Failure Points in Storage Configurations: Common Problems and a Solution

Charles Macdonald EMC Proven Professional Knowledge Sharing 2010

Charles Macdonald Senior Technology Specialist TELUS charles.macdonald@telus.com

Table of Contents
Introduction ....................................................................................................................... 1 Components of the Storage Environment ......................................................................... 2 Roles and Responsibilities ............................................................................................ 2 Table 1 – Typical Roles in a Storage Environment ................................................... 4 I/O System Components ................................................................................................... 6 Physical Components of the I/O System: Hosts, Connectivity, and Storage ................ 6 Figure 1 – Hosts, Connectivity, and Storage ............................................................. 7 Hosts: Physical Components .................................................................................... 8 Figure 2 – Host Physical Components in the I/O Path .............................................. 9 Connectivity: Physical Components ........................................................................ 10 Figure 3 – FC Network Physical Components in the I/O Path ................................ 12 Storage: Physical Components ............................................................................... 13 Figure 4 – Storage Physical Components in the I/O Path ....................................... 14 Figure 5 – Physical Components in the I/O Path and Roles ................................... 16 Logical Components of the I/O System ....................................................................... 17 Hosts: Logical Components .................................................................................... 17 Figure 6 - Host Logical Components in the I/O Path ............................................... 20 Connectivity: Logical Components .......................................................................... 21 Storage: Logical Components ................................................................................. 21 Figure 7 – Storage Logical Components in the I/O Path ......................................... 24 Figure 8 – Logical Components in the I/O Path ...................................................... 25 Configurable Items in the Storage Environment ......................................................... 26 Figure 9 – I/O Path for Solaris 10 with Leadville and DMX ..................................... 31 Defining the Problem ................................................................................................... 33 Solving the Problem .................................................................................................... 33 Figure 11 – Configuration Management Goal ......................................................... 36 Conclusion ...................................................................................................................... 37

Disclaimer: The views, processes or methodologies published in this compilation are those of the authors. They do not necessarily reflect EMC Corporation’s views, processes, or methodologies

2010 EMC Proven Professional Knowledge Sharing

1

Introduction
In large organizations, responsibility for configuring items between the application and the physical disks that may affect storage availability and performance often cross several functional groups, e.g., storage operations, systems administration, database administration, application support, and design/architecture. Configuration errors or omissions at any level can contribute to performance degradation or decreased availability. However, requirements are often not well understood by all the groups involved. This article offers a generalized overview of the path an I/O operation takes between the application and the storage to illustrate how the interaction of various configurable items provides optimal performance and availability.

This article will provide Storage Administrators with a common language for potential configuration issues with: • • • • • Other Systems Administrators Database Administrators Application Support Design/Architecture Managers responsible for technical groups

An understanding between management and the technical groups ensures that they all work collaboratively to deploy and maintain systems with appropriate configurations that meet performance and availability requirements.

2010 EMC Proven Professional Knowledge Sharing

1

Components of the Storage Environment
A storage environment includes three categories of components: 1. Physical components of the I/O system 2. Logical components of the I/O system 3. Human actors

Physical components include servers, storage arrays, and connectivity devices. Logical components include databases, server operating systems, and storage system microcode. Human Actors, i.e., the people associated with the storage environment, include business users who create, view, and manipulate data within the storage environment, as well as anyone involved in the architecture, design, deployment, maintenance, and ongoing operation of the storage environment’s physical and logical components.

The purpose of a storage environment is to support business functions and objectives at the least possible cost. Business objectives that drive costs include not just the amount of primary data that must be stored, but also multipliers to the amount of data, such as the number of backups required, backup retention periods, archive retention, and disaster recovery requirements. Associated cost drivers include performance requirements for speed of access to the data, availability requirements that require redundancy, and sufficiency of systems to meet recovery time and recovery point objectives. The three components of a storage environment must be working in concert to fulfill this purpose.

Roles and Responsibilities
The Business User is the most important person within the storage environment. He/she is the reason for the existence of the storage environment. Others in the storage environment perform the tasks required to design, deploy, and operate the storage environment. These tasks are generally consistent regardless of the business setting, but the way that tasks are allocated in different organizations may be quite different. For example, the configuration of disk and file systems on a server may be a Systems Administrator function in one organization, but the responsibility of the Storage Administrator in another. Similarly, higher level functions, such as planning the

2010 EMC Proven Professional Knowledge Sharing

2

or independent management structures in different functional business groups or branches of business.particulars of storage allocations. Insufficient collaboration. and communication are likely to increase the frequency of preventable business function disruptions by introducing failure points in the storage environment. 2010 EMC Proven Professional Knowledge Sharing 3 . Different structures may co-exist within silos in the same organization for a variety of reasons such as legacy structures inherited with the acquisition of other corporations. may be determined by a Design group in one organization. That may not be true in many organizations. the roles of the typical actors in a storage environment are summarized in Table 1. Organizational roles and responsibilities should be well defined and well understood by all of the groups and individuals involved. In this article. they are not intended to define a standard that would be suitable for all organizations. The role descriptions use the term Service Level Agreement (SLA) that implies that some level of service has been well defined. but reside within a Storage Operations group in another. coordination. These definitions are for illustration only. as should methods of engagement and communication between the functional groups.

g. Designers create specific technology solutions for defined business requirements. *Note: Business Users might not be very good at defining requirements. Application Support Analysts maintain applications to meet defined SLAs. the desire “we want 100% uptime and never delete anything” usually does not become a requirement when the business is presented with a price tag to achieve it. recovery time objectives. including performance and availability requirements. Application Support Analysts deploy. including vendor selection. Architects create standards and blueprints for the technology that will be available within an organization. and drive the creation of SLAs for items such as performance. and disaster recovery strategies. e. 2010 EMC Proven Professional Knowledge Sharing 4 . and manage applications. availability. retrieve.. configure. and manipulate data within the storage environment to carry out business functions. having broad impact on strategic technology decisions. recovery point objectives. Business User requirements* provide the justification for the cost of deploying and maintaining a storage environment. data retention periods. Designers produce designs within the constraints set by Architects on technology and standards. Architects set general and specific technology directions at a high level.Table 1 – Typical Roles in a Storage Environment Actor Role Business Users store.

including performance and availability requirements. and manage storage arrays and dedicated storage networks. and file systems. Storage Administrators maintain the storage arrays and networks to meet SLAs. Systems Administrator responsibilities include configuring server components relating to storage. Systems Administrators deploy. Backup Administrators maintain the backup environment to meet SLAs. configure. path management software. in accordance with designs provided by Designers. in accordance with designs provided by Designers. and manage backup applications. and dedicated hardware that supports the application.Database Administrators deploy. such as tape libraries. in accordance with designs provided by Designers. including performance and availability requirements. Database Administrators maintain the database environment to meet SLAs. including performance and availability requirements. such as Oracle ASM. and manage server hardware and operating systems. including performance and availability requirements. and manage databases and database related software. configure. Systems Administrators maintain the server environment to meet SLAs. configure. volume managers. Storage Administrators deploy. such as HBAs. configure. 2010 EMC Proven Professional Knowledge Sharing 5 . Backup Administrators deploy.

logical components. optical disk drives. routers. 2010 EMC Proven Professional Knowledge Sharing 6 . twisted pair cables. and storage devices. it also includes hubs. In the case of networks. Connectivity. but the general discussion applies to other storage networks as well. and storage. Hosts are the computers that run the applications that users interact with to store. for both block based storage on an FC SAN.I/O System Components The following sections provide a generic description of the I/O System in terms of physical components. such as magnetic tape. and network attached storage. and their relationships. connectivity. and may also refer to virtual hardware. and Storage The physical components of a storage environment are segregated into host. Physical Components of the I/O System: Hosts. but also provide a feature rich environment that mediates the access to disk. or copper cables. Figure 1 illustrates the high level relationship between hosts. Connectivity refers to the physical components that provide the medium for communication between hosts and storage. Hosts can be anything from a notebook PC. Most of the examples are for hosts attached to block storage over a fibre channel network. Below. retrieve. and manipulate data. such as optical cables. connectivity. and switches. The physical components of the storage environment are discussed in more detail in the following sections. to large mid-range systems. and solid state disk drives. such as a VMware server. This article is only concerned with intelligent storage arrays that do not merely provide access to disk. Storage refers to any storage medium that is external to the host.

Figure 1 – Hosts. Connectivity. and Storage 2010 EMC Proven Professional Knowledge Sharing 7 .

I/O Devices include devices that handle user to host communications. The CPU consists of the physical components that perform the instructions contained in the programs. for a host with connectivity to block based storage via an FC SAN. and their I/O connections.. Internal Storage. monitor. and larger storage devices. and I/O devices communicate within a computer over buses and bridges that form the internal connectivity. such as the keyboard. e.Hosts: Physical Components To illustrate data flow within a computer. RAM and ROM. the physical components can be generalized to the Central Processing Unit (CPU). 2010 EMC Proven Professional Knowledge Sharing 8 . and mouse. and devices such as Network Interface Cards (NICs) and Host Bus Adapters (HBAs) that enable host to host or host to external storage communications. The CPU also contains some amount of high speed storage (registers and cache) to facilitate CPU operations. Figure 2 is a high level diagram of the physical components within a host. The CPU. I/O Devices. Internal Storage consists of memory. tape drives. Note that the host is depicted with two HBAs to provide physical redundancy for the I/O path to the storage.g. such as disk drives. internal storage. and Internal Connectivity. and CD/DVD drives.

Figure 2 – Host Physical Components in the I/O Path 2010 EMC Proven Professional Knowledge Sharing 9 .

a generalized description of FC switches is given below. for example. hubs. so are not described in this article. iSCSI. The connectivity devices in FC networks can consist of routers. so it is the only device considered here. a host with two separate HBAs attached to a pair of redundant SAN fabrics. IP networks provide connectivity for host and storage for either block based or file based I/O. switch port failure). provide connectivity between hosts and storage for block based I/O. This article will only consider two types of storage networks: IP networks and FC networks. File I/O protocols Network File System (NFS) and Common Internet File System (CIFS) that are used to access Network Attached Storage (NAS) devices are more widely used. Fibre Channel over Ethernet (FCoE).g. NFS. it will still have access to disk in the case of a failure that interrupts the I/O path for one HBA (e. However. Block based I/O over IP networks use protocols such as iSCSI. FC switches are the prevalent interconnect device. FC networks. Connectivity: Physical Components There are a variety of connectivity options to support various storage network protocols. such as Infiniband. and CIFS. or FCoE.. troubleshooting problems with NAS is often complicated by having an additional organizational unit involved (the IP Network Administrators) and a more complex topology. particularly where the IP connectivity is not a dedicated storage network. also called fabrics. If business functions are particularly sensitive to performance degradation. You must also consider exception scenarios when determining the necessary level of redundancy. Additional HBAs may be required in the host to provide redundancy for performance if the potential performance degradation in this routine failure scenario is not acceptable to the business user. and may require redundancy to meet availability requirements. and not just downtime. and switches. but will also have a 50% reduction in theoretical bandwidth to the storage. Fibre Channel (FC). HBA optic failure. IP networks are generally well understood. 2010 EMC Proven Professional Knowledge Sharing 10 .The physical components of the host must be sized appropriately for the expected workload.

Director class switches may also have hot swappable controller cards. and control processor (CP) units. rather than interrupting it. Figure 3 illustrates the components of a FC network. internal connectivity. Cables used to connect nodes to the FC switch are generally fibre optic cables. and power supplies.FC switches consist of three key components: ports. 2010 EMC Proven Professional Knowledge Sharing 11 . which also allows provides the communication path for the controller units. but copper may be used in some circumstances. storage. so that a failure in one fabric degrades connectivity. Port to port communication in the switch takes place via a bus or backplane. fans. FC networks are typically deployed in pairs of redundant fabrics. or a small form-factor pluggable (SFP). or switch) that is attached to the port. which transmit and receive signals to and from the node (host. FC switches generally include a number of hot swappable components. Ports contain a transceiver (either a gigabit interface converter (GBIC). such as GBICs.

Figure 3 – FC Network Physical Components in the I/O Path 2010 EMC Proven Professional Knowledge Sharing 12 .

Front adapters provide the interface between the hosts and the storage array. but all contain some type of redundancy. The front end consists of the storage front adapters and their controllers. Cache mirroring protects uncommitted writes from cache board failures. or Solid State Drives (SSD). Figure 4 illustrates the physical components of a storage array. The internal connectivity in the storage array varies between storage vendors and models of arrays. The back end controllers also contain some small amount of memory to help facilitate and optimize data transfer between the cache and the physical disks. either through direct connections. or a storage network. Different disk sizes may also reside within the same storage array. Cache consists of a number of cards of volatile memory that mediates the transfer of data between hosts and physical disks. writes are duplicated on two separate cache boards. One storage array may contain different types of disks.e. data that is written to disk is not dependent on power to maintain its state. Serial ATA (SATA). During a power failure. so the back adapters are not a single point of failure in the storage array. and physical disks. 2010 EMC Proven Professional Knowledge Sharing 13 . speeding up read I/O operations by facilitating some portion of the read I/O from the host perspective to be performed at cache rather than disk speeds. back end. i. such as FC.Storage: Physical Components The physical makeup of a storage array is described by grouping components into four broad categories: front end. battery power dumps cache to vault disks. Read ahead algorithms attempt to prefetch data into cache before hosts request it. cache. Back adapters are configured to provide multiple paths to the disks. as the storage array acknowledges the write I/O as committed when it is written to cache. Cache increases the speed of write operations from a host perspective. The back adapters connect to physical disks using SCSI or FC. The back end consists of storage back adapters and their controllers. I/O operations to cache are much faster than I/O operations to disk. The physical disks in the storage array are persistent data stores. then writes it to disk or destages it later.

Figure 4 – Storage Physical Components in the I/O Path 2010 EMC Proven Professional Knowledge Sharing 14 .

The roles and responsibilities for architecture. such as dual HBAs and FC fabrics. The greater danger lies in the configuration of the storage environment’s logical components.Figure 5 illustrates an end-to-end look at the physical components in the I/O path. and obvious failure points in the infrastructure are relatively easy to avoid if you take care to introduce architectural standards and solution designs that incorporate hardware redundancy. design. and operation of the physical infrastructure are generally easy to define. 2010 EMC Proven Professional Knowledge Sharing 15 . and identifies the actors that are responsible for tasks associated with the physical components.

Figure 5 – Physical Components in the I/O Path and Roles 2010 EMC Proven Professional Knowledge Sharing 16 .

or may be installed separately. Device drivers may be embedded with the OS. but the physical divides are still a useful model for organizing the discussion of the logical components. The availability and performance of the storage environment is highly dependent on correctly configuring the logical components to work together. depending on the OS and the specific hardware. such as Solaris. and the various flavours of UNIX. Some hardware devices. such as HBAs. Examples of operating systems include Microsoft Windows. Hosts: Logical Components Operating Systems (OS) provide the logical container that the rest of the logical components on a host work within. and HPUX. Device drivers enable the OS to communicate with specific hardware devices. The OS manages the interactions and interfaces between the users. the logical components. AIX. and storage. and the physical components on the host. Logical components may reach beyond the physical divides between hosts. Linux. The OS and drivers provide all of the basic services used for I/O on the host. support user microcode upgrades. Device drivers interact with the programmed instructions called firmware or microcode that reside on the hardware devices. 2010 EMC Proven Professional Knowledge Sharing 17 . connectivity.Logical Components of the I/O System The logical components of the I/O system control user interactions with the physical components and interactions between the physical components and include: • • • • • • • • host applications databases host operating systems storage operating systems FC fabric operating systems logical volume managers file systems device drivers The logical components contain a large number of configurable items that multiply to create a vast number of configuration combinations.

Oracle Automatic Storage Management (ASM) provides a file system and LVM-like functionality specifically for Oracle database applications. such as AIX LVM and Windows Logical Disk Manager. and then create logical volumes that are again presented to the OS as physical disks. Multipath managers may be integrated in the OS. File Systems provide a method to store and organize data in collections of files. Other LVM functionality may include snapshots. and then to the OS disk physical extents. and mediate access to the disk. Applications directly provide services to users. i. For example. Database applications are specialized for organizing logically related data to facilitate data analysis. which in the case of external storage are also a virtual entity.Multipath Managers provide a layer of virtualization above what the OS sees as physical disks. e. and retrieval. storage. Applications reside in a logical layer above the file system. or may span multiple physical disks. Devices are presented over multiple physical and logical paths to provide redundant access to storage. such as Veritas Volume Manager. or may be provided by a third party. the OS disk physical events are mapped to actual physical disks by the storage subsystem. Applications and databases both rely on the file system to manage data storage and retrieval. or may be a third party product. These are then mapped to LVM extents if an LVM is present. The file system maps user data to logical units of storage called file system blocks. web browsers.. Logical volumes can be a partition. Oracle and Microsoft SQL are examples of database applications. EMC Powerpath™. They contain the functionality and logic to allow users to perform groups of related tasks.e. Logical Volume Managers (LVM) provide a virtualization layer above what the OS sees as physical disks. 2010 EMC Proven Professional Knowledge Sharing 18 . a portion of a physical disk. like Solaris MPxIO. ASM uses raw disk that does not pass through any other LVM or file system present on the host. and to increase throughput. software RAID implementations. HDS HDLM. LVMs group a disk or disks into a volume group..g. LVMs may be integrated with the OS. Path managers recognize that the multiple paths point to a single storage device. or Veritas DMP. and the ability to move data around on physical disks without any disruption to data access. Multipath managers may also provide performance enhancement functionality by incorporating algorithms to spread I/O over multiple paths. Examples of application classes include word processors. and video games. From an OS perspective.

• • • • • • • • I/O begins in the application/database layer is passed to the file system then the LVM then to the SCSI target drivers followed by the multipath driver then the SCSI command is encapsulated by the driver or drivers that handle the fibre channel protocol (FCP) then passes on to the HBA driver and out to the SAN This layering is depicted in Figure 6 below. 2010 EMC Proven Professional Knowledge Sharing 19 . the logical path of an I/O passes through several layers.Since the logical components in the I/O path are layered.

Host Logical Components in the I/O Path 2010 EMC Proven Professional Knowledge Sharing 20 .Figure 6 .

The storage operating systems also manage performance optimization algorithms. This article does not provide a detailed discussion of the I/O path within the FC fabric. often referred to as microcode. Storage: Logical Components The storage array operating system. as the logical configuration of FC switches is generally not the source of many systemic problems in the storage environment. 2010 EMC Proven Professional Knowledge Sharing 21 . A zone set is a collection of zones that identifies which nodes are visible to each other on the fabric. and simplifies management.Connectivity: Logical Components Logical components in the connectivity environment direct traffic between the source and destination devices on the network. and external storage virtualization. remote replication capabilities. the principal logical component of interest from a configuration perspective is FC zoning that restricts communications between the nodes that are logged into the FC fabric. logical device snapshots. may contain a wide range of features including support for multiple RAID levels. Read hits decrease I/O response time by serving reads at cache rather than disk speeds. provides security by restricting communications between nodes. The microcode provides all of the FC services and management components such as command line interfaces (CLI). and read ahead algorithms that recognize sequential read I/O. application interfaces (API). and alerting via Simple Mail Transfer Protocol (SMTP). web interfaces. then pre-fetch data from disk to cache in anticipation of a host request to increase read hits. FC switches run their own operating systems that are also referred to as microcode. logical device cloning. Zoning decreases interference between nodes that do not need to communicate with each other. These include command queuing that optimizes I/O by re-ordering commands to reduce seek time and rotational latency on the physical disks. For FC fabrics.

Read hits service I/O at cache speeds. A read miss occurs when a read request has to wait for data to be read from the physical disks before it can be returned to the host. so have a significantly lower response time to the host than read misses. but prevents large I/Os from consuming too much cache. and on its interaction with the cache. or a cache limit has been reached for the logical device. As mentioned earlier.Storage arrays partition physical disks into logical devices (ldevs) that are then presented to hosts as SCSI target devices. Some storage arrays. which service I/O at disk speeds. and then committing the data to disk later. such as the EMC CLARiiON®. allows multiple hosts to access LUNs through shared front end ports on the storage array without seeing LUNs that belong to other hosts. Active/passive arrays also need to accommodate different behaviours for the various host multipath manager solutions. The storage array must adapt its SCSI emulation to accommodate variations in host operating system requirements. a delayed fast write has occurred. If a write I/O is forced to wait for a cache slot to become free because the cache is globally stressed. commonly referred to as LUNs. or to scenarios where data is being written directly to disk for reasons other than write aside. LUN security. storage arrays increase write performance by acknowledging write I/O to the host once data has been written to mirrored cache. This slows down the write response time for the host. The term write miss may also be applied to delayed fast writes. also known as LUN masking. As discussed above. such as cache failure. This is called a write hit. read-ahead algorithms increase the number of read hits by prefetching data to cache in anticipation of host requests. allow the storage administrator to set write aside limits that direct large I/Os directly to disk. and describes the majority of write I/O. The precise path an I/O takes through the storage array varies somewhat depending whether the I/O is a write or a read. Read hits occur when a read I/O is serviced from data already resident in cache. 2010 EMC Proven Professional Knowledge Sharing 22 .

then SCSI.The sequence of events for a write hit on the storage array begins with FC frames being received on the front end ports. and sends it to the host via the front end port. and then the front end controller creates a SCSI write acknowledgement. the I/O passes through layers that deal with FCP. From a logical perspective. after which the SCSI payload is extracted by the front end controllers. then service the I/O to/from the physical devices. if a host overwrites the data while it still resides in cache (a write cache rehit). which then commit the data to disk. The I/O is written to mirrored cache. Later. the data is destaged from cache to the back end controllers. encapsulates it in an FC frame. as illustrated in Figure 7. then the original write is never committed to disk. 2010 EMC Proven Professional Knowledge Sharing 23 . then map logical devices to physical devices. Note that not all writes are necessarily committed to disk.

Figure 7 – Storage Logical Components in the I/O Path 2010 EMC Proven Professional Knowledge Sharing 24 .

Figure 8 – Logical Components in the I/O Path 2010 EMC Proven Professional Knowledge Sharing 25 .

However. and the loss of a disk within a RAID group causes an increase in disk activity when the RAID group rebuilds to a new disk or a hot spare. that end-to-end view can be difficult to accomplish as the various actors often do not understand the end-to-end configuration requirements. Storage environments should be able to withstand many types of physical failures and brief connectivity interruptions without causing significant disruption to applications and databases. Common maintenance and deployment activities that should not cause disruption to service include: • • • • • Activating zone sets on the SAN fabric Creating LUNs on storage arrays Allocating LUNs to hosts Microcode upgrades on switches Microcode upgrades on storage arrays 2010 EMC Proven Professional Knowledge Sharing 26 . the loss of one of two paths as the result of a switch port failure decreases theoretical throughput by 50%. concealing issues that will only become apparent when an exception scenario occurs with the storage environment.Configurable Items in the Storage Environment The logical layers in the storage environment have configurable components that affect performance and availability. Incorrect configurations at any level can defeat physical and logical designs for high availability. Most default configurations will work when deployed. Correct configurations require end-to-end compatibility for the configuration of the logical components. For example. Common failures and events that should not cause disruption to service include: • • • • • • Single disk failure within a RAID group HBA failure in a multipath environment Switch or switch port failure in a multipath environment Storage port failure in a multipath environment Redundant power supply failure on a storage array LUN trespassing in active/passive storage arrays Some of the above may cause performance degradation in busy systems.

Some of these activities may cause some performance degradation in busy systems.. concatenated) Fan out ratios 2010 EMC Proven Professional Knowledge Sharing 27 .. port flag settings on DMX.g.g. SATA. concatenated) Fabric Zoning Storage Administrator activities that are not OS agnostic are due to OS variations in SCSI implementation and fail over requirements.. For example. with only minor variations in configuration to suit the OS of the attached host. 10000 RPM) MetaLUN configuration (striped vs. HBA registration on CX) Storage Administrators face greater challenges with configuration for performance considerations.. storage administrators’ tasks are fairly straightforward. They affect decisions about items such as: • • • • RAID type (e. SSD vs. the following Storage Administrator activities are OS agnostic: • • • • LUN masking (unless LUN masking also includes SCSI emulation) LUN creation MetaLUN configuration (e.g.g. RAID 5 vs. e.g. Volume Set Addressing for HPUX) SCSI emulation and failover configurations (e.. From an availability perspective. FC vs. 15000 RPM vs. a CLARiiON microcode upgrades requires the service processors (SP) to reboot.. striped vs. RAID 10) Disk tier (e. resulting in many multipath events on connected hosts as LUNs trespass back and forth between the two SP. This affects activities like: • • SCSI LUN numbering (e. Additional care needs to be taken with active/passive storage arrays such as the EMC CLARiiON if the activity requires a controller failover.g.

Several examples of failures due to configuration or compatibility issues are discussed below. and include required OS. VxDMP) the responsibility for configurable items affecting availability and performance resides in different functional groups (e. microcode. 2010 EMC Proven Professional Knowledge Sharing 28 . HEAT then compares the host configuration against the current interoperability matrix.Most storage availability issues related to configuration reside in the logical components at the host level. The System Administrator runs a data collection tool to capture the configuration of a host (EMCGrab for UNIX. Storage vendors provide guidance on host configurations that have been tested for availability.. EMC also provides the web-based Host Environment Analysis Tool (HEAT) to assist Systems Administrators to validate the configuration of hosts that are attached to EMC Symmetrix® or CLARiiON arrays via FC. and Application Support Analysts). and are suitable general performance requirements. then uploads the compressed output file to the HEAT website. Each logical layer of the I/O path has some mechanism for dealing with imperfect I/O operations. These documents are updated regularly to cover new products. These detailed guides provide an in-depth look at configuration options. and may include guidelines for parameter tuning beyond the guidelines published in the interoperability matrix. and driver patches and upgrades. ZFS vs. EMC PowerPath® vs.g. Database Administrators. and timeout settings for reporting I/O operation failures up to the next logical layer. Incompatible configurations between the layers can lead to service disruptions if any layer is not able to appropriately handle I/O operation exceptions. Detailed connectivity guides for a particular OS and storage vendor combination is usually available from the storage vendor. for both logical and physical components. native multipath vs. This guidance widely comes in the form of an interoperability matrix that contains information on a wide range of host-connectivity-storage combinations.. due to a number of factors: • • • the large number of configurable items the large number of product choices available at the various logical levels (e. As a result. and provides a report on the configuration highlighting any discovered deficiencies. VxFS.g. there are multiple mechanisms for retrying failed I/O operations. EMCReports for Windows). Systems Administrators.

2010 EMC Proven Professional Knowledge Sharing 29 . so in some cases problems are introduced at the design stage. DBAs also choose how to allocate raw devices into the ASM disk groups. Systems Administrator. They are often thought to be only related to performance. which can trigger write timeout values within Oracle ASM. inappropriately high queue depth settings can lead to unusually high I/O response times on a busy storage array. when applications are introduced that are not able to tolerate normal operations in the storage environment. Host SCSI queue depth settings that control the maximum number of outstanding SCSI commands can be queued against a device.1 JMS queues have internal timers that may cause JMS to shut down if I/O hangs during the ‘non-disruptive’ failover of the NAS head during a microcode upgrade.g. For example. Path management software may require SCSI target driver timeout settings that are different than the OS default settings. SATAII) being added to the same ASM disk group. DBAs can make many configuration changes that affect performance. For example. and Storage Administrator could lead to devices with dissimilar performance characteristics (e. switch microcode upgrades. as they now have more control over the configuration of logical devices on the host. poor communication between the DBA. With Oracle ASM. Database Administrators have taken on some additional configuration responsibilities. as a result. For example. For example. or storage array microcode upgrades. but they can also impact availability. WebLogic 8. Whether or not there is a configurable item at the application layer depends on the application. FC vs. but queue depth can also be implicated in availability. adding new devices into an ASM disk group triggers a rebalancing operation that can have a significant performance impact.There must be some mechanism at the application level to deal with I/O interruptions that are considered to be normal operations in the storage environment. even though NFS on the host recovers gracefully. failing to set the ssd:ssd_io_time on a Solaris 10 host running the Leadville stack can cause the host to panic or offline all disk during regular SAN events such as LUN trespasses. This causes ASM to take disk groups offline..

2010 EMC Proven Professional Knowledge Sharing 30 .FC protocol parameter tuning may also be recommended on some systems. Also included are some comments about configurable items at each logical layer. mapped to the actor in the organization most likely to perform the configuration. or the length of time the HBA waits before it takes a port offline due to loss of light. again leading to potential availability issues for common SAN events. Figure 9 relates the generic logical layers presented in this article to a specific configuration example: a Solaris 10 host using the Leadville stack. affecting items such as the number of I/O retries at the FC frame level. attached via dual FC fabrics to an EMC DMX class array. Storage vendor qualified HBA drivers and firmware may contain default settings that are different from the OEM installation.

Figure 9 – I/O Path for Solaris 10 with Leadville and DMX HOST Solaris 10 – Leadville I/O timeout I/O size Block size Configurable Items Applications Databases Application Oracle 10g File System Oracle Automatic Storage Management (ASM)* ZFS ASM Logical Volume Manager (LVM) * if present zpools RAID Striping Cache Quotas Snapshots Clones Block size Compression Diskgroups External Redundancy Allocation Unit Size Striping Stripe size SCSI target drivers ssd /etc/system entries: I/O timeout: ssd_io_time Queue Depth: ssd_max_throttle SCSI retry: ssd ua retry count /kernel/drv/fp.conf entries: Fail port: fp_offline_ticker FC Frame reties: fp_retry_count HBA drivers emlxs HBA HBA 2010 EMC Proven Professional Knowledge Sharing 31 .conf Multipath drivers scsi_vhci (mpxio) fcp FC protocol drivers fp /etc/system entries: Automatic LUN discovery: fcp:ssfcp_enble_auto_configuration Fail port: fp_offline_ticker FC Frame reties: fp retry count /kernel/drv/emlxs.conf /kernel/drv/mpt.

speed.CONNECTIVITY Port Port FC Zoning FC Zoning Single initiator zoning Single initiator zoning Zoning Port speed Port Port Port STORAGE Port Port Flag settings: Common Serial Number Disable Queue Reset on Unit Attention Fan Out ratios SCSI LUN numbers FC Protocol Fibre and SCSI Port Flag Settings SCSI Emulation LUN mapping LUN Security LUN masking LUN masking MetaDevice striping/concatenation Logical Devices MetaDevices Cache Cache Disk Tier (disk type. Share Nothing Hot Spares RAID RAID 5 (7+1) Disk Controllers Port Port D i s k 2010 EMC Proven Professional Knowledge Sharing 32 . size) RAID level Share Everything.

Often. Each of these processes needs to be tied to a rigorous configuration management discipline to maintain a storage environment that approaches optimal performance and availability within the constraints of the environment’s physical capabilities. but may not withstand storage environment exception scenarios. such as microcode upgrades and redundant hardware failures. Configuration changes resulting from new deployments into the environment. The purpose of configuration management is to identify and track the characteristics of the physical and logical components. performance. It is easy to imagine nightmarish storage scenarios. As a corollary to the above. Solving the Problem Configuration of a storage environment is an iterative process. As a general statement. Configuration management begins with identifying the components in the storage environment. storage goes awry. all you have to do is flip through the “Fixed Problems” section of the microcode patches you haven’t applied yet to get some ideas. it follows that: Most storage related failures are preventable. incorrect configurations may manifest as problems on a future reboot. most storage related problems occur because people associated with the storage environment deploy flawed configurations that appear to be healthy. this information will be recorded in a database referred to as the configuration management database (CMDB). However. or failure to maintain the environment by pro-actively applying patches and upgrades.Defining the Problem On occasion. it is safe to state: Most storage related failures are directly attributable to improper configurations either as the result of initial deployment errors. with the amount of detail necessary to support decision making regarding the potential impact configuration changes may have within the storage environment. and capacity management processes. In other cases. The configuration management discipline should also contain processes that control the 2010 EMC Proven Professional Knowledge Sharing 33 . or disk discovery. and sustainment activities arising from problem.

provide the ability to report on the configuration. applications.g. Each of the affected organizational groups should have a highly skilled resource involved in the configuration management process since the establishment of deployment standards requires specialized knowledge within each logical layer of the storage environment. OS and microcode patches). if appropriate. Configuration management processes should be deeply integrated with problem management and change management processes. may be impacted by a problem that has been identified? (e. and will assist in providing answers to questions such as: • • What business services. This higher level information will increase compliance by providing 2010 EMC Proven Professional Knowledge Sharing 34 . new driver versions. databases. while others may choose to create a committee containing representation from several organizational groups. and standardize the configuration requirements for all of the logical components in the I/O path.. In any case. may be impacted by a planned configuration change? What business services. deployment. This will be an ongoing process. and maintenance of the configurable items in the I/O path. etc.. what servers are connected to a failed switch. servers. as well as the reason for the particular value it should be set to. or what servers require proactive maintenance to apply an OS patch?) • What configuration changes were introduced in the storage environment that may be linked to the introduction of a current problem? Configuration management in the storage environment is complicated by the number of organizational teams that may be involved in the design. and must be effectively integrated into their deployment and maintenance procedures.g. configuration standards must be effectively communicated to the operational groups that apply the configurations. Documentation of the standards should include a description of the functionality of each configuration item.. and fixes and releases for existing components (e. and. databases. A successful configuration management implementation must define. and require configuration audits. a reference to the vendor documentation that specifies the setting. applications. record. etc. servers. as it must capture new technologies as they are introduced. Some organizations may choose to create a separate organizational unit for configuration management.e.configuration (i. place controls on changes to the configuration).

which can be useful as an organizational performance metric. Audits should be conducted for each deployment. Audit configurations to ensure that they comply with the defined configuration standards. and also periodically to measure the degree of compliance with configuration standards and uncover any latent threats. and generally increases their level of awareness and comfort with the storage environment. Figure 11 illustrates the desired outcome of implementing a configuration management process for the storage environment.operational staff with a context for configuration decisions. periodic audits can be limited to some representative subset of the environment to allow the overall compliance of the storage environment to be extrapolated. Audits also allow compliance with configuration standards to be measured and rated. 2010 EMC Proven Professional Knowledge Sharing 35 . or as part of a continuous improvement process. In large environments.

Figure 11 – Configuration Management Goal 2010 EMC Proven Professional Knowledge Sharing 36 .

and human components of a storage environment must be working in concert. most storage related failures are preventable. To fulfill this purpose. the configuration 2010 EMC Proven Professional Knowledge Sharing 37 . As well as tracking the status of all of the configurations within the storage environment. Configuration and maintenance issues at the Systems Administrator level can compound very quickly. the configuration management processes must include representation from all of the functional groups involved in configuring the I/O path. and be integrated into their documentation and procedures. To be successful. As a result. as new Systems Administrators have generally had very limited exposure to external storage. these roles are often separated into different functional groups. physical. such as when configuration errors are embedded in deployment tools. As the storage environment grows larger. the Storage Administrator and the Systems Administrator roles are likely to reside within the same functional group. due to a number of factors. storage configurations often fail. or if server configurations and patch levels delay or prevent microcode upgrades being deployed on storage arrays and switches. the logical. storage related skills within the Systems Administrator groups are likely to decline over time. We can reduce storage related failures by implementing a rigorous configuration management discipline. Most storage configuration issues occur in the logical components at the host level. such as: • • • The large number of configurable items at the host level The large number of product choices available The responsibility for configurable items resides in several different functional groups When an organization first deploys a storage environment. this declining skill set presents challenges in maintaining the health of the storage environment.Conclusion The purpose of a storage environment is to support business functions and objectives at the least possible cost. Since Systems Administrators are responsible for a large number of configurable items related to storage. with causes that are directly attributable to improper configurations or poor maintenance practices. However. Thus.

2010 EMC Proven Professional Knowledge Sharing 38 . Kickstart for Red Hat Linux. Their expertise and experience in other customer sites should be leveraged when establishing a configuration management process and in its ongoing maintenance. storage vendors are strongly motivated to help keep your storage environment healthy. Configuration management faces fewer challenges if the number of unique configurations can be reduced by: • Limiting the number of manual tasks in server deployments by using standard images during deployment and tools such as Jumpstart for Solaris. modular arrays. EMC also provides tools that allow Systems Administrators to quickly check a host configuration against the current EMC support matrix. or NIM for AIX. having different vendors for monolithic arrays. i.e.management process must include regular audit procedures to provide a measurable verification of the level of compliance to standards.. • Decreasing SAN complexity by limiting the number of storage vendors within the same class of storage. Storage vendors provide guidance on host configurations that have been tested for availability and are suitable general performance requirements. and NAS is manageable. but having two vendors for modular storage increases complexity unnecessarily. In general.

Sign up to vote on this title
UsefulNot useful