spare
Member
– Failed (part of an array)
Candidate
(ready for use)
Failed
Unused
(Service needed)
(newly added)
Notes:
The internal storage menu option displays and manages these drives. From this menu, you can
place internal disk drives into storage pools. This window also provides the option to display the
internal drives based on their capacity and speed.
The internal drives in the SVC node cluster can be assigned to several usage roles, which either
can be unused, candidate, spare, or failed. The meanings of these roles are:
• Unused: The drive is not member of an MDisk
• Candidate: The drive is available for use in an array
• Member: The drive is member of an MDisk
• Spare: The drive can be used as a hot spare if required
• Failed: The drive was either intentionally taken offline or failed due to an error
Uempty
RAID
Array
disk Storage
RAID presets Pool
RAID
Array
disk
Drives
© Copyright IBM Corporation 2011, 2014
Notes:
A Redundant Array of Independent Disks (RAID) is a method of configuring drives for high
availability and high performance. The internal SSD drives need to be included in a RAID grouping
used for performance and to provide protection against the failure of individual drives. These drives
are referred to as members of the array.
For the SVC 2145-DH8 model, drives on different nodes are configured to form RAID 0, 1, 5, 6, and
10 arrays. For SVC 2145-CG8, or 2145-CF8 models, drives on different nodes are configured to
form only RAID 1 or RAID 10 arrays. These arrays are presented as MDisks, which can be added to
storage pools in the same way as MDisks that are discovered on external storage systems are
added. If the MDisks are created from different tiers of storage then Easy Tier can be used to
automatically manage migration of highly used data to faster drives.
The SAN Volume Controller also supports hot-spare drives. When a RAID member drive fails, the
system automatically replaces the failed member with a hot-spare drive and resynchronizes the
array to restore its redundancy.
The management GUI uses RAID presets for setting up RAID configuration, along with the internal
RAID software or volume mirroring is used to provide redundancy. Each array has a RAID level.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Different RAID levels provide different degrees of redundancy and performance, and have different
restrictions regarding the number of members in the array.
RAID Presets:
• RAID 0 arrays stripe data across the drives. The system supports RAID 0 arrays with just one
member, which is similar to traditional JBOD attach. RAID 0 arrays have no redundancy, so they
do not support hot spare takeover or immediate exchange. A RAID 0 array can be formed by
one to eight drives (one to 4 on the CG8 and CF8 models). All drives in an RAID-0 array must
be located in the same node.
• RAID 1 arrays stripe data over mirrored pairs of drives. A RAID 1 array mirrored pair is rebuilt
independently. A RAID 1 array can be formed by two drives only. The pair of drives must contain
one drive from one node in the I/O group and one drive from the other node in the same I/O
group
• RAID 5 arrays stripe data over the member drives with one parity strip on every stripe. RAID 5
arrays have single redundancy. The parity algorithm means that an array can tolerate no more
than one member drive failure. A RAID 5 array can be formed by 3 to 16 drives.
• RAID 6 arrays stripe data over the member drives with two parity stripes (known as the P-parity
and the Q-parity) on every stripe. The two parity strips are calculated using different algorithms,
which give the array double redundancy. A RAID 6 array can be formed by 5 to 16 drives.
• RAID 10 arrays have single redundancy. Although they can tolerate one failure from every
mirrored pair, they cannot tolerate two-disk failures. The drives are specified as a sequence of
drive pairs. Each pair of drives must contain one drive from a node in the I/O group and a drive
from the other node in the same I/O group. One member out of every pair can be rebuilding or
missing at the same time. A RAID 10 array can be formed by 2 to 16 drives.
Uempty
1
3
Notes:
To configure internal storage, select from the Pools menu option Internal Storage. Next, from the
Internal Storage panel select the flash drive you want to configure. Click Configure Storage, and
indicate whether you want to include the unused drive in the RAID SSD configuration. Based on the
drives discovered with in the system, you can use the Recommended configuration that presents
with a suggested preset RAID level or the Select a different configuration. The option to select a
different configuration offers a more flexible way for the configuration of the internal storage as
compared to the recommended configuration preset in terms of drive selection, RAID level, and
storage pool to be used.
Click Finish to create the array.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
External storage systems can be displayed by clicking the Pools function icon in the navigation tree
then selecting the External Storage menu option. You can use this option to add MDisks to existing
pools, import them as image mode volumes, or rename them. System migration is used to virtualize
and migrate existing external storage disks to the SVC.
Four controller entries are listed with their default names (controllerx). Notice that each controller
entry is associated with an ID. These controllers are storage systems (actually WWNNs) that have
been zoned with the SVC node ports. The SVC has performed device logins with these storage
system ports to discover LUNs that have been assigned to the SVC.
Review the controller0 entry: The device type of 1726-4xx FastT indicates it as a DS3400. The
WWNN value displayed identifies the specific storage system. Click the + (plus) sign of the
controller entry to list LUNs presented. LUNs are displayed as MDisk entries. The LUN number
column represents the DS3400 assigned LUN numbers of these MDisks.
To uniquely identify an MDisk in the SVC inventory it is correlated to a specific storage system and
the specific LUN number assigned by that storage system. The SVC assigns to the MDisk a default
object name and object ID.
Uempty Upon discovery, the MDisk has an assigned access mode of unmanaged meaning it has been
identified but is currently not being used by the SVC. It will not be used by the SVC until further
administrator action.
Return to the controller entries: Device type of 2107900 indicates that controller1 is a DS8000.
Device type 2145 with a serial number of 2076 represents a Storwize V7000 system. Recall the
Storwize V7000 has two WWNNs and each is represented as an individual controller thus
controller2 and controller3 collectively represent one Storwize V7000 system.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Traditionally SCSI LUNs surfaced by RAID controllers are presented to application host servers as
physical disks.
With the SAN Volume Controller (SVC) serving as the insulating layer, SCSI LUNs become the
foundational storage resource owned by the SVC and are referred to as managed disks (MDisks).
A one-to-one relationship exists between the SCSI LUNs and the managed disks.
The SVC takes advantage of the basic RAID controller features (such as RAID 1, 5, 6, or 10) but
does not depend on large controller cache or host independent copy functions associated with
sophisticated storage systems. The SVC has its own cache repository and offers network-based
Copy Services.
Managed disks have associated access modes. These modes, which govern how the SVC cluster
uses MDisks, are:
• Unmanaged: The default access mode for LUNs discovered from the SAN fabric by the SVC.
These LUNs have not yet been assigned to a storage pool.
• Managed: The standard access mode for a managed disk that has been assigned to a storage
pool. The process of assigning a discovered SCSI LUN to a storage pool automatically changes
Uempty the access mode from unmanaged to managed mode. In managed mode space from the
managed disk can be used to create virtual disks.
• Image: A special access mode reserved for SCSI LUNs that contain existing data. Image mode
preserves the existing data when control of this data is turned over to the SVC. Image mode is
specifically designed to enable existing data to become SVC-managed. SCSI LUNs containing
existing data must be added to the SAN Volume Controller as image mode.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Extent 1
Extent 2
Extent 3
Pool_IBMSAS
Extent 4
R5 Extent 5
R5 R5
Pool_HPbox
R5 ...
Pool_EMCbox
R10 R10 Extent-n
Extent-n
R10
Notes:
Managed disks are grouped by the storage administrator into one or more pools of storage known
as storage pools, or managed disk groups. The grouping is typically based on performance and
availability characteristics. While a storage pool can span multiple storage systems, for availability
and ease of management it is generally recommended that a storage pool be populated with
MDisks from the same storage system.
The MDisks are placed into storage pools where they are divided into a number of extents which
are numbered sequentially, starting with 0.
The extents can range in size from 16 MB to 8192 MB as defined by the SVC administrator.
Uempty
2048 MB 8 PB
4096 MB 16 PB SVC v6
8192 MB 32 PB
Figure 3-11. Pool extent size and SVC cluster capacity SNV13.0
Notes:
The extent size can be set to 16, 32, 64, 128, 256, 512, 1024, 2048, 4096, or 8192 MB. It is set by
the administrator at the storage pool level when it is defined. Once set, the extent size stays
constant for the life of the pool.
The choice of the extent size affects the total amount of storage that can be managed by an SVC
cluster. A 16 MB extent size supports a maximum capacity of 64 TB, and the 32 MB extent size
supports up to 128 TB. Increasing capacity based on the powers of 2, the 8192 MB extent size
allows for 32 PB of SVC-managed storage. The SVC GUI defaults to an extent size of 1024 MB
with v7. To avoid wasting storage capacity, the volume size should be allocated as a multiple of the
extent size. Use the same extent size across all storage pools in the SVC cluster to facilitate easy
migration of volume data from one storage pool to another.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
MDiskX MDiskY
Notes:
MDisks from external storage systems created from SSDs or flash storage are discovered by the
SVC on the SAN as unmanaged mode MDisks with a default technology type of hard disk drive.
Since there is no interface for the SVC to automatically discern the technology attributes of the
drives that created the MDisks in attaching storage systems, an interface is provided through both
the GUI and the CLI to enable the administrator to update the technology tier of these MDisks to
solid-state drive.
In SVC terminology, solid-state drive (SSD) is used to denote tier 0 storage. The backing
technology could be SSDs or flash systems (such as the IBM FlashSystem storage system).
Uempty
SSD
array
R5 MDisk*
R5 R5
Hybrid storage pools
PoolextSSD_ET_HPbox R5
MDiskX Pool_FlashSystem
R10
R10
MDiskY1
R10 R10 MDiskY2
Notes:
A storage pool that contains both HDD-based MDisks along with SSD-Flash MDisks is also known
as a hybrid storage pool. These SSD-Flash MDisks could be created from SVC node internal SSDs
or LUNs from external storage systems created from SSDs or flash technology. Easy Tiering is
automatically active when mixing different media in hybrid capacity pools. IBM Easy Tier performs
automatic data placement within that storage pool by moving high-activity data onto better
performing storage. Flash drives provide host servers with a pool of high-performance storage for
critical applications.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
BLUELV2
BLUEARC REDWV2
BLUELV1 20 GB REDAV2
100 GB 10 GB
20 GB 20 GB
EasyTier_HybridPool REDBOX_POOL
SSDmdisk
BLUE1
1.8 TB
292 GB
RED1 RED2
BLUE4
BLUE2 200 GB
1.8 TB 200 GB
1.8 TB BLUE3
1.8 TB MDisks
Storage pools
*Maximum MDisk size = 1 PB
© Copyright IBM Corporation 2011, 2014
Notes:
To review terminology and concepts:
• Managed disks (SCSI LUNs) are grouped into storage pools. A maximum of 128 managed
disks can be grouped into one storage pool.
• Storage pools contain managed disks. These disks or LUNs are typically large in size (ideally
same-sized) and for availability from the same storage system. A maximum of 128 storage
pools are supported per SVC cluster.
• Volumes are mappings of extents contained in one or more managed disks residing in the same
storage pool.
• A maximum of 8192 volumes are supported per SVC cluster with four I/O groups, each I/O
group supporting 2048 volumes.
• A volume can be up to 256 TB in size.
Uempty
Notes:
A volume is a logical disk that the clustered system presents to a hosts connected over a Fibre
Channel or Ethernet network. A volume also represents the mapping of extents contained in one or
more MDisks of a storage pool.
When an application server needs a disk capacity of a given size a volume of that capacity can be
created from a storage pool that contains MDisks with free space (unallocated extents).
The SVC creates the volume by allocating extents from a given storage pool. The number of
extents required is based on the extent size attribute of the storage pool and the capacity requested
for the volume. By default, extents are taken from all MDisks contained in the storage pool in round
robin fashion until the capacity of the volume is fulfilled.
Prior to SVC v6, a storage pool is referred to as a MDisk group and a volume is referred to as a
virtual disk (VDisk). These terms are still used and the CLI command syntax is still based on the
traditional terms of MDisk group and VDisk.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Storage pool
(name, extent size) Volume
Extent 1a
Extent 1a Extent 2a Extent 3a Extent 2a
Extent 1b Extent 2b Extent 3b Extent 3a
Extent 1c Extent 2c Extent 3c Extent 1b
Extent 1d Extent 2d Extent 3d Extent 2b
Extent 1e Extent 2e Extent 3e Extent 3b
Extent 1f Extent 2f Extent 3f
Extent 1c
Extent 1g Extent 2g Extent 3g
Extent 2c
Extent 3c
Managed Disks (MDisks)
Notes:
The extents from a given storage pool are used by the SVC to create volumes. A volume essentially
contains pointers to its assigned extents of a given storage pool. The advantage with storage
virtualization is that the host is “decoupled” from the underlying storage so the virtualization
appliance can move the extents around without impacting the host system.
Volumes are mapped to the application server hosts in the SAN conceptually in the same manner
as SCSI LUNs are mapped to host ports from storage systems or controllers (also known as LUN
masking).
Uempty
Existing data
3. Image
2. Sequential Extent 5a
Extent 5b
Extent 4a
Extent 5c
Extent 4b BLUDATV Extent 5d BLUDATA
Extent 4c 800 MB
BLUEWV2 Extent 5e 800 MB
Extent 4d BLUE4
1 GB Extent 5f
Extent 4e 300 GB
Extent 5g
Extent 4f
Partial extent
Extent 4g
Notes:
When a volume is defined, one of the three virtualization types is specified:
• Striped (default): A striped volume is allocated one extent in turn from each managed disk that
has free extents (or a subset of managed disks known as a stripe set) in the storage pool. This
process continues until the space required for the volume has been satisfied.
• Sequential: A sequential volume is where the extents are allocated one after the other from one
managed disk to the next manage disk to create the volume given enough consecutive free
extents are available on that managed disk.
• Image mode: Image mode volumes are special volumes that have a direct relationship with one
managed disk. They are used to migrate existing data into and out of the clustered system.
Image mode simplifies the transition of storage from a non-virtualized to a virtualized
environment without requiring physical data movement or conversion.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
volume
BLUE1 BLUE3
300 GB BLUDATA
Migrate 300 GB
BLUE2 800 MB
Striped Extent 1x 300 GB BLUE4
Extent 3y 300 GB
Extent 4g
BLUDATV Extent 5d Managed mode
Virtualized 800 MB Extent 5e
Extent 5f
Extent 1y
Notes:
Image type volumes allow existing data to be controlled and managed by the SVC cluster without
data conversion or virtualization.
An image type volume represents a direct one-to-one mapping between the extents that are on the
image mode managed disk (which is a SCSI LUN that contains existing data) and extents on the
volume. In other words, the data is not virtualized and is accessed as-is.
When an image type volume is created, its corresponding MDisk is concurrently assigned to a
storage pool in image access mode. And the volume consists of extents of the image mode MDisk.
The last extent of the image type volume might potentially be a partial extent since the
corresponding MDisk might not map exactly on the storage pool extent size boundaries.
After volume extents are established, extents (that is, the application data) can be moved to other
MDisks without disrupting application data access. After the first extent is migrated or moved, the
volume’s virtualization type changes from image to striped and the MDisk’s access mode changes
from image to managed.
Uempty
MDisks R5 R5 R5 R5 R5 R5
SCSI LUNs R5 R5 R5 R5 R5 R5
LUN LUN LUN LUN LUN LUN
Storage system
migration
RAID Controller RAID Controller
Notes:
A volume represents the mapping of a collection of MDisk extents.
Data movement from one extent to another is reflected by updating the volume mapping to the new
extent locations. The SVC supports this change in volume mapping thus allowing data movement
or data migration to occur transparently, without interrupting host data access to the volume.
Examples of usage of the data migration capability include:
• Moving workload off older storage hardware in preparation for its removal.
• Moving workload onto newly installed storage (new storage systems or newer drives within an
existing storage system).
• Moving workload to a lower-cost storage tier.
• Moving workload to rebalance storage system usage.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Extent 2a Extent 2a
Extent 3a Extent 3a
Extent 1b Extent 1b
Extent 2b Extent 2b
Extent 3b Extent 3b
Extent 1c Extent 1c
Extent 2c Extent 2c
Storage PoolA Extent 3c Extent 3c
Storage PoolB
R5 R5 R5
R5 R5 R5
R5 R5 R5
R5 R5 R5
LUN LUN LUN
LUN LUN LUN
RAID Controller
RAID Controller
Storage SystemA
Storage SystemB
© Copyright IBM Corporation 2011, 2014
Notes:
As data is being moved from one extent to another during data migration, the volume mapping is
updated by the SVC without affecting host application data access.
Servers only need to use the volume (extent pointers) enabling storage management activities to
occur with no host disruption as storage system LUNs are allocated or moved.
Uempty
Notes:
SVC v2.1 introduced the migrate-to-image option to reverse the migration from the virtualized realm
back to non-virtualized. Data extents associated with a striped type volume are collocated to an
empty or unmanaged destination MDisk and the volume is returned to the image virtualization type
with the destination MDisk placed in image access mode.
The volume can then be deleted from SVC management causing its related MDisk or SCSI LUN to
be set in unmanaged access mode. The SCSI LUN can then be unassigned from the SVC ports
and assigned back to the original owning host with the storage system.
The migrate to image function also allows an image type volume backed with extents of an MDisk in
one storage pool to be backed by another MDisk in the same or different storage pool while
retaining the image virtualization type.
In essence, the volume virtualization type is not relevant to the migrate to image function. The
outcome is one MDisk containing all the data extents for that corresponding volume.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The SVC Thin Provisioning function extends storage utilization efficiency and economy to all SVC
supported storage systems. A volume can be created either as fully allocated or Thin-Provisioned.
A thin-provisioned volume is created with two capacities - virtual and real. The virtual capacity is the
capacity seen by host servers as well as SVC services such as FlashCopy and Metro/Global
Mirroring. The real capacity defines the amount of capacity actually allocated from disk systems
represented by storage pools. The real capacity can be increase either manually (command-line
default) or automatically (GUI default).
For fully allocated volumes, its entire capacity is acquired at creation and the entire logical block
address (LBA) range is allocated at the same time. For thin-provisioned volumes, only the real
capacity is acquired at its creation. Space within the allocated real capacity is allocated in
grain-sized increments corresponding to an LBA range dictated on write activity.
Uempty
Copy 1 Extent 4
Extent 3
Pool2
Extent 2
Copy has its own: Extent 1
• Storage pool extent size
Extent 0
• Virtualization type 1024 MB
• Fully allocated or thin
© Copyright IBM Corporation 2011, 2014
Notes:
The Volume Mirroring function enables two sets of MDisk extents to be associated with one volume.
These two sets of extents or copies of the volume can reside in the same or different storage pools
(or storage systems) hence providing higher availability to applications at the local site.
If a volume is created with two copies, these copies use the same virtualization policy (that is,
striped, sequential, image, Thin Provisioned or fully allocated). A copy can also be added to an
existing volume. In this case, the two copies do not have to share the same virtualization policy.
When a copy is added, the SVC automatically synchronizes the new copy so that it contains the
same data as the existing volume copy. The volume is available for host server access during the
synchronization process.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Forwarding
Oblivious volume
Replication to
volume
Upper Cache mirroring
FlashCopy Reads
Mirroring
writes Writes
Thin Provisioning Compression
Lower Cache
Pool1 Pool2
Virtualization Easy Tier 3 extents extents
Forwarding
• Promotes high availability at local site
RAID • Expands data migration flexibility
Forwarding • Enables non-disruptive conversions
Thin-Provisioned ÅÆ fully allocated
SCSI Initiator
• Allows mirrored copy to be split as new volume
© Copyright IBM Corporation 2011, 2014
Notes:
When a host writes to a mirrored volume the SVC writes the data to both volume copies. When a
host reads a mirrored volume the SVC picks one of the volume copies known as the primary copy
to read from. If a volume copy is temporarily unavailable (for example, because the RAID controller
that provides the storage pool is unavailable) the volume remains accessible to servers. The SVC
tracks areas of the volume that are written and resynchronize these areas when both volume
copies are available.
The ability to create a volume copy affords additional management flexibility. A storage controller
might fail or be taken offline for maintenance and not affect application access. A thin-provisioned
volume can easily be converted to fully allocated or vice versa. A volume can be migrated from one
storage pool to another and acquire a different extent size. The original copy can then be deleted.
These activities occur within the SVC totally transparent to attaching servers and user applications.
Uempty
Notes:
Beginning with v6.4.0, Real-time Compression (RtC) software is embedded in the SVC to address
the requirement of data reduction for active primary data while ensuring application performance.
However, in order to use the compression function, you must obtain the IBM Real-time
Compression license and the hardware level for both nodes within the I/O group must be either
SAN Volume Controller 2145-DH8, 2145-CG8, or 2145-CF8 for that I/O group to support
compression. SAN Volume Controller 2145-DH8 nodes must have two processors, 64 GB of
memory, and at least one Compression Accelerator adapter installed in order to use compression.
Compression technology delivered by the Random Access Compression Engine (RACE) has been
integrated seamlessly into the Thin Provisioning layer of the node I/O stack so that existing features
are supported for compressed volumes.
A compressed volume is a variation of a thin-provisioned volume. While host servers and Copy
Services operate with uncompressed data, data compression occurs “on the fly” so that physical
storage is only consumed for compressed data.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
For existing volumes the Volume Mirroring function can be used to non-disruptively add a
compressed copy and then the original volume copy can be deleted. A compressed volume can
also become uncompressed using the same volume copy functionality provided by Volume
Mirroring.
Uempty
Easy Tier v3
• Supports any combination of 1 - 3 tiers
• MDisks for the SVC always displays as Enterprise
í Unless using the SSD Flash expansion enclosure, you must designate the
tiers on the SVC
í Other members of the Storwize family, the tiers are known as:
í ENT is Enterprise 15K/10K SAS or FC and Nearline is NL-SAS 7.2L or SATA
Notes:
With the release of the 7.3 code, Easy Tier v3 now support any combination of tiers 1-3. MDisks in
the SVC will always be displayed as Enterprise (ENT) unless you are using the 2145-24F
expansion enclosure that supports only SSD Flash drives. Otherwise, you must change the
description of the tiers on the SVC so it can identify them correctly.
This table lists the supported combination of drives within a storage pool tier. An example, you
could have Flash/SSD, ENT, and NL as Tier 1, or you could have ENT and NL, or a single tier using
any of the three tiers listed.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Hybrid
storage pool
Hot extents
Cold extents migrate up
migrate down
Extent size
11 GB volume 1024 MB
Four extents identified as hot
Automatically and transparently
migrate extents to SSD tier HDD MDisks
• Monitors performance of each extent to determine data temperature
• Creates migration plan for optimal extent placement every 24 hours
• Migrates extents within pool per plan over 24 hour period (limited number of extents chosen to
migrate every five minute interval)
© Copyright IBM Corporation 2011, 2014
Notes:
The Easy Tier automatic data placement mode is enabled by default if a multi-tiered storage pool is
created. I/O activity of all the volumes of the multi-tiered storage pool are monitored by Easy Tier.
Extents associated with hot spots of these volumes are migrated dynamically to the SSD
technology tier to reduce I/O latency. Easy Tier complements SVC and storage system cache to
enhance back-end device performance. Cold extents are automatically migrated to the lower-cost
storage tier to optimize storage infrastructure utilization.
If desired, volumes of a multi- tiered storage pool can be disabled from automatic data placement at
the single volume level. Easy Tier provides I/O statistics measurements only for these volumes.
A statistic summary file is created and can be offloaded from the SVC cluster. This file can be
analyzed with the IBM Storage Tier Advisory Tool (STAT). This analysis provides a report on the
number of extents migrated to SSD-based MDisks and if it would make sense for more SSD-based
MDisks to be added.
Uempty
Hot extents
Cold extents migrate up
migrate down
Extent size
11 GB volume 1024 MB
Four extents identified as hot
– candidates for SSD tier
HDD MDisks
• Monitors performance of each extent to determine data temperature
• Provides analysis (using STAT) of benefits to workload if SSDs were added (prior to any SSD
acquisition)
© Copyright IBM Corporation 2011, 2014
Notes:
To identify the potential benefits of using SSDs to optimize the storage infrastructure prior to any
SSD investment, Easy Tier can be manually set on in a single tiered storage pool. Easy Tier then
runs in evaluation mode to measures the I/O activity of the volumes in the pool.
The statistic summary file created can be offloaded from the SVC cluster. This file can be analyzed
with the IBM Storage Tier Advisory Tool (STAT). This analysis provides an understanding about the
benefits to the workload if SSD-based MDisk were added.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
BLUEWV1 REDAV2
100 GB BLUEAV1 2 GB REDWV2
2 GB
3 GB
BLUEARC REDLV2
BLUELV1
100 GB 20 GB
20 GB Consistency group
BLUEPOOL REDPOOL
BLUE1 BLUE3
1.8 TB 1.8 TB BLUE5 RED1 RED2
1.6 TB 200 GB 200 GB
Storwize BLUE2
1.8 TB BLUE4
family
1.8 TB
DS5000 DS8000
DS4000 XIV
Cluster-wide copy
FlashSystem
DS3000
NetApp And so DS6000
HDS HPQ EMC Sun
N series on... ESS
Notes:
The SAN Volume Controller offers a network-based SAN-wide FlashCopy (point-in-time copy or
PIT) capability obviating the need to use copy service functions on a storage system-by-storage
system basis.
FlashCopy makes a point in time copy of the content of a source volume onto a target volume.
Although the copy operation takes a finite amount of time to complete, the resulting data on the
target volume is presented as if the copy appears to have completed instantaneously.
Related volumes can be defined as a single management entity known as a consistency group.
When an application has related data that spans multiple volumes the consistency group enforces
cross volume consistency or dependent write operations across those volumes. Consistency
groups are used to ensure that related volumes are treated atomically.
FlashCopy operations can be performed across separate source storage systems, and can be
mapped to dissimilar target storage systems.
Uempty
FlashSystem
SAN Volume Controller Pair
Notes:
In addition to FlashCopy, the Metro/Global Mirror feature is also a networked-based, SAN-wide,
storage system independent advanced copy service provided by the SAN Volume Controller.
Designed for disaster recovery, mirroring allows one or more volumes at a primary site be mirrored
to a secondary site. The SAN fabrics at the two sites are connected using interswitch links (ISL) or
SAN distance extension solutions. For testing or continuous data protection purposes, intracluster
mirroring operations are also supported.
In synchronous mode Metro Mirror provides a consistent and continuous copy, that is, the volume
at the secondary site is an exact match of the volume at the primary site. The host application writes
data to the primary site volume but does not receive the status on the write operation until that write
operation is in the SVC cache at the secondary site. In asynchronous mode Global Mirror enables
the distance between two SVC clusters to be extended while reducing latency by posting the
completion of local write operations independent from the corresponding write activity at the
secondary site. As with FlashCopy, consistency groups are supported to allow related volumes to
be treated atomically.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
In this walkthrough, we will highlight the steps in which to create and provision SVC storage
resources using the SVC GUI and CLI commands.
Uempty
Notes:
In order to configure devices such as storage pools and volumes so that the server can use them to
store data, examine the storage resource that is available. To do so, click the Pools function icon in
the navigation tree and then select the External Storage menu option.
In this example, four controllers entries are listed with their default names (controllerx), and each
controller entry is associated with an ID. These controllers are storage systems (actually WWNNs)
that have been zoned with the SVC node ports and the SVC has performed device logins with
these storage system ports to discover LUNs that have been assigned to the SVC.
The first controller that is highlighted (controller0) is identified by the device type of 1726-4xx FastT
which indicates it is a DS3400. The WWNN value displayed identifies the specific storage system.
Expand the view by clicking the + (plus) sign of the controller entry to list LUNs presented. LUNs
are displayed as MDisk entries. The LUN number column represents the DS3400 assigned LUN
numbers of these MDisks.
To uniquely identify an MDisk in the SVC inventory it is correlated to a specific storage system and
the specific LUN number assigned by that storage system. SVC assigns to the MDisk a default
object name and object ID.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Upon discovery the MDisk has an assigned access mode of unmanaged meaning it has been
identified but is currently not being used by the SVC. It will not be used by the SVC until further
administrator action.
To identify the remaining controller entries, the device type of 2107900 indicates that controller1 is
a DS8000. Device type 2145 with a serial number of 2076 represents a Storwize V7000 system.
Recall the Storwize V7000 has two WWNNs and each is represented as an individual controller.
Thus controller2 and controller3 collectively represent one Storwize V7000 system.
Uempty
3
© Copyright IBM Corporation 2011, 2014
Notes:
The storage system default names are automatically assigned by the system. It can be difficult to
properly identify a system under this naming convention. Therefore, adhering to naming convention
standards to create a more self-documenting environment will often save time for problem
determination. To change the name of a system:
1. Right-click the entry and select the Rename option from the pop-up list.
2. Enter a new system name in the Rename Storage System pane, and click the Rename button.
When you initiate a task, the GUI generates a list of commands that were used to complete the
task. In this example, a chcontroller -name command was used to rename the storage
system.
3. Once task is completed, click the Close button.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Adhering to the best practice of using meaningful names for objects (instead of staying with the
SVC assigned default names) the storage systems (also known as controllers) of the cluster are
renamed.
The lscontroller command output provides a summary entry for each storage system of the
cluster. This output format is referred to as the concise view as it provides high-level summary or
concise information for each object - namely object ID, name, and device type.
The lscontroller x output (where x is the object ID of the controller) provides much more detail about
the specific object as a more verbose view. For example, an additional key field found in the
verbose view is the WWNN of the controller which enables the association of the controller entry in
the SVC inventory with its physical entity counterpart.
Once the correct storage system has been pinpointed a meaningful name can be assigned. To
rename the storage system merely add a ch to the object category. Thus, the chcontroller
command with -name allows a new name to be assigned to the specified object (identified by ID or
name).
Uempty
Rename an MDisk
3
© Copyright IBM Corporation 2011, 2014
Notes:
The disk drives that are discovered within the storage device are automatically assigned a default
name and sequentially numbered (mdisk#). The GUI automatically presents a list of all unmanaged
MDisks by object name and ID. However, each drive’s availability can be identified by an access
mode which determines how the cluster uses the MDisk. The possible modes are:
• Unmanaged: The MDisk is not used by the cluster.
• Managed: The MDisk is assigned to an MDisk group and is providing extents that virtual disks
(VDisks) can use.
• Image: The MDisk is assigned directly to a VDisk with a one-to-one mapping of extents between
the MDisk and the VDisk.
If you add a managed disk that contains existing data to a managed disk group, you will lose the
data that it contains. The image mode is the only mode that will preserve this data.
To change the name of an mdisk:
1. Right-click an MDisk (managed disk) entry and select Rename from the pop-up list to rename
the MDisk.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2. Enter a more descriptive name in the Rename MDisk pane, and click the Rename button. The
GUI generates the chmdisk -name command to rename the given MDisk. In this example
notice the pattern in the commands to change the name of an SVC object:
- A ch prefix is added to an object category to form the command
- chmdisk to change an Mdisk
- chcontroller to change a controller (also known as a storage system) or chnode to
change a node.
- A keyword, such as -name, is used to identify the attribute to be changed typically with a
value assigned. In this case -name is used to identify the new name.
- A name or an object ID of the entity to be changed is identified at the very end of the
command.
3. Once task is completed, click the Close button.
Uempty
Notes:
As a productivity aid the GUI offers multi-select for some functions so that the same action can be
applied to multiple entries or objects. The Ctrl or Shift keys can be used to select multiple entries.
Right-click to view the pop-up list of options applicable for multiple objects.
Right-click to select the Rename option from the pop-up list. In the Rename MDisks pane multiple
edit boxes are available, one for each selected object. Cut and paste is supported so that the same
character string can be pasted in each edit box to minimize editing.
When the Rename button is pushed, the GUI generates as many chmdisk -name commands as
needed to change the name of each selected MDisk.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Figure 3-37. Rename DS8K MDisks and create pool (mdiskgrp) SNV13.0
Notes:
Use the detectmdisk command to scan for newly assigned LUNs to the SVC from storage
systems. This is analogous to cfgmgr in AIX or Rescan Disks in Windows. Recall newly
discovered LUNs become MDisks with an access mode of unmanaged.
The lsmdisk command is filtered to list MDisks from a controller whose name begins with *DS8K.
This output displays four MDisk entries, each with an access mode of unmanaged from the DS8K.
Each MDisk’s DS8K assigned LUN number can be determined from its MDisk entry.
The MDisks are immediately renamed, following installation naming conventions to identify the
storage system and the LUN number assigned by the storage system.
A storage pool containing these four MDisks is created with the CLI mkmdiskgrp command,
specifying an extent size of 1024 MB or 1 GB for the four MDisks of the DS8K_FC15Kpool. Taking
a cue from the GUI, a capacity warning threshold of 80% is also requested. Note the command
prompt returned with the object ID assigned to the newly created pool.
Uempty
Notes:
The visual shows the DS3400 storage system and its MDisks have been renamed. Naming
conventions might be revised and object names changed subsequently without impacting SVC
processing.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
1
2
4 Optional
5
GUI default
extent size
6
© Copyright IBM Corporation 2011, 2014
Notes:
Next, you will group the physical disk capacity into one logical entity called a storage pool.
From the same Pools menu:
1. Select MDisks by Pool from the quick navigation drop-down list.
2. Select the New Pool button to create a storage pool.
3. Within the Create Pool panel, enter a pool name. The name for the pool should be chosen to
adhere to naming conventions.
4. You can use the Choose icon option to add a visual descriptor for the pool.
5. Click the Advanced Setting option.
- Accept the GUI defaults provided. However, you can use this option to modify these default
values:
• The default extent size is 1 GB with v7. Remember that it is desirable to have the same
extent size for all pools in the SVC cluster. If all pools use this extent size of 1 GB, the
maximum capacity the cluster can address or manage is 4 PB. The drop-down list is
used to change the extent size.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
8
© Copyright IBM Corporation 2011, 2014
Notes:
Select the MDisks to include in the pool. The visual shows the first four MDisk entries are selected.
After you have verified your selection, click the Create button.
Uempty
mdiskgrp =
storage pool
Easy Tier = auto
Extent size = 1024 MB
Warning threshold = 80% full
0 3
1 2
DS3KNAVY0
2
DS3KNAVY1 DS3KNAVY2 DS3KNAVY3
DS3K_SASpool
© Copyright IBM Corporation 2011, 2014
Notes:
The mkmdiskgrp command is generated by the GUI to create the pool. In this example, an MDisk
group, also known as a storage pool, is created by the GUI with a name of DS3K_SASpool using
the specified attributes set in the Advanced Settings pane.
The four MDisks previously selected are added to this pool by their object IDs. The Easy Tier
function is set to be automatically active when two tiers of storage technology are detected to be in
the pool. Actually this is the default behavior of the SVC Easy Tier function and thus the
-easytier keyword need not have been coded.
An object ID is automatically assigned to the newly created pool.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
30 x 4 = 117?
0 3
1 2
Why is the pool capacity
DS3KNAVY0 less than the physical
DS3KNAVY3
DS3KNAVY1 DS3KNAVY2 capacity?
DS3K_SASpool
© Copyright IBM Corporation 2011, 2014
Notes:
Examine the detailed view of the newly created pool. The four MDisks now have an access mode of
managed and belong to the pool named DS3K_SASpool. Observe that each disk assigned to the
pool have a 30 GB capacity. At this point no volumes have been created yet the total pool capacity
is reported to be less than the sum of the capacities of the four MDisks. A capacity of 3 GB of space
appears to be missing. Why?
Uempty
DS3K_SASpool
Notes:
During a storage pool creation the SVC automatically allocates space within the managed mode
MDisks to create three quorum disks. The three quorum disks are used to resolve tie-breaking
cluster state issues and track cluster control information or metadata.
You can used the lsquorum command to list the quorum disks. Quorums are identified by three
quorum index values - 0, 1, and 2. One quorum index is the active quorum and the others are in
stand-by mode. For this example, the active quorum is index 1 resident on MDisk ID 1
(DS3KNAVY1).
The quorum size is affected by the amount of objects in the cluster and the extent size of the pools.
For this example, the pool extent size is 1 GB, and based on the number of free extent available, a
quorum disk is deduced to be using one extent or 1 GB (an extent being the smallest unit of
allocation). Three quorum disks of 1 GB each explain the missing 3 GB seen in the storage pool
capacity value.
The remaining extents of a quorum MDisk are available to be assigned to volumes (VDisks).
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
To answer the previous question: Why is the pool capacity less than the physical capacity? The
missing 3 GB is for SVC usage and is used by SVC quorum disks.
The details of the pool can be displayed by the lsmdiskgrp command specified with the pool
name (DS3K_SASpool).
Uempty
Notes:
As seen in the lsquorum output, MDisk ID 1 (DS3KNAVY1) contains quorum index 1 which is the
active quorum. Only managed mode MDisks can be used as quorum disks.
Notice the detailed lsmdisk output for this MDisk has an entry of quorum index 1.
Each MDisk has a UID value which is the serial number externalized by the owning storage system
for the LUN and appended with many bytes of zeroes.
© Copyright IBM Corp. 2011, 2014 Unit 3. SVC storage provisioning 3-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.