Home
        IBM XIV Storage System Architecture and
         Contents
1.                                                            iTop Active Volumes Cache Hit Performance S     TV 2810 6000105 1BM   Onstor_Core_1 1D 14034  Oct 5  2010 6 00 02 PM                oe Top Volumes Data Rate Performance A    i xT   2810 6000105 IBM  Oonstor_Core_2f1D  14035  Oct 5  2010 6 00 02 PM   Top Volumes Disk Performance    S    xTv 2810 6000105 IBM   onStor_Lun_1 1D 13790  Oct 5  2010 6 00 02 PM                                                                                                                               OF  o gt   oo  oo  od  oo  oo  od  oo        a  oO yarpojyoyayolyoaysyayjyaoa yayayay yaya  oO  yolpoylyoyoyolyoyoy yoy yoyoy yoy yoyoa   P      Tan Vollimes THO Rate Performance    Figure 7 85 Subsystem performance                   Tivoli Storage Productivity Center volume creation    After the Configure Devices tool is used to add an XIV Storage System into Tivoli Storage  Productivity Center  the NAPI introduced with Tivoli Storage Productivity Center v4 2 is used  as the native interface between Tivoli Storage Productivity Center and the XIV Storage  System  This interface also enables Tivoli Storage Productivity Center to create a volume on  the XIV Storage System and to map it to a host by using the Volume Create wizard     Chapter 7  Monitoring 403    7 7 3    Storage Productivity Center       Storage  Resources    Server  Resources          Network  Resources    i    Reporting          Choose the XIV Storage System for which you want to
2.                     Certificate 0                    Serial Number  01   Issuer  E ca xivstorage org  CN xivstorage  O xivstorage  L Tucson  S Arizona    C US   Subject  CN xivhost1 xivhostlldap storage tucson ibm com   Non root Certificate   Cert Hash shal   e2 8a dd cc 84 47 bc 49 85 e2 31 cc e3 23 32 c0 ec d2 65 3a  Key Container     227151T702e 7d7b2105f4d2ce0T6f38e 8aa08b0a e9a6 4a73 9dce c84e45aec165  Provider   Microsoft RSA SChannel Cryptographic Provider   Encryption test passed   CertUtil   store command completed successfully     Importing a certificate authority certificate    Until the xivstorage org CA is designated as a trusted root  any certificate signed by that CA  is untrusted  You must import the CA   s certificate  using the local certificate management tool   into the Trusted Certification Authorities folder in the local keystore     To start the local certificate management tool  click Start     Administrative tools  gt   Certificates  Local Computer  and complete the following steps     1  After the certificate tool opens  select the  Console Root Certificates  Local  Computer   Trusted Certification Authorities folder     2  Start the certificate import wizard by clicking Action     All Tasks     Import  Click Next to  continue     3  Select the file that you want to import  The xivstorage org CA certificate is in the  cacert pem file  Click Next to continue     4  Select the Place all certificates in the following store option and ensure that the  ce
3.       8  Click Create to save the settings     Define LDAP Server          FODH      itso storage ibm com  Server Address     9 155 113 143  Search DW  ij  eN Us ers DC itso DC storage DC ibm C    Server Port     Server Secure Port     z s pe  Certificate File        Figure 5 54 Define LDAP Server window             254 IBM XIV Storage System Architecture and Implementation    Now you can see your added server reflected in the table  as shown in Figure 5 55        Welcome    Server Type      LDAP Servers         XIV User    Unique ID s    Groups     Secure LDAP    Bind  amp  Cache    Test  amp  Activation      Finish         LDAP Configuration   Directory Services Server Configuration x    p    Directory Services Server Configuration    Add  Remove or modify your Directory Services servers  If you plan on using  Secure LDAP  please make sure you attach the appropriate LDAP Server  certificate pem    format  for each server you configure     itso storage ibm com          Figure 5 55 LDAP Servers tab    9  Add more LDAP servers  if necessary  or click Next to continue with the configuration    process     10 From the XIV User tab  as shown in Figure 5 56  define one user  this user must be an  already defined LDAP user  that will be used by XIV to validate the LDAP settings  That  user does not need any special permissions     11 As shown in Figure 5 56  enter the complete user DN for LDAP  which in our example is  CN XIV CN Users DC itso DC storage DC ibm DC com  Enter the pas
4.       Number of Volumes 1  Volume Size 17    Volume Name           amp     Figure 4 54 Create Volumes view    2  From the Select Pool field  select the pool where this volume should be stored  See 4 4 2      Managing storage pools with the XIV Storage Management GUI    on page 142 fora  description of how to define storage pools  The storage size and allocation of the selected  storage pool is shown textually and graphically         The blue portion of the bar indicates the space already allocated in this storage pool         The shaded portion of the bar  outlined with a rectangular size indicator  indicates the  space that will be allocated to this volume  or volumes  after it is created         The remaining gray portion of the bar indicates the space that remains free after this  volume  or volumes  is allocated     3  In the Number of Volumes field  specify the required number of volumes     158 IBM XIV Storage System Architecture and Implementation    4  Inthe Volume Size field  specify the size of each volume to define  The size can also be  modified by dragging the right side of the rectangular size indicator     Volume size  When multiple volumes are created in the same step  they all have the  same size as specified in the Volume Size field     5  In the Volume Name field  specify the name of the volume to define  The name of the  volume must be unique in the system  If you specified that more than one volume is  defined  they are automatically and successively name
5.       View Associated Hosts and Clusters Pe   View Associated Users and User Groups n   12 TB Hard  fo test3 Limit Traffic by Perf Class    Properties          Figure 4 103 Accessing the Delete Domain dialog window in the XIV GUI    To delete the domain  click OK in the dialog window that appears  as shown in Figure 4 104        Delete Domain X    Are you sure you want to delete  Domain my_test_domain           Figure 4 104 Deleting a domain in the XIV GUI       Note  You cannot delete a domain that contains pools or users  To delete a domain that  contains pools or users  first remove the associations to those pools or users     192 IBM XIV Storage System Architecture and Implementation    4 8 3 Limiting domains by performance class  QoS     In multi tenant storage environments  to ensure adequate service levels for all tenants  a  common requirement is to be able to limit the amount of bandwidth or IOPS that can be  consumed by any particular tenant  The XIV Storage System supports the implementation of  performance classes  QoS   XIV software Version 11 5 extends the flexibility of the QoS  feature  allowing for the application of perfomance classes to domains     When implementing QoS along with multitenancy  you have the of flexibility for these options      gt  Associate a domain with an existing performance class   gt  Associate a domain with a new performance class    Associating a domain with an existing performance class  To associate a domain with an existing perfo
6.       e i             Figure 7 63 Define SNMP destination    4  Click Define to effectively add the SNMP Manager as a destination for SNMP traps     In addition  set up the rules for the defined SNMP destination  as described in    Setup  notification and rules with the GUI    on page 359  Afterward  the XIV Storage System is set up  to send SNMP traps to the defined SNMP manager  The SNMP Manager software processes  the received information  SNMP traps  according to the MIB file     7 6 2 Using SNMP commands to confirm the XIV Storage System status    Although SNMP traps can be received from the XIV Storage System  you can also send  SNMP get or walk commands to collect status information from the XIV Storage System  To  accomplish this task  you must use an SNMP manager that supports this task and you need  to import the XIV Storage System MIB into that manager     To send SNMP get commands  you must know the SNMP community name  By default  the  community name is set to XIV  not public   To confirm or change the SNMP community name   click System     Settings  and then open the SNMP window that is shown in Figure 7 64        AIMV_PFE2_ 1340010 Settings    General SNMP Version SNMPv2c    SNMP Contact smitp_default  Parameters  SNMP Location 9 145 129 159  SNMP SNMP Community XIV  SNMP Trap Community XIV    Misc          Figure 7 64 Setor show the XIV Storage System SNMP community name    You can also set or show SNMP information  including the community name  by running  co
7.      274  5 9 4 Active Directory group membership and XIV role mapping                  274  5 9 5 OpenLDAP Directory and XIV Storage System role mapping                278  5 9 6 Managing multiple systems in LDAP authentication mode                  282   5 10 Securing LDAP communication with Secure Sockets Layer                    283  5 10 1 Configuring XIV to use LDAP over Secure Sockets Layer                 283  5 10 2 Maintaining the SSL certificate    0    0    ee 285    Contents vV    vi    Chapter 6  Performante soatta ne aa 252d ethene d eo nctwseus k 287    6 1 XIV Storage System Software and hardware architecture                    4  288  6 1 1 Workload distribution and load balancing                0  cee ees 288  6 12    Grid aIrchileCtwres      merka cee one wk  amp 4 de tated A eid Be Ok ee eA Re ee 290  6 1 3  Caching mechanisme soss ine ca atk Wat ac Reed estat weds a as wo Meals ole de Red ale le 291  6 1 4 Data redistribution effects on host systems              0 000 cee es 292  62125  ONAP NOl S aii e sees hee a sheenble  So Se ese hla eG Nate ames baer eras  293   6 2 Practices for optimum performance            0 0000 eee 294  CAN G  Beatin sia teres    aaa eas G Peerage dee aah om  deck E E a Se Ged ay tp esa arms 294  6 2 2 Number of logical unit numbers            0 0    ees 295  6 2 3 Multipathing considerations          0 0 0  ee ees 297  6 2 4 Host considerations          0    eee ees 299  6 2 5     Quality OF SENICE wm 2h aaan ess ee heme ae R
8.      Disk  12   Module  7     Capacity  2TB    Temperature  0  C  Status  Failed  Deferred   Functioning  yes       a es A  Figure 7 25 XIV Storage System Gen3 disk in a deferred replacement state       7 1 4 Monitoring with XIV Storage System Command Line Interface    The XIV Storage System Command Line Interface  XCLI  provides various commands to  monitor the XIV Storage System and gather real time system status  monitor events  and  retrieve statistics  See 4 1     XIV Storage Management software introduction    on page 112 for  more information about how to set up and use the XCLI     System monitoring    Various XCLI commands are available for system monitoring  For more information about  these commands  see the XCLI Utility User Manual and Commands Reference books  which  are available at the following website     http   publib boulder ibm com infocenter ibmxiv r2 index jsp    The state_list command  which is shown in Example 7 2  gives an overview of the general  status of the system  In the example  the system is operational  data is fully redundant  no  shutdown is pending  ssd_caching is enabled on the system level  and encryption is not  supported     Example 7 2 The state_list command     gt  gt state_list    Category Value   System state on   target state on   safe mode no   Shutdown reason No Shutdown   off type off  redundancy_status Full Redundancy  ssd_caching disabled  encryption Not Supported    Chapter 7  Monitoring 339    In Example 7 3  the system_capa
9.      Figure 3 9 XIV Storage System Gen3 rack    74 IBM XIV Storage System Architecture and Implementation    The XIV Storage System Gen3 rack has four optional features  as described in Table 3 3     Table 3 3 Rack features for XIV Storage System Gen3    0080 Ruggedized rack option    0082 Rear door heat exchanger  0200 Weight and height  reduced shipping cost  0203 Radio frequency identification device       Ruggedized rack option   The ruggedized rack is an optional kit for stabilizing the XIV Gen rack so that the rack  complies with IBM earthquake resistance standards  It is important for XIV systems to be  adequately restrained during earthquakes to prevent human injury and limit potential damage  to critical system components  such as hard disk drives  The optional ruggedized rack option  includes hardware that secures the rack to the floor and cross braces on the front and rear of  the rack  which prevents the rack from twisting  The earthquake resistance option brings the  XIV Storage System into compliance with earthquake resistance objectives that are  documented in Earthquake Resistance for IBM Hardware Products  IBM Corporate Bulletin  C B 1 9711 009 9202      Installation of the required floor hardware and the earthquake resistance kit is disruptive  If  the earthquake resistance kit is installed on an existing XIV Storage System  the XIV Storage  System must be turned off and temporarily moved while the floor is prepared and the kit is  installed     The rack tie
10.      Figure 5 63 Users tab    Click the Configure LDAP icon on the toolbar  as shown in Figure 5 64     A    amp   amp  Add User     Add User Group  lt 3 Configure LDAP 4   LDAP Wizard       Users Configure LDAP    Figure 5 64 Configure LDAP icon      Inthe LDAP configuration menu that is shown in Figure 5 65 on page 260  set the value of    Use LDAP to Yes and choose the LDAP Server Type that you want to use  In our example   we selected Microsoft Active Directory     Then  click the LDAP Servers tab to go to the next step     Chapter 5  Security 259    LDAP    General Use LDAP Yes    LDAP Server Type Microsoft Active Directory hi  LDAP Servers  Current Server IP  User Credentials  Role Mapping  Secure LDAP    Parameters          Figure 5 65 LDAP configuration  General    4  Inthe LDAP Servers window in the LDAP configuration  click the green plus     icon  as  shown in Figure 5 66     LDAP      Add LDAP Server  General    Address    LDAF Servers    User Credentials    Role Mapping    Secure LDAP       Parameters    Update Cancel          Figure 5 66 LDAP configuration  Servers    5  In the window that opens  enter the FQDN  which is the DNS name of the LDAP server   such as itso storage ibm com in our example      Also  enter the LDAP server IP address and the Search DN  which in our Active Directory  implementation is CN Users  DC itso  DC storage  DC ibm DC com  as shown   in Figure 5 67 on page 261    If your LDAP server uses nonstandard port numbers  enter those accordi
11.      Figure 7 77 XIV Storage System details in the Tivoli Storage Productivity Center GUI    The fields in Figure 7 77 show the following information     Available Space  GB  The combined unused soft space inside all defined  pools  in GiB     Consumed Space  GB  The combined size of all defined volumes and  Snapshot reserves in all pools  in GiB     Configured Capacity Limit  GB  The total of the hard size of all defined pools  in    GiB   All of the hard space inside all of the pools     Remaining Configured Capacity  GB  The total of the remaining hard space  space not    used by volumes or snapshots  inside all defined  pools  in GiB      Figure 7 78 on page 398 shows the details for an XIV Storage System as shown in Tivoli  Storage Productivity Center  Do not use the fields that show the Disk Space  Available Disk  Space  Physical Disk Space  Formatted Space  and Formatted Space with No Volumes   Although values are shown for some of these fields  the methods used to calculate them do  not apply well to the XIV Storage System  They are used for other storage products        Detail for Storage Subsystem  lt Z1   Fest gt     Group    Manufacturer  Model  Serial Number    Firmware Revision  Sumber of Disks  Disk Space  Available Disk Space  Physical Disk Space    Formatted Space    Formatted Space with No   Yolumes    Overall Unavailable Disk Space  Unformatted Disk Space    Configured Capacity Limit  Remaining Configured Capacity    Sumber of   olumes  Yolume Space  Backen
12.      With XIV Storage System  there is no need to resort to these multiple techniques  Each XIV  Storage System LUN has only one disk performance limitation and that is the full  performance potential of the entire XIV Storage System  which includes all disks and modules  in the XIV Storage System configuration  The consequence of this massive parallel approach  and the way data is effectively laid out within the XIV Storage System grid is that LUNs can be  easily resized without physical disk layout concerns  It is unlikely that an XIV Storage System  LUN will ever be reconfigured for performance reasons     Chapter 6  Performance 289    What if you add more than one application to a host server and consider multiple host  systems in a typical client computing environment  For traditional storage systems where  RAID arrays  or groups of arrays  are dedicated to an application  the considerations for  providing the adequate number of disk drives to handle the application performance  requirements increase linearly with the number of applications  These groups of arrays  become islands within the traditional storage system  Realistically  several of these islands  are sized correctly for the application   s performance requirements  where others are  oversized to handle application performance growth projections  The islands that are  undersized are a performance bottleneck problem that must be addressed     For the XIV Storage System  there are no special considerations for m
13.     Latency  ms   2       o 14 00 14 30 15 00 15 30 16 00 16 30 14 00 14 30 15 00 15 30 16 00  16 Sep 2011  amp  16 Sep 2011            Figure 6 31 Host IOPS and response times    It is important during initial application testing and early production to document IOPS and  response times when the application is running well  In this way  if an XIV Storage System  performance issue is suspected  you can compare these known good performance  characteristics to the new ones and see if there is a difference  If there is no difference   chances are that whatever is causing the problem  it is not the XIV Storage System     Input output operations per second and response time  When it comes to XIV Storage System performance analysis  there are a few questions      gt  Is XIV providing the bandwidth or IOPS required by the application    gt  Is XIV providing adequate read and write response times     Chapter 6  Performance 321    322    Because the XIV Storage System can have different configurations depending on the number  of modules  each of these configurations has different performance capabilities  For a  specified production workload  the different XIV Storage System configurations provide  different performance characteristics  As the application performance demands increase  two  things happen to the XIV Storage System performance characteristics     1     The XIV Storage System provides more IOPS throughput  MBps  until it has reached its  maximum performance capacity     T
14.     Managing domain user associations    To manage local user associations with a domain  right click the domain in the Domains view  and select Manage Associations     Users  as shown in Figure 4 97        Name Utilization                      Edit     PE ete       Manage Associations Pools   View Associated Pools Hosts   View Associated Hosts and Clusters Clusters   View Associated Users and User Groups Targets   Limit Traffic by Perf Class User Groups   Limit Traffic by new Perf Class   Properties       Figure 4 97 Accessing the Manage Domain   s Associations screen User tab in the XIV GUI    In the Manage Domain   s Associations screen that appears  Figure 4 98   select the users and  use the arrows to associate or remove the users from the domain  Click Update to apply the  changes        Manage Domain s Associations  ITSO_domain   Users  Users to Associate Associated Users  User Groups   itso ITSO  ITSO1  Hosts ITS0_2_domains  ITS50_all_domains  rine ITSO _application_admin  vaai ITSO d1  ITSO_isis  Targets ITSO_no domains  ITSO_one_domain  Pools ITSO Useri    OpenStackxlV  Ralf  Residency  Team   Team2              amp  lt om    Figure 4 98 Managing domain local user associations in the XIV GUI       Chapter 4  IBM XIV Storage Management software 189    Important  Associating a global user  a user with no existing domain associations  with a  domain will remove the global privileges from that user  Therefore  that user will then have  access only to the domains that yo
15.     This is a free of charge centralized server that consolidates IBM storage provisioning   automation  and monitoring through a unified server platform  It is compatible with Red  Had Enterprise Linux  RHEL  on a local or virtual host     Version 1 5 incorporates VMware APIs for Storage Awareness  VASA   VMware vSphere  Web Client  vCenter Orchestrator  vCO   vCOPs  and VMware vCloud Automation Center   VCAC       gt  IBM XIV Management Console for VMware vCenter    It integrates XIV storage with the VSphere console for more efficient management of  VMWare components on XIV storage   They link through the IBM Support Portal       gt  VMware vCenter Operations Manager  vCOPs   https    my  vmware  com web vmware downloads    gt  VMware vCenter Site Recovery Manager Storage Replication Adapters  https    my  vmware  com web vmware downloads    Storage Replication Adapters are software modules for VMware Site Recovery Manager  that simplify the use of storage replication software with VMware vSphere      gt  Fix Central provides fixes and updates for your XIV System software  hardware  and  operating system at this website     http    www ibm com support fixcentral swg selectFixes parent Enterprise Storage   Servers amp product ibm Storage Disk XIV StoragetSystemt 282810  2812 29 amp release A  11 amp platform Al1 amp function al       gt  IBM Storage enabler for Windows Failover Clustering Agent    The IBM Storage enabler for Windows Failover Clustering Agent maintains volume
16.     Volumes    volume mapped volume  app01_ vol01 to host app01_ vol02             app01_ administrator user is authorized for  snapshot snapshot managing snapshots app01_ snap01 and    app01_ snap01     app01_ snap02   app01_ snap02    E  irail          Figure 5 72 User group membership for LDAP user    5 9 2 Managing LDAP user accounts    Managing user accounts in LDAP authentication mode is done using LDAP management  tools  The XCLI commands and XIV Storage Management GUI tools cannot be used for  creating  deleting  modifying  or listing LDAP user accounts  The set of tools for LDAP  account management is specific to the LDAP server type  The same set of LDAP  management tools can also be used for account removal  modification  and listing     268 IBM XIV Storage System Architecture and Implementation    Generating LDAP account lists    To generate a list of all LDAP user accounts registered under the Base_DN  the XIV Storage  System configuration parameter specifying the location of LDAP accounts in the DIT   use the  ldapsearch queries that are shown in Example 5 16 and Example 5 17     Example 5 16 Generating list of LDAP accounts registered in OpenLDAP Directory      ldapsearch  LL  H ldap   localhost 389  x  b  ou Users dc itso dc storage dc ibm dc com  D  uid itso ou Users dc itso dc storage dc ibm dc com  w PasswOrd uid  grep  uid  uid  itso   uid  zejn   uid  almira   uid  xivtestuser    Example 5 17 Generating list of LDAP accounts registered in OpenLDAP Directo
17.     just in time    and    as needed     basis by defining a logical  or soft  capacity that is larger than the physical  or hard  capacity   Thin provisioning enables XIV Storage System administrators to manage capacity based on  the total soace consumed rather than just the space allocated     Thin provisioning can be specified at the storage pool level  Each thin provisioned pool has its  own hard capacity  which limits the actual disk space that can be consumed  and soft  capacity  which limits the total logical size of volumes defined   The difference in the pool size  depends on the type of pool     Chapter 4  IBM XIV Storage Management software 141     gt  Hard pool size  The hard pool size represents the physical storage capacity allocated to  volumes and snapshots in the storage pool  The hard size of the storage pool limits the  total of the hard volume sizes of all volumes in the storage pool and the total of all storage  consumed by snapshots      gt  Soft pool size  This size is the limit on the total soft sizes of all the volumes in the storage  pool  The soft pool size has no effect on snapshots     For more information about the concept of thin provisioning and a description of hard and soft  size for storage pools and volumes  see 2 7     Capacity allocation and thin provisioning    on  page 37  and the Redpaper publication titled  BM XIV Storage System Thin Provisioning and  Space Reclamation  REDP 5001     When using the XIV Storage Management GUI  you spec
18.     on page 237     The default admin user comes with the storage administrator  storageadmin  role  The   XIV Storage System offers role based user access management that consists of the already  mentioned storage administrator  application administrator  security administrator  and  read only role     The direct mode access is allowed for stand alone instances of the GUI on users   workstations  and desktops  as well as the demo mode     For more information about user security and roles  and how to manage multiple storage  systems  see Chapter 5     Security    on page 207     Tip  The Demo Mode option  which is seen in Figure 4 7  is accessed by selecting the  Demo Mode check box and clicking Login  No credentials are required  This demo mode  is useful for learning how the XIV Storage Management software works without needing an  actual XIV system     118 IBM XIV Storage System Architecture and Implementation    Note  If the GUI is configured to connect to an IBM Hyper Scale Manager  the login dialog  window shows an additional Mode drop down field  The following drop down options are  available      gt  Direct  for direct mode connection   gt  Manager  for connecting via an IBM Hyper Scale Manager   gt  Demo  for running the GUI in demonstration mode    For more information about using Manager mode  see the IBM Redpaper titled  IBM Hyper Scale in XIV Storage  REDP 5053     Connecting to an XIV Storage System  To connect to an XIV Storage System  initially add the system
19.    2013 09 24 13 30 25 INFO Exit discover _device by configuration      As you add additional devices  the total time to complete a scan increases because the scans  are performed serially  Allow a significant buffer of time between the completion of one scan  and the start of the next scan     7 9 5 Monitoring your XIV Storage System with SCOM    The IBM Storage Management Pack monitors each XIV Storage System for what it classifies  as events and alerts  These items are updated every 600 seconds  In addition  various  components of each XIV Storage System are monitored  and the status is updated every 300  seconds  Components can be in one of three states      gt  Healthy   gt  Warning   gt  Error    Chapter 7  Monitoring 419    420    Alerts    Alerts are events that need to be investigated  They indicate that an application or device  needs attention  They can be thought of as a to do list for an administrator  Alerts are  generated in two ways      gt  By monitoring the event logs of each managed device      gt  By monitoring the health state of each component  For example  if the XIV Storage  System marks a module or disk as Failed  SCOM raises a Critical alert  If a component  changes from Failed to Ready  SCOM raises a Warning alert  Examples of alert monitors  include Disk Monitor  Module Monitor  and XIV System Monitor     Tip  If a component fails and is then repaired  for example  when a disk fails and is then  replaced with a new disk   the resolution state of th
20.    96  Incoming traffic to Domains  o  33 ITSO_pc1_io5000_300MB IOPS Limit 4 998  833X6 Bandwidth Limit 1 800         Figure 4 110 A domain successfully associated with a new performance class    4 8 4 Domains and LDAP authentication    As mentioned in 1 6     XIV Storage System Software    on page 9  the XIV Storage System  supports the use of LDAP for user authentication to the system  For more information about  configuring the XIV Storage System for LDAP authentication see 5 7     LDAP based  authentication    on page 244  The use of LDAP authentication along with the new  multitenancy feature introduced in Version 11 5 is supported     With LDAP authentication enabled  it is simple to configure LDAP for use in authentication of  users to XIV domains  Figure 4 111 shows the Role Mapping tab of the LDAP parameters  window of an XIV Storage System  Notice the value of the highlighted section of the Storage  Admin Role parameter  In our example  the highlighted value is XIV _PFE2 Admins        LDAP  General User Name Attribute   sAMAccountName   User name to login to the XIV   LDAP Servers User ID Attribute     ObjectSiD  User description in XIV event log   User Credentials XIV Group Attribute     memberOf   LOA atiribute describing a group name   Role Mapping    Storage Admin Role    CN XIV_PFE2_admins CN Users DC pfe    Storage Admin LDAP group name    Secure LDAP    Read Only Role     CN XIV_RO CN Users DC pfe DC ibm  Read Only LOAP group name    Parameters       om      
21.    NY   g        a   NA p    LDAP administrator          Figure 5 81 LDAP single sign on    282 IBM XIV Storage System Architecture and Implementation    Important  To allow single sign on in LDAP authentication mode  all XIV systems must be  configured to use the same set of LDAP configuration parameters for role mapping  If role  mapping is set up differently on any two XIV systems  it is possible that a user can log in to  one but not the other system     5 10 Securing LDAP communication with Secure Sockets Layer    In any authentication scenario  information is exchanged between the LDAP server and   XIV Storage System where access is being sought  Secure Sockets Layer  SSL  can be used  to implement secure communications between the LDAP client and server  LDAP over SSL   LDAPS   the secure version of the LDAP protocol  allows secure communications between  the XIV Storage System and LDAP server with encrypted SSL connections  This protocol  allows a setup where user passwords never appear on the wire in clear text     SSL provides methods for establishing identity using X 509 certificates and ensuring  message privacy and integrity using encryption  To create an SSL connection  the LDAP  server must have a digital certificate signed by a trusted certificate authority  CA   Companies  have the choice of using a trusted CA from another vendor or creating their own certificate  authority  In this scenario  the itso storage iom com CA is used for demonstration purposes     
22.    add command  there might be a delay  before the XIV Storage System is displayed in any of the views     Changing the default discovery intervals  To change the default discovery intervals  complete the following steps     1  In the left pane of the Operations console  click Authoring     gt  Management Pack  Objects     Object Discoveries     2  Click XIV Configuration Discovery  right click  and click Overrides     Override the  Object Discovery     For all objects of class  Windows Computer     Object Discoveries  2     Management pack objects are now scoped to  xiv device Configuration  xiv Monitor Computer Change Scope    x    Mame Target Management Pack Enabled by  4 Discovered Type  XM device Configuration  1                 li Aly Configuration Discowery          AIM Monitor Computer IBM Storage  xiu Yes  ee ee rp erties E  4 Discovered Type  Xf Monitor f  Enable  cpg Monitor Computer Discower Windows Computer IBM Storage  xi Yes                                  HH Overrides  gt   Disable the Object Discove    Figure 7 97 SCOM Object Discovery settings    3  From the Override Properties window  select the Override check box in the Frequency in  seconds row  You can now change the Override Value in seconds from 14400 to a  different value  After having selected the Default Management Pack as destination  Management Pack  you can click OK to apply the change     Selecting a shorter monitoring interval   At first glance  a monitoring interval of 10 minutes appears to b
23.    gt  The main cache handles host write I Os and then destages them directly to the disk drive      gt  The extended cache handles the caching of random read miss operations less than 64 KB   Sequential read prefetches  larger than 64 KB  are handled in main dynamic random  access memory  DRAM  cache     Flash caching  For more details about flash caching  see the Redpaper publication   Solid State Drive Caching Implementation in the IBM XIV Storage System  REDP 4842     A flash cache map is built as read misses occur in the DRAM cache  The process  known as  flash cache learning  is depicted in Figure 2 9 on page 45     44 IBM XIV Storage System Architecture and Implementation       lf Read data  lt  64KB and Read Miss          Operation  Host requests random are Main Cache  DRAM   data and it is notin DRAM          T  Checks for hit on extended cache  Flash  6  6    j    2  If hit  data is moved from flash to DRAM           Else forwards the read request unmodified   aoe g pie n Sin  eee a cache for hit hit granularity        Disk drives send data to DRA host and writes    5  Into a 512KB buffer page 512KB buffers No Yes         When buffer is filled up  it is sequentially lari  destaged to the flash cache   og structured  siian          E     Extended Cache   Flash        Sequential   O detection bypasses flash      Sequential prefetch routed directly to disk      Sequential pre fetch is fast and thus no need  togo thru flash cache      Large block   lt  64 KB  reads are 
24.    s deletion priority    gt  Duplicating a snapshot or a snapshot  advanced      gt  Restoring from a snapshot    Creating volumes    When you create a volume in a traditional or regular storage pool  the entire volume storage  Capacity is reserved  static allocation   You cannot define more space for volumes in a regular  storage pool than the actual hard capacity of the pool  which guarantees the functions and  integrity of the volume     When you create a volume in a thin provisioned pool  the capacity of the volume is not  reserved immediately to the volumes  However  a basic 17 1 GB piece  which is taken out of  the storage pool hard capacity  is allocated at the first I O operation  In a thin provisioned  pool  you are able to define more space for volumes than the actual hard capacity of the pool   up to the soft size of the pool     The volume size is the actual    net    storage space  as seen by the host applications  not  including any mirroring or other data protection impact  The free space consumed by the  volume is the smallest multiple of 17 GB that is greater than the specified size  For example  if  we request an 18 GB volume to be created  the system rounds this volume size to 34 GB  For  a 16 GB volume size request  it is rounded to 17 GB     Figure 4 53 on page 157 gives you various basic examples of volume definition and planning  in a thinly provisioned pool     IBM XIV Storage System Architecture and Implementation    Pool Soft Size 51 GB Pool Soft Si
25.   0 0 0 0 cee eee eens 70  3 1 5 XIV Cloud Storage for Service Providers             0 0c cece eee eee 72  3 1 6 XIV Storage System Model 114 and Model 214 hardware components         73  lial ACK etn Gayest E aed een ea oh eis me he Oe DAA EOE A eee eke oe ee eS 74  3 1 8  POWEF COMPONEM Gi    c lt  oe eee ee ee wade eee eed bh Raia Gece cote he 77  3 1 9 Data modules and interface modules             0    00 ccc eee 82  31210 IMTeMaGeMOGUICS   2 2634 ae ak o e atte dnt ee aie be Kees ea aah ee ae anes 87  3 1 11 InfiniBand module interconnect            0 000  ee 91  Se ele FPaCA panele nsee asie io cheat te a we ce ane Hee   Geta wee ee eee ess 92  321313  Hardware SUPPO 2 22 6 24 deh teed ddan Saes Saude dt ee deus asaes faded 93   3 2 Hardware planning OvervieW     2    0  ee eee ees 94  3 2 1 Basic configuration planning            0    ce eee ee eee 94  3 2 2 IPv6 addressing and planning            0 000 cee ee eens 102  3 2 3 Management connectivity          naaa aaaea ee eee nes 104  3 2 4 IBM XIV Storage System physical installation               20 0000 c eee 105  3 2 5 System power on and power off            0 0 ee ees 106   Chapter 4  IBM XIV Storage Management software                     000005 111   4 1 XIV Storage Management software introduction               0 000 eee eee 112  4 1 1 XIV Storage Management software platforms             0 000 eee eee 112  4 1 2 XIV Storage Management software interfaces             0 000 eee eee 113   4 2 XIV Storage Manage
26.   0 0 ce ee 447  Windows Server SSL configuration         0 0   000 eee ee 447  Oracle Java Directory SSL configuration         0 0 0 0  cc eee 454  Certificate authority setup     2    ee eect eens 460  Related publications           0    0    ccc ee eee ees 465  IBM Redbooks publications          0 0 00  ee eens 465  Oer DUDNCAIONS sone vs  homes areas be cde oe ek ed we wie aoe we ke ed oS 465  ONIME HESOUICES sa mge land kee R shore lee aed MES OE eR E Re Ee 465  How to get IBM Redbooks publications              0 0000 ee 466  Helo FOmMmIBM  biss knoe  dot A  eae Gara e aioe ME oats 2 Oe  amp  Sele wes Bale Ane ewe BOE 466    Contents vii    viii IBM XIV Storage System Architecture and Implementation    Notices    This information was developed for products and services offered in the U S A     IBM may not offer the products  services  or features discussed in this document in other countries  Consult  your local IBM representative for information on the products and services currently available in your area  Any  reference to an IBM product  program  or service is not intended to state or imply that only that IBM product   program  or service may be used  Any functionally equivalent product  program  or service that does not  infringe any IBM intellectual property right may be used instead  However  it is the user s responsibility to  evaluate and verify the operation of any non IBM product  program  or service     IBM may have patents or pending patent applications cove
27.   12307    25 000   i    Hit IOPS  36827       20 000      ate  a    E  zg  T    15 000      10 000                     17 00 17 10 17 20 17 30 17 40 17 50 18 00 1810 18 20 18 30 18 40 18 50 19 00 19 10 19 20 19 30 19 40 19 50 20 00 20 10  16 Feb 2012            Interfaces    9  Read  Volumes  Hosts    T   x  Osse  ors  o  we y  e    0 8  KB      gt 512 KB      Latency   Day Month     4   J 8 64  KB     All    BW O Ha Custom           Figure 4 121 Performance Statistics  Mem Hit and SSD Hit    For a description of flash cache performance  see Chapter 6     Performance    on page 287   and Solid State Drive Caching in the IBM XIV Storage System  REDP 4842     4 9 2 Managing flash cache with XIV Command Line Interface    New commands are included in the XCLI that matches the possible actions that were  previously illustrated for the GUI     A useful command is help search ssd  which displays a list of all commands related to  SSDs  This command is illustrated in Example 4 22     Example 4 22 List of commands related to SSDs  XIV 1310039 Coruscant gt  gt help search ssd    Category Name Description   system ssd_caching_disable Disables Flash Caching   system ssd_caching_enable Enables SSD Caching   system ssd_list Lists SSDs used as flash cache in the  system    system vol_default_ssd_caching_get Gets the Default State of the SSD Caching   system vol _default_ssd_caching_set Sets a Default State for SSD Caching   system vol ssd_caching_set Overrides the Default SSD Caching State
28.   24 000  22 000  20 000    LTA    6 000  4 000  2 000   0       ts    12 30 12 45 13 00 13 15 13 30 13 45 1400  1405 140 146500  15 00 1515 15 30 15 45 16 00 16 15 16 30  16 Sep 2011               ja    Figure 6 11 Multiple filter selection         Interfaces     Read  C  Hit  O  Mem Hit   048 KB     64 512  KB   9  OPS  Volumes res     a   ner  Hosts La  Write  _  Miss i SSD Hit  _   664  KB   _   gt 512  KB   _  Latency    ma ee 7 ay E rmh    I   B Te ore 4 A  i      Ba A Loeb  O MENNO i  a hh E i k ANO ida Dyw          es i       One of the most meaningful performance metrics is latency  which is measured in  milliseconds  Figure 6 12 on page 307 shows the read and write latency for the entire XIV  system     IBM XIV Storage System Architecture and Implementation       eee TT aoa ssSsSsSsSsSsSsSsSsSsSsSsSsSsSsSsSsSsSsSBSBSBSBSBSBSBSBSBSBSBBD    SDW   SCSCTTTTTTT        xiv XIV Storage Management maX  Systems   Actions   View   Tools   Hep     9  amp  admin  A AillSystems  4   gt  v Statistics v   System Time  9 16PM Q          Latency  ms        16                   aye  a  S    E  29  a                        14 00 16 00 18 00 20 00 22 00             ATSXIV 1310115    Figure 6 12 Latency          Latency  and all the other metrics  for that matter  can also be shown for individual or multiple  Fibre Channel or iSCSI interfaces  volumes  or hosts  For more information about latency   see    Performance analysis    on page 321     Another popular view of performance is the
29.   2810 1300209 IBM   bfs_target RAID 10 Unknown ok   96 00 GB  E Disk Manager  a   XIV 2810 13002031BM   bts_thin RAID 10  Unknown  ok   1 93 TB     Storage Subsystems  ql  xI    2810 1300203BM  ESX_pool RAID 10  Unknown  ok   3 64 TB  Storage Optimizer ml xIv 2810 1300209 IBM_ jITSO_SYC RAID 10 Unknown lok   7 83 TB  SAN Planner  ql  XI    2810 13002091BM  ITSO_test RAID 10  Unknown  ok   64 00 GB  H Monitoring  A   xI   2810 1300209 1BM  mirror_pool RAID 10  Unknown  ok   288 00 GB  H harii l fq  Xv 2810 130020918M WindowsThinPool RAID 10 Unknown    ok   138 TB  is Hootie  Ql  XIV 2810 1300209BM  xivaix01_pool RAID 10 Unknown    ok   9 191B     Groups Al  XI    2810 13007741BM   cetl0002 RAID 10  Unknown  ok   384 00 GB  Storage Subsystems   l Rv 2er0 Ta007741EM TS0_ESX  RADIO  Urkon k   34 0068   Disks  Q   XIV 2810 13007744BM   ITSO_Windows  RAID 10  Unknown  ok   9 22 TB     Volumes  ql  XI   2810 13007741BM  OSL_POOL_O  RAID10  Unknown fk 15 47 TB      Storage Pools  A   XIv 2810 130077448M  OSL_POOL_THIN RAID 10  Unknown     30 94 TB  al  00 test_pool RAID 10  Unknown To   70 95 TB   ogee a    Subsystem G     Gl  xIV 2810MNODOHBM  test_poo RAID 10  Unknown lok   14 7518  PAN Al  XIV 2810 MNOO035 1BM   test_pool RAID 10 Unknown    ok   71 67 TB        Disk    Figure 7 81 XIV Storage System storage pools as seen by Tivoli Storage Productivity Center    Volumes    A Volume Real Space column was added to report on the hard capacity of a volume  The  pre existing Volume Spa
30.   45 2an  sqr 63 8 TB Pools allocated 147 7 TB Soft  1 TB Hard  T   PR  LE Ba Test1_Domain eee 0  2   0 GB Pools allocated 1 TB Soft  Ss 1 TB Hard    a    E Ba Test2_Domain   0  2     0 GB Pools allocated 1 TB Soft       Figure 4 79 Creating a domain using the Create Domain label in the menu bar    Note  As shown in Figure 4 78 on page 177 and Figure 4 79  you have the option to  associate existing pools to a domain when creating it  If you choose not to associate  any existing pools to the domain upon creation  you can still associate existing pools to  that domain at a later time     Important  Only a global storage administrator  as defined in    Domain creation    on  page 31  can create a domain and have the option to associate existing storage pools  with a domain     178 IBM XIV Storage System Architecture and Implementation    2  If you chose Create Domain in step 1 on page 177  you will see the Create Domain  screen as shown in Figure 3Figure 4 80  The screen loads on the Capacity tab by dedault     Create Domain  Capacity    Properties    Select System     _XIV_02_1310114     Total Capacity  161 326 GB                                 as S  System Allocated j ki System  Pools  amp  Domains 47  Ji    Free  50       75 888 GB     81 341 E      m    Domain Hard Size  1032 GB    Domain Soft Size  4096 GB  Remaining Soft Capacity  55 437 GB    Domain Name    ITSO_Domain       p p    Figure 4 80 The Capacity tab of the Create Domain window in the XIV GUI    3  On the Capac
31.   6 9 10 11 12 13 14 15  Memory  24 GB per module w 1 2 3 TB  144 GB 216 GB 240 GB 264 GB 288 GB 312 GB 336 GB 360 GB  Memory  48 GB per module w 4 6 TB  288 GB 432 GB 480 GB 528 GB 576 GB 624 GB 672 GB 720 GB   Optional for 1  2  3  4  6 TB XIVs  400 GB Flash 2 4 TB 3 6 TB 4 0 TB 4 4 TB 4 8 TB 5 2 TB 5 6 TB 6 0 TB  Cache   Optional for 4  6 TB XIVs  800 GB Flash Cache 4 8 TB 7 2 TB 8 0 TB 8 8 TB 9 2 TB 10 4 TB 11 2 TB 12 0 TB  Power  kVA    Model 281x 214   with SSD 2 5  2 6 3 6 3 9 4 0 4 3 4 3 4 6 4 7  5 09 5 0 5 4 5 5 5 8 5 8 6 2       Figure 3 2 Partial configurations Gen3   Model 214    Chapter 3  IBM XIV architecture  components  and planning 65    For more information about usable capacity  see 2 3     Full storage virtualization    on page 24     3 1 3 Capacity on Demand    XIV Storage System Gen3 has an optional pricing model that allows clients to purchase data  storage Capacity as it is needed  This feature is called Capacity on Demand  CoD      Restriction  Capacity on Demand is not available for the 1 TB drive option     CoD means that an XIV Storage System Gens can be ordered with a certain amount of  authorized storage capacity  as well as extra storage capacity that is not intended to be used  initially and will be purchased later as this additional storage is allocated to XIV Storage  System storage pools     IBM is alerted that this storage is being used and an invoice is generated to authorize the use  of this additional storage  This situation is referred 
32.   Command executed successfully   default enabled    XIV 1310039 Coruscant gt  gt vol default ssd caching get  Command executed successfully   default disabled    If the default status is enabled  flash cache is enabled on all volumes in the system unless the  status is manually changed  Otherwise  if default status is disabled  flash cache is disabled for  all volumes in the system     Tip  With the flash cache state enabled  you can explicitly disable any volume that you do  not want to include in the extended caching     If you want to change the flash cache state globally for the system  you can issue one of the  following commands     vol _ default _ssd_ caching set default enabled  set the SSD Caching enabled    vol default _ssd caching set default disabled  set the SSD Caching disabled    Chapter 4  IBM XIV Storage Management software 205    Volume level flash cache   Use the vol_ssd_caching set command to set the flash cache status for a specific volume   and eventually override the system default setting  You must specify the vol and state  parameters when you issue the command  as illustrated in Example 4 25     Example 4 25 SSD Caching set for a volume    XIV 1310039 Coruscant gt  gt vol_ssd caching set vol Res Fra Vol 01 state enabled  Command executed successfully     XIV 1310039 Coruscant gt  gt vol_ssd caching set vol Res Fra Vol 01 state disabled  Command executed successfully     You can also use the vol_1ist command with the  x flag and the vol parameter to 
33.   Eas Sa    Figure 5 76 Enter new user group name and role for LDAP role mapping       The Full Access flag has the same significance as in native authentication mode  If a user  group has the Full Access flag turned on  all members of that group have unrestricted  access to all snapshots on the system     At this stage  the user group itso _app01_group is still empty     4  Next  add a host to the user group by right clicking the name of the user group that you  have created to open a menu and select Update Access Control  as shown  in Figure 5 77       Category           Ungrouped    Tem  itso_app01_group            Edit  Delete    Update Access Control    View Accesible Volumes  Properties    Sort By          Figure 5 77 Updating access control for a user group    272 IBM XIV Storage System Architecture and Implementation    The User Group Access Control window that is shown in Figure 5 78 opens  The window  contains the names of all the hosts and clusters defined on the XIV Storage System        User Group Access Control    Access Control for itso_app01_group    Unauthorized Hosts   Clusters Authorized Hosts   Clusters    PFE_XYRA_02 vShpere1 ISCSI  sven_thinkpad  M3655 _XIVPFE              lt    lt  lt     Figure 5 78 Access Control Definitions window    The left pane shows the list of unauthorized hosts and clusters for this particular user  group  and the right pane shows the list of hosts that have already been associated with  the user group     5  Add or remove host
34.   Enter the attribute values  The first field  Naming Attribute  must remain uid  XIV Storage  System uses that attribute name for account identification  We populate the mandatory   attributes with values  You can also choose to populate other optional attributes and store  their values in the LDAP repository  but XIV Storage System does not use those attributes     See Figure B 7 on page 442     Appendix B  Additional LDAP information    441    442    Required Attributes    Allowed Attributes    First Name  givenname    User ID  uid     Password  userPassword     Confirm Password    E mail  mail      Telephone Number   telephoneNumber      Fax Humber    Locality  1     Organization  oa    Organizational Unit  ou    audio   businessCategory   carLicen se    departmentN umber   description     destination indicator        Step 4 Configure Attributes    Enter the attribute values for the new entry  For multi valued attributes  press the Enter key in  the field to make the field taller and enter values on separate lines     Naming Attribute    User ID tuid        Full Name  cn     xivtestuser2    Last Name  sn     xivtestuser      facsimileTelephoneN umber          eee   xivtestuser2  OOOO             Storage Administrator    muula          Figure B 7 Entering object attribute values    IBM XIV Storage System Architecture and Implementation    5  A Summary window  Figure B 8  shows what you have selected and entered in the  previous steps  You can go back and change parameters 
35.   Flash Copy None    Attributes  Surfaced    Figure 7 83 Volume properties shown in the Tivoli Storage Productivity Center GUI          Because of the nature of the XIV Storage System architecture and the fact that each volume  is on all disks  various reports in the Tivoli Storage Productivity Center GUI do not necessarily  provide meaningful information for IBM XIV systems  Correlation of disks and volumes  for  example  under the Data Manager     Reporting     Asset     By Storage Subsystem     gt   Select a Storage Subsystem     Disks branch  is not possible  Tivoli Storage Productivity  Center does not report any volumes under the branch of a particular disk     Also  because the XIV Storage System storage pools are used to group volumes but not  disks  no disks are reported for a particular storage pool under that same reporting branch     Finally  the following reports do not contain any information for XIV Storage System  subsystems      gt  Disk Manager     Reporting     Storage Subsystems     Computer Views     gt   By Computer  Relate Computers to Disks      gt  Disk Manager     Reporting     Storage Subsystems     Computer Views     gt   By Computer Group  Relate Computers to Disks      gt  Disk Manager     Reporting     Storage Subsystems     Computer Views     gt   By Filesystem Logical Volume  Relate Filesystems Logical Volumes to Disks      gt  Disk Manager     Reporting     Storage Subsystems     Computer Views     gt   By Filesystem Group  Relate Filesystems
36.   InfiniBand    Redundant  power supplies    CPU        f              lt   j H     7   mie    7 Per tt  P Us rl Ta an    7 Pa   8     i  i   ai  m 2z    i    var Fa      T   ry i z    mn a aid ma ut i    P  e  H  gt e t t        i NZ t ha    LSA     a EA  lt    O I hab hah had   a SS eS     e ewe           Figure 3 17 Data module    Both the data and interface modules on XIV Gen3 contain the following hardware features      gt     82    System board with a PCle 2 0 bus  with the following management ports  Figure 3 18 on  page 83          RS 232 serial port       USB port  one used  three unused       Two Gb Ethernet ports   Quad core or six core processor  Memory   SAS host bus adapter  HBA    SAS disk drives   InfiniBand host channel adapter   SSD slot  see Figure 3 18 on page 83   Fan bank   Memory flash card  see Figure 3 18 on page 83   Redundant power supplies    Enclosure management card    IBM XIV Storage System Architecture and Implementation    Figure 3 18 shows the rear of the data module with its ports and connectors     XIV Gen3 Data Module              Memory Flash Card SSD Slot                  Ht Pt  ee  cos secccccsessceceseses  2  RREH  gt  sss   2020 a  5   oft 23e  seses    t220              Pa     naan            i     _   _eees    manng      eee ee   see    Y hohe en ee         9    Peete ee       eeererre Frere wi  i               Management   Independent Power USB RS 232 Serial   Supply modules 2 x GigE NIC    InfiniBand Ports          Figure 3 18 XIV
37.   Retype New Password  F eecscees   Category  Read Only      User Group  None    Email Address     Phone Number              Figure 7 65 User creation    390 IBM XIV Storage System Architecture and Implementation    XIV Storage System management IP addresses    To add an XIV Storage System into Tivoli Storage Productivity Center  you must know the  management IP addresses of the XIV Storage System modules 4  5  and 6  Figure 7 66  shows how to view the management IP addresses  Right click a particular XIV Storage  System in the All Systems view from the XIV Storage Management GUI and select Modify IP  Addresses     Edit System XIMV_02_1310114    System Name  RIV_02_ 1310114  IP Host name 1      9 155 53 250  IP Host name    9 155 53 251  IP Host name 3  9155 53 25     Connect Directly     SESE    Figure 7 66 Showing the management IP addresses          Discovery phase    To add the XIV Storage System to Tivoli Storage Productivity Center  start the Configure  Devices wizard  Click IBM Tivoli Storage Productivity Center     Configure Devices  as  shown in Figure 7 67  Proceed with the steps to add  discover  and probe an XIV Storage  System in Tivoli Storage Productivity Center     Avigation Tree     Administrative Services l Select Device Type  E Services   Solet Deita Vial The wizard adds and configures devices that can be administered an  H Data Server Select Device Productivity Center   H Device Server Data Collection   Replication Server Sue Select the type of devices to 
38.   SC27 5412     Additional documentation is available from the XIV Storage System Information Center at     http   publib boulder ibm com infocenter ibmxiv r2 index jsp    You must provide the IBM SSR with the information required to attach the system to your  network for operations and management  and enable remote connectivity for IBM support  and maintenance     94 IBM XIV Storage System Architecture and Implementation    Enter all of the following required information in each worksheet to prevent further inquiry and  delays during the installation  see 3 2 4     IBM XIV Storage System physical installation    on  page 105       gt  Interface module     Interface modules  4  5  and 6  need an IP address  netmask  and gateway  This address  is necessary to manage and monitor the XIV Storage System by using either the XIV  Storage Management GUI or the XCLI  Each interface module needs a separate IP  address in case a module is failing      gt  Domain name server     If Domain Name System  DNS  is used in your environment  the XIV Storage System  must have the IP address  netmask  and gateway from the primary DNS server and  if  available  the secondary server      gt  Simple Mail Transfer Protocol gateway     The Simple Mail Transfer Protocol  SMTP  gateway is needed for event notification  through email  The XIV Storage System can initiate an email notification  which is sent out  through the configured SMTP gateway  IP address or server name  netmask  and  gateway       g
39.   Sockets Layer  SSL   including Windows Server SSL configuration and Oracle Java  Directory SSL configuration     gt  Certificate authority setup       Copyright IBM Corp  2014  All rights reserved  431    Creating user accounts in Microsoft Active Directory    432    Creating an account in Microsoft Active Directory for use by XIV Storage System LDAP  authentication is similar to creating a regular user account  The only exception is the  designated    description    attribute  field   This field must be populated with the predefined  value for the authentication process to work     Complete the following steps     1  Start Active Directory Users and Computer by clicking Start     Administrative Tools  gt   Active Directory Users and Computers     2  Right click the Users container and click New     User  The New Object   User window  opens  Figure B 1         New Object   User x        Create in   sivhost  ldap  storage  tucson  ibm  com sers    First name    Initials     Last name     Full name  Jrivtestuser    User logon name     Jrivtestuser viyvhost  ldap  storage  tucson  iii    User logon name  pre Windowe 2000       xIvHOST1 LOAP   Jrivtestuser          Back  Cancel         Figure B 1 Creating an Active Directory user account    The value entered in    Full name    is what the XIV Storage System uses as the user name   The only other mandatory field in this form is    User logon name     The same xivtestuserl  value is entered into both fields  The other fields can 
40.   The first item to note is that the current IOPS for the system is always displayed in the bottom  center of the window  This feature provides simple access to the current load on the system   Figure 6 8 illustrates the XIV Storage Management GUI and the IOPS display  It also shows   how to start the statistics monitor        xiv XIV Storage Management Joes  Systems   Actions   View   Tools   Help    O     Settings Launch XCLI  J Launch xIVTop  amp  itso  All Systems  2   gt    A   System   System Time  9 35 AM Q       XIV_02_1310114    Figure 6 8 Starting the statistics monitor on the GUI             IBM XIV Storage System Architecture and Implementation    Select Statistics from the Monitor menu  as shown in Figure 6 8 on page 304  to open the  monitor default window that is shown in Figure 6 9  Figure 6 9 shows the system IOPS     Systems   Actions   View   Tools   Help   A    amp     A All Systems  3   gt  v Statistics v   System Time  11 31 AM Q       All Interfaces          10 55 11 00 11 05 11 10 11 15 11 20 11 25  March 8  2013    XIV 7826153    Figure 6 9 Default statistics monitor view       In Figure 6 9  the X axis of the graph represents the time and can vary from minutes to  months  The Y axis of the graph is the measurement that is selected  The default  measurement is IOPS     The statistics monitor can also illustrate latency and bandwidth in the same graph or in the  multigraph view     The other options in the statistics monitor act as filters for separati
41.   This situation can be resolved if individual volumes are selectively  resized or deleted or moved to another storage pool to reduce the soft space used     System level thin provisioning   The definitions of hard size and soft size apply at the subsystem level because it is necessary  to allow the full system to be defined in terms of thin provisioning to achieve the full potential  benefit previously described  The ability to defer deployment of additional capacity on an  as needed basis     The XIV Storage System architecture allows you to define a global system capacity in terms  of both a hard system size and a soft system size  When thin provisioning is not activated at the  system level  these two sizes are equal to the system   s physical capacity     Chapter 2  IBM XIV Storage System logical architecture and concepts 41    Hard system size    The hard system size represents the physical disk capacity that is available within the   XIV Storage System  Obviously  the system   s hard capacity is the upper limit of the aggregate  hard capacity of all the volumes and snapshots and can be increased only by installing new  hardware components in the form of individual modules  and associated disks  or groups of  modules     There are conditions that can temporarily reduce the system   s hard limit  For more  information  see 2 10 2     Preserving data redundancy  Rebuilding and redistributing    on  page 51     Soft system size    The soft system size is the total     glob
42.   Upon startup  the system verifies that the battery charge levels in all UPS units exceed the  threshold necessary to guarantee that a graceful shutdown can occur twice  If the charge  level is inadequate  the system halts the startup process until the charge level reaches the  minimum required threshold     Important  If there is a complete power loss in the data center  the XIV automatically  powers up when power is reapplied  If this is not the behavior you want  contact IBM  technical support to learn how to disable this feature     2 10 2 Preserving data redundancy  Rebuilding and redistributing    As described in    Data distribution algorithms    on page 23  the XIV Storage System  dynamically maintains the pseudo random distribution of data across all modules and disks  while ensuring that two copies of data exist at all times when the system reports Full  Redundancy  When there is a change to the hardware configuration as a result of adding new  hardware or a failed component  data must be rebuilt if necessary and redistributed to the  new pseudo random distribution  Either way  the XIV Storage System data redundancy  mechanisms must accommodate the change     These redundancy mechanisms are sometimes referred to as autonomic because these  procedures are self managing  They happen without any storage administrator intervention     When a disk drive or a module is replaced during normal maintenance  or additional data  storage capacity is added to an existing XIV Sy
43.   XIV has exceptionally  aggressive read data prestaging algorithms to get this read data into the huge XIV System  cache  And XIV has a fixed number of spinning disks  But all these factors are fixed  When  you see variations in the read hit percentage in the XIV statistics GUI  it is the application  that is causing these variations     Read response times are highly dependent upon the size of the average read I O  operation  Very large read I Os take longer for disk storage systems to process  For  transaction workloads with read I O sizes of 32 KB or less  it is common to observe read  response times in the low double digit millisecond range  Again  the best way to evaluate  read response times is to compare them to the read response times recorded during good  performance periods     Interface module balance    Another important thing to check when evaluating XIV performance is the balance of I O  across the different interface modules  This evaluation requires an understanding of the SAN  cabling and zoning  But if the preferred multipathing configuration described in 6 2 3      Multipathing considerations    on page 297 is followed  every host uses every interface  module equally  which can be seen in the XIV Storage Management GUI     IBM XIV Storage System Architecture and Implementation    In Figure 6 33  interface modules 4   8 all have basically the same I O characteristics  This  balance is typical and desirable  interface module 9 has no I O during most of this 
44.   aa       Figure 3 30 Six paths per LUN is the best overall multipathing configuration    The following information relates to Figure 3 31 on page 98      gt  Each host is equipped with dual HBAs  Each HBA  or HBA port  is connected to one of    two FC switches    gt  Each of the FC switches has    a connection to three separate interface modules     Chapter 3  IBM XIV architecture  components  and planning    97     gt  Each LUN has six paths     The second multipathing configuration that is shown in Figure 3 31 on page 98 is more  appropriate for benchmarking and higher performance host systems with the highest I O  requirements  The primary differentiator is the host   s ability to handle the higher number of  paths per LUN  Do not use the configuration in Figure 3 31 on page 98 for most production  applications  because the host multipathing provides enough reliability during path recovery  scenarios        IBM XIV Storage System             Figure 3 31 Multipathing configuration for larger hosts    The following information relates to the configuration that is shown in Figure 3 31      gt  Each host is equipped with dual HBAs  Each HBA  or HBA port  is connected to one of  two FC switches      gt  Each of the FC switches has a connection to a separate FC port of each of the six  interface modules      gt  Each LUN has 12 paths     Each host HBA is physically connected to all six of the XIV Storage System interface  modules  This configuration provides the ability for ea
45.   add destinations  and define rules for event notification     For more information about event notification rules  see    Setup notification and rules with the  GUI    on page 359     In addition to the standard system generated events  a storage administrator can generate a  custom_event with their own custom event description and wanted severity level using an  XCLI command  This command is useful when creating scripts to automate a process  You  can generate an informational event stating that a process has started or finished  as shown  in Example 7 1     Example 7 1 Using custom_event     gt  gt  custom_event description  User Initiated Backup Has Started  severity INFORMATIONAL    command 0   administrator   command   code    SUCCESS   status    0     status_str    Command completed successfully   aserver    DELIVERY SUCCESSFUL      gt  gt  event_list code CUSTOM EVENT  Timestamp Severity Code User Description    2010 10 13 14 15 48 Informational CUSTOM EVENT itso User Initiated Backup Has Started    Monitoring statistics    The statistics monitor provides information about the performance and workload of the  XIV Storage System     There is flexibility in how you can visualize the statistics  Options are selectable from a control  pane at the bottom of the window  as shown in Figure 7 17           Interfaces C  Read    Hit C  Mem Hit      0 8  KB   C   gt 64 512  KB        IOPS Pe s  Domains  amp  Vols ere AEE    EE         Hour   Haai   Write    Miss  _  SSD Hit    
46.   be registered  and be configured to use  the same DNS servers     5 8 1 Using the XIV Storage Management GUI LDAP wizard to configure LDAP    To configure LDAP by using the XIV Storage Management GUI LDAP wizard  complete the  following steps     1  Right click the Access icon and click Users  as shown in Figure 5 50                 Figure 5 50 Users    2  Click the LDAP Wizard icon on the toolbar  as shown in Figure 5 51                 a     Add User i Add User Group   Configure LDAP ai LDAP Wizard Export 4 ar    Users w j User  9              LDAP Wizard  2 32 PM  Figure 5 51 LDAP Wizard icon    The LDAP wizard opens the LDAP Configuration Welcome window  Click Next to start the  configuration     In the Server Type tab  as shown in Figure 5 52 on page 253  you can choose the Server  Type from the corresponding drop down menu  You can use either a Microsoft Active  Directory or an Oracle Directory Server     252 IBM XIV Storage System Architecture and Implementation    3  Click Next to choose Microsoft Active Directory  as we did in this example        LDAP Configuration   Directory Services Type    Directory Services Type    Welcome s Choose which Directory Services would you like to use for authentication     Server Type    LDAP Servers       XIV User               Unique ID s   Sene EE Microsoft Active Directory s  Groups     Sun Directory    Secure LDAP    Bind  amp  Cache    Test  amp  Activation     Finish          lt   iw    Figure 5 52 Server Type tab          4 
47.   because this action can result in the loss of data and system configuration information   Powering the system off must be done solely from either the XIV Storage Management  graphical user interface  GUI  or the XIV command line interface  XCLI      To monitor battery life  the UPS modules routinely run a self test every 14 days  with a 9 hour  interval between each UPS  To maximize battery life  a UPS battery calibration is performed  every 120 days  This calibration drains the batteries to about 20  and recharges them to  100   This routine operation causes UPS warning lights and audible alarms  The best way to  determine whether the UPS lights and alarms are a real problem is to check the event log     The routine calibration tests produce an event that looks similar to the event shown in  Figure 3 16     Event Properties    Severity  Informational   Date  2011 06 04 13 22 71   Index  3644   Event Code  UPS CALIBRATION STARTED    T  Shooting     Description  UPS manual calibration started for 1 UP5 1        Figure 3 16 UPS calibration    Chapter 3  IBM XIV architecture  components  and planning 81       3 1 9 Data modules and interface modules    The hardware of the interface modules and data modules in the XIV Gen3 is based on an  Intel server platform that is optimized for data storage services  A module is 87 9 mm   3 46 inches   2U  high  483 mm  19 inches  wide  and 707 mm  27 8 inches  deep     Figure 3 17 shows a representation of the inside of a data module      
48.   capability for encryption for data at rest  See the IBM Redpaper titled  BM XIV Security with  Data at Rest Encryption  REDP 5047     Model 114 and Model 214 common components  Model 114 and Model 214 share the components described in the sections that follow     System board    The XIV Storage System system board uses the PCle 2 0 bus  which is twice the speed of the  XIV Storage System Gen 2 PCle 1 0 bus and features more PCle lanes than its predecessor     The system board has one RS 232 serial port  one USB port  and two Ethernet ports  which  are used for internal XIV Storage System management  The monitor port and three USB  ports are unused     SAS host bus adapter    The SAS host bus adapter  SAS HBA  is the controller card for the SAS disk drives in each  module  This HBA uses eight lanes of the PCle 2 0 bandwidth to communicate with the  processor and cache complex  To communicate with the SAS drives  this HBA uses the SAS  2 0 standard  which is a performance improvement over its SAS 1 0 predecessor  This SAS  HBA also realizes processor efficiencies because it does not have to complete a SAS to  SATA conversion  SAS also outperforms SATA because unlike SATA  it features full duplex  communication with each disk     SAS disk drives    XIV Gen modules can be configured with 2 TB  3 TB  4 TB   or 6 TB SAS drives  Drive sizes  cannot be mixed within the same XIV Storage System  These drives use the SAS 2 0 protocol  and run at 7200 rpm  They incorporate SMART for en
49.   component_list filter NOTOK  Component ID Status Currently Functioning  1 Disk 7 12 Failed yes    In Example 7 9  the module_1list command shows details about the modules themselves  If   the module parameter is not provided  all the modules are displayed  In addition to the status  of the module  the output describes the number of disks  number of Fibre Channel  FC  ports   and number of IP network Small Computer System Interface  iSCSI  ports     Example 7 9 The module_list command     gt  gt  module_list module 1 Module 4    Component ID Status Currently Functioning Target Status Type Data Disks FC Ports  1 Module 4 OK yes g3 0 interface 12 4   iSCSI Ports Temperature   2 22    It is possible to use the  x XCLI parameter with commands to provide even more information  about a component  The  x parameter shows the output of a command in XML format  You  can see the additional information as displayed in Example 7 10     Example 7 10 Using  x parameter to show additional information in XML format     gt  gt  module_list module 1 Module 4  x   lt XCLIRETURN STATUS  SUCCESS  COMMAND LINE  module list module 1 Module 4  x  gt    lt QUTPUT gt    lt module id  5760a900003  gt    lt component_id value  1 Module 4   gt    lt status value  0K   gt    lt currently functioning value  yes   gt    lt requires service value     gt    lt service reason value     gt    lt target status value     gt    lt type value  g3 0_interface   gt    lt disk bay count value  12   gt    lt fc_port_co
50.   contains four 8 Gbps Fibre  Channel ports and one 4 port 1 GbE adapter  except interface module 4  which has  only two iSCSI ports      gt  Each interface module of the XIV Gen3 Model 214  10 GbE  contains four 8 Gbps Fibre  Channel ports and one 2 port 10 GbE adapter     64 IBM XIV Storage System Architecture and Implementation    3 1 2 Partially populated configurations    The XIV Storage System Gen3 is also available in partially populated configurations of 6  9   10  11  12  13  or 14 modules  allowing for more granularity of capacity options  Modules can  be added as capacity needs increase up to 15 modules     Different size drives cannot be intermixed within the same IBM XIV Storage System     The SSD Caching extension is also available with partially populated configurations  The  SSD extension is required for each module present in the partial configuration     In Figure 3 2  certain interface modules are labeled Disabled  This label means that the  interface module is not running the special software that characterizes an interface module  and the host interface adapters are not functional  They still function as data modules  As  modules are added to the XIV Storage System configurations  these interface modules  become Enabled from an interface perspective     Certain partial rack configurations do not use all host attachment interface ports even though  they might be physically present  The interface ports are activated automatically as more  modules are added 
51.   for a Volume    204 IBM XIV Storage System Architecture and Implementation       The ssd_caching disable and ssd_caching_enable commands  which are listed in  Example 4 22 on page 204  are restricted commands that can be used only with the IBM  technician   s authority  These commands are used by the IBM technician to bring SSDs online  when they are phased into the XIV system at installation time     Use the ssd_list command to get a list of SSDs that are used as flash cache in the system   The output is shown in Example 4 23     Example 4 23 List of SSDs    XIV 1310039 Coruscant gt  gt ssd_ list  Component ID Status Currently Functioning Capacity Target Status Vendor    Model Size Serial Firmware Fru Group Temperature  1 S D 321 OK yes 512GB XIV  MTFDDAA512MAR 1KAAB 488378 0200BB81 MA40 99Y0720 42  1 SSD 2 1 OK yes 512GB XIV  MTFDDAA512MAR 1KAAB 488378 0200BB78 MA40 99Y0720 40  1 SSD 6 1 OK yes 512GB XIV  MTFDDAA512MAR 1KAAB 488378 0200BB71 MA40 99Y0720 47  1 SSD 4 1 OK yes 512GB XIV  MTFDDAA512MAR 1KAAB 488378 O200BB95 MA40 99Y0720 47  13S SD21  1 OK yes 512GB XIV  MTFDDAA512MAR 1KAAB 488378 O200BB7A MA40 99Y0720 39  L lt SSDe521 OK yes 512GB XIV  MTFDDAA512MAR 1KAAB 488378 O200BB7D MA40 99Y0720 43    System level flash cache    The vol_default_ssd_ caching get command is used to check the default flash cache setting   enabled or disabled   as illustrated in Example 4 24     Example 4 24 Check SSD Caching state    XIV 1310039 Coruscant gt  gt vol default _ssd caching_get
52.   gt   Threshold   Command    custom event description  Vol     Volume     exceeded threshold  of     Threshold     GB  severity     Severity     CmdString   xclicmd   Command     WshShell   WScript CreateObject  WScript Shel1     oExec   WshShel  Exec   comspec   d q       oExec StdIn WriteLine  prompt        oExec StdIn WriteLine  cd        oExec StdIn WriteLine CmdString     oExec StdIn WriteLine  exit       while  oExec Status    0   WScript Sleep 100       WshShell LogEvent 0   XIV Vol Monitor Script Completed        lt  script gt    lt  job gt     The script in Example 7 47 on page 407 begins with defining variables that are used  throughout the process  It then builds an XCLI command that is based on these variables and  runs the command in a shell     The output from XCLI commands can be customized using the  t option to limit the display to  only the specific fields in which we are interested  In this case  we need only the used  capacity value of the volume  Therefore  the  t option is used to limit the output to only the  used capacity field  as shown in Example 7 48  This option makes the output of the XCLI  command easy to parse     Example 7 48 Limiting output of XCLI commands using the  t option    var Command    vol_list vol     Volume      t used capacity     You can get a complete list of the field options available for any command by using the XCLI  help option with the format full parameter  as shown in Example 7 49     Example 7 49 Using the XCLI helo com
53.   gt  gt  event_list max_events 5 before 2013 03 08 18 00 00    Timestamp Severity Code User Description   2013 03 08 16 23 09 Informational USER LOGIN HAS SUCCEEDED User  xiv_maintenance  from IP  2013 03 08 16 23 41 Informational TARGET CONNECTION ESTABLISHED Target named  XIV_04 1340008    2013 03 08 16 23 41 Informational TARGET CONNECTION ESTABLISHED Target named  XIV_04 1340008    2013 03 08 16 24 14 Warning USER_HAS_ FAILED _TO_RUN COMMAND User    xiv_administrator  from   2013 03 08 16 28 35 Informational USER LOGIN HAS SUCCEEDED User  xiv_development  from IP    The event list can also be filtered for severity  Example 7 16 shows all the events in the  system that contain a severity level of Major and all higher levels  such as Critical     Example 7 16 The event_list command filtered for severity     gt  gt  event_list min_severity Major max_events 5    Timestamp Severity Code User Description   2013 03 18 13 05 20 Major TARGET DISCONNECTED Target named  XIV_04 1340008  i  2013 03 18 13 05 43 Major TARGET LINK DOWN BEYOND THRESHOLD Target named  XIV_04 1340008   2013 03 19 14 27 22 Major TARGET DISCONNECTED Target named  XIV_04 1340008   2013 03 19 14 27 40 Major TARGET LINK DOWN BEYOND THRESHOLD Target named  XIV_04 1340008     Certain events generate an alert message and do not stop until the event has been cleared    These events are called alerting events and can be viewed by the XIV Storage Management  GUI or XCLI using a separate command  After the alerting ev
54.   gt 6 64 KB      gt 512  KB   _  Latency s   Targets a  ReW  3  HM 3  All Bw  O IE  Custom                   Figure 7 17 Filter pane for the statistics monitor    For information about performance monitoring  see Chapter 6     Performance    on page 287     QoS performance class    We previously introduced the quality of service  QoS  feature  QoS allows the XIV Storage  System to deliver multiple service levels to hosts connected to the same system  See details  in 4 7     QoS feature    on page 170 on how to set QoS  by defining performance classes in  terms of IOPS and bandwidth and then assigning specific hosts to a particular performance  class  Besides host based QoS the rate limiting can also be defined for pools and domains  starting with XIV Storage Software v11 5     Chapter 7  Monitoring 335    Monitoring UPS status with the XIV Storage Management GUI   The XIV Storage Management GUI can be used to confirm if all three uninterruptible power  supplies  UPSes  are currently operational  If you hover your cursor over a UPS  as shown in  Figure 7 18  a window opens and shows the health status of that UPS and the Automatic  Transfer Switch  ATS   The ATS generates system event messages if there are problems     UPS  2    Charge Level  100   Test  3 13 13   Passed  Input Power  Yes    Status  OK    NMC  OK    ATS  J1 J2  ATS Status  OK                Figure 7 18 Monitoring UPS status    Monitoring InfiniBand switches    The XIV Storage Management GUI can be used to conf
55.   mirroring between two IBM Storage systems and Microsoft failover clusters      gt  IBM XIV Provider for Windows Volume Shadow Copy Service  VSS     This integrates XIV Storage System snapshot capabilities with Microsoft Windows Volume  Shadow Copy Services   They link through the IBM Support Portal       gt  IBM Storage Management Pack for Microsoft Systems Center Operations Manager    The Storage Management Pack for Microsoft Systems Center Operations Manager   SCOM  is a set of software modules  or management packs  thatyou can use to access  and monitor IBM storage systemsby using the host based Microsoft SCOM interface      gt  Tivoli Storage Productivity Center Storage Resource agents  http   ibm co 10eRz8F    These agents perform the functions of Data agents and Fabric agents  They support XIV  Storage System provisioning  Data Path Explorer  and performance management reports     16 IBM XIV Storage System Architecture and Implementation       IBM XIV Storage System logical  architecture and concepts    In this chapter  we elaborate on various underlying design and architectural concepts of the  IBM XIV Storage System that was introduced in Chapter 1     IBM XIV Gen3 Storage System  overview    on page 1     This chapter covers the following topics     2 1     Architecture overview    on page 18   2 2     Parallelism    on page 21   2 3     Full storage virtualization    on page 24   2 7     Capacity allocation and thin provisioning    on page 37   2 8     Flash cachi
56.   setting  50 MBps x 2 Modules   100 MBps   Therefore  if the user intends to have a  300 MBps bandwidth limitation with two interface modules connected in a full six interface  module system  the Bandwidth Limit per Interface is 150 MBps and the Bandwidth Limit  must be set to 900     Limitation by input output operations per second  Again  the interface modules enforce the limitations     If the intent is to set the limitation at 10 000 IOPS for a specified host in a six interface module  configuration  the IOPS limit must be set to 10 000 and the enforcement is 1 666  10 000 6   for each interface module     If the host is attached to just two interface modules in a full six interface module system  the  host IOPS limitation would be only 3332 with this performance class setting   1666 IOPS x 2 interface modules   3332 IOPS      If the intent is to have a 10 K IOPS limitation for a host connected to only two interface  modules in a full six interface module system     IOPS Limit Per Interface    must be set to 5000  or    IOPS Limit    for the performance class needs to be set to 30 000  Users must consider  these interface module multiplication factors to properly meet expected limitations     Quality of service illustration   To illustrate the QoS effect  we used it with two OLTP applications  one designated as critical   the other noncritical  running on the XIV system  They were set to run at about 30 K IOPS  total  We repeated the test with three different levels of Q
57.   version  and hardware version  Gens only  are displayed  Click the balloon above a system to  change the balloon value  The following values are available     System IOPS   System Utilization   System Status   System Number of Hosts  System Number of Volumes  System Hardware Type    YYYY YV Y          AllSystems  9   gt  Redbook2013  3  x    XIV 131   7 Alba G3  IOPS  189 278        XIV 13   tooine G3  IOPS  73 607          Figure 4 29 All Systems Connectivity view    Note  When one or more systems are selected in the Connectivity view  the cleared  systems appear grayed out     The Tiles view  shown in Figure 4 30  displays the selected systems in a grid format  For each  system  the following details are displayed      gt  Group name  if applicable     gt  System name and serial number   gt  System software version    gt  Current system IOPS    132 IBM XIV Storage System Architecture and Implementation     gt  Capacity use   gt  System status  including indicators for hardware problems or alerts    A All Systems  9   gt  Redbook2013  3  Q  Tiles            XIV 1310077 Alba 11 4 0    lOPS   174497      XIV 1310062 Dantooine 11 40    84     IOPS   20423          XIV_02_1310114 11 4 0    lOPS   20    Figure 4 30 All Systems  Tiles view             Note  Only selected systems are visible in the Tiles view  Cleared systems are hidden     Tip  To show or hide systems in the Tiles view  use the System Selector menu  as shown  in Figure 4 27 on page 131     The List view  shown i
58.   where the storage administrator is required to switch from  source to target system     238 IBM XIV Storage System Architecture and Implementation    Figure 5 41 shows the XIV Storage Management GUI view of multiple systems when using  non synchronized passwords  For this example  the systems named    XIV 1310133    and     XIV 02 131 114  have a user account named lab_admin that provides the storage admin  level of access  Because the user ID is not configured for all XIV systems  only the two  systems are currently shown as accessible     The user can see the other system  but is unable to access it with the lab_admin user  the  unauthorized system appears disabled   It also states that the user is unknown  If the system  has the lab_admin defined with another password  the systems are shown in the same state     Figure 5 41 shows a single user login view        KIV 1310133 GF    TOPS  3014       MIV 02 1310114 Gz       KIV LAB 03 1300203 aya     S Authentication Failure            Figure 5 41 Single user login    To allow simultaneous access to multiple systems  the simplest approach is to have  corresponding passwords manually synchronized among those systems  Figure 5 42 on  page 240 illustrates the use of user account with passwords synchronized among four XIV  systems  The storage administrator can easily switch between these systems for the activities  without needing to log on each time with another password  Each XIV Storage System where  the user was successfully
59.  10 04 17 51 58 Informational MAP _VOLUME admin    Volume with name       7tso_app01l vol02  was mapped to LUN  2  for host with name    itso app02      Chapter 7  Monitoring    349    Example 7 22 shows the command for listing all instances when the user was updated  The  USER UPDATED event is generated when a user   s password  email  or phone number is  modified  In this example  the  t option is used to display specific fields  such as index  code   description of the event  time stamp  and user name  The description field provides the ID that  was modified  and the user field is the ID of the user performing the action     Example 7 22 View USER_UPDATED event with the XCLI    C  XIV gt xcli  c  XIV 6000050   t index code description timestamp user_name event list  code USER_UPDATED    Index Code Description Timestamp User  1089 USER UPDATED User with name    admin  was updated  2009 07 10 21 45 50 admin  1091 USER _UPDATED User with name    admin  was updated  2009 07 10 21 45 51 admin    1092 USER _UPDATED User with name    technician    was updated  2009 07 10 21 45 52  xiv_development  1093 USER_UPDATED User with name    technician    was updated  2009 07 10 21 45 53  xiv_development    7 1 9 Defining notification rules    Example 7 23 describes how to set up a rule in the XCLI to notify the storage administrator  when a user   s access control has changed  The rule has four event codes that generate a  notification  The events are separated with commas with no spaces
60.  1015 GB Volumes Allocated 361 GB 3441 GB Soft Snapshots Reserved 361 GB  52 GB Used Volumes of 1514 GB Hard   be  hannes 4 a    gt  i i   Read Only  1015 GB Volumes Allocated 344 GB 3011 GB Soft Snapshots Reserved 344 GB  860 GB Used Volumes 7646 GB Hard Used  17 SB  2     amp  mo i TTR Read Only  2013 GB Volumes Allocated 7846 GB Soft Snapshots Reserved 791 GB       Figure 4 41 Storage Pools view    The Storage Pools view displays a table of all the pools in the system  with a series of gauges  for each pool  This view gives the administrator a quick grasp and general overview of  essential information about the system pools  The Storage Pools view can be customized   allowing you to show or hide specific columns  The Name and Usage columns are required   The following optional column values are available     Creator   Hard  Free   Hard  Total   Lock Behavior  Snapshots  GB   Snapshots  Total   Snapshots Used  Soft  Free    Soft  Total   System  Volumes Used    M    Vvvvvvrvrvrvyvyiyv    The capacity consumption by volumes and snapshots within a particular storage pool is  indicated by various colors  The default threshold values are as follows      gt  Blue indicates consumed capacity below 80      gt  Yellow indicates capacity consumption above 80      gt  Orange indicates capacity consumption of over 90      gt  Red indicates that a storage pool has depleted hard capacity     The name  the size  and the separated segments are labeled appropriately   In Figure 4 42 on pag
61.  14 2632 5 13 72 6 86 20 5854 123 1i 8 6 3 34 1 67 25  24 XIV 2812 7803760 IBM 1 FC_Port 7 1 500173800EB00170 27 09 11 10 58 PM 900 1753 44 879 54 2632 99 13 71 6 86 20 5719 122 1 8 5 3 34 1 67 25  25 XIV 2812 7803760 IBM 1 FC_Port 8 1 500173800EB00180 27 09 11 10 58 PM 900 1754 36 875 27 2629 63 13 72 6 84 20 5572 12 2 1 8 5 3 34 1 67 Z9  26 XIV 2812 7803760 IBM 1 FC_Port 9 1 500173800EB00190 27 09 11 10 58 PM 900 1753 72 882 18 2635 9 13 71 6 88 20 5901 12 3 1 8 5 3 34 1 67 2 5  27 XIV 2812 7803760 IBM 1 FC_Port 4 1 500173800EB00140 27 09 11 11 13 PM 899 1737 81 869 12 2606 93 13 61 6 82 20 4265 12 4 1 1 8 6 3 32 1 66 2 49  28 XIV 2812 7803760 IBM 1 FC_Port 5 1 500173800EB00150 27 09 11 11 13 PM 899 1743 12 878 78 2621 9 13 61 6 87 20 4798 12 3 a 8 5 3 32 1 67 2 49  29 XIV 2812 7803760 IBM 1 FC_Port 6 1 500173800EB00160 27 09 11 11 13 PM 899 1739 3 870 05 2609 35 13 62 6 82 20 4453 12 4 1 1 8 6 3 32 1 66 2 49  30 XIV 2812 7803760 IBM 1 FC_Port 7 1 500173800EB00170 27 09 11 11 13 PM 899 1739 52 877 64 2617 16 13 62 6 85 20 4739 12 3 1 8 5 3 32 1 67 2 49  31 XIV 2812 7803760 IBM 1 FC_Port 8 1 500173800EB00180 27 09 11 11 13 PM 899 1738 06 875 22 2613 28 13 61 6 84 20 4429 12 3 1 8 5 3 32 1 66 2 49  32 XIV 2812 7803760 IBM 1 FC_Port 9 1 500173800EB00190 27 09 11 11 13 PM 899 1739 97 871 77 2611 74 13 62 6 84 20 4524 12 4 1 8 6 3 32 6 2 49  33 XIV 2812 7803760 IBM 1 FC_Port 4 1 500173800EB00140 27 09 11 11 28 PM 900 1737 46 870 49 2607 94 13 6 6 79 20 3911 123 1 1 8 6 3 32 te 2
62.  40 Select gateway type          4  When the wizard prompts for the type of the gateway  either SMTP for email notification or  SMS if an alert or information will initiate an SMS  click either SMTP or SMS     Gateways  An SMTP gateway must be defined before you can define an SMS gateway  because SMS messages are sent from the XIV Storage System in the form of an email     The next steps differ for SMTP and SMS  Our illustration from this point forward is for  SMTP  However  the steps to go through for SMS are self explanatory and are described  in    Setting up notifications and rules using the XCLI    on page 366     To proceed with SMTP  click Next     360 IBM XIV Storage System Architecture and Implementation    5  Enter the gateway name of the SMTP gateway and click Next  Enter the IP address or  DNS name of the SMTP gateway for the gateway address and click Next  The SMTP  Sender Email Address window opens  as shown in Figure 7 41 on page 361        Wizard   Gateway Create   SMTP Sender Email Address X    SMTP Sender Email Address  In case of Email problems  such as wrong Email address  a response Email    is sentto this address  You can either specify an address for this server or use  the system wide global address     Type      Use default sender    Sender Default   Address    Sender    Use new sender address    i    Sender Email     xiv01 yourcompany com au      Finish           lt   a    Figure 7 41 SMTP Sender Email Address window    6  Set the sender email addres
63.  48  34 XIV 2812 7803760 IBM 1 FC_Port 5 1 500173800EB00150 27 09 11 11 28 PM 900 1744 11 904 97 2649 08 13 63 6 96 20 595 12 2 1 8 4 3 32 1 69 23       Figure 6 30 Tivoli Storage Productivity Center data example    The data filters can be used to easily find maximum values  The spreadsheet can also be  used to generate graphs  In our Tivoli Storage Productivity Center data example in  Figure 6 30  the following graphs are frequently helpful      gt  Total IOPS and total bandwidth      gt  Read IOPS and read response times  If ports only  a read is a Port send    gt  Write IOPS and write response times  If ports only  a write is a Port receive     6 4 Performance evaluation    This section describes performance problem solving techniques for XIV Storage System     6 4 1 Problem solving steps    320    The problem solving steps consist of defining the problem definition  data colleciton  and  performance analysis     Problem definition  A good problem definition includes the following types of information      gt     Which application is having performance problems  What is a description of the problem  from the application perspective     What operating system performance characteristics indicate that the problem is  XIV Storage System performance     What LUNs are dedicated to this application     IBM XIV Storage System Architecture and Implementation        gt  How is the application server zoned    gt  During what time period is the problem experienced      gt  What is the
64.  7 51 Displaying the Events view per notifications    A storage administrator can control how much information and configure which notifications  are sent to a mobile device  Navigate to Access     Mobile Notifications from the XIV  Storage Management GUI as shown in Figure 7 52           Figure 7 52 Select Mobile Notifications    Notifications can entail informative event descriptions and are configurable  See Figure 7 53    By default  major and critical issues are sent in preview only mode     IBM XIV Storage System Architecture and Implementation    Systems   Actions   View   Toots   Hep FS O    l ag Ad Systens  72    Mobis Nonficanons      XY Ha  EN Gc  XY GO Ta  EN Goo ib  XY GG Te    o i A Lae Y 5             pE  SOY MAMO0OS Z    ik  ig  g  3  a  Gd          Edi Preia encis    Urreubscribe Hoin Motticatiors there    a ae Min  Severity  RIV 604 Hidden content  IV Gor   ETV Bod   ATV Gort   KIV etd   RIV 604       Figure 7 53 Notification control    User permissions and status are managed from the same panel in the IBM XIV Storage  Management GUI      gt  Active user  An active user receives notifications based on the defined preferences    gt  Dormant user    If a user has not used the service for over a week  the service is considered to be  dormant  In this case  the user receives push notifications  but with no content  regardless  of the defined preferences      gt  Non active user    If a user has not logged in for more than 30 days  the user subscription is consid
65.  AB 86 BB AF 5B 74 4D 35 34 0E C5 84 30 A1 61 84  X509v3 Authority Key Identifier   keyid A8 0B D1 B5 D6 BE 9E 61 62 E3 60 FF 3E F2 BC 4D 79 FC E3 5A    IBM XIV Storage System Architecture and Implementation    DirName   C US ST Arizona L Tucson 0 xivstorage CN xivstorage emai 1 Address ca xivst  orage org  serial  00    X509v3 Extended Key Usage    TLS Web Server Authentication   X509v3 Key Usage    Digital Signature  Key Encipherment  Certificate is to be certified until Jun 29 21 35 33 2010 GMT  365 days   Sign the certificate   y n  y    1 out of 1 certificate requests certified  commit   y nly    Write out database with 1 new entries  Data Base Updated    Appendix B  Additional LDAP information 463    464 IBM XIV Storage System Architecture and Implementation    Related publications    The publications listed in this section are considered particularly suitable for more detailed  information about the topics covered in this book     IBM Redbooks publications    For information about ordering this publication  see    How to get IBM Redbooks publications     on page 466  The following publications might be available in softcopy only     Vvvvvvvrvvyvyiyv    IBM XIV Storage System Business Continuity Functions  SG24 7759   IBM XIV Storage System Multi site Mirroring  REDP 5129   XIV Storage System  Host Attachment and Interoperability  SG24 7904   XIV Storage System SSD Caching Implementation  REDP 4842   Using the IBM XIV Storage System with OpenStack Cloud Environments  RE
66.  Architecture and Implementation    Table 5 2 shows the predefined users and their roles     Table 5 2 Predefined user role assignment    Presem ere    xiv_msms storageadmin    Native authentication mode implements user role mechanism as a form of role based access  control  RBAC   Each predefined user role determines the level of system access and  associated functions that a user is allowed to use     RBAC  The XIV Storage System implements role based access control  RBAC  based  authentication and authorization mechanisms     All user accounts must be assigned to a single user role  Assignment to multiple roles is not  permitted  Deleting or modifying role assignment of natively authenticated users is also not  permitted     Global administrator and domain administrator    The XIV Storage Software Version 11 5 introduced the domain based multitenancy feature   which is described in 2 4 3     Multitenancy    on page 30     When you add a user  the user can be assigned to zero  no domain   one  or all domains  defined on that XIV system  as shown in Figure 5 21     Add User    System  XIV_PFE2_ 1340010  y    Domain   no domain  Name  All  ITSO_d1  New Password  6 12   ITSO_domain  ITSO_domain3  Retype New Password  ITSO_domain_2  pfe ibm    Category  test    User Group  None  Email Address     Phone Number     Invalid username  Valid name cannot be an empty string      aes a eee      Figure 5 21 Add User to domain       If a particular user needs to be assigned to multiple d
67.  Base DN        itso storage ibm com 9 155 113 143 CN Users DC itso DC storage DC ibm DC com     IBM XIV Storage System Architecture and Implementation    After adding one or more LDAP servers  you can define the login attributes in the  XIV Storage System  In Example 5 13  you can see an example for a possible  Microsoft Active Directory implementation     Example 5 13 XCLI LDAP configuration    XIV 02 1310114 gt  gt ldap_ config set server _type  Microsoft Active Directory   Xiv_group_attrib memberOf   storage admin role CN XIVAdmins CN Users DC itso DC storage  DC i bm  DC com  read only_role CN XIVReadonly  CN Users  DC i tso  DC storage  DC ibm  DC com  xiv_user CN XIV CN Users  DC itso DC storage  DC ibm  DC com  user_id_attrib sAMAccountName user_name_attrib displayName    Command executed successfully     For a description of the LDAP role mapping  see 5 7 4     LDAP role mapping    on page 247   The XIV Storage System storage_admin_role  read_only_ role and xiv_group attrib  configuration parameters must have values assigned for LDAP role mapping   to work     After the configuration is submitted successfully  you can check your values by running  Idap_config_get     Now that all the configuration and verification steps are completed  the LDAP mode can be  activated by running 1dap_mode_set  as shown in Example 5 14     Example 5 14 Enabling the XIV LDAP mode    XIV 02 1310114 gt  gt ldap_ mode set mode Active  Warning  ARE YOU SURE YOU WANT TO ENABLE LDAP AUTHENTICA
68.  Basic WS _Team3_Win    Basic WS_Team4 Win  Pools Basic WS_Team5 Win  Basic WS_Team6_Win  Blade10 HS21 20  Blade2 L 21 02  Blade3 L 21 03  Blade4 L 21 04             Figure 4 92 Managing domain hosts associations in the XIV GUI    For more information about hosts in XIV  see 4 6     Host definition and mapping    on page 164     IBM XIV Storage System Architecture and Implementation    Managing domain cluster associations    To manage cluster associations with a domain  right click the domain in the Domains view  and select Manage Associations     Clusters  as shown in Figure 4 93     Utilization             Ba ITSO_domain_2    Manage Associations    View Associated Pools Hosts  View Associated Hosts and Clusters    View Associated Users and User Groups Targets  Users  Limit Traffic by Perf Class    Limit Traffic by new Perf Class    User Groups    Properties       Figure 4 93 Accessing the Manage Domain   s Associations screen Clusters tab in the XIV GUI    In the Manage Domain   s Associations screen that appears  Figure 4 94   select the clusters  and use the arrows to associate or remove the clusters from the domain  Click Update to  apply the changes        Manage Domain s Associations  ITS0O_domain  x  Users  Clusters to Associate Associated Clusters  User Groups ITSO_ESX_Cluster  Hosts  Clusters  Targets Bi  gi  Pools       E co    Figure 4 94 Managing domain cluster associations in the XIV GUI          Note  Associating a cluster with a domain automatically associates
69.  Dial in   Environment   Sessions    Remote control   Terminal Services Profile   COM     General Address   Account   Profile   Telephones   Organization         sivtestuser     First name  fo Initials  fe  Last name  FO  Display name  Jxivtestusert   Description   Storage Administrata  Office  Po    Telephone number  Other     E mail   Web page  Other         coed   aso    Figure B 3 Entering a predefined value into the Description field       Complete the account information update by clicking OK     After the user account is created in Active Directory  its accessibility can be verified from any  of the available LDAP clients  In our case  we used the OpenLDAP client  as shown in  Example B 1     Example  B 1 Active Directory account verification using OpenLDAP client      ldapsearch  x  H  Idap   xivhost1l xivhostlldap storage tucson ibm com 389   D   CN xivtestuserl  CN Users DC xivhost1ldap DC storage DC tucson DC ibm DC com   w  pass2remember  b  CN Users DC xivhost1ldap DC storage  DC tucson DC ibm DC com   cn xivtestuserl    dn  CN xivtestuserl  CN Users DC xivhost1ldap DC storage DC tucson  DC ibm  DC com  objectClass  top   objectClass  person   objectClass  organizational Person   objectClass  user   cn  xivtestuserl   description  Storage Administrator   distinguishedName  CN xivtestuserl CN Users  DC xivhostlldap DC storage DC tucs  on DC ibm DC com   instancelype  4   whenCreated  20090622172440 0Z   whenChanged  20090622180134 0Z    434 IBM XIV Storage System 
70.  ES Health Library    Copy Ctrl C    Properties    Export Managerment Pack       Del       Figure 7 101 Delete the XIV management pack    3  Reinstall the IBM Storage Management Pack by using the same process that you used to  install it  See 7 9 2     Installing SCOM and the IBM Storage Management Pack    on  page 414  The upgrade wizard is automatically started     Chapter 7  Monitoring    423    4  Import the updated management packs as described in 7 9 3     Importing the management  packs and Adding IBM XIV systems    on page 415  In Figure 7 102  you can see that  Version 1 3 0 0 is imported for IBM System Storage and that both management packs  Version 2 1 0 0 are selected for import     Select Management Packs    Help    Import list   oh Add   Properties    X Rernove    Name    Version Release Date Status EULA    fo  IBM Sustem Storage ee     a      wl IBM Storage  Xv    Status details      IBM System Storage version 1 3 0 0 is imported     Install Cancel       Figure 7 102 Upgrading the management packs    5  Since Version 2 1  you need to define the SCOM management server with the scomu  command  This the syntax of the if you run it on the management server     scomu cmd   sc set   servername localhost    6  Now  add the XIV systems again  as shown in Example 7 56 on page 417  with the  following scomu command     scomu   add  t xiv   ip  lt ip address gt    username  lt username gt    password   lt password gt      424 IBM XIV Storage System Architecture and Implem
71.  FQDN  itso storage ibm com         Server Address  9 155 113 143         Search DN  CN Users DC itso  DC storage DC ibm      Server Port     Server Secure Port     RAI     tt   Certificate File         lt n    Figure 5 82 Defining Active Directory LDAP server with an SSL certificate          In Figure 5 82  the server type selected must correspond to your specific LDAP directory   either Microsoft Active Directory  as shown  or an Oracle directory     To view the expiration date of the installed certificate in the XIV Storage Management GUI   open the Tools drop down menu at the top of the main XIV Storage Manager GUI window   Click Settings     LDAP  click the Servers tab  right click the name of the LDAP server  and  click Properties  as shown in Figure 5 83         Properties             FQDN  itso storage ibm com   Address  9 155 113 143   Base DN  CN Users  DC itso DC storage DC      Expiration Date  2012 10 03 05 43 20   Has Certificate  Yes   Port  389    Secure Port  636          Figure 5 83 Viewing the Active Directory server certificate expiration date    By default  LDAP authentication on an XIV Storage System is configured to use non SSL  communication  To enable the use of SSL in the XIV Storage Management GUI  open the  Tools drop down menu at the top of main XIV Storage Manager window  Click Settings  gt   LDAP click the Secure LDAP tab  and change the Use SSL setting from No to Yes  as  shown in Figure 5 84 on page 285     284 IBM XIV Storage System Architect
72.  Figure 4 111 The Role Mapping tab in the XIV LDAP parameters window    Without multitenancy  you would create a group in your directory instance name that matches  this value  as shown in Figure 4 112 on page 196     Chapter 4  IBM XIV Storage Management software 195      Active Directory Users and Computers  E  File Action View Window Help  am   amp    Xx Bem    hv Geo  SF Forward tory Users and Computers  pdc pfe ibm  IE Riss ea al el    AORA    ci aren Queries T  E   ame ype  B gp pre  ibm Y    G Buitin ikIY PREZ Admins    fg Computers   H  Domain Controllers  ForeignSecurityPrincipals  LJ Managed Service Accounts  PFE_SERVER       Figure 4 112 An Active Directory group name that matches the XIV Storage Admin Role mapping    To configure a directory group for use with an XIV domain  name the group by using this  format     role _mapping LDAP domain_id    Where role_mapping is the value highlighted in Figure 4 111 on page 195 and  LDAP_domain_id is the value of the LDAP domain ID defined in the XIV domain properties   as described in    The name  the size  and separated segments are labeled appropriately     on  page 177  Figure 4 113 shows a directory group named using this format      amp  Active Directory Users and Computers   lt 3 Eile Action view Window Help  am  ex ToB Sm ei hY Ge    9 Active Directory Users and Computers  pde  pfe  ibm  Users 1 objects  Filter Activated   H E Saved Queries     gp pre  ibm    E  Builtin   5 Computers   H  3  Domain Controllers   H QO
73.  Folder      Introduction Setup will create the program s shortcut in the following       License Agreement menu          Configure Installation IBM XIV 4 4  Pre Installation Summary    Installing    Setup will create desktop icons for the following    components      IBM XIV GUI   F  IBM XIV Top       IBM XIV XCLI    lnstallAnywhere      Cancel     Previous                  Figure 4 5 Select Start menu folder and desktop icons    116 IBM XIV Storage System Architecture and Implementation    6  The setup configuration confirmation window is now displayed  Review your selections  and click Install to complete the installation     7  Finally  the Install Complete window shown in Figure 4 6  Click Done to exit the installer     b      e  Install Complete    v  Introduction IBM XI   Storage Management GUI has been successfully    vi License Agreement installed to     x  Configure Installation CAProgram FilestiBMiStoragetXIvodVvGUI  v  Pre Installation Summary  v  Installing    Click    Done to quit the installer     4  Launch IBM XIV Storage Management GUI    XIV    InstallAnywhere             Figure 4 6 Completing the setup    4 3 XIV Storage Management software use    Now that the XIV Storage Management software has been installed  the introduction and  explanation of some features of the XIV Storage Management GUI and XCLI can be useful in  further configuration and storage management     Beginning with the XIV Storage Management GUI  this section describes the following topic
74.  ForeignSecurityPrincipals   E T Managed Service Accounts    3  PFE_SERVER   SY Users       Figure 4 113 An Active Directory group named for use with a single XIV domain    Members of this group in the directory will be granted storage administrator rights in the  corresponding domain when they authenticate with the XIV system     Further  you can configure a directory group for use with multiple XIV domains by appending  the additional domains to the end of the name  separating each domain with a   character  as  shown in Figure 4 114         amp  Active Directory Users and Computers   lt  File Action View Window Help  e   Am 4 e   XSF ARB Am BP Gea    Active Directory Users and Computers  pdc pfe ibm   H  Saved Queries  H    4 pfe ibm  E Builtin  Computers    LJ  Domain Controllers  WI  Ga                      Users 1 objects  Filter Activated     Typ    ixIvV_PFE2_Admins IT50_domain IT50_domain_2 Security Group   Domain Local          ForeignSecurityPrincipals  Managed Service Accounts  PFE_SERVER     Users             AE       Figure 4 114 An Active Directory group named for use with multiple XIV domains    196 IBM XIV Storage System Architecture and Implementation    Note  With XIV multitenancy and LDAP authentication  user membership in multiple  groups that are mapped to different roles is not supported  In such a case  the user will not  be allowed to authenticate to the XIV system     Also  remember that domain user associations can be managed only by the Global Stor
75.  From the LDAP Servers tab  click the plus sign     icon at the right to add an LDAP server  to the configuration  as shown in Figure 5 53     LDAP Configuration   Directory Services Server Configuration    Directory Services Server Configuration    wai Add  Remove or modify your Directory Services servers  If you plan on using  Server Type Secure LDAP  please make sure you attach the appropriate LDAP Server  certificate pem    format  for each server you configure     LDAP Servers       Add LDAP Server    XIV User    Unique ID   s     Groups    Secure LDAP     Bind  amp  Cache      Test  amp  Activation         Finish       Figure 5 53 Adding LDAP servers          Chapter 5  Security 253    5  In the window that opens  Figure 5 54   enter the fully qualified domain name  FQDN    which is the DNS name of the LDAP server  such as itso storage ibm com in our  example      Also  enter the LDAP server IP address and the Search DN  which in our Active Directory  implementation is CN Users  DC itso  DC storage  DC ibm DC com  as shown  in Figure 5 54     For example  in a default Active Directory implementation  a server with the domain name  ldap domain de maps to CN Users  DC ldap  DC domain DC de     6  If you need a certification file for the connection to your LDAP server  add it here for the  connection     7  lf your LDAP server uses nonstandard port numbers  enter those accordingly  Leave these  fields blank to use the standard ports  Server port 389  secure server port 636
76.  GEN3 1310133 gt  gt support_center_list  Name Address Port Priority  Xivproxy 9 155 113 137 8988 5    Now  a remote support connection can be made  as shown in Example 7 41     Example 7 41 Establishing a remote support connection    XIV PFE GEN3 1310133 gt  gt support_center_connect   Command executed successfully    command _line  xiv python nextra remote support_client remote support client connect  I 2810 114 1310133  m  1 Module 2  d xivproxy 9 155 113 137 8988 5    XIV PFE GEN3 1310133 gt  gt support_center_ status    State Connected sessions Timeout  min  Module Connected since Destination  idle 0 no timeout 1 Module 2 2011 09 27 15 55 48 xivproxy 9 155 113 137 8988     More information about the Remote Support Proxy is in the  BM XIV Remote Support Proxy  Installation and User   s Guide  GA32 0795     Chapter 7  Monitoring 383    7 6 Simple Network Management Protocol based monitoring    The XIV Storage System supports Simple Network Management Protocol  SNMP  for  monitoring     7 6 1 Monitoring tools    SNMP based monitoring tools  such as IBM Tivoli NetView   or IBM Systems Director  can be  used to monitor the XIV Storage System     Simple Network Management Protocol   SNMP is an industry standard set of functions for monitoring and managing TCP IP based  networks and systems  SNMP includes a protocol  a database specification  and a set of data  objects  A set of data objects forms a Management Information Base  MIB      The SNMP protocol defines two terms  agen
77.  Galactica 1340009   Host Name  ITSO_Win2008   Port Type  FC iai  Port Name      50017380278A0183      a    Figure 4 63 XIV Storage Management GUI example  Add FC port WWPN    Repeat steps 5 and 6 to add the second HBA WWPN  Ports can be added in any order     8  To add an iSCSI host  in the Add Port window  specify the port type as iSCSI and enter the  IQN of the HBA as the iSCSI Name  See Figure 4 64        Add Port  System  XIV Galactica 1340009  Host Name  TSO _Win2008  Port Type  iSCSI ai  iSCSI Name y    Figure 4 64 XIV Storage Management GUI example  Add iSCSI port    9  The host is displayed with its ports in the Hosts window  as shown in Figure 4 65 on  page 166                                 TSO Winz008 default     wa  50017380278A1234     aa  50017380278A5678       TS0_win2008_iscsi default       iw    iqn 1991 05 com microsoftadminib 2999unn    Figure 4 65 List of hosts and ports    166 IBM XIV Storage System Architecture and Implementation    In this example  the hosts itso Win2008 and itso Win2008 iscsi are the same physical host   but they have been entered as separate entities so that when mapping LUNs  the FC and  iSCSI protocols do not access the same LUNs     Mapping logical unit numbers to a host  The final configuration step is to map logical unit numbers  LUNs  to the host  To do this task     complete the following steps     1  While still in the Hosts and Clusters configuration pane  right click the host to which the    volume will be mapped and selec
78.  I O is complete  which occurs independently of the data  being destaged to physical disk     System shutdown and power on sequence    When the XIV Storage System detects that all power is lost  it waits for 30 seconds to ensure  that this outage is not a temporary power outage  During this time  it runs on three  uninterruptible power supply  UPS  units that are part of every XIV Storage System  configuration  The XIV Storage System needs only two of these units to be operational  The  third UPS unit is redundant  If power is not restored within 30 seconds  the XIV Storage  System executes a graceful shutdown sequence  There is enough battery power in the XIV  Storage System to execute such a shutdown sequence twice     Because of the XIV Storage System grid topology  a system shutdown event essentially  entails the graceful shutdown of all modules within the system  Each module can be thought  of as an independent entity that is responsible for managing the destaging of all data in cache  that has not already been written to the disk drive  The data in cache that must be written to  disk within each module consists of equal parts primary and secondary copies of data  but  never contains both primary and secondary copies of the same data     Write cache protection    Each module in the XIV Storage System contains a local  independent space reserved for  caching operations within its system memory     Destage  The system memory space is reserved for write operations  However 
79.  Logical Volumes to Disks      gt  Disk Manager     Reporting     Storage Subsystems     Storage Subsystem Views     gt   Disks  Relate Disks to Computers     These queries  when combined with the Small Computer System Interface  SCSI  inquiry  data that Tivoli Storage Productivity Center collects from the hosts  allow Tivoli Storage  Productivity Center to correlate LUNs reported by the XIV Storage System to LUNs seen by  the host systems     Also  when the XIV Storage System is providing storage to the IBM System Storage SAN  Volume Controller  Tivoli Storage Productivity Center can correlate LUNs reported by the  XIV Storage System to SAN Volume Controller managed disks  MDisks      Element Manager launch    If the XIV Storage Management GUI is installed and configured  Tivoli Storage Productivity  Center element manager can be used to launch the XIV management software     402 IBM XIV Storage System Architecture and Implementation    Tivoli Storage Productivity Center performance reports    The XIV Storage System Software v10 2 2 or later enables Tivoli Storage Productivity Center  to create performance reports  The corresponding XIV Storage System performance  monitors must be set up first  as described in 7 7 1     Setting up and discovering XIV systems  in Tivoli Storage Productivity Center    on page 390     To create a performance report  click IBM Tivoli Storage Productivity Center      Configuration Utility     Disk Manager     Storage Subsystem Performance  Manage
80.  Management           Bl al x  Gg    avigation Tree Selection   Storage Subsystems Drill down from XI   2810 6000105 IBM       Administrative Services    I IBM Tivoli Storage Productivity Center     Configuration Utility  a  Number of Rows  42    Configure Devices   Job Management Subsystem   Yolume Time   Interval   Read 1 0    Storage Subsystem Performance  By volume      E Reporting Al ferv  2810 6000105 IEM  gpFs_1 1D  14093  Oct 5  2010 6 00 02 PM    EMy Reports T  xIv 2610 6000105 IBM   gpfs_2 1b  14094  Oct 5  2010 6 00 02 PM  _  amp  System Reports 5  XI   2810 6000105 IBM  gpFs_3 ID 14095  Oct 5  2010 6 00 02 PM  Data F  IV 2610 6000105 IBM   gpfs _KID 14941  Oct 5  2010 6 00 02 PM    Eb Disk F  xIv 2810 6000105 IBM   itso_aix_1 1D 7342  Oct 5  2010 6 00 02 PM    E Array Performance F  xIv 2810 6000105 IBM  itso_aix 21D  7343  Oct 5  2010 6 00 02 PM     Controller Cache Performance S    KIv 2510 6000105 16M  N56004 Cata 1f1D 15079  Oct 5  2010 6 00 02 PM   Controler Performance        T  xIv 2610 6000105 IBM   NS6004 Data 2f1b  15080  Oct 5  2010 6 00 02 PM   H O Group PerFormance  aiandi eroun perronnance Gj    TV 2810 6000105 IBM   NS6004 Data 3 ID  15081  Oct 5  2010 6 00 02 PM     Port Performance Gj    TV 2810 6000105 IBM   NS600B_data_m  2 1D 15083  Oct 5  2010 6 00 02 PM  Subsystem Performance Al MIV 2610 6000105 IBM   NS600B_data_m_3f1D 15084  Oct 5  2010 6 00 02 PM    a  co   mm  Wi                                                                             
81.  Mirrored CODIeSs of dalai  42 242428 044648602 4arki nd Steet waned eea iia 34    2 0 Storage DOOLCONCEDIS savin satate eek a tae Se i a aa a a Aeees 35  2 6 1 Improved management of storage space       s s s aana aa aaea ee 35  26 S GONSISIENGY GlOUDS arrr kare aa n a a Re a a e ew eine Ra a 35  2 6 3 Storage pool relationships and rules       a   an aaa aaan aa 36   2 7 Capacity allocation and thin provisioning      n    sasaa aeaaaee 37   2 8  Flash caching arcnitCClure   x4saciwieud evade dee sae iad baa eee ede ERA 43  2 8 1 Flash caching overview    4 ial c s e ae Nika eGo eRe wes a BUR A ed 43  2 8 2 Flash caching algorithm and concepts               000 cee eee eee 44   2 9 EACrY PUN Tor CalacatreSlat cncuukated eek aa kl oes ee Mila a E Ra hae Ge i aed 45   2 10 Reliability  availability  and serviceability  RAS              0 0 0 cee eee 46  2 10 1 Resilient architecture          nananana cease 47  2 10 2 Preserving data redundancy  Rebuilding and redistributing                 51  2 10 3 Exclusive additional functions for reliability and availability                  58   Chapter 3  IBM XIV architecture  components  and planning                     61   3 1 IBM XIV Storage System Gen3    2    raii ta i eee nes 62  3 1 1 Fully populated configurations          asana aaaea eee 64  3 1 2 Partially populated configurations           0 0    eee 65  9 1 3  Capacity o   Demand Sasi a4 4d ieee a weve di haces oe are Bee ki Paes 66  3 1 4 Advanced System Placement         
82.  Performance white paper     http   public dhe ibm com common ssi ecm en tsw03123wwen TSW03123WWEN  PDF    More white papers about XIV performance with application specific workloads are available in  the White Papers section of the IBM Techdocs Library     http   www ibm com support techdocs atsmastr nsf Web WhitePapers       Copyright IBM Corp  2014  All rights reserved  287    6 1 XIV Storage System Software and hardware architecture    There are several aspects of the XIV Storage System hardware and software architecture that  contribute to the ability of an XIV Storage System to provide excellent performance to  real world production applications  In this section  we describe the following topics      gt  Workload distribution   Grid architecture   Caching and extended flash caching  Data redistribution   Snapshots    YY vV Yy    6 1 1 Workload distribution and load balancing    288    One of the main reasons that the XIV Storage System achieves exceptional performance is  because the architecture imposes an elegant way to equally and in parallel use every  component within the XIV Storage System grid  Equal use of every component maximizes  performance in three ways      gt  XIV Storage System engages the performance capabilities of all drives all the time    gt  XIV Storage System engages the performance capabilities of every module in the grid    gt  XIV Storage System eliminates disk hotspots     The XIV Storage System stripes and mirrors data in 1 MB partitions acro
83.  Purchase or lease full XIV system  modules under CoD contract  under ASP contract     Client charges Point in time  a  Initial system When system is shipped   purchase b  when capacity used If 1st system  60   Otherwise   1   exceeds authorized  or c  at end of When use  gt  70   remainder is due   CoD period     Sold through IBM direct and Business Partner sales  IBM direct and Business Partner sales  purchase or lease  IGF   IGF lease only        3 1 5 XIV Cloud Storage for Service Providers    IBM XIV Cloud Storage for Service Providers offers feature options and innovative  pay per need flexibility to empower cloud providers to cater to tenant requirements with  exceptional efficiency  With this offering  cloud service providers and managed service  providers can choose XIV functions based on the needs and cost sensitivities of their clients  so that they can pay for what they need when they need it     XIV Cloud Storage for Service Providers features are optimized for cloud services and offer  the following advanced function licenses for purchase as needed  see Figure 3 8 on  page 73       gt  Efficiency  Flash caching    gt  Elasticity  HyperScale mobility   gt  Security  Encryption    gt  Continuity  Mirroring    72 IBM XIV Storage System Architecture and Implementation       XIV Cloud Storage for Service providers    Base Functions Optional Functions    Tune Free   Consistent Performance  Self Healing  amp  Resiliency  Multi tenancy   QoS performance classes  QoS per
84.  Repeat steps 2 and 3 to create additional hosts  In our scenario  we add another host that  is called ITSO_Win2008 iscsi     6  Host access to LUNs is granted depending on the host adapter ID  For a Fibre Channel   FC  connection  the host adapter ID is the FC host bus adapter  HBA  worldwide port  name  WWPN   For an iSCSI connection  the host adapter ID is the host iSCSI qualified  name  IQN   To add a WWPN or IQN to a host definition  right click the host and select  Add Port from the menu  as shown in Figure 4 62     Edit  Delete    Create a Cluster with Selected Hosts  Move to Cluster    Add Port    Limit Traffic by Perf Class  Limit Traffic by new Perf Class    Modify LUN Mapping  View LUN Mapping    Show Statistics  Properties    Figure 4 62 Add port to host definition       Chapter 4  IBM XIV Storage Management software 165    7  When the Add Port window shown in Figure 4 63 opens  select port type of FC or iSCSI  from the drop down menu     In this example  an FC host is defined  Add the WWPN for HBA1  If the host is correctly  connected and has completed a port login to the storage area network  SAN  switch at  least once  the WWPN is shown in the drop down list box  Otherwise  you can manually  enter the WWPN into the Port Name field  Adding ports from the drop down list is less  prone to error and is the best method  However  if hosts have not yet been connected to  the SAN or zoned  then manually adding the WWPNs is the only option        Add Port    System  AIW
85.  September 2013   ica  Sun Mon Tue Wed Thu Fri Sat  ERENER ESENE   8 1C  00   44    i2   i   44    15   46    17   Cie   19   20   21     22     23    24   25    26    27    28     28    30        Select  September 2013               Figure 6 18 Custom date and time selector    IBM XIV Storage System Architecture and Implementation    Another interesting view of XIV Storage System performance in the XIV Storage  Management GUI can be found by selecting the icon of an XIV Storage System disk drive  found in the lower left corner of the XIV Storage Management GUI  as shown in Figure 6 19     Data Modules   Disks Statuses          ios_sec      2 r   g  D  E 3          K ka   S F    y      3         F     gt  079    in a a       Sep 19  2013        N  wv  g      ft  t  9       O   e     o   D  4           es a 2  2     38       S g GF                rar     gg C  ios_kbytes_avg G  ios_sec     _  read_kbytes_avg    reads_sec    Figure 6 19 Disk performance view    og re       S Zc    Uestaye_YUCuT   vat          This disk performance view shows a bar chart of every disk drive in the XIV Storage System  configuration  There are several different performance metrics from which to choose  Here is  an explanation of what each one means     ios_kbytes_ave Average I O size per disk   read_kbytes_ave Average I O read size per disk     destage_icp_queue_size Queue size of the pending Instant Copies  ICPs  we have for a  disk  This metric is related to snapshot and write workload     desta
86.  Signature   Windows NT      NewRequest   Subject    CN xivhostl xivhostlldap storage  tucson  ibm com   KeySpec   1    KeyLength   1024     Can be 1024  2048  4096  8192  or 16384      Larger key sizes are more secure  but have    a greater impact on performance   Exportable   TRUE   MachineKeySet   TRUE   SMIME   False   PrivateKeyArchive   FALSE   UserProtected   FALSE   UseExistingKeySet   FALSE   ProviderName    Microsoft RSA SChannel Cryptographic Provider   ProviderType   12   RequestType   PKCS10   KeyUsage   Oxa0     EnhancedKeyUsageExtension   OID 1 3 6 1 5 5 7 3 1 3  this is for Server Authentication    C  SSL  gt  certreq  new xivhostl cert_req inf xivhostl_ cert_req pem  C  SSL  gt     Appendix B  Additional LDAP information    449    Signing and importing a Windows server certificate   After the CER is generated  xivhost1_cert_req pem   you must send the request to the  certificate authority to be signed  For more information about signing this certificate  see     Signing a certificate for the xivhost1 server    on page 462  After the signed certificate is  returned  you must import the certificate into the local machine   s personal keystore     Example B 8 shows how to import the signed certificate by running the certreq command   Confirm that the certificate is imported correctly by running certutil     Example  B 8 Accepting the signed certificate into the local certificate keystore    C   gt certreq  accept xivhostl_ cert pem   C  SSL gt certutil  store my
87.  Storage  System performance     Important  When planning host connections to XIV Storage System  it is important to  ensure that all XIV Storage System interface modules are used     For a description of multipathing  see Chapter 1     Host connectivity     in X V Storage System   Host Attachment and Interoperability  SG24 7904  For the purposes of this book  we describe  only Fibre Channel  FC  connectivity  although the concepts are the same for both the 1 Gbps  or the 10 Gbps iSCSI host connectivity     The main multipathing goal  from a performance perspective  is for the host connectivity to  create a balance of the I O workload across all of the resources in the XIV Storage System   The best way to achieve this balance is by distributing the host physical connections evenly  across all of the interface modules  Providing host I O access to every interface module from  every host HBA has the following advantages      gt  Uses the most XIV Storage System cache    gt  Uses the most XIV Storage System processor capability to handle I O   gt  Fully uses the XIV Storage System grid architecture    gt  Minimizes the impact of a host interface hardware failure    There are two main multipathing techniques  The important point about both multipathing  configurations is that each host engages the I O services of each XIV Storage System  interface module     Experience has shown that the first multipathing configuration in Figure 6 3 on page 296 is  the best overall general purpo
88.  Storage Productivity Center can discover IBM XIV systems and all internal  components and manage capacity for storage pools  including allocated  deallocated  and  available capacity with historical trending on use  It can also receive events and define  policy based alerts based on user defined triggers and thresholds     Host Rate Limiting  Quality of service  QoS      The XIV Storage System system resources  such as storage and cache  constitute a  virtualized environment that is shared by all hosts and applications  This approach lends  itself exceptionally well to accommodate high performance requirements for multiple  applications with similar performance objectives through fair resource allocation     XIV System Code release 11 5 0 introduced Domain based  and Pool based rate limiting     In environments with applications that have various performance objectives  the   XIV QoS feature enables the client to restrict the system   s processing power allocated to  specified host applications  maximizing the power available for applications requiring the  utmost performance     Support for IPv6 and IPSec     IPv6 and IPSec are supported in XIV Gen starting with software Version 11 1 x  The IPv6  support applies only to management ports  The internal XIV addresses are still IPv4  no  change      Starting with Version 11 1 1  the XIV Gen3 offers US Government  USG  IPv6  compliance     XIV is well suited for cloud deployments     Both XIV Cloud Storage for Service Providers 
89.  Storage System Gen3 data module connections that are used    Model 114 unique components  Data modules and interface modules in the Model 114 have the components described in the  subsections that follow     Quad core processor    The XIV Storage System Gen3 Model 114 processor is a third generation Intel Nehalem  micro architecture Westmere 32 nm processor with a 2 4 GHz clock speed  There is one  processor per module  This processor features turboboost and hyperthreading and is more  energy efficient than its predecessors  This processor is specifically sized to handle the I O  workload required in the XIV Storage System Gen3 modules     DDR3 memory model 114    XIV Storage System Gen3 has DDR3 memory that is twice the speed of its DDR2  predecessor  Each XIV Storage System Gens has 24 GB  which is 8 GB more memory than  the model A14  DDR3 also uses less power than DDR2  At 24 GB per module  a full XIV  Storage System Gen3 has 360 GB of memory     Part of the memory is used as module system memory  the rest is used as cache memory   Cache consists of both read cache  where the module holds previously read data and  pre fetched data  plus write cache  where the module holds data that is being cached before  being de staged to disk     When the optional SSD cache extension is installed  Model 114 software 11 1 0 or later    each module gets an extra 400 GB capacity for use as an extension of the DDR3 cache     Power supplies   The modules are powered by a redundant power su
90.  The host  however  sees exactly 19 737 900 blocks  When  Volume 1 is created  the system does not initially allocate any hard capacity  At the moment  that a host writes to Volume 1  even if it is just to initialize the volume  the system allocates  17 GB of hard capacity  The hard capacity allocation of 17 GB for Volume 1 is shown in  Figure A 2  although clearly this allocation is never fully used if the host defined capacity  remains only 10 GB     Unlike Volume 1  Volume 2 has been defined in terms of gigabytes and has a soft capacity  allocation of 34 GB  which is the amount that is reported to any hosts that are mapped to the  volume  In addition  the hard capacity consumed by host writes has not yet exceeded the   17 GB threshold  Therefore  the system has so far only allocated one increment of 17 GB  hard capacity  The hard capacity and the soft capacity allocated to a regular storage pool are  equal by definition  Therefore  the remaining 17 GB of soft capacity assigned to Volume 2 is  effectively preserved and remains available within the pool   s hard space until it is needed by  Volume 2  Because the pool   s soft capacity does not exceed its hard capacity  there is no way  to allocate soft capacity to effectively    overcommit    the available hard capacity     Appendix A  Thin provisioning conceptual examples 427    The final reserved space within the regular storage pool that is shown in Figure A 2 on   page 427 is dedicated for snapshot use  The diagram shows
91.  Tivoli Storage Productivity Center     Configuration Utility Description   Probe the Standard subsystem group     Configure Devices Enabled IV View Job History    Job Management    Reporting What to PROBE   When to Run   Alert       Topology Available  Current Selections      Monitoring ae omputer Groups Storage Subsystem Groups     Probes Computers    TPCUser  Subsystem Standard Group   TPCUser  Computer Advanced Probe Clusters XI    2810 1300203 IBM     TPCUser  Computer Basic Probe Fabric Groups  I   2810 6000105 IBM     TPCUser  Computer Standard Probe Fabrics   gt  TPCUser Default Probe Tape Library Groups  TPCUser  Fabric Advanced Probe Tape Library   gt  TPCUser  Fabric Basic Probe Storage Subsystem Groups    TPCUser  Fabric Standard Probe Storage Subsystems    TPCUser Subsystem Advanced Probe  All Storage Subsystems   gt  TPCUser  Subsystem Basic Probe    a8 T   2810 1300203 IBM  g PCUser  Subsystem Standard Probe       T   2810 6000105 IBM    TPCUser  Tape Advanced Probe Hypervisors   gt  TPCUser  Tape Basic Probe   TPCUser  Tape Standard Probe     TPC Server Probes   gt  Storage Resource Group Management     Analytics     Alerting    Figure 7 73 Verifying the probe details                                                                                E A E                                                    Performance monitoring  XIV Storage System Software v10 2 2 or later can use the performance monitoring feature in  Tivoli Storage Productivity Center v4 2  You 
92.  Version 11 2 include a new iSCSI  implementation with significant performance enhancements      gt  Network protocol processing has been moved from the Linux kernel to a user space  application based on the open source Lightweight IP  LWIP  stack  This change results in  significant CPU processing efficiencies      gt  Using multiple Transmission Control Protocol  TPC  connections  iSCSI sessions  to  provide higher throughput      gt  Provides more robust host connectivity during XIV hot upgrade     Model 114 and Model 214  1 GbE     There are up to 22 iSCSI ports available for iSCSI over IP Ethernet services  The exact port  count depends on the number of active interface modules  See Figure 3 2 on page 65 for  details about active interface modules  These ports support 1 Gbps Ethernet network  connection each  These ports connect to the user   s IP network through the XIV patch panel  and provide connectivity to the iSCSI hosts  See Figure 3 26 on page 92 for more details  about the cabling of these ports     You can operate iSCSI connections for various uses      gt  As an iSCSI target that attached hosts can connect to using the iSCSI protocol    gt  As an iSCSI initiator for remote mirroring when connected to another iSCSI port    gt  As an iSCSI initiator for data migration when connected to a iSCSI storage system from  another vendor    For each iSCSI IP interface  you can define these configuration options      gt  IP address  mandatory    gt  Network mask  mandator
93.  XIV Storage System configuration     There can always be more than one performance problem  It is best to define these  performance issues separately but to note if they are related     Data collection    The next thing to do is to collect good data  The data collected typically begins slightly before  the problem begins and ends slightly after the performance problem duration  In this way   ideally  it is possible to see the abnormalities in the performance data  elevated response  times  for example  begin and end  This task is fairly easy to do with the XIV Storage  Management GUI performance statistics     Typically  a performance issue is being experienced from a particular application server  so it  is common to filter on one host or the specific volumes associated with that host     Performance analysis   The first thing to consider when evaluating performance is the overall nature of the I O  characteristics  These characteristics typically include the IOPS  throughput measured in  MBps  and latency measured in milliseconds  ms   Our sample XIV Storage System workload  is shown in Figure 6 31     All Interfaces   Host p6 570 lab 2v19    Read   Write    IOPS  35     ooo  30 000  25 000  20 000  15 000  10 000  5 000  12 30 12 45 13 00 13 15 13 30 13 45 14 00 1 15 00 15 15 15 30 15 45 16 00 16 15 16 30    4 15 14 30 14 45  16 Sep 2011             All Interfaces   Host p6 570 lab 2v19 All Interfaces   Host p6 570 lab 2v19        Read   Write           Latency  ms  Write
94.  XV    xvi IBM XIV Storage System Architecture and Implementation    IBM XIV Gens Storage System  overview    The IBM XIV Gen3 Storage System is a high end disk storage system  It provides secure   self service  scalable  enterprise class storage with a self healing  data protected  cloud centric foundation that is ideal for public  private  or hybrid clouds  The XIV cloud  economics provide world class business continuity for applications that require zero tolerance  for downtime  It   s predictable  consistent  high performance design enables organizations to  take control of their storage and gain business insights from their data  The storage system  contains proprietary and innovative algorithms that offset hardware malfunctions  minimize  maintenance  provide flexibility  and drive massive parallelism  XIV provides a high service  level for dynamic and mixed workloads     This chapter provides a high level overview of the XIV Gens  It covers the following topics      gt  1 1     Introduction    on page 2    gt  1 2     New features in XIV    on page 3    gt  1 3     Total cost of ownership    on page 4    gt  1 4     XIV Gen3 Storage System models and components    on page 5   gt  1 5     XIV Gens design features and functions    on page 6    gt  1 6     XIV Storage System Software    on page 9    gt  1 7     Host support    on page 15       Copyright IBM Corp  2014  All rights reserved  1    1 1 Introduction    The XIV Gens Storage System architecture delivers performa
95.  a  negligible impact on performance         There are no unusable pockets of capacity known as orphaned spaces      gt  When the system is scaled out through the addition of modules  a new data distribution is  created  where just a minimum number of partitions are moved to the newly allocated  Capacity to arrive at the new distribution table     The new capacity is fully used within a few hours and with no need for any administrative  intervention  Therefore  the system automatically returns to a state of equilibrium among  all resources      gt  Ifa drive or module fails or is phased out  a new XIV Storage System data distribution is  created where data in non redundant partitions is copied and redistributed across the  remaining modules and drives     The system rapidly returns to a state in which all partitions are again redundant because  all disks and modules participate in re creating the necessary partitions     Chapter 2  IBM XIV Storage System logical architecture and concepts 29    2 4 3 Multitenancy    Today  many organizations are moving toward cloud based infrastructures  where both  compute and storage resources are viewed as commodity services  Users of these resources  expect a pay as you go model  where the resources that they require are rapidly available  when needed  but they pay only for the resources that they require  nothing more  For storage  providers  this shift represents a significant challenge  From both capital expenditure and  resource manage
96.  a colon      such as this example     2001 0DB8 0000 0000 0008 0800 200C 417A       Shorthand rules can be applied   2001 DB8 0 0 8 800 200C 417A   Leading zeros within a 16 bit value can be removed     2001 DB8   8 800 200C 417A     One group of consecutive zeros replaced with double colon         IPv6 is supported by the IBM XIV Storage System   IPv6 support is provided for XIV Management and VPN ports only and is supported for  network functions such as DNS  SMTP  Lightweight Directory Access Protocol  LDAP   and  Simple Network Management Protocol  SNMP      Note  IPv6 address support is provided by both the XIV GUI and XCLI  For more details   see Chapter 7     Monitoring    on page 327     These specific functions do not support IPv6  only IPv4 is used       gt  Technician notebook port   iSCSI port configuration   Host iSCSI connections   Mirroring iSCSI connections   Support Center and XRSC communication    YY vV Yy    IBM XIV Storage System Software v11 1 1 and later offers US Government IPv6  USGv6   compliance     Chapter 3  IBM XIV architecture  components  and planning 103    For more information about how to configure IPv6  see 5 3     Configuring IPv6 addresses    on  page 215     3 2 3 Management connectivity    XIV Storage System is managed through three IP addresses over Ethernet interfaces on the  patch panel to be resilient to two hardware failures  You must have three Ethernet ports  available for management  If you require management to be resilient to 
97.  a storage pool  and the volumes it contains  can be associated with only a  single domain  users  and user groups   hosts  and host clusters   and remote mirror  targets can be associated with multiple domains     From a conceptual perspective  an end user   s interactions  for example  those of a storage  administrator  with the XIV Storage System can be viewed as actions performed upon  objects  Examples of these object action pairs might include     M    Creating a storage pool    gt  Resizing a volume    gt  Mapping a volume to a host    gt  Viewing the properties of a pool or volume    The XIV Storage System uses a role based access control  RBAC  model to control what  actions a specific system user can perform  The predefined roles available in the system are  discussed in more detail in    User roles    on page 221 and in    LDAP user roles    on page 266     30 IBM XIV Storage System Architecture and Implementation    Multitenancy  through the use of domains  introduces the ability to control what objects a  specific system user can perform those actions upon     Note  When considering multitenancy  do not confuse the use of the term domain with a  fully qualified domain name  FQDN  or directory services domain  In the context of  multitenancy  a domain is simply a logical construct that allows partitioning  logically  not  physically  of XIV Storage System resources     It is important to understand that the implementation of this domain construct within the XIV  S
98.  adapter  HBA  queue depth      Logical volume manager striping  Operating system tunables     gt  Quality of service  QoS     6 2 1 Sizing    By far the most important aspect of XIV Storage System performance is to properly size the  system based on performance requirements  Each XIV Storage System configuration  from  six modules to 15 modules  has different performance capabilities  We call this  performance capacity     Performance capacity is different from the data storage capacity associated with each   XIV Storage System configuration  If the data storage requirement indicates that a 12 module  XIV Storage System is needed to store all the data and that a 15 module system is required  to satisfy the performance requirements of the applications  then a 15 module system is  required     In addition to the number of modules  another way to properly balance the needs of both  Capacity and performance in tandem is to appropriately select the hard disk drive  HDD   capacity of the XIV Storage System configuration  However  for purposes of planning for  future storage needs  it is also important to remember that the IBM XIV systems support  homogeneous drive configurations only  Therefore  ensure that the initial selection of drive  Capacity is viable in terms of forecasting capacity growth requirements     294 IBM XIV Storage System Architecture and Implementation    Note  Gen3  Model 114  systems running Version 11 1 1 or later of the XIV system  software support 1 TB of c
99.  administrator rights   From the  Access menu  click Users  as shown in Figure 5 74  In our scenario  we create a user  group called itso _app01 group  The user groups can be selected from the Access menu   padlock icon               Figure 5 74 Select user groups    2  Inthe User Groups window  to add a user group  either click the Add User Group icon   shown in Figure 5 75  in the menu bar  or right click in an empty area of the User Groups  table and select Add User Group from the menu     so  _     F     le  xiv XIV Storage Management oS    systems   Actions   View   Tools   Help    ih  Lt  amp   Add User 3   Add User Group      A sOAN Systems  8   gt  Tucson Lab  3   gt    Users            Category Phone    Ungrouped      Add User j  Add User Group    Configure LDAP  l LDAP Wizard  se Export  Eg    Figure 5 75 Add User Group selection       Chapter 5  Security 271    3  In the Add User Group window  enter a meaningful group name  specify a role for LDAP  role mapping  as described in 5 7 4     LDAP role mapping    on page 247  and click Add   Figure 5 76   To avoid potential conflicts with already registered user groups  the XIV  Storage System verifies the uniqueness of the group name and the role  If a user group  with the same name or the same role exists in the XIV Storage System repository  the  attempt to create a user group fails and an error message is displayed        Add User Group    System  XIV 1310062 Dantooine 7   Name     LDAP Role     Full Access         
100.  ae 7 2  Belgacom E Trust Primary CA Belgacom E Trust Primary C4  i Totermegiate Coz Unieation Aue NOrEEs 2  caw HET SecureNet CA Class 4 C amp W HET SecureNet CA Class A  ia rusted Pueneta  E  Caw HET SecureNet CA ClassB CAW HKT SecureNet CA Class E  J Untrusted Certificates   ES  caw HET SecureNet c   Root C amp M HET SecureMet CA Root      Third Party Root Certification Authorities   9 Trusted People E caw HET SecureNet CA SGC Root C amp W HKT SecureNet CA SGC Root     EJ Other People    Certisign   Autoridade Certificadora   ACZ fisign   Autoridade Certificador      gt  Certificate Enrollment Requests E certisign   Autoridade Certificador    Certisign   Autoridade Certificador   E SPC E  Certisign Autoridade Certificadora    Certisign Autoridade Certificadora   E certisign Autoridade Certificadora    Certisign Autoridade Certificadora  class 1 Primary CA Class 1 Primary CA   E class 1 Public Primary Certification    Class 1 Public Primary Certification  class 1 Public Primary Certification    Class 1 Public Primary Certification  E class 2 Primary CA Class 2 Primary CA   E class 2 Public Primary Certification    Class 2 Public Primary taal    6   E   H   E   E   E   H   E     TA Clee 9 Mohli  Meira me eT ae biFL   lt br lee n Coble Meina sen oT ee bie kin    Trusted Root Certification Authorities store contains 103 certificates         Figure B 10 Windows certificate MMC snap in  local computer     Generating a Windows Server certificate request   You must use the certreq
101.  alternate credentials     System information menu Displays details about the current system  To change the  displayed details  click the small triangle menu at the left of  this menu  The following details can be displayed     eHardware details   eSystem Time  The time on the XIV system   eLocal Time  Time on the management workstation  eSystem software version    Hierarchical navigation Provides a hierarchical view of the current system or  group  with contextual drop down menus    Current systems indicator Indicates the currently selected systems or group    Status bar and Status area These indicators are at the bottom of the main window of    the System view  This area indicates the overall  operational status of the currently selected IBM XIV  Storage System or group of systems  The values displayed  are in the context of the current systems     The  eft indicator shows the amount of soft or hard storage  Capacity currently allocated to the storage pools and  provides alerts when certain capacity thresholds are  reached  Click the indicator to toggle between soft and  hard values  As the physical  or hard  capacity consumed  by volumes with the storage pool passes thresholds  the    124 IBM XIV Storage System Architecture and Implementation    color of this meter indicates that extra hard capacity might  need to be added to one or more storage pools     The center indicator displays the current number of I O  operations per second  IOPS      The right indictor shows the 
102.  any of the information you supply in any way it believes appropriate without incurring  any obligation to you     Any performance data contained herein was determined in a controlled environment  Therefore  the results  obtained in other operating environments may vary significantly  Some measurements may have been made  on development level systems and there is no guarantee that these measurements will be the same on  generally available systems  Furthermore  some measurements may have been estimated through  extrapolation  Actual results may vary  Users of this document should verify the applicable data for their  specific environment     Information concerning non IBM products was obtained from the suppliers of those products  their published  announcements or other publicly available sources  IBM has not tested those products and cannot confirm the  accuracy of performance  compatibility or any other claims related to non IBM products  Questions on the  capabilities of non IBM products should be addressed to the suppliers of those products     This information contains examples of data and reports used in daily business operations  To illustrate them  as completely as possible  the examples include the names of individuals  companies  brands  and products   All of these names are fictitious and any similarity to the names and addresses used by an actual business  enterprise is entirely coincidental     COPYRIGHT LICENSE     This information contains sample application pr
103.  application perspective  By first grouping the application volumes into a consistency  group  it is possible to later capture a consistent state of all volumes within that group at a  specified point in time using a special snapshot command for consistency groups     Issuing this type of a command results in the following process     1  Complete and destage writes across the constituent volumes    2  Suspend I O activity simultaneously across all volumes in the consistency group   3  Create the snapshots    4  Resume normal I O activity across all volumes     The XIV Storage System manages these suspend and resume activities for all volumes within  the consistency group     Consistency  Additional mechanisms or techniques  such as those provided by the  Microsoft Volume Shadow Copy Service  VSS  framework  might still be required to  maintain full application consistency from a host system perspective  For more information   see IBM XIV Storage System Business Continuity Functions  SG24 7759     Chapter 2  IBM XIV Storage System logical architecture and concepts 35    2 6 3 Storage pool relationships and rules    Storage pools facilitate the administration of relationships among logical volumes  snapshots   and consistency groups     Storage pools have the following size considerations      gt     For a fully populated XIV Storage System equipped with 1 TB  2 TB  3 TB  or 4 TB drives   the storage pool size can range from 17 GB  the minimum size that can be assigned to a  lo
104.  are focused on the effects that these  redistribution actions have on the storage I O performance seen by the application server  For  a fuller description of data rebuild and redistribution  read 2 10 2     Preserving data  redundancy  Rebuilding and redistributing    on page 51     When  for instance  an XIV Storage System disk fails  the storage system takes that drive  offline  identifies the actual data partitions that the drive contained  and locates the copy of  those data partitions within the rest of the XIV drives  The XIV Storage System then makes a  copy of only that actual data and moves that data evenly across each of the remaining disk  drives  The performance impact during this data redistribution is negligible to the I O  characteristics that an XIV can provide to application servers    A redistribution will not take place for a flash drive failure because the optional flash drives are  not involved in data retention or redundancy  They are merely used as read cache     Consider a fully populated XIV Storage System that experiences this drive failure  In this  example  the XIV reads data from 168 drives  Each drive contains an equal portion of the  mirror data copies of the data from the failed drive  The XIV reads data from 168 drives  because there is no data from the failed drive in the same XIV module that contains the failed  drive  The amount of data from the failed drive on each of the remaining 168 drives  represents a small percentage of the total d
105.  around the commas  If  any of these four events are logged  the XIV Storage System uses the    relay    destination to  issue the notification     Example 7 23 Setting up an access notification rule using the XCLI    C  XIV gt xcli  c  XIV 6000050  rule create rule test rule   codes ACCESS OF USER GROUP _TO CLUSTER _REMOVED ACCESS OF USER GROUP_TO HOST REMOVED    sACCESS TO CLUSTER GRANTED TO USER _GROUP ACCESS TO HOST GRANTED TO USER GROUP  dests email dest   Command executed successfully     A simpler example is setting up a rule notification for when a user account is modified   Example 7 24 creates a rule on the XIV Storage System called ESP that sends a notification  whenever a user account is modified on the system  The notification is transmitted through  the relay destination     Example 7 24 Create a rule for notification with the XCLI    C  XIV gt xcli  c  c  XIV 6000050  rule create rule user_ update codes USER UPDATED  dests email dest  Command executed successfully     The same rule can be created in the XIV Storage Management GUI  For more details about  configuring the system to provide notifications and setting up rules  see Chapter 7      Monitoring    on page 327     350 IBM XIV Storage System Architecture and Implementation    7 2 Monitoring using the IBM XIV Mobile Dashboard    IBM has released a Mobile Dashboard application that can be used to securely monitor the  performance and health of your XIV Storage System  This application is available for the  
106.  as a result of a flash device failure  All the primary  partitions on the module with the failed flash device remain the primary partition  But because  of the reduced extended flash cache  the specific module limits its caching duties     56 IBM XIV Storage System Architecture and Implementation    Redistribution after adding modules or drives    The redistribution process that happens after a rebuild is the same process that results from  the following events      gt  The replacement of a failed disk drive or module following a rebuild  which is also Known  as a phase in     gt  The addition of one or more modules to upgrade the capacity of the system    Important  The client   s storage administrators cannot perform a phase in to replace a  failed disk or module  These operations must be performed by IBM technicians  Therefore   itis not a good idea to purposely pull an XIV Storage System disk drive to test the  redundancy mechanisms  because storage administrators are not authorized to replace a  drive back into the system     The XIV Storage System data distribution has the following characteristics      gt  The redistribution process is triggered by the phase in of a new drive or module and differs  from a rebuild or phase out in the following ways         The system does not need to create secondary copies of data to reinstate or preserve  full data redundancy         The concentration of data on each physical disk decreases    gt  The redistribution is dependent on t
107.  as logical  or master  volumes     Snapshot reserve  The system preemptively deletes snapshots if the snapshots fully  use the allocated space of the storage pool  Therefore  you must ensure that adequate  space is allocated for snapshot reserve when defining a storage pool     The snapshot reserve must be a minimum of 34 GB      gt  Snapshots are automatically deleted only when there is inadequate physical capacity  available within the context of each storage pool  This process is managed by a snapshot  deletion priority scheme  Therefore  when the capacity of a storage pool is exhausted   only the snapshots that are in the affected storage pool are deleted in order of the deletion  priority     Important    Snapshot deletion occurs automatically and older snapshots will be deleted without  warning whenever a new snapshot is taken and space is insufficient to hold new volume  or snapshot data     To control this behavior  monitor the following events    gt  STORAGE _POOL_VOLUME_USAGE_INCREASED   gt    STORAGE_POOL_SNAPSHOT_USAGE_INCREASED    Then  increase the pool size accordingly     2 7 Capacity allocation and thin provisioning    Thin provisioning is a central theme of the virtualized design of the XIV Storage System  because it uncouples the virtual  or apparent  allocation of a resource from the underlying  hardware allocation     The XIV Storage System implementation of thin provisioning provides these benefits      gt  Capacity associated with specific applications
108.  authenticated is now displayed in color with an indication of its  status     Chapter 5  Security 239       MIV 05 G3 T82    GF MIV 02 1310114 Go    IOPS  1823    Sydney Demo XIV_28       XIV 6000050  IOPS  46             Figure 5 42 Manual user password synchronization among multiple XIV systems    Direct mode GUI limitations for managing multiple systems    The XIV System Management GUI  Version 4 1 and higher  supports managing multiple XIV  systems in a single GUI instance with the following limits      gt  The maximum number of groups is 12    gt  The maximum number of systems within a group is 12    gt  The maximum number of managed systems is 144     Important  You are advised to use Hyper Scale Manager when managing more than 40  XIV systems  For more information  see the IBM Redpaper titled  BM Hyper Scale for the  XIV Storage System  REDP 5053     It is possible to control more than 144 XIV Systems on a single workstation by creating  another user profile  and starting another instance of the GUI      gt  Using multiple profiles for accessing a different set of systems from the same workstation       Access each profile by a command line switch  where  lt user_dir gt  is the profile name   Xivgui exe  h  lt user_dir gt         Multiple instances of the GUI can be opened  each with a different profile  Figure 5 43  on page 241   which can be useful for the following purposes     e Managing more than 144 XIV Systems  e Managing different XIV systems using different c
109.  be  replaced     However  as implemented in XIV Storage System  the SMART diagnostic tools  coupled with  intelligent analysis and low tolerance thresholds  provide an even greater level of refinement  of the disk behavior diagnostic tests and the performance and reliability driven reaction  For  example  the XIV Storage System measures the specific values of parameters including  but  not limited to these possibilities      gt  Reallocated sector count   f the disk encounters a read or write verification error  it  designates the affected sector as    reallocated    and relocates the data to a reserved area  of spare space on the disk  This spare space is a parameter of the drive and is not related  in any way to the system reserve spare capacity that is described in    Global spare  Capacity    on page 34      gt  Disk temperature  The disk temperature is a critical factor that contributes to premature  drive failure and is constantly monitored by the system      gt  Raw read error  The raw read error count provides an indication of the condition of the  magnetic surface of the disk platters and is carefully monitored by the system to ensure  the integrity of the magnetic media itself      gt  Spin up time  The spin up time is a measure of the average time that is required for a  spindle to accelerate from zero to 7200 rpm  The XIV Storage System recognizes  abnormal spin up time as a potential indicator of an impending mechanical failure     Likewise  for additional early
110.  beyond  the scope of this book     Chapter 5  Security 265    LDAP user roles    There are predefined user roles  also referred to as categories  used for day to day operation  of the XIV Storage System  In the following section  we describe predefined roles  their level  of access  and applicable use  The roles are as follows      gt  storageadmin    The storageadmin  Storage Administrator  role is the user role with the highest level of  access available on the system  A user assigned to this role can perform changes on any  system resource except for maintenance of physical components or changing the status of  physical components  The assignment of the storageadmin role to an LDAP user is done  through the LDAP role mapping process  For a description  see 5 7 4     LDAP role  mapping    on page 247      gt  applicationadmin    The applicationadmin  Application Administrator  role provides flexible access control over  volume snapshots  Users that are assigned to the applicationadmin role can create  snapshots of specifically assigned volumes  perform mapping of their own snapshots to an  assigned host  and delete their own snapshots  The user group to which an application  administrator belongs determines the set of volumes that the application administrator is  allowed to manage  If a user group is defined with access _all    yes     application  administrators who are members of that group can manage all volumes on the system   The assignment of the applicationadmin ro
111.  certificate   subject  CN xivhostl xivhostlldap storage tucson ibm com  issuer  C US ST Arizona L Tucson 0 xivstorage CN xivstorage emai Address ca xivsto  rage org    New  TLSv1 SSLv3  Cipher is RC4 MD5    452 IBM XIV Storage System Architecture and Implementation    Server public key is 1024 bit  SSL Session    Protocol   TLSvl   Cipher   RC4 MD5   Session ID  9E240000CE9499A4641F421F523ACC347ADB91B3F6D3ADD5F91E271B933B3F4F   Session ID ctx    Master Key   F05884E22B42FC4957682772E8FB1CA7772B8E4212104C28FA234F10135D88AE496187447313149F2E  89220E6F4DADF3   Key Arg   None   Krb5 Principal  None   Start Time  1246314540   Timeout   300  sec    Verify return code  0  ok     Attention  To complete the configuration of SSL for the Active Directory  you must reboot  the Windows server     Basic secure LDAP validation using the ldapsearch command   After you have confirmed that the SSL connection is working  you must confirm that you are  able to search your LDAP directory using LDAP on a secure port  This action confirms that  the LDAP server can communicate using an SSL connection     In our example  we use the OpenLDAP client for SSL connection validation  A CA certificate  needs to be added to the key ring file used by the OpenLDAP client  The TLS_CERTS option  in the OpenLDAP configuration file  typically   etc openldap 1dap conf  specifies the file that  contains certificates for all of the certificate authorities the client recognizes  See   Example B 10     Example  B 10 T
112.  command to generate a certificate request  The certreq command  uses a text instruction file  which specifies the attributes needed to generate a certificate  It  contains attributes such as the subject   s common name  certificate key length  and additional  key usage extensions  Active Directory requires that the certificate meet the   following requirements      gt  The private key and certificate for the local machine must be imported into the local  computer s personal keystore      gt  The fully qualified domain name  FQDN  for the Active Directory must be in the common  name  CN  in the subject field or DNS entry in the subject alternative name extension      gt  The certificate must be issued by a CA that the Active Directory server and the XIV  Storage System trust      gt  The certificate must contain the enhanced key usage extension that specifies the server  authentication object identifier  OID  1 3 6 1 5 5 7 3 1  This OID indicates that the  certificate is used as an SSL server certificate     IBM XIV Storage System Architecture and Implementation    Example B 7 shows the text instruction file used to generate the certificate for the  xivhostlldap storage tucson ibm com domain controller  The subject field is set to  CN xivhost1 xivhostlldap storage tucson ibm com  which is the FQDN of the domain  controller  Use the certreq command to generate the certificate request file     Example  B 7 Text instruction file for certificate request generation     Version    
113.  create a volume by clicking Disk  Manager     Storage Subsystem  and then click Create Volumes to start the Volume  Create wizard     The Tivoli Storage Productivity Center XIV user ID must have the storageadmin authority to  create volumes     Tivoli Storage Productivity Center web based GUI    Tivoli Storage Productivity Center can be accessed by using a web browser  This feature is  part of the normal installation and creates a link in the All Programs menu named Tivoli  Storage Productivity Center web based GUI  This opens a browser window using a link  such  as https   ipaddress  9569 srm Login  jsp  where ipaddress is the address of the Tivoli  Storage Productivity Center server     This new GUI interface  available with Tivoli Storage Productivity Center 5 1  offers the now  common look and feel already available with other IBM Storage System interfaces   Convenient links to related information make navigation quick and easy  The following details  give you an overview of the features that are available in the new web based GUI as it relates  to the XIV Storage System     The Home   Dashboard window gives a general view of the current configured resources and  their status  From this window  you can select various options for displaying more information   as depicted in Figure 7 86     Logout               Home   Dashboard v       Dashboard           a  os       A    TYPETVISOTS 49      Es         SV 7  R                           wt           WF       bh bh Ue Ooh OR
114.  creates a user group  using the user_group create XCLI  command as follows     user_group create user _group app01 group Idap role  cn app01_admins   cn Users dc itso dc storage  dn ibm  dc com       IBM XIV Storage System Architecture and Implementation    After the LDAP administrator creates the user account and assigns the app01_administrator  value to the MemberOf attribute  the user can be authenticated by the XIV Storage System   The role assignment and group membership inheritance for a newly created user is shown in  Figure 5 49     XIV System LDAP Server          LDAP configuration  ldap_config_set  User definition    xiv_group_attrib  MemberOf MemberOfF     cn app01_admins       attribute name   attribute value                          User group definition   Name  cn app03_ group             User group definition   Name  cn app02_group                   User group definition   Name  app07_group  Ldap_role  cn app01_admins                compare strings                Strings match       Assign user to applicationadmin role  User becomes part of app01_ group  user group                Figure 5 49 Assigning an LDAP authenticated user to the applicationadmin role    If the XIV Storage System cannot find a match for the value assigned to the Member Of attribute  of a user  the user is denied system access     5 8 Defining LDAP on the XIV Storage System    This section describes how to configure the XIV Storage System in an existing LDAP  environment     Important  Whe
115.  downs are intended for securing a frame weighing 1134 kg  2500 Ibs  per rack   These tie downs are designed to secure the rack on either a non raised floor or a raised floor  installation     IBM has made every effort to conduct limited tests  but not all situations are tested  and the  drawings and data are provided on an as is basis  with no warranty of any kind  express or  implied  Rather  IBM has provided the information to help procure the parts needed  You can  either install the design or request IBM to install the design as a service     For more details  see the IBM XIV Storage System Gen3 Models 281x 11x and 281x 21x  Planning Guide  SC27 5412     Rear door heat exchanger    The rear door heat exchanger is an optional water cooled device that is mounted on the rear  of an XIV Storage System to cool the air that is heated and exhausted by devices inside the  rack  A supply hose delivers chilled water to the heat exchanger  A return hose delivers warm  water back to the water pump or chiller  referred to as the secondary cooling loop   The  primary cooling loop supplies the building chilled water to secondary cooling loops  air  conditioning units  and so on  The hoses for the secondary cooling loop are not included with  this option     The XIV Storage System Gens rack that is installed with this option can be on a raised floor  or a non raised floor  The required planning for the rear door heat exchanger is extensive   Details can be found in the IBM XIV Storage S
116.  equivalent to the logical configurations that are  suggested for Fibre Channel networks  The following options are available      gt  Redundant configuration     Each module connects through two ports to two Ethernet switches  and each host is  connected to the two switches  This design provides a network architecture resilient to a  failure of any individual network switch or module      gt  Single switch configuration   A single switch connects all modules and hosts    gt  Single port host solution   Each host connects to a single switch  and a switch is connected to two modules     IP configuration   The configuration of the XIV Storage System iSCSI connection is dependent on your network   In the high availability configuration  the two client provided Ethernet switches used for  redundancy can be configured as either two IP subnets or as part of the same subnet  The  XIV Storage System iSCSI configuration must match the client   s network  You must provide  the following configuration information for each Ethernet port      gt  IP address   gt  Netmask   gt  MTU  optional  depending on your network   s MTU     MTU configuration is required if your network supports an MTU that differs from the  standard one  The largest possible MTU must be specified  From the XIV Storage System   with software Version 11 2 or later  the largest MTU size is increased to 9000  If the iSCSI  hosts are on another subnet than the XIV Storage System  a default IP gateway per port  must be spe
117.  from the system   s global  available soft and hard capacity        Thin Provisioning     System Hard and Soft Size with Storage Pools                                                     For a Thin Storage Pool  the system  The system allocates the amount of space allocates the amount of soft space  requested by the administrator in increments requested by the administrator  of 17GB  independently from the hard space   Regular Stora Thin Storage Poo  Pool Soft Size Unallocated  DANS DAS A  z          gt  x  g Enu  D  D   e    l    System Soft Size      P    E   gt           gt  T l System Hard Size    O  S a    Oo ann  V  2  o  SS  al y y  Regular Storage Thin Storage Pool Unallocatd  Pool Hard Size       For a Thin Storage Pool  the system allocates only the amount  of hard space requested by the administrator  This space is  consumed as hosts issue writes to new areas of the constituent  volumes  and may require dynamic expansion to achieve the  soft space allocated to one or more of the volumes       For a Regular Storage Pool  the  system allocates an amount of  hard space that is equivalent to  the size defined for the pool by  the administrator                             Figure A 1 Thin provisioning at the system level    426 IBM XIV Storage System Architecture and Implementation    Regular storage pool conceptual example    Next  Figure A 2 represents a focused view of the regular storage pool that is shown in  Figure A 1 on page 426 and shows the division of both so
118.  get command requires various parameters to operate  The command   requires that you enter a starting or ending time point  a count for the number of intervals to  collect  the size of the interval  and the units related to that size  The time stamp is modified  by the previous time_list command  Example 6 2 provides a description of the command     Example 6 2 The statistics_get command format    statistics get   perf_class perfClassName   host HostName    host_iscsi_name initiatorName   host _fc_port WWPN   target RemoteTarget    remote fc _port WWPN   remote ipaddress IPAddress   vol VolName    ipinterface IPInterfaceName   local _fc_port ComponentId    lt  start TimeStamp    end TimeStamp  gt    module ModuleNumber   count N interval IntervalSize  resolution _unit  lt minute hour day week month gt     To further explain this command  assume that you want to collect 10 intervals  and each  interval is for 1 minute  The point of interest occurred on 16 June 2009 roughly 15 minutes  after 11 45 00  It is important to note that the statistics get command allows you to gather  the performance data from any time period     The time stamp is formatted as YYYY MM DD hh mmi ss  where the YYYY represents a  four digit year  MM is the two digit month  and DD is the two digit day  After the date portion  of the time stamp is specified  you specify the time  where hh is the hour  mm is the minute   and ss represents the seconds     Example 6 3 shows a typical use of this command     E
119.  important is the current battery charge level  A battery that is not fully charged  can be a cause of problems in case of power failure     The output of the ups_list command is broken into two lines for easier reading     Example 7 11 The ups_list command     gt  gt  ups_list     gt  gt ups_list   Component ID Status Currently Functioning Input Power On Runtime Remaining Battery Charge Level  1 UPS 1 OK yes yes 13 100   1 UPS 2 OK yes yes 21 100   1 UPS 3 OK yes yes 20 100   Last Self Test Date Last Self Test Result Monitoring Enabled UPS Status   03 13 2013 Passed yes ON LINE   03 13 2013 Passed yes ON LINE   03 14 2013 Passed yes ON LINE    Example 7 12 shows the switch_list command that is used to show the status of the  switches  An XIV Storage System second generation Model A14 has Ethernet switches  An  XIV Storage System Gen3 Model 114 reports an InfiniBand switch     Example 7 12 The switch_list command     gt  gt  switch_list  1 IB Switch 1 OK OK 0 2013 03 20 00 09 48 OK  1 IB Switch 2 OK OK 0 2013 03 20 00 09 56 OK    Power Supply  2 Problematic Fans Problematic Temperatures Problematic Voltages    OK 0 0 0  OK 0 0 0    342 IBM XIV Storage System Architecture and Implementation    The psu_list command that is shown in Example 7 13 lists all the power supplies in each of  the modules  You can show an individual power supply unit  PSU  by using the psu   parameter  With this command  you can also see the actual power consumption of the PSU   model 214 is equipped wi
120.  in each module depend on your environment  your  specific requirements in terms of resiliency  the nature of your host I O traffic  and whether  you use mirroring or not     Most illustrations in this book show ports 1 and 3 allocated for host connectivity  Ports 2 and 4  can be reserved for additional host connectivity or remote mirror and data migration  connectivity  This configuration is generally the choice for clients who want more resiliency    88     IBM XIV Storage System Architecture and Implementation        ports 1 and 3 are on separate adapters   or availability  in case of adapter firmware upgrade   one connection remains available through the other adapter   From a performance  perspective  each adapter has its own performance bandwidth capabilities and dedicated  PCle bus bandwidth  If you do not use mirroring  you can also change port 4 to a target port     Fibre Channel ports  Using more than 12 Fibre Channel ports for host connectivity does  not necessarily provide more bandwidth  A preferred practice is to use enough ports to  support multipathing  without overburdening the host with too many paths to manage  See  IBM XIV Storage System  Host Attachment and Interoperability  SG24 7904 for more  information     iSCSI connectivity    With the 10 GbE adapter that equips the Model 214  10 GbE   there are differences in iSCSI  connectivity between the Model 114  Model 214  1 GbE   and Model 214  10 GbE      In addition  improvements in the XIV Storage Software
121.  in this document that are necessary to install information technology equipment  in the client   s facilities in accordance with such applicable laws or regulations     Contact your IBM SSR for more information about connecting to a room EPO switch     Chapter 3  IBM XIV architecture  components  and planning 109    110 IBM XIV Storage System Architecture and Implementation    IBM XIV Storage Management  software    This chapter describes the tasks performed by a storage administrator to configure the  IBM XIV Storage System using the XIV Storage Management software  As of this publication   the current version of the XIV Storage Management software is Version 4 4     The chapter covers the following topics     XIV Storage Management software introduction  XIV Storage Management software installation  XIV Storage Management software use  Storage pools   Volumes   Host definition and mapping   Multitenancy   SSD caching   Scripts    Vvvvvvrvvyvy Y    Important  Illustrations in this chapter apply mostly to an IBM XIV Storage System Gens  fully configured with 2 or 3 TB disk drives     The IBM Hyper Scale Manager  which allows an administrator to monitor and configure many  systems simultaneously  is discussed in the IBM Redpaper publication titled  BM Hyper Scale  in XIV Storage  REDP 5053        Copyright IBM Corp  2014  All rights reserved  111    4 1 XIV Storage Management software introduction    The XIV Storage Software runs internally on all system modules  both Data an
122.  initially be created by the admin user only  After the admin user creates a  user account and assigns it to the storageadmin  Storage Administrator  role  then other user  accounts can be created by this storageadmin user     In native authentication mode  the system is limited to creating up to 128 user accounts  This  number includes the predefined users     220 IBM XIV Storage System Architecture and Implementation    User password    The user password is a secret word or phrase used by the account owner to gain access to  the system  The user password is used at the time of authentication to establish the identity of  that user  User passwords can be 6   12 characters long and may include these characters     a z A Z                 amp       _   52  64   I  ye         L and      The passwords must not have spaces between characters  In native authentication mode  the  XIV Storage System verifies the validity of a password when the password is assigned     Predefined users have the default passwords shown in Table 5 1 assigned at the time of XIV  Storage System installation     Table 5 1 Default passwords    Predefined user Default password    technician Predefined  Used only by the XIV Storage System technicians   xiv_development Predefined  Used only by the IBM XIV development team   xiv_maintenance Predefined  Used only by the IBM XIV maintenance team        Important  The default admin password must be changed at the time of installation to  prevent unauthorized acce
123.  is rounded up to the nearest 17 1 GB  multiple  making the actual size identical to the free space consumed by the volume   This  rounding up prevents a situation where storage space is not fully used because of a gap  between the free space used and the space available to the application     If the size is specified in GiB  the volume is specified in binary gigabytes  in multiples of 299   and is rounded up to the nearest 16 GiB multiple  which is physically the same total size as  the equivalent reported gigabyte size     Chapter 4  IBM XIV Storage Management software 157    GB versus GiB  and XIV Storage System volumes       gt  A gigabyte is a decimal multiple of a byte unit  1 GB equals 10   bytes   1 000 000 000 bytes       gt  A gibibyte is a binary multiple of a byte unit  1 GiB equals 2     bytes   or 1 073 741  824 bytes      When you create a volume on an XIV Storage System  it allocates multiples of  17 1 GB 16 GiB     The volume is logically formatted at creation time  which means that any read operation  results in returning all zeros as a response     To create volumes with the XIV Storage Management GUI  complete the following steps     1  Click the Add Volumes icon in the Volume and Snapshots view  see Figure 4 52 on  page 154  or right click in the body of the window  not on a volume or snapshot  and click  Add Volumes    The window that is shown in Figure 4 54 opens     Create Volumes  Select Pool VM UNMAF              9 466 GB Allocated i   i    1   4    
124.  mode  We still have a few unassigned  LDAP related configuration parameters in our XIV Storage System  as shown in   Example B 2     Example  B 2 Remaining XIV LDAP configuration parameters     gt  gt  Idap_ config get    Name Value   base dn   Xiv_group attrib description  third expiration event 7   version 3   user_id attrib objectSiD  current_server   use ssl no    session_cache_period  second expiration event 14    read only role Read Only  storage admin role Storage Administrator  first_expiration event 30    bind time_limit 0    The parameters are defined as follows     base dn The base DN  distinguished name   which is the parameter  that specifies where in the Active Directory LDAP repository  that a user can be located  In our example  we use     CN Users  DC xivhost1ldap DC storage  DC tucson  DC ibm  D  C com    as the base DN  see Example B 1 on page 434      current_server A read only parameter that cannot be populated manually  This  parameter is updated by the XIV Storage System after the  initial contact with the LDAP server is established     session cache period Duration in minutes that the XIV Storage System keeps user  credentials in its cache before discarding the cache contents  If  a user repeats the login attempt within session cache period  minutes from the first attempt  authentication is done from the  cache content without contacting the LDAP server for the  user credentials     bind time limit The timeout value in seconds after which the next LDA
125.  myvol_ 12 223 ITSO itso  myvol_ 13 223 ITSO itso  myvol 14 223 ITSO itso  myvol_15 344 ITSO itso       Figure 4 58 vol_list command output    To find and list a specific volume by its SCSI ID  serial value   run the following command   vol by id id 23    To create a volume  run the following command    vol create size 51 pool  ITSO Pool  vol  myvol_ 16    The size can be specified either in gigabytes or in blocks  where each block is 512 bytes   If  the size is specified in blocks  volumes are created in the exact size specified  If the size is  specified in gigabytes  the actual volume size is rounded up to the nearest 17 GB multiple   making the actual size identical to the free space consumed by the volume   This rounding    up prevents a situation where storage space is not fully used because of a gap between the  free space used and the space available to the application     The volume is logically formatted at creation time  which means that any read operation  results in returning all Zeros as a response  To format a volume  run the following command   vol_format vol  myvol_ 16     All data stored on the volume is lost and unrecoverable  If you want to bypass the warning  message  put  y directly after the XCLI command   The following example shows how to resize one of the existing volumes   vol resize vol  myvol_ 16  size 103   Cannot shrink  If you attempt to decrease a volume   s size by using the XCLI  you receive    a CAN NOT SHRINK VOLUME message  Create a volum
126.  no intermixing     gt  Up to twelve 10 GbE ports for connecting to iSCSl attached hosts  or twenty two 1 GbE  ports  as in the 114 model      gt  Upto 15 CPUs providing 90 physical cores  180 logical cores using Intel Hyper Threading  technology      gt  More energy efficient hardware that can reduce power consumption by up to 16   compared to previous models    Chapter 1  IBM XIV Gen3 Storage System overview 5     gt  In configurations using the 4 TB or 6 TB drives  an 800 GB flash drive is available   increasing the read cache to 12 TB for a full system with 15 modules     For both models  114 and 214   all of the modules in the system are linked through the two  internal redundant InfiniBand module interconnects  which enable maximum bandwidth use  and are resilient to at least a single component failure     The system  models 114 and 214  and all of its components come pre assembled and wired  in a lockable rack        Module 15  Data  jra ea E Module 15  Data   Module 14  Data   san  t L   T  Module 14  Data   Module 13  Data    iT   ae on ee  Module 12  Data    Tee   i sae   n    tee aae       fr 7 cis    eit i  Module 10  Data    va          a  r itn He    ET a     ee 8 EE  Module 8  Interface      Ase TIT  Bl H Module 7  interface   Module 7  Interface  r z    H InfiniBand Module      InfiniBand Module  Module 6  Interface     Maintenance Module  Module 5  Interface      TT  a   Module 6  Interface   Module 4  Interface  Ea ft a  S Module 5  Interface   Module 3  Dat
127.  of the  following methods    gt  A telephone line     gt  An Internet connection through your firewall that allows IBM to use a Secure Shell  SSH   connection to your XIV Storage System    XRSC connection    The XRSC uses a high speed Internet connection  but it gives the client the ability to initiate  an outbound SSH call to a secure IBM server     Firewall rules might need to be configured at the client firewall to allow the XIV Storage  System VPN Management ports to connect to the XRSC     Tip  The type of access required for a remote support connection is    outbound port 22 ssh     from the XIV Storage System network ports     The XRSC consists of the XIV Storage System   s internal functions with a set of globally  deployed supporting servers  Together  they provide secure IBM support access to the XIV  Storage System when necessary and when authorized by the client   s personnel     Chapter 7  Monitoring 373    374    Objectives and components  The XRSC meets three major objectives      gt  Security from malicious attack     The XRSC was designed with security as a major concern  while keeping the system  architecture simple and easy to deploy  It relies on standard  proven technologies and  minimizes the logic  code  that must be located either on the external XRSC server or on  client machines  The architecture of the XRSC anticipates and handles various potential  attack vectors  including encryption protocol and authentication logic  The design of the  XRSC iden
128.  of the operating system  Most of these characteristics are kernel I O buffers   memory buffers  or file system tunables  The specifics for each operating system are complex  and outside the scope of this book  This activity is a common one that cannot be overlooked  during migration planning  You can find more information about this topic in X V Storage  System  Host Attachment and Interoperability  SG24 7904     6 2 5 Quality of service    We previously introduced the quality of service  QoS  feature  QoS allows the XIV Storage  System to deliver multiple service levels to hosts connected to the same system     The QoS feature is intended to enhance performance of critical business applications that run  concurrently with noncritical applications  As the XIV Storage System disk and cache are  shared among all applications  and all hosts are attached to the same resources  division of  these resources among both critical and noncritical applications might have an unintended  adverse performance on critical applications  In response to this issue  limiting the rate of  noncritical IOPS and bandwidth by specifying and then enforcing limits on the maximum  amount of low priority OPS and bandwidth on a host basis is ideal     As a result  the QoS feature in the XIV Storage System enables better performance for the  critical host applications that run concurrently with the noncritical host applications on the  same XIV Storage System     We explained in 4 7     QoS feature    on 
129.  of which it is a replica  If this  column is empty  the volume is the master     Tip  To customize the columns in the lists  right click one of the column headings and  make the required selection of attributes  The default column set does not contain the  Master column  You can also resize the columns to allow for longer names or to make more  columns visible     Table 4 1lists the columns in the Volumes and Snapshots view     Table 4 1 Columns in the Volumes and Snapshots view    Name of the XIV Storage System to which this    volume or snapshot belongs     Size  GB  Volume or snapshot size   The value is zero if  the volume is specified in blocks         154 IBM XIV Storage System Architecture and Implementation    Used  GB  Used capacity in a volume  Size  Blocks  Volume size in blocks aa    Size  Disk  Volume size in GB     lt     Used Capacity  MiB  Consumed capacity in binary mebibytes   2     bytes     Master Snapshot master   s name    Consistency Group Consistency group name    Storage pool name    SSD  solid state drive  Shows SSD caching status    Locked Status Indicates the locking status of a volume or    snapshot    Snapshot Modification Status Shows if the snapshot was unlocked or modified   Y    Coupling Status Shows the copy services coupling status     lt     Snapshot Formatted Shows if the snapshot has been formatted    Indicates the priority of deletion by numbers  for snapshots    Deletion Priority    Created  GUI Time  Shows the creation time of a snap
130.  on each disk drive that is  dedicated to data  98    and reduced by a factor of 50  to account for data mirroring  achieved by the secondary copy of data     For example  an XIV Storage System with 15 modules populated with 2 TB disk drives has a  net usable capacity of approximately 161 TB based on the following formula        180   15    2 TB     98    2   161 7    The net usable capacity depends on the module configuration and disk drive type  For more  details  see Table 2 1     Table 2 1 Net usable capacity depends on module configuration and disk drive type  TB  decimal     44 51 56 63 67  TB TB TB TB TB B    Total number of modules    Net capacity with 1 TB disk  drives    75  T  149  TB  Net capacity with 3 TB disk 132 154 168 190 203 225  drives TB TB TB TB TB TB  Net capacity with 4 TB disk 112 177 207 225 254 272 301  drives TB TB TB TB TB TB TB  Net capacity with 6 TB disk 169 267 311 338 382 409 453  drives 1 TB TB TB TB TB TB    Note  The system defines capacity by using decimal metrics  One GB is 1 000 000 000  bytes using decimal metrics  By contrast  1 GiB is 1 073 741 824 bytes using binary  metrics     28  TB  Net capacity with 2 TB disk 55 88 102 111 125 134  drives TB TB TB TB TB TB  84  TB  TB  B       The XIV Storage System reserves physical disk capacity for      gt  Global spare capacity   gt  Metadata  including statistics and traces   gt  Mirrored copies of data    Chapter 2  IBM XIV Storage System logical architecture and concepts 33    2 5 2 Glob
131.  on page 428  The size of the volume is defined as 34 GB   However  less than 17 GB has been consumed by host writes  so only 17 GB of hard capacity  have been allocated by the system  In comparison  Volume 4 is defined as 51 GB  but  Volume 4 has consumed 17   34 GB of hard capacity and therefore has been allocated 34 GB  of hard space by the system  It is possible for either of these two volumes to require up to an  additional 17 GB of hard capacity to become fully provisioned  Therefore  at least 34 GB of  additional hard capacity must be allocated to this pool in anticipation of this requirement     Finally  consider the 34 GB of snapshot reserve space shown in Figure A 3 on page 428  If a  new volume is defined in the unused 17 GB of soft space in the pool  or if either Volume 3 or  Volume 4 requires additional capacity  the system sacrifices the snapshot reserve space to  give priority to the volume requirements  Normally  this scenario does not occur because  additional hard space must be allocated to the storage pool as the hard capacity use crosses  certain thresholds     Appendix A  Thin provisioning conceptual examples 429    430 IBM XIV Storage System Architecture and Implementation       Additional LDAP information    In this appendix  we cover the following topics    gt  Creating user accounts in Microsoft Active Directory   gt  Creating user accounts in Oracle Java Directory     gt  Securing Lightweight Directory Access Protocol  LDAP  communication with Secure
132.  or client hosted cloud solutions require  elastic  rapid response  and dynamic demand that is captured within XIV   s 489 TB linear  scalability  and the immediate and automatic redistribution  without interruption  of added  capacity  The grid design stripes data across all modules and spindles  incorporating data  redundancy for consistent and predictable I O performance that is always load balanced     XIV integration with the VMware vCloud Suite  by using the IBM Storage Integration  Server  empowers cloud providers with simplicity  flexibility  and efficiency within the  VMware cloud management suite including VASA  VCO  vCOPs  vCAC  In addition  XIV  supports the VMware vStorage API Array Integration  VAAI  which moves the  storage related tasks that were previously performed by VMware hosts onto the storage  system  Transferring the processing burden reduces performance impact  speeds  processing  frees VMware for more mission critical tasks  such as adding applications   simplifies management  and positions the virtual environment for additional capacity and  scalability  When hardware acceleration is enabled with XIV System Storage  operations    Chapter 1  IBM XIV Gen3 Storage System overview 11    such as VM provisioning  VM cloning  and VM migration complete dramatically faster  and  with minimal impact to the ESX server  increasing scalability and storage performance   For more information about VMware topics  see the IBM Redpaper  IBM XIV Storage  System in a V
133.  or departments can be dynamically  increased or decreased per the demand imposed at a specified point in time  without  necessitating an accurate prediction of future needs  Physical capacity is only committed  to the logical volume when the associated applications execute writes  as opposed to  when the logical volume is initially allocated     Chapter 2  IBM XIV Storage System logical architecture and concepts 37     gt  Because the total system capacity is designed as a globally available pool  thinly  provisioned resources share the    buffer    of free space  This results in highly efficient  aggregate capacity use without pockets of inaccessible unused space     With the static  inflexible relationship between logical and physical resources commonly  imposed by traditional storage subsystems  each application   s capacity must be managed  and allocated independently  This situation often results in a large percentage of the total  system capacity remaining unused because the capacity is confined within each volume at  a highly granular level      gt  Capacity acquisition and deployment can be more effectively deferred until actual  application and business needs demand additional space  in effect facilitating an  on demand infrastructure     Logical and actual volume sizes   The physical capacity that is assigned to traditional volumes is equivalent to the logical  capacity presented to hosts  This situation does not have to be the case with the XIV Storage  System thi
134.  page  http   www  ibm  com systems director downloads    gt  IBM Systems Director documentation  IBM Knowledge Center    http    www ibm com support knowl edgecenter SSAV7B wel come    How to get IBM Redbooks publications    You can search for  view  or download IBM Redbooks publications  Redpaper publications   Technotes  draft publications  and Additional materials  as well as order hardcopy IBM  Redbooks publications  at this website     ibm com redbooks    Help from IBM    IBM Support and downloads    ibm com support    IBM Global Services    ibm com services    466 IBM XIV Storage System Architecture and Implementation          Jie     Cad    Redbooks       IBM XIV Storage System Architecture    and Implementation        1 0    spine   0 875  lt   gt 1 498     460  lt   gt  788 pages    IBM XIV Storage System  Architecture and Implementation    Multi tenancy gives  more flexibility for XIV  in Cloud environments    Enhanced performance  classes allow virtual  tiers of storage    6 TB drives offer lower  cost per TB   and lower power  consumption       This IBM Redbooks publication describes the concepts  architecture   and implementation of the IBM XIV Storage System  The XIV is a  scalable enterprise storage system that is based on a grid array of  hardware components  It can attach to both Fibre Channel Protocol   FCP  and IP network Small Computer System Interface  iSCSI  capable  hosts  This system is a good fit for clients who want to be able to grow  capacity with
135.  page 94   Also see the IBM XIV Storage System Planning Guide  The latest version is available in both  PDF format and HTTP format in the IBM XIV Storage System documentation in the IBM  Knowledge Center  IBM XIV Storage System  gt  IBM XIV Gen 281x 11x and 281x 21x  gt   Planning      http   publib boulder ibm com infocenter ibmxiv r2 index  jsp    All XIV Storage System Gens configurations include the following components     Rack   Power components   Data modules and interface modules  InfiniBand module interconnect  Patch panel   Support hardware    YYYY YV Y    Chapter 3  IBM XIV architecture  components  and planning 73    Hardware  Because the XIV Storage System hardware architecture is designed using  off the shelf components and can easily adapt to new hardware  it is possible that there will  be hardware changes before this book is refreshed     3 1 7 Rack    All of the XIV Storage System hardware components are installed in an IBM T42 rack  as  shown in Figure 3 9  Adequate space is provided to house all components and to properly  route all cables  The rack door and side panels can be locked with a key to prevent  unauthorized access to the installed components  This XIV Gens rack security kit is available  by ordering RPQ 8S1190     The XIV Storage System Gen rack should be considered a dedicated unit for XIV Storage  System  Spare space within the rack cannot be used for other equipment     Rack space  Unused rack space cannot be used for other purposes         
136.  percentage of read hits as shown in Figure 6 13  on page 308  Read hits are the total read requests that are satisfied by reading the data from  the XIV system cache  Also shown are the cache hits satisfied from the DRAM memory cache  and the SSD cache  The read cache misses shown are the read requests that were satisfied  by retrieving the data from the disk drives  Again  there is more information about latency in     Performance analysis    on page 321     Chapter 6  Performance 307       av XIV Storage Management  JO X    Systems   Actions   View   Tools   Help    O  amp  admin  A All Systems  4   gt    Statistics v   System Time  8 52PM Q    All Interfaces    Hit   Miss   Memory Hit   SSD Hit      etierea            1400 1415 1430 14 45 15 00 15 15 15 30 15 45 16 00 16 15 16 30 1700 17145 1730 17 45  March 12  2013    FAI      Hi  MemHit   C08 KB    64512 KB      0Ps    ees 4 of      ea Nika ite Mis    gt   SSD Hit     8 64  KE      gt 512  KB  Ton FE  Hots   E   ih O S a ON E AE RESA a ai  ATSXIV 1310115    726 GB  59    te                   Figure 6 13 Read hits    In certain cases  the user needs to see multiple graphs at one time  On the right side of the  filter pane  there is a selection to add graphs  see Figure 6 10 on page 305   Up to four  graphs are managed by the GUI  Each graph is independent and can have separate filters   Each of the multiple graphs can be unlocked to show a different time duration than the others     Figure 6 14 on page 309 shows this mu
137.  personal  information  To be compatible with XIV Storage System  an object class must include a  minimal set of attributes  These attributes are as follows     uid User identifier  user name   userPassword User password  description  configurable LDAP role mapping attribute    You can select another object class type if it contains the same minimal set of attributes   The object class type can enforce certain rules  For example  various attributes can be  designated as mandatory  in which case a new LDAP object cannot be created without  assigning a value to that attribute  For the inetOrgPerson object  there are two mandatory  attributes     cn Full Name  also called Common Name  sn Full Name  also called Surname    IBM XIV Storage System Architecture and Implementation    Although it is possible to populate these two objects with various values  we use the uid  value to populate both the cn and sn attributes  See Figure B 6        Step 3 Choose Object Class    Choose the object type of the entry you want to create     User    inetOngPerson  ae  Static Group    groupOfUniqueN ames   Dynamic Group    groupofUris   Certificates Group    groupOtCertific ates     Entry Type     Filtered Role    nsFiltered RoleDefinition   Domain Component    domain   Organizational Unit   organizationalUnit   Referral    referral    Class of Service    cosPointerDefinition     User defined Object Classes   No user defined objectclass        Figure B 6 Object class selection             Cancel  
138.  pool   iSCSI 10GbE   Thin provisioning   Open Stack   RESTful API       Space reclamation  Snapshots  Everything except  gt              Figure 3 8 XIV Cloud Storage for Service Providers  base and optional functions    Clients with fewer than three optional features may add features  Clients with three optional  features will automatically receive the full set of components  after which there will be no need  to order other optional components     XIV Cloud Storage for Service Providers license requires one IBM XIV Storage System Gens  machine type 2810 214 or 2812 214  full systems  6 interface modules  9 data modules  and  feature number 0815 are required  in any of the validly recordable configurations     3 1 6 XIV Storage System Model 114 and Model 214 hardware components    The system architecture of the XIV Storage System is designed  wherever possible  to use  off the shelf components  except for the Automatic Transfer Switch  ATS   that are not  dependent upon specifically designed hardware or proprietary technology  This architecture  is optimized for flexibility so that as newer and higher performing components are made  available in the marketplace  development is able to incorporate this newer technology into  the base system design at a faster pace than was traditionally possible  The following  sections describe the hardware components that build up the XIV Storage System     For more detailed planning information  see 3 2     Hardware planning overview    on
139.  rack to  show a view of the patch panel  Figure 7 10 shows the patch panel for an XIV Storage  System Gen3 Model 214     You get a quick overview in real time about the system   s overall condition and the status of its  individual components  The display changes dynamically to provide details about a specific  component when you hover the cursor over that component     Status bar indicators at the bottom of the window  which are shown in Figure 7 11  indicate  the overall operational levels of the XIV Storage System       Hardware EE 1    heee       XIV_PFE_04 1310133    Figure 7 11 Status bar indicators       332 IBM XIV Storage System Architecture and Implementation    The following information describes the status bar indicators in Figure 7 11 on page 332      gt  The first indicator on the left shows the amount of soft or hard storage capacity currently  allocated to storage pools and provides alerts when certain capacity thresholds are  reached  As the physical  or hard  capacity consumed by volumes within a storage pool  passes certain thresholds  the color of this meter indicates that additional hard capacity  might need to be added to one or more storage pools     Clicking the icons on the right side of the indicator bar that represent up and down arrows  toggles the view between hard and soft capacity     Our example indicates that the system has a usable hard capacity of 158934 GB  of which  72  or 114296 GB is used     You can get more information and perform mor
140.  response      gt  uid  xivtestuser2    gt  description  Storage Administrator   The fact that 1dapsearch returns the expected results in our example indicates the following   1  The account is registered in Oracle Java Directory    2  We know where in the Oracle Java Directory repository the account is located    3  We know the valid password    4  The designated attribute description has a predefined value of Storage Administrator   When the Oracle Java Directory account verification is complete  we proceed with configuring  XIV Storage System for LDAP authentication mode  We still have a few unassigned    LDAP related configuration parameters in our XIV Storage System  as shown  in Example B 5 on page 445     444 IBM XIV Storage System Architecture and Implementation    Example  B 5 Remaining XIV LDAP configuration parameters     gt  gt  ldap config get  Name   base_dn   Xiv_group_ attrib   third expiration event  version   user_id_attrib  current_server   use SS   session_cache_period  second expiration event  read only role   Storage admin role  first expiration event  bind time_limit    Value    description  7   3   objectSiD    no    14   Read Only   Storage Administrator  30   0    The parameters are as follows     base_dn    user_id_attrib    current_server    session_cache_period    bind_time_limit    Base DN  which is the parameter that specifies where in the Oracle  Java Directory DIT a user can be located  In our example  we use  dc xivauth as base DN     The LDA
141.  response and it must match the same path     The LDAP administrator creates a user account in LDAP and assigns the user to the  memberOf attribute  When the newly created user logs in to the system  XIV systems perform  the role mapping  as shown in Figure 5 48 on page 250     Chapter 5  Security 249    250       XIV System LDAP Server          LDAP configuration  Idap_config_ set  User definition    xiv_group_attrib  Member  MemberOf     cn X VAdmins         storage_admin_role     cn xX VAdmins         attribute name   attribute value                       compare strings                Strings match       Assign user to storageadmin role             Figure 5 48 Assigning an LDAP authenticated user to the storageadmin role    LDAP role mapping for the applicationadmin role   The LDAP account can also be assigned to an applicationadmin role  but the mechanism of  creating role mapping in this case differs from the one used for storageadmin and readonly  role mapping     The XIV Storage System assigns a user to the applicationadmin role if it can match the value  of the Member Of attribute with the 1dap_role parameter of any user groups defined in the   XIV Storage System  If an account is assigned the applicationadmin role  it also becomes a  member of the user group whose Idap_role parameter matches the value of the user   s  Member Of attribute     The user group must be created before the user logs in to the system or the login fails  The  XIV Storage System administrator
142.  run the add command three times for each XIV Storage System     Tip  If you have clustered SCOM servers  you must configure each XIV Storage  System and each XIV Storage System management IP address on each server  as well  as the Root Management Server in the Management Group  This action ensures that  monitoring continues to work after a failover     8  Because you defined your IBM XIV systems  you can list them and confirm that they are  all defined by running scomu   list  as shown in Example 7 57     Example 7 57 Listing the monitoring systems  scomu   list  3 connections have been found     The default output format is HTML  and the list is displayed in the default web browser  as  shown in Figure 7 96 on page 417     IBM Storage Management Pack for Microsoft  System Center Operations Manager    IBM XIV Storage System    DEV_TYPE IP USERNAME PASSWORD  xiv 10 0 20 103 itso  xiv 10 0 20 108 itso  xiv 10 0 20 102 itso       Figure 7 96 Output of the scomu   list command    Adding IBM XIV systems to the monitoring list is complete  You now need to configure the  SCOM Management Pack     Chapter 7  Monitoring 417    7 9 4 Configuring the SCOM Management pack    418    SCOM monitors various different constructs  such as alerts  events  systems  and  components  Each construct has a data collection interval that ranges from 300 seconds to  1800 seconds  the time varies based on the construct   This situation means that if you add  an XIV Storage System to SCOM using the scomu
143.  s resources  These resources include  but are not limited to  storage pools  hosts   mirror targets      gt    Users can be assigned to zero or more domains  A user assigned to zero domains is  considered a global user and has access to all system resources that are not associated  exclusively with a domain      gt  A domain restricts the resources that a user can manage  A user can manage only the  parts of the system that are associated with the domains that he or she is associated with   as depicted in Figure 2 6 on page 32     Chapter 2  IBM XIV Storage System logical architecture and concepts 31            7 cial    A 4 A Y       b  4    oi eee ss we bada hi  ME se se 8   e sl ER a   Poolt_1   sPool1_2  ie a    U NAA n  d     4    T  y Kew A  rs A   4     k e       Domain    Other resources       Figure 2 6 User view of domains and resources     gt  A domain administrator is a user who is associated with a domain or domains  The  domain administrator is restricted to performing operations on objects associated with a  specific domain or domains that he or she is associated with     A domain administrator can be assigned to manage multiple domains  and a domain can  be assigned to be managed by multiple administrators      gt  There is no visibility between domains  Domain administrators are not informed of  resources outside of their domains  These resources and their related events or alerts are  not displayed on lists      gt  Within a domain  the storage  security  a
144.  search either by name only  or by object type     134 IBM XIV Storage System Architecture and Implementation    To start the search function  click the magnifying glass in the upper right corner of any of the  XIV Storage Management GUI windows  as illustrated in Figure 4 33  Alternatively  you can  press Ctrl F to start the search function        Search  Ctri F  aay    Snapshots  GB       Tock Behav    rl Search  Cutt    a Read only  Figure 4 33 Search in the GUI       3 8 TB Hard Used  17 GB  2       A Search panel opens as illustrated in Figure 4 34            cha  35 results found on all systems                   EA QA test   Starbuck   MNO0027  t   E   E   E   3   E test   test   Apolo  1300474   J test   XIV 1310077 Alba   A   test1 2_ clus   Starbuck   MNO0027        test    ESXCLUSTER   Starbuck   MNO0027    Figure 4 34 Search window             Enter search text in the field to perform a search across all of the XIV systems that are  managed by the GUI  Results are displayed in a Tree Table view  Clicking an item in the  search results navigates to that item in the GUI     The search results panel can be resized by clicking and dragging the lower right corner of the  panel  If the search results exceed the size of the panel  a scroll bar is displayed at the right  side of the panel     The search function is also available within all table views of objects within the GUI  You can  filter items displayed in the table by typing a text string in the box located above t
145.  snapshot size        Resize Pool  ITSO    XIV PFE GEN3 1310133       Ss Regular Pool    js Thin Pool                    4 Pool Size  37 892 GB  H    0  System Allacated T     Fm     System  Pools 4  h   j HEREN  6 454 GB     115 380 GB  s       s  New Size  37892 GB  Snapshots Size   8345   GB  po       Figure 4 44 Resizing pool    146 IBM XIV Storage System Architecture and Implementation    The resize operation can also be used to change the type of storage pool from  thin provisioned to regular or from regular to thin provisioned  see Figure 4 45   Change the  type of pool in the Resize Pool window selection      gt  When a regular pool is converted to a thin provisioned pool  you must specify an  additional soft pool size parameter besides the existing hard pool size  The soft pool size  must be greater than or equal to the hard pool size      gt  When a thin provisioned pool is changed to a regular pool  the soft pool size parameter  disappears from the window  in fact  its value is equal to the hard pool size     If the space consumed by existing volumes exceeds the pool   s actual hard size  the pool  cannot be changed to a regular type pool  In this case  you must specify a minimum hard  pool size equal to the total capacity consumed by all the volumes within this pool        Resize Pool  ITSO    XIV PFE GEN3 1310133    P  SJ Regular Pool     eS Thin Pool        Pool Hard  37 892 GB    System Allocated   a System  Pools 4     i   Free  59           6 454 GB     93 66
146.  stripped down 2 TB drives     62 IBM XIV Storage System Architecture and Implementation    The XIV Storage System Gen3 can use flash drives  which are also referred to as solid state  drives  SSDs   in each module  Flash drives are used as secondary read cache between  disks and the dynamic random access memory  DRAM  cache  Data is always placed in both  cache units  and disk access is avoided when data is in SSD flash drive cache  Because the  SSD flash drive cache is multiple times larger than the DRAM cache  the flash cache is highly  effective in regard to the read cache hit ratio     Table 3 1 shows the main hardware components     Table 3 1 XIV Storage System Gen3 hardware overview    Model 114 Model 214  1 GbE  Model 214  10 GbE   IBM T42 42U IBM T42 42U IBM T42 42U    All Modules Intel Quad core CPU Intel Six core CPU Intel Six core CPU  24 GB DDR memory 48 GB DDR3 1 3 GHz memory 48 GB DDR3 1 3 GHz memory  12x SAS drives 12x SAS drives 12x SAS drives  2x Redundant Power 2x High Efficient  Power Supplies 2x High Efficient  Power Supplies  Supplies module 2U 2U  2U    Interface In addition to data module  In addition to data module  In addition to data module   Module   2x iSCSI Port on Module 4   2x iSCSI Port on Module 4   2x iSCSI Ports 10 GbE     4x iSCSI Ports on active Modules     4x iSCSI Ports on active Modules     4x 8 Gbps FC ports   4x 8 Gbps FC ports   4x 8 Gbps FC ports      2X 36 ports InfiniBand   2X 36 ports InfiniBand   2x 36 ports InfiniBand    Maint
147.  subject field  represents the values that uniquely identify this system  and are commonly called   collectively  the distinguished name  DN   The acceptable format for the subject field is a  string of attribute value pairs  each preceded by a slash  Spaces are not permitted  In our  example  we use the value  CN xivhost 0 itso L Tucson ST AZ C US     Chapter 5  Security 209    Choose a value for the encryption strength in the Bits field  In our example  we choose  2048 bit encryption     Tip  The subject field in an x509 certificate uniquely identifies the host that the  certificate belongs to  It is recommended that  at a minimum  the following field  attributes be included in the subject or your certificate request      gt  CN  common name   O  organization    L  locality    ST  state    C  country     YY vV y    Check with your CA vendor or CA server administrator to determine whether they  require any additional attributes in the subject of your certificate request     3  Click Generate to generate the CSR file  A file browser window opens  as shown in  Figure 5 3  prompting you to save the CSR file to your local workstation  Choose the  appropriate location and save the CSR file  You provide this file to your CA to produce a  signed certificate        Save CSR  Save in   J Tso    amp      mg Ely      Date modified Type    No items match your search        Figure 5 3 Save the CSR file    After saving the CSR file  the Certificates Management panel shows your pending  ce
148.  table tile bar or headings to enable or change sort direction     The system progressively loads the events into the table  A progress indicator is visible at the  lower right of the table  as shown in Figure 7 27     User  xiv_development from IP         User    technician    from IP  9 755 179          User    tec    1943 out of 1943  Figure 7 27 Loading events into the table    7 1 7 Event attributes  This section describes all the available event types  event codes  and their severity levels     Severity levels  You can select one of six possible severity levels as the minimal level to be displayed     346 IBM XIV Storage System Architecture and Implementation     gt  None  Includes all severity levels     gt  Informational  Changes  such as volume deletion  size changes  or host multipathing     gt  Warning  Volume usage limits reach 80   failing message sent     gt  Minor  Power supply power input loss  volume usage over 90   and component TEST    failed     gt  Major  Component failed  disk   user system shutdown  volume and pool usage 100    UPS on battery  or Simple Mail Transfer Protocol  SMTP  gateway unreachable     gt  Critical  Module failed or UPS failed    Event codes    For a list of event codes  see the IBM XIV Storage System User Manual  GC27 3914     Event types    The following event types can be used as filters  specified with the object_type parameter in    the XCLI command      cons_group  destgroup   dest   dm   domain   host   map   mirror   pool   
149.  that the specified snapshot  reserve capacity of 34 GB is deducted from both the hard and soft space defined for the  regular storage pool  This deduction guarantees that this space is available for consumption  collectively by the snapshots associated with the pool  Although snapshots consume space at  the partition level  the snapshot reserve capacity is still defined in increments of 17 GB     The remaining 17 GB within the regular storage pool has not been allocated to either volumes  or snapshots  All soft capacity remaining in the pool is    backed    by hard capacity  The  remaining unused soft capacity is always less than or equal to the remaining unused   hard capacity     Thinly provisioned storage pool conceptual example    428    The thinly provisioned storage pool that was introduced in Figure A 1 on page 426 is explored  in detail in Figure A 3  The hard capacity and the soft capacity allocated to this pool are the  same in both diagrams  136 GB of soft capacity and 85 GB of hard capacity are allocated   Because the available soft capacity exceeds the available hard capacity by 51 GB  you can  thinly provision the volumes collectively by up to 66 7   assuming that the snapshots are  preserved and the remaining capacity within the pool is allocated to volumes           Snapshot R  This is the volume size defined during opp nee                     volume creation resizing  Fe  Snapshots  Volume 3 Soft Size Volume 4 Soft Size Consumed    34GB   51GB Soft Space Unu
150.  the  proximity of the cache and the disk drives  with the enforcement of an upper limit for data  that has not been destaged and is enforced on a per drive basis ensures that the full  destage process occurs while operating under battery power     Important  The extended flash cache layer is non volatile memory  and all data in flash  cache is protected for either scheduled or non scheduled system shutdown  The XIV  Storage System does not use flash cache for write  All write I Os are staged and mirrored  out of main cache  DRAM layer  only  The writes are flushed from main cache to the disk  drive layer as part of the normal write destaging  However  on shutdown  the primary  cache  DRAM  related metadata is dumped to the flash cache  Upon the next XIV startup   the metadata is read back and validated for correctness     For more information  see the Redpaper publication  Solid State Drive Caching  Implementation in the IBM XIV Storage System  REDP 4842     Shutdown trigger events  The system executes the graceful shutdown sequence under either of these conditions      gt  The battery charge remaining in two or more UPS units hits a certain threshold  which is  conservatively set just above the amount of battery power required to fully destage data  from cache to disk and gracefully shutdown the entire system twice      gt  The system detects the loss of external power for more than 30 seconds     IBM XIV Storage System Architecture and Implementation    Power on sequence  
151.  the fields shown in Figure 5 16  and click  Update       Update IP Interface   VPN    IPv4 Address 1     0 0 0 0    IPv4 Address 2     0 0 0 0   IPv6 Address 1      0 0 0 0 0 0 0 0 0  IPv6 Address 2      0 0 0 0 0 0 0 0 0  Netmask    Default Gateway    0 0 0 0    MTU  1500       Figure 5 16 Update VPN port IPv6 addresses    5 4 Configuring Internet Protocol Security connectivity    Internet Protocol Security  IPSec  is a protocol suite that allows for enhanced security of IP  communications through the authentication and encryption of IP packets  The XIV Storage  System Software and XIV Management Tools allow for the use of passkey or certificate  authentication to establish IPSec connectivity between management workstations and the  management or VPN ports of XIV systems     To configure IPSec connectivity between a management workstation and an XIV Storage  System  perform the following steps     1  In the GUI  navigate to the System view of the chosen XIV Storage System and click  Systems     System Settings     IPSec to open the IPSec panel  as shown in Figure 5 17  on page 218     Chapter 5  Security 217    IPsec       IPsec Connections      Enable IPsec        Add IPsec Connection    Remote IP         died it    Close          Figure 5 17 IPSec configuration    2  Click the green plus     icon on the right to open the Add IPSec Connection panel  which  is shown in Figure 5 18        Add IPsec Connection  Remote IP  9 155 113 144  Interface      VPN    Authentication me
152.  the future     3 2 2 IPv6 addressing and planning    102    Internet Protocol Version 6  or IPv6  is intended to supplement and  over time  replace the  IPv4 protocol that is still largely used today  Getting ready to make the transition to IPv6 is  becoming critical for some companies because the pool of available IPv4 addresses is  already depleted  IPv6 is described by the Internet Engineering Task Force  IETE    RFC2460     IBM XIV Storage System Architecture and Implementation    IPv6 addressing  The IBM XIV with system software Version 11 1 0 or later supports both IPv4 and IPv6  internet addressing     IPv6 provides the following advantages over  Pv4     Larger address space  128 bit  24128   3 4x1038 addresses   Fixed subnet size 64 bits  2464   18 4 quintillion  addresses  Eliminates the need for network address translation  NAT   Supports stateless auto configuration and network renumbering  Inter operability with IPv4 by fixed subnet size  64 bit addresses   Built in protocol for multicasting   Mandatory support for IPSec    YYYY V Y Y    IPv6 compared to IPv4 addressing scheme  The larger IPv6 addressing requires a change in the way IP addresses are represented      gt  I IPv4 architecture         Uses 32 bit addressing with four groups of decimal numbers  1   254  separated by  dots      such as this example     9 54 100 124   gt  I IPv6 architecture         Uses 128 bit addressing with eight groups of four hexadecimal digits  representing 16  bits  separated by
153.  the hosts contained in  the cluster with the domain     Chapter 4  IBM XIV Storage Management software 187    188    For more information about host clusters in XIV  see 4 6     Host definition and mapping    on  page 164     Managing domain target associations    To manage remote mirror target associations with a domain  right click the domain in the  Domains view and select Manage Associations     Targets  as shown in Figure 4 95           Name Utilization              a   Ba nso soman      Manage Associations d Pools 16 GB Soft  View Associated Pools Hosts  View Associated Hosts and Clusters Clusters    View Associated Users and User Groups    Users  Limit Traffic by Perf Class    Limit Traffic by new Perf Class    User Groups    Properties       Figure 4 95 Accessing the Manage Domain   s Associations screen Targets tab in the XIV GUI    In the Manage Domain   s Associations screen that appears  Figure 4 96   select the targets  and use the arrows to associate or remove the targets from the domain  Click Update to apply  the changes        Manage Domain s Associations  ITSO_domain  X  Users  Targets to Associate Associated Targets  User Groups  Hosts  Clusters    Targets    Pools              amp o    Figure 4 96 Managing domain target associations in the XIV GUI       For more information about remote mirroring and remote mirror targets in XIV  see IBM XIV  Storage System Business Continuity Functions  SG24 7759     IBM XIV Storage System Architecture and Implementation
154.  the storage pool is specified as an integer multiple of 109 bytes  but the actual size  of the created storage pool is rounded up to the nearest integer multiple of 16x290 bytes  The  snapshot_size parameter specifies the size of the snapshot area within the pool  It is a  mandatory parameter  and you must specify a positive integer value for it    Run the following command to resize an existing pool    pool resize pool  ITSO Pool 2  size 704 snapshot_size 154   With this command  you can increase or decrease the pool size  The pool_create and the  pool_resize commands are also used to manage the size of the snapshot area within a  storage pool    To rename an existing pool  run the following command     pool rename pool  ITSO Pool 2  new_name  ITSO Pool     To delete a pool  run the following command     pool delete pool  ITSO Pool     Approve or deny deletion by responding y n when prompted or use the  y parameter with the  pool delete command to approve deletion     Tip  You can use the  y parameter at the end of a command that requires confirmation to  have it auto approved  This parameter is useful for scripting     Run the following command to move the volume named Zejn_02 to ITSO Pool 3     vol_move pool  ITSO Pool 3  vol  Zejn_02     The command succeeds only if the destination storage pool has enough free storage capacity  to accommodate the volume and its snapshots  The command moves a particular volume and  its snapshots from one storage pool to another one  Howev
155.  the user readable format  Specify the  s parameter to get it in a comma separated  format or specify the  x parameter to obtain an XML format     Fields  The XML format contains all the fields of a particular command  The user and the  comma separated formats provide just the default fields as a result     To list the field names for a specific xcli command  use the  t parameter  as shown in  Example 4 7     Example 4 7 XCLI field names    c  Users itso gt xcli  c XIV2  t name fields help command user_list    Scripts   XIV Storage Management software XCLI commands can be used in scripts or batch  programs if you need to use repetitive or complex operations  The XCLI can be used either in  a shell environment to interactively configure the system or as part of a script to perform  specific tasks  as shown in Example 4 3 on page 139  In general  the XIV Storage  Management GUI or the XCLI Session environment nearly eliminate the need for scripts     140 IBM XIV Storage System Architecture and Implementation    4 4 Storage pools    We introduced the concept of XIV storage pools in 2 6     Storage pool concepts    on page 35     4 4 1 Function of storage pools    Storage pools manage a related group of logical volumes and their snapshots  Storage pools  offer the following key benefits      gt  Improved management of storage space    Specific volumes can be grouped within a storage pool to give you the flexibility to control  the use of storage space by specific applications  a 
156.  time  Caching storage systems mitigate this  situation by detecting certain patterns in read I O characteristics and prestaging data into  cache  The XIV Storage System has exceptionally aggressive prestaging algorithms for  sequential reads that place this data in DRAM cache      gt  The XIV System also prestages small block random read data into the XIV Gens flash  drives as described in 2 8 2     Flash caching algorithm and concepts    on page 44      gt  When read data is prestaged in flash or DRAM cache  the read request can be satisfied at  cache I O speeds  This is called a read hit  But invariably certain data  typically random in  nature  must be retrieved from disk  This is called a read miss  Read response times are  the weighted average of these fast read cache hits and the slow reads from disk      gt  The amount of cache also has a significant impact on read cache hits  The more cache  that you have  the more data you can put in there that can result in a read hit  XIV cache  sizes can be described only as huge  A full rack has 720 GB of DRAM cache and 12 TB of  flash cache     High read cache hit percentages are the most significant factor in good read performance  and low read response times  The nature of the application read I O is what defines the  read cache hit percentage  If the XIV algorithms do a good job of prestaging data into flash  or DRAM cache  the read cache hit percentage is high     XIV plays a large part in read cache hit percentages as well
157.  time to generate and deploy a new  security certificate     second expiration event Number of days before the expiration of the certificate to set  the second alert  Severity warning      third_expiration_event Number of days before the expiration of the certificate to set  the third alert  Severity warning      446 IBM XIV Storage System Architecture and Implementation    Securing LDAP communication with SSL    In any authentication scenario  information is exchanged between the LDAP server and XIV  Storage System where access is being sought  Secure Sockets Layer  SSL  can be used to  implement secure communications between the LDAP client and server  LDAP over SSL   LDAPS   the secure version of LDAP protocol  allows secure communication between the  XIV Storage System and LDAP server by using encrypted SSL connections  This protocol  allows a setup where user passwords never appear in clear text     SSL provides methods for establishing identity using X 509 certificates and ensuring  message privacy and integrity using encryption  To create an SSL connection  the LDAP  server must have a digital certificate signed by a trusted certificate authority  CA   Companies  have the choice of using a trusted CA from a vendor or creating their own certificate authority   In this scenario  the xivauth org CA is used     To be operational  SSL must be configured on both the client and the server  Server  configuration includes generating a certificate request  obtaining a server cer
158.  to make it visible in the    XIV Storage Management GUI by specifying its IP addresses   To add the XIV Storage System  complete the following steps     1  Ensure that the management workstation is set up to access the LAN subnet where the  XIV Storage System is located     Tip  It is a good idea to verify the connection by pinging the mangement IP addresses  of the XIV Storage System     When starting the XIV Storage Management GUI on the management workstation for the  first time  the Add System Management window automatically opens     2  Enter the IP address  or set of IP addresses  for redundancy  of the XIV Storage System  in the IP Host name fields  Click Add to add the system to the XIV Storage Management  GUI  See Figure 4 8     Add Managed System    System Group      Ungrouped Systems  IP Host name 1   IP Host name 2   IP Host name 3     Connect Directly     Figure 4 8 Add Managed System window       Tips  XIV System software 11 1 and later support IPv6 addressing for the XIV Storage  System management ports  For information about configuring IPv6  see 5 3      Configuring IPv6 addresses    on page 215     If the workstation is correctly configured for Domain Name Service  DNS  resolution   host names can be used     Chapter 4  IBM XIV Storage Management software 119    Important  The Connect Directly check box is for an IBM service representative to use  to connect their notebook to the XIV through the two notebook ports on the patch panel   This option must not b
159.  to obtain the status of  specific system components  such as disks  modules  or adapters     The component_1ist command  which is shown in Example 7 6  gives the status of all  hardware components in the system  The filter option filter  lt FAILED   NOTOK gt  is used to  return information only about failing components  The first example shows a failed disk in  module 4 slot 9  and the second example shows that all components are in an OK status     Example 7 6 The component_list command     gt  gt  component_list filter NOTOK  Component ID Status Currently Functioning  1 Disk 4 9 Failed no     gt  gt  component_list filter NOTOK  No components match the given criteria    As shown in Example 7 7 on page 341  the disk_list command provides more in depth  information for any individual disk in the XIV Storage System  which might be helpful in  determining the root cause of a disk failure  If the command is issued without the disk  parameter  all the disks in the system are displayed     340 IBM XIV Storage System Architecture and Implementation    Example 7 7 The disk_list command     gt  gt  disk_list disk 1 Disk 13 10  Component ID Status Currently Functioning Capacity  GB  Vendor Model Size Serial  1 Disk 13 10 OK yes 21B IBM XIV  1T32000444 1878632 QWM4PHXG    Example 7 8 shows a disk that is failed but in a deferred replacement state  For more details  about this state  see    Deferred disk replacement    on page 339     Example 7 8 Disk in deferred replacement     gt  gt
160.  trademarks of IBM Corporation in the United States  other countries  ar both          a    Figure 1 2 XIV GUI Demo Mode       Figure 1 3 shows one of the top level configuration windows where you can also see flash   SSD  status     Systems   Actions   View   Tools   Help   A O   T   Settings Launch XCLI E Launch XIVTop    All Systems  2   gt  Mainz  2   gt  v System  v          SSD  1  512 GB   Status  OK    erie ga      Module  5    Status     XIV_PFE2_1340010    ECD   Figure 1 3 The XIV Storage Management GUI       Chapter 1  IBM XIV Gen3 Storage System overview 13       IBM Hyper Scale Manager GUI  The IBM Hyper Scale Manager GUI acts as the management console for multiple XIV  systems  See Figure 1 4     Manager Configuration  Inventory   k 4 Systems  2 Groups  2 Disconnected    Address Status  Credentials    Administration    Email Notifications XIV_PFE2_1340010 9 155 50 90 Full Redundancy  XIV_02_1310114 9 155 116 61 Full Redundancy    XIV Certificates  sii Tucson    About     9 11 209 123 9 11 209 123 Communication Loss    i 9 11 209 221 9 11 209 221 Communication Loss          Figure 1 4 Hyper Scale Manager GUI    XIV Storage Management online monitoring with XIV Top  With the XIV Top application  you can view and monitor performance information for defined  volumes and hosts in real time  See Figure 1 5 for an illustration     XIV Top XIV LAB 03 1300203 Allnterfaces v    _ Refresh every  4    seconds itso  Storage Administrator        Volumes  amp  Hosts    Volume 
161.  using reversible encryption    8 passwords remembered  120 days   1 days   8 characters   Enabled   Disabled    Network List Manager Policies  Public Key Policies  Software Restriction Policies  Application Control Policies  a IP Security Policies on Local Computer  Advanced Audit Policy Configuration       Figure 5 70 Default Active Directory Password Policy settings    If there is a user   s password expiration or account lockout  the user receives the message that  is shown in Example 5 15 when attempting to log in to XCLI     Example 5 15 XCLI authentication error because of account lockout     gt  gt  Idap test user xivtestuserl password PasswOrd   Error  LOGIN FAILURE USER NOT AUTHENTICATED BY LDAP SERVER  Details  User xivtestuserl was not authenticated by LDAP server     jtso storage ibm com      The XIV Storage Management GUI in this situation also fails with the error message shown in  Figure 5 71        MIV 02 1310114    Al G3     Authentication Failure _             Figure 5 71 XIV Storage Management GUI authentication failure because of account lockout    Although password policy implementation greatly enhances overall security of the system  all  advantages and disadvantages of such implementation must be carefully considered  One of  the possible disadvantages is increased management impact for account management as a   result of implementing complex password management policies     Passwords  A comprehensive solution for user password policy implementation is
162.  warning signs  the XIV Storage System continually monitors  other aspects of disk initiated behavior  such as spontaneous reset or unusually long  latencies  The system intelligently analyzes this information to reach crucial decisions  concerning disk deactivation and phase out  The parameters involved in these decisions  allow for a sensitive analysis of the disk health and performance     Redundancy supported reaction    The XIV Storage System incorporates redundancy supported reaction  which is the provision  that uses the distributed redundant data scheme by intelligently redirecting reads to the  secondary copies of data  This extends the system   s tolerance of above average disk service  time when accessing primary data locations  The system reinstates reads from the primary  data copy when the transient degradation of the disk service time has subsided  A  redundancy supported reaction might be triggered by an underlying potential disk error that is  ultimately managed autonomically by the system according to the severity of the exposure  as  determined by ongoing disk monitoring     Flexible handling of dirty data    In a similar manner to the redundancy supported reaction for read activity  the XIV Storage  System can also make convenient use of its redundant architecture to consistently maintain  write performance  Because intensive write activity directed to any particular volume is  distributed across all modules and drives in the system  and the cache is indep
163.  workshops  Before  joining the ITSO  he worked for IBM Global Services as an Application Architect  He holds a  Master s degree in Electrical Engineering     Roger Eriksson is an STG Lab Services consultant  based in Stockholm  Sweden  who  works for the European Storage Competence Center in Mainz  Germany  He is a Senior  Accredited IBM Product Service Professional  Roger has over 20 years of experience  working on IBM servers and storage  including Enterprise and Midrange disk  NAS  SAN  IBM  System x  IBM System p    and IBM BladeCenter  He has done consulting  proof of concepts   and education  mainly with the XIV product line  since December 2008  He has worked with  both clients and various IBM teams worldwide  He holds a Technical College Graduation in  Mechanical Engineering     Lisa Martinez has been working in the North America Storage Specialty Team  formerly  ATS  as a storage consultant since January 2012  Her focus has been with pre sales support  for DS8000   and XiV as well as lead instructor for XiV customer based workshops  Prior  experience includes roles as a storage architect in the Specialty Services Area in GTS  a  temporary assignment as a Global Support Manager for Cardinal Health and test architect in  disk storage focusing on system level test for XiV for three years  and copy services for  DS8K  Lisa holds degrees in Computer Science from New Mexico Highlands University and  Electrical Engineering from the University of New Mexico  She has been em
164.  xcli  a XIV2  m 192 168 0 4  m 192 168 0 5  m 192 168 0 6  c  Users itso gt xcli  c XIV2 user_list    Options  In the previous example  the  a option is used to name the XIV Storage System  designated with the  m addresses as XIV2  and referred to accordingly afterward     Chapter 4  IBM XIV Storage Management software 139    It is also possible to create set credentials with xcli   protect  This command prompts you  for the user and password and then stores them in a secure file in the system  The defined  default credentials are for the XCLI installation that is used  These credentials are used when  no credentials are supplied by using  u and  p or defined as environment variables  See  Example 4 5     Example 4 5 xcli   protect    C  Users IBM ADMIN gt xcli   protect  User name  itso   Password    Confirm password    Credentials saved locally     Getting help with XCLI commands    To get help about the use of commands  assuming that you have set and logged in as a valid  user   proceed as shown in Example 4 6     Example 4 6 XCLI help commands    c  Users itso gt xcli  c  Users itso gt xcli  c XIV2 help  c  Users itso gt xcli  c XIV2 help command user_list format full    The first command prints the use of XCLI  The second prints all of the commands that can be  used in that particular system  The third shows the use of the user_list command with all of  the parameters     There are various parameters to get the result of a command in a predefined format  The  default is
165.  xiv_hostprofiler XIV Host Profiler     xiv_maintenance AIV Maintenance   amp  xiv_msms Storage Administrator    Figure 5 24 XIV Storage Management GUI users management    5  Change the default password for the admin user  which can be accomplished by  right clicking the user name and selecting Change Password from the menu  as shown in  Figure 5 25  You must be logged in as admin to change the admin password                                     Category        Ungrouped    technician Technician      xiv_develo t     XIV Development  i 5 T Change Password alates     amp  xiv_hostprofiler XIV Host Profiler          Properties    4 xiv_maintenance AIV Maintenance        amp  xiv_msms   Storage Administrator       Figure 5 25 XIV Storage Management GUI admin user change password    226 IBM XIV Storage System Architecture and Implementation    6  To add a user  you can either click the Add User icon in the menu bar or right click the  empty space to get the menu  as shown in Figure 5 26  Click Add User  A maximum of  128 users are possible in the regular XIV access control              3  4 technician   KA xiv_development   amp  xiv_hostprofiler   amp    amp     xiv_maintenance    Add User Group    xiv_msms    Configure LDAP  LDAP Wizard  Export          Figure 5 26 XIV Storage Management GUI Add User option    7  The Add User window opens  as shown in Figure 5 27  A user is defined by a unique  name and a password  The default role  denoted as Category in the window  is Storage  
166. 0 shows a single server configuration     Example 5 10    XIV_PFE2 1340010 gt  gt audit_config_get  Primary Server Primary Port Secondary Server Secondary Port Protocol  10 0 0 222 514 0 Syslog    5 6 2 Define Idle Timeout to lock a GUI or XCLI session    Users can now specify a session timeout to indicate the idle time for closing the GUI and XCLI  session  This feature enables clients to comply with their companies    security standards and  policies  It is also required by the PCI DSS     The XCLI and GUI will be locked after the specified period of idle time  and require  reauthentication  By default  the inactivity time interval is set to 15 minutes     To change the idle timeout parameter  navigate to menu bar on upper left of the main window  then select Management from the Tools drop down menu as shown in Figure 5 45 on  page 244     Chapter 5  Security 243             Systems   Actions   View EZI r    O    samin mmm 18 40      D All Systems  12    Connect  Commands Log       Generate Capacity Report  XIVTOP  XCLI  ayy Sonani Saiinge Dock Magnification   l Cattinas Cc ty Utilization   g XIV 6010607c   Settings apacity Utilization   lt     Toolbars       Show Tips     ag Log Folder Size  MB    GUI Mode        F XIV 6O1060Tt j l  Dynamic Menus   i TG    s Pinned Menu Items  Restore Factory Defaults     Volume Serial     Session Timeout  Minutes            Figure 5 45 Changing idle timeout for lock GUI XCLI session    5 7 LDAP based authentication    The XIV Storage Syst
167. 032   Sep 6  2014  Sep 30  2014  May 18  2014             p  Close    Figure 4 23 Certificate management in the GUI    Copy and paste of system configuration settings    To facilitate efficient configuration of system settings when managing multiple IBM XIV       systems  the GUI supports copying the settings of one system to paste those settings to one    or more other systems     To use this feature  first right click the system that contains the configuration settings that you    want to copy and choose Copy System Configuration  as shown in Figure 4 24 on    page 130     Next  right click a target system and choose to paste the appropriate settings  The following    configuration settings can be pasted to the target system  each in a separate step      gt  Support Configuration   gt  LDAP Configuration   gt  Pools Alerts Thresholds    Chapter 4  IBM XIV Storage Management software    129    130       Modify IP Addresses  Remove System    Create A Group Containing This System    Suspend Monitoring    View Events   View Statistics   View Storage Pools  View Volumes by Pools  View Volumes   View Hosts    View Mirroring  View Migration  View Mobility    Show Certificate    View XIV Connectivity  View Migration Connectivity    Launch XCLI  Launch XIVTop    Copy System Configuration    Properties                Figure 4 24 Copy and paste system configuration settings    After you select which settings to paste  a dialog window is displayed  as shown in   Figure 4 25  This windo
168. 04    IBM XIV Storage System Architecture and Implementation    ZO CUSTOM MONIKON 4 04    40i2 cite et oer eae hee tee tee ddcsawd ice eaades 407    7 8 1 Custom monitoring of a volume         0 0    eee 407  7 8 2 Custom monitoring of performance attributes             0 0 0 410  TOS  SUMMANY tins ee eh Ce eae Re eo ase oie Ra oe Ae a be a 412  7 9 Microsoft System Center Operations Manager               0000 e eee eee 413  PINs Prereguisile Se ct cated onli at eS ore Bw GS Make ed a ee ea Beet at 413  7 9 2 Installing SCOM and the IBM Storage Management Pack                  414  7 9 3 Importing the management packs and Adding IBM XIV systems             415  7 9 4 Configuring the SCOM Management pack             0 00 cee eee eee 418  7 9 5 Monitoring your XIV Storage System with SCOM               0 000 eee 419  7 9 6 Upgrading the IBM Storage Management Pack                 000e eee 423  Appendix A  Thin provisioning conceptual examples                          425  System level thin provisioning conceptual example              0 000 eee eee 426  Regular storage pool conceptual example    nananana aa aea 427  Thinly provisioned storage pool conceptual example              2 0 00 cee eee eee 428  Appendix B  Additional LDAP information                      2 00 0 eee 431  Creating user accounts in Microsoft Active Directory              00000 432  Creating user accounts in Oracle Java Directory            0 00 cee eee 438  Securing LDAP communication with SSL     0 0 2 0  
169. 1 Gigabit Ethernet connections for host I O over iSCSI   10 Gigabit Ethernet connections for host I O over iSCSI   Gigabit Ethernet connections for management   Gigabit Ethernet connections for IBM XIV Storage System remote support    YY vV Yy    Chapter 3  IBM XIV architecture  components  and planning 95    All external XIV Storage System connections are through the patch panel  as explained in  3 1 12     Patch panel    on page 92     For details about the host connections  see X V Storage System  Host Attachment and  Interoperability  SG24 7904     Fibre Channel connections   When shipped  the XIV Storage System is equipped by default with 24 Fibre Channel ports   assuming a fully populated 15 module rack   The XIV Storage System supports 50 micron  fiber cabling  If you have other requirements or special considerations  contact your IBM  SSR     The 24 Fibre Channel  FC  ports are available from the six interface modules  four in each  module  and they are internally connected to the patch panel  Of the 24 ports  12 are provided  for connectivity to the switch network for host access  and the remaining 12 are for use in  remote mirroring or data migration scenarios  however  they can be reconfigured for host  connectivity   Adhere to this guidance on Fibre Channel connectivity  The external   client provided  cables are plugged into the patch panel  For planning purposes  Figure 3 28  highlights the maximum values for various Fibre Channel parameters for your considerati
170. 10 Reliability  availability  and serviceability  RAS     The unique modular design and logical topology of the XIV Storage System fundamentally  differentiates it from traditional  monolithic systems  This architectural divergence extends to  the exceptional reliability  availability  and serviceability aspects of the system  The   XIV also incorporates autonomic and proactive monitoring and self healing features  These  features can take preventive measures to preserve data redundancy before a component  malfunction occurs and automatically restore the system to full redundancy within minutes of  a hardware failure     For more information about the XIV Storage System parallel modular architecture  see 2 2      Parallelism    on page 21     46 IBM XIV Storage System Architecture and Implementation    2 10 1 Resilient architecture    As with any enterprise class system  redundancy pervades every aspect of the XIV Storage  System  including the hardware  internal operating environment  and the data itself  However   the design elements  including the distribution of volumes across the whole of the system  in  combination with the loosely coupled relationship between the underlying hardware and  software elements  empower the XIV Storage System to realize unprecedented resiliency   The resiliency of the architecture encompasses not only high availability  but also excellent  maintainability  serviceability  and performance under ideal conditions resulting from planned  or unpl
171. 2  IBM XIV Storage System logical architecture and concepts 51    Rebuilding after a failure   When a disk drive or a module fails  the XIV data distribution algorithms automatically identify  the non redundant partitions and then begins the rebuilding process  The XIV Storage  System then makes copies of just those non redundant partitions and places this data in  reserved areas of the disk drives that exist for this circumstance  During this rebuilding period   the XIV Storage System is not redundant  Therefore  this is a self healing phase performed to  restore the system to full redundancy  This phase is performed as a high priority     Note  XIV Storage System Software Version 11 2 introduced enhancements that  significantly reduce rebuild times by as much as 50  over previous versions  An enhanced  algorithm  designated as disk Quality of Service  QoS  introduced in v 11 5 1 has further  improved rebuild times by introducing a mechanism that allows doing more rebuild  and  scrubbing  IOPS at times when the system is not under stress  See Figure 2 13 on   page 54      Table 2 2 shows both the disk and module rebuild times for a fully allocated 15 module  XIV Storage System  Version 11 3  under significant workload     Table 2 2 Rebuild times for a 15 module Gen3 XIV Storage System running software Version 11 3    Rebuild type 2 TB drives 3 TB drives 4 TB drives    269 minutes 420 minutes 570 minutes       Important  Table 2 2 illustrates the rebuild times that are possib
172. 290 IBM XIV Storage System Architecture and Implementation    This module architecture is explored from a different perspective  Would it be possible for the  XIV Storage System module to have one of the most powerful multi core processors available  today  Would it be possible for each module to have more cache or faster disk controllers or  faster bus speeds or faster disk drives  The answer to all these questions is yes  But what is  the point in having the latest  fastest components available if the total system can drive these  components to only a fraction of their performance capabilities  The XIV Storage System  module is carefully designed to use the performance capacity of individual components in a  balanced way as the total system approaches its peak performance capabilities     As an example  consider the new 6 core CPUs introduced in XIV Gen3 Model 214  There was  a need to upgrade the CPU with more processing capacity to support the 10 Gb IP network  Small Computer System Interface  iSCSI  available with XIV v11 2 software     When a partial XIV Storage System configuration needs more performance capacity  it is a  simple matter of adding more modules to the XIV Storage System configuration  When  modules are added  the XIV Storage System Software automatically redistributes the  existing data  The XIV system has a maximum of 15 modules     This data redistribution has many interesting aspects with positive performance implications      gt  Only actual data is 
173. 2_1340010 gt  gt domain_list_users domain  ITSO domain   Domain User Category  ITSO domain ITSO  storageadmin    For a list of the objects associated with a domain  run the domain_list_objects command   substituting the appropriate value for the domain parameter  as shown in Example 4 19     Example 4 19 Listing the objects associated with a domain with the XCLI  XIV_PFE2 1340010 gt  gt domain list objects domain  ITSO domain     Domain Type Object   ITSO domain host ITSO_x3550 m3 02  ITSO domain host ITSO_x3550 m3 80  ITSO domain cluster ITSO ESX Cluster  ITSO domain target XIV_02 1310114  ITSO domain schedule never   ITSO domain schedule min interval    ITSO domain user group    thilo app x3655    To create a domain  use the domain_create command  Substitute the appropriate value for  the domain parameter  as shown in Example 4 20     Example 4 20 Creating a domain with the XCLI    XIV_PFE2_ 1340010 gt  gt domain_ create domain  ITSO domain   Command executed successfully     Note  When creating a domain from the CLI by using the domain_create command  the  only required parameter is domain  which specifies the name of the domain  Optionally  you  can specify the following parameters     hard capacity  If omitted  defaults to 0    soft_capacity  lf omitted  defaults to 0    max_pools  If omitted  defaults to 0    max volumes  If omitted  defaults to 0    max_cgs  If omitted  defaults to 0    max_mirrors  If omitted  defaults to 0    max_dms  If omitted  defaults to 0    per
174. 3    7 9 2 Installing SCOM and the IBM Storage Management Pack    Installing SCOM onto a Windows server is not a trivial task and is beyond the scope of this  publication  Assuming that SCOM is already installed and operating correctly  this section  shows you how to install the IBM Storage Management Pack for SCOM  The release notes  and installation instructions are available on the    Select fixes  Enterprise Storage Servers   XIV Storage System    web page     http   ibm co 1zpWKSH    You can also see the Microsoft System Center Operations Manager website     http    www microsoft com en us server cloud system center operations manager  aspx    To install the IBM Storage Management Pack for SCOM  complete the following steps     1  Download the relevant IBM Management Pack to the SCOM server  x86 or x64   After it is  downloaded  double click IBM_Storage_MP_for_SCOM windows to start the  installation     2  If the IBM Storage Solutions External Runtime Components are not installed  you are  prompted to install them  This package installs a version of Python called xPYV  which is  used by the IBM Storage Management Pack for scripting  It does not interfere with any  versions of Python you already have installed     3  After the Runtine Components have been installed  the Storage Management Pack  InstallationShield wizard now opens  Click Next and you are prompted to accept the IBM  license     4  You are now prompted to either do a complete installation or a custom install
175. 3 GB     gt  Pool Soft  59 608 B  Pool Hard Size  37892 GB  Pool Soft Size  59609    GB  Snapshots Size  8345 GB  Lock Behavior  Read Only       Figure 4 45 Resizing and changing the type of a pool       The remaining soft capacity is displayed under the Pool Soft Size setting and calculated by  the system in the following manner     Remaining Soft Capacity    Current Storage Pool Soft Size   Remaining System Soft Size     Current Storage Pool Hard Size    Deleting storage pools    To delete a storage pool  right click the storage pool and select Delete  The system asks for a  confirmation before deleting this storage pool     The capacity of the deleted storage pool is reassigned to the system   s free capacity  which  means that the free hard capacity increases by the size of the deleted storage pool     Consideration  You cannot delete a storage pool if it still contains volumes     Chapter 4  IBM XIV Storage Management software 147    Moving volumes between storage pools   In order for a volume to be moved to a specific storage pool  there must be enough room for  the volume to be there  If there is not enough free capacity  meaning that adequate capacity  has not been allocated   the storage pool must be resized  or other volumes must be moved  out first to make room for the new volume     When moving a master volume from one storage pool to another  all of its snapshots are  moved along with it to the destination storage pool  You cannot move a snapshot alone   independ
176. 3 XIV 2812 7803760 IBM 1 FC_Port 4 1 500173800EB00140 27 09 11 10 13 PM 900 1748 19 877 48 2625 67 13 69 6 91 20 6006 12 4 1 1 8 6 3 34 1 68 2 51  4 XIV 2812 7803760 IBM 1 FC_Port 5 1 500173800EB00150 27 09 11 10 13 PM 900 1755 05 876 38 2631 43 13 71 6 92 20 6366 12 3 1 1 8 6 3 34 1 69 2 51  5 XIV 2812 7803760 IBM 1 FC_Port 6 1 500173800EB00160 27 09 11 10 13 PM 900 1748 74 876 65 2625 39 13 69 6 9 20 5969 12 4 ii 8 6 3 34 1 68 2 51  6 XIV 2812 7803760 IBM 1 FC_Port 7 1 500173800EB00170 27 09 11 10 13 PM 900 1750 07 876 83 2626 91 13 7 6 93 20 6282 12 3 1 8 6 3 34 1 69 2 51  7 XIV 2812 7803760 IBM 1 FC_Port 8 1 500173800EB00180 27 09 11 10 13 PM 900 1749 06 878 22 2627 28 13 7 6 92 20 6191 12 3 1 8 5 3 34 1 68 2 51  8 XIV 2812 7803760 IBM 1 FC_Port 9 1 500173800EB00190 27 09 11 10 13 PM 900 1749 25 878 42 2627 66 13 69 6 95 20 6437 12 3 1 8 6 3 34 1 69 2 51  9 XIV 2812 7803760 IBM 1 FC_Port 4 1 500173800EB00140 27 09 11 10 28 PM 900 1736 98 871 87 2608 85 13 57 6 81 20 3832 12 4 acd 8 6 3 31 1 66 2 48  10 XIV 2812 7803760 IBM 1 FC_Port 5 1 500173800EB00150 27 09 11 10 28 PM 900 1743 38 870 18 2613 56 13 61 6 79 20 3998 12 3 1 1 8 6 3 32 1 65 2 48  11 XIV 2812 7803760 IBM 1 FC_Port 6 1 500173800EB00160 27 09 11 10 28 PM 900 1738 53 871 46 2609 99 13 61 6 8 20 4071 12 4 1 1 8 6 3 32 1 66 2 49  12 XIV 2812 7803760 IBM 1 FC_Port 7 1 500173800EB00170 27 09 11 10 28 PM 900 1739 41 870 09 2609 5 13 6 6 79 20 393 12 3 1 8 6 3 32 1 65 2 48  13 XIV 2812 7803760 IBM 1 FC_Port 8 1 50017
177. 3800EB00180 27 09 11 10 28 PM 900 1738 81 868 17 2606 98 13 6 6 78 20 3843 12 3 1 8 6 3 32 1 65 2 48  14 XIV 2812 7803760 IBM 1 FC_Port 9 1 500173800EB00190 27 09 11 10 28 PM 900 1738 21 873 36 2611 58 13 59 6 81 20 3991 12 3 1 8 5 3 31 1 66 2 48  15 XIV 2812 7803760 IBM 1 FC_Port 4 1 500173800EB00140 27 09 11 10 43 PM 900 1740 84 873 74 2614 58 13 63 6 81 20 4366 12 4 1 4 8 6 3 32 1 66 2 49  16 XIV 2812 7803760 IBM 1 FC_Port 5 1 500173800EB00150 27 09 11 10 43 PM 900 1745 24 871 34 2616 58 13 63 6 81 20 4323 12 4 11 8 6 3 32 1 66 2 49  17 XIV 2812 7803760 IBM 1 FC_Port 6 1 500173800EB00160 27 09 11 10 43 PM 900 1738 2 871 18 2609 38 13 6 6 8 20 4003 12 3 1 8 6 3 31 1 66 2 48  18 XIV 2812 7803760 IBM 1 FC_Port 7 1 500173800EB00170 27 09 11 10 43 PM 900 1739 63 874 19 2613 82 13 61 6 83 20 439 12 3 1 8 5 3 32 1 66 2 49  19 XIV 2812 7803760 IBM 1 FC_Port 8 1 500173800EB00180 27 09 11 10 43 PM 900 1737 87 873 19 2611 05 13 6 6 82 20 4277 12 3 1 8 5 3 32 1 66 2 49  20 XIV 2812 7803760 IBM 1 FC_Port 9 1 500173800EB00190 27 09 11 10 43 PM 900 1739 61 870 31 2609 93 13 61 6 81 20 4235 12 3 1 1 8 6 3 32 1 66 2 49  21 XIV 2812 7803760 IBM 1 FC_Port 4 1 500173800EB00140 27 09 11 10 58 PM 900 1752 1 879 29 2631 39 13 7 6 87 20 5752 12 3 1 1 8 6 3 34 1 67 25  22 XIV 2812 7803760 IBM 1 FC_Port 5 1 500173800EB00150 27 09 11 10 58 PM 900 1758 79 878 86 2637 65 13 72 6 87 20 5869 12 2 1 8 5 3 34 1 67 25  23 XIV 2812 7803760 IBM 1 FC_Port 6 1 500173800EB00160 27 09 11 10 58 PM 900 1753 36 879
178. 45     Wizard   Events Configuration   Rule    Finish        lt      Rule    Add Rules for event notifications        Create Rule           lt       om       Figure 7 45 Create Rule window    10 On the Welcome window  click Next  The Rule Create   Rule name window opens  as    shown in Figure 7 46     Chapter 7  Monitoring    363       Wizard   Rule Create   Select Domain    enema    Select the new rule s domain  Select    All    to associate the rule with all your  domains        Name    iti in  no domain    Condition Domain    Destination    Snooze    Escalation    Finish          Figure 7 46 Rule name window    11 To define a rule  configure the following settings     Rule Domain Select the new rule   s domain  Select All to associate the rule with all of  your domains  The default name is    no domain     which means that the corresponding  rule will not be attached to specified domain     Rule Name  Enter a name for the new rule  Names are case sensitive and can contain  letters  digits  or the underscore character  _   You cannot use the name of an already  defined rule     Rule condition setting  Select Severity only if you want the rule to be triggered by  severity  Select Event Code only if you want the rule to be triggered by event  Or   select Both Severity and event code for events that might have multiple severities  depending on a threshold of certain parameters     Select the severity trigger  Select the minimum severity to trigger the rule   s activation   Eve
179. 5 10 1 Configuring XIV to use LDAP over Secure Sockets Layer    To be operational  SSL must be configured on both the client  XIV Storage System  and the  server  LDAP server   Server configuration includes generating a certificate request   obtaining a server certificate from a CA  and installing the server and CA certificates  The  cacert penm file is ready to be uploaded to the XIV Storage System     When a new LDAP server is added to the XIV Storage System configuration  a security  certificate can be entered in the optional certificate field  If the LDAP server was originally  added without a certificate  you must remove that definition first and add a definition with the  certificate     LDAP server  When defining the LDAP server with a security certificate in XIV Storage  System  the fully qualified name of the LDAP server must match the    issued to name    in  the client   s certificate     For registering the LDAP server with a security certificate  it might be easier to use the   XIV Storage Management GUI  because it has a file upload capability  see Figure 5 82 on  page 284   XCLI can also be used  but in this case you need to cut and paste a long string  containing the certificate into the XCLI session  To define the LDAP server in the XIV Storage  Management GUI  from the menu bar  click Systems     Settings     LDAP  click the LDAP  Servers tab  and then click the green plus sign     on the right panel     Chapter 5  Security 283    Define LDAP Server     y   
180. 5 module XIV system with the usable capacity of 240 TB typically rebuilds  in less than 40 minutes  For a more information about rebuild times under different  scenarios  see Table 2 2 on page 52         The rebuild process can complete 25  to 50  more quickly for systems that are not  fully provisioned  which equates to a rebuild completion in as little as 15 minutes  The  rebuild time is linear and decreases with the amount of written data      gt  The disk rebuild QoS concept implemented in v 11 5 1 has further improved rebuild times  by introducing a mechanism that allows doing more rebuild  and scrubbing  IOPS at times  when the system is not under stress  Refer to Figure 2 13       Rebuild Time Improvement with Disk Rebuild QoS    Single Disk Rebuild Time Improvement in XIV v11 5 1    0 00     i   l   759    10  max  4k DBO 25  max  4k DBO 50  max  4k DBO 75  max  4k DBO    Rebuild Duration  minutes   S 5 5 2  gt  g  8 8 8 8 8 8    S  3    S  8       E 27B disk rebuild v11 5 without disk QoS E 27TB disk rebuild v11 5 1 with disk QoS  E GTB disk rebuild v11 5 without disk QoS  predicted normalized     6TB disk rebuild v11 5 1 with disk QoS    e Disk QoS implementation in 11 5 1 provides better prioritization for disk  rebuild work   e Rebuild time is improved significantly in the case when the system is  relatively less stressful   Figure 2 13 Rebuild time improvement in XIV v 11 5 1            gt  The XIV Storage System rebuilds only actual data  The number of drives pa
181. 7 19 The usage_get command by pool   gt  gt  usage get pool ITSO 3 max 5 start 2013 09 19 08 00 00 end 2013 09 19 19 00 00    Time Volume Usage  MiB  Snapshot Usage  MiB   2013 09 19 08 00 00 0  2013 09 19 09 00 00 0  2013 09 19 10 00 00 1920087  2013 09 19 11 00 00 1920087  2013 09 19 12 00 00 1920087    O OOOO    The use is displayed in MB  Example 7 20 shows that the volume is using 1920 GB of space     Example 7 20 The usage_get command by volume     gt  gt  usage_get vol ITS0_Blade5_Perf max 5 start 2013 09 19 08 00 00 end 2013 09 19 19 00 00    Time Volume Usage  MiB  Snapshot Usage  MiB   2013 09 19 08 00 00 0  2013 09 19 09 00 00 0  2013 09 19 10 00 00 1920077  2013 09 19 11 00 00 1920082  2013 09 19 12 00 00 1920082    oO CO OC O amp O    7 1 5 XIV audit event logging    The XIV Storage System uses a centralized event log  For any command that has been  executed that leads to a change in the system  an event entry is generated and recorded in  the event log  The object creation time and the user are also logged as object attributes     The event log is implemented as a circular log and is able to hold a set number of entries   When the log is full  the system wraps back to the beginning  If you need to save the log  entries beyond what the system normally holds  you can issue the event_list XCLI  command and save the output to a file     Chapter 7  Monitoring 345    Event entries can be viewed by the XIV Storage Management GUI  XCLI commands  or by  notification  A f
182. 9   2009 06 16 141 3016 3897   2009 06 16 293 ede S068   2003 06 16 418 3030 12574    2UUS 06 16 Sal lpi l2518  ZUUS U6 16 445 Sood 13858  2UUS U6 16 ols G3 15748  004 06 16 490 3243 14352  2UUS U6 16 3  GESE 11531       Figure 6 27 Output from the statistics_get command using the host filter    In addition to the filter just shown  the statistics get command can filter iSCSI names  host  worldwide port names  WWPNs   volume names  modules  and many more fields  As an  additional example  assume that you want to see the workload on the system for a specific  module  The module filter breaks out the performance on the specified module  Example 6 5  pulls the performance statistics for module 5 during the same time period of the previous  examples  Figure 6 28 on page 318 shows the output     Example 6 5 The statistics_get command using the module filter     gt  gt  statistics get end 2009 06 16 11 45 00 module 5 count 10 interval 1  resolution unit minute    Chapter 6  Performance 317    Time Read Hit Medium    Ops Read Hit Medium   Latency Read Hit Medium   Throughput  2003 06 16 354 B94 9980  2009 06 16 165 gsl 4485  2009 06 16 159 213 4194  2003 06 16 159 846 4166  2003 06 16 BEZ sod    ZUUS U6 16 846 2433  2003 06 16 115 806 S080  2UUS U6 16 ede slz4  2UUS 06 16 ll lebe  2UUS U6 16 g6 SUSE     gt        Figure 6 28 Output from statistics_get command using the module filter    6 3 4 Tivoli Storage Productivity Center    318    Tivoli Storage Productivity Center contains enh
183. 9W oMfd9 3qwZchx2ZbUjDmbwhW5 jy f 9qbb   at6UeqavD2mGTX  fceLo7 ZwFC5M5PL1LMiD Scz2FWaMH58srwwBo5vUvM 3 P Du H1Xb9 FwoyF  uUAy IpNkaoMf j L96ToFONLZ22PTi048e3Tnk4d trLir2kt1fzBf5VChAl79K9aMm N7 PFkjuWJu  vBPSySyCZGhuTLZOERO4xN9zwXHrhohSnBwOZV kN5NgEVZ6K s 0tUheksEo 4Mqmhnu3 00xjH  PYHM7Wu9HrYZU2F Dm2byr 1 4ZOL9IcHNd aCMtraJ6 N6nPiGeFbRS7uUTPmAOQVOT f  7AgMBAAGj  ggEBMIH MAkGA1UdEwQCMAAWEQYJYIZIAYb4QgEBBAQDAgZAMCwGCWCGSAGG EIBDQQfFh1PcGVu  UINMIEd1 bmVyYXR1 ZCBDZXJOaWZpY 2 FOZTAdBgNVHQ4EFgQU2 imuYrU0FeaVUnsjk9jhajwAMsww  ewYDVROjBHQwcoAUMsOyREEVImhVvzy1 yXAUSYsca7ehT6RNMESxCZAJBgNVBAYTA1VTMQswCQYD  VQQIEwJBWj EMMAoGALUEChMDSUJNMQOwCwYDVQQLEwRJVFNPMRIWEAYDVQQDEw  4aXZDQWhvc3SC  CQCq40FWskg2IDAJBgNVHREEAjAAMAKGALUdEgQCMAAWDQY JKoZI hvcNAQEFBQADggEBAGghgptA  19QB IuMirBN9QyzUwyi gpGcxnwxcSUwRHbC aqoB4jGSZszd0OM3kXctAveli0hh7t bJvN5yYHc   SaojSPjQYyQNHK6FuNVB1DqkLUrRDoX6BtPUBvfQ0asZIVQhY4000bUJg1 GscSuzUkt6m9 s0g  YSw57qDRRD7 jHwzxXCzBpNjKOnVcSu Hy8XUa78z871KCkZKxcc t2HV7 InrBbVDzcBu0rerZuuT  mzLrmZuoN1uo7isIUqjhAXf30Swat 9NVvXFQYTJxiyxIA5M0i 1 3tBnqWQ6PJUKwTbnt f7Ra32W5g  ZTdA7 jDMNSItV fqaM 1bXrk5cOy Eig     If the PEM file that you receive contains any other details  open the file with a text editor   remove the additional details  and save the PEM file before you import it via the XIV  GUI     Chapter 5  Security 211    5  When you have obtained the signed certificate  return to the XIV GUI to import the  certificate into your XIV Storage System  Click Systems     System Setti
184. Administrator  A category must be assigned  Optionally  enter the email address and  phone number for the user  Click Add to create the user and return to the Users window     Note  Additional field called Domain is presented only if domain is already defined to   the XIV system  see Figure 5 27  otherwise this field is hidden  A user not associated  with any domain is a global user  See 4 8 2     Managing domains with the XIV Storage  Management GUI    on page 175     Add User    System  XIM_PFE2_1340010  Domain    All      TSO _domaint    Name   New Password  6 12      seseesens  Retype New Password  ETTITA  Category  Storage Administrator  User Group  None   Email Address    Phone Number         E       Cancel    Figure 5 27 XIV Storage Management GUI Add User attributes       Chapter 5  Security 227    8  If you need to test the user that you defined  click the current user name shown in the  upper right of the IBM XIV Storage Management window  Figure 5 28   and log in with the  new user   s credentials           Storage Administrator          Figure 5 28 XIV Storage Management GUI quick user change    Defining user groups with the XIV Storage Management GUI  The XIV Storage System can simplify various user management tasks if you use the  capability to create user groups     Groups  User groups apply only to users that are assigned to the applicationadmin role     A user group can also be associated with one or multiple hosts or clusters     The following steps illustra
185. Apple iPad  either iPad 1  iPad 2  or the newer iPad      7 2 1 Installing the IBM XIV Mobile Dashboard    You need an Apple iOS device  either iPad or iPhone  and a valid Apple ID to download the  IBM XIV Mobile Dashboard application from the App Store  It is a no charge application  It  can be found by searching the iTunes store  as shown in Figure 7 28  or by going to the  following website     https   itunes apple com us app ibm xiv mobi le dashboard universal  id503500546 mt   8       App Store  gt  Business  gt  IBM Storage    IBM XIV Mobile Dashboard Universal App    IBM Storage  gt     Details Ratings and Reviews Related    Screenshots   iPhone iPad       All systems    All systems    ime Frame Volumes chart view       Bandwidth    Last 2 Days      Free v       ee 0 J    demo system 4  Generated event 1595 f  systern    demo system 4        This app is designed for both S BANDWIDTH    586 6 me s    iPhone and iPad       Critica 14 12 12 22 58   demo system 1  Generated event 1596 for damo _     system    demo system 1 He    No Ratings ee  ane      Rated 4  58   demo system 2  Generated event 1597 for dema  system    demo system 2      Tronix1911 demo system   15 7 mas 1   3 0 ms       2011 Copyright IBM Corp  See other  notices in the application s resource    directory   Demo volun man mo syste         Hort ent                Figure 7 28 IBM XIV Mobile Dashboard at the Apple Store    Using the IBM XIV Mobile Dashboard with an Apple iPad   When you start the IBM XIV M
186. Architecture and Implementation    displayName  xivtestuserl   uSNCreated  98467   uSNChanged  98496   name  xivtestuserl   objectGUID   apHajqyazEyALYHDAJrjNA    userAccountControl  512   badPwdCount  0   codePage  0   countryCode  0   badPasswordlime  128901682350000000   lastLogoff  0   lastLogon  128901682415312500   pwdLastSet  128901672940468750   primaryGroupID  513   objectSid   AQUAAAAAAAUVAAAAn59TxndI 1 skwvBQmdAQAAA    accountExpires  9223372036854775807   logonCount  3   SAMAccountName  xivtestuserl   SAMAccountType  805306368   userPrincipalName  xivtestuser1 xivhostlldap storage  tucson  ibm com  objectCategory  CN Person  CN Schema  CN Configuration DC xivhost1lldap DC storag  e DC tucson  DC ibm  DC com    The ldapsearch command syntax might appear overly complex and its output seems difficult  to interpret  However  this output might be the easiest way to verify that the account was  created as expected  The I1dapsearch command can also be useful for troubleshooting  purposes when you are unable to communicate with an Active Directory LDAP server     Here is a brief explanation of the I1dapsearch command line parameters      gt   H  Idap   xivhost1 xivhostlldap storage  tucson  ibm com 389   Specifies that the  LDAP search query must be sent to the     xivhostl xivhostlldap storage tucson ibm com    server using port number 389      gt   D   CN xivtestuserl1  CN Users  DC xivhost11dap DC storage DC tucson  DC ibm  DC com    The query is issued on behalf of th
187. Click Data Manager     Reporting     Asset     By Storage  Subsystem to view storage subsystem details       gt  Storage Subsystem Reports can be created with user specified columns  See the  following Tivoli Storage Productivity Center GUI menu items         Data Manager     Reporting     Asset     gt  System wide     Storage Subsystems      Data Manager     Reporting     TPC wide Storage Space     Disk Space     By  Storage Subsystem    In Figure 7 77  the properties of an XIV Storage System are shown in the  Tivoli Storage Productivity Center GUI Storage Subsystem Details report     Chapter 7  Monitoring 397    398       avigation Tree                   Administrative Services    H Data Manager for Databases   Data Manager for Chargeback  E  Disk Manager   Storage Optimizer    SAN Planner   f Monitoring    Alerting    Profile Management     Reporting    Fabric Manager   H Tape Manager   H Element Manager  H Replication Manager       i  H Data Manager     i                                                             H IBM Tivoli Storage Productivity Center             Storage Subsystems  I   2810 7820119 IBM Details     Storage Subsystem a1v 2610 7820119 1BM   Label  k Fet  Status O Normal   Yendor IBM   Type aly   Model 114   Available Space  GB  45 771 3   Consumed Space  GB  9 455 56   Configured Capacity Limit  GB  55 226 86   Remaining Configured Capacity  GB  30 610 36   Serial Number 7020119   Revision 11 1 0 RC1 p201202135_094718  User defined property 1  UDP1   0  
188. Connected since    idle 0 27 6 1 Module 4 2010 10 08 10 49 40    The status shows an idle state until an XRSC representative establishes a connection  at  which time it shows a state of busy  as shown in Example 7 34     Example 7 34 Connection busy     gt  gt  support_center_status  State Connected sessions Timeout  min  Module Connected since    busy 1 40 2 1 Module 4 2010 10 08 10 49 40    Chapter 7  Monitoring 379    To terminate the Remote Support Center connection  run the support_center_disconnect  command  as shown in Example 7 35     Example 7 35 Disconnect from the support center     gt  gt  support_center_disconnect    command 0   administrator   command   code    SUCCESS   Status    0     status str    Command completed successfully   aserver    DELIVERY SUCCESSFUL      gt  gt  support_center_ status  State Connected sessions Timeout  min  Module Connected since    no connection            7 5 3 XIV Remote Support Proxy    The optional XIV Remote Support Proxy agent can be used when one or more XIV systems  do not have direct access to the Internet  for example  due to firewall restrictions   You can  use the XIV Remote Support Proxy agent to facilitate the connection to the XRSC     After the XIV Remote Support Proxy agent is configured  the connection to the XRSC is  performed normally from the XIV Storage System  as described in    XRSC connection    on  page 373     The agent is a small program that runs on the following Linux versions     M    Red Hat Enterpr
189. Connectivity    Launch XCLI           Launch XIVTop       Properties             Figure 4 37 Starting XCLI from the Systems menu    XCLI command prompt    Another way to start the XCLI is through the Microsoft Windows command prompt  This  method can be useful for scripting commands for configuration related matters  When  using this method  user and password information must be provided along with system  information  as shown in Figure 4 38     ca  C  Windows  system32 cmd exe    icrosoft Windows  Version 6 1  7681   opyright  lt c  2089 Microsoft Corporation  All rights reserved      Wsers itso cd c  Program Files   x86 gt  IBMSStorageSAIUSAITUGUI   gt  Program Files Cx  BH Storages IUSAILUGUI  gt xcli exe  u itso  p Passwird  m 192 168 0 1 user_list    ame Category Group Active Email Address Area Code Phone Number  iv development xiv_deve lopment yes  iv_maintenance xiv_maintenance yes  dmin storageadmin yes  technician yes  storageadmin yes       Figure 4 38 Starting XCLI from a Windows command prompt    Tip  For convenience and easier access to XCLI commands  add the following value  to the Path system variable     c  Program Files  x86   IBM Storage XIV XIVGUI    This allows XCLI commands to be run from a command window in any directory     For more information about using the XCLI  see the  BM XIV Storage System User  Manual  GC27 3914 and the IBM XIV Storage System documentation in the IBM  Knowledge Center     http   ibm co 1rvfciG    Chapter 4  IBM XIV Storage Mana
190. Control Center web tool that is part of the Oracle Java Directory Server  product suite     The designated description attribute must be populated with the predefined value for the  authentication process to work  From the Oracle Java Directory LDAP Server perspective   assigning a value to the description attribute is not mandatory and is not enforced by the  server itself  An LDAP server allows the creation of an account with no value assigned to the  attribute  However  this attribute value is required by the XIV Storage System to establish  LDAP role mapping  This field must be populated with the predefined value for the  authentication process to work     To start the Oracle Java System Directory Service Control Center  point your browser to the  IP address of your Oracle Java Directory LDAP Server for a secure connection on port 6789   In our example  we use the following URL to access the Oracle Java System Directory  Service Control Center        https   xivhost2 storage  tucson  ibm  com  6789       Before the first user account can be created  the LDAP administrator must create a suffix  A  suffix  also Known as a naming context  is a DN that identifies the top entry in the directory  hierarchy  A Oracle Java Directory LDAP server can have multiple suffixes  each identifying a  locally held directory hierarchy  for example  o ibm  or  in our specific example  dc xivauth     To create a suffix  log on to the Java Console using your own user ID and password and  selec
191. DP 4971  XIV Storage System in VMware Environments  REDP 4965   IBM Hyper Scale for the XIV Storage System  REDP 5053   RESTful API Support in XIV  REDP 5064   XIV Security with Data at Rest Encryption  REDP 5047   XIV Gen3 with SVC and Storwize V7000  REDP 5063    Other publications    These publications are also relevant for further information     YYYY YYY V Y    IBM XIV Storage System Planning Guide  SC27 5412   IBM XIV Storage System  Product Overview  GC27 3912   IBM XIV Storage System User Manual  GC27 3914   IBM XIV Remote Support Proxy Installation and User   s Guide  GA32 0795  IBM XIV Storage System Application Programming Interface  GC27 3916  IBM XIV Storage System Management Tools Operations Guide  SC27 5986  IBM XIV Storage System XCLI Utility User Manual  GC27 3915   IBM Hyper Scale Manager 1 5 Installation as application  GC27 5984   IBM Hyper Scale Manager 1 5 Installation as a virtual appliance  GC27 5985    Online resources    These sources are also useful for more information      gt     IBM XIV Storage System documentation  IBM Knowledge Center  http   ibm co 1irvfciG   IBM XIV Storage System web page   http    www ibm com systems storage disk xiv index html   IBM System Storage Interoperation Center  SSIC    http    www ibm com systems support storage ssic interoperability wss  Storage Networking Industry Association  SNIA  website    http   www snia org        Copyright IBM Corp  2014  All rights reserved  465     gt  IBM Systems Director Downloads web
192. Devices wizard can be run to add  Data Manager for Databases and configure the devices   Data Manager for Chargeback    O The prerequisite to enabling a storage subsystem For provisioning and performance monitoring is a probe job of the storage    Disk Manager  subsystem  Detailed information on probe jobs can be found on the Disk Manager tab in the Storage Subsystem Probes section     Fabric Manager  Tape Manager    Element Manager    Storage subsystem performance function is only available with certain IBM Tivoli Storage Productivity Center packages  See the  Replication Manager User Guide For details        Detailed information about CIM Agents is found on the Services tab           CIMOM Discovery                Storage Subsystem Probes              1 Storage Subsystem Performance Management                      Alerting                Figure 7 72 Disk Manager tab    394 IBM XIV Storage System Architecture and Implementation    If you want to modify the probe you created  click IBM Tivoli Storage Productivity Center  gt   Monitoring     Probes and choose the correct group  in this example  Subsystem Standard  Probe   Click When to Run to adjust the schedule or Alert if you want to modify the alerts  as  shown in Figure 7 73     IBM Tivoli Storage Productivity Center  sspc sle 1    Edit Probe    e View Connection Preferences Window Help    Element Management        B  al x  elel    Edit Probe    Administrative Services Creator  TPCUser Name  Subsystem Standard Probe    IBM
193. ESS FAILURE Admin    Figure 7 4 All Systems Events window    Chapter 7  Monitoring 329    You can also access events and alerts for all IBM XIV systems from the View drop down  menu  as shown in Figure 7 5  You can view All Systems Alerts or All Systems Events or  return to the All Systems view     Systems   Actions   QRS   Toos   Hep    O J  Add System EF  Add    A All Systems  12     Search All Systems    All Systems    Connectivity i  List  Tiles  All Systems Alerts  All Systems Events    RB_TucsonLab           Figure 7 5 The View drop down menu    7 1 2 Monitoring alerts for all defined IBM XIV systems with the GUI    The XIV Storage Management GUI allows users to work with alerts across multiple systems   regardless of which XIV Storage System is selected  In Figure 7 6  the cursor is hovering over  the All Systems Alerts indicator in the lower right corner of the GUI  Three alerts across the  three systems that are currently defined to the GUI are shown  You can access the alert  information regardless of which system you are working with  or which window is displayed        re        _        Failed XIV_PFE1_ 6000050 Disk 5  Module 5        Phasing Out XIV_PFE_04 1310133 Disk 2  Module 14             Figure 7 6 All Alerts window    In Figure 7 7  the cursor is hovering the alerts indicator for a single system  allowing the  quantity of alerts to be displayed for just that system           All Systems  3   gt  Mainz_Building12    a Connectivity         Systems Selector 
194. F       O yaja Sacus p          Capacity Recent Jobs Unacknowledged Alerts    Last Day Last Day      2 Failed     t  0 Warning  4 Successful    Storage Systems    pace  1 GT ee e    Available  94 62 TiB   j 0 Critical     13 Warning    1 Informational          View all jobs View all alerts    View performance jobs                      Figure 7 86 Tivoli Storage Productivity Center GUI Dashboard    404    The icons on the left side of the display provide links to groups of related resources  The XIV  Storage System details are under the Storage Resources icon  See Figure 7 87  The  overview window can be easily customized to show the information that is most relevant to  your requirements     IBM XIV Storage System Architecture and Implementation    Storage Productivity Center Logout            Home   Dashboard v         Storage Systems          Janaa H             Capacity Recent Jobs Unacknowledged Alerts    AN       Last Day       0 Critical   A 13 Warning   F  p   1 Informational        Storage Systems        Last Day    e 3 Failed    A 0 Warning    4 Successful          mae M    mim oo mmm        Reportin Pool Space  103 86 TiB  sin 9 asa Available  94 62 TiB                           View all jobs View all alerts    View performance jobs             Figure 7 87 Tivoli Storage Productivity Center GUI storage resources    Selecting Storage Systems displays a list of the available storage systems  Double click the  name of a storage system and the Overview window is display
195. False  whether to allow SSD caching to be enabled  on the volumes contained within this domain    LDAP Domain ID The ID attribute of the domain to use when configuring  multitenancy with LDAP authentication    Note  By default  the LDAP Domain ID field is populated with the value of the Domain  Name when Properties tab loads  Optionally  you can modify this value  If you clear this  field  the LDAP Domain ID value of the domain will automatically be set to the value of  the Domain Name  For more information about configuring multitenancy with LDAP  authentication  see 4 8 4     Domains and LDAP authentication    on page 195     5  After completing the fields in the Properties tab  click Create to create the domain     If you chose Create Domain and Associate Pools in step 1 on page 177  you will see the  Create Domain and Associate Pools screen shown in Figure 4 82     Create Domain and Associate Pools          Select System  XNV_02_1310114  Select Pools    ITSO 3 z ITSO_Pool   ITSO_3site_B    ITSO_d1_p1_siteB  ITSO_test_3site  ITSO_xiv2_poolt  Openstack   PFE_WK_pool    PoC _DB Pool  RW                Domain Soft Size     Domain Hard Size     Domain Name     ITSO_Domain_2   Allow SSD Caching      Allow SSD enabled volumes   LDAP Domain ID  ITSO_Domain_2    User access right definition in LDAP         lt n    Figure 4 82 The Create Domain and Associate Pools screen in the XIV GUI             180 IBM XIV Storage System Architecture and Implementation    On this screen  select 
196. GUI supports two methods for connecting to IBM XIV systems      gt  Direct mode to one or more IBM XIV systems  but acting on one XIV system at a time   gt  Manager mode  through the IBM Hyper Scale Manager    Note  The IBM Hyper Scale Manager reduces operational complexity and enhances  Capacity planning through integrated management of multiple XIV systems  It is ideal  for large and multi site XIV deployments  For more information about the   IBM Hyper Scale Manager  see the IBM Redpaper   BM Hyper Scale for the XIV  Storage System  REDP 5053     This chapter contains descriptions and illustrations of tasks that are performed by a storage  administrator when using the XIV Storage Management GUI in direct mode     XIV Storage Management command line interface   The XCLI is a powerful text based tool that enables you to issue simple commands to  configure  manage  or maintain the system  including commands used to connect to hosts  and applications  The XCLI interface can be used in an XCLI Session environment to  interactively configure the system or as part of a script to perform lengthy and complex tasks     Tip  The XIV Storage Management GUI executes XCLI commands during its operation   Therefore  anything that is available in the XIV Storage Management GUI can also be  achieved through XCLI     This chapter presents some of the common XCLI commands used by the administrator to  interact with the system     XIV Storage Management Top graphical user interface    The XIV 
197. IBM XIV Storage System  Architecture and Implementation       Multi tenancy gives more flexibility for  XIV in Cloud environments            Enhanced performance classes  allow virtual tiers of storage    6 TB drives offer lower cost per TB  and lower power consumption    Bert Dufrasne  Roger Eriksson   Lisa Martinez  Wenzel Kalabza    OOKS          ibm com redbooks     l    International Technical Support Organization    IBM XIV Storage System Architecture and  Implementation    May 2014    SG24 7659 08    Note  Before using this information and the product it supports  read the information in    Notices    on  page Ix     Ninth Edition  May 2014     This edition applies to the IBM XIV Storage System with XIV Storage System Software Version 11 5 1 and  IBM XIV Storage Management Tools Version 4 4        Copyright International Business Machines Corporation 2014  All rights reserved   Note to U S  Government Users Restricted Rights    Use  duplication or disclosure restricted by GSA ADP Schedule  Contract with IBM Corp     Contents    NOUCES oreesa ashe cog ds Anan a Spats Sd we cetera wren Gest ae ergy era erate IX  WA GOINGS  o  sis c5 an rete Yi fice ks ol ey Lid wag te Ree or Bh wee et Sd enh Bae X  PRCTACC aeaa dae he Ra eee RE Aa ee ee ee eae ees xi  AUNO cora Sok  ene E les a a E N N A erase a a ra ra E xii  Now you can become a published author  t00    nanana anaana aa es xiii  COMMEMS WECOME renarna rora a a eee eae de eile he ae E xiii  Stay connected to IBM Redbook
198. IV  is not dedicated to those three  LUNs  but remains available for other storage purposes     When a storage pool is created using thin provisioning  that pool is defined in terms of both a  soft size and a hard size independently  as opposed to a regular storage pool in which these  sizes are by definition equivalent              Regular Pool          Figure 2 7 Regular pool versus thin pool    Hard pool size    Hard pool size is the maximum actual capacity that can be used by all the volumes and  snapshots in the pool     Thin provisioning of the storage pool maximizes capacity use in the context of a group of  volumes  where the aggregate    host apparent     or soft  capacity assigned to all volumes  surpasses the underlying physical  or hard  capacity allocated to them  This use requires that  the aggregate space available to be allocated to hosts within a thinly provisioned storage pool  must be defined independently of the physical  or hard  space allocated within the system for  that pool     Therefore  the storage pool hard size that is defined by the storage administrator limits the  physical capacity that is available collectively to volumes and snapshots within a thinly  provisioned storage pool  The aggregate space that is assignable to host operating systems  is specified by the storage pool soft size     Regular storage pools segregate the hard space reserved for volumes from the hard space  used by snapshots by limiting the soft space allocated to volumes  H
199. It is a security improvement  introduced for conformance to the  Payment Card Industry Data Security Standards  PCI DSS   The default setting is 15 minutes  and can be adjusted by the user  This setting means that GUI and XCLI will become locked  after the defined idle timeout setting and for further activity  the user must reauthenticate     Management    General Settings    3  g Dock Magnification  Large    Regional Settings Capacity Utilization  Hard Capacity    Toolbars  Auto    Certificates    Show Tips   es    Log Folder Size  MB   100    GUI Mode  Low   Dynamic Menus  On   Pinned Menu Items  Restore Factory Defaults  Volume Serial  Decimal    Session Timeout  Minutes   15       EEE    Figure 4 19 General settings in the GUI  GUI session timeout    Regional settings and time zone awareness    It is common for storage administrators to manage storage systems from locations that are  geographically separated from those systems  GUI Version 4 enhances support for this  scenario by introducing time zone awareness  Throughout the GUI  many details can be  displayed in both system time  time on the XIV Storage System  and local time  time on the  workstation running the GUI   To configure the regional settings for the GUI  click Tools in the  menu bar  click Management  and then click the Regional Settings tab  see Figure 4 20      Management    General Settings  i 5 Language  English  United States   Default    Regional Settings Time zone  Use XIV system time zone    Time Fo
200. Mware Environment  REDP 4965     XIV supports IBM Hyper Scale Mobility and IBM Hyper Scale Consistency for scale out  needs   See the IBM Redpaper   BM Hyper Scale for the XIV Storage System   REDP 5053      XIV can automate storage discovery and provisioning in OpenStack environments using  OpenStack Cinder integration   See the IBM Redpaper  Using the IBM XIV Storage  System in OpenStack Cloud Environments  REDP 4971      XIV can automate custom storage operation using the XIV RESTful API   See the IBM  Redpaper  RESTful API Support in XIV  REDP 5064      1 6 1 IBM XIV Storage Management tools    The IBM XIV Management tools include the XIV Storage Management GUI  IBM XIV online  monitoring tool  XIV Top   and IBM XIV Storage System Command Line Interface  XCLI      Along with IBM XIV Management Tools version 4 4  the IBM Hyper Scale Manager v1 5 x  was released  The Hyper Scale Manager reduces operational complexity and enhances  capacity planning through integrated management for large and multi site XIV deployments     The Hyper Scale Manager can be run as a virtual appliance above an ESX server  VMware  VSphere Hypervisor only  or as an application on a preinstalled Red Hat Enterprise Linux  server     For more information about the Hyper Scale Manager  see the IBM Redpaper titled  BM  Hyper Scale in XIV Storage  REDP 5053     The other XIV Management Tools  GUI  XIV Top  and XCLI  are available for various  operating system platforms from the IBM System Storage Interop
201. Name Latency  mS   BW  MBps  Host Name Latency  mS  BW  MBps     XIV_ORA_oravg_LPAR1_npiv p7 770 02_XIV_RAC_VIO1    XIV_ORA_rootvg_LPAR_3          XIV_ORA_CRS1_VSCSI  XIV_ORA_DAT_VSCSI_04  XIV_ORA_DAT_VSCSI_05    XIV_RAC_LPAR2_NPIV             p7 770 02_XIV_RAC_VIO2  p7 770 01_XIV_RAC_VIO3  p7 770 01_XIV_RAC_VIO4    XIV_ORA_DAT_VSCSI_06  XIV_ORA_DAT_VSCSI_07  XIV_ORA_DAT_VSCSI_08    ATS_zLinux_z9_MTS_mcelin12  WS_LPAR1          oo Ooooh s  oo elo lojlojloj o  f i         Performance Chart       XIV_ORA_rootvg_LPAR_1_npiv   XIV_ORA_oravg_LPAR2_NPIV         05 24 14 05 24 19 05 24 24 05 24 29 05 24 34 05 24 39 05 24 44 05 24 49 05 24 54 05 24 59 05 25 04 05 25 09    1 Sep 2011       Figure 1 5 XIV Top    14 IBM XIV Storage System Architecture and Implementation    The tool quickly displays the volumes or hosts that are consuming the most system resources  at any given time  Information can be sorted in various ways and saved to a file for use in  spreadsheet applications     XIV Storage Management XCLI    The XIV Storage Management XCLI is a comprehensive command line interface to configure  and monitor the system  All the functions available in the XIV Storage Management GUI are  also available in the XCLI  The XCLI can be used in a shell environment to interactively  configure the system or as part of a script to perform lengthy or complex tasks     Example 1 1 shows an XCLI command being run in a Windows DOS shell     Example 1 1 XCLI commands in a Windows DOS shell  C   gt 
202. Not applicable Notapplicable  Japan  hard wired  three phase  30 A  three uses client  wires   neutral   ground prov ided  connector  98 24 98 94 Line cord for United States  Canada  Latin Hub bell Hubbell Hubbell    America  and Japan with plug  three phase  30A  HBL43 0P 9V04 HBL430R9W HBL430C9W  three wires   ground    Note  Line cords are provided withthe connector part numbers shown  Receptacle part numbers shown are recommended   Although equivalent receptacles can be used  it is the responsibility of the customer to verify compatibility     Figure 3 14 Power cord features    For more information about the appropriate ATS and power cord selection  see the  BM XIV  Storage System Gen3 Models 281x 11x and 281x 21x Planning Guide  SC27 5412     UPS module complex    The uninterruptible power supplies  UPS  module complex consists of three UPS units  The  UPS units work together to provide a    cache battery    function to sustain the XIV Storage  System in the event of power fluctuations or loss  The UPS complex sustains the system for  up to 30 seconds in the event of a fluctuation  or temporary loss of external power  If there is  an extended external power failure or outage that is more than 30 seconds  the UPS module  complex maintains battery power long enough to allow a safe and orderly shutdown of the  XIV Storage System  The complex can sustain the failure of one UPS unit and still provide  adequate protection against external power outages     Internal UPS  Althou
203. P attribute set to identify the user  in addition to the user  name  when recording user operations in the XIV Storage System  event log  The default value for the attribute is objectSiD  which is  suitable for Active Directory but not for Oracle Java Directory LDAP   The objectSiD attribute is not defined in the inetOrgPerson object  class used by Oracle Java Directory  In our example  we set it to  uid     A read only parameter that cannot be populated manually  It is  updated by the XIV Storage System after the initial contact with the  LDAP server is established     The duration in minutes that the XIV Storage System keeps user  credentials in its cache before discarding the cache contents  If a  user repeats a login attempt within session_cache_period minutes  from the first attempt  authentication is done based on the cache  content without contacting the LDAP server for user credentials     The timeout value in seconds after which the next LDAP server on  the Idap_list_servers is called  The default value for this  parameter is 0  It must be set to a non zero value for bind   establishing LDAP connection  to work  The rule also applies to  configurations where the XIV Storage System is configured with  only a single server on the Idap_list_servers list     Appendix B  Additional LDAP information 445    The populated values are shown in Example B 6     Example  B 6 Completing and verifying LDAP configuration on XIV      xcli  c  ARCXIVJEMT1   u admin  p s8cur8pwd ldap c
204. P object  of LDAP users also leads to  the inability of the XIV Storage System to authenticate that user     User group membership for LDAP users    A user group is a group of application administrators who share a set of snapshot  management permissions  The permissions are enforced by associating the user groups with  hosts or clusters  User groups are defined locally on the XIV Storage System     266 IBM XIV Storage System Architecture and Implementation    User group membership for an LDAP user is established during the login process by  matching the designated LDAP attribute value with the 1dap_role parameter assigned to a  user group  A user group is associated with host volumes through access definition  An LDAP  user  which is a member of the user group  is permitted to manage snapshots of volumes  mapped to the host associated with the user group     User groups have the following characteristics in LDAP authentication mode    gt  Only users assigned to the applicationadmin role can be members of a user group   An LDAP user can only be a member of a Single user group     A maximum of eight user groups can be created   In LDAP authentication mode  there is no limit on the number of members in a user group     Y Y vy 7y    lf a user group is defined with access_al11    yes     users assigned to the applicationadmin  role who are members of that group can manage all snapshots on the system     The ldap_role user group parameter can be assigned only a single value   The 
205. P server  on ldap_list_servers is called  The default value for this  parameter is 0  It must be set to a non zero value for bind   establishing an LDAP connection  to work  The rule also  applies to configurations where the XIV Storage System is  configured with only a single server on the  Idap_list_servers list     436 IBM XIV Storage System Architecture and Implementation    The populated values are shown in Example B 3     Example  B 3 Completing and verifying LDAP configuration on XIV     gt  gt  Idap_ config set   base _dn  CN Users DC xivhost1ldap DC storage DC tucson  DC ibm DC com   session cache period 10 bind time limit 30   Command executed successfully       xcli  c  XIV MN00019   u ITSO  p redb0Ok ldap config get    Name Value   base dn CN Users DC xivhost1ldap DC storage DC tucson  DC ibm  DC com  Xiv_group_ attrib description   third expiration event 7   version J   user_id_attrib objectSiD  current_server   use ssl no   session cache period 10   second expiration event 14   read only role Read Only   storage admin role Storage Administrator  first _expiration event 30   bind time limit 30    To complete our description of the LDAP related configuration parameters  at the  XIV Storage System   we must describe the parameters that had default values assigned and  did not need to be set explicitly     version Version of the LDAP protocol used  the default is 3   This  parameter must never be changed  Both Active Directory and  Oracle Java Services Directory Ser
206. PSU  and the  new six core CPUs     Thermal dissipation    Table 3 5 indicates the cooling  thermal dissipation  requirements for a 15 module rack  To  support capacity upgrades  the installation site must provide cooling capacity to support  full rack configurations     Table 3 5 Thermal dissipation in kBTU hour       76 IBM XIV Storage System Architecture and Implementation    Physical space requirements  The physical requirements for the room where the XIV Storage System will be installed must  be checked before the arrival of the machine  IBM assists with this activity     For the latest and most accurate information  see the  BM XIV Storage System Gen3 Models  281x 11x and 281x 21x Planning Guide  SC27 5412      gt  The floor must be able to withstand the weight of a fully configured XIV Storage System  Gens  which is 1040 8kg  2295 lb    For racks with fewer than 15 modules  subtract  28 6 kg  63 Ib   for each module less than 15 to get the approximate weight requirement  for your rack      gt  Adequate cooling is required for the XIV Storage System Gen configuration ordered   Enough clearance around the system must be left for cooling and service  The thermal  dissipation of a fully configured XIV Storage System Gen3 Model 114 with 2 TB drives is  22 7 kBTU hour and 24 kBTU hour with 3 TB drives  The thermal dissipation of a fully  configured XIV Storage System Gen3 Model 214 with 2 TB drives is 19 KBTU hour   20 1 kBTU hour with 3 TB drives  20 5 kBTU hour with 4 TB d
207. RUN C    User    cimmy  fri   USER HAS FAILED TO RUN _C    User    cimmy  fri    Uncleared        User    cimmy  fri  User    cimmy  fri  User    itso _seca  User    cimmy  fri  User    cimmy  fri  User    cimmy    fri  User    cimmy  fri       User    cimmy  fri    Figure 7 61 Configure destination    To configure a new SNMP destination  complete the following steps   1  From the XIV Storage Management GUI main window  select the Monitor icon     2  From the Monitor menu  select Events to open the Events window  as shown    in Figure 7 61     From the toolbar  select Rules and perform the following steps     a  Click Destinations  The Destinations window opens   b  Select SNMP from the Destinations drop down list     c  Click the green plus sign     and click Destination to add a destination  as shown       in Figure 7 62   Gateways    Destinations   All  SNMP EMAIL  SMS   Destinations  Rul   mboelk de ibm com at  S   9 155 51 63 of       Destination  Destination Group       Figure 7 62 Add SNMP destination        3  From the Define Destination window  which is now open  enter a Domain name if any    specified  default is no domain   a Destination Name  a unique name of your choice  and    Chapter 7  Monitoring    385       the IP or Domain Name System  DNS  of the server where the SNMP Management  software is installed  See Figure 7 63        Define Destination    Domain  no domain     Destination Type  SNMP h  Destination Name      SystemDirector   IP DNS     40 1 1 10    
208. SCSI hosts by running host_define  as shown in  Example 4 10     Example 4 10 XCLI Session example  Create host definition     gt  gt host_define host ITSO Win2008    168 IBM XIV Storage System Architecture and Implementation    Command executed successfully      gt  gt host_define host ITSO Win2008 iscsi  Command executed successfully     Host access to LUNs is granted depending on the host adapter ID  For an FC connection   the host adapter ID is the FC HBA WWPN  For an iSCSI connection  the host adapter ID  is the IQN of the host     Add the WWPN of the FC host for HBA1 and HBA2 by running host_add_port with the  fcaddress parameter  as shown in Example 4 11     Example 4 11 Create FC port and add to host definition     gt  gt  host_add_ port host ITSO Win2008 fcaddress 10000000C9831FA2  Command executed successfully    gt  gt  host_add_port host ITSO Win2008 fcaddress 10000000C9831FA3  Command executed successfully     Add the IQN of the iSCSI host  as shown in Example 4 12 on page 169  This command is  the same host_add_port command  but with the iscsi_name parameter     Example 4 12 Create iSCSI port and add to the host definition     gt  gt  host_add_port host ITSO Win2008 iscsi  iscsi_name iqn 1991 05 com microsoft win gjbe8kr49ee itso storage  ibm com  Command executed successful ly    Mapping logical unit numbers to a host    The final configuration step is to map LUNs to the host definition  Complete the  following steps     1     2     Map LUNs to the host definit
209. SCSI ports used for external connections  are internally connected to a patch panel  where the external connections are made  The  patch panel layout depends on the XIV model  See 3 1 12     Patch panel    on page 92  which  shows the two different patch panels     Figure 3 22 shows an XIV Model 114 214  1 GbE  and XIV Model 214  10 GbE  interface  module with Fibre Channel and iSCSI ports        rear view model 214 10 GbE  Interface module       e   a a          bocce oe    fori Pd oie es    pe tlle RT SN or iei   i _lao  errs a   oe   ee Se e  ete linet  al   3        T  i   in ery    Figure 3 22 XIV Model 114 214  1 GbE  and Model 214  10 GbE  interface module with FC iSCSI ports    Fibre Channel connectivity   Each XIV Gen3 interface module has two 2 port 8 Gbps HBAs from Emulex  Each HBA has  eight PCle 2 0 lanes to the processor complex  The HBAs feature hot upgradable firmware  capability  and they support N Port ID Virtualization  NPIV  and 1400 concurrent exchanges  per port     There are four Fibre Channel ports available in each interface module  for a total of 24 Fibre  Channel ports in a fully configured XIV system  Certain partial rack configurations do not use  all ports  even though they might be physically present     The Fibre Channel ports support 2  4  and 8 Gbps full duplex data transfer over short wave  fibre links  using 50 micron multi mode cable  It is not possible to attach this HBA to a 1 Gbps  SAN switch     The allocation and use of specific ports
210. Storage Management Top GUI provides the user with a simple tool for monitoring  system performance on a host and volume level  See Chapter 7     Monitoring    on page 327 for  more information     Chapter 4  IBM XIV Storage Management software 113    4 2 XIV Storage Management software installation    This section illustrates the step by step installation of the XIV Storage Management software  under Microsoft Windows 2008     GUI software  Although the illustrations in this chapter apply to an IBM XIV Storage  System Gen3  the Version 4 4 XIV Storage Management GUI software also can be used  with XIV Storage System second generation systems     Users running older versions are strongly encouraged to upgrade to Version 4 4 or later     4 2 1 XIV Storage Management  GUI and XCLI  software upgrade    If a previous version of the XIV Storage Management GUI is installed  it is best to uninstall the  existing version before installing the newer version     The existing IBM XIV systems profile file  which is a list of defined IBM XIV systems and  groups  is not deleted after the older version is uninstalled  This file is then recognized by the  new installed version     You can save the local IBM XIV systems profile file by exporting it from the XIV Storage  Management GUI  as shown in Figure 4 2  It is saved as an XML file and is then available for  importing into the newly installed XIV Storage Management GUI  which overwrites the  existing systems profile     Tip  The saved IBM 
211. Subject Name options  Certificate field options   how long to certify for   how long before next CRL   which md to use    keep passed DN ordering      Extension copying option    S  SE OEE    IBM XIV Storage System Architecture and Implementation    how long to certify for   how long before next CRL  which md to use    keep passed DN ordering      req distinguished name    countryName   countryName default  countryName_ min  countryName_max    stateOrProvinceName  stateOrProvinceName default  localityName   localityName default  0 organizationName  O organizationName default  organizationalUnitName  commonName   commonName_max  emailAddress  emailAddress_ max    Country Name  2 letter code   US  2  2    State or Province Name  full name     TX   Locality Name  eg  city    Tucson   Organization Name  eg  company   xivstorage    Organizational Unit Name  eg  section   xivstorage org  eg  your server s hostname   64   ca xivstorage org   64    The directories to store the certificates and keys must be created by running the following    command     mkdir  root xivstorage orgCA  root xivstorage orgCA certs   root xivstorage orgCA crl  root xivstorage orgCA newcerts     root xivstorage orgCA private    OpenSSL uses a couple of files to maintain the CA  These files must be created by running    the following commands      gt  touch  root xivstorage orgCA index  txt   gt  echo  01   gt  gt   root xivstorage orgCA serial    The access rights on the directories and files need to be re
212. Subsystem Advanced Group        Subsystem Advanced Group  e Advances heyster Basic Group    Run repeated beginning a    Repeat Every 1 days Subsystem Standard Group    Figure 7 70 Specifying probe details             Specify the probe details         Use a monitoring group or template  Select the predefined Monitoring Group or  create your own new group by selecting Monitoring Template         Select monitoring group  Specify Subsystem Advanced Group  Subsystem Basic  Group  or Subsystem Standard Group     Tip  Configure individual probes for every XIV Storage System system  but set them  to run at various times     Chapter 7  Monitoring 393    After clicking Next  you get an overview of your configured probe  Figure 7 71 shows the  details of the Subsystem Standard Group  including the scheduling of the probe and the  alerts     Monitoring Group    Subsystem Standard Group    TPCUser  Subsystem Standard Probe     Run repeatedly beginning at  Ock 6  2010 1 00 00 AM    Run on these days  Monday  Wednesday    The selected group partakes in 16 alert definitions     Pool Discovered  Standard    Pool Status Change Offline  Standard   Pool Status Change Online  Standard  Pool Capacity Change  Standard   Volume Not Found  Standard              Figure 7 71 Probe summary    Confirm the summary by clicking Next   Click Finish and a background probe is started automatically     Click IBM Tivoli Storage Productivity Center     Configuration Utility     Disk Manager  to check the status o
213. System    Redbooks   Tivoli     IBM   Redpaper    XIV     IBM FlashSystem    Redbooks  logo             The following terms are trademarks of other companies     Intel  Intel logo  Intel Inside logo  and Intel Centrino logo are trademarks or registered trademarks of Intel  Corporation or its subsidiaries in the United States and other countries     Linux is a trademark of Linus Torvalds in the United States  other countries  or both     Microsoft  Windows  and the Windows logo are trademarks of Microsoft Corporation in the United States   other countries  or both     Java  and all Java based trademarks and logos are trademarks or registered trademarks of Oracle and or its  affiliates     Other company  product  or service names may be trademarks or service marks of others     X IBM XIV Storage System Architecture and Implementation    Preface    This IBM   Redbooks   publication describes the concepts  architecture  and implementation  of the IBM XIV   Storage System     The XIV Storage System is a scalable enterprise storage system that is based on a grid array  of hardware components  It can attach to both Fibre Channel Protocol  FCP  and IP network  Small Computer System Interface  iSCSI  capable hosts  This system is a good fit for clients  who want to be able to grow capacity without managing multiple tiers of storage  The   XIV Storage System is suited for mixed or random access workloads  including online  transaction processing  video streamings  images  email  and em
214. TB Pools allocated 145 2 TB Sof   1 TB Hard    sss        Test1_Domain  C 0  121        1 TB Sof  1 TB Hard       Test2_Domain  aam 0  121     a       1 TB Soft          Figure 4 84 A successfully created domain shown in the Domains view in the XIV GUI    Viewing and editing domain properties  After you have created a domain in the XIV Storage System  it is easy to view or edit the  properties of that domain using the XIV GUI     To view the properties of a domain using the GUI  right click the domain in the Domains view   and click Properties  as shown in Figure 4 85 on page 182     Chapter 4  IBM XIV Storage Management software 181    182       Name   Utilization       188 GB Used Volumes 5 TE Hard          Edit                Manage Associations fe             View Associated Pools  View Associated Hosts and Clusters  View Associated Users and User Groups       Limit Traffic by Perf Class  Limit Traffic by new Perf Class      Properties             Figure 4 85 Accessing the Properties pane of a domain in the XIV GUI    This opens the Domain Properties pane for the selected domain  which displays the  properties of the domain  as shown in Figure 4 86                    Domain Properties x  System  XIV_PFE2_ 1340010  Name  ITSO_domain  Soft Size  gio   1 015 GB Total  Hard Size  Cee   102 GE Total  Pools Amount  1 out of 1  Volumes Amount  0 out of 14  Consistency Groups Amount  0 out of 0  Mirrors Amount  0 out of 1  Data Migrations Amount  0 out of 17  Performance Class  N
215. TIONy    Command executed successfully     LDAP mode  When you activate the LDAP mode  it deactivates all defined users on the  XIV Storage System  and only LDAP users with the appropriate group role have access to  the system     The LDAP authentication mode is now configured  activated  and ready to be tested  A simple  test that can validate the authentication result is to open an XCLI session using the  credentials of a newly created Active Directory account xivtestuserl and run  Idap_user_test  This command can be successfully executed only by a user authenticated  through LDAP     5 9 LDAP managed user authentication    When the XIV Storage System is configured for LDAP authentication  user credentials are  stored in the centralized LDAP repository  The LDAP repository is on an LDAP Server and is  accessed by the XIV Storage System using an LDAP protocol     Chapter 5  Security 263    5 9 1 LDAP repository credential objects    264    The LDAP repository maintains the following types of credential objects that are used for  XIV Storage System authentication     LDAP user name  LDAP user password  LDAP user role   User groups    y    vY vyv Y    LDAP user name    The XIV Storage System limitations for acceptable user names  such as number of characters  and character set  no longer apply when user names are stored in an LDAP repository  Each  LDAP product has its own set of rules and limitations that applies to user names  Generally   do not use long names and non alphan
216. The XIV software manages the flash caching  There is nothing that the storage  administrator must configure  The storage administrator can enable or disable the  extended flash cache at the system level or on a per host volume level  The XIV software  will dynamically and adaptively use the flash as an extended read cache to boost  application performance     Also  by storing and computing all flash cache data integrity checksum activities in  dynamic random access memory  DRAM  during normal operation  rather than on the  flash  flash caching can increase performance by up to four times for active application  workloads     SSD flash caching  XIV offers extensive I O analytic trace collections from the block  storage system level that produces visualization and very good performance benefit  estimates for using SSD flash caching  The trace can be captured only by your local  IBM Storage Solution Architect  It can help with determining whether SSD flash caching  is a cost effective feature for your XIV infrastructure     XIV multitenancy     Enables the division of storage system management scheme into logical domains  with  extreme flexibility in assigning policy  administrators  and QoS per domain     Support for multiple snapshots     The snapshot capabilities within the XIV Storage System Software use a metadata   redirect on write design that allows snapshots to occur in a subsecond time frame with  little performance impact  The system supports multiple differential sna
217. The distribution algorithms seek to preserve the equality of access among all physical  disks under all conceivable conditions and volume access patterns  Essentially   although not truly random in nature  the distribution algorithms in combination with the  system architecture preclude the occurrence of hotspots     e A fully configured XIV Storage System contains 180 disks  and each volume is  allocated across at least 17 GB  decimal  of capacity that is distributed evenly  across all disks     e Each logically adjacent partition on a volume is distributed across a separate disk   Partitions are not combined into groups before they are spread across the disks     e The pseudo random distribution ensures that logically adjacent partitions are never  striped sequentially across physically adjacent disks  For more about the partition  mapping topology  see 2 2 2     Software parallelism    on page 23         Each disk has its data mirrored across all other disks  excluding the disks in the  same module         Each disk holds approximately one percent of any other disk in other modules         Disks have an equal probability of being accessed regardless of aggregate workload  access patterns      gt  The following information is described in    XIV Storage System virtualization design    on  page 24       The storage system administrator does not plan the layout of volumes on the modules         lf there is space available  volumes can always be added or resized instantly with
218. V Fest 7820119 G3       XIV MN00   extrabam ITSO_Group  Volumes  628 116     Not Available       Figure 4 13 XIV Group on All Systems view    Tip  With the XIV GUI v4 4 in direct mode  you can manage up to 12 groups in the  All Systems view  A group can contain a maximum of 12 IBM XIV systems  and any  particular system can belong to only one group  A single GUI instance can manage  a maximum of 144 systems  To manage more than 144 systems in direct mode   multiple instances of the GUI can be started  each with a different profile  For more  information  see    Direct mode GUI limitations for managing multiple systems    on  page 240  However  it is suggested to use the IBM Hyper Scale Management server  when managing more than 40 IBM XIV systems  For more information  see the IBM  Redpaper  IBM Hyper Scale for the XIV Storage System  REDP 5053     d  Additional actions are available to delete or rename existing groups  A menu is  displayed by right clicking a group  as shown in Figure 4 14 on page 123     e  f you select Rename Group  a dialog box is displayed and you can enter a new  group name     e If you select Delete Group  the group is removed     Note  Deleting a group that contains systems also removes those systems from  the GUI  If you want to delete a group without removing the systems that it  contains  first move the systems out of the group by right clicking each system  and choosing the Move System to option     122 IBM XIV Storage System Architecture and Impl
219. V Storage System  to integrate with Microsoft Active Directory  Open LDAP  or Oracle Java Systems  Directory Server  Multiple directory servers can be configured to provide redundancy in  case one server becomes unavailable  LDAP support continues within the recent release  of multitenancy implementations offered in v11 5 x or later system code     LDAP with multitenancy  One limitation is a similar duplicate identical user assigned  in two separate domains will not be able to have different user credentials within the  same XIV system using LDAP in a multitenancy implementation      gt  Encryption for data at rest     10 IBM XIV Storage System Architecture and Implementation    IBM XIV Storage System Gen helps secure data with industry standard encryption for  data at rest while avoiding performance impact     For details about encryption with XIV  see the IBM Redpaper X V Security with  Data at Rest Encryption  REDP 5047     User auditing with access control lists and Idle timeout locking integration     The XIV Storage System Software offers the capability for user auditing with access  control lists  ACLs  to provide more control and historical information     It also enforces UI locking after a period of idle time specified by administrator  so it  requires re authentication     Mobile push notifications    Enables XIV clients to receive high severity events on mobile devices  iPhone  Android  platforms      Support for IBM Tivoli   Storage Productivity Center     Tivoli
220. V_ORA_rootvg_LPAR_3    XIV_RAC_LPAR2_NPIV       XIV_ORA_CRS1_VSCSI    p7 770 02_XIV_RAC_VI02       XIV_ORA_DAT_VSCSI_04    p7 770 01_XIV_RAC_VIO3       XIV_ORA_DAT_VSCSI_05  XIV_ORA_DAT_VSCSI_06    p7 770 01_XIV_RAC_VI04    ATS_zLinux_z9_MTS_mcelin12       XIV_ORA_DAT_VSCSI_07  XIV_ORA_DAT_VSCSI_08    WS_LPAR1      XIV_ORA_rootvg_LPAR_1_npiv   XIV_ORA_oravg_LPAR2_NPIV         05 24 14 05 24 19 05 24 24 05 24 29 05 24 34    Figure 6 22 XIV Top monitoring tool    39 05 24 44 05 24 49    OS 24   1 Sep 2011    05 24 54 05 24 59 05 25 04 05 25 09       Chapter 6  Performance    313    314    The initial XIV Top window is divided into two horizontal sections  the Volumes and Hosts  section and the Performance Chart section  You can collapse or expand each section by  clicking the arrow icon on the right side of the header of each section  Figure 6 23      Latency  ms  BW  MBps  Host Name OPS Latency  ms  BW  MBps   Blade5 L 21 05 0 556 1 l  Blade9 HS22V3 0 059  Blade2 L 21 02 0 0  Blade3 L 21 03 0 0  Blade4 L 21 04 0 0  Blade10 HS 21 20 0 0  Blade6 L 521 06 0 0  Blade7 HS22V2 0 0  WS_ESX_Team2 0 161  ITSO_LPAR1  WS_ESX_Team3  WS_ESX_Team4  Basic_WS Team6_Win  Basic_WS_Team3_Win  WS_ESX_Team5  WS_ESX_Team6  Basic_WS_Team2_Win  WS_ESX_Team1  XIVWS_HS21_14  ITSO_LPAR2  Basic_WS_Team4_Win  XIVWS_HS21_13  Basic_WS_Team5_Win  Basic_WS_Team1_Win                eseeceezechecece             Figure 6 23 XIV Top with Performance Chart section collapsed    Each column of the Volumes and Hosts 
221. XIV Storage  Management software installation    on page 114 The following examples assume a Windows  management workstation        Chapter 5  Security 235    To add users  complete the following steps     1  Use the user_list command to obtain the list of predefined users and categories  as  shown in Example 5 1  This example assumes that no users  other than the default users   have been added to the system     Example 5 1 XCLI user_list     gt  gt user_ list    Name Category Group Active    Access All  xXiv_development xiv_development yes   Xiv_maintenance xiv_maintenance yes   admin storageadmin yes   technician technician yes   espadmin storageadmin yes   itso storageadmin yes   lab admin applicationadmin Application0O1l Group yes  lt    NO    2  If this system is a new system  change the default password for the admin user by running  update_user  as shown in Example 5 2   Example 5 2 XCLI user_update     gt  gt user_update user admin password New PasswOrd password verify New PasswOrd  Command executed successfully     3  Add a user  as shown in Example 5 3  Define a user using a unique name  password  and  role  designated here as category    Example 5 3 XCLI user_define     gt  gt user_ define user lab user password XIV R3 password veri fy XIV R3  category applicationadmin  Command executed successfully     To add user to domain  complete the following steps     1  Use the domain_list_users command to obtain the list of predefined and domain  associated users and cate
222. XIV Storage Management software 123    Perspective  The figures listed in this chapter depict the interface layout from a storage  administrator perspective  Not all options are available to the application administrator and  read only permission levels     The main window  which is the System view  is divided into the following areas  as shown in  Figure 4 15 on page 123     Function icons and menus On the left side of the main window in the System view  a  set of vertically stacked icons is used to navigate between  the functions of the XIV Storage Management GUI  Move  the cursor over an icon to preview the function menu for  that icon  A brief description of each of the function icons is  shown in Figure 4 16 on page 125     Main display This provides a graphical representation of the XIV  Storage System  Move the cursor over a specific hardware  component  module  disk  uninterruptible power supply   UPS  unit  to open a status callout for that component   Click the arrow at the lower right to see a view of the  system patch panel  Move the cursor over a port to open a  status callout for that port     Menu bar This area is used for configuring the system and as an  alternative to the function icons  Also  various user tools  pertaining to XIV Storage System are available here     Toolbar This area contains a dynamic  contextual set of actions  based on the current view     User indicator Identifies the current authenticated user  Click the user  indicator to log in with
223. XIV systems profile can be imported on extra systems on which the  XIV Storage Management GUI is installed to ensure an identical systems view across all  installations       Actions View  1    Import Systems File    Export Systems File    Preferences    Exit       Figure 4 2 Export file    114 IBM XIV Storage System Architecture and Implementation    4 2 2 XIV Storage Management software installation steps for direct use    In this section  we describe the GUI installation procedure and its use for a direct connection  to the XIV systems     Important  The minimum requirements for installing the XIV Storage Management  software in Windows 7 or Windows Server 2008 are as follows     Processor  Dual core processor or equivalent  Memory  512 MB of RAM  1 GB of RAM and above recommended   Disk capacity  150 MB    Screen resolution  1024 x 768  1024 x 768   1920 x 1200 recommended     At the time of writing this book  we used an early version of the IBM XIV Storage  Management GUI version 4 4  Later XIV Storage Management GUI releases might differ  slightly in appearance     Complete the following steps to install the XIV Storage Management software     1  Locate the XIV Storage Manager installation file  Double click the installation file and in the  dialog window that is displayed  choose the language for the installation and click OK     Globalization  The XIV GUI Version 4 4 or later supports the English  Chinese  and  Japanese languages     is a             Figure 4 3 GUI in
224. _status  command  Example 7 31      Example 7 31 Check support center connection status     gt  gt support_center_status  State Connected sessions Timeout  min  Module Connected since  no connection    In this example  no connections are currently established  To start a session  run  support _center_connect followed by support_center_status  as shown in Example 7 32 on  page 379     IBM XIV Storage System Architecture and Implementation    Example 7 32 Connect to support center     gt  gt  support_center_connect  command 0   administrator     command   code    SUCCESS   status    0     status_str    Command completed successfully   aserver    DELIVERY_SUCCESSFUL      gt  gt  support_center_status  State Connected sessions Timeout  min  Module Connected since    idle 0 no timeout 1 Module 4 2010 10 08 10 45 35    If no parameters are specified with the support_center_connect command  the timeout  values default to never and no password is used  You can specify the parameters for timeout   idle_timeout  and password  as shown in Example 7 33  The timeout values are in the format  hh mm when using the XCLI commands     Example 7 33 Specify connection parameters     gt  gt  support_center_connect timeout 01 00 idle _timeout 00 30 password 4support  command 0   administrator     command   code    SUCCESS   Status    0     Status str    Command completed successfully   aserver    DELIVERY SUCCESSFUL      gt  gt  support_center_status  State Connected sessions Timeout  min  Module 
225. a  Beil  B Module 4  Interface   Module 2  Data  feo WUE T   Module 3  Data   Module 1  Data  fe al H i M Module 2  Data   za a TM      Module 1  Data     UPS 3    UPS 3    UPS 2 UPS 2    UPS 1 UPS 1             Figure 1 1 XIV Storage System components  Front and rear views    1 5 XIV Gen3 design features and functions    This section describes the key design features and functions of the XIV Storage System  architecture     We describe these key design points and underlying architectural concepts in detail in  Chapter 2     IBM XIV Storage System logical architecture and concepts    on page 17     1 5 1 Massive parallelism    The system architecture ensures full use of all system components  Any input output  I O   activity involving a specific logical volume in the system is always inherently handled by all    6 IBM XIV Storage System Architecture and Implementation    spindles  The system harnesses all storage capacity and all internal bandwidth  It also takes  advantage of all available processing power for host initiated I O activity and system initiated  activity  such as rebuild processes and snapshot generation  All disks  processors  switches   and other components of the system contribute to the performance of the system at all times     1 5 2 Workload balancing    The workload is evenly distributed over all hardware components at all times  All disks and  modules are used equally  regardless of access patterns  Although applications might access  certain volumes mo
226. a  l Close      Figure 5 20 Completed IPSec connection configuration    4  When an IPSec connection is established from the remote IP address  connection details  can be viewed by right clicking the connection entry and choosing Show tunnels  as  shown in Figure 5 20     5 5 Native user authentication    To prevent unauthorized access to the configuration of the storage system and ultimately to  the information stored on its volumes  the XIV Storage System uses password based user  authentication  Password based authentication is a form of challenge response  authentication protocol where the authenticity of a user is established by presenting that user  with a question    challenge    and comparing the answer    response    with information stored in a  credential repository     Chapter 5  Security 219    Note  If you plan to use the Hyper Scale Manager  see the IBM Redpaper   BM  Hyper Scale for the XIV Storage System  REDP 5053  and 5 5 3     Security considerations  when using Hyper Scale Manager    on page 232     5 5 1 XIV Storage System local credential repository    By default  the XIV Storage System is configured to use native  XIV managed  user  authentication  Native user authentication uses the credential repository stored locally on the  XIV Storage System  The XIV local credential repository maintains the following information      gt  Username   User password   User role   User group   Optional account attributes    YY vV Yy    User name    A user name is a str
227. a single network  failure  be sure to connect these ports to two switches     Make sure that the networking equipment providing the management communication is  protected by a UPS     Management IP configurations   For each of the three management ports  you must provide the following configuration  information to the IBM SSR upon installation  see 3 2 1     Basic configuration planning    on  page 94      gt  IP address of the port  all three ports must belong to the same subnet     gt  Subnet mask    gt  Default IP gateway  if required     Provide the following system level IP information  not port specific       gt  IP address of the primary and secondary DNS servers   gt  IP address or DNS names of the SNMP manager  if required   gt  IP address or DNS names of the SMTP servers    Protocols    The XIV Storage System is managed through dedicated management ports running TCP IP  over Ethernet  Management is carried out through the following protocols  consider this  design when configuring firewalls  other security protocols  and SMTP relaying       gt  Proprietary XIV Storage System protocols are used to manage the XIV Storage System  from the XIV Storage Management GUI and the XCLI  This management communication  is performed over TCP port 7778  where the XIV Storage Management GUI XCLI  as the  client  always initiates the connection  and the XIV Storage System performs as the  server      gt  XIV Storage System sends and responds to SNMP management packets    gt  XIV Sto
228. aa Sa aS Aaa 174  AeA BOMANS e520 Sate ta  a Yes care  a a Ene ts So cat Rane Uhh eee aoe RON a Sr neha a eee a A 175  4 8 2 Managing domains with the XIV Storage Management GUI                 175  4 8 3 Limiting domains by performance class  QOS        2    0 0 00  eee 193  4 8 4 Domains and LDAP authentication           0    0 0 eee 195  4 8 5 Managing domains with the XIV command line interface  XCLI              197   AD STASI CACC ce crate as bee eas See orice nee Byes era  ee a al Bess oie Be ee et eee di Beast 199  4 9 1 Managing flash cache with the XIV Storage Management GUI              199  4 9 2 Managing flash cache with XIV Command Line Interface                   204   Chapter 5  SECUrTY eesse oom seme Bog ee won hid deer aS oe ee OP SH ee Oe Ge a 207   5 1 IPAYSICEl ACCESS SCCUINY nc  dade area ewe hee bie wade Ae ee ae 208   5 2 x509 certificate validation and management             0 00  ee ee 208  5 2 1 Managing x509 certificates with the XIV Storage Management GUI           209   5 3 Configuring IPv6 addresses           0    ccc eee eens 215  523 1  ENADINO IPVO SUPPO aei 2 2 5 dundee wl baie Oe Weer ee eee a ee 215  5 3 2 Configuring IPv6 addresses           0    eee eee 215   5 4 Configuring Internet Protocol Security connectivity             0 000 cee eee 217   5 5 Native user authentication         0 0 0    ce eee eee eee eee 219  5 5 1 XIV Storage System local credential repository             0 000 ce eee eee 220  5 5 2 Managing user accounts with th
229. ability  SG24 7904 for details  related to host definitions and volume mapping     4 7 QoS feature    170    The Quality of Service  QoS  feature allows the XIV Storage System to deliver different  service levels to hosts that are connected to the same XIV system     The QoS feature favors performance of critical business applications that run concurrently  with noncritical applications  Because the XIV disk and cache are shared among all  applications and all hosts are attached to the same resources  division of these resources  among both critical and noncritical applications might have an unintended adverse  performance effect on critical applications  QoS can address this by limiting the rate  based  on bandwidth and IOPS  for non critical applications  Limiting performance resources for  non critical applications means that the remaining resources are available without limitation  for the business critical applications     The QoS feature is managed through the definition of performance classes and then  associating hosts with a performance class  The feature was extended in the XIV Storage  Software Version 11 5 and can also be set by XIV domains and XIV storage pools  Each  performance class is now implicitly one of two types  host type or pool domain type     The QoS feature possibilities and limitations can be summarized as follows      gt  Up to 500 performance classes are configurable      gt  QoS is applicable to host  domain  pool and restricted combinations of t
230. ache at volume level     The remainder of this section shows the essential actions that an administrator can perform  through the GUI and the XCLI to manage the flash cache feature  For a complete description  of all actions and commands that relate to the flash cache  see the Redpaper publication titled  Solid State Drive Caching in the IBM XIV Storage System  REDP 4842     4 9 1 Managing flash cache with the XIV Storage Management GUI    You can check the health and status of SSDs used for the flash cache in the main system  view  Moving the mouse cursor over a module displays a pop up panel showing the  temperature and status of major module components  When SSD disks are present  the SSD  status is displayed at the bottom of the pop up panel  If the SSD is operational  a green 0K  status is displayed as illustrated in Figure 4 115                    Module  5   93 0_interface     Temperature  29  C  Status  OK    Data Service  OK  Interface Service  OK  Remote Service  OK    PSUs  OF  Fans  OK  SSD  OK    1       Figure 4 115 Module status view with SSD             Clicking a module number opens a full perspective view of the module and its components  as  shown in Figure 4 116 on page 200     Chapter 4  IBM XIV Storage Management software 199    From that view  you can also check the SSD status  If an SSD is installed  hover your mouse  cursor over the SSD in the module view      gt  SSD is highlighted in green if the status is OK and phased in    gt  SSD is highlighted 
231. acility circuit  Locations in Europe  Middle East  and Africa  EMEA    Australia  and New Zealand should take special note of this information     IBM XIV Storage System Architecture and Implementation            oiou Port overview    EBSA e NAA e P1 P2 P3 UPS power sockets   P4 maintenance module  power socket   F1 F2 F3 UPS circuit breaker   F4 maintenance module  circuit breaker   X807 ATS monitoring to  UPS 3   network port ATS monitoring to  Module 4    CH  inh    Hl  A neua       x807          Figure 3 11 Automatic Transfer Switch    The ATS is monitored by the system and generates system event messages in case of  problems  The status of the ATS can also be viewed with the ats_list XIV Storage System  Command Line Interface  XCLI  command  as shown in Figure 3 12     a XCLI Session   XIV 6000037 PFE    connecting      XIV 6000087 PFE gt  gt ats_list   Component ID Status Currently Functioning Input Line 1 Input Line 2 Output 304  1 Output SOA  2 Output 304  3 Output 104A Firmware Version 3 Phase  LATS  1 OK yes yes yes no yes no yes 4 no   KIV 6000037 PFE             Figure 3 12 Output of ats_list command    Four ATS features can be ordered with the XIV Storage System  Order them to correspond to  the type of alternating current electric power generation  transmission  and distribution used  in the client location  When ordering the XIV Storage System  order the correct feature that  meets both local power regulations and client requirements     The four ATS features a
232. acity to user created storage    pools  The storage pool is initially empty and does not contain volumes  However  you cannot  create a storage pool with zero capacity     144 IBM XIV Storage System Architecture and Implementation    To create a storage pool  complete the following steps    1  Click Add Pool in the toolbar from in the Storage Pools view  or right click in an empty  area of the Storage Pools view and click Add Pool  An Add Pool window opens  as shown  in Figure 4 43     Add Pool    XIV PFE GEN3 1310133     gt   amp  Regular Pool a ee Thin Pool    System Allocated     Racin  Pools 9  k   Free  88        Pool Size  4319 GB  Snapshots Size  447 GB  Pool Name            Figure 4 43 Add Pool    2  You must choose Regular Pool or Thin Pool according to your needs  Based on the pool  type you choose  the available fields differ  For a Thin Pool  enter values for the following  fields         Pool Hard Size  Specify the upper limit of hard capacity       Pool Soft Size  Specify the upper limit of soft capacity       Lock Behavior  Specify the behavior in case of depleted capacity     This value specifies whether the storage pool is locked for write or whether it is  disabled for both read and write when running out of storage space  The default value  is Read only     For a regular pool  enter the Pool Size field  the required size of the storage pool    3  In the Snapshots Size field  enter the required size of the reserved snapshot area    4  Inthe Pool Name field  
233. age  Administrator through the XIV GUI when local authentication is in use  When LDAP  authentication is in use  enabled   domain user associations must be managed directly within  the chosen LDAP solution  In addition  with LDAP enabled  a global administrator can  associate user groups to a domain but cannot disassociate user groups from a domain with    LDAP active     4 8 5 Managing domains with the XIV command line interface  XCLI    All of the operations explained in 4 8 2     Managing domains with the XIV Storage  Management GUI    on page 175  can also be performed through the command line interface   To get a list of all the domain related commands  enter the following command in an XCLI    Session     help search    domain       Important  The commands shown in this section are based on the assumption that you  started an XCLI Session on the selected system  as described in    XCLI session features     on page 138  Replace the example parameter values  as appropriate  to perform the    commands     Example 4 17 shows the output of the command     Example 4 17 All the domain related commands available in the XCLI    XIV_PFE2_ 1340010 gt  gt help search  domain     Category  accesscontro   accesscontro   accesscontro l  accesscontro   accesscontro   accesscontro l  accesscontro   accesscontro   accesscontrol  accesscontro l  accesscontro   accesscontro   accesscontro   accesscontro   accesscontro l  accesscontrol  accesscontro   accesscontro   accesscontro   system  s
234. agement policy Basic            Figure 5 11 Enable IPv6    In the drop down box for Use IPv6  select Yes and click Update     5 3 2 Configuring IPv6 addresses    In the main window  click the Backview arrow next to the XIV System Storage image  as  shown in Figure 5 12 on page 216  to open the view of the system ports     Chapter 5  Security 215             Figure 5 12 GUI Backview arrow    Configuring management port IPv6 addresses    To configure IPv6 addresses on a management port  right click that port and select Update  Management IP Interface  as shown in Figure 5 13        Update Management IP Interface                 Figure 5 13 Update Management IP Interface    Enter the corresponding three IPv6 addresses in the fields shown in Figure 5 14  and click    Update   Update IP Interface   Management x  IPv4 Address 1     9 141 209 186     IPv4 Address 2     9 141 209 187  IPv4 Address 3     9 11 209 188  IPv6 Address 1      9 0 0 0 0 0 0 0 0  IPve Address        0 0 0 0 0 0 0 0 0  IPve Address 3      9 0 0 0 0 0 0 0 0  Netmask  255 255 254 0    Default Gateway     9 11 2081  MTU  1500      lt            Figure 5 14 Update management port IPv6 addresses    216 IBM XIV Storage System Architecture and Implementation    Configuring VPN port IPv6 addresses    To configure IPv6 addresses on a VPN port  right click that port and select Update VPN IP  Interface  as shown in Figure 5 15              Figure 5 15 Update VPN Interface    Enter the corresponding two IPv6 addresses in
235. al     and logical space available for all storage pools in the  system  When the soft system size exceeds the hard system size  it is possible to logically  provision more space than is physically available  allowing the benefits of thin provisioning of  storage pools and volumes to be realized at the system level     The soft system size limits the soft size of all volumes in the system and has the following  attributes      gt  Itis not related to any direct system attribute and can be defined to be larger than the hard  system size if thin provisioning is implemented  The storage administrator cannot set the  soft system size     Storage pools  If the storage pools within the system are thinly provisioned  but the  soft system size does not exceed the hard system size  the total system hard capacity  cannot be filled until all storage pools are regularly provisioned  Therefore  it is best to  define all storage pools in a non thinly provisioned system as regular storage pools      gt  The soft system size is a purely logical limit  However  you must exercise care when the  soft system size is set to a value greater than the maximum potential hard system size  It  must be possible to upgrade the system   s hard size to be equal to the soft size  Therefore   defining an unreasonably high system soft size can result in full capacity depletion  It is for  this reason that defining the soft system size is not within the scope of the storage  administrator role      gt  If it i
236. al  the results list    Product selector      AIV Storage System  28610  2812     Installed Version     440 1       Platform       Mac OSA   x    select one  AIX   HPUX   Linux       Solaris          Figure 4 1 Fix Central portal    The Select fixes page is displayed  Scroll down to the section labeled Management tools and  select IBM_XIV_Management_Tools package     For more information about XIV Storage Management software compatibility  see the  XIV interoperability matrix or the IBM System Storage Interoperation Center  SSIC      http   www ibm com systems support storage config ssic index jsp    IBM XIV Storage System Architecture and Implementation    4 1 2 XIV Storage Management software interfaces    The XIV Storage Management tools include a graphical user interface  XIV Storage  Management GUI   an XIV Storage System Command Line Interface  XCLI   and XIV  Storage Management Top GUI  XIV Top   which is used to monitor performance     XIV Storage Management GUI   The XIV Storage Management GUI  or XIV GUI  is an intuitive graphical user interface that  lets you perform most administrative and technical operations  depending upon the user role   for one or several IBM XIV systems     The motivation behind XIV Storage Management and the resulting GUI design is to eliminate  the complexities of system management  Typical operational challenges  such as setup   configuration changes  general administration  and more  are achieved with a few clicks     The XIV Management 
237. al spare capacity    The dynamically balanced distribution of data across all physical resources by definition  eliminates the need of dedicated spare drives that are necessary with conventional RAID  technologies  Instead  the XIV Storage System reserves capacity on each disk drive to  provide adequate space for the redistribution or rebuilding of redundant data in the event of a  hardware failure     This global spare capacity approach offers advantages over dedicated hot spare drives   which are used only upon failure and are not used otherwise  therefore reducing the number  of spindles that the system can use for better performance  Also  those non operating disks  are not typically subjected to background scrubbing processes  In XIV  all disk drives are  operating all the time and are subject to examination  which helps detect potential reliability  issues with drives     The global reserved space includes sufficient capacity to withstand the failure of a full module  plus three additional disk drives  and still allow the system to create the necessary partition  copies to return to full redundancy     Tolerance of failures  A fully used system tolerates multiple hardware failures  including  up to an entire module with three subsequent drive failures outside of the failed module   f  the system is less than 100  full  it can sustain more subsequent failures based on the  amount of unused disk space that is allocated in the event of failure as a spare capacity   For a t
238. allowing the most efficient use of available resource  As a result  significant cost savings are  achieved  compared to traditional provisioning techniques  This benefit is achieved by  defining a logical capacity that is larger than the actual physical capacity used     1 5 8 Processing power    The XIV Storage System open architecture uses the latest processor technologies and is  more scalable than solutions that are based on a closed architecture     1 5 9 SAN connectivity    The XIV Storage System provides up to 24 x 8 Gb FC ports and up to 12 x 10 Gb Ethernet  or  22 x 1 Gb Ethernet  ports for iSCSI connection     1 5 10 Inter generational mirroring    Mirroring between XIV Gen3  model 114 or model 214  and XIV second generation  model  A14  systems is supported     The following prerequisites must be met  however      gt  The XIV Storage System Software Version 11 2 0 or later is required for the Gen3  systems Models 114  and Version 11 2 0 or later is required for the Gen3 Model 214      gt  The XIV Storage System Software Version 10 2 4e or later is required on the  second generation systems     The mirroring setup and functions are otherwise unchanged and fully supported between the  two generations  For details about the synchronous and asynchronous mirroring functions   see the IBM Redbooks publication titled  BM XIV Storage System Business Continuity  Functions  SG24 7759     IBM XIV three way mirroring that was introduced in the 11 5 0 system software further  e
239. also be populated but are not  required     IBM XIV Storage System Architecture and Implementation    3  Create the account by clicking Next  A new window opens  Figure B 2         New Object   User Ea       Create in   sivhost  ldap  storage  tucson  ibm  com sers    Password   tseeseseses  Confirm password   esseeseeese     M User must change password at next logon    User cannot change password    Password never expires      Account is disabled     lt  Back Cancel         Figure B 2 Assigning a password    By default  the password is set to    User must change password at next login     After the  account is created  the user must log on to a server that is part of the Active Directory  managed domain to change the password  After the password is changed  all the security  rules and policies related to password management are in effect  such as password  expiration  maintaining password change history  verifying password complexity  and   so on     Password  If the password initially assigned to an Active Directory user is not changed   XIV Storage System does not authenticate that user     4  Complete the account creation by clicking Next     Finish     Appendix B  Additional LDAP information 433    5  Populate the Description field with a predefined value for the XIV Storage System  category  role  mapping by selecting the xivtestuserl user name  right clicking it  and  clicking Properties  Figure B 3                         Hi  testuserl Properties El        Member Of  
240. always placed in a separate module from the one  containing the primary copy partition     Important  In the context of the XIV Storage System logical architecture  a partition  consists of 1 MB  1024 KB  of data  Do not confuse this definition with other definitions of  the term partition     The diagram in Figure 2 4 on page 23 illustrates that data is uniformly yet randomly  distributed over all disks  Each 1 MB of data is duplicated in a primary and secondary  partition for redundancy  The system ensures that the primary partition and its corresponding  secondary partition are never located within the same module to protect against a single point  of failure     Chapter 2  IBM XIV Storage System logical architecture and concepts 27    Logical volumes   The XIV Storage System presents logical volumes to hosts in the same manner as  conventional subsystems  However  both the granularity of logical volumes and the mapping  of logical volumes to physical disks differ      gt  Every logical volume consists of 1 MB  1024 KB  constructs of data known as partitions      gt  The physical capacity associated with a logical volume is always a multiple of 17 GB   decimal  because the volume spans all physical drives in the system because of the grid  nature of the architecture     Although it is possible to present a block designated logical volume to a host that is nota  multiple of 17 GB  the actual physical space that is allocated for the volume is always the  sum of the minimum n
241. an in Tivoli Storage Productivity Center      gt  XIV defines space this way         1 GB as 10     1 000 000 000 bytes      1TBas 10     1 000 000 000 000 bytes     gt  Tivoli Storage Productivity Center defines space this way         1 GiB as 2       1 073 741 824 bytes      1 TiB as 27     1 099 511 627 776 bytes    These different definitions are why capacity information might appear to differ  and seem  wrong  when comparing the XIV Storage Management GUI with the Tivoli Storage  Productivity Center GUI  when in fact it is the same size     Because the XIV Storage System also provides thin provisioning  additional columns for the  thin provisioning storage pools were introduced to the Tivoli Storage Productivity Center GUI     The Tivoli Storage Productivity Center configured space is equivalent to the XIV Storage  System soft capacity  and Tivoli Storage Productivity Center real space is equivalent to the  XIV Storage System hard space     Additional Configured Capacity Limit and Remaining Configured Capacity columns were  introduced to report on the hard capacity of a subsystem  The pre existing Consumed Space  and Available Space columns now report on the soft capacity of a subsystem in the  following reports      gt  Storage Subsystem list  Click Disk Manager     Storage Subsystems to view this report       gt  Storage Subsystem Details  Click Disk Manager     Storage Subsystems and select a  storage subsystem to view this report       gt  Storage Subsystem Details  
242. anagement         Systems f Actions   View   Tools   Help ih  wd  4 Tm    System Settings a System  Import Systems File LDAP  Export Systems File IPsec  PLAT ROGRS Pool Alerts Thresholds  Exit Support    Modify IP Addresses  Shutdown System          Figure 4 22 Manage XIV system certificates    Note  The Manage Certificates menu option is not visible for XIV Systems running  system software older than Version 11 2     128 IBM XIV Storage System Architecture and Implementation     gt  In addition  the GUI now supports the management of the trusted certificates used to    secure its communication with IBM XIV systems  To facilitate the import and management    of trusted certificates in the GUI  a new Certificates tab has been added to the    Management view  To access  click the Tools portion of the menu bar  click Management   and then click the Certificates tab in the Management window  as shown in Figure 4 23   For more information about the use of certificates  see 5 2     x509 certificate validation and    management    on page 208     Management    General Settings          Regional Settings    E Trusted Certificate Authorities in Local Trust Store    Certificates E Other Trusted Certificates in Local Trust Store      XIV  Type 1  XIV Nov 17  2007    XIV CA ibmXIVDisk  ibmXIVDisk Nov 21  2012     Hyper Scale Manag    Hyper Scale Man    Sep 6  2013     Hyper Scale Manag    Hyper Scale Man    Sep 30  2013    XIV  Type 2  XIV May 19  2011       Nov 16  2008        Nov 16  2
243. anced performance metrics for the XIV  Storage System  For more information  see the Tivoli Storage Productivity Center web page     http    www ibm com systems storage software center index html    On the IBM Redbooks main page  search for    Tivoli Storage Productivity Center    to find  several Redbooks publications about how to use the product     http   ibm com redbooks    For more information that relates to the XIV Storage System  see 7 7     Using Tivoli Storage  Productivity Center    on page 390     It is possible to see comprehensive XIV Storage System I O performance characteristics from  Tivoli Storage Productivity Center  The most effective use of this data is to extract this data  from the Tivoli Storage Productivity Center database into comma separated values  CSV   files and then import them into a spreadsheet  This data is useful for performance reporting   analysis  and archiving     Tivoli Storage Productivity Center is a good way to evaluate XIV Storage System  performance  The Tivoli Storage Productivity Center data that is most useful for XIV Storage  System performance is contained in the following reports      gt  By Storage Subsystem  overall statistics on the entire XIV Storage System    gt  By Module Node    gt  By Volume    gt  By Port    IBM XIV Storage System Architecture and Implementation    Figure 6 29 shows where this data is in the Tivoli Storage Productivity Center GUI     i IBM Tivoli Storage Productivity Center  Intelsx3850X5 ad mel stg 
244. and shows a list of hosts  if any  that are already defined  To add  a host or cluster  click either Add Host or Add Cluster in the menu bar  see Figure 4 60    In our example  we select Add Host  Add Host is used for a single host that is assigned a  LUN or multiple LUNs  Add Cluster is used for a group of hosts that share a LUN or  multiple LUNs     Systems   Actions   View   Tools   Help    O J Add Host      Add Cluster  3    Export       Figure 4 60 Add new host    3  The Add Host window opens  as shown in Figure 4 61 on page 165  From the System    Cluster drop down menu  choose a cluster for the host  choose Standalone Hosts for no  cluster   Enter a Name for the host  Select a Type for the host  choose the default unless  the host type is hpux or zvm      Important  Do not change the host type of a host that has mapped volumes  because  the volumes will be inaccessible to the host     If you need to change the host type  remove all mappings first  change the host type   and remap the volumes afterward     164 IBM XIV Storage System Architecture and Implementation    4  Optionally  if this host will use Challenge Handshake Authentication Protocol  CHAP   authentication for IP network Small Computer System Interface  iSCSI   enter values for  CHAP Name and CHAP Secret           Add Host   System  MINV_02_1310114    Domain  no domain r  Cluster  Standalone Hosts r  Name  5 ITSO_host     Type  default x  CHAP Name    CHAP Secret           Figure 4 61 Add host details    5 
245. anned changes to the internal hardware infrastructure  such as the loss of a module     Availability   The XIV Storage System maximizes continuous operation and minimizes the performance  degradation associated with nondisruptive planned and unplanned events  while providing the  capability to preserve the data in a disaster     High reliability   The XIV Storage System not only withstands individual component failures by quickly and  efficiently reinstating full data redundancy  it also monitors permanently and phases out  individual components before data redundancy is compromised  We describe this in     Proactive phase out and self healing mechanisms    on page 58  The collective high reliability  provisions incorporated within the system constitute multiple layers of protection from  unplanned outages and minimize the possibility of related service actions     Maintenance freedom    Although the potential for unplanned outages and associated corrective service actions are  mitigated by the reliability attributes inherent in the system design  the XIV Storage System  autonomic features minimize the need for storage administrators to conduct non preventative  maintenance activities that are purely reactive in nature  This is done by adapting to potential  issues before they are manifested as a component failure  The continually restored  redundancy  along with the self healing attributes of the system  effectively enable  maintenance activities to be decoupled from the ins
246. apacity per spindle  Using smaller drives maximizes the ratio of  dynamic random access memory  DRAM  and flash cache to disk capacity  also called the  backstore   Using smaller drives also increases the potential maximum viable aggregate  workload access density  the ratio of IOPS to each unit of consumed capacity   In  performance terms  the result is that the aggregate potential working set size that can be  achieved with 100  capacity use is greatest when 1 TB drives are selected  In addition to  the impact to caching  also consider that decreasing the drive size obviously decreases the  maximum potential amount of data that can be accessed by each physical HDD arm  This  means that the viable achievable physical disk IOPS per unit of capacity is maximized     Performance requirements can be determined in several ways  including the following  methods      gt  Benchmark testing    gt  Application vendor specifications  based on benchmark testing     gt  Existing I O performance characteristics on existing storage being replaced by  XIV Storage System    It is the client   s responsibility to provide performance requirements  However  IBM licenses a  performance modeling and sizing tool called Disk Magic that aligns client performance  requirements with both the performance capacity and data storage capacity of an   XIV Storage System configuration  Disk Magic is licensed to IBM and IBM Business Partners     6 2 2 Number of logical unit numbers    When planning an XIV Sto
247. apped to an  XIV role     Example 5 25 LDAP user mapped to a single roles authentication success      xcli  c  XIV 6000050   u xivtestuser2  p PasswOrd Idap user test  Command executed successfully       ldapsearch  LLL  H Idap   9 155 113 143 389  D  cn itso cn Users dc itso dc storage dc ibm dc com  w PasswOrd  b  cn Users dc itso dc storage dc ibm dc com cn xivtestuser2 member0f    dn  CN xivtestuser2  CN Users DC itso DC storage DC ibm  DC com  memberOf  CN NonXIVgroup CN Users DC itso DC storage  DC ibm  DC com  memberOf  CN XIVAdmins CN Users DC itso DC storage  DC ibm DC com    After all Active Directory groups are created and mapped to corresponding XIV Storage  System roles  the complexity of managing LDAP user accounts is reduced because the role  mapping can now be done through Active Directory group membership management  The  easy to use point and click interface leaves less room for error when it comes to assigning  group membership  as opposed to entering text into the description field     5 9 5 OpenLDAP Directory and XIV Storage System role mapping    OpenLDAP Directory group membership can be used for XIV Storage System role mapping  as described in 5 9 4     Active Directory group membership and XIV role mapping    on   page 274 by using the member0Of attribute to explicitly identify wnat group memberships that a  user has     The role mapping mechanism is not restricted to using group membership to identify  association to a suitable XIV Storage System rol
248. apshots in the pool     Thin provisioning is managed for each storage pool independently of all other storage pools      gt  Regardless of any unused capacity that might be in other storage pools  snapshots within  a storage pool are deleted by the system according to the corresponding snapshot pre set  priority if the hard pool size contains insufficient space to create an additional volume or  increase the size of an existing volume   Snapshots are deleted only when a write occurs  under those conditions  and not when allocating more space       gt  As described in    Thinly provisioned storage pools    on page 39  the storage administrator  defines both the soft size and the hard size of thinly provisioned storage pools and  allocates resources to volumes within a storage pool without any limitations imposed by  other storage pools     The designation of a storage pool as a regular pool or a thinly provisioned pool can be  dynamically changed by the storage administrator      gt  When a regular pool needs to be converted to a thinly provisioned pool  the soft pool size  parameter must be explicitly set in addition to the hard pool size  which remains  unchanged unless updated      gt  When a thinly provisioned pool must be converted to a regular pool  the soft pool size is  automatically reduced to match the current hard pool size  If the combined allocation of  soft capacity for existing volumes in the pool exceeds the pool hard size  the storage pool  cannot be converted
249. as previously  stored on the target volume is lost and cannot be restored     Use the snapshot functions     The XIV Storage System advanced snapshot feature has unique capabilities that enable  the creation of a virtually unlimited number of copies of any volume  with no performance  penalties     Map a volume     Although the storage system sees volumes and snapshots at the time of their creation  the  volumes and snapshots are visible to the hosts only after the mapping procedure     For more information about mapping  see 4 6     Host definition and mapping    on page 164   Change the SSD caching state     You can change the SSD caching state for selected volumes  By default  volumes follow  the SSD caching system setting  With this option  you can manually override the default  system setting for specific volumes  For more information  see 4 9     Flash cache    on  page 199     4 5 2 Managing volumes with XIV Command Line Interface    All of the operations explained in 4 5 1     Managing volumes with the XIV Storage  Management GUI    on page 153 can also be performed through the command line interface   To get a list of all the volume related commands  enter the following command in an XCLI  Session     hel    p category volume    Important  The commands shown in this section assume that you started an XCLI  Session on the selected system  as described in    XCLI session features    on page 138   Replace the example name values to perform the commands     Example 4 9 s
250. at the XIV Storage System contacts when initiating a  Remote support connection  for example  ethO      ListenPort The TCP port on which Listenlinterface listens  for example  8988      Important  The XIV Storage System must be able to contact the host running the  XIV Remote Support Proxy agent on the specified ListenInterface and ListenPort to run  a remote support connection     TargetAddress The network address of the XRSC server to which the XIV Remote  Support Proxy agent initiates a connection  IBM supplies the address    TargetPort The TCP port of the XRSC server  This port is normally set to 443  but  confirm this port when you get the TargetAddress information from  IBM Support    StatusInterface The network interface name where you can query the status of the    XIV Remote Support Proxy agent and show any active remote support  connections     StatusPort The TCP port on which Statuslinterface listens  for example  8989      HTTPProxyHost The network address of an external web proxy  This parameter is an  optional parameter if there is an existing web proxy service and it is  not possible to open the firewall for the host running the proxy     HTTPProxyPort The TCP port on which HTTPProxyHost listens     After you configure the proxy conf file  you can start the proxy service by running service  Xivproxy start and then run service xivproxy status to confirm that the XIV Remote  Support Proxy agent is running  as shown in Example 7 38     Example 7 38 Starting the Re
251. ata on each drive  The XIV makes a copy of this  data and redistributes it on reserved space on the remaining 179 drives  So this operation  reads a small amount of data from 168 drives and  in turn  writes the same small amount of  data to 179 drives  This operation represents many spindles doing little work to recover from a  drive failure     IBM XIV Storage System Architecture and Implementation    Consider the following observations about XIV Storage System data redistribution      gt  Additional drive use is small  which means that applications hardly notices any I O  performance differences      gt  The speed at which an XIV Storage System can redistribute data is fast because of all the  disk spindles involved  resulting in relatively short rebuild and redistribution times as  compared to RAID rebuild times      gt  There is no concern for data access patterns because all XIV Storage System drives  equally share the production I O workload and redistribution workload      gt  The redistribution process also has the advantage of massive parallel computing because  each module works in parallel to manage only 12 drives and to generate data copies as  quickly as possible      gt  An XIV Storage System is data aware  which means that XIV protects or redistributes only  actual data that has been written  XIV Storage System does not bother protecting empty  or free capacity that exists within a failed drive or module  This situation is different from  how RAID based arrays 
252. ate key must be entered during the creation process   This password is needed whenever the CA   s private key is used  The following command can  be used to view the CA certificate     openssl  x509  in cacert pem  text    Signing a certificate  The client or server that needs to obtain a certificate must create a certificate signing request  and send this request to the CA     Certificate request details can be viewed by running the following command     openssl req  in xivhostl_ cert_req pem  text    xivhost1 cert_req pem is the certificate signing request  and is generated on the  xivhost1 xivhost1ldap storage tucson  ibm com server     Signing a certificate for the xivhost1 server    To sign the certificate  run the openss1 command with a specified policy  as shown in  Example B 15     Example  B 15 Signing certificate for xivhost1 server      openssl ca  policy policy_anything  cert cacert pem  keyfile private cakey pem   out xivhostl_cert pem  in xivhost1l_cert_req pem  Using configuration from  usr share ssl openssl cnf  Enter pass phrase for private cakey pem   Check that the request matches the signature  Signature ok  Certificate Details   Serial Number  1  0x1   Validity  Not Before  Jun 29 21 35 33 2009 GMT  Not After   Jun 29 21 35 33 2010 GMT  Subject   commonName    xivhost1 xivhost1ldap storage tucson  ibm com  X509v3 extensions   X509v3 Basic Constraints   CA  FALSE  Netscape Comment   OpenSSL Generated Certificate  X509v3 Subject Key Identifier   C8 EB 8D 84
253. ation   Because the IBM Storage Management Pack consists of nine management packs  you  can choose which packs to install  The list of packs is shown in Figure 7 93 on page 414   The size of each pack is trivial  less than 200 KB each      Custom Setup    Select the program Features you want installed     Click  on an icon in the list below to change how a Feature is installed     Feature Description    Management Packs         SAN Volume Controller        BG    E    Storwize VFooo  E     IBM Flex System   Fo00 This Feature requires 140KB on  vour hard drive     Install to   Ci Program Files IBMi Storage  Host BM storages CoM      InstallShield    Figure 7 93 IBM Management Pack custom installation       414 IBM XIV Storage System Architecture and Implementation    5  Follow the prompts to complete the installation     You will later notice that the installation of the IBM Storage Management Pack also  includes a stand alone command line interface  CLI  utility  scomu cmd  which you can use  from a desktop shortcut or from the Run command box in the Windows Start menu  We  will be using a set of CLI commands to configure the IBM storage systems that are  monitored by Microsoft SCOM  as explained in the next section     7 9 3 Importing the management packs and Adding IBM XIV systems    The installation of the IBM Storage Management Pack does not import the management  packs themselves into SCOM  You must import each specific management pack  for each  storage system type   Com
254. ay XIV _02_ 13107714 Remote Service  Module 6  status is Fail    Hardware Major  E  R  lt  1 Day KIV_ O02 1340114 Disk 12  Module 6  status is Failed Hardware Major  Ea  lt 1 Day AIV_02 1340114 Disk 14  Module 3  status is Failed Hardware Major     Ja   lt 1 Day AIV_02_ 1340114 Disk 10  Module  amp   status is Failed Hardware Major  a   lt 4 Day XIV 02 1340114 Module    status is Failed Hardware Maior             Figure 7 8 Alerts window    7 1 3 Monitoring an individual XIV Storage System using the GUI    You can access the Alerts  Events  Statistics  and QoS Performance Class for the currently  selected machine from the Monitor menu shown in Figure 7 9        nc    a  a        Statistics      Alerts      Events    ERA EEE             Figure 7 9 GUI monitor functions    Monitoring the system    Selecting System from the Monitor menu takes you to the System view  which is shown in  Figure 7 10 on page 332  this view is also the default or main GUI window for the selected  system      Chapter 7  Monitoring 331    Systems   Actions   View   Tools   Help    Cy       T   Settings Launch XCLI p Launch XIVTop    admin     amp  All Systems  12   gt  Lab_Mainz  6   gt    System v   System Time  10 29PM Q       ALLT E        XIV_PFE2_1340010       s Total  Figure 7 10 Monitoring the IBM XIV Storage System          The System view shows a graphical representation of the XIV Storage System rack with its  components  You can click the curved arrow at the lower right of the picture of the
255. ayment  100    Machine 1 less  1  for prior  machine     at end of 1 yr term   client pays for any  delivered system           Figure 3 7 Advanced System Placement pricing model    The client must sign two documents    gt  Advanced System Placement Agreement Z2126 6245 US or CA      The Agreement contains the terms of the program      The Agreement is signed one time for each client   gt  Advanced System Placement Supplement Z126 6246 US or CA      The Supplement contains the details of the machine and time frame      A Supplement must be signed for each machine  One Agreement consists of an initial machine and any number of subsequent machines     There is no limit to the number of subsequent machines that a client may have under an  agreement  but the agreements must be acquired one at a time     Chapter 3  IBM XIV architecture  components  and planning 71    Table 3 2 compares the IBM XIV Storage System CoD to ASP program     Table 3 2 XIV CoD and ASP comparison    Client pays for By XIV module increment   10  16  or Buys full XIV system  payment split  Capacity used 22 TB  Consumption determined last into 2 parts  Second invoice is either  day of each month  when use  gt  70  or at the end of the  period     Minimum capacity Initial system as small as 27 TB  Full XIV systems only  161 TB  243  purchased increments of XIV activated modules TB  325 TB  or 489 TB     10  16  22 TB   Standard oo is 3   extra modules  can RPQ more      Z Purchase or lease XIV system with CoD  
256. be added  G Data Sources  ff IMOM Agents Results  Data  Storage Resource    C Fabrics Switches  2 vee Inband Fabric Agents   Computers   Dut of Band Fabric Agent   Storage Subsystems  ae TPC Servers     Mware YI Data Source  E Discovery    f Storage Subsystem        Tape Libraries    vee Switches and Subsystem   Netware Filer  Windows Domain  NAS  al     Mware YI Data Source   Configuration  A IBM Tivoli Storage Productivity   Configuration Utility    a onfigure Devices    Job Management    Figure 7 67 Configure Devices wizard       The discovery usually takes a few minutes and can be run on a schedule  How often you run  a discovery depends on the dynamic of your environment  It must be run to detect a new  subsystem and to perform basic health checks of all CIMOMs and other storage subsystems     Chapter 7  Monitoring 391    Tivoli Storage Productivity Center configuration wizard  To use the Tivoli Storage Productivity Center wizard  complete the following steps     1     6     Click IBM Tivoli Storage Productivity Center     Configure Devices to start the wizard     2  Click Storage Subsystem and click Next   3   4      Click IBM XIV as the Device Type and enter the required information     Click Add and configure new storage subsystem and click Next         IP Address  For the XIV Storage System  this address corresponds to the three  management IP address of the XIV Storage System  Start with the first IP address         Username  The XIV Storage System user that is crea
257. be verified by hovering through the exploded drawing  as shown in Figure  Figure 7 22       PSU  4  I Status  OK    Module  9       Status        Figure 7 22 Component status in module explosion drawing    Hover over a component to show the actual status of the single component in the module   The example in Figure 7 22 shows the status of PSU 1  The status and temperature of the  module can be inspected also in this view  Click the thermometer to toggle between  Celsius  C  and Fahrenheit  F      If a module   s temperature exceeds a default threshold  a small yellow or red triangle is  displayed to indicate that the module temperature is higher than normal  as shown in  Figure 7 23              Figure 7 23 Module temperature threshold exceeded    If you hover your cursor over a disk  the status and temperature of the disk are shown   Figure 7 24         Disk  11   Module  10     Capacity  3TB    Temperature  32  C  Status  OK       Figure 7 24 Disk status and temperature    338 IBM XIV Storage System Architecture and Implementation    Deferred disk replacement    XIV Storage System Gen3 has the concept of deferred disk replacement  which means that  up to two failed disks can be marked for replacement later  If a third disk or another  component fails  the XIV Storage System notifies IBM to replace all the failed components at  the same time  A disk that has been placed into a deferred replacement state will not be red in  color  but a shade of pink  as shown in Figure 7 25
258. cal OLTP workloads  with no additional configuration or tuning needed  The net  result of this much cache is that the XIV Storage System can be aggressive about prestaging  data into cache so that host system reads can be satisfied much faster than if the data must  be retrieved from disk     This section describes how the XIV Storage System global caching mechanisms work  For  details about the flash  SSD  caching  see the Redpaper publication  Solid State Drive  Caching in the IBM XIV Storage System  REDP 4842     The XIV Storage System distributes cache into each module  This distributed cache enables  each module to concurrently service host I Os and cache to disk access  Each module   s  cache just handles the movement of data into and out of that particular module  The  processing work that one module does to move data into and out of cache has absolutely no  adverse effect on any other module  Because of the XIV Storage System grid architecture     Chapter 6  Performance 291    this cache related I O workload is distributed evenly between all the XIV Storage System  modules  This situation is different from other enterprise storage systems  which use a central  memory cache that implements memory locking algorithms that generate access contention     To improve memory management  each data module uses a PCle bus between the cache  and the disk controllers to provide a sizable connection between the disk and the cache  This  design aspect allows the bus to transfer larg
259. can set up this feature with the Disk Manager     Complete the following steps     1  Click IBM Tivoli Storage Productivity Center     Configuration Utility     Disk Manager  tab     Subsystem Performance Monitors     Create Subsystem Performance Monitor  to create a performance monitor  as shown in Figure 7 74     i IBM Tivoli Storage Productivity Center  sspc sle 1    Create Subsystem Performance Monitor            File view Connection Preferences    Window Help    Element Management        gt   m  al x  P    amp l 4    javigation Tree Create Subsystem Performance Monitor                      Administrative Services     IBM Tivoli Storage Productivity Center    Configuration Utility    Configure Devices     Job Management   Renoitins Storage Subsystems   Sampling and Scheduling   Alert        Topology Available subsystems  Selected subsystems      Monitoring    Storage Resource Group Management     Analytics     Alerting  Data Manager  Data Manager for Databases  Data Manager for Chargeback  Disk Manager   Storage Subsystems     Storage Optimizer     SAN Planner    Monitoring     Groups  Jobs       Alerting     Profile Management     Reporting  Fabric Manager  Tape Manager  Element Manager  Replication Manager    Creator  administrator Name  unnamed                                              Fe                                            FF                                   Figure 7 74 Subsystem Performance Monitors panel    Chapter 7  Monitoring 395    Optional  You can a
260. cations  enables XIV clients to receive high severity events on mobile  devices  iPhone  Android platforms   providing configurable real time alerts  anytime   anywhere     The quality of service  QoS  now offers up to 500 performance classes and is controllable  on a host  or domain and pool based level     Capacity alert thresholds can now be set on a per pool  and per domain  basis     The XIV GUI is getting more global and now supports three languages  English   Japanese  and Chinese     Chapter 1  IBM XIV Gen3 Storage System overview 3    Version 11 5 1 introduces      gt  VMware Virtual Volumes  VVol    enabling upcoming VMware vSphere environments to  easily automate XIV provisioning  offload snapshots and cloning  and instantly reclaim  space  all at the virtual machine level and while benefiting from XIV  VMware VVOLs  automation is based on VMware vSphere APIs for Storage Awareness  VASA   The IBM  Storage Provider for VMware VASA is a feature of the IBM Storage Integration Server   and will support the orchestration of all Vitual Volumes operations with XIV  Support for  VVOL will be provided through IBM Storage Integration Server v2 0      gt  Storage Management Initiative Specification  SMI S  1 6 latest protocol certification helps  build dynamic  scalable  secure Microsoft based cloud storage infrastructures with  out of the box integration with Microsoft System Center Virtual Machine Manager 2012      gt  6 TB Self Encrypting Drives  SED  The XIV with 6 TB dri
261. ce  see Figure 7 33  and the ability to view specific performance measurements     ORANGE    IBM XIV Mobile Dashboard    demo         Figure 7 33 iPhone login and system summary    You can monitor lOPS  bandwidth  and latency by host and by volume  see Figure 7 34      XIV Demo System Full Redundancy  Highest Volumes by IOPS   Bandwidth IOPS Latency Bandwidth  H  more    Backup    Home folders         Demo volume1       Demo7    Demo7    Demo volume1 B  i Bandwidth  1   77 Om 4       Figure 7 34 iPhone monitoring screens    Demo server    BANDWIDTH  761 9ms s       IOPS       Latency    Chapter 7  Monitoring    355    7 2 2 Mobile Dashboard for Android devices    The IBM XIV Mobile Dashboard is now available for Android  It has functions that are similar  to the Apple iOS devices versions  The Demo Mode allows you to try the available monitoring  features without actually connecting to an IBM XIV System  You can download the Mobile  Dashboard app from Google Playstore     At the welcome screen  either enter Demo Mode or add an XIV system  In Figure 7 35  the  login screen and Demo Mode are shown     D a  aa     D D a  a  DF Di  IBM XIV Mobile Dashboard IBM XIV Mobile Dashboard       Exit Demo Mode     4    Username    Password    Se    tO me    Demo System 1  Full Redundancy    Demo System 2    a Add System       wl Add System  Figure 7 35 XIV mobile dashboard for Android login and Demo Mode    There are performance monitoring windows for overall IBM XIV System performance  h
262. ce columns report on the soft capacity of a volume in these reports     Volume Details window under Disk Manager     Storage Subsystems     Volumes     gt  Disk Manager     Reporting     Storage Subsystems     Volumes   gt  Disk Manager     Reporting     Storage Subsystems     Volume to HBA Assignment   gt  Added Backend Volume Real Space for XIV Storage System volumes as back end    volumes under Disk Manager     Reporting     Storage Subsystems     Volume to  Backend Volume Assignment     gt  Volume Details window under Data Manager     Reporting     Asset     By Storage  Subsystem      lt Subsystem Name gt      Volumes     gt  Data Manager     Reporting     Asset     System wide     Volumes    In Figure 7 82  a volume is shown in the ITSO pool  It is 1015 GB in size and contains  1015 GB of actual data     SS    ITSO aaa  11  288 0 GB Hard    E AWV RedBk_DB_10 1015 GB 1015 GB       Figure 7 82 Volume properties shown in the XIV Storage Management GUI    In Figure 7 80 on page 400  the same volume is shown in the Tivoli Storage Productivity  Center GUI  The volume space shows as 945 56 GB in Tivoli Storage Productivity Center  because 1015 GB equals 945 56 GiB  The XIV Storage Management GUI rounds down the  volume size  See Figure 7 83     Chapter 7  Monitoring 401                 Volume    Storage Subsystem sI Fest    Yolume Space 945 56 GB    Yolume Real Space 945 56 GB  Unavailable Yolume Space MiA   Type Ra  RAID Level RAID 10  Is Encryptable False   Is Encrypted False
263. cement or miscellaneous equipment specification  MES   installation     DDR3 memory model 214    The XIV Gen3 Model 214 is equipped with up to 48 GB  3 x 16 GB dual inline memory  module  DIMM   fast DDR3 synchronous dynamic random access memory  SDRAM  per  module  All modules have 48 GB installed  A 48 GB RAM is compatible with an earlier version  to 24 GB RAM  so it accepts a 48 GB RAM FRU to a 24 GB RAM system but does not accept  a 24 GB RAM FRU to a 48 GB RAM system  The SDRAMs are provided from two different  vendors and cannot be mixed     Power supplies    The modules in Model 214 are powered by two redundant high efficiency power supply units   HE PSU   which have reduced power consumption compared to previous standard PSUs   They are monitored by the software and can be individually replaced with no need to stop  using the module  The power supply is a field replaceable unit  FRU   Each power supply is  cabled to a different UPS unit     84 IBM XIV Storage System Architecture and Implementation    SAS self encrypting disk drives    The XIV Storage System Gen3 modules can be configured with 2 TB  3 TB  or 4 TB SAS  self encrypting drives  SEDs   These drives use the SAS 2 0 protocol and run at 7200 rpm   They incorporate industry standard Self Monitoring Analysis and Reporting Technology   SMART  for enhanced reliability through prediction and early recognition of drive failure  conditions  The difference from normal SAS disk drives is that SAS SED drives enable the
264. ch HBA to use the maximum available  I O capabilities     For XIV Storage System  each interface module has two 2 port Fibre Channel adapters  It is a  preferred practice that each zone is physically connected to one port on each XIV Storage    98 IBM XIV Storage System Architecture and Implementation    System Fibre Channel adapter  For example  switch A   s zone is connected to port 1 on the  interface modules and switch B   s zone is connected to port 3 on the interface modules     For more information  see the IBM Redbooks publication titled  XIV Storage System  Host  Attachment and Interoperability  SG24 7904     Single switch solution    This configuration is resilient to the failures of a single interface module  host bus adapter   and cables  but in this configuration  the switch represents a single point of failure  If the  switch goes down because of a hardware failure or because of a software update  the  connected hosts lose all data access  Figure 3 32 on page 99 shows this configuration     Use a single switch solution only when no second switch is available or for test environments     Weer UL         artin    ie   HIHHH a    m TT   i  i    E La aTa    Hosts with 1 HBA    ims N oUt    Vereen  apron   ie kE AEF sorter  WI          j    MILELEEHI MEF    p Ere MLE       Figure 3 32 Non redundant configuration    Single HBA host connectivity    Hosts that are equipped with a single Fibre Channel port can access only one switch  This  configuration is resilient to t
265. ch as ASM on Oracle  unless it is required for specific reasons  If LVM striping is  being considered  test the application with and without striping     Normally  operating system striping techniques have a small negative impact on XIV Storage  System performance  For example  LVM striping might adversely affect XIV Storage System  caching algorithms     Consider a large sequential read  Normally  an XIV Storage System aggressively prefetches  this data into cache  But if this data exists on multiple LUNs because of LVM striping  as soon  as the operating system calls for data from a different LUN  the sequential nature of the read  is interrupted and must be detected again by XIV Storage System on the different LUN  XIV   Storage System is not unique in this regard  because all caching storage systems experience  this situation     As mentioned earlier  there are reasons why LVM striping has performance benefits from a  host perspective  An interesting example is with certain applications that are better able to  use the performance capabilities of the host operating system by using LVM striping  These  efficiencies are realized on the host kernel buffer use  This application was fully tested without  LVM striping and with LVM striping using different stripe sizes  The net result was a 25   overall performance improvement using host LVM striping     Operating system tunables   It is common to experience significant performance improvements by tuning the I O  characteristics
266. chitecture and Implementation    5  For ease of management  the GUI supports logical grouping of IBM XIV systems     a  To create a group  right click an empty area of the All Systems view and select Add  Group  as shown in Figure 4 11     Add System    Add Group    Figure 4 11 Add Group       Tip  To create a group  there must be more than one XIV Storage System  configured in the GUI     b  The Add New Group dialog that is shown in Figure 4 12 is displayed  Enter a name for  the new group and click OK        Add New Group    Enter A New Group Name    ITSO_Group       ar r  ae  OK       Figure 4 12 Add New Group    c  The new group now is displayed in the All Systems view  See Figure 4 13 on page 122     You can add a maximum of 12 storage systems to a group and you can have a  maximum of 12 groups     Systems already configured in the GUI that are not part of a group can be added to a  group by dragging and dropping them onto the wanted group     To add a system to a group  right click the Group and select Add System  Figure 4 14  on page 123   In this case  the Add Managed System dialog box is shown as in  Figure 4 8 on page 119  Complete the dialog box as explained in 4 3 1     XIV Storage  Management GUI used in direct mode    on page 117     Chapter 4  IBM XIV Storage Management software 121    Figure 4 13 shows the XIV Group on the All Systems view     xiv XIV Storage Management    File   View   Tools   Help    lt    h  Add System E Add Group    Gen3 73   023 Bee G3 XI
267. cified     Important  An XIV Storage System running on software Version 11 2 or later has an  increased largest possible MTU size of 9000      gt  Default gateway  optional      Because the XIV Storage System always acts as a Transmission Control Protocol  TCP   server for iSCSI connections  packets are always routed through the Ethernet port from    100 IBM XIV Storage System Architecture and Implementation    which the iSCSI connection was initiated  The default gateways are required only if the  hosts are not on the same Layer 2 subnet as the XIV Storage System     The IP network configuration must be ready to ensure connectivity between the XIV Storage  System and the host before the physical system installation      gt  Ethernet virtual local area networks  VLANs   if required  must be configured correctly to  enable access between hosts and the XIV Storage System      gt  IP routers  if present  must be configured correctly to enable access between hosts and  the XIV Storage System     Mixed iSCSI and Fibre Channel host access    The XIV Storage System does not support mixed concurrent access from the same host to  the same volume through FC and iSCSI simultaneously  A single host could access different  volumes where some volumes are accessed using FC and some are accessed using iSCSI   You could also access the same volume from separate hosts using various connection  methods  if those hosts use a form of clustered file or operating system      IBM service ports    Th
268. citly  disconnected        Connect Support Center    Session Timeout   Never  Idle Timeout  Never    Connection Password        a 17  E       Figure 7 58 Starting an XRSC connection    After the connection to the XRSC has been established  you can disconnect the session by  clicking the Disconnect Support Center icon  as shown in Figure 7 59 on page 378     Chapter 7  Monitoring 377    378       Support Center Status  connecting  Connected Support Sessions  0    Address    Front XRSC 2 195 110 41 1    Disconnect Support Center          Fort Type  Management      EEE   Close          Figure 7 59 Disconnecting a Remote Support Center session    Starting an XRSC connection using XCLI  The following XCLI commands are used to manage Remote Support Center connections      gt  support_center_list    gt  support_center_status    gt  support_center_connect    gt  support_center_disconnect    To start an XRSC connection using GUI  open a list of the available support centers that were  configured during system installation by issuing the support_center_list XCLI command  as  shown in Example 7 30     Example 7 30 List available support centers     gt  gt support_center_list   Name Address Port Priority  Front XRSC 2 195 110 41 141 22 0  Front XRSC 3 195 110 411 142 22 0    Contact your support representative if the support_center_list commands do not return a  value and you want to use this feature     Next  you can see what the status of the connection is by running the support_center
269. city_list command shows an overview of used and free  capacity  system wide  In the example  both the hard and soft usable capacity is 161326 GB   with 42022 GB of free hard capacity and 39010 GB of free soft capacity  It also shows that all  spare capacity is still available     Example 7 3 The system_capacity_list command     gt  gt  system capacity list  Soft Hard Max_Pool Size FreeHard FreeSoft SpareModules Spare Disks TargetSpareModules TargetSpareDisks  161326 161326 80654 42022 39010 l 3 1 3    In Example 7 4  the version_get command shows the current version of the XIV Storage  System code installed on the system  Knowing the current version of your software assists  you in determining when upgrades are required     Example 7 4 The version_get command     gt  gt version_get  Version  11 2 0 a    In Example 7 5  the time_list command is used to retrieve the current time from the XIV  Storage System  This time is normally set at the time of installation  Knowing the current  system time is required when reading statistics or events  In certain cases  the system time  might differ from the current time  at the user   s location   Therefore  knowing when something  occurred according to the system time assists with debugging issues     Example 7 5 The time_list command     gt  gt  time_list  Time Date Time Zone Daylight Saving Time  23 05 28 2013 03 19 GMT no Time Date Time Zone    System components status    In this section  we present various XCLI commands that are used
270. command     gt  gt  smtpgw_define smtpgw test address test ibm com from_address xiv us ibm com  Command executed successfully      gt  gt  smtpgw_list    Name Address Priority  ITSO Mail Gateway us ibm com 1  test test ibm com 2    The SMS gateway is defined in a similar method  The difference is that the fields can use  tokens to create variable text instead of static text  When specifying the address to send the  SMS message  tokens can be used instead of hardcoded values  In addition  the message  body also uses a token to have the error message sent instead of a hardcoded text     Gateways  An SMTP gateway must be defined before you can define an SMS gateway  because SMS messages are sent from the XIV Storage System in the form of an email     Example 7 26 provides an example of defining an SMS gateway  The following tokens are  available to be used for the SMS gateway definition      gt   areacode   This escape sequence is replaced by the destination   s mobile or cellular  phone number area code      gt   number   This escape sequence is replaced by the destination   s cellular local number    gt   message   This escape sequence is replaced by the text to be shown to the user    gt              These symbols are replaced by the       for         or    for         Example 7 26 The smsgw_define command     gt  gt  smsgw define smsgw test email_address  areacode  number  smstest  ibm  com  subject_line  XIV System Event Notification  email _body  message    Command execute
271. command  as shown in Example 5 9  This  command configures a primary and an optional secondary auditing server for command    logging   Example 5 9 Configuring the audit servers    audit_config set primary _server Address   primary _port port      secondary _server Address      The command will not check whether the specified server can be pinged or is listening on the  specified port     Note  This feature is domain unaware  it is not possible to define auditing at the domain  level     Next  to effectively enable auditing  you must issue an audit_enable command  At least the  primary server must be configured for audit_enable to succeed     Enabling or disabling of this feature is restricted to the security administrator     242 IBM XIV Storage System Architecture and Implementation    The following new XCLI commands were introduced with XIV release 11 5      gt     audit_enable    To effectively enable auditing  For this command to complete successfully  at least one  syslog server must be configured    audit_disable    A prerequisite for this is that auditing is currently enabled  displayed as    yes    in  audit_show     audit_show  Results of this command indicate whether auditing is currently enabled or disabled   audit_config set    This command is used to configure the parameters required for enabling audits  Currently   the only supported protocol is SYSLOG  over UDP      audit_config get  This command displays the current audit related configuration     Example 5 1
272. consumption below 80   Yellow Capacity consumption above 80   Orange Capacity consumption of over 90    Red Storage pool has depleted hard capacity    The name  the size  and separated segments are labeled appropriately     Note  As mentioned in    Pool alert thresholds    on page 149  Version 11 5 introduces the  ability to set pool alert thresholds on a per pool basis  and consequently thresholds can be  controlled on a per domain basis     Creating domains    The creation of a domain with the XIV GUI is a simple process  To create a domain by using  the GUI  follow these steps     1  Click Actions  gt  Create Domain from the menu bar  as shown in Figure 4 78        808  Systems ZEE   View   Tools   Help    ih  Ki    A OAM Syste    Add System    HoT    Create Domain and Associate Pools             Figure 4 78 Creating a domain from the Actions menu in the menu bar    Chapter 4  IBM XIV Storage Management software 177    Alternatively  you can click Create Domain in the menu bar on the Domains view page  as  shown in Figure 4 79     xiv XIV Storage Management             Systems   Actions   View   Tools   Help    O G Create Domain Create Domain and Associate Pools    Export  I    FE       amp  All Systems  12   gt  Mainz  2   gt    Domains         Domain  4  v    p A             Name Utilization Pools  102 GB Used Volumes 5 TB Hard  Ba ITSO_d1 EC i 2  10   5 TB Pools allocated 10 TB Soft  993 GB Used Volumes 147 7 TB Hard  bak                                              gt 
273. ct the  LDAP option  and select the Role Mapping tab  Enter the following variables  as shown in  Figure 5 47 on page 249      gt  Inthe XIV Group Attribute field    memberOf   gt  Inthe Storage Admin Role field    CN XIVAdmins  CN Users DC itso DC storage DC ibm DC com   gt  Inthe Read Only Role field    CN XIVReadonly CN Users  DC itso DC storage  DC ibm DC com    Click Update to save your changes     248 IBM XIV Storage System Architecture and Implementation       LDAP    General User ID Attribute     sAMAccountName  User Name Attribute     userPrinci palName  LDAP Servers P  XIV Group Attribute      memberOt  User Credentials Storage Admin Role   CN xIVAdmins  CN Users DC itso DC st  Read Only Role zi CN xIVReadonly CN Us ers  DC itso DC   Role Mapping      Secure LDAP    Parameters        Update Cancel          Figure 5 47 LDAP definitions in XIV Storage Management GUI    There is also an XIV Storage Management GUI wizard available to help you with configuring  LDAP and role mappings  See 5 8     Defining LDAP on the XIV Storage System    on page 251     The XIV Storage System administrator informs the LDAP administrator that the XIVAdmin and  XIVReadonly groups must be used for role mapping     Tip  When using role mapping using group memberships  Such as using the memberOf  attribute with Active Directory   you must specify the full DN string of the LDAP  group name     The LDAP server returns the full DN string back to the XIV Storage System during the  authentication
274. ction based workloads notice  as poor performance  Prolonged can be 10 minutes or an hour or more because this  measurement is dependent upon the application      gt  Response times can be different depending on the type of workload the XIV Storage  System is servicing  During batch processing  when throughput MBps is the primary  performance objective  it is normal and common for batch response times to be higher for  prolonged periods      gt  Be careful about lumping response times into one number  Response times must be  associated with either reads or writes  Notice the read and write response times in  Figure 6 31 on page 321     Chapter 6  Performance 323    324     gt  Write response times for caching storage systems such as XIV Storage System are  normally low because this time is the average time required for the write I O operation to  travel from the XIV Fibre Channel interface to cache  Write response times are highly  dependent upon the size of the average write I O operation  Very large write I Os take  longer for disk storage systems to process  For transaction workloads with write I O sizes  of 32 KB or less  it is common to observe write response times in the single digit  millisecond range  The best way to evaluate write response times is to compare them to  the write response times recorded during good performance periods      gt  Reads take longer than writes normally because some reads invariably must be retrieved  from spinning disks and this task takes
275. d Interface  Modules  and provides all the functional capabilities  The functions and nature of this software  are equivalent to what is typically referred to as microcode or firmware on other storage  systems  Where on the XIV Storage System the firmware has a different meaning  Firmware  within XIV means the vendor specific  internal firmware of the dedicated hardware  such as  the firmware of an InfiniBand host bus adapter  HBA  within an XIV module     The XIV Storage Management software  also referred to as XIV Management Tools  is used  to communicate with the XIV Storage System Software  which in turn interacts with the  XIV Storage System hardware     4 1 1 XIV Storage Management software platforms    112    The XIV Storage Management software can be installed on Microsoft Windows  Linux  AIX   HP UX  Solaris  OSX  and iOS systems  available from the iOS App Store   The software  serves aS a management console for the XIV Storage System  The XIV Storage Management  software is available for download at the following website     http    www ibm com support fixcentral   From this website  type 2810 in the Product selector and choose XIV Storage System  2810     2812   Then  choose the latest version under Installed Version and your operating system  under Platform  Now  click Continue  as shown in Figure 4 1        Find product Select product    Type the product name to access a list of product choices   When using the keyboard to navigate the page  use the Tab or down 
276. d Yolume Space  Last Probe Time    Last Probe Status  Probing 4gent    TPCUser  Subsystem Standard Group    IBM  114  7020119    11 1 0 RC1 p20120215_094716    108   193 49 TB  141 61 TB  193 49 TB    56 67 TB  47 44 TB  Mics   25 37 TB    36 67 TB  31 57 TB    630   20 34 TB   o   Mar 1  2012 1 15 40 PM    Succeeded  xics 1          Figure 7 78 XIV Storage System details shown in Tivoli Storage Productivity Center    IBM XIV Storage System Architecture and Implementation    The remaining fields in Figure 7 78 show the following information     Unformatted Disk Space The total available hard space that is left for pool  creation  Configured Capacity Limit  GB  The combined hard size of all defined pools in TiB     which is GiB divided by 1024     Remaining Configured Capacity  GB  The remaining hard space  space not used by  volumes or snapshots  in all defined pools in TiB   which is GiB divided by 1024     Tip  In Figure 7 78 on page 398  you can see the Last Probe Time  showing when Tivoli  Storage Productivity Center last communicated with the XIV Storage System  Suppose  that the information showing in Tivoli Storage Productivity Center differs from the  information shown in the XIV Storage Management GUI or XCLI  even after converting  from binary GiB  or TiB  to decimal GB  or TB   If this situation occurs  you might need to  run a fresh probe in Tivoli Storage Productivity Center to update the information being  shown in Tivoli Storage Productivity Center     Determin
277. d by appending an incrementing  number to end of the specified name  You can manually input the suffix of the first volume  by typing a different number     6  Click Create to effectively create and add the volumes to the storage pool  Figure 4 55      Create Volumes    Select Pool  T50 _    otal Size  7 646 GB    2 977 GB Allocated  k iaaa l a      reating vol  Number of Volumes     Volume Size     Volume Name              ai L       Figure 4 55 Volume creation progress indicator    After a volume is successfully added  its state is unlocked  meaning that write  format  and  resize operations are permitted  The creation time of the volume is set to the current time and  is never changed  Notice the volume name sequence in Figure 4 56                 Name Used  GB  Consistency Group       Em OO 7 846 0 GB Hara  E   myvol_15  E myvol_i4 223 GB 0GB  E myvol_13 223 GB 0 GB  E  myol12 223 GB 0GB  E myolii 2253 GB 0 GB  E myvol_10 223 GB 0GB          Figure 4 56 Volumes created    Chapter 4  IBM XIV Storage Management software 159    Resizing volumes   Resizing volumes is an operation that is similar to creating them  Only an unlocked volume  can be resized  When you resize a volume  its size is specified as an integer multiple of   109 bytes  However  the actual new size of the volume is rounded up to the nearest valid size   which is an integer multiple of 17 GB     Attention  The size of the volume can be decreased with the XIV Storage Management  GUI  However  to avoid possibl
278. d successfully     gt  gt  smsgw_list   Name Email Address SMTP Gateways   test  areacode  number  smstest ibm com all    366 IBM XIV Storage System Architecture and Implementation    When the gateways are defined  the destination settings can be defined  There are three  types of destinations      gt  SMTP or email   gt  SMS   gt  SNMP    Example 7 27 provides an example of creating a destination for all three types of notifications   For the email notification  the destination receives a test message every Monday at 12 00   Each destination can be set to receive notifications on multiple days of the week at multiple  times     Example 7 27 Destination definitions     gt  gt  dest define dest emailtest type EMAIL email address test ibm com smtpgws ALL  heartbeat_test_hour 12 00 heartbeat_test_days Mon  Command executed successfully      gt  gt  dest_define dest smstest type SMS area_code 555 number 5555555 smsgws ALL  Command executed successfully      gt  gt  dest define dest snmptest type SNMP snmp _manager 9 9 9 9  Command executed successfully      gt  gt  dest_list    Name Type Email Address Area Code Phone Number SNMP Manager User  ITSO Catcher SNMP itsocatcher us ibm com  smstest SMS 555 5555555   snmptest SNMP 9 9 9 9   emailtest EMAIL test ibm com    Finally  the rules can be set for which messages can be sent  Example 7 28 provides two  examples of setting up rules  The first rule is for SNMP and email messages  and all  messages  even informational messages  are s
279. dancy  SCOM Status available          Figure 7 99 SCOM Systems view    Monitors  The following XIV Storage System components are monitored by SCOM  Each monitor is  refreshed every 300 seconds    gt  Logical components  These components are user defined constructs       Host Mappings        Mirrorings  This component is not monitored if the XIV Storage System user that was  used to define the XIV Storage System to SCOM has only read only privileges          Storage Pools      Volumes     gt  Physical components  These components represent XIV Storage System hardware or  XIV Storage System definitions that relate to hardware  Hosts and clusters appear in this  list because they represent physical hardware         Clusters       Disks       Fibre Channel Ports      Hosts       IP Interfaces       iSCSI Ports       Modules    Chapter 7  Monitoring 421    Diagram view   It is possible to show any of the views from SCOM as a diagram by right clicking an object  and clicking Open     Diagram View  For example  a failed disk can be displayed as a  subcomponent of a module  as shown in Figure 7 100  where disk 12 on module 7 has failed   All other components of module 7 are currently healthy and are gathered together        1 Module 6    F o Mo    1 Disk 6 4    Healthy F          Figure 7 100 SCOM diagram view    422 IBM XIV Storage System Architecture and Implementation    7 9 6 Upgrading the IBM Storage Management Pack    If a new version of the IBM Storage Management Pack for Micr
280. de is supported for certain Unified  System Management  USM   SAS disk  and flash cache components  For details  contact  your IBM technical support     Optional flash cache upgrade    Flash cache can be upgraded by using the Miscellaneous Equipment Specification  MES   process if the XIV system was originally installed without flash cache     Flash cache installation is a concurrent  nondisruptive process to be performed by an IBM  technician     After flash cache is inserted into the XIV modules and enabled  it is immediately ready for use  by the XIV software  Depending on the use profile  it can help improve performance     IBM XIV Storage System Architecture and Implementation       IBM XIV architecture   components  and planning    This chapter describes the hardware architecture of the IBM XIV Storage System Gen3  family  It covers the physical components for the newer Model 214 and the Model 114   including the system rack  interface modules  data modules  management modules  disk  drives  network switches  and power distribution devices  It also provides an overview of  planning and other tasks required before and after deployment of an IBM XIV Storage  System    There are two machine types associated with the XIV Storage System  the 2810 and the  2812  Both machine types have the standard warranty period  IBM XIV systems with a  machine type 2810 have a one year warranty and ones with a machine type of 2812 have  three year warranties     This chapter includes the f
281. ding of the XIV Storage System  It is  also for readers who need detailed advice on how to configure and use the system     Copy services and data migration features are covered in the Redbooks publication   IBM XIV Storage System Business Continuity Functions  SG24 7759     Host operating systems and other integration aspects are addressed in a separate  publication  X V Storage System  Host Attachment and Interoperability  SG24 7904  Refer  also to the IBM Redpaper    publication  Using XIV in VMware environments  REDP 4965   For details about thin provisioning and space reclamation  see the Redpaper  X V Thin  Provisioning and Space Reclamation  REDP 5001     For information about IBM Hyper Scale  see the Redpaper   BM Hyper Scale for the XIV  Storage System  REDP 5053  For information about encryption  see the Redpaper  X V  Security with Data at Rest Encryption  REDP 5047        Copyright IBM Corp  2014  All rights reserved  xi    Authors    This book was produced by a team of specialists from around the world working for the  International Technical Support Organization  at the IBM European Storage Competence  Center in Mainz  Germany     Bertrand Dufrasne is an IBM Certified Consulting I T Specialist and Project Leader for   IBM System Storage   disk products at the International Technical Support Organization   ITSO   San Jose Center  He has worked at IBM in various I T areas  He has authored many  IBM Redbooks publications  and has also developed and taught technical
282. disables  both read and write when running out of storage space     Lock  The lock_behavior parameter can be specified for non thin provisioning pools  but it  has no effect     4 5 Volumes    152    After defining storage pools  the next logical step in system configuration is volume  management     The XIV Storage System offers logical volumes as the basic data storage element for  allocating usable storage space to attached hosts  This logical unit concept is known and is  widely used by other storage subsystems and vendors  However  the volume segmentation  and its distribution over the physical disks is not conventional in the XIV Storage System     Traditionally  logical volumes are defined within various Redundant Array of Independent  Disks  RAID  arrays  where their segmentation and distribution are manually specified  The  result is often a suboptimal distribution within and across modules  expansion units  and is  dependent upon the administrators knowledge and expertise     As explained in 2 3     Full storage virtualization    on page 24  the XIV Storage System uses  true virtualization as one of the basic principles for its unique design  With the   XIV Storage System  each volume is divided into 1 MB partitions  and these partitions are  distributed pseudo randomly and evenly  and duplicated for protection  The result is optimal  distribution in and across all modules  which means that for any volume  the physical drive  location and data placement are invisibl
283. display all  of the volume properties  which now include two additional values  ssd_caching and  use _ssd caching default  For an illustration  see Example 4 26     Example 4 26 State of a volume    XIV 1310039 Coruscant gt  gt vol_ list  x vol Res Fra Vol _02   lt XCLIRETURN STATUS  SUCCESS  COMMAND LINE  vol_list  x vol Res Fra Vol _02  gt    lt QUTPUT gt    lt volume id  bec1240012f  gt    lt creator value  itso   gt    lt creator category value  storageadmin   gt    lt id value  bec1240012f   gt    lt name value  Res Fra _Vol_02   gt    lt size value  17   gt      lt ssd_caching value  disabled   gt    lt use_ssd_ caching_default value  yes   gt    lt  volume gt      lt  QUTPUT gt    lt  XCLIRETURN gt     The value of the use_ssd_ caching default parameter indicates whether the volume follows  the default system state for flash cache      gt  Ifthe value is yes  the volume follows the default system state for flash cache      gt  Ifthe value is no  the volume does not inherit the default setting for flash cache  It means  that if the global system setting for the caching is changed  the volume keeps its current  ssd_caching value     206 IBM XIV Storage System Architecture and Implementation       Security    This chapter describes the IBM XIV Storage System security features from various  perspectives  It covers the following topics     Physical access security   x509 certificate validation and management   Configuring IPv6 addresses   Configuring Internet Protocol Secur
284. ds and parameters  available     We illustrate just a few of the options of the event_list command  Various parameters can  be used to sort and filter the output of the event_list command  See Table 7 1 on page 344  for a list of the most commonly used parameters     Chapter 7  Monitoring 343    Table 7 1 The event_list command parameters    Lists a specific number of events     lt event_list max_events 100 gt     after Lists events after the specified  lt event_list after 2008 08 11 04 04 27 gt   date and time    before Lists events before the specified    lt event_list before 2008 08 11 14 43 47 gt   date and time    min_severity Lists events with the specified  lt event_ list min _severity major gt   and higher severities     alerting Lists events for which an alert  lt event_list alerting no gt   was sent or for which no alert  lt event_ list alerting yes gt   was sent    cleared Lists events for which an alert  lt event_ list cleared yes gt   was Cleared or for which the alert    lt event_list cleared no gt   was not cleared     These parameters can be combined for better filtering  In Example 7 15  two filters were  combined to limit the amount of information displayed  The first parameter  max_events  allows  only five events to be displayed  The second parameter is the date and time that the events  must not exceed  In this case  the event occurred approximately 1 5 minutes before the cutoff  time        Example 7 15 The event_list command with two filters combined   
285. ducts  The IBM Storage Management Pack for SCOM is actually a set of  management packs that allow you to access and monitor the following IBM storage systems  using Microsoft SCOM     IBM System Storage DS8000   IBM Storwize V3500  since Version 2 1    IBM Storwize V3700  since Version 2 1    BM Storwize V5000  since Version 2 2    IBM Storwize V7000   IBM Flex System V7000  since Version 1 3   IBM System Storage SAN Volume Controller  IBM XIV Storage System    Vvvvvvvyvy Y    The rules provided by the management packs remove a significant amount of work when  implementing a monitoring solution  SCOM offers methods to monitor four areas of focus      gt  Availability    gt  Configuration   gt  Performance   gt  Security    Currently  the IBM Storage Management Pack focuses on availability     7 9 1 Prerequisites    To monitor your XIV Storage System with SCOM  you must meet the following prerequisites      gt  Microsoft System Center Operations Manager 2007 R2  Microsoft System Center  Operations Manager 2012  Microsoft System Center Operations Manager 2012 SP1 or  Microsoft System Center Operations Manager 2012 R2     gt  IBM Storage Management Pack v1 1  v1 2  v1 3  V2 1  or V2 2 for SCOM   gt  XIV Storage System Software v10 2 2 or later    The XIV Storage Management GUI or XCLI does not need to be installed on the SCOM  server  The IBM Storage Management Pack installs all the software that is required for  SCOM to access the XIV Storage System     Chapter 7  Monitoring 41
286. dware before continuing with the basic configuration     Basic configuration   After the completion of the physical installation steps  the IBM SSR establishes a connection  to the XIV Storage System through the patch panel  see 3 1 12     Patch panel    on page 92   and completes the initial setup  You must provide the required completed information sheet  that is referenced in 3 2 1     Basic configuration planning    on page 94     The basic configuration steps are as follows     Set the Management IP addresses  client network   gateway  and netmask   Set the system name    Set the email sender address and SMTP server address    Set the primary DNS and the secondary DNS    Set the SNMP management server address    Set the time zone    Set the NTP server address    Configure the system to send events to IBM  Call Home     Configure and test remote support     Oe ae Or en ee as    Chapter 3  IBM XIV architecture  components  and planning 105    Completing the physical installation  After the IBM SSR completes the physical installation and initial setup  the IBM SSR performs  the final checks for the XIV Storage System     1  Power off and power on the machine using the XIV Storage Management GUI or XCLI   2  Check the Events log carefully for problems    3  Verify that all settings are correct and persistent    The installation is complete  and the XIV Storage System is ready to be handed over to the    client to configure and use  See Chapter 4     IBM XIV Storage Managemen
287. e     7 8 1 Custom monitoring of a volume    Example 7 47 demonstrates how to create a Windows Scripting Host  WSH  script to monitor  the capacity of a specific volume and issue a custom event to alert you when the used  Capacity reaches a predefined limit  The script can be scheduled to run automatically at  specific intervals using the standard Windows Task Scheduler     Example 7 47 WSH script to monitor a volume     lt job id  XIV_Vol_Monitor  gt    lt script language  JScript  gt       WSH Example for Custom Monitoring of an XIV Volume    Modify the following parameters with proper values    var IPAddr    192 168 1 150    var Volume      itso vol 2    var Threshold   700    var Severity    Warning     var Username    admin     var Password    adminpass        Main Script Starts Here    var CmdString         var Stringl         var output         var xclicmd    xcli  m     IPAddr      u     Username      p     Password      var Command    vol_ list vol     Volume      t used capacity      CmdString   xclicmd   Command     var WshShell   WScript CreateObject   WScript Shell     var oExec   WshShell Exec   comspec   d q       oExec StdIn WriteLine  prompt        oExec StdIn WriteLine  cd        oExec StdIn WriteLine CmdString     oExec StdIn WriteLine  exit       while   oExec StdOut AtEnd0fStream        Chapter 7  Monitoring 407    Stringl   oExec StdOut ReadLine       n    Stringl   Stringl replace    s     s   g       if  Stringl          output   Stringl     if  output
288. e    Figure 5 80 Active Directory group selection window    To illustrate the new member0Of attribute in the existing LDAP user object and the new LDAP  object representing the    XIVReadOnly    group  we run Idapsearch queries against the Active  Directory LDAP server  as shown in Example 5 22 on page 276     Chapter 5  Security 275    Example 5 22 Active Directory group membership Idapsearch queries      ldapsearch  LLL  H Idap   9 155 113 143 389  D  cn itso cn Users dc itso dc storage dc ibm dc com  w PasswOrd  b  cn Users dc itso dc storage dc ibm dc com cn itso_appuser1 member0f  dn  CN itso_appuser1 CN Users DC itso DC storage DC ibm DC com  memberOf  CN XIVReadonly CN Users DC itso DC storage DC ibm  DC com      ldapsearch  LLL  H Idap   9 155 113 143 389  D   cn itso cn Users dc itso dc storage dc ibm dc com  w PasswOrd  b   cn Users dc itso dc storage dc ibm dc com CN XIVReadonly   dn  CN XIVReadonly CN Users  DC itso DC storage  DC i bm  DC com   objectClass  top   objectClass  group   cn  XIVReadonly   member  CN itso appuserl CN Users DC itso DC storage DC ibm DC com   member  CN Almira CN Users DC itso DC storage  DC ibm DC com   member  CN Administrator CN Users DC itso DC storage DC ibm  DC com   distinguishedName  CN XIVReadonly CN Users DC itso DC storage  DC ibm  DC com  instancelype  4   whenCreated  20110831113851 0Z   whenChanged  20111004132323 0Z   uSNCreated  12856   uSNChanged  41016   name  XIVReadonly   objectGUID   g7EDY9DA1USZ6fTBfGbkCw     objec
289. e    a  CA Web Application Transaction Monitoring   I health alert Alert Description  CA Windows Service And Process Monitoring Source b 1 Disk 6 4  Disk   1 Disk 6 4  ac W2K1 2Team6 XIVWSW2K12 local 10 0 20 102  Description   status is Fa the cause must be investigated to  AN  10114 1 Module 6 1 Disk 6 4 determine the required fix   Alert Monitor J Disk Monitor  Created 9 24 2013 2 31 00 PM          Figure 7 98 SCOM Alerts window    Events    The Events window shows events for each monitored XIV Storage System  SCOM places  XIV Storage System events into three categories      gt  Information   gt  Error   gt  Warning    The list of events is refreshed every 10 minutes  Events do not have nor need a resolution  status  The initial event collection that SCOM runs does not collect events that are more than  two days old  There is no way to change this setting  After the initial collection of events   SCOM collects only events created since the last event collection  up to a maximum of 300  events per collection  SCOM then examines the new events to see if alerts need to be raised   A short delay might occur between the collection of the events and the creation of the alert     IBM XIV Storage System Architecture and Implementation    Systems   SCOM lists all defined IBM XIV systems that are being monitored in the Systems window  By  default  the systems monitoring list is refreshed every 30 minutes  From the Systems view  it  is possible to confirm the health of all the monitor
290. e    xivtestuser1    user registered in    Users    container  in the    xivhostlldap storage tucson ibm com    Active Directory domain      gt   w pass2remember  The current password of the user    xivtestuser1     after the initially  assigned password was changed to this new password       gt   b  CN Users DC xivhost1ldap DC storage  DC tucson DC ibm DC com   Base_DN   which is the location in the directory where to perform the search  that is  the    Users     container in the    xivhostlldap storage tucson ibm com    Active Directory domain      gt  cn xivtestuserl  Specifies what object to search for   The output of the 1dapsearch command shows the structure of the LDAP object retrieved from    the LDAP repository  We do not need to describe every attribute of the retrieved object  but at  least two attributes must be checked to validate the response      gt  name  xivtestuserl   gt  description  Storage Administrator  The fact that Idapsearch returns the expected results in our example indicates the following      gt  The account is indeed registered in Active Directory    gt  The distinguished name  DN  of the LDAP object is known and valid     Appendix B  Additional LDAP information 435     gt  The password is valid    gt  The designated attribute    description    has a predefined value assigned    Storage  Administrator        When the Active Directory account verification is completed  we can proceed with configuring  the XIV Storage System for LDAP authentication
291. e  Effective October 25  2013  the XIV Gen3 2812 114 and 2810 114 have been  withdranw from marketing and can no longer be ordered from IBM     The 2812 supports a 3 year warranty to complement the 1 year warranty offered by the  existing and functionally equivalent 2810    All of the machine types are available in the following modules    configurations     gt  Six modules  including three Interface Modules     gt  Nine to fifteen modules  including six Interface Modules    The 114 model includes the following components  which are visible in Figure 1 1     gt  Three to six Interface Modules  each with 12 SAS disk drives  2 TB or 3 TB but  no intermixing       gt  Three to nine Data Modules  each with 12 SAS disk drives  2 TB or 3 TB but  no intermixing       gt  Flash caching support  Each Data or Interface Module can be equipped with one 400 GB  flash drive  SSD  as fast read cache  6 TB for a full system with 15 modules       gt  An uninterruptible power supply  UPS  module complex comprising three redundant UPS  units      gt  Two InfiniBand module interconnects with redundant power supplies  RPSs     gt  A Maintenance Module    gt  An Automatic Transfer Switch  ATS  for external power supply redundancy      gt  A modem  which is connected to the maintenance module for external system service     The model 214 includes the same components and brings the following enhancements      gt  Data modules and interface modules can be equipped with 2 TB  3 TB  4 TB  or 6 TB  but 
292. e  It can use a text based attribute directly  identifying the XIV Storage System role the user has been associated with     Configuring the XIV Storage System for OpenLDAP Directory    Configuration for the OpenLDAP Directory is essentially the same as other directories  The  only difference is that we use the description attribute with OpenLDAP  If the description  attribute is already in use  then you can substitute any suitable unused text attribute     278 IBM XIV Storage System Architecture and Implementation    The schema in our example has been built with the same DN base  but OpenLDAP has some  subtle differences  For example  individual user objects are defined as UID type objects as  opposed to using CN type with Active Directory  Also  the    Users    group is a OU type object   as shown in Example 5 26     Example 5 26 Listing objects in an OpenLDAP schema      Idapsearch  LLL  b ou Users dc itso dc storage dc ibm dc com  D  cn Manager  dc itso dc storage dc ibm dc com  w PASSWOrd OU Users  dn  ou Users dc itso dc storage dc ibm dc com   objectClass  top   objectClass  organizationalUnit   ou  Users      Idapsearch  LLL  b ou Users dc itso dc storage dc ibm dc com  D  cn Manager  dc itso dc storage dc ibm dc com  w PASSWOrd dn   dn  ou Users dc itso dc storage dc ibm dc com   dn  uid itso ou Users dc itso dc storage  dc ibm dc com   dn  uid zejn ou Users  dc itso dc storage  dc ibm dc com   dn  uid almira ou Users  dc itso dc storage  dc ibm dc com   dn  cn XIVAd
293. e  difference here at the widest margin is around a 25  boost in lIOPS just by changing the host  queue depth setting from 10 to 64     The blue line shows the queue depth  which is set to 256  Having the queue depth this high  does not provide much of an advantage or disadvantage     Higher queue depth in general yields better performance with XIV Storage System  It is also  important to consider the limitations per port on the XIV Storage System side     For example  each HBA port on an XIV Storage System interface module sustains up to 1400  concurrent I Os  except for model A14 on port 3 when port 4 is defined as an initiator  in which  case port 3 is set to sustain up to 1000 concurrent I Os   With a queue depth of 64  per host port  one XIV Storage System port is limited to 21 concurrent host ports  assuming  that each host fills up the entire 64 depth queue for each request  The point here is that for  larger configurations  more than 20   it is important to include queue depth in your production  planning     300 IBM XIV Storage System Architecture and Implementation    Logical Volume Manager striping   In general  the XIV Storage System architecture does not require the use of host based  Logical Volume Manager  LVM  striping techniques to improve I O performance because  each XIV Storage System volume is already striped across all the drives in the XIV Storage  System  Generally  it is better not to use any LVM striping or any other method that stripes the  data  su
294. e  subsystems     gt  Select Storage  Subsystems    Data Collection  Summary    Results       Figure 7 69 New XIV Storage System discovered in Tivoli Storage Productivity Center    Probing phase   The newly added XIV Storage System must be probed for Tivoli Storage Productivity Center  to collect information  Probes use agents to collect statistics  including data about drives   pools  and volumes  The results of the probe jobs are stored in the repository and are used in  Tivoli Storage Productivity Center to supply the data necessary for generating several  reports  including Asset  Capacity  and Storage Subsystem reports     To configure the probe for XIV Storage System  continue the following steps in the wizard     1  Select the XIV Storage System and click Next  Now you have various options to specify  the probe details  as shown in Figure 7 70 on page 393     a         E Configure Devices    Specify data collection    Select Device Type  v He Specify how the data will be collected From the storage subsystems  IF managing a collection of devices in    wf Select Device the same manner  a monitoring group should be applied  IF the device should be monitored in a unique way   S Data Collection choose a monitoring template  IF a monitoring template is chosen  provide a prefix that will be applied to th  created probes and alerts in order to ensure their names are unique    Summary    Results Use a monitoring group or template  Monitoring Group Y    Select monitoring group  
295. e 144  you can see an example of storage pool figures  The figure  depicts the following values for a storage pool     Used volumes Physical amount of data already written to the storage pool  It is also  the sum of space consumed on each of the volumes in the pool     Volumes allocated Logical amount of space reserved for all defined volumes in the  storage pool     Hard pool size Storage pool hard limit  It represents the physical storage capacity  allocated to volumes and snapshots in the storage pool  See 4 4 1      Function of storage pools    on page 141 for a description     Soft pool size Storage pool soft limit  It is the limit for the total soft sizes of all the  volumes in the storage pool  See 4 4 1     Function of storage pools    on  page 141 for a description     Figure 4 42 on page 144 provides an example of storage pool and size numbers     Chapter 4  IBM XIV Storage Management software 143    Data written to Storage pool    storage pool hard limit    S Volumes 7846 GB Hard r       13 GB Volume  Allocated 7846 GB Soft ut Snapshots Re    Size of all Storage pool  volumes defined soft limit       Figure 4 42 Storage pool and size numbers    To export the details shown in the Storage Pools view  click the Export icon in the toolbar at  the top of the GUI window  For more information  see    Copy and paste of system  configuration settings    on page 129     Creating storage pools    The creation and resizing of storage pools is straightforward  and you need to o
296. e 4 77    xiv XIV Storage Management  Systems   Actions   View   Tools   Help    OL  All Systems  12   gt  Mainz  2   gt  v Domains                      i   Utilization  17 GB Hard   Ba test SS i 0  0    0 GB Pools allocated 103 GB Soft   103 GB Hard  Bo test 2 aSSSS_SS aBE    010    0 GB Pools allocated 103 GB Soft     oy 12 TB Hard  cm   Jo es ae 1    12 TB Pools allocated of 12 TB Soft  100            Figure 4 77 Filtering a GUI view by domain    176 IBM XIV Storage System Architecture and Implementation    The Domains view displays a table of domains in the system  The default view displays the  domain name  utilization information  number of pools and number of volumes for each pool   This view gives the administrator a quick grasp and general overview of essential information  about the system pools  The Domains view can be customized to show or hide specific  columns  The Name and Utilization columns are required  The following optional column  values are available     System   Hard Capacity   Free Hard   Soft Capacity   Free Soft   Used Capacity   Pools   Free Pools   Volumes   Free Volumes  Consistency Groups  Free Consistency Groups  Mirrors   Free Mirrors   Data Migrations   Free Data Migrations  LDAP Id  Performance Class  Allow SSD Caching    Vvvvvvrvvrvrvrvrvrvvvv vy v Y Y    The capacity consumption by volumes and snapshots within the pools assigned to a  particular domain is indicated by various colors  These are the default threshold values     Blue Capacity 
297. e Cluster Access  Standalone Hosts  g  x3655_AMD default  F SR test default      p6 570 lab 2v19 default       7s0_Blade2 default       7s0_Blade1 default  J IT 0_Apphost2 default Applicationti_Group  J IT 0_Apphosti default Applicationti_Group  J Application _host01 default Application03 Mainz       ie  i   CLU_SOLMAN    J IT 0_Blade9 default CLU_SOLMAN Application02_Group       Figure 5 33 Hosts and groups associations    After a host  or multiple hosts  has been associated with a user group  you can define user  membership for the user group  a user must have the application administrator role to be  added to a user group      230 IBM XIV Storage System Architecture and Implementation    6  Go to the Users window and right click the user name to display the menu  From the menu   see Figure 5 34   select Add to Group to add this user to a group           A  Ko  Name Category  Ungrouped   amp  admin Storage Administrator  A itso user Application Administrator   amp  technician Technician   amp  xiv_development Edit evelopment  4 xiv_hostprofiler Delete ost Profiler  A xiv_maintenance     aintenance     xiv_msms _ Change Passions ge Administrator  pope Add To Group    2i Applicationti_Group A      T Remove From Group       Properties       Figure 5 34 Add a user to a group    7  From the Select User Group window that opens  select the group that you want from the  drop down list and click OK  see Figure 5 35         Ei    Select User Group                   Add User to User G
298. e Critical alert is automatically changed  by SCOM from New to Closed  However  new alerts might be created with a severity of  Warning  which indicates that the status is now Ready     Each alert appears in IBM XIV Systems Alerts tab with the Resolution State New  Change it  manually to Closed  if necessary  as shown in Figure 7 98                                   Monitoring  lt  Alerts  19   4 B Monitoring r Look for  Find Now Clear   25  UNIX Linux Computers     1 Path Source     Name Resolution e Created  4 Agentless Exception Monitoring a Severity  Critical  1    a Application Monitoring Ga                  m ES W2K12 New 9 24 2013 2 31 00 PM  4 Data Warehouse   ay Open  gt      a imow Sans A Wek14 il Notification subscription 3 o New emer   D  alerts    W2KI4 Set Resolution State 0 a  New   9 24 2013 1 37 41 PM  to  Events    w2K12 BE Close Alert Awaiting Evidence 9 24 2013 1 37 41 PM   23  Systems A wekii Forward to Assigned to Engineering 9 24 2013 1 27 42 PM  L   Logical Components A woe Perre n Acknowledged 9 24 2013 1 27 42 PM     a Physical Components A W2K13   Scheduled f 9 24 2013 1 27 42 PM  T   Microsoft Audit Collection Senis    wi  5 AE S p ee   9 24 2019 1 27 42 PM  A Microsoft Windows Client A woki   View or edit the settings of this monitor C csa   S N  zA i a ii A waki    Refresh F5 New 9 24 2013 1 27 42 PM  A ene Rie  lt  Te  Personalize view     _  Operations Manager E  CA Synthetic Transaction Alert Det       Properties    Ea UNIX Linux Computers i r
299. e XIV Storage Management GUI            225  5 5 3 Security considerations when using Hyper Scale Manager                 232  5 5 4 Managing user accounts using the XCLI              0 0  ee eee 234  5 5 5 Password management and resets        nanana aaa 237  5 5 6 Managing multiple systems           0 0 00 eee 238   5 6 Enabling compliance with PCI DSS            0 00 0 241  5 01 Ading Vid SY SIOG   lt 2 5  5  8 4 eae ts  en dh esd RE Ae etn ard GOO Be ase ALS a anes 242  5 6 2 Define Idle Timeout to lock a GUI or XCLI session                000005  243   5 7 LDAP based authentication          0    aaa cee eee enna 244  5 7 1 Introduction to Lightweight Directory Access Protocol                  0   244  5 7 2 LDAP directory componentsS            0 00 cece eee 245  5 7 3 LDAP product selection         0 0    cc eens 246  57A DAP TOE MaD Dianaaa a e a ss Ge gee att ativan cree a Aare ae Goes 247   5 8 Defining LDAP on the XIV Storage System             0 0  251  5 8 1 Using the XIV Storage Management GUI LDAP wizard to configure LDAP      252  5 8 2 Using the XIV Storage Management GUI directly to configure LDAP          259  5 8 3 Using XIV Storage System command line interface                 0005  262   5 9 LDAP managed user authentication           0    00 eee 263  5 9 1 LDAP repository credential objects           0 0    0  cee 264  5 9 2 Managing LDAP user accounts            0 00 cece ees 268  5 9 3 Managing user groups by using the XCLI in LDAP authentication mode  
300. e XIV Storage System has two Ethernet ports dedicated for the use of IBM service  personnel  The system serves as a Dynamic Host Configuration Protocol  DHCP  server and  automatically configures the notebook  These ports are only for IBM maintenance personnel   for example  an IBM Service Support Representative  SSR  or IBM Technical Advisor  TA      Restriction  Do not connect these ports to the user  client  network     XIV Remote Support Center    For remote support by XIV Storage System personnel  you configure a dedicated Ethernet  port for remote access  This port must be connected through your organization   s firewall so  that IBM personnel can access the XIV  if necessary     The XIV Remote Support Center  XRSC  merges XIV internal functions with a set of globally  deployed supporting servers to provide secure IBM support access to the XIV Storage  System when necessary and when authorized by the IBM client   s personnel     Figure 3 33 provides a representation of the data flow of the XIV Storage System to  IBM Support        Customer Network Customer DMZ The Internet IBM Network    g    nal g    zma i E                      Ea             ary   E E             i    e pr    7 q oa a      Fa    i   i         ar   a J    a a    Customer Staff mY Arrag Optional Prozg Server ARSC External Server SRSC Internal Server al Support                Figure 3 33 XIV Remote Support Center    An optional Remote Support Proxy can be used when one or more IBM XIV systems do not  ha
301. e accurate capacity monitoring by looking  at storage pools  see 4 4 2     Managing storage pools with the XIV Storage Management  GUI    on page 142       gt  The second indicator  in the middle  shows the number of IOPS      gt  The third indicator on the far right shows the general system status and  for example   indicates when a redistribution is underway     Monitoring events  To get to the Events window  select Events from the Monitor menu  as shown in Figure 7 12     Extensive information and many events are logged by the XIV Storage System  The system  captures entries about problems with various levels of severity  including warnings and other  informational messages  These messages include information about logins  configuration  changes  and the status of attached hosts and paths  All of the collected data can be  reviewed in the Events window that is shown in Figure 7 12     Because many events are logged  the number of entries is typically huge           Date  System Ti       System  gt     EventCode  gt  iser  6 3 14  03 17 PM XIV 7811215 Gala HOST_DEFINE admin  6 3 14  5 03 17 PM a nena ey HOST_ADD_ PORT admin  n z Seer HOST_DEFINE admin  HOST_ADD PORT admin  HOST_ADD_PORT admin  HOST_CONNECTED  POOL _CREATE admin  VOLUME CREATE admin  USER_LOGIN_HAS SUCCEEDED  VOLUME CREATE admin  1 6 3 14  5 03 22 PM XIV 7611215 Gala USER_LOGIN_HAS SUCCEEDED             Figure 7 12 Events window    An option to filter the events logged can display a more useful and workable 
302. e amounts of data quickly between the disks     Having a large bus bandwidth allows the XIV Storage System to use small cache pages  This  large bus bandwidth between the disk and the cache also allows the system to perform many  small requests in parallel  again improving the performance     A least recently used  LRU  algorithm is the basis for the cache management algorithm  This  feature allows the system to generate a high hit ratio for frequently used data  The efficiency  of the cache use for small transfers is high when the host is accessing the same data set     The cache algorithm starts with a single 4 KB page and gradually increases the number of  pages prefetched until an entire partition  1 MB  is read into cache  If the access results in a  cache hit  the algorithm doubles the amount of data prefetched into the system     The prefetching algorithm continues to double the prefetch size until a cache miss occurs or  the prefetch size maximum of 1 MB is obtained  Because the modules are managed  independently  if a prefetch crosses a module boundary  the logically adjacent module  for  that volume  is notified to begin pre staging the data into its local cache     6 1 4 Data redistribution effects on host systems    292    This section describes the effects that the application server experiences during XIV Storage  System data rebuild and redistribution  For our purposes here  we refer to these rebuild and  redistribution actions as data redistribution because we
303. e and migrate the data to the  new volume     To rename an existing volume  run the following command   vol_rename new_name  myvol_17  vol  myvol_ 16     To delete an existing created volume  run the following command     vol delete vol  myvol_ 17     For details on how to manage volume SSD Caching through the XCLI  see 4 9 2     Managing  flash cache with XIV Command Line Interface    on page 204     Chapter 4  IBM XIV Storage Management software 163    4 6 Host definition and mapping    Because the XIV Storage System can be attached to multiple  heterogeneous hosts  it is  necessary to specify which particular host can access which specific logical drives in the  XIV Storage System  Mappings must be defined between hosts and volumes in the   XIV Storage System     The XIV Storage System is able to manage single hosts or hosts grouped together in clusters     4 6 1 Assigning LUNs to a host using the XIV Storage Management GUI    There are several steps that are required to define a new host and assign LUNs to it  One of  the prerequisites is that volumes must be created in a storage pool     Defining a host  To define a host  complete the following steps     1  Inthe XIV Storage System main GUI window  hover the cursor over the Hosts and  Clusters icon and select Hosts and Clusters  see Figure 4 59         Hosts and Clusters       z A    1 Hosts Connectivity j    l Volumes by Hosts  iSCSI Connectivity    Figure 4 59 Hosts and Clusters menu          2  The Hosts window opens 
304. e code of the event  1 3 6 1 4 1 2021 77 1 3 1 1 3 xivEventTime The time of the event  1 3 6 1 4 1 2021 77 1 3 1 1 4 xivEventDescription A description of the event  1 3 6 1 4 1 2021 77 1 3 1 1 5 xivEventSeverity The severity of the event  1 3 6 1 4 1 2021 77 1 3 1 1 6 xivEventTroubleshooting Troubleshooting information    XIV Storage System SNMP setup  Configuring a new trap destination  To use SNMP monitoring with the XIV Storage System  you must first configure it to send  SNMP traps to an SNMP manager  such as the IBM Systems Director server   which is  defined in your environment  Figure 7 61 on page 385 shows where to start to set up the  SNMP destination  For more information  see    Setup notification and rules with the GUI    on  page 359     384 IBM XIV Storage System Architecture and Implementation    Ta    xv XIV Storage Management    A AN Systems  2   gt    Evens      systems   Actions   View   Tools   Help      ih    9    After   System Time    EE    Min Severity        System Time   o    Event Code  All          Date  Local Time   9 20 13  1 08 PM  9 20 43  1 06 PM                  USER_HAS FAILED TO _RUN_C     USER_HAS FAILED TO _RUN_C     USER_HAS FAILED TO _RUN_C     fSER_HAS FAILED TO_RUN_C     USER_HAS FAILED TO _RUN_C     USER_HAS FAILED TO _RUN_C     USER_HAS FAILED TO _RUN_C       9 20 13  12 54 PM USER_HAS FAILED TO_RUN_C          System   Event Code User Des  XIV_PFE2    USER HAS FAILED TO RUN C    User    cimmy    fri  XIV_PFE2     USER HAS FAILED TO 
305. e data loss  contact your IBM XIV Storage System support  personnel if you need to decrease a volume size   Mapped volume size cannot be  decreased      Not all host operating systems support dynamic volume resizing  Consult with the host  vendor documentation about whether your host OS supports resizing volumes dynamically  and what restrictions and warnings there are     The volume address space is extended  at the end of the existing volume  to reflect the  increased size  and the additional capacity is logically formatted  that is  zeros are returned  for all read commands      When resizing a regular volume  not a writable snapshot   all storage space that is required to  support the additional volume capacity is reserved  static allocation   This configuration  guarantees the functions and integrity of the volume  regardless of the resource levels of the  storage pool containing that volume     Resizing a master volume does not change the size of its associated snapshots  These  snapshots can still be used to restore their individual master volumes at their initial sizes     Resize Volume myvol_15                      ITSO  J 4567   t  4 439 GB Allocated     al   gt  e  New Size   567    ce m       Figure 4 57 Resize an existing volume    To resize volumes using XIV Storage Management GUI  complete the following steps   1  Right click the row of the volume to be resized and select Resize     The total amount of storage is presented both textually and graphically  The am
306. e es    INTERNATIONAL  TECHNICAL  SUPPORT  ORGANIZATION    BUILDING TECHNICAL  INFORMATION BASED ON  PRACTICAL EXPERIENCE    IBM Redbooks are developed  by the IBM International  Technical Support  Organization  Experts from  IBM  Customers and Partners  from around the world create  timely technical information  based on realistic scenarios   Specific recommendations  are provided to help you  implement IT solutions more  effectively in your  environment     For more information   ibm com redbooks       
307. e green box at the top of any defined XIV  Storage System  you can change all the IBM XIV systems to different metrics  This action is  shown in Figure 7 2        KIV_ PFE  1340010 G3       Show Systems lOPS  Show Systems Utilization     Show Systems Status  Show Systems Number of Hosts  Show Systems Number of Volumes  Show Systems Hardware Type          Figure 7 2 Changing the All Systems view    Possible metrics include IOPS  systems use  use of hard space as a percentage   systems  status  the IBM XIV systems are fully redundant  redistributing  or rebuilding   number of  defined hosts or number of defined volumes  with the number of snapshots shown in  brackets   and system hardware type  XIV generation  disk type  and hardware configuration      328 IBM XIV Storage System Architecture and Implementation    The All Alerts window    An alert is defined as a critical event or hardware failure in one of the monitored IBM XIV  systems  If you open the All Alerts window  you see all the current alerts and failures for every  system shown in the GUI  In Figure 7 3  you can see that there are several alerts for two  different IBM XIV systems  although there are no current failures   If you double click an alert   the next relevant window opens  For example  in Figure 7 3  there are several pool alerts   Therefore  double clicking a pool alert changes the window to show the relevant pool  highlighted on the pools view of the relevant XIV Storage System system        systems   Act
308. e ldapsearch command    After you have confirmed that the SSL connection is working properly  you must verify that  you are able to search your LDAP directory using LDAPS on port 636  This action confirms  that the LDAP server can communicate using an SSL connection     In Example B 12  we use OpenLDAP client for the SSL connection validation  A CA certificate  needs to be added to the key ring file used by OpenLDAP client  The TLS_CERTS option in  the OpenLDAP configuration file  typically   etc openldap 1ldap conf  specifies the file that  contains certificates for all of the certificate authorities that the client recognizes     Example  B 12 Testing LDAP over SSL by using the ldapsearch command       usr bin ldapsearch  x  H    lIdaps   xivhost2 storage tucson ibm com 636     D     uid xivtestuser2 dc xivauth   w pwd2remember  b    dc xivauth     extended LDIF            LDAPv3     base  lt dc xivauth gt  with scope subtree    filter  uid xivtestuser2     requesting  ALL          xivtestuser2  xivauth   dn  uid xivtestuser2 dc xivauth  uid  xivtestuser2   objectClass  inetOrgPerson  objectClass  organizational Person  objectClass  person    Appendix B  Additional LDAP information 459    objectClass  top  sn  xivtestuser2  cn  xivtestuser2    description  custom role 01      search result  search  2    result  0 Success    The URI format used with the  H option specifies that LDAPS must be used on port 636  the    LDAP secure port      Certificate authority setup    This s
309. e long  If you decide to reduce  the intervals  you must decide which interval values to use  Although a long monitoring  interval might sound good  additional monitoring increases the workload of both the  monitored devices and of the SCOM server  This situation might lead to unforeseen  consequences     One method to determine how quickly SCOM is able to complete a scan of your devices  The  default log folder for SCOM is C  Program Files IBM Storage Host IBMStorageSCOM 1og  In  that folder  you see two files for each device type  The XIV Storage System uses the following  log files     scom_xiv log This log file is updated when SCOM checks the state of each  monitored XIV Storage System component     scom_xiv_event log This log file is updated when SCOM collects new events from the  XIV Storage System event logs     In Example 7 58  the event log for an XIV Storage System is examined in about 3 seconds  In  this example  one new event is identified   Example 7 58 The scom_xiv_event log    2013 09 24 13 37 38 INFO Enter collect    2013 09 24 13 37 39 INFO Connecting to 10 0 20 102    IBM XIV Storage System Architecture and Implementation       2013 09 24 13 37 40 INFO 1 IBM XIV Storage System is found    device ID  10114  code level  11 4 0 esp4 p20130815   2013 09 24 13 37 41 INFO Enter get_xiv_events     2013 09 24 13 37 41 INFO Enter get_begin time _idx     2013 09 24 13 37 41 INFO Exit get begin time _idx     2013 09 24 13 37 41 INFO begin time   2013 09 24 13 26 37  be
310. e on the logical system concepts  which form the basis for the  system full storage virtualization     2 4 1 Logical constructs    26    The XIV Storage System logical architecture incorporates constructs that underlie the storage  virtualization and distribution of data  which are integral to its design  The logical structure of  the system ensures that there is optimum granularity in the mapping of logical elements to  both modules and individual physical disks  guaranteeing an equal distribution of data across  all physical resources     IBM XIV Storage System Architecture and Implementation       Storage Pool    Volume Volume        n       Partition     1MB              Figure 2 5 Logical system virtualization concept    Partitions  The fundamental building block of a logical volume is known as a partition  Partitions have  the following characteristics on the XIV Storage System      gt  All partitions are 1 MB  1024 KB  in size    gt  A partition contains either a primary copy or secondary copy of data       Each partition is mapped to a single physical disk     e This mapping is dynamically managed by the system through innovative data  distribution algorithms to preserve data redundancy and equilibrium  For more  information about the topic of data distribution  see    Logical volume layout on  physical disks    on page 28     e The storage administrator has no control or knowledge of the specific mapping of  partitions to drives         Secondary copy partitions are 
311. e previous paragraph  To reduce  complexity and simplify maintenance  it is generally not desirable to have the same user  names registered in local and LDAP repositories     If a user account was registered in the local repository on the XIV Storage System before the  LDAP authentication mode was activated  this account is accessible while LDAP  authentication is in effect  The account becomes accessible again upon deactivation of the  LDAP authentication mode     LDAP user passwords    User passwords are stored in the LDAP repository when the XIV Storage System is in LDAP  authentication mode  Password management becomes a function of the LDAP server  The  XIV Storage System relies entirely on the LDAP server to provide password management  functions  such as enforcing initial password resets  password strength  and password  expiration  Various LDAP server products provide their own sets of tools and policies for  password management     IBM XIV Storage System Architecture and Implementation    Figure 5 70 shows a technique that can be used for password management     5 Local Security Policy    File Action View Help          r  Xis b m    A Security Settings  E Ca Account Policies  Password Policy  Ca Account Lockout Policy  Ca Kerberos Policy  EA Local Policies  Windows Firewall with Advanced Security    a Enforce password history   H Maximum password age   a Minimum password age   H Minimum password length   a Password must meet complexity requirements  H Store passwords
312. e system per domain    Event_list command and parameters  The following syntax is for the event_list command     event_list      max_events MaxEventsToList     after TimeStamp     before TimeStamp      min_severity  lt INFORMATIONAL  WARNING MINOR MAJOR CRITICAL gt        alerting  lt yes no all gt      cleared  lt yes no all gt      code EventCode      object_type  lt cons_group destgroup dest dm host map mirror pool rule smsgw smtpgw t  arget volume cluster ip_interface 1ldap conf meta_ data object sync_schedule user us  er_group 1dap_server modules status elicense ipsec_connection ipsec_tunnel cross c    ons _group     gt      internal  lt yes no all gt      beg BeginIndex     end EndIndex        count_all  lt yes no gt       XIV Storage System Command Line Interface examples    To illustrate how the commands operate  the event_list command displays the events  currently in the system  Example 7 21 shows the first few events logged in our system     Example 7 21 XCLI viewing events    C  XIV gt xcli  c  XIV 6000050  event_list  Timestamp Severity Code User  2011 10 04 17 00 38 Informational USER_DEFINED admin     itso_testuserl  and category applicationadmin was defined     2011 10 04 17 01 05 Informational POOL_RENAME   admin  was renamed  ITS02    2011 10 04 17 51 00 Informational MAP_VOLUME admin    Description  A user with name    Storage Pool with name    ITSO       Volume with name     7tso_app01 vol01  was mapped to LUN  1  for host with name    itso app02      2011
313. e three predefined role mappings when using LDAP     storageadmin Defined as a single LDAP group   securityadmin Defined as a single LDAP group   readonly Defined as a single LDAP group     applicationadmin Defined as a single LDAP group per XIV User Group     Important  An LDAP user cannot be a member of more than one LDAP group  so it cannot  be associated with more than one XIV Storage System role mapping     In native mode  a role is explicitly assigned to a user at the time of user account creation  In  LDAP mode  the role of a specific user is determined at the time the user logs in to an  XIV Storage System     Planning considerations   When initially planning to use LDAP based authentication with XIV Storage System  the  LDAP server administrator must decide on which LDAP attribute can be used for role  mapping  As described in 5 7 2     LDAP directory components    on page 245  each LDAP  object has several associated attributes  The type of LDAP object classes used to create a  user account for XIV Storage System authentication depends on the type of LDAP server  being used  The Oracle Directory server and OpenLDAP use the inetOrgPerson LDAP object  class  and Active Directory uses the organizational Person LDAP object class for definition of  user accounts for XIV Storage System authentication     For a definition of the inetOrgPerson LDAP object class and list of attributes  see the Internet  FAQ archive website    http   www  fags org rfcs rfc2798 html   For a de
314. e to the user  This method dramatically simplifies  storage provisioning  letting the system automatically lay out the user   s volume in an optimal  way     This method offers complete virtualization  without requiring preliminary volume layout   planning or detailed and accurate stripe or block size pre calculation by the administrator  All  disks are equally used to maximize the I O performance and use all the processing power and  all the bandwidth available in the storage system     XIV Storage System virtualization incorporates an advanced snapshot mechanism with  unique capabilities  which enables the creation of a virtually unlimited number of point in time  copies of any volume  without incurring any performance penalties  The concept of snapshots  is described in detail in the  BM XIV Storage System Product Overview  GA32 0791  and IBM  XIV Storage System Business Continuity Functions  SG24 7759  You can download the  Product Overview from the IBM Knowledge Center     http   ibm co 1s999AG    Volumes can also be grouped into larger sets called consistency groups and storage pools   See 2 6     Storage pool concepts    on page 35     IBM XIV Storage System Architecture and Implementation    Important  As shown in Figure 4 50  the basic hierarchy of the logical storage concepts of  an XIV Storage System is as follows     M    A volume can have multiple snapshots    A volume can be part of one and only one consistency group    A volume and its corresponding snapshots a
315. e used by general GUI users     3  The XIV Storage Management system view window opens  as shown in Figure 4 9   Further administrative actions can be taken        xiv Storage Management Pit    3    File   View   Toots   Help    O i Add system JIB Add Group tso    XIV LAB 63 1300       XIV PFE GEMD   G    File   View   Tools  Help      O C  Settings BMJ Launch xcti ff Launch xivtop itso    CZE System System Time  02 10 pm S          XIV 02 4310114 6        Selecting the desired  IBM XIV Storage System  from the All Systems  view transitions the  Main Window to the  System view    enana                Figure 4 9 XIV foreground  Storage Manager main window  System view  XIV background   All Systems view    4  If multiple IBM XIV systems are configured for management in the GUI  each system is  always visible in the All Systems view  regardless of the credentials provided     However  only systems that are successfully authenticated with the current credentials are  accessible  Move the cursor over the appropriate XIV Storage System and click it to open  the XIV Storage System Management view of that system  To return to the All Systems  view  click the back arrow in the menu bar  the All Systems link in the hierarchical  navigation or the home icon  as shown in Figure 4 10        xv XIV Storage Management    Systems   Actions   View   Tools   Help  a   9           All Systems  9     Connectivity      Figure 4 10 Navigate back to All Systems view    120 IBM XIV Storage System Ar
316. e6 bin Idapsearch  b dc xivauth  h xivhost2 storage tucson ibm com   D uid xivtestuser2 dc xivauth  w pwd2remember uid xivtestuser2    dn  uid xivtestuser2 dc xivauth  uid  xivtestuser2   description  Storage Administrator  objectClass  inetOrgPerson  objectClass  organizational Person  objectClass  person   objectClass  top   Sn  xivtestuser2   cn  xivtestuser2    The ldapsearch command syntax might appear overly complex and its output seems difficult  to interpret  However  this output might be the easiest way to verify that the account was  created as expected  The ldapsearch command can also be useful for troubleshooting  purposes when you are unable to communicate with a Oracle Java Directory LDAP server     Here is a brief explanation of the I1dapsearch command line parameters      h xivhost2 storage tucson ibm com Specifies that the LDAP search query must be  sent to the  xivhost2 xivhostlldap storage  tucson  ibm com  server using the default port 389      b dc xivauth Base_DN  which is the location in the DIT     D uid xivtestuser2 dc xivauth The query issued on behalf of the xivtestuser2  user in the dc xivauth Oracle Java Directory  repository     w pwd2remember The current password of the xivtestuser2 user    uid xivtestuser2 Specifies what object to search     The output of the Idapsearch command shows the structure of the object found  We do not  need to describe every attribute of the returned object  but at least two attributes must be  checked to validate the
317. ection describes the setup and use of the certificate authority that was used with all  example scenarios in this book to issue certificates     OpenSSL comes with most Linux distributions by default  Information about OpenSSL can be  found at the OpenSSL website     http   www openss1 org    Creating the CA certificate  To set up the CA for the xivstorage org domain  we need to make certain assumptions  We  modify openss1 cnf to reflect these assumptions to the CA  That file can be found in   usr share ss1 openss1 cnf  Portions of that file are shown in Example B 13     Example  B 13 openssl cnf      CA default      dir    certs    crl_dir    database    new certs dir    certificate    serial    cr     private key    RANDFILE    x509 extensions    name_opt    cert_opt    default days    default_crl_days   default_md    preserve    copy extensions    default days    default_crl_days   default_md    preserve      460     root xivstorage orgCA      dir certs   dir crl   dir index txt   dir newcerts   dir cacert pem   dir serial   dir crl pem     dir private cakey pem     dir private  rand  usr_cert  ca_default  ca_default  365   30   md5   no   copy   365   30   md5   no    A EERE H H H    Where everything is kept   Where the issued certs are kept  Where the issued crl are kept  database index file    default place for new certs   The CA certificate   The current serial number   The current CRL   The private key   private random number file   The extentions to add to the cert  
318. ections          _     Management connections    GUI or XCLI    ___  XRSC connections    Remote Support a    Service Ports                1AM SSR CE          n               Modem        ff    Figure 3 26 Connection details of patch panel ports    IBM XIV Storage System Architecture and Implementation    Patch panel Patch panel  1 GbE 10 GbE       3 1 13 Hardware support    This section covers important features of the XIV Storage System that are used by internal  functions and IBM maintenance technicians if a problem arises with the system     Module USB to serial connections   The module USB to serial connections are used by internal system processes to keep the  inter communication between the modules active when the normal network connection is not  operational  Modules are linked together with USB to serial cables in groups of three  These  links are also used by IBM Hardware Maintenance Services for repair to the internal network   The connection sequence is shown in Figure 3 27          o 6 e  2    oe at osososese  HAHH           WE a  a  a3stesenstess See  OO oe    Management  Connections       0 06 6     USB to Serial       SEeeeeaee  nanru    ones  GN         THH H   R ISH    goto won     sated DORO DORO    mnnnnnn  narnsoy      38 Setet HH LF mam  Fo sig mee a   eee       es  Cee ee eee ON  ee  osm                   Figure 3 27 Module  USB to serial    Maintenance module   The 1U maintenance module and the modem  which are installed in the middle of the rack   are 
319. ed  See Figure 7 88     Storage Productivity Center Logout       Storage Resources   Storage Systems   XIV Coruscant v       Overview    Dool Snace  G 2G TiP    Available  46 26 TiB       Home    Storage XIV Coruscant  Resources IBM XIV System      y General    Server Properties  Resources     Alerts  20      Jobs  4          Internal Resources    isiin   Volumes  303     Resources      Pools  3     Disks  72               Modules  6    ul Ports  8     Reporting      Host Connections  8     Related Resources    Capacity Last 30 days Space by Host  6    5    4    m Free Capacity E Used Capacity E Virtual Ca       Space by Pool Space by Volume  Largest Pools Largest Volumes             o                50940 stg  4 1 c0 c02 c03 c04    None          Figure 7 88 Tivoli Storage Productivity Center GUI resource overview    Chapter 7  Monitoring 405    Figure 7 89 shows the options that are available from the drop down menu in each quadrant  of the display     From the Overview window  you can also navigate to information about the  XIV Storage System  The following links are provided     Volumes  Volume status and capacity   Pools  Pool status and capacity   Disks  Status of the XIV disks by module   Modules  XIV module status   Ports  Port status and worldwide port name  WWPN    Host connections  Defined host connections and volume mappings    YYYY YV Y    The Overview window is also available from the Alerts display  If an alert is related to an   XIV Storage System  the name of 
320. ed by the  LDAP server     The user_list command can still operate when LDAP authentication mode is active   However  this command shows only locally defined XIV user accounts and not LDAP  accounts  as shown in Example 5 19     Example 5 19 user_list command output in LDAP authentication mode     gt  gt  user_list show _users al      Name Category Group Active      Xiv_devel opment Xiv_devel opment yes  Xiv_maintenance Xiv_maintenance yes   admin storageadmin yes  technician technician yes  GPreadonly readonly no    gt  gt  ldap mode get   Mode   Active     gt  gt     270 IBM XIV Storage System Architecture and Implementation    As shown in Example 5 19 on page 270  the Active parameter is set to no for the  GPReadonly user  The parameter specifies whether a user can log in to the current  authentication mode  All predefined local XIV Storage System users can still log in when  LDAP authentication mode is active     Defining user groups with the GUI in LDAP authentication mode    User group information is stored locally on the XIV Storage System regardless of the  authentication mode  The user group concept applies only to users assigned to an  application_administrator role     A user group can also be associated with one or multiple hosts or clusters     To create user groups  add users  with application administrator role  to the group  and define  host associations for the group  complete the following steps     1  Be sure to log in as admin  or another user with storage
321. ed components of each   XIV Storage System and collect useful information     In Figure 7 99  two IBM XIV systems are being monitored        Monitoring   Systems  2   4 E Monitoring 4 Look for  Po Find Mow Clear  i  UNIX Linux Computers State System ID System Mame  O  Cluster GD  Hast    LA Agentless Exception Monitoring GD  Healthy 40010 xI PFEZ 13400    GD  Healthy   gt  LA Application Monitoring A Warming 10114 xI 021310114    Healthy  Cd Data Warehouse  j Ca IBM System Storage    ill  j Ca sie lv Systems Detail View    Alerts  Ea  Events    H  b System properties of 40010  see  Systems    x   Display Name 40010  Td Logical Components  x Full Path Name Wek 2Teamb  XVW SW 2k1 2  localh10 0 20 113 40010  og Physical Components System Name XIV_PFE2_1340010    L Microsoft Audit Collection Senices ES ae   gt  La Microsoft Windows Client iSCSI Name iqn 2005 10 com xivstorage 040010  Cd Microsoft Windows Server System Soft Capacity  GB  243392  System Hard Capacity  GB  243392    5 Cd Network Monitoring yst  stem Hard Free Space  GB  211729     gt  od Operations Manager  4 E a System Soft Free Space  GB  211729    Cd Synthetic Transaction      A         Current Spare Modules 1  Cd UNE Linux Computers Current Spare Disks 3    Cd Web Application Transaction Monitoring Target Spare Modules 1  Ud Windows Service 4nd Process Monitoring Target Spare Disks 3  Version 11  4 0 25p4 920130815  Machine Type 2610  Machine Model 214  Machine Serial Number 1340010  Redundancy Status Full Redun
322. ee Rees ee ota So Aa a ate 301   6 3  PEMOnmance MONNONN Gi  60s vce te tanned Oe aoa ae edo aed we hearse 304  6 3 1 Using the XIV Storage Management GUI            0 2 0 0 cee ee 304  6 3 2 Using the XIV Top utility    0 0 0 0    eee 312  6 3 3 Using the XIV Storage System command line interface                0   316  6 3 4 Tivoli Storage Productivity Center          0 0    aaa ees 318   6 4 Performance evaluation         0 0 0 0 0  cc ee eee eens 320  6 4 1 Problem solving stepS       25 2 0044 see ee vee bee ee ee eva dat 320   Chapter 7   MOniMOring   s2 064624 2 sored be bee Bs ee 327   7 1 Monitoring with XIV Storage Management GUI and XCLI                       328  7 1 1 Monitoring by using the Systems menu            0 0 0 cee ee 328  7 1 2 Monitoring alerts for all defined IBM XIV systems with the GUI              330  7 1 3 Monitoring an individual XIV Storage System using the GUI                 331  7 1 4 Monitoring with XIV Storage System Command Line Interface               339  721 5  AIV QUGILEVENt logging i 4 i222  00 so0 0c0 edad obR eee edaagad deed weed 345  7 1 6 Viewing events in the XIV Storage Management GUI                      346   21 7  EVENUAUNDUICSs 2 b 0c744 eee cd deen ee bedi a aea e cs h kaa 346  7 1 8 Viewing events using the XCLI            0 0    cee eee 347  7 1 9 Defining notification rules       0    0 0 cee ee ees 350   7 2 Monitoring using the IBM XIV Mobile Dashboard                0 00000 e eee 351  7 2 1 Installing the IBM XIV M
323. efining logical volumes in terms of blocks is useful when you must precisely match  the size of an existing logical volume on another system     This value reflects the total size of volume areas that were written by hosts  The actual  volume size is not controlled directly by the user and depends only on the application  behavior  It starts from zero at volume creation or formatting and can reach the logical volume  size when the entire volume has been written  Resizing of the volume affects the logical  volume size  but does not affect the actual volume size     The actual volume size reflects the physical space used in the volume as a result of host  writes  It is discretely and dynamically provisioned by the system  not the storage    38 IBM XIV Storage System Architecture and Implementation    administrator  The discrete additions to actual volume size can be measured in either of these  two ways      gt  By considering the allocated space  which reflects the physical space used by the volume  in 17 GB increments     gt  By considering the used space  which reflects the physical space used by the volume in 1  MB partitions    In both cases  the upper limit of this provisioning is determined by the logical size assigned to  the volume      gt  Capacity is allocated to volumes by the system in increments of 17 GB because of the  underlying logical and physical architecture  There is no smaller degree of granularity than  17 GB  For more information  see 2 4     Logical sys
324. em has a native virtual storage design that is both efficient and simple  to use  It eliminates all physical disk Redundant Array of Independent Disks  RAID   management tasks  The XIV is an enterprise class storage system in which storage  management involves defining capacity  a logical unit number  or LUN  or a volume  and  assigning the capacity to a host system     The XIV Storage System hardware architecture is a dramatic shift from traditional  RAID based parity data protection  From a performance perspective  the XIV Storage System  can automatically involve all of the disk drives  the whole system cache including its optional  flash cache extension  and the processors in servicing I O operations     Scalability is also a strength of the XIV Storage System  The XIV Storage System is able to  scale without administrative involvement to redistribute data or tune for optimum performance   It takes care of these tasks automatically     2 1 2 Hardware elements    To convey the concepts that the XIV Storage System architecture is based on  it is useful to  first look at the physical design     The XIV configuration includes data modules  interface modules  interconnect switches  and  uninterruptible power supply  UPS  units  For details and components of the physical system  architecture  see Chapter 3     IBM XIV architecture  components  and planning    on page 61     Modules    The primary components of the XIV Storage System are known as modules  Modules provide  proces
325. em offers the capability to use LDAP server based user authentication     When LDAP authentication is enabled  the XIV Storage System accesses a specified LDAP  directory to authenticate users whose credentials are maintained in the LDAP directory   except for the admin  technician  maintenance  and development users  which remain locally  administered and maintained      The benefits of an LDAP based centralized user management can be substantial when  considering the size and complexity of the overall IT environment  Maintaining local user  credentials repositories is relatively straightforward and convenient when dealing with only a  few users and a few storage systems  However  as the number of users and interconnected  systems grows  the complexity of user account management rapidly increases and managing  such an environment becomes a time consuming task     In this section  we review various benefits of this approach  Although the benefits from using  LDAP are significant  you must also evaluate the considerable planning effort and complexity  of deploying LDAP infrastructure  if it is not already in place     5 7 1 Introduction to Lightweight Directory Access Protocol    244    The Lightweight Directory Access Protocol  LDAP  is an open industry standard that defines  a standard method for accessing and updating information in a directory     A directory is a listing of information about objects arranged in an order that gives details  about each object  Common exampl
326. ementation       Rename Group    XIV MNO00   extrabam  Volumes  619 116  Enter A New Group Name    ITSO_Group    ITSO_2_Group        Delete Group  Rename Group             Figure 4 14 Delete and Rename Group options    XIV Storage Management software features   Both the XIV Storage Management GUI and XCLI are mostly self explanatory  with organized  structures and simple navigation  Some of the standard and newer unique features are  described in further detail in this section     XIV Storage Management GUI main system view   Management of the XIV Storage System begins at the main System view  which is shown in  Figure 4 15  From this view  the administrator can quickly get the status of the system   Depending on the user permissions  the interface might differ slightly                                X Consistency Groups  Snapshot Group Tree       iE  PE 2 as  Systems   Actions   View   Tools   Help   I    lt   Ig Settings Launch XCLI f Launch Xiv Top   User Indicator    amp  itso    All Systems  2   gt    System v Tool Bar Svstem Info Menu   System Time  3 19PM Q    Hierarchical Navigation  gl  i  Gl  G  gl  4 Fj  kis    E  Fj       Function Icons  amp     Function Menus s  3  amci    g 000   El  0101  z  ont    i j   5   hos oi i wa ihi Tree J N pos i  acc Display Je  gl  El  Gj  Gj             D  D  0  D  D  D  0       Current System s  Indicator    E ETES og Status Bar  amp  Status Area                Figure 4 15 Storage Manager main window  System view    Chapter 4  IBM 
327. enance   1U Maintenance Module   1U Maintenance Module   1U Maintenance Module  Module and   1x Modem   1x Modem   1x Modem  Modem    Full Rack   15x Modules   15x Modules   15x Modules    180x disks   180x disks   180x disks    2 TB disks   161 TB   2 TB disks   161 TB   2 TB disks   161 TB    3 TB disks   243 TB   3 TB disks   243 TB   3 TB disks   243 TB    4 TB disks   325 TB   4 TB disks   325 TB    6 TB disks   489 TB   6 TB disks   489 TB    360 GB memory  cache    360 GB cache with 2 TB  3 TB   360 GB cache with 2 TB  3 TB    6 TB flash cache disks disks    720 GB cache with 4 TB  6 TB   720 GB cache with 4 TB  6 TB    6x interface modules disks disks    24x FC ports   6 TB flash cache   6 TB flash cache    22x iSCSI ports   12 TB flash cache with 4 TB  6 TB   12 TB flash cache with 4 TB  6TB    9x data modules disks disks    6x interface modules   6x interface modules    24x FC ports   24x FC ports    22x iSCSI ports   12x iSCSI ports    9x data modules   9x data modules       All XIV Gen3 hardware components are delivered preinstalled in a standard IBM T42 19 inch  rack  Data and interface modules provide the processing  caching  and storing of data  All  modules can be considered data modules in that they each contain a processor  memory   and 12 serial attached SCSI  SAS  drives  The SAS drives can be 2 TB and 3 TB  The  SAS SED drives can be 2 TB  3 TB  4 TB  or 6 TB  The interface modules are data modules  but with more capabilities  The interface modules have u
328. endently  managed within each module  the system is able to tolerate sustained write activity to an  under performing drive by effectively maintaining a considerable amount of    dirty     or    Chapter 2  IBM XIV Storage System logical architecture and concepts 59    60    unwritten  data in cache  This situation potentially circumvents any performance degradation  resulting from the transient and anomalous service time of a particular disk drive     Non Disruptive Code Load   Non Disruptive Code Load  NDCL  enables upgrades to the XIV Storage System Software  from a Current version  starting with Version 11 1 0  to a later version without disrupting user  applications     The code upgrade is run on all modules in parallel and the process is fast enough to have no  impact on host applications     No data migration or rebuild process is allowed during the upgrade  Mirroring  if any  is  suspended during the upgrade and automatically reactivated upon completion     Storage management operations are also not allowed during the upgrade  although the status  of the system and upgrade progress can be queried  It is also possible to cancel the upgrade  process up to a point of no return     The NDCL does not apply to specific component   s firmware upgrades  for example  module  basic input output system  BIOS  and host bus adapter  HBA  firmware   These components  require a phase in phase out process of the impacted modules     Note  Starting from Release 11 3  hot firmware upgra
329. ent for Non Warranted Programs    Part 1   General Terms    BY DOWNLOADING  INSTALLING  COPYING  ACCESSING  CLICKING ON AN  ACCEPT  BUTTON  OR  OTHERWISE USING THE PROGRAM  LICENSEE AGREES TO THE TERMS OF THIS AGREEMENT  IF  YOU ARE ACCEPTING THESE TERMS ON BEHALF OF LICENSEE  YOU REPRESENT AND WARRANT  THAT YOU HAVE FULL AUTHORITY TO BIND LICENSEE TO THESE TERMS  IF YOU DO NOT AGREE  TO THESE TERMS     Press Enter to continue viewing the license agreement  or  Enter  1  to accept the  agreement   2  to decline it or  99  to go back to the previous screen   3  Print   1   Xivproxy O off l off 2 off 3 on 4 off 5 on 6 off  Installation completed successfully     You can edit the proxy conf file  which is in the  etc xiv  folder  to add the relevant  connectivity settings  as shown in Example 7 37     Example 7 37 Extract of the proxy conf file      Configuration file for XIV remote support proxy      Network interface and port that the XIV system will connect to  ListenInterface eth0  ListenPort 8988      Remote support server address as supplied by IBM  TargetAddress 195 110 41 141  TargetPort 443      Network interface  Bo for local  for status queries    StatusInterface eth0  StatusPort 8989    Chapter 7  Monitoring 381      HTTP proxy for connecting to the Internet    HTTPProxyHost    HTTPProxyPort    The parameters referenced in the proxy conf file include the following parameters     ListenInterface The network interface name on the host running the Remote Proxy  agent th
330. ent is cleared  it is removed from  this list  but it is still visible with the event_list command  See Example 7 17     Example 7 17 The event_list_uncleared command     gt  gt  event_list_uncleared  No alerting events exist in the system    344 IBM XIV Storage System Architecture and Implementation    Monitoring statistics   The statistics gathering mechanism is a powerful tool  The XIV Storage System continually  gathers performance metrics and stores them internally  Using the XCLI  data can be  retrieved and filtered by using many metrics  Example 7 18 provides an example of gathering  the statistics for 10 days  with each interval covering an entire day  The system is given a time  stamp as the ending point for the data  Because of the magnitude of the data being provided   it is best to redirect the output to a file for further post processing  For a more in depth view of  performance  see Chapter 6     Performance    on page 287     Example 7 18 Statistics for 10 days   gt  gt  statistics get count 10 interval 1 resolution_unit day end 2013 03 19 14 00 00    The usage_get command is a useful tool to provide details about the current use of pools and  volumes  The system saves the usage every hour for later retrieval  This command works the  same as the statistics get command  You specify the time stamp to begin and end the  collection and the number of entries to collect  In addition  you need to specify the pool name  or the volume name  See Example 7 19     Example 
331. ent of its master volume      The destination storage pool must have enough free storage capacity to accommodate the  volume and its snapshots  The exact amount of storage capacity allocated from the  destination storage pool is released at the source storage pool     A volume that belongs to a consistency group cannot be moved without moving the entire  consistency group     As shown in Figure 4 46  in the Volume by Pools view  right click the appropriate volume and  initiate a Move to Pool operation to change the location of a volume     av XIV Storage Management  Systems   Actions   View   Tools   Help   O    a Add Volumes 43 Add Pool     Cont       All Systems  8   gt  Littleton  5   gt    Volumes by Pools               Name Size  GB  Used  GB   g5 CKO Thin_04 Hbsize E  a Delete  E cko_vol_001  Format  i cko_vol_002  E   cko_vol_003 Rename  ii E cko vol 004              E cko_vol_004   Create a Consistency Group With Selected Volumes  sy x cko_vol_005 i    E test_001  E ae  E test_mirror_002   amp    Ss cofares_dr Move to Pool a    Create Snapshot F    a ex_pool Create Snapshot  Advanced         30 erwrite Snapsh  bes  Mike a  Ed Copy this Volume  m SS Primary_site        Lock  es Mon    create Mirror     amp  windows prd i      Map selected volumes  Map selected volumes  manually   View Volume Mapping    Show statistics a          Apollo   1300474 Properties    Figure 4 46 Volumes by Pools view    148 IBM XIV Storage System Architecture and Implementation    In the pop u
332. ent to the processing servers  The second  example creates a rule for SMS messages  Only critical messages are sent to the SMS  server  and they are sent every 15 minutes until the error condition is cleared     Example 7 28 Rule definitions     gt  gt  rule_create rule emailtest min_severity informational dests emailtest snmptest  Command executed successfully      gt  gt rule_create rule smstest min_severity critical dests smstest snooze time 15  Command executed successfully      gt  gt  rule_list    Name Minimum Severity Event Codes Except Codes Destinations Active Escalation Only  ITSO Major Major all ITSO Catcher yes no  emai ltest Informational all emailtest snmptest yes no  smstest Critical all smstest yes no    Example 7 29 shows how to delete rules  destinations  and gateways  It is not possible to  delete a destination if a rule is using that destination  And  it is not possible to delete a  gateway if a destination is pointing to that gateway     Example 7 29 Deletion of notification setup     gt  gt  rule delete  y rule smstest    Chapter 7  Monitoring 367    Command executed successfully    gt  gt  dest_delete  y dest smstest  Command executed successfully    gt  gt  smsgw delete  y smsgw test   Command executed successfully     7 4 Mobile push notification    The XIV Mobile Notification Service allows client to receive real time alerts about major or  critical events from the IBM XIV Service Center anytime  anywhere  This enables them to  react rapidly to poten
333. entation       Thin provisioning conceptual  examples    In this appendix  we further explain thin provisioning principles by examining some basic  examples  These examples incorporate all of the concepts inherent to the IBM XIV Storage  System implementation of thin provisioning     This appendix covers the following topics      gt  System level thin provisioning conceptual example   gt  Regular storage pool conceptual example   gt  Thinly provisioned storage pool conceptual example       Copyright IBM Corp  2014  All rights reserved  425    System level thin provisioning conceptual example    Figure A 1 shows the incremental allocation of capacity to both a regular storage pool anda  thinly provisioned storage pool within the context of the global system soft and hard sizes   This example assumes that the soft system size has been defined to exceed its hard size   The deallocated capacity shown within the system   s soft and hard space is represented by a  discontinuity to convey the full scope of both the logical and physical view of the system   s  capacity  Each increment in the diagram represents 17 GB of soft or hard capacity     When a regular storage pool is defined  only one capacity is specified  and this amount is  allocated to the storage pool from both the hard and soft global capacity within the system     When a thinly provisioned storage pool is defined  both the soft and hard capacity limits for  the storage pool must be specified  These amounts are deducted
334. enter a name  it must be unique across the storage system  for the  storage pool    5  Click Add to add this storage pool     Chapter 4  IBM XIV Storage Management software 145    Resizing storage pools    This action can be used to both increase or decrease a storage pool size  Capacity  calculation is performed in respect to the total system net capacity  All reductions and  increases are reflected in the remaining free storage capacity     Storage pool size      gt  When increasing a storage pool size  you must ensure that the total system capacity  holds enough free space for the increase in storage pool size      gt  When decreasing a storage pool size  you must ensure that the storage pool has  enough free capacity for a reduction in size     This operation is also used to shrink or increase the snapshot capacity inside the storage  pool  This alteration affects only the space within the storage pool  In other words  increasing  snapshot size consumes the free capacity only from the corresponding pool     To change the size of one storage pool in the system  right click a pool in the Storage Pools  view  Figure 4 41 on page 143  and select Resize     The window shown in Figure 4 44 opens  Change the pool hard size  soft size  or the  snapshot size to match your new requirements  Within the storage pool gauge  the vertical  dotted line to the left  with the blue triangles  is the consumed capacity and the vertical dotted  line to the right  with the white circles  is the
335. er  if the volume is part of a  consistency group  the entire group must be moved  In this case  the cg_move command is the  correct solution     cg move cg  Mainz01 CG  pool  ITSO Pool 3     All volumes  volume snapshots  and snapshot groups of the consistency group are moved     Thinly provisioned pools  To create thinly provisioned pools  specify the hard_size and the soft_size parameters  For  thin provisioning concepts  see 2 7     Capacity allocation and thin provisioning    on page 37     A typical storage pool creation command with thin provisioning parameters can be issued as  shown in the following example     pool_create pool  ITSO Pool  hard_size 807 soft_size 1013 lock behavior read_only  Snapshot_size 206    The soft_size parameter is the maximal storage capacity seen by the host and cannot be  smaller than the hard_size parameter  which is the hard physical capacity of the storage pool   If a storage pool runs out of hard capacity  all of its volumes are locked to all write commands   Even though write commands that overwrite existing data can be technically serviced  they  are blocked to ensure consistency     Chapter 4  IBM XIV Storage Management software 151    To specify the lock_behavior parameter  which is the behavior when capacity reserve has  been depleted in a thin provisioned pool  run the following command     pool change config pool  ITSO Pool  lock behavior no_io    This command specifies whether the storage pool is locked for write or whether it 
336. er choice for an enterprise with most of its  infrastructure components deployed using Microsoft Windows operating system  Oracle Java  Systems Directory and Oracle Directory Server Enterprise Edition provide support for  UNIX like operating systems  including Linux   and Microsoft Windows  OpenLDAP is simple   small  and easy to set up     All LDAP servers share many basic characteristics because they are based on the industry  standards Request for Comments  RFC   However  because of implementation differences   they are not always entirely compatible with each other  For more information about RFCs   particularly regarding LDAP RFC 4510 4533  see the following website     http   www ietf org rfc html    Current implementation of LDAP based user authentication for XIV Storage System does not  support connectivity to multiple LDAP servers of various types  However  it is possible to  configure an XIV Storage System to use multiple LDAP servers of the same type to eliminate  a single point of failure  The XIV Storage System supports communication with only one  LDAP server at a time  The LDAP authentication configuration allows specification of multiple  LDAP servers that the XIV Storage System can connect to if a specified LDAP server is  inaccessible     246 IBM XIV Storage System Architecture and Implementation    5 7 4 LDAP role mapping    Before any LDAP user can be granted access to XIV Storage System  the user must be a  member of an appropriate LDAP group     There ar
337. er running this script  a custom event is generated if the used capacity threshold is  exceeded  You can see the custom event in the XIV Storage System event log  as shown in  Figure 7 91  An event notification rule can be defined based on severity or the  CUSTOM_EVENT event code to send an email or SNMP message  as described in 7 2      Monitoring using the IBM XIV Mobile Dashboard    on page 351     Event Properties x    Severity  Warning   Date  2010 10 19 15 12 31  Index  450495   Event Code  CUSTOM EVENT    T  Shooting     Description  Vol itso _vol_ 2  exceeded threshold of 700       Figure 7 91 A custom event generated by the WSH script using XCLI    Chapter 7  Monitoring 409    7 8 2 Custom monitoring of performance attributes    In Example 7 51  we demonstrate how to create a WSH script to monitor system performance   specifically the write hit latency  and issue a custom event to alert you when the latency  reaches a predefined limit  The script can be scheduled to run automatically at specific  intervals using the standard Windows Task Scheduler     Example 7 51 WSH script to monitor write hit latency     lt job id  XIV_Latency Monitor  gt    lt script language  JScript  gt     WSH Example for Custom Monitoring of an XIV Latency Performance    Modify the following parameters with proper values  var IPAddr    192 168 1 150    var Threshold   3000   var Severity    Warning    var Username    admin    var Password    adminpass        Main Script Starts Here  var strVa
338. eration Center  SSIC      http   www  ibm  com systems support storage ssic interoperability wss    The management tools  including the Hyper Scale Manager and Host Attachment Kit  HAK    can be downloaded from IBM Fix Central     http   www ibm com support fixcentral     The XIV Storage Management GUI  XIV Top  and XCLI tools are bundled in a single package  that can be downloaded for each supported operating system  There is a separate XCLI  package for IBM AIX    Linux  Solaris  and HPUX     There is a mobile monitoring dashboard version available for iPhone  iPad  and Android  devices     IBM XIV Storage Management GUI    The IBM XIV Storage Management GUI acts as the management console for the storage  system  A simple and intuitive GUI enables storage administrators to manage and monitor all  system aspects easily  with almost no learning curve     The XIV Storage Management GUI also contains a demonstration mode  To use the  demonstration mode  after the initial GUI program launch  select Demo for the Mode and  then click Login  as shown in Figure 1 2  A password is not required  There is also a Manager  mode that you can use to activate the Hyper Scale Storage Manager     12 IBM XIV Storage System Architecture and Implementation    storage Management    User   xiv_development      Password         Mode  Direct     Manager  1   9 155 509 232  Direct  Demo  Licensed Materials   Property of IBM Corporation and others   Copyright    2008  2012  IBM and  XIV are registered
339. ered  inactive  Logging out from the XIV Mobile application disables push notifications   Notifications can also be disabled from the settings window     If a mobile user unsubscribes from receiving push notifications  the user registration remains  on the XIV system  To completely remove the user privileges  the user must be removed from  the system via the GUI     7 5 Call Home and remote support    The Call Home function allows the XIV Storage System to send event notifications to the  XIV Remote Support Center  XRSC   This function enables both proactive and failure  notifications to be sent directly to IBM for analysis     The XRSC takes appropriate action  up to dispatching an IBM Service Support  Representative  SSR  with a replacement part or engaging Level 2 or higher level support to  ensure complete problem determination and a solution     Important  The configuration of Call Home and the configuration of remote support  facilities are recommended to assist with failure detection  diagnosis  and resolution     Chapter 7  Monitoring 371    7 5 1 Call Home feature    Call Home is always configured to use SMTP  and is only configured by qualified IBM SSRs   typically when the XIV Storage System is first installed     If an event is received by the XRSC that requires service or investigation  the event typically  triggers a new IBM problem management record  PMR      Because Call Home uses the client   s network and SMTP service  IBM cannot guarantee the  delivery of e
340. erformance class  all hosts   domains  or pools in this performance class share the limitations defined on that  performance class  For example  if two or more entities are added to a 10 000 IOPS  performance class  the total number of all contained entities IOPS is limited to 10 000   Therefore  it is a good practice to create one performance class per domain and one  performance class per pool     4 7 1 Managing QoS    The management of the QoS feature is quite easy  To define a performance class  click the  QoS Performance Class option from the Monitor menu  Figure 4 71 on page 171        system i    Eri       Figure 4 71 QoS  menu location    To configure a performance class  complete the following steps     1  Select the QoS Performance Class view from the Monitor menu  and click Add  Performance Class on the toolbar  The dialog window shown in Figure 4 72 opens     Chapter 4  IBM XIV Storage Management software 171    172          Add Performance Class    System  XIV_PFE2_1340010         Name  ITSO       lOps Limit  6 600 000   3000 Total    Bandwidth Limit  1 10 000   50  Per interface   gt  Total  Per Interface  Meee         Figure 4 72 QoS  Add Performance Class window    2  Enter a suitable performance class name and an IOPS limit  a bandwidth limit  or a  combination of both  based on business needs  There are two choices when entering the  limitation settings  Total or Per Interface     The Total intended limitation settings depend on the number of interface modul
341. erging workload areas  such  as Web 2 0 and cloud storage     The focus of this edition is on the XIV Gens running Version 11 5 x of the XIV system  software  which brings enhanced value for the XIV Storage System in cloud environments  It  offers multitenancy support  VMware vCloud Suite integration  more discrete performance  classes  and RESTful API enhancements that expand cloud automation integration  Version  11 5 introduces support for three site mirroring to provide high availability and disaster  recovery  It also enables capacity planning through the Hyper Scale Manager  mobile push  notifications for real time alerts  and enhanced security  Version 11 5 1 supports 6TB drives  and VMware vSphere Virtual Volumes  VVOL      In the first few chapters of this book  we describe many of the unique and powerful concepts  that form the basis of the XIV Storage System logical and physical architecture  We explain  how the system eliminates direct dependencies between the hardware elements and the  software that governs the system  In subsequent chapters  we explain the planning and  preparation tasks that are required to deploy the system in your environment by using the  intuitive yet powerful XIV Storage Manager GUI or the XIV command line interface  We also  describe the performance characteristics of the XIV Storage System and present options for  alerting and monitoring  including enhanced secure remote support     This book is for IT professionals who want an understan
342. erride the Default by selecting Manual  Then  the volume no longer follows the  current default system settings  In that case  you can select one of these options         Enable  Flash cache is enabled for the selected volume       Disable  Flash cache is disabled for the selected volume     Tip  The overall System Status Setting for the SSD Caching is shown in parentheses     You can select more than one volume in the Volumes and Snapshots view if you need to  change the SSD Caching State for a list of volumes     Flash cache performance statistics  The Performance Statistics view is updated to reflect flash cache     On GUI 4 0  some new metrics have been added for Read I O      gt  Mem Hit  Metrics for read I O Main cache   gt  SSD Hit  Metrics for read I O Extended SSD cache    Chapter 4  IBM XIV Storage Management software 203    The graphic in Figure 4 121 shows a common trend when you enable flash cache  Total  Memory Hit  red line  is going up because of flash cache  Meanwhile  Read Miss  blue line  is  going down  Flash cache Hit  purple line  is going up side by side with Total Memory Hit     xiv XIV Storage Management  File   View   Tools   Help A  v xiv_development  All Systems  View By My Groups  Statistics System Time  07 21pm Q  All Interfaces l  G i Hit   Miss   Memory Hit   SSD Hit   Hit Miss   d    ops Read    50 000      45 000      40 000      16 02 12 19 10  35 000       Hit Miss IOPS  49134     SSD Hit IOPS  19265     Memory Hit IOPS  17562     Miss IOPS
343. ertificates         xivhost2 storage tucson ibm com 389   Security    SSL Settings    SSL Encryption         Enabled     Configure LDAP Secure Port   Configure DSML Secure Port    Certificate  Default Certificate  Default Certificate       Cipher Family        xivstorage oang sample CA certificate    Security Device  Internal  software   Client Authentication    LDAP Settings    Allow Certificate Based Client authentication     DSML Settings    Try to use client certificate first             Figure B 19 New signed certificate activation    As shown in Figure B 20  you are prompted to restart the LDAP server for the new  certificate to take effect     A Restart Required  You have modified the Certificate used by the Directory Server     You must restart the Directory Server in order this modification to ke taken into account     Note  Once the Java TM  Web Console session has ended this message wil  disappear        Figure B 20 Manual restart request after activating new certificate    Low level SSL validation using the openssl command    The easiest way to test the low level SSL connection to the LDAP server is by running the  openssl s_client command with the  showcerts option  This command connects to the  specified host and lists the server certificate  the certificate authority chain  supported  ciphers  SSL session information  and verify return code  If the SSL connection works  the  openssl s_ client command result in the verify return code is 0  ok      Example B 11 s
344. es are a city telephone directory and a library card  catalog  In computer terms  a directory is a specialized database  also called a data  repository  that stores typed and ordered information about objects  A particular directory  might list information about users  the objects  consisting of typed information  such as user  names  passwords  and email addresses  Directories allow users or applications to find  resources that have the characteristics needed for a particular task     IBM XIV Storage System Architecture and Implementation       Directories in LDAP are accessed by using the client server model  An application that wants  to read or write information in a directory does not access the directory directly  but uses a set  of programs or application programming interfaces  APIs  that cause a message to be sent  from LDAP client to LDAP server  An LDAP server retrieves the information requested on  behalf of the client application and returns the requested information if the client has  permission to see the information  LDAP defines a message protocol used between the LDAP  clients and the LDAP directory servers  This protocol includes methods to search for  information  read information  and to update information based on permissions     5 7 2 LDAP directory components    An LDAP directory is a collection of objects organized in a tree structure  The LDAP naming  model defines how objects are identified and organized  Objects are organized in a tree like  struct
345. es being  used  as previously described         SS E T R a  Domain Performance Class              Incoming traffic to Pools    ITSO p2 Edit no domain ITSO_3way_pc  Incoming traffic to Domains Delete     ITSO_d1 Rename ITSO_3way_pc  hh ITSO_pct_ 105000 300MB imit Host Irati 2 X 6  Bandwidth Limit    1 800  300 X 6   Limit Pool Traffic  3 ITSO_pfc_100MB Limit Domain Traffic it   96  26  x6   Show Statistics  ss         ITSO_pfc_io1000 i EXS   Properties  33 ITSO_pfc_io2000 Sort By     gt  puc  53 ITSO_pfc_io03000 IOPS Limit    3 000  500X65   hh ITSO_pfc_i04000 IOPS Limit    3 996  666 X6   T No_limit_pfc  Traffic from Hosts  3 ITSO_x3550 25 no domain  ITSO_d1 No_limit_pfc             Figure 4 73 QoS limitation  Performance classes cannot contain hosts along with domains or pools    Conversely  QoS settings can also be specified on a per interface module level  Taking  into account the information presented earlier about a fully populated system  the  maximum QoS IOPS value at the per interface level is 100 000 IOPS  with a minimum of  1 IOPS  The maximum total QoS bandwidth value at the per interface level is   10 000 MB s  with a minimum of 1 MB s  To adapt these to the XIV total limits for a  performance class  multiply by the number of active interface modules  For example  fora    IBM XIV Storage System Architecture and Implementation    fully populated XIV system with 15 modules and 6 active interface modules  multiply by 6   For a partial system with 9 modules and 4 acti
346. es in the configuration to continue your participation in the CoD program      gt  Any order that fully activates a CoD configuration and does not include additional  unactivated CoD features indicates the client   s desire to exit the CoD program      gt  There are explicit CoD term limits         One year CoD term  At the end of one year  the system exits the CoD program and  automatically activates all remaining unactivated  and de allocated  CoD modules   generating client invoices for all of the remaining CoD storage capacity         Two year CoD term  At the end of two years  the system exits the CoD program and  automatically activates all remaining unactivated  and de allocated  CoD modules   generating client invoices for all of the remaining CoD storage capacity         Three year CoD term  At the end of three years  the system exits the CoD program and  automatically activates all remaining unactivated  and de allocated  CoD modules   generating client invoices for all of the remaining CoD storage capacity      gt  A warranty for all physically installed modules begins when they are initially powered on   They are being used to store data and contributing to performance regardless of whether  they have been purchased or not      gt  Allocating more CoD modules effectively creates a rolling CoD term      gt  XIV Storage System Call Home capabilities must be enabled to participate in the  XIV CoD program     Figure 3 3 on page 68 shows an example of the valid capacit
347. esting LDAP over SSL by using the Idapsearch command       usr bin ldapsearch  x  H     ldaps   xivhostl xivhostlldap storage  tucson  ibm com 636     D    CN xivtestuserl  CN Users DC xivhost1ldap DC storage DC tucson DC ibm DC com   w  pass2remember  b  CN Users DC xivhost1ldap DC storage DC tucson DC ibm DC com     dn  CN xivtestuserl  CN Users DC xivhost1ldap DC storage DC tucson  DC ibm  DC com   objectClass  top   objectClass  person   objectClass  organizational Person   objectClass  user   cn  xivtestuserl   description  Storage Administrator   distinguishedName  CN xivtestuserl CN Users DC xivhostlldap DC storage DC tucs  on DC ibm DC com      search result    search  2  result  0 Success    The Uniform Resource Identifier  URI  format used with the  H option specifies that LDAPS  must be used on port 636  the LDAP secure port      Appendix B  Additional LDAP information 453    Oracle Java Directory SSL configuration    454    This section describes the use of an SSL protocol for communicating with the  Oracle Java Directory     Creating a Oracle Java Directory certificate request   To configure SSL for Oracle Java LDAP Directory  you must create a CER  and have the CER  signed by a CA  Then  import the signed certificate into the local keystore  import a CA  certificate as a trusted root CA  and then restart the LDAP server for the new configuration to    take effect     Generating a Oracle Java Directory server certificate request   To generate a certificate reques
348. even when modules are added or removed      gt  Linear cache growth  The total system cache size and cache bandwidth increase linearly  with disk capacity because every module is a self contained computing resource that  houses its own cache  The cache bandwidth scales linearly in terms of both host to cache  and cache to disk throughput  and the close proximity of cache  processor  and disk is  maintained     Cache  Flash cache also increases linearly with total memory capacity  Flash cache  drives are not used to expand the disk capacity  but rather to extend the memory  capacity allocated to the caching of read I Os      gt  Proportional interface growth  Interface modules house Ethernet and Fibre Channel host  interfaces and are able to access not only the local resources within the module  but also  the entire system  With every interface module added  the system proportionally scales  both the number of host interfaces and the bandwidth to the internal resources      gt  Constant switching capacity  The internal switching capacity scales proportionally as the  system grows  preventing bottlenecks regardless of the number of modules  This  capability ensures that internal throughput scales proportionally to capacity     22 IBM XIV Storage System Architecture and Implementation     gt  Embedded processing power  Because each module incorporates its own processing  power with cache and disk components  the ability of the system to perform  processor intensive tasks  such a
349. example  the object represents a single employee record  If a record for a new  employee in organizational unit  ou   Marketing  of organization  0   IBM  needs to be created   the same location in DIT is the same  ou Marketing  o IBM  Additionally  the same set of  attributes defined by objectClass ePerson are also used  The new object is defined using its  own set of attribute values because the new employee will have their own name  email  address  phone number  and so on     For more information about the directory components  see Understanding LDAP   Design and  Implementation  SG24 4986     All the objects and attributes with their characteristics are defined in a schema  The schema  specifies what can be stored in the directory     5 7 3 LDAP product selection    LDAP authentication for Version 10 2 x or 11 x of the XIV Storage System supports three  LDAP server products      gt  Microsoft Active Directory   gt  Oracle Directory Server Enterprise Edition   gt  OpenLDAP    The current skill set of your IT staff is always an important consideration when choosing any  products for centralized user authentication  If you have skills in running a particular directory  server  it might be a wise choice to standardize on this server because your skilled people will  best be able to customize and tune the server  Your experts will be able to provide the most  reliable and highly available implementation for the LDAP infrastructure     Microsoft Active Directory might be a bett
350. example  we use dc xivauth as the entry location for XIV Storage System  user accounts  The location name is the same as the suffix name in this example  There  are certain similarities between Windows file system and LDAP directory structures  You  can think of LDAP suffixes as drive letters  A drive letter can contain directories  but you  can also put files onto the root directory on a drive letter  In our example  we put a new  account at the level  by analogy  of a root directory  the dc xivauth location     As your LDAP repository grows  it might no longer be practical to put types of entries into  the same location  In this case  just like with Windows file system  you can create  subdirectories and place new entries there  The LDAP equivalent of what has become a  directory hierarchy in your file system is called the Directory Information Tree  DIT   After  the entry location is selected and the XIV Storage System is configured to point to that  location  all the new account entries can be created only in that location       Select an object class for the new entry  Unlike a predefined object class for a user    account in Active Directory LDAP  Oracle Java Directory LDAP presents you with a choice  of object class types     The LDAP object class describes the content and purpose of the object  It also contains a  list of attributes  such as a name  surname  or telephone number  Traditionally  the  inetOrgPerson object class type is used for LDAP objects that describe
351. f cables  All cables use industry standard plugs  The XIV rack  comers precabled for all 15 modules even if smaller configuration is ordered     3 1 1 Fully populated configurations    A fully populated rack contains 9 data modules and 6 interface modules  for a total of   15 modules  The total usable capacity is 161 TB for a complete system when equipped with  2 TB drives  243 TB of usable capacity when fully populated with 3 TB drives  325 TB of  usable capacity when fully populated with 4 TB drives  and 489 TB of usable capacity when  fully populated with 6 TB drives     Because each module in Model 214 contains up to 48 GB of memory  in the 4 TB disk  configuration   a full rack contains up to 720 GB of memory that can be used to handle host  read and write I O requests  Model 114 has up to 24 GB installed per module  which equates  to 360 GB for the full rack   The SSD extended caching option adds 400 GB of read cache  capacity to each module  for a total of 6 TB in a fully populated configuration  15 modules   In  the 4 TB or 6 TB version of the Model 214  the flash cache option can be ordered in 800 GB  of read cache capacity to each module  for a total of 12 TB in a fully populated configuration   15 modules      Summary      gt  Each interface module of the XIV Gen3 Model 114 contains four 8 Gbps Fibre Channel  ports and one 4 port 1 GbE adapter  except interface module 4  which has only two  iSCSI ports      gt  Each interface module of the XIV Gen3 Model 214  1 GbE
352. f your XIV Storage System  You can also use the Disk Manager to  run a new discovery to create a probe or to modify the alerts  Figure 7 72 on page 394            i IBM Tivoli Storage Productivity Center  sspc sle 1    Configuration Utility  File View Connection Preferences Window Help                                                                 FFE  Fe  E                    E           Element Management       gt    m  al x  G    avigation Tree          Services   Data Manager Disk Manager   Fabric Manager   Tape Manager   Element Manager   Replication Manager         Administrative Services    IBM Tivoli Storage Productivity Center Refresh    2 onfiguration Utility     Configure Devices                Storage Subsystems              Job Management Subsystem Label Type Model   Status    Enabled for Provisioning Enabled for Performance     Reporting  I   2810 6000105 IBM a Normal a Yes     Topology XIV 2810 1300203 IBM   XIV JA14  A Normal  A Yes  a Yes        Monitoring    Storage Resource Group Management Show storage Subsystem Details    Show Storage Subsystem Asset Report Storage Topology            i Analytics    Storage subsystems like D58000 Storage Area Network SAN  volume Controllers and XIV are managed via their own native      Alerting interface  Other storage subsystems are managed by CIM Agents  CIM Agents managing those other storage subsystems need to  Data Manager be added and a CIMOM discovery job needs to be run  For all types of subssytems the Configure 
353. f_class  If omitted  defaults to undefined    Idap_id  If omitted  defaults to the value of the domain parameter    allow_ssd_ caching  If omitted  defaults to yes when SSD caching is enabled on the  system  but if omitted when SSD caching is disabled on the XIV system  defaults to no     Vvvvvvrvvrvyyvy Y    To update a domain  use the domain_update command  substituting the appropriate value for  the domain parameter  and specifying the parameter values  as shown in Example 4 21     Example 4 21 Updating a domain with the XCLI    XIV_PFE2_1340010 gt  gt domain_update domain  ITSO domain  hard_capacity 1024 soft_capacity 2048  Command executed successfully     198 IBM XIV Storage System Architecture and Implementation    4 9 Flash cache    Flash cache is an optional feature introduced and supported by the XIV system software  Version 11 1 0 on an XIV Gen3 system  Flash cache adds up to 12 TB of management free  caching power to a fully configured  15 module  storage system     The flash cache automatically adjusts to the workload  providing a performance boost for  small I O random reads  No additional configuration or tuning is necessary by the storage  administrator  However  XIV Storage Manager GUI Version 4 offers enhancements to support  flash cache  allowing the storage administrator to perform several optional actions  for  example      gt  Check the flash cache status in each module    gt  Enable or disable flash cache at system level    gt  Enable or disable flash c
354. ficates  Local  Computer      Trusted Certification Authorities     Certificates folder and select the  certificate issued by xivstorage  Figure B 12 shows that the certificate issued to and by the  xivstorage CA is valid     Certificate    This certificate is intended for the following purposefs       All issuance policies   All application policies    Issued to    xivstorage    Issued by  xivstorage    Valid from 6 29 2009 to 6 29 2010    Issuer Statement       Figure B 12 Certificate information window for xivstorage certificate authority    Low level SSL validation using the openssl command   The easiest way to test the low level SSL connection to the LDAP server is by running the  openssl s_client command with the  showcerts option  This command connects to the  specified host and lists the server certificate  the certificate authority chain  Supported  ciphers  SSL session information  and verify return code  If the SSL connection worked  the  openssl s_ client command result in the verify return code is 0  ok      Example B 9 shows the output of the openssl s_client command connecting a Linux server   xivstorage org  to the Active Directory server   xivhostl xivhostlldap storage tucson ibm com   This command connects to the Active  Directory server using the secure LDAP port  636      Example  B 9 Low level SSL validation using the openssl s_client    openssl s_ client  host xivhostl xivhostlldap storage tucson ibm com  port 636   CAfile cacert pem  showcerts    Server
355. finition of the organizationalPerson LDAP object class and list of attributes  see the  Microsoft website    http   msdn microsoft com en us 1ibrary ms683883 VS 85   aspx    In our illustration  we use both the Active Directory memberOf attribute and the OpenLDAP  description attribute for role mapping     The mapping is done by assigning the appropriate attribute value to the xiv_group_attrib  configuration parameter with the Idap_config_ set XCLI command   ldap config set xiv_group attrib memberOf    It can also be defined in the XIV Storage Management GUI  as described in the next section      LDAP role mapping for the storageadmin and readonly roles        LDAP role mapping for the storageadmin and readonly roles    The XIV Storage System administrator requires two LDAP group names that are used for  storageadmin and readonly role names in LDAP     In our example  the XIV Storage System administrator uses the    XIVAdmins    and     XlVReadonly    LDAP group names for mapping to storageadmin and readonly roles  This    Chapter 5  Security 247    mapping needs to be entered using the full DN because this full DN is the populated value in  the member Of attribute     The XIV Storage System administrator sets corresponding parameters in the XIV Storage  System     Idap_config set   storage _admin_role    CN XIVAdmins CN Users  DC itso DC storage  DC i bm  DC com     Idap_config set  read_only_role    CN XIVReadonly CN Users DC itso DC storage DC i1 bm  DC com       Case sens
356. for the highlighted  volume  Use your finger to rotate the arrow on the blue volume icon to switch the display  between IOPS  bandwidth  in megabytes per second  MBps    and latency  in milliseconds   ms    The data redundancy state of the XIV Storage System is shown in the upper right  corner  in this example  it is in Full Redundancy  but it can be Rebuilding or Redistributing    Swipe to the left to go to the Hosts window        Total     100794 XIV 0 2 13101 14 Full Redundancy  4    Volume  ITSO Blade1 IOmeter    57    IOPS  100793    BW  49 2 MBps    Latency  2 0 Ms       120 sec 100 80 60 40 20 current  ago y time          Volumes v TIOPS BW  MBps  Latency ms   ITSO_Blade1_lOmeter 100793 49 2 2 0  ITSO_HS22_blade4 1 0 0 Lat  Lpar3_lun35 0 0 0 0 0  Lpar3_lun34 0 0 0 0 0  Lpar3_lun33 0 0 0 0 0  Lpar3_lun32 0 0 0 0 0  Lpar3_lun31 0 0 0 0 0    Figure 7 31 IBM XIV Mobile Dashboard Volume view          If the Mobile Dashboard is displayed in portrait mode  by rotating your iOS device   a list of up  to 27 volumes is displayed instead     Chapter 7  Monitoring 353    Host view    The Host performance window is displayed when the iOS device is in landscape mode  as  shown in Figure 7 32  From this window  you can see up to 120 seconds worth of  performance for the highlighted host  Use your finger to rotate the arrow on the purple host  icon to switch the display between IOPS  bandwidth  in MBps   and latency  in ms   The data  redundancy state of the XIV Storage System is show
357. ft and hard capacity among  volumes within the pool  The regular pool is the same size  102 GB  in both diagrams     Regular Provisioning Example     Storage Pool with Volumes             Volume 1 The block definition allows Even for block defined volumes  For a Regular Storage Pool   Allocated Soft hosts to see a precise the system allocates logical the soft size and hard size are  Space number of blocks  capacity in increments of 17GB  equal     A J                                           o  Volume 1 Size   10GP   Block Definition       Volume 2 Size    Snapshot Reserve                 gt       gt   w     D  fe   ir                                         gt       gt       4        gt      a  Volume 1 Consumed Volume 2 Consumed Unused Snapshot Reserve Unused  Hard Space Hard Space  v v  Volume 1 Volume 2  Allocated Hard Allocated Hard In a Regular Storage Pool  the maximum  Space Space The consumed hard space grows as hard space available to be consumed by a    host writes accumulate to new areas volume is guaranteed to be equal to the  of the volume  soft size that was allocated                          Figure A 2 Volumes and snapshot reserve space within a regular storage pool    Consider Volume 1  Although Volume 1 is defined as 19 737 900 blocks  10 GB   the soft  capacity allocated is nevertheless composed of the minimum number of 17 GB increments  needed to meet or exceed the requested size in blocks  which is in this case only a single  17 GB increment of capacity 
358. g a volume to an FC or iSCSI host in the XIV Storage  Management GUI LUN Mapping for Host view     4  To complete this example  start the host server and check connectivity  The XIV Storage  System has a real time connectivity status overview     5  Click Hosts and Clusters     Hosts Connectivity to access the connectivity status   See Figure 4 68     Hosts and Clusters D     hosts Connectivity    Volumes by Hosts    iSCSI Connectivity       Figure 4 68 Hosts Connectivity    The Host Connectivity window opens  In the example  the ITSO _Win2008 and  ITSO Win2008 iscsi host definitions  which are shown in Figure 4 69  are shown with their  corresponding FC and iSCSI connections to the XIV Storage System           Ee      Standalone Hosts    9 T50 _Winz008  EE  50017380278A1234   ee  50017380273A5673    TSO Win2008_iscsi  iw   iqn 1991 05 com microsoftadminib 2999unn      ipar216  fee  10000000C9COFDD2 ivi Ws  faa  10000000C9COFDDS ai a          Figure 4 69 XIV Storage Management GUI example  Host connectivity matrix    Tip  The Hosts Connectivity view contains icons that indicate the port type  iSCSI or FC   for each port     4 6 2 Assigning logical unit numbers to a host by using the XCLI    There are several required steps to define a new host and assign LUNs to it  One of the  prerequisites is that volumes are created in a storage pool     Defining a new host  To use the XCLI to define a new host  complete the following steps     1  Create a host definition for your FC and i
359. ge 138     The output that is shown in Example 4 8 is displayed     Example 4 8 All the storage pool related commands    Category  storage pool    storage pool  storage pool  storage pool  storage pool  storage pool  storage pool  storage pool  storage pool    150    Name  cg move    pool _ change config  pool config snapshots    pool create  pool delete  pool list  pool rename  pool resize  vol_move    Description   Moves a Consistency Group  all its volumes and all their snapshots  and Snapshot Sets from one Storage Pool to another    Changes the lock behavior of the storage Pool    Changes the Storage Pool snapshot settings    Creates a Storage Pool    Deletes a Storage Pool    Lists all Storage Pools or the specified one    Renames a specified Storage Pool    Resizes a Storage Pool    Moves a volume and all its snapshot from one Storage Pool to  another     To list the existing storage pools in a system  run pool_list  A sample output of this  command is shown in Figure 4 49     Name  Pete    ITSO  Gene  SLES ITSO    Size GB   3011  7846  3441   206    Hard Hard   Size GB  Vols GB  Locked  1514 51 no  2288 791 4766 7846 946 no  1256 361 1824 3441 206 no   103 34 68 206 0 no    Soft  Empty  GB   1651    Soft Snap  Vols GB  Size GB   1015 344       Figure 4 49 Result of the pool_list command    IBM XIV Storage System Architecture and Implementation    To create a pool  enter the following command    pool create pool    ITSO Pool 2    size 515 snapshot_size 103   The size of
360. ge_queue_size Number of write commands that are waiting in the queue for  the disk  This metric increases as writes increase from cache  to disk    ios_ sec Number of IOPS for each disk  including IOPS in buffer  queues  100 is normal  300 is considered high    reads_sec Number of read IOPS    writes _sec Number of write IOPS    latency_prev_avg Average latency    write_kbytes_avg Average   O write size    fetch_icp_queue_size Queue size of the pending read ICP    latency_prev_max Max latency    fetch_queue_size Number of read commands that are waiting in the disk queue     Chapter 6  Performance 311    6 3 2 Using the XIV Top utility    In addition to the XIV Storage Management GUI performance statistics options  you can also  use XIV Top for additional and more granular system performance statistics  The XIV Top  application allows you to view and monitor performance information for defined volumes and  hosts in real time     There are multiple ways to access the XIV Top utility      gt  To start XIV Top directly from the GUI desktop  right click within the    All systems    view on  the XIV Storage System that you want to monitor  See Figure 6 20       v XIV Storage Management BAX  Systems   Actions   View   Tools   Help    O f  Add System Z Add Group  amp  admin    A All Systems  5   gt  XIV 1310062 Dantooine   Connectivity v   System Time  5 09PM Q       XIV 1310062 Dantooine 11 3 0 G3  IOPS  29 225    KIV 131   7 Alba     IOPS  242 028    Modify IP Addresses  Remove Sys
361. gement software 137    XCLI session features    XCLI Session offers command and argument completions  along with possible values for the  arguments  Within a session  there is no need to enter user information or IP addresses for  each command  For example      gt  Torun a command  type the command      gt  For command completion  type part of a command and press Tab to see possible valid  commands      gt  Forcommand argument completion  type a command and press Tab to see a list of values  for the command argument     Figure 4 39 shows an example of an XCLI Session      gt  gt  user_  lt TAB gt    user_define user_delete user_group add _ user user_group create  user_group delete user_group list user_group remove user user_group rename  user_group update user_list user_rename user_update     gt  gt  user_list  lt TAB gt   Show_users  user      gt  gt  user_list user   lt TAB gt   xiv_development xiv_maintenance admin technician  ITSO     gt  gt  user_list user admin   Name Category Group Active Email Address Area Code Phone Number Access  All   admin storageadmin yes       Figure 4 39 XCLI Session example    Customizing the XCLI environment   For convenience and more efficiency in using the XCLI  use the XCLI Session environment  and start XCLI Session from the XIV Storage Management GUI menu  However  if you want  to write scripts to run XCLI commands  it is possible to customize your management  workstation environment     As part of the XIV Storage System high availabilit
362. general system status and  various operational states of the XIV Storage System  An  alerts icon might be displayed that  if selected  shows  alerts and corresponding events  For more information   see 7 1     Monitoring with XIV Storage Management GUI  and XCLI    on page 328 Figure 4 16 shows the XIV  Storage Management software menu items     XIV Storage Manager menu icons    i     b e          poum         ist    All Systems Alerts    i Events J    All Systema      Remote    Migration      Alerts J   Volume Mobility d    Events J s     XIV Connectivity        QoS Performance Class     Migration Connectivity  2     lt       Mobile Notifications    1 Snapahot Tree l  Consistency Groups    X Consistency Groups    L Snapshot Group Tree J       Figure 4 16 Menu items in XIV Storage Management software    Tip  Depending on the current user role  more or fewer systems administrative actions  might be available in the menu items     Chapter 4  IBM XIV Storage Management software 125    XIV Storage Management GUI features    Several notable features in XIV Storage Management Version 4 4 facilitate efficient system  configuration and management by using the XIV Storage Management GUI     Tree Table view    When working with the XIV Storage Management GUI  a standardized view has been  introduced called the Tree Table  TT  view  As shown in Figure 4 17 in the Pools   Volumes by  Pools view  this feature presents the navigation of several views  Pools  Volumes  Hosts  and  Clusters  
363. ger Inventory Options menu    Maintenance user operations   Accessing the MSMS with maintenance credentials allows you to perform various  maintenance tasks  such as gathering server logs  backing up or restoring the database   replacing the security certificate  or upgrading the MSM     See  BM XIV Storage System Management Tools Version 4 0 User Guide SC27 4230 00 for  more information     5 5 4 Managing user accounts using the XCLI    This section summarizes the commands and options available to manage user accounts   user roles  user groups  group memberships  and user group to host associations through the  XCLI Session     Table 5 3 on page 235 shows the various commands and a brief description for each  command  The table also indicates the user role that is required to issue specific commands   New access control commands come with XIV code release 11 5 for domain based  multitenancy users     Important  With XIV Storage Software v11 4  a new secadmin role is introduced and  required to execute specific commands related to encryption management  Details are  covered in the IBM Redpaper titled X V Security with Data at Rest Encryption   REDP 5047     234 IBM XIV Storage System Architecture and Implementation    Table 5 3 XCLI access control commands    Command Description Role required to use  command  access define Defines an association storageadmin  between a user group and a  host   access delete Deletes an access control storageadmin  definition   access list List
364. gh the system is protected by a UPS for internal use  you can reduce  the risk of a power outage if you connect the system to an external UPS  a backup  generator  or both     The UPS complex is designed and dedicated to supporting the components inside the XIV  Storage System rack  No external equipment can be plugged into the UPS units  The UPS  complex is not substitute for traditional power conditioning or sustaining equipment typically  found in a data center environment and is intended to be used with existing equipment     Important  The three UPSes in the XIV Storage System appear to the central UPS in the  main data center as standard storage system power supplies  The XIV Storage System  does not affect the central UPS unit in the main data center in a harmful way     IBM XIV Storage System Architecture and Implementation       Figure 3 15 shows an illustration of one UPS module       Proactive power problem recognition    Proactive power problem correction      Battery Buffered operation up to 11 9 minutes          UPS  4200 Watt   6000 VA  Output Voltage  230 V   Frequency  50  60 Hz   Input Voltage  100   280 V  Frequency  50  60 Hz   Input Connection  Hard Wire 3 wire    Figure 3 15 UPS module    The three UPS modules are at the bottom of the rack  Each UPS is 3U in height  Each UPS  has an output of 6 Kilovolt ampere  kVA  to supply power to all other components in the  system     Attention  Do not power off the XIV Storage System by using the UPS power button 
365. gical volume  to 80 TB  with 1 TB disk drives   161 TB  with 2 TB disk drives   243 TB   with 3 TB disk drives   or 325 TB  with 4 TB disk drives      For partially populated XIV Storage System configurations  the maximum hard storage  pool size is always equal to the maximum usable capacity of the configuration or 80 TB   with 1 TB disk drives   161 TB  with 2 TB disk drives   243 TB  with 3 TB disk drives   or  325 TB  with 4 TB disk drives   whichever is less     Snapshot reserve capacity is defined within each storage pool and is effectively  maintained separately from logical  or master  volume capacity  The same principles apply  for thinly provisioned storage pools  with the exception that space is not guaranteed to be  available for snapshots because of the potential for hard space depletion     The following principles govern the relationships between logical entities within the  storage pool      gt     An XIV Storage System LUN or logical volume can have multiple independent snapshots   This logical volume is also known as a master volume     A master volume and all of its associated snapshots are always in the same storage pool   A volume can only be part of a single consistency group and a single storage pool   All volumes of a consistency group must be in the same storage pool     The space allocated for a storage pool can be dynamically changed by the storage  administrator         The storage pool can be increased in size         The storage pool can be decrea
366. gies can be adopted easily  XIV offers encryption for data at rest  while avoiding performance impact    Flash  solid state drive or SSD  caching  available as an option  adds up to 12 TB  of  management free caching power to the whole system  providing up to four times better  performance for application workloads  without the need for setup  administration  or  migration policies     The IBM XIV Gens Storage System is fully virtualized storage designed to eliminate the need  for performance tuning  planning for capacity and performance growth  and numerous other  storage management activities  The highly intuitive XIV GUI and built in management tools  make administrative tasks easy and efficient  with little training or expertise required  from  provisioning volumes to monitoring multiple systems  A powerful command line interface   CLI  supports complex scripting  The unified console enables one stop centralized  administration of multiple XIV systems  Its exceptional flexibility extends to mobile devices   giving users the flexibility of performance and capacity monitoring by the IBM XIV Mobile  Dashboard  supporting the Apple iPhone and Apple iPad  and Android devices     These design points provide the following benefits      gt  Reduced total cost of ownership  TCO     gt  Flexibility to meet changing business needs    gt  Consolidated and virtualized data storage    gt  High availability and performance characteristics     1 Twelve TB using 15 x 800 GB flash drives i
367. gin idx   8971  2013 09 24 13 37 41 INFO event_list after 2013 09 24 13 26 37   2013 09 24 13 37 41 INFO adding 1 new events to SCOM   2013 09 24 13 37 41 INFO Enter write end time idx     2013 09 24 13 37 41 INFO Exit write end time_idx     2013 09 24 13 37 41 INFO end time   2013 09 24 13 29 18  last index   8972  2013 09 24 13 37 41 INFO Exit get_xiv_events     2013 09 24 13 37 41 INFO Finished collecting events from xiv 10114  successful ly   2013 09 24 13 37 41 INFO Return items to scom   2013 09 24 13 37 41 INFO Exit collect      In Example 7 59  the discovery process for monitoring is run against the same  XIV Storage System in about 16 seconds     Example 7 59 The scom_xiv log    2013 09 24 13 30 09 INFO Enter discover device by configuration    2013 09 24 13 30 09 INFO Connecting to 10 0 20 102   2013 09 24 13 30 11 INFO 1 IBM XIV Storage System is found   device ID  10114  code level  11 4 0 esp4 p20130815   2013 09 24 13 30 11 INFO Started discovering 10114       2013 09 24 13 30 11 INFO Enter get_xiv_devices     2013 09 24 13 30 12 INFO Exit get_xiv_devices     2013 09 24 13 30 14 INFO Enter get_xiv_host_mapping     2013 09 24 13 30 16 INFO XIV host url 10 0 20 102 discovered  2013 09 24 13 30 16 INFO XIV 10 0 20 102  can be connected   2013 09 24 13 30 17 INFO Exit discover_configuration     2013 09 24 13 30 18 INFO Exit get_xiv_host_mapping     2013 09 24 13 30 18 INFO Finished discovery for xiv 10114 successfully  2013 09 24 13 30 18 INFO Returning data to SCOM
368. gories  as shown in Example 5 4  This example is based on the  assumption that a domain is already defined and one admin associated user is already  present in the system     Example 5 4 XCLI domain_list_user  XIV_PFE2_1340010 gt  gt domain_list_users    Domain User Category   ITSO dl ITSO User  storageadmin  no domain Residency applicationadmin  no domain xiv_development Xiv_devel opment  no domain xiv_maintenance Xiv_maintenance  no domain admin storageadmin  no domain technician technician  no domain xiv_hostprofiler xiv_hostprofiler    2  Add the same user to another domain  as shown in Example 5 5 on page 237 The  example assumes that another domain is already defined  Specify the domain and user  name  A user can have a domain administrator role in more than one domain     236 IBM XIV Storage System Architecture and Implementation    Example 5 5 XCLI domain_add_user    XIV_PFE2_1340010 gt  gt domain_add_user domain pfe ibm user ITSO Userl  Command executed successfully     Defining user groups with the XCLI  To define a user group  complete the following steps     1  Run user_group create  as shown in Example 5 6  to create a user group called  Application0O3 Mainz   Example 5 6 XCLI user_group_create     gt  gt user_group create user group Application03 Mainz  Command executed successfully     Spaces  Avoid spaces in user group names  If spaces are required  the group name  must be placed between quotation marks  such as    name with spaces        The Application03_Mai
369. group of applications  or departments      gt  Improved regulation of storage space    Automatic snapshot deletion occurs when the storage capacity limit is reached for each  storage pool  Therefore  when a storage pool   s size is exhausted  only the snapshots that  are in the affected storage pool are deleted     Size of storage pools  The size of storage pools and the associations between volumes and storage pools are  constrained by the following circumstances      gt  The size of a storage pool can range from 17 GB up to 325 TB on XIV Storage System  Gen3 systems equipped with 4 TB disks     Tip  To determine the maximum pool size  use the system_capacity_list command   Look at the column titled Max Pool Size      gt  The size of a storage pool can always be decreased  limited only by the space already  consumed by the volumes and snapshots in that storage pool      gt  Volumes can be moved between storage pools without any limitations  if they are not part  of a consistency group and there is enough free space in the target storage pool  Volumes  that are part of a consistency group can be moved together as a group     Important  All of these operations are handled by the system at the metadata level   and they do not cause any data movement  copying  from one disk drive to another   They are completed almost instantly and can be done at any time without affecting  the applications     Thin provisioned pools   Thin provisioning is the practice of allocating storage on a
370. gs  it is disabled  by default  for every  new volume defined      gt  lf flash cache is enabled from System Level Settings  it is enabled  by default  for every  new volume defined     Chapter 4  IBM XIV Storage Management software 201    202    Setting flash cache at a volume level    The Volumes and Snapshots view in the XIV Management GUI includes a new field that  indicates the flash cache status for the volumes that are defined in the system     In the Volumes and Snapshots tabular view  there is a new column labeled SSD  It displays the  flash cache status for all the volumes     By default  the SSD column shown in Figure 4 119 is not visible  To add it  use the  instructions in 4 5 1     Managing volumes with the XIV Storage Management GUI    on  page 153        xiv XIV Storage Management             File   View   Tools  Help    O p Add Volumes itso    All Systems  View By My Groups  XIV 1310039 C    Volumes and Snapshots                               w abby_10 51 GB test_pool   b asimov_125 51 GB mirror_pool a  Detault     b asimov_105 51 GB 0 GB mirror_pool Enabled  Default   w abby_12 51 GB 0 GB test_pool Enabled  Default   b asimov_038 51 GB 0 GB mirror_pool Enabled  Default   b adams_127 51 GB 0 GB mirror_pool Enabled  Default   Sue w asimov_107 51 GB 0 GB mirror_pool Enabled  Default   LE w adams_065 51 GB 0 GB mirror_pool Enabled  Default   b asimov_040 51 GB 0 GB mirror_pfiol Enabled  Default    amp  b asimov_117 51 GB 0 GB mirror_pool Enabled  Default     w a
371. hanced reliability through prediction and  early recognition of drive failure conditions  The drive has data prefetch and cache  drive  buffer storage  control algorithms that improve drive performance  These drives are also  capable of the following reliability features      gt    Background media scan to detect drive media errors   gt  Media pre scan to allow the drive to repair media errors     gt  Deferred auto reallocation  which allows the drive to reallocate unreadable locations on a  subsequent write command     gt  Idle read after write  which uses drive idle time to verify the integrity of recently  written data    This SAS drive also exhibits significant performance gains for large block I O     All XIV Storage System disks are installed in the front of the modules  with 12 disks per  module  Each single SAS disk is installed in a disk tray that connects the disk to the  backplane and includes the disk indicators on the front  If a disk is failing  it can be replaced  easily from the front of the rack  The complete disk tray is one FRU  which is latched in its  position by a mechanical handle     Chapter 3  IBM XIV architecture  components  and planning 85    Important  IBM performs all disk replacements in an XIV Storage System  SAS disks in  the XIV must never be swapped within a module or placed in another module because of  the internal tracing and logging data that they maintain     In the XIV Gens  disks are replaced according to the IBM standard maintenance 
372. handle rebuilds and is one of the reasons why XIV Storage  System rebuilds are fast     It is easy to extend this to a failed XIV module because the same redistribution scenario takes  place  The only difference is that now the data redistribution involves 12 drives rather than just  one  All the concepts and considerations and advantages still apply  The rebuild and  redistribution take longer because more data is involved     The lIOPS and megabytes per second  MBps  experience basically no change in the  performance supplied to the applications     Compare XIV Storage System redistribution to a RAID 5 array failure and rebuild      gt  The entire data storage capacity must be rebuilt using parity recalculation  not just actual  user data      gt  The rebuild process imposes a significant stress on the drives  which can lead to  additional drive failures      gt  The rebuild has a significant impact on the performance capabilities of the array      gt  Rebuild times are typically much longer when compared to XIV Storage System  redistribution     XIV Storage System redistribution is the same mechanism that redistributes data when a  module is added to an XIV Storage System  with the same considerations  And it is worth  noting that  although it has nothing to do with performance  XIV Storage System data  redistribution is carried out automatically  No user intervention is necessary or even possible     6 1 5 Snapshots    The performance penalty during an XIV Storage System 
373. he XIV Storage System response time  latency  would tend to increase  especially as the  XIV configuration approaches its maximum performance capacity     Figure 6 32 is an example of a typical IOPS versus response time curve  It is based on  theoretical I O workload characteristics  Typical I O characteristics include the following      gt     YY vV Yy    IOPS   I O size for both reads and writes   Cache hits for both reads and writes   Percentage of reads versus writes   Percentage of both reads and writes that are sequential    Example IOPS vs  Response Time Curve                            Latencyin ms  wi          O QO  amp     OQ O  O e P nD N    D OD CO CO CO LO LO LO LO LO LO LQ  amp   SOX OOD LD LD LH LH LL OH  S es   PP AP _ PAS PP E    8 OD BO BO BO LC LO LC LC LC CO LO LO LO LO OL  SY LX OD LA LO OOO OD OO AO OO  gt    SO OO OO LG AO O OO GO QO OO OO OO CO QO a    FOP a a L FPF PPh FP SF gh gh 08 PP FH HP FHP HH    Total 1 0 Rate  I Os per second     Figure 6 32 Example IOPS versus response time curve    IBM XIV Storage System Architecture and Implementation       The slope of the curve is almost flat as IOPS increase through most of the graph  But when  the IOPS reaches 50 000  the latency begins to increase rapidly  This point is what is referred  to as the knee of the IOPS versus response time curve  The shape of this curve is typical of all  spinning disk systems  The actual IOPS versus latency numbers  the slope of the flat section   and the location of the k
374. he failure of an individual interface module  but there are various  possible points of failure  switch  cable  and HBA  that can cause access loss from the host to  the XIV Storage System  This configuration  which is not desirable for any production system   is used if there is no way of adding a second Fibre Channel port to the host     Restriction  Direct host to XIV Storage System connectivity is not supported  The  implementation must use a SAN fabric  either single or dual SAN switches   Dual fabric  configurations are preferable     Chapter 3  IBM XIV architecture  components  and planning 99    Fibre Channel cabling and configuration  Fibre Channel cabling must be prepared based on the required fiber length and the  selected configuration     When installing an XIV Storage System  complete the following Fibre Channel  configuration procedures      gt  You must configure Fibre Channel switches that are zoned correctly to allow access  between the hosts and the XIV Storage System  The specific configuration to follow  depends on the specific Fibre Channel switch  It is best to have a separate zone for each  initiator     gt  Hosts must be set up and configured with the appropriate multipathing software to balance  the load over various paths  For multipathing software and setup  see the specific  operating system section in X V Storage System  Host Attachment and Interoperability   SG24 7904     iSCSI network configurations  Logical network configurations for iSCSI are
375. he flexibility of scripting     By using the output from multiple commands or multiple fields  it is possible to monitor any  combination of components or parameters of the system and act upon them based on criteria  that you define     Similar results can be accomplished on UNIX based platforms by using shell scripting and  crontab for scheduling custom monitoring processes     412 IBM XIV Storage System Architecture and Implementation    7 9 Microsoft System Center Operations Manager    Microsoft System Center Operations Manager  SCOM  is the Microsoft end to end  service management product  From a single interface  you can verify the state  health  and  performance of your Windows servers  certain UNIX based computer systems  and other  data center equipment  based on the availability of relevant management packs  SCOM can  generate alerts when it identifies issues with availability  performance  configuration  or  security     Depending on your needs  using SCOM delivers the following benefits      gt  Storage administrators can monitor multiple storage products from different vendors     gt  Microsoft customers can monitor IBM systems using their familiar tools     gt  System administrators can manage both storage systems and other IT systems from a  single consistent interface     A key feature of SCOM is its use of management packs  which contain application or  product specific rules and filters  Vendors can create their own management packs relevant  to their own pro
376. he table     The example in Figure 4 35 illustrates the Volume and Snapshots view filtered to display all  volumes that contain the    ITSO    string in the name field  The string can be anywhere in the  name  not just at the beginning                es and Snapshots   fC itso i  plume  6 of 476   Snapshot  0 of 11    Sys          System Size  GB    Used  GB  Consistency Group   m teated  GUI Time       M02  1310114 34 GB 10 GB  M02 1370114 34 GB 10 GB  M02 1310114 34 GB 6 GB  Iw _02_ 1310114 34 GE 6 GB  Iw _02_ 1310114 51 GB 9 GB  Iw _02_ 1310114 51 GB 9 GB       Figure 4 35 Local table filter    Chapter 4  IBM XIV Storage Management software 135       Volume identification in hexadecimal    The XIV Storage Management GUI can now be configured to show hexadecimal volume  serial numbers rather than decimal volume serial numbers  as shown in Figure 4 36     To enable this setting  click the Tools portion of the menu bar  click Management  and select  Hexadecimal in the Volume Serial drop down field         View By My Groups  LUN Mapping for Host Kristens_Laptop       CUS Jake  CUS_Lisa_143   CUS Zach  Demo_Xen_1  Demo_Xen_2  Demo_Xen_NPIV_1  dirk   is          Figure 4 36 Volume identification in hexadecimal    4 3 2 XIV Storage System Command Line Interface    136    As with the XIV Storage Management GUI  the XIV Storage System Command Line Interface   XCLI  is an intuitive tool for managing IBM XIV systems  More details are provided in this  section     Starting the XIV Com
377. he writing capabilities to the new drive or module         When a replacement module is phased in  there are 168 disks reading and 12 disks  writing concurrently  Therefore  the time to completion is determined by the data  throughput to the replacement module  Because the read frequency to the existing  disks due to the redistribution process is low  a low impact on host performance during  the process is guaranteed         When a replacement disk is phased in  there are concurrently 179 disks reading and  only one disk writing  In this case  the new drive determines the achievable throughput  of the redistribution process  Again  the impact on host transactions is small and not  noticeable     Transient soft and hard system size    Capacity that is required for restoring non redundant data during a rebuild is  depending on  availability  obtained in this order     1  Deallocated system hard capacity  Hard capacity that was not assigned to any storage  pools at the time of the failure     2  Reserve spare capacity  The system reserves enough capacity to sustain the consecutive   non concurrent failure of three drives and an entire module  If it is already used   replacement hardware must be phased in to ensure that data redundancy can be  restored     When sufficient deallocated hard capacity is available  the system withholds allocating  reserve spare space to complete the rebuild or phase out process to provide additional  protection  As a result  it is possible for the sy
378. hed hosts     e If there is a hardware failure  data is automatically  efficiently  and rapidly rebuilt  across all the drives and modules in the system  This action preserves host  transparency  equilibrium  and data redundancy at all times while virtually  eliminating any performance penalty associated with traditional RAID rebuilds  This  rebuild action works together with the same redistribution activity as when hardware  is added     24 IBM XIV Storage System Architecture and Implementation        There are no    pockets    of capacity     orphaned    disk space  or resources that are    inaccessible because of array mapping constraints or data placement     Flexible snapshots     Full storage virtualization incorporates snapshots that are differential in nature  Only  updated data uses physical capacity  which makes the following capabilities possible     e Multiple concurrent snapshots are possible because a snapshot uses physical  space only after a change has occurred on the source     e Multiple snapshots of a single master volume can exist independently of each other   e Snapshots can be cascaded  in effect creating snapshots of snapshots     Creation and deletion of snapshots do not require data to be copied and  occur immediately     When updates occur to master volumes  the system   s virtualized logical structure  enables it to preserve the original point in time data associated with any dependent  snapshots by redirecting the update to a new physical location 
379. her the certificates are correctly imported   Click Directory Servers     xivhost2 storage tucson ibm com 389     Security     gt   Certificates and click the xivstorage org sample CA certificate link     456 IBM XIV Storage System Architecture and Implementation    Figure B 17 shows that the certificate issued to xivhost2 storage  tucson ibm com is  valid and was issued by the xivstorage certificate authority        General  Issued To  CN xivhost2 storage tucson ibm com  OU ITSO  O xivstorage  L Tucson  5T Arizona  C US  Issued By  EMAILADDRESS camxivstorage on  CN xivstorage  O xivstorage  L Tucson  ST Arizona  C US  Valid From  TADS 3 48 Ph  Expires On  T2 10 3 48 Phl  Type  x 509  Serial Number  F  Signature   Bms126d4  Signature Algorithm  MO SwithR SA  Public Key     Sun RSA public key  16024 bits   modulus  lI401S8688 257 OF O663 74043683 9344 7SR85 F290252 16935889507 FTL S6354 17217 98 99887555297 68116176  4181094 908162003 444 609855350686161117 7281191517 9279092 78808 72235744 7377156239184 38178324 6525075007  21885294 941171633302429991652533987 7472184384 252011146708924534136193 2503220 909527 20908893 71573877  142807791146638985203   public exponent  65537    Version  3          Figure B 17 Signed Oracle Java Directory certificate information    To check the xivstorage certificate  click Directory Servers     gt   xivhost2 storage tucson ibm com 389     Security     CA Certificates and click the  xivstorage org sample CA Certificate Authority certificate li
380. hese entities  For  instance  hosts cannot be specified for a performance class that already contains a  domain or pool  see Figure 4 73 on page 172       gt  Limits can be defined as Total  meaning for XIV system as a whole  or Per Interface    gt  Limits are specified as IOPS or bandwidth    gt  Limit calculation is based on preferred practices for setup and zoning     The limited I O processes are expected to always come through all active XIV interface  nodes  equal to active interface modules   For example  on a 9module partial rack XIV   where 4 interface modules are active  the total I O or bandwidth rate would be divided by 4   the number active interface modules   If a limit total of 3 000 I Os is specified  it would  result to a limitation of 750 I Os per interface module     In addition  in the case of the 9 module XIV  if the limited I Os are coming through only two  of the four interface modules  as a result of the SAN zoning   the effective limitation will be  2 x 750 I Os   1 500 I Os rather than the expected 3 000 I O limitation     The calculation related information is visible in the GUI  as shown in Figure 4 70  fora  9  module XIV Storage System  partial rack configuration         Figure 4 70 QoS  calculation based on active XIV interface modules  9 module XIV Storage System     IBM XIV Storage System Architecture and Implementation    A similar calculation takes place for the bandwidth limit     Note  If more than one host  domain  or pool is added to a p
381. horough description of how the system uses and manages reserve capacity under  specific hardware failure scenarios  see 2 10 2     Preserving data redundancy  Rebuilding  and redistributing    on page 51     Snapshots  The IBM XIV Storage System does not manage a separate global reserved  space for snapshots  For more about this  see 2 6 3     Storage pool relationships and rules     on page 36     2 5 3 Metadata and system reserve    The system reserves roughly 4  of the physical capacity for statistics and traces  and the  distribution table     2 5 4 Mirrored copies of data    The mirrored copies of data are the secondary partitions described in    Partitions    on page 27     34 IBM XIV Storage System Architecture and Implementation    2 6 Storage pool concepts    The concept of storage pools is purely administrative  Although the hardware resources within  the XIV Storage System are virtualized in a global sense  the available capacity in the system  can be administratively portioned into separate and independent storage pools  Essentially   storage pools function as a way to effectively manage a related group of similarly provisioned  logical volumes and their snapshots     2 6 1 Improved management of storage space    Storage pools form the basis for controlling the use of storage space by imposing a capacity  quota on specific applications  a group of applications  or departments  This enables isolated  management of relationships within the associated group of logica
382. hows the output of the command     Example 4 9 All the volume related commands    Category    volume  volume  volume  volume  volume  volume  volume  volume  volume  volume  volume  volume  volume  volume  volume    162    Name    reservation_clear  reservation_key list  reservation_list    Description   Clears reservations of a volume   Lists reservation keys    Lists volume reservations     vol by id Prints the volume name according to its specified SCSI serial number   vol_copy Copies a source volume onto a target volume    vol_create Creates a new volume    vol_delete Deletes a volume     vol disable_vaai  vol_enable_vaai    Disables VAAI support for a specified volume  Enables VAAI support for a specified volume    vol_format Formats a volume    vol_list Lists all volumes or a specific one    vol_lock Locks a volume so that it is read only    vol_rename Renames a volume    vol_resize Resizes a volume    vol_unlock Unlocks a volume  so that it is no longer read only and can be written to     To list the existing volumes in a system  run the following command     vol    _list pool     ITSO Pool       IBM XIV Storage System Architecture and Implementation    For a list of existing volumes in a storage pool  run the following command     vol_list pool    ITSO Pool       The result of this command is similar to the output shown in Figure 4 58     Name Size GB  Master Name Consistency Group Pool Creator Used Capacity   GB    myvol_ 10 223 ITSO itso   myvol_ 11 223 ITSO itso   
383. hows the output of the openssl s_client command connecting a Linux  server  xivstorage org  to the Oracle Java Directory server  xivhost2 storage tucson ibm com  This command connects to the Oracle Java Directory  server using the secure LDAP port  636      Example  B 11 Low level SSL validation using the openssl s_client      Openssl s_ client  host xivhost2 storage tucson ibm com  port 636  CAfile  cacert pem  showcerts    Server certificate    subject  C US ST Arizona L Tucson 0 xivstorage OQU ITSO CN xivhost2 storage  tucson   ibm com  issuer  C US ST Arizona L Tucson 0 xivstorage CN xivstorage emai Address ca xivsto  rage org    458 IBM XIV Storage System Architecture and Implementation    Acceptable client certificate CA names   0 Sun Microsystems CN Directory Server CN 636 CN xivhost2 storage  tucson  ibm com   C US ST Arizona L Tucson 0 xivstorage CN xivstorage emai 1Address ca xivstorage or    g    SSL handshake has read 2144 bytes and written 328 bytes  New  TLSv1 SSLv3  Cipher is AES256 SHA  Server public key is 1024 bit  Compression  NONE  Expansion  NONE  SSL Session   Protocol   TLSvl  Cipher   AES256 SHA  Session ID  48B43B5C985FE1F6BE3F455F8350A4155DD3330E6BD09070DDCB80DCCB570A2ZE  Session ID ctx   Master Key   1074DC7 ECDD9FC302781C876B3101C9C618BB07402DD7062E7 EA3AB794CA9C5D1A33447EE254288CEC  S86BBB6CD264DCA  Key Arg   None  Krb5 Principal  None  Start Time  1246579854  Timeout   300  sec   Verify return code  0  ok     Basic secure LDAP validation using th
384. ibm    Storage Subsystem Performance  By Storage Subsystem          B  al x  2l        Administrative Services  H IBM Tivoli Storage Productivity Center  H Data Manager A      Data Manager for Databases    pan P  Pn PSP Se   Data Manager for Chargeback Re     Disk Manager  A   al kv 2812 7803760 Tem o6 ioj2o115 58 10PM   899s  AYN  i   Storage Subsystems mj  _ Storage Optimizer  ESAN Planner  i  Monitoring  Alerting  _ E Profile Management  l    Reporting  i H Groups     Storage Subsystems     Storage Subsystem Performance    By Controller  By I O Group   By Module  Node  BY Array    By Managed Disk Group   BY Managed Disk     Fabric Manager      Tape Manager      Element Manager    Replication Manager          Figure 6 29 Tivoli Storage Productivity Center GUI    Chapter 6  Performance 319    After loading this data into a spreadsheet  certain formatting is helpful to prepare the  spreadsheet for the easiest use  See Figure 6 30 for the following formatting suggestions         gt  Sort by date and time    gt  Freeze panes in cell E3    gt  Data filters in row 2   A B C D E F G H l J K L M N AM AN AO  Port Total Port Overall  Port Port Port Send Receive Port Port Send Receive Port  Port Send Receive Total Port Port Send Receive Total Port Response Response Response Bandwidth Bandwidth Bandwidth  1 Subsystem Port WWPN Time Interval I O Rate 1 O Rate 1 O Rate Data Rate Data Rate Data Rate Time Time Time Percentage Percentage Percentage  X zj X M X Z X    X zj X    lz x x x x   
385. ibute  sAMAccountName      User Name Attribute  displayName      XIV Group Attribute  memberOf        Storage Admin Role   CN XIVAdmins CN Users  DC itso  DC storage  DC ibm DC com        Read Only role  CN XIVReadonly CN Users DC itso  DC storage  DC ibm DC com    LDAP    General User ID Attribute sAMAccountName  User Name Attribute i userPrincipalName  LDAP Servers Pe  XIV Group Attribute memberOf  User Credentials Storage Admin Role   CN xIVAdmins CN Users DC its0  DC st    Read Only Role z CN XWReadonly CN Users DC itso DC    Role Mapping    Secure LDAP  Parameters    Figure 5 69 LDAP Configuration  Role Mapping tab          LDAP mode  When you activate the LDAP mode  it deactivates all defined users on  the XIV Storage System and only LDAP users with the appropriate group role have  access to the system  You will also be logged out from the XIV Storage Management  GUI     9  Click Update and the configuration is now finished     5 8 3 Using XIV Storage System command line interface    262    The quickest method for configuring LDAP in an XIV Storage System is to use the XIV  Storage System Command Line Interface  XCLI      You must define your LDAP Server in the XIV Storage System  as shown in Example 5 12     Example 5 12 XCLI add server    XIV 02 1310114 gt  gt ldap_ add server fqdn itso storage ibm com address 9 155 113 143    base _dn  CN Users DC itso DC storage  DC ibm  DC com   Command executed successfully     XIV 02 1310114 gt  gt ldap_list_servers  FQDN Address
386. ical volumes over physical disks and  modules with a dynamic relationship between primary data partitions  secondary data  partitions  and physical disks  This virtualization of resources in the XIV Storage System is  governed by the data distribution algorithms     Distribution table   The distribution table is created at system startup  It contains a map of every primary and  secondary partition and the modules and physical disks where they are located  When  hardware changes occur  a new distribution table is created and delivered to every module   Each module retains redundant copies of the distribution table     28 IBM XIV Storage System Architecture and Implementation    Volume layout   At a conceptual level  the data distribution scheme can be thought of as a mixture of mirroring  and striping  Although it is tempting to think of this scheme in the context of RAID 1 0  10  or  0 1  the low level virtualization implementation precludes the use of traditional RAID  algorithms in the architecture     As described in    Partitions    on page 27  the XIV Storage System architecture divides logical  volumes into 1 MB partitions  This granularity and the mapping strategy are integral elements  of the logical design that enable the system to realize the following features and benefits      gt  Partitions that make up a volume are distributed on all disks by using a pseudo random  distribution function  which is described in 2 2 2     Software parallelism    on page 23         
387. icatiion  Pat  mmm 1K  OLTP Applicatiion  Critical      150 7       ae E    5K  OLTP Applicatiion           5K  OLTP Applicatiion  Critical    aw T a        10K OLTP Application   w  10K  OLTP Applicatiion  Critical   50     50  0     0  Elapsed Time          Figure 6 7 QoS illustration response time  RT     Chapter 6  Performance 303    6 3 Performance monitoring    During normal operation  the XIV Storage System constantly gathers statistical information   The data can then be processed using the XIV Storage Management GUI  XIV Storage  System Command Line Interface  XCLI   or IBM Tivoli Storage Productivity Center for Disk   This section introduces the techniques for processing the statistics data     6 3 1 Using the XIV Storage Management GUI    304    The XIV Storage Management GUI provides a mechanism to gather statistics data  For a  description of setting up and using the XIV Storage Management GUI  see Chapter 4     IBM  XIV Storage Management software    on page 111  When working with the statistical  information  the XIV Storage System collects and maintains the performance data internally   As the performance data ages  it is consolidated to save space according to the following  rules      gt  Data is kept for 365 days    gt  Detailed host and volume data is kept for 30 days     By selecting specific filters  the requested data is mined and displayed  This section  describes the functions of the XVI Storage Management GUI and how to retrieve the required  data   
388. iderations      gt  After you activate the LDAP mode  it deactivates all previously defined XIV Storage  System users  Only the LDAP user with the appropriate group role has access to the  system  You will also be logged out from the XIV Storage Management GUI      gt  All local users and passwords will be reactivated again after you have disabled the  LDAP mode and return to the native mode  This situation means that the users are  deactivated and not deleted     18 Check the summary and click Finish  You might be asked if you are sure that you want to  enable LDAP now because it will log you off the system afterward  See Figure 5 61          LDAP Mode Modification x    Are you sure you want to modify LDAP  mode and logout from the current  system        Figure 5 61 Activation confirmation       19 Click OK     258 IBM XIV Storage System Architecture and Implementation    20 When you get a confirmation that LDAP was tested and configured  as shown in    Figure 5 62  click OK again to close the window        Wizard   LDAP Configuration    LDAP was tested and configured  successfully           Figure 5 62 End of LDAP configuration    5 8 2 Using the XIV Storage Management GUI directly to configure LDAP    Configuring LDAP in an XIV Storage System can also be done directly through the XIV  Storage Management GUI  rather than using the LDAP wizard  Complete the following steps     1     2     Hover the cursor over the Access icon and click Users  as shown in Figure 5 63         
389. ies in decimal TB of an XIV  Storage System Gens with 2 TB drives  The table shows that the capacity per CoD activation  varies depending on the exact configuration     For example  a machine with 10 physical modules has 102 6 TB of usable capacity  If the  client purchased seven activations  they can use 71 82 TB of that 102 6 TB  With each extra  activation  the client could use an extra 10 26 TB of usable capacity  If they purchase a total  of 10 activations without purchasing any extra physical modules  they exit the CoD program  and are able to use all of the 102 6 TB  If they instead purchase one more activation  for a  total of eight  and one more physical module  for a total of 11   they are able to use 81 091 TB  of 111 5 TB of usable capacity  Each extra activation now buys 10 136 TB     Chapter 3  IBM XIV architecture  components  and planning 67    68    Figure 3 3 shows an example of the valid capacities in TBs of an XIV Storage System Gen3  with 2 TB drives               81091    ner onssa  ne     129040  150547            161300  Figure 3 3 CoD capacities for an XIV Storage System Gen with 2 TB drives    Figure 3 4 shows an example of the valid capacities in TBs of an XIV Storage System Gen3  with 3 TB drives                  68933  Pst  a  a  om  194640  210860  227080             Figure 3 4 CoD capacities for an XIV Storage System Gen3 with 3 TB drives    IBM XIV Storage System Architecture and Implementation    Figure 3 5 shows an example of the valid capaci
390. if you want to do so  Otherwise   proceed with the entry creation     Step 5 Summary    Review your settings and click finish if they are correct     Entry DN  uid  xivtestuser2 dc xivauth  Object Class  User    inetQrg Person    Full Hame  cm   x vtestuserz   Last Name  sn   xiviestuser2   description  Storage Administrator   User ID  uid   xivtestuserz    Password  userPassword       hthhhtrrerererrer          Cancel       Figure B 8 Reviewing entry settings    If all the information was entered correctly  you get an Operation Completed Successfully  message in the window that opens  Figure B 9   If the operation failed for one reason or  another  you must go back and make necessary changes before resubmitting   your request     ey Operation Completed Successfully  The Entry was successfully created     Creating New Entry on xivhost2 storage tucson ibm com 389  Creating entry uid xivtestuser2  dc xivauth on Directory Server xivhost2 storage tucson ibm cam 389    Done   Operation Completed Successfully      Close window upon completion          Figure B 9 Entry creation confirmation    After the user account is created in Oracle Java Directory LDAP  its accessibility can be  verified by using any of the available LDAP clients  In our example  Example B 4 on  page 444   we use the Oracle Java Directory LDAP client     Appendix B  Additional LDAP information 443    Example  B 4 Oracle Java Directory account verification using Oracle Java Directory LDAP client       opt sun dse
391. ify what type of pool is wanted   Regular Pool or a Thin Pool  when creating the pool  See    Creating storage pools    on   page 144  When using the XCLI  you create a thinly provisioned pool by setting the soft size  to a value greater than its hard size     If the requirements for the pool change later on  the pool   s type can be changed   nondisruptively      Tip  Thin provisioning management is performed individually for each storage pool  and  running out of space in one pool does not affect other pools     4 4 2 Managing storage pools with the XIV Storage Management GUI    In this section  we describe how to manage storage pools using the XIV Storage  Management GUI     Important  Illustrations in this chapter mostly apply to an XIV Storage System fully  configured with 1 TB drives     Managing pools with the XIV Storage Management GUI is fairly simple and intuitive  The  related tasks can be reached either through the menu bar or the corresponding function icon  on the left  called Pools   as shown in Figure 4 40                                   Figure 4 40 Opening the Pools menu    To view overall information about the storage pools  click Storage Pools from the Pools menu  that is shown in Figure 4 40  This opens the Storage Pools view  as shown in Figure 4 41 on  page 143     142 IBM XIV Storage System Architecture and Implementation      Name   Usage   Snapshots  Ga    Lock Behavior             51 GB Used Volumes 3441 GB Hard   Ss Gene 4          i    Read Only 
392. ight clicking the  Start menu and then Open All Users  Click the Program folder and then the  Administrative Tools folder     8  Click File     New     Shortcut  Enter the location of the saved console    SYSTEMROOT  system32 localcert msc  in the    Type the location of the item    field  Then   click Next to continue     9  Enter the name of the new shortcut  Certificates  Local Computer   in the    Type a name for  this shortcut    field     10 To start the local certificate management tool  click Start     Administrative tools  gt   Certificates  Local Computer      Appendix B  Additional LDAP information 447    448       When the local certificate management tool starts  it appears as shown in Figure B 10  The  certificates used by Active Directory are in the Console Root     Certificates  Local  Computer      Personal     Certificates folder  The list of trusted root certificates authorities  is in the Console Root     Certificates  Local Computer      Trusted Certification  Authorities     Certificates folder     Va localcert    Console Root  Certificates  Local Computer   Trusted Root Certification Authorities    Certific    Mel Ea  E Fil   Action View Favorites Window Help    L Console Root    B E Certificates  Local Computer  464 ECOM Root CA ABA ECOM Root CA  Autoridad Certificadora de la Asoc    Autoridad Certificadora de la Asoc  E Autoridad Certificadora del Colegi    Autoridad Certificadora del Colegi  2 SARS EES     Baltimore Ez by DST Baltimore EZ by DST  H  
393. igure 3 29 iSCSI parameters    12    These values are correct at the time of publication of the Ninth Edition of this book for  version 11 5 of the XIV Storage System Software     96 IBM XIV Storage System Architecture and Implementation    Host multipathing    There are two main multipathing techniques  For both multipathing configurations  each host  engages the I O services of every XIV Storage System interface module     Experience has shown that the first multipathing configuration in Figure 3 30 is the best  overall general purpose configuration  Host multipathing reliability during path error recovery    in some operating systems is complicated by increasing numbers of paths per logical unit  number  LUN   Certainly  for host systems with two HBAs  using the six paths per LUN is a    preferred practice     Tip  Six paths per LUN is the preferred multipathing configuration     There is no performance or reliability benefit in using too many paths  Going beyond 12 paths  per volume has no benefit  because most operating systems have more processing overhead    handling the paths and cause longer times for recovery  Going beyond six paths rarely has  much benefit  Use four or six paths per volume as a standard  Do not go below four paths     Figure 3 30 shows six paths per LUN as the best multipathing configuration     Petich Pand    Q    OW  ey   OD  A GW o    8      8    QR BRB    IBM XIV Storage System  Pa WO    a  s       e    aa  a  an  Se       e  Sen   a       a   
394. igure 6 15 Example of a host filter    On the left side of the chart in the blue bar  there are various tools to assist you in managing  the data     Chapter 6  Performance 309    310    Figure 6 16 shows the chart toolbar in more detail        Figure 6 16 Chart toolbar    The top two tools  magnifying glasses  zoom in and out for the chart  and the second set of  two tools adjusts the X axis and the Y axis for the chart  Finally  the bottom two tools allow you  to export the data to a comma separated file or print the chart to a printer     On the right end of the filter pane is a time duration selector  These selections are helpful to  quickly navigate to different times  In Figure 6 17  if    Hour    is selected  the time scale is reset  to the last hour from the current time  Similarly  Day  Week  Month  and Year can be selected  to easily see the performance statistics for these different time durations  Also  notice the  refresh button to the right  which updates the graph with the latest information        Figure 6 17 Time duration selector    Also  you can select Custom and a window opens where you can specify a certain date and  time  Figure 6 18   After you specify the date and time  you can select the white box at the  bottom of the window and a one hour view of performance data ending at the selected date  and time is displayed  To change the view from this specific date and time  you must use the  chart toolbars in the upper left corner of the Statistics view    
395. impending     Dedicated spare disks in conventional RAID arrays are inactive  and therefore  unproven  and potentially unmonitored  increasing the possibility for a second failure during an array  rebuild     Important  If an XIV Gen3 storage system is equipped with flash cache  the flash  cache does not participate in the rebuild process because flash cache is only used as  extended read cache  Therefore  the most recent written data must be taken from the  disk drives     For the same reason  a flash cache device failure does not initiate a rebuild or  redistribution process     For details  see 2 8     Flash caching architecture    on page 43  or consult the Redpaper  publication  Solid State Drive Caching Implementation in the IBM XIV Storage System   REDP 4842     Redistributing after a failure   The redistribution phase starts at the same time as the rebuilding phase after an XIV Storage  System disk or module failure  However  the XIV Storage System GUI begins to report only  on redistribution progress after the rebuilding phase is complete and the system has been  restored to full redundancy     In the redistributing phase  the XIV Storage System data partitions  both primary and  secondary copies  continue to be rearranged into the new optimized pseudo random target  distribution  Redistribution is a low priority self tuning process  Notice the status bar in the  lower right corner of the XIV Storage Management GUI in Figure 2 14  which shows the  progress of the red
396. imported  click Close     Chapter 7  Monitoring 415    Select nt Packs s  Select Management Packs   Help    import iat  sh Add   Properties    X Remove    Name Version Release Date Status EULA     J IBM Storage  xI      Status details      This management pack is ready to import            Install     Cancel                Figure 7 95 Install the Management Packs    You have now imported the Management Packs into SCOM     5  The installation of the Storage Management Pack creates an icon on the desktop entitled  IBM Storage SCOM control Utility Command Prompt     Doubling clicking this icon opens a Windows command prompt in the correct directory to  use the IBM provided scomu command  You now need to use the scomu command from  within this command prompt to add the management server  Use the following syntax for  this command     scomu   sc set   servername localhost    Tip  Pay close attention to the syntax  You must use the double dash where required or  the command fails  So  for example    servername works  but  servername does not     An example of the syntax you use and the expected responses is shown in Example 7 55  on page 416  In this example  the management server is the machine running the SCOM  platform and not another server running the SCOM agent     Example 7 55 Adding the management server    scomu cmd   sc set   servername localhost   Checking the connection to the management server     The connection to the management server is OK   The connection to the ma
397. in yellow if it is phased out    gt  SSD is highlighted in red if it failed       Tools   Help      ith     amp    T   Settings E Launch XCLI p Launch XIVTop  iew By My Groups   gt   gt  System s iaa       SSD  1  Status  OK       NN  DO    Module  5    Status     Figure 4 116 SSD status    Tip  Flash cache can be dynamically enabled and disabled at any time     200 IBM XIV Storage System Architecture and Implementation       Setting flash cache at the system level  By default  flash cache is enabled for all volumes defined in the XIV system     To enable or disable flash cache for the entire XIV system  select Settings from the toolbar in  the main System view  as indicated in Figure 4 117     File   View   Tools   Help    69 Launch xcLi f Launch xivTop    XIV 13170039 C          Figure 4 117 Opening system settings    The system Settings panel is displayed  Select the Parameters tab  The Global SSD  Flash   Caching default can be set to Enabled or Disabled  as shown in Figure 4 118     XIV 1310039 Coruscant Settings    General  iSCSI Name igqn 2005 10 com xivstorage 010039    Farameters Time Zone US Arizona  NTP Server 9 11 107 12  SNMP  DNS Primary 2002 90b e0f2 208 202 55fffe5d dbcc  Misc DNS Secondary    Yes    Global SSD Caching   Enabled  Enabled    re        Figure 4 118 System settings for Global SSD Caching       By default  a newly created volume follows the System Level Settings     System Level Settings      gt  If flash cache is disabled from System Level Settin
398. ing  ARE YOU SURE YOU WANT TO SHUT DOWN y n   Command executed successfully    The shutdown takes less than 5 minutes  When it is finished  all fans and front lights on  modules and all UPS lights are off     108 IBM XIV Storage System Architecture and Implementation    Emergency power off   The XIV Storage System Machine Types 2810 and 2812 do not have an emergency power  off  EPO  switch  but you can connect the XIV Storage System to a room emergency power  off  EPO      EPO precaution  Powering off the XIV Storage System using a room EPO switch results  in data loss and possible loss of configuration  An IBM SSR is required to recover an   XIV Storage System that was turned off using a room EPO switch  If the XIV Storage  System loses ac power but is not powered off using an EPO circuit  data and configuration  are preserved     Local laws  National or local building  electrical  fire prevention  safety  and other laws or  regulations can address or control the manner in which information technology equipment  is installed within certain facilities and environments  The application of those laws or  regulations can depend on considerations of factors beyond the nature or design of the  equipment to be installed  It is a client   s responsibility to interpret and identify any laws or  regulations applicable to the installation of information technology in its environment and to  inform IBM  IBM Business Partners  or their designated installers of any actions not  identified
399. ing of 1   63 characters that can contain only a   z A   Z 0   9    _      and space symbols  User names are case sensitive  The XIV Storage System is configured  with a set of predefined user accounts  Predefined user names and corresponding default  passwords exist to provide initial access to the XIV Storage System at the time of installation   for system maintenance  and for integration with applications such as the IBM Tivoli Storage  Productivity Center     The following user accounts are predefined on the XIV Storage System      gt  Technician    This account is used by the IBM Service Support Representative  SSR  to install the XIV  Storage System      gt  Admin    This account provides the highest level of client access to the system  It can be used for  creating new users and changing passwords for existing users in native authentication  mode     Important  Use of the admin account should be limited to the initial configuration when  no other user accounts are available  Access to the admin account needs to be  restricted and securely protected      gt  xiv_development and xiv_maintenance user    These IDs are special case predefined internal IDs that can only be accessed by qualified  IBM development personnel and SSRs     Predefined user accounts cannot be deleted from the system and are always authenticated  natively by the XIV Storage System even if the system operates under Lightweight Directory  Access Protocol  LDAP  authentication mode     User accounts can
400. ing the available and total hard space using Tivoli Storage  Productivity Center    A common task is to analyze how much space is available for configuration  Focusing on hard  space  there are three useful measures shown in Figure 7 78      gt  Unformatted Disk Space shows how much hard space is available to create new pools      gt  If you are planning to convert your pools to thin provisioning pools  you can use  Remaining Configured Capacity to determine how much hard space remains in the  existing pools      gt  To determine total hard space in your XIV Storage System  you can sum together  Unformatted Disk Space and Configured Capacity Limit     Because these two values are in binary TB  TiB   the resulting value does not match the  decimal GB value shown for hard space in the XIV Storage Management GUI  A simple  conversion is to multiply the TiB value shown in Tivoli Storage Productivity Center by  1 0995 to generate a decimal TB value close to the one shown in the XIV Storage  Management GUI  variations occur because Tivoli Storage Productivity Center rounds the  values down      Table 7 3 shows the usable hard space in binary TiB that is reported by Tivoli Storage  Productivity Center  The value varies based on the model of XIV Storage System  the size of  the drives being used  and the number of modules that are physically installed  Variation by  0 01 TB might occur due to rounding     Table 7 3 XIV total hard space in binary TiB as reported by Tivoli Storage Prod
401. installed in the XIV rack  The cabling has been  removed from the top InfiniBand switch to show a better view of the switch itself     Fe ee ee Be a            eee      a      rE S r a a  ek  ee a  a E             Figure 3 25 Model 114 dual 36 port InfiniBand switches    Each InfiniBand switch contains 36 ports that have 40 Gbps full bidirectional bandwidth per  port  Port to port latency is less than 100 nanoseconds  Each switch has 2 88 Tops switching  throughput  The switches are powered by redundant power supplies and fan modules to  eliminate any single point of failure  Additionally  each switch has several RJ 45 management  ports that are used by the XIV Storage System  InfiniBand is also scalable  well beyond the  current 15 modules in a single XIV Storage System rack     Chapter 3  IBM XIV architecture  components  and planning 91    3 1 12 Patch panel    92       The patch panel is at the rear of the rack  The Fibre Channel ports on the interface modules  are connected to the patch panel using 50 micron cables  All external connections must be  made through the patch panel  In addition to the host connections and to the network  connections  more ports are available on the patch panel for service connections  Figure 3 26  shows the details for the patch panel and the ports     The patch panel has had various redesigns of the labeling based on the production date        ban   Fibre Chanel connections    Lal  iS   SI1 connections       Naintennce Console     _    conn
402. inue     strChar   Stringl charAt 0      if  strValidChars indexOf strChar      1  continue   if  Stringl  gt   Threshold  Exceeded   1     Chapter 7  Monitoring 411    In Example 7 54  we see again how to generate a custom event when our wanted threshold is  exceeded   Example 7 54 Using XCLI to generate a custom event    if  Exceeded        Command    custom event description  Medium Latency exceeded threshold of      Threshold     during 24 hour period ending     EndDate      severity      Severity     After running this script  you can see the custom event in the XIV Storage System event log   as shown in Figure 7 92     After running this script  a custom event is generated if the write hit medium latency threshold  is exceeded  You can see the custom event in the XIV Storage System event log  as shown in  Figure 7 92  An event notification rule can be defined based on severity or the  CUSTOM_EVENT event code to send an email or SNMP message  as described in 7 2      Monitoring using the IBM XIV Mobile Dashboard    on page 351     Event Properties x    Severity  Warning   Date  2010 10 19 16 14 47   Index  450560   Event Code  CUSTOM_EVENT   T  Shooting    Description  Medium Latency exceeded threshold of 3000    during 24 hour period ending  2010 10 18 00 00 00       Figure 7 92 A custom event generated by WSH script by using XCLI    7 8 3 Summary    These simple examples are just a small subset of what can be accomplished by combining  the power of XCLI commands with t
403. ion  run as many of them in parallel as makes sense     Host bus adapter and disk queue depth    Queue depth is another example of how the XIV Storage System architecture performs best  with real world client production workloads     Queue depth is an important host HBA setting because it essentially controls how much data  is allowed to be    in flight    onto the SAN from the host HBA  A queue depth of one requires  that each I O request is completed before another is started  A queue depth greater than one  indicates that multiple host I O requests can be waiting for responses from the storage  system  So  the higher the queue depth  the more parallel I O goes to the XIV Storage  System     The disk queue depth is an important OS setting as well that controls how much data is  allowed to be    in flight    for a certain XIV Storage System volume to the HBA  The disk queue  depth depends on the number of XIV Storage System volumes attached to this host from one  XIV Storage System and the HBA queue depth  For example  if you have a host with just one  XIV Storage System volume attached and two HBAs with an HBA queue depth of 64  you  must configure a disk queue depth of 128 for this XIV Storage System volume to be able to  fully use the queue of the HBAs     The XIV Storage System architecture eliminates the common storage concept of a large  central cache  Instead  each component  module  in the XIV Storage System grid has its own  dedicated cache  The XIV Storage System a
404. ion by using the commands shown in Example 4 13  Fora  cluster  the volumes are mapped to the cluster host definition  There is no difference for  FC or iSCSI mapping to a host    Example 4 13 XCLI example  Map volumes to hosts    gt  gt  map_vol host ITSO Win2008 vol myvol_ 14 lun 1    Command executed successfully      gt  gt  map_vol host ITSO Win2008 vol myvol_ 15 lun 2  Command executed successfully      gt  gt  map_vol host ITSO Win2008 iscsi vol myvol_10 lun 1  Command executed successfully     To complete the example  start the server and check the host connectivity status from the  XIV Storage System point of view  Example 4 14 shows the output for both hosts     Example 4 14 XCLI example  Check host connectivity   gt  gt  host_connectivity_ list host ITSO Win2008    Host Host Port Module Local FC port Local iSCSI port Type  ITSO Win2008 10000000C9831FA2 1 Module 9 1 FC Port 9 2 FC  ITSO Win2008 10000000C9831FA3 1 Module 5 1 FC Port 5 2 FC   gt  gt  host_connectivity_list host ITSO Win2008 iscsi   Host Host Port    Module Local FC port Type  ITSO Win2008 iscsi iqn 1991 05 com microsoft win gj5e8kr49ee itso storage ibm com  1 Module 6 SCSI    Chapter 4  IBM XIV Storage Management software 169    ITSO Win2008 iscsi iqn 1991 05 com microsoft win gj5e8kr49ee itso storage ibm com  1 Module 5 iSCSI    In Example 4 14  there are two paths per host FC HBA and two paths for the single  Ethernet port that was configured     See X V Storage System  Host Attachment and Interoper
405. ional performance capacity to take on more  applications  Later in    Performance analysis    on page 321  we describe how you determine  whether the XIV Storage System has adequate performance capacity to handle more  workload     Each XIV Storage System module is carefully designed and has the appropriate processing  mechanisms to handle the I O workload of the 12 disk drives  There are several aspects to  this module I O architecture     A cache communicates to each of two serial attached SCSI  SAS  disk controllers over  multiple lanes of the module PCI Express  PCle  bus  The SAS controllers themselves have  the appropriate number of processing capabilities to handle the I O requirements of the disk  drives that they control  These controllers  in turn  communicate to the disk drives over  multiple lanes of the PCle bus  All of this communication is handled by the correctly sized  processor  The cache is also correctly sized so that it can handle the total amount of I O that  each module can sustain at peak performance  Furthermore  the XIV Gen3 with the XIV  System software Version 11 1 0 or later  also offers the option of an extended SSD cache   The SSD cache can boost performance to up to three times for typical online transaction  processing  OLTP  workloads  with no additional configuration or tuning needed     Note  SSD performance has been further enhanced in Version 11 2 of the XIV Storage  System Software through optimization of SSD data integrity checking     
406. ions   View l Tools   Help ih    i  z  Export     AlSystems  13    AllSystems Alens   Q Alerts  5   Description  A  lt 1 Hour xIV_PFE_035_ 7604143 Fan 6  Module 15  status is Failed Warning  ib  lt 1 Hour XIV_01_ 6000705 Pool AW_VMVWARE FCM snapshotreseredi    Warning  A   lt 1 Hour AlV_07_ 6000705 Pool AW _VWINDOWS snapshot reserved is 33    Warning   X   lt   1 Hour KIW _01_6000105 Pool   Test snapshot reserved is 66  full Minor  i  lt 1 Hour xIV_041_6000705 Pool ymesx_35 test_backup XAIV_labdis 79     Minor          Figure 7 3 All Alerts window of the All Systems menu    All Systems Events window   If you select the All Systems Events view  a combined event log is displayed and shows all  events for all systems that are defined to the GUI  In Figure 7 4  you can see events from  three different systems in a combined view  This view can be sorted and filtered to reduce the  number of events or change the order in which they are displayed              A Al Systems         AllSystems Events    1 Events  10 000   After   System Time  Er Min Severity  None bd  Before   System Time  Ha    Event Code  All      Date  Local Time  System Event Code ser  a 1a 3 13 PM KIW _02_1310114 ADMINISTRATOR_PROCES5_FAILURE Admin  iy 10 18 42 3 13 PM XIV_02_ 1310114 ADMINISTRATOR_PROCESS FAILURE Admir   amp  101812 2 55 PM KIW 02 1310114 ADMINISTRATOR_PROCESS FAILURE Admin  A 10 22 42 1 39 PM xIV_01_6000705 ADMINISTRATOR_PROCESS FAILURE Admin  A 1022 12 1 58 PMI IW _01_6000105 ADMINISTRATOR PROC
407. ions  SG24 7759     Write path redundancy    Data arriving from the hosts is temporarily placed in two separate caches before the   XIV Storage System acknowledges that the write is received and begins to write the data to  the disk drives in separate modules  This design guarantees that the data is always protected  against possible failure of individual modules  even before the data is written to the disk  drives     IBM XIV Storage System Architecture and Implementation    Figure 2 11 illustrates the path that is taken by a write request as it travels through the  system     Hosts  A A 4          7    y    7 X Fi     FE ISCSI Network 1   F      aN     eae  Interface   3   a  ae i   A   No    Hosts issue write lOs to the subsystem t         via the FC and or iSCSI ports on the    Interface Modules oN    Multi path is managed on the host side       Os flow between modules over    the redundant switched    ethernet fabric      Datais written to two Data  Modules bef ts receive  lO complete ack    Figure 2 11 Write path           Note  The diagram is intended to be viewed as a conceptual topology  Therefore  do not   interpret the specific numbers of connections and so on as literal depictions  Also  for our  purposes  the interface modules are depicted on a separate level from the data modules   However  in reality  the interface modules also function as data modules     The following numbers correspond to the numbers in Figure 2 11     1  A host sends a write request to the 
408. ior  or no I O at all  In either case  your applications stop  in a way that is not predictable     Important  Volume locking prevents writes to all volumes in the storage pool     The thin provisioning implementation in the XIV Storage System manages space allocation  within each storage pool so that hard capacity depletion in one storage pool never affects the  hard capacity available to another storage pool  There are both advantages and  disadvantages      gt  Because storage pools are independent  thin provisioning volume locking on one storage  pool never cascades into another storage pool      gt  Hard capacity cannot be reused across storage pools  even if a certain storage pool has  free hard capacity available  This limitation can lead to a situation where volumes are  locked because of the depletion of hard capacity in one storage pool while there is  available capacity in another storage pool  It is still possible for the storage administrator to  intervene to redistribute hard capacity     2 8 Flash caching architecture    Starting with the XIV System software Version 11 1 0  the XIV Storage System Gen3  supports an optional flash caching feature that significantly improves performance for small  block  random read I O workloads     2 8 1 Flash caching overview    XIV flash caching is implemented as an extension of the primary cache layer  Flash cache is  used exclusively as a read cache  Each module supports 400 GB cache  which allows the  caching layer to be ex
409. iple LUNs to allocate or create multiple threads to  handle the I O  then use multiple LUNs  However  most modern enterprise applications are  sophisticated enough to define multiple I O threads independent of the number of LUNs  or  the number of LUNs has no effect on application threads  In this case  there is no compelling  reason to have multiple LUNs     Chapter 6  Performance 295    Multiple LUNs might be needed to use queues on the host HBAs or I O buffers on the host  operating system     Another important consideration for the number of LUNs in an XIV environment has to do with  parallelism of I Os across the XIV interface modules  Using the multipathing design illustrated  in Figure 6 3 as an example  consider one application server with one LUN      gt  Each host is equipped with dual HBAs  Each HBA  or HBA port  is connected to one of  two FC switches      gt  Each of the FC switches has a connection to three separate interface modules      gt  Each LUN has six paths        Patch Peng    Host 1       g   1     gt    N        re  Hoga   Q   N     gt    x lt        aa  Host 3  Host 4  Hostn       Figure 6 3 Six paths per LUN is the best overall multipathing configuration    This application server uses six paths in a round robin fashion to perform I O to this LUN   Each XIV Storage System interface module is used  one at a time  to handle this I O  The net  effect is a good balance between the interface modules  But in this example  the interface  modules are being 
410. ir locations are hidden from the user   which dramatically simplifies storage configuration and lets the system lay out the users  volume in the optimal way  The automatic layout maximizes the system   s performance by  using system resources for each volume  regardless of the user   s access patterns  With the  XIV Storage System design  you no longer must decide which type of data protection to use  for storing data or how many drives you need to dedicate for a specific application  Allocate  the needed storage space and the system does the rest  This feature allows the user to  respond to growing storage needs in minutes instead of hours or days  as with traditional  storage systems     Chapter 1  IBM XIV Gen3 Storage System overview 7    1 5 6 Flash caching  optional     For ultra high performance needs  XIV Gens optionally offers up to 12 TB of  management free flash caching  which is available to all system data and can be installed  nondisruptively  Operating with advanced flash algorithms  the latest XIV Gen3 components  help meet requirements for extremely high performance workloads  The latest Gen3 model  can provide over its predecessors  up to 4 5 times better performance for random  database type workloads and up to 13 7 GBps sequential read throughput     1 5 7 Thin provisioning    The system supports thin provisioning at the storage pool level  which is the capability to  allocate additional storage space to applications on a just in time and as needed basis   
411. irm the status of the InfiniBand  switches  If you hover your cursor over a switch  as shown in Figure 7 19  a window opens  and shows the status of that switch     IB Switch  2    PS1 Power  OK  PS  Power  OK    Status  OK    Ports  OK       Figure 7 19 Monitoring UPS InfiniBand switches    336 IBM XIV Storage System Architecture and Implementation    Monitoring the Maintenance module    The XIV Storage Management GUI can be used to confirm the status of the Maintenance  module  If you hover your cursor over a switch  as shown in Figure 7 20  a window opens and  shows the status of that module     Maintenance Module    Status  OK                Figure 7 20 Monitoring the Maintenance module    Monitoring each module and disk status and temperature    The XIV Storage Management GUI can be used to monitor the status of each XIV Storage  System module and each XIV Storage System disk  You can hover the cursor over a module  in the location shown in Figure 7 21  The cursor changes to a magnifying glass icon  By  hovering the cursor over this location  you can confirm the health of each module component  and the module   s temperature           Module  7    93 0_ interface   Temperature  69  F  Status  OK    Data Service  OK  Interface Service  OK  Remote Semice  OK    PSUs  OK  Fans  OK  SSD  OK                   Figure 7 21 Module status    Chapter 7  Monitoring 337    If you left click the module  the module is removed from the rack and the status of the module  components can 
412. ise Linux  Version 6 0 or later  for x86 and x86 64 systems  Red Hat Enterprise Linux  Version 5 1 or later  for x86 and x86 64 systems  Red Hat Enterprise Linux  Version 4 6 or later  for x86 and x86 64 systems  SUSE Linux Enterprise Server 11 or later  for x86 and x86 64 systems    vY vyv y    Important  Review the latest release notes for updates     The host running the agent must have TCP 443 outbound access to XRSC addresses   information supplied by IBM Support  and listens for inbound connections from the  IBM XIV systems     Figure 7 60 shows the necessary ports        HTTPS  443    55H over 55L           Customer Network IBM Network       Figure 7 60 XIV Remote Support Proxy agent ports    380 IBM XIV Storage System Architecture and Implementation    For more information about the XIV Remote Support Proxy  see the IBM XIV Storage System  documentation in the IBM Knowledge Center     http   ibm co 10s4Bzx    7 5 4 Installation    The installation files and documentation are at the storage portal website for XIV   http   ibm co 1x1twlV    On this website  expand the list by clicking the More Results link     After you download the correct package to the Linux host  you can run the file as root and it  starts the installation wizard     Example 7 36 shows the installation of the proxy agent     Example 7 36 Remote Support Proxy agent installation        xivproxy installer rpm 1 3 1 b612 sles11 x86 64 bin  Starting installer  please wait     International License Agreem
413. istrator access rights  storageadmin role   If this is the first time that you are accessing  the system  use the predefined user admin  default password adminadmin      Follow these steps     1  Open the XIV Storage Management GUI and log on as shown in Figure 5 22     storage Management    User    admin      Password    eeeececece    Mode    Direct       Login         Figure 5 22 XIV Storage Management GUI login    2  Users are defined per system  If you manage multiple systems and they have been added  to the XIV Storage Management GUI  select the system that you want to work with     Chapter 5  Security 225    3  In the main Storage Manager GUI window  hover the cursor over the padlock icon to  display the Access menu  All user access operations can be performed from the Access  menu  see Figure 5 23   In the Version 3 XIV Storage Management GUI  only the Users  menu option shows  Click Users  as shown in Figure 5 23         Access                   Figure 5 23 XIV Storage Management GUI Access menu    4  By default  the Ungrouped group is displayed  and is shown in a collapsed state  Click the  plus symbol     to expand its state     If the storage system is being accessed for the first time  the window shows the predefined  users only  as shown in Figure 5 24  The default columns are Name  Category  Phone   Email  and Group              c Name Category         Ungrouped  4 admin Storage Administrator   amp  technician Technician  a xiv_development XIV Development   amp 
414. istributing process  The percentage complete is in bright green and the  percentage that is yet to be complete is in light green     Chapter 2  IBM XIV Storage System logical architecture and concepts 55    xv XIV Storage Management       File   View   Tools  Help            Settings JJ Launch xci f Launch xivTop    EMAED   System       Figure 2 14 Redistribution status in the XIV Storage System GUI       15    Important  Redistribution is a low priority self tuning process  during which the XIV  Storage System is fully redundant     Effects of a flash cache failure   If a flash cache device starts to fail or fails completely  it is phased out like any of the other XIV  grid components  There is no data loss because the flash cache is not involved in any phase  of the process of storing data or maintaining data redundancy  The flash caching algorithms  populate the extended flash cache with copies of primary data partitions  If a flash cache  device fails  no data is lost     The flash cache degraded module continues to serve reads from its DRAM cache and large  sequential reads from disk  All small read misses are redirected to the secondary partition  copies  which are on modules with functioning flash cache  This behavior evenly distributes  the extended flash caching duties of the module with the failed flash device to all other  modules  therefore balancing the use of the remaining extended flash cache across all  modules     There is no rebuild or redistribution of data
415. ith a CLI or a GUI shell  The Back Server is in charge of  authenticating a support person  It provides the support person with a user interface  Ul   through which to choose a system to support based on the support person s permissions   It also provides the list of systems currently connected to the Front Servers and manages  the remote support session as it progresses  logging it  allowing additional support  persons to join the session  and so on   The Back Server maintains connection to all Front  Servers  Support people connect to the Back Server using any SSH client or an HTTPS  connection with any browser     Figure 7 55 provides a representation of the data flow of the XIV Storage System to  IBM Support                                      Customer Network IBM Network          Figure 7 55 XRSC    To initiate the remote connection process  the following steps are performed     1     oo 27    e    The client initiates an Internet based SSH connection to XRSC either through the  XIV Storage Management GUI or XCLI     XRSC identifies the XIV Storage System and marks it as    connected       Support personnel connect to XRSC using SSH over the IBM intranet    XRSC authenticates the support person against the IBM intranet    XRSC then shows the connected client system available to the support personnel     The IBM Support person then chooses which system to support and to which system to  connect         Only permitted IBM XIV systems are shown         IBM Support personne
416. itivity  The LDAP server does not use case sensitive string matching for the  memberOf attribute value  For example  XIVAdmins  xivadmins  or XIVADMINS are recognized  as equal strings  To simplify XIV Storage System administration  however  treat both the  XIV Storage System configuration parameter and LDAP attribute value as though they  were case sensitive and assign the XIVAdmins value to both     The XIVAdmins and XIVReadonly names are used because both strings can be easily  associated with their corresponding XIV Storage System roles  storageadmin and readonly  It  is not necessary to use the same names in your XIV Storage System configuration     However  if you were to change these parameters  consider using names that are  self descriptive and easy to remember  to simplify the LDAP server administration tasks   Every time the LDAP server administrator creates a new XIV System Storage account  one of  the names must be entered as a description attribute value  except for the applicationadmin  role  as we explain in    LDAP role mapping for the applicationadmin role    on page 250   After  being configured in both XIV and LDAP  changing these parameters  although possible  can  potentially be time consuming because each existing LDAP account must be changed  individually to reflect the new attribute value     The configuration tasks can also be done from the XIV Storage Management GUI  On the  main XIV Storage Management window  click Systems     System Settings  sele
417. ity  IPSec  connectivity  Native user authentication   Considerations when using MultiSystem Manager  LDAP based authentication   Defining LDAP on the XIV Storage System  LDAP managed user authentication   Securing LDAP communication with Secure Sockets Layer    Vvvvvvrvrvyvvyvyiyv    Important  An important aspect of XIV security is the support for data at rest encryption   which was introduced with XIV Storage Software Version 11 4  The encryption topic is  covered in the IBM Redpaper publication titled   BM XIV Security with Data at Rest  Encryption  REDP 5047        Copyright IBM Corp  2014  All rights reserved  207    5 1 Physical access security    When installing an XIV Storage System  you need to apply the same security good practices  that you apply to any other business critical IT system  A good reference on storage security  can be found at the Storage Networking Industry Association  SNIA  website     http   www snia org forums ssif programs best_ practices    A common risk with storage systems is the retention of volatile caches  The XIV Storage  System is perfectly safe in regard to external operations and a loss of external power  If there  is a power failure  the internal uninterruptible power supply  UPS  units provide power to the  system  The UPS enables the XIV Storage System to gracefully shut down     However  if someone gains physical access to the equipment  that person might manually  shut off components by bypassing the preferred process  In this ca
418. ity tab  select the XIV system on which you want to create the domain   specify the Domain Hard and Soft Sizes  and enter a unique Domain Name     4  Then  click the Properties tab to specify the additional properties of the domain  as shown  in Figure 4 81  Note  the GUI automatically displays the available and suggested numbers  for the numerical properties        Create Domain  Capacity    Froperties    Max  Fools  ji u J   Available  195 Suggested  2  Max  Volumes     133   Available  11035 Suggested  133  Max  Consistency Group    E   Available  468 suggested  5  Max  Mirrors     16   Available  1407 Suggested  16  Max  Data Migrations      160   Available  13298 Suggested  760  Allow SSD Caching  ba    Allow S50 enabled volumes     LDAF Domain ID  ITSO_Domain  User access right definition in LOAP     r a   p          Figure 4 81 The Properties tab of the Create Domain screen in the XIV GUI    Chapter 4  IBM XIV Storage Management software 179    These properties are required     Max  Pools The maximum number of pools that can be associated with  this domain  Max  Volumes The maximum number of volumes that can be contained    within this domain    Max  Consistency Groups The maximum number of consistency groups that can be  defined within this domain    Max  Mirrors The maximum number of remote mirrors that can be  defined within this domain    Max  Data Migrations The maximum number of data migrations that can be  defined within this domain    Allow SSD Caching True or 
419. kanaga Associations l    View Associated Pools Hosts  View Associated Hosts and Clusters Clusters    View Associated Users and User Groups Targets    Users  Limit Traffic by Perf Class    Limit Traffic by new Perf Class    User Groups    Properties       Figure 4 89 Accessing the Manage Domain   s Associations screen Pools tab in the XIV GUI    184 IBM XIV Storage System Architecture and Implementation    In the Manage Domain   s Associations screen that appears  Figure 4 90   select the pools and  use the arrows to associate or remove the pools from the domain  Click Update to apply the  changes     Manage Domain s Associations  ITSO domain     Users    Pools to Associate Associated Pools          ITSO _pool 1                  ae      User Groups Advanced WS_Team1_ IBM     Advanced WS_Team2_ IBM     Hosts Advanced_WS_Team3_IBM     Advanced WS_Team4 IBM     Advanced WS_Team5_IBM        Advanced WS_Team6_IBM     Basic WS _ Team1 Pool  Targets Basic WS Team  Pool  Basic WS_Team3 Pool  Pools   Basic WS_Team4 Pool  Basic WS_Team5 Pool   Basic_WS_Team6_Pool   cb_ pool  dd  DD_poolt    Clusters          C cm    Figure 4 90 Managing domain pool associations in the XIV GUI       Important      gt  Associating a pool with a domain might automatically trigger the adjustment of the  domain size to accommodate the size of the pool      gt  Associating a pool that has pre existing resource associations  hosts  clusters or  targets  with a domain automatically associates those resources wi
420. l log their intended activity     7  A fully recorded support session commences     8  When complete  the support person terminates the session and the XRSC disconnects    the XIV Storage System from the remote support system     Client use scenario    After a client has decided that remote support is needed  possibly because of a telephone  request from a remote support professional  communication between the XRSC and the  client site must be established  This process is always initiated by the client and always  remains under the client   s control  It proceeds as follows      gt     The client tells the XIV Storage System to connect to the XRSC using a specific XCLI  command  Until this command is issued  an XIV Storage System will not connect to the  XRSC for any reason     Chapter 7  Monitoring 375    376     gt  The client can set a regular timeout and an    idle timeout    for the connection  using an  optional parameter in the connection command  A timeout causes the connection to be  dropped after a specified length of time whether a support session is in progress or not   whereas an idle timeout causes the connection to be dropped after a certain period of  inactivity  Specifying the keyword    never    for these two parameters allows the connection  to remain established indefinitely      gt  The client can also choose to set a unique password for a session when it is initiated  This  password must be provided to the IBM Support representative for them to complete 
421. l unit numbers  LUNs   and attaching the XIV Storage System to the host  are storage administrator responsibilities  See Chapter 4     IBM XIV Storage Management  software    on page 111 for more information     Physical installation   It is the responsibility of the client or moving contractor to unpack and move the XIV Storage  System as close as possible to its final destination before an IBM SSR can start the physical  installation  Carefully check and inspect the delivered crate and hardware for any visible  damage  If there is no visible damage and the tilt and shock indicators show no problem  sign  for the delivery     Before starting the physical installation  ensure that an electrician is available who can fulfill  the power requirements for connecting the XIV Storage System     The physical installation steps are as follows   1  Place and adjust the rack in its final position in the data center     2  Check the XIV Storage System hardware  When the machine is delivered with the weight  reduction feature  FC 0200   the IBM SSR installs the removed modules and components  into the rack     3  Connect the XIV Storage System power cords to the client provided power source and  advise an electrician to switch on the power connections     4  Perform the initial power on of the machine and perform necessary checks according to  the particular power on procedure     5  To complete the physical steps of the installation  the IBM SSR performs various final  checks of the har
422. l volumes and snapshots   Storage pools can also be uniquely associated with a domain     A logical volume is defined within the context of only one storage pool  Because storage  pools are logical constructs  a volume and any snapshots associated with it can be moved to  any other storage pool  within the same domain  if there is sufficient space within the target  storage pool     As a benefit of the system virtualization  there are no limitations on the associations between  logical volumes and storage pools  In fact  manipulation of storage pools consists exclusively  of metadata transactions and does not trigger any copying of data  Therefore  changes are  completed instantly and without any system performance degradation     2 6 2 Consistency groups    A consistency group is a group of volumes of which a snapshot can be made at the same  point in time  therefore ensuring a consistent image of all volumes within the group at that  time  The concept of a consistency group is common among storage subsystems in which it  is necessary to perform concurrent operations collectively across a set of volumes so that the  result of the operation preserves the consistency among volumes  For example  effective  storage management activities for applications that span multiple volumes  or creating  point in time backups  is not possible without first employing consistency groups     This consistency between the volumes in the group is paramount to maintaining data integrity  from the
423. ldap_role parameter must be unique across all defined user groups   Only users assigned to the storageadmin role can create  modify  and delete user groups     Y VvV Yy 7y    Only users assigned to the storageadmin role can modify the 1dap_role parameter of a  user group     Important  A user group membership can be defined only for users assigned to the  applicationadmin role     Chapter 5  Security 267    Figure 5 72 shows the relationship between LDAP user  LDAP role  XIV Storage System role   user group membership  associated host  mapped volumes  and attached snapshots     XIV System LDAP Server          LDAP configuration  Idap_ config_ set  User definition          xiv_ group_ attrib  MemberOf  MemberOf   cn app071_aadmins       attribute name     attribute value                    User group definition  Name  app01_ group  Ldap_ role  cn app01_admins                   compare strings          String matching is done by XIV system  Single match    group mapping successful  Multiple or no matches  group mapping failed             Assign user to applicationadmin role   user becomes member ofapp01_ group    group app01_ group associated with  host app 01_ host                   access_ define    XCLI command creates  association between user groupapp01_ group  and a host app01_ host          ccess           definition             host app01_ host             map_ vol    XCLI command maps volumes  app01_vol01 and app01_vol02 to app01_ host host          olume    mapping   
424. le  or  assist the IBM SSR who is onsite     Remote support has three ways to connect the system  Depending on the client   s choice  the  support specialist can connect by one of the following methods      gt  Using a modem dial up connection through an analog phone line provided by the client     gt  Using a secure  high speed direct connection through the Internet to the XIV Storage  System     gt  Using the XRSC  which allows the client to initiate a secure connection from the  XIV Storage System to IBM  Using XRSC  the XIV Storage System makes a connection to  an external XRSC server  Using an internal XRSC server  the XRSC can connect to the  XIV Storage System through the connection made to the external server  For more details   see Figure 7 54     372 IBM XIV Storage System Architecture and Implementation    IBM XIV Remote Support Options  Storage    External    XRSC server  Client IBM    Firewall Internet z Firewall server    Direct      eon  XIV Remote    Support Center    Dial up connection       Figure 7 54 Remote support connections    XRSC  We encourage all clients to use the secure  high speed remote support solution  enabled by the XRSC     These possibilities are shown in Figure 7 54  If there are problems  the remote specialist is  able to analyze problems and also assist an IBM SSR dispatched onsite in repairing the  system or in replacing field replaceable units  FRUs      To enable remote support  you must allow an external connection  such as either one
425. le encryption or change key      when no longer ne ede d data isno longer available rea dab le    3 4 1 3 5  3 6 Disk encryption and key management requirements SED feature of 11 4 supports these     key splitting      2 key managers    8 5 9 Change user passwords atleast every 90 days Enforce password expiration     xiv outsources to  LDAP server  8 5 10  14 Mnimum password length     passwords contain ing LDAP server is a workaround for 8 5 9 8 5 14  both numeric and alphabe tc characters     Limit exce pt storage admin    repeated access attempts     Set the lockout  duration to a minimum of 30 minutes    8 5 15 f a session has been idle for more than 15 minutes  Including GU I and XCLI  require the user to re au th entica te    10 5 1  7 Audit trails Support via syslog server     outsource to syslog  server          Figure 5 44 PCI DSS support in XIV    5 6 1 Auditing via syslog    XIV gives you the ability to configure a syslog server for your XIV system  All user actions   including all administrative commands and parameters from the XCLI or GUI  performed on  an XIV system are logged and exported to this server     Syslog is commonly used for computer system management and security auditing  as well as  generalized informational  analysis  and debugging messages  XIV now has the capability of  auditing all user entered commands     Currently  the feature supports the definition of up to two audit servers  The configuration is  done by issuing the audit_config_set XCLI 
426. le to an LDAP user is done through the LDAP  role mapping process  For a description  see 5 7 4     LDAP role mapping    on page 247  A  description of user group to host association is provided in    User group membership for  LDAP users    on page 266      gt  readonly    As the name implies  users assigned to the readonly role can view only system  information  A typical use for the readonly role is a user responsible for monitoring system  status  system reporting  and message logging  who cannot be allowed to make changes  on the system  The assignment of the readonly role to an LDAP user is done through the  LDAP role mapping process  For a description  see 5 7 4     LDAP role mapping    on   page 247     Roles  There is no capability to add new user roles or to modify predefined roles  In  LDAP authentication mode  role assignment can be changed by modifying the LDAP  attribute  memberOf in our example      LDAP authentication mode implements a user role mechanism as a form of role based  access control  RBAC   Each predefined user role determines the level of system access and  associated functions that a user is allowed to use     RBAC  The XIV Storage System implements RBAC based authentication and  authorization mechanisms     All user accounts must be assigned to a single user role  Any LDAP user that is assigned to  multiple roles will not be authenticated by the XIV Storage System  Deleting role assignment   by removing the description attribute value in the LDA
427. le with XIV under load   Actual rebuild times depend on several factors      gt  Numbers of modules   Type of failure  disk or module   Host generated workload   Amount of data written to the system    vy y    The rebuild times that you experience in your environment depend on these factors     To illustrate this rebuild scenario  we purposely failed module 13  as shown in Figure 2 12 on  page 53  Notice the status bar in the lower right corner of the GUI that shows the completed  percentage of the rebuilding progress  The percentage completed is in light green and is  reported in our example as 30  complete  The percentage that is yet to be completed is in  yellow  Remember that the redistribution process is also running  even though the   XIV Storage Management GUI reports only the rebuilding     52 IBM XIV Storage System Architecture and Implementation    xiv XIV Storage Management       File   View   Tools  Help            Settings p Launch xcii f Launch xivTop    ECMAZELUID   System       Figure 2 12 Rebuilding status in the XIV Storage System GUI       If there is a disk failure in a fully configured XIV Storage System  there are 168 disks reading  because there is no data that is not redudant on the other disks within the same module as  the failed disk  Concurrently  there are 179 disks writing to preserve full data distribution     If there is a module failure  the copies of non redundant data are read from all of the  remaining modules in the system because none of 
428. lementation    Now  in contrast  see Figure 6 2  which shows a LUN virtualized into 1 MB partitions and  distributed evenly across 180 drives in a 15 module XIV Storage System configuration          XIV full rack  e Every LUN is carved out of 180 spindles       e Every LUN enjoys the performance of 180  spindles       Figure 6 2 XIV Storage System full rack with 180 drives    In a traditional storage system  it is common for an application   s performance requirements to  be greater than the performance capabilities of a single RAID array  To engage multiple  traditional RAID arrays into providing the performance requirements of an application  one or  more of the following techniques must be used      gt  Break up the application into multiple LUNs and distribute them among several  RAID arrays     gt  Use operating system logical volume striping techniques to distribute the operating system  across the performance capabilities of multiple RAID arrays     gt  Storage subsystem striping techniques that create LUNs that are striped across multiple  RAID arrays    It is common for these traditional storage system performance techniques to be combined to  meet the performance requirements of an application  These techniques are a necessity with  traditional storage  They can become challenging if there is ever the need to change these  configurations because more storage capacity or more performance capacity is required   These activities require specialized skills and much work
429. lexible system of filters and rules allows you to generate customized reports  and notifications  For details about how to create customized rules  see 7 1 9     Defining  notification rules    on page 350     7 1 6 Viewing events in the XIV Storage Management GUI    The XIV Storage Management GUI provides a convenient and easy to use view of the event  log  To get to the view shown in Figure 7 26  right click the Monitor icon from the main XIV  Storage Management GUI window and click Events from the menu     All Systems  8   gt  XIV_PFE _1340010   Evens    i Events       System Time  1 00PM  amp   After   System Time    EE    Min Severity  None h Type  All   Alerting   Before   System Time  EH Event Code  OBJECT   Domain  test      Uncleared             Date  Syst    System    6 2 44  3 53 13 PM  XIV_PFE2 134     6 4 14  9 09 05 AM  IV_PFE2_ 134          Event Code  OBJECT_ATTACHED TO_DOMAIN admin Object test_host of type host has been added to domain t     OBJECT ATTACHED TO_DOMAIN admin Object AIV_O02 1310114 of type target has been added to d                                    System               D             Figure 7 26 XIV Storage Management GUI Events main view    The window is split into two sections      gt  The top part contains the management tools  such as wizards  in the menu bar  and a  series of input fields and drop down menus that act as selection filters      gt  The bottom part is a table displaying the events according to the selection criteria  Use the 
430. lgorithms that stage data between disk and  cache work most efficiently when multiple I O requests are coming in parallel  which is when  the host queue depth becomes an important factor in maximizing XIV Storage System I O  performance  It is usually best to configure large host queue depths to ensure that you use  the parallelism of the XIV Storage System architecture  A good practice is starting with a  queue depth of 64 per HBA to ensure use of the XIV Storage System parallel architecture     Tip  A queue depth of 64 is the best host HBA queue depth to start with for planning  purposes     Chapter 6  Performance 299    Figure 6 5 shows a queue depth comparison for a database I O workload  70 percent reads   30 percent writes  8 K block size  and DBO   Database Open      Host Side     Queue Depth    con 70 30 8K DBO    we   OPS QOPETH 64      OPS QCEPTH 10      OPS QOEPTH 255    Increasing load expressed with threads       Figure 6 5 Host side queue depth comparison    Disclaimer  Performance numbers in this example are valid only for this special test  conducted at an IBM lab  The numbers do not describe the general capabilities of an  XIV Storage System as you might observe them in your environment     The green line in the graph is the performance of a host with a queue depth set to 10  Where  this line changes slope near 35 000 IOPS  you can see the red line at around 44 000 IOPS   The red line represents the same host configured with HBA queue depth settings of 64  Th
431. lidChars    0123456789    var strChar        var CmdString        var Stringl        var output      var Exceeded   0     var xclicmd    xcli  m     IPAddr      u     Username      p     Password        var now   new Date     var EndDate   now getYear            now getMonth   1            now getDate   1      00 00 00      var Command      statistics get count 1440 interval 1 resolution unit minute  t  write hit_medium_ latency end     EndDate     CmdString   xclicmd   Command     var WshShell   WScript CreateObject  WScript Shell     var oExec   WshShell Exec   comspec   d q       oExec StdIn WriteLine  prompt        oExec StdIn WriteLine  cd        oExec StdIn WriteLine CmdString     oExec StdIn WriteLine  exit       while   oExec StdOut AtEnd0fStream      Stringl   oExec StdOut ReadLine       n    Stringl   Stringl replace    s     s   g       if  Stringl length    0  continue     strChar   Stringl charAt 0    if  strValidChars indexOf strChar      1  continue   if  Stringl  gt   Threshold  Exceeded   1     410 IBM XIV Storage System Architecture and Implementation    if  Exceeded     Command      custom event description  Medium Latency exceeded threshold of      Threshold     during 24 hour period ending     EndDate      severity      Severity    CmdString   xclicmd   Command    WshShell   WScript CreateObject  WScript Shell      oExec   WshShell Exec   comspec   d q      oExec StdIn WriteLine  prompt         oExec StdIn WriteLine  cd         oExec StdIn WriteLine CmdSt
432. likely caused  by sequential streaming tasks         9                 Figure 2 9 XIV flash cache learning    The cache node immediately checks the extended cache for the requested   O  If the  requested I O exists in the extended flash cache  it is served to the host through the main  cache  The I O operation is now complete and is recorded as a flash cache read hit     If the operation results in a true read miss  not in the DRAM cache and not in extended flash  cache   the request is forwarded in an unmodified state to the disk drive  SAS layer   The I O  is retrieved from the disk drive and served to the host through the main cache  From a host  perspective  the I O operation is now complete and is recorded as a read miss  The related  pages are copied into reserved buffers in the main cache     Important  Any read larger than 64 KB bypasses the extended flash cache     When the buffer reaches 512 KB  it is written sequentially to the flash cache as a  log structured write  This method helps to prolong the life of the flash cache     Note  The XIV is able to retain the data in the flash cache between system restarts and  code upgrades     XIV Storage System Software Version 11 2 introduced improved flash caching algorithms   which provide a performance boost of up to 4 5 times over systems without flash cache for  random database type workloads  This boost is accomplished by storing and computing all  flash cache related data integrity checking tasks in DRAM rather than o
433. list      AllSystems Alerts    s_   AllSystems Alerts    s_ Alerts  All Systems Events       Figure 4 75 Opening the Domains page from the left menu    The domains page displays some or all of the domains currently defined on the system you  are managing  as shown in Figure 4 76     Chapter 4  IBM XIV Storage Management software 175    Utilization Volumes                            E       EE     103 GB Hard    ITSO_domain               0 GB Pools allocated 1 TB Soft  219 1 TB Hard    E sr oan e2  10030     148 4 TB Pools allocated       17 GB Hard  4 a d  ha  gt   0 GB Pools allocated 1 TB Soft  17 GB Hard  P  ma  Laa           0 GB Pools allocated 103 GB Soft  103 GB Hard  E   A   T  0 GB Pools allocated 103 GB Soft  12 TB Hard  10  1 364     12 TB Pools allocated of 12 TB Soft  1009          Figure 4 76 The Domains view    Note  The specific domains displayed in the Domains view depend upon the domain  associations of the logged in user  The global storage administrator sees all domains  defined on the XIV system  A user who is associated with one or more domains sees only  those domains  For details on the distinction between global administrators and domain  administrators  see    Global administrator and domain administrator    on page 223     Tip  To filter the contents of the Domains view or any other view to show only items related  to a specific domain  use the filter field in the menu bar to specify the domain  using the  format domain domainName  as shown in Figur
434. lso click Disk Manager     Monitoring     gt  Subsystem Performance  Monitors to open the Subsystem Performance Monitors view     2  Afterward  select the XIV Storage System and click the double arrow icon to move the  selected system from the Available subsystems into the Selected subsystems section     3  Click Save and specify the subsystem performance monitor name  Afterward  the  subsystem performance monitor is automatically submitted     4  If you want to review or change the sampling and scheduling  select the performance  monitor  click Disk Manager     Monitoring     gt  Subsystem Performance Monitors and  click Sampling and Scheduling  as shown in Figure 7 75     E  Disk Manager Storage Subsystems Sampling and Scheduling   Alert      Storage Subsystems Sampling  F  Storage Optimizer  H SAN Planner   Monitoring    H Groups Gather data every  5   minutes Advanced           anah J obs    Interval length     Gathered performance data will represent averages over this interval        Subsystem Performance Monitors       SIY Labl EBC  Duration     adin ane f  Continue gathering data For it  Hours       Alerting     Continue indefinitely    amp  Profile Management    Reporting Scheduling    Figure 7 75 Performance Monitor details       Configuration information and reporting    Figure 7 76 shows a list of various XIV Storage System subsystems as reported in  Tivoli Storage Productivity Center        ie IBM Tivoli Storage Productivity Center  sspc sle 1    Storage Subsyste
435. ltigraph concept  The top graph is the IOPS for the  day with separated reads and writes  The second graph shows the bandwidth for a few  minutes with separated reads and writes  which provides quick and easy access to multiple  views of the performance metrics     308 IBM XIV Storage System Architecture and Implementation    All Interfaces    Read   Write                    r           Te    oo 20 00 22 00  o0 00    02 00 04 00  September 18  2013   September 19 2013 af       All Interfaces    Read   Write      j       Bandwidth  MBps      350          _ Targe               Figure 6 14 Multiple graphs using the XIV Storage Management GUI    There are various additional filters available  such as filtering by host  volumes  interfaces  or  targets  These items are defined on the left side of the filter pane  When clicking one of these  filters  a window opens  Highlight the item  or select a maximum of four by using the Ctrl key   to be filtered  and then select click to select  This action moves the highlighted item to the  lower half of the window  To generate the graph  you must click the green check mark on the  lower right side of the window  Your new graph is generated with the name of the filter at the  top of the graph  See Figure 6 15 for an example of this filter     All Interfaces   Host Blade5 LS21      Read   Write           Blade6 LS21 06     Blade7 HS22V2     Biade9 HS22V3    TSO_LPAR1       4    10 35    jo 20 10 25 10 30  September 19 2013 af                F
436. m  as shown in  Figure 5 58  Click Next until you reach the Test and Activation tab     16 From the Test and Activation tab that is shown in Figure 5 59  enable LDAP by setting  Use LDAP to Yes  You can also test your LDAP with a user already defined in LDAP        LDAP Configuration   Test and Complete LDAP Authentication    Test and Complete LDAP Authentication   Welcome Provide a User Name and Password that has already been configured on your  Server Type Directory Services to verify configuration  lf needed  please go back and review  your configuration before finishing           LDAP Servers  XIV User   i  Use LDAP  Yes     Unique ID s      Groups      Test LDAP configuration  Secure LDAP a    User Name    Xl    Bind  amp  Cache o    Password  CLLLLITT              Test  amp  Activation      Finish       Figure 5 59 Test and Activation tab          Chapter 5  Security 257    17 At this stage  click Finish to complete the setup  or click Next to go to the exit and  summary window that is shown in Figure 5 60        LDAP Configuration   Exit this wizard x    Exit this wizard        eee Exit this wizard   Server Type  LDAP Servers  XIV User  Unique ID   s   User Name   k   CN xXIV CN Users DC itso DC storage DC ibm DC com  oS ID Attribute   Secure LDAP Ba pian  So ee Name Attribute   Bind  amp  Cache userPrincipalName  Test  amp  Activation Group Attribute     memberOf  Finish    Storage Admin Role               e  lt     lt      Figure 5 60 Wizard summary    LDAP mode cons
437. m changes on any system  resource except for maintenance of physical components  changing the status of physical  components  or effecting changes related to encryption     Chapter 5  Security 221     gt  applicationadmin    The applicationadmin  application administrator  role provides flexible access control over  volume snapshots  A user assigned to the applicationadmin role can create snapshots of  volumes  perform mapping of their own snapshots to assigned hosts  and delete their own  snapshots  The user group to which an application administrator belongs determines the  hosts and their respective set of mapped volumes that the application administrator is  allowed to manage  If a user group is defined with access _all    yes     application  administrators who are members of that group can manage all volumes on the system  For  more details about user group membership and group to host association  see    User  groups    on page 224      gt  securityadmin    The securityadmin  security administrator  role is to manage certificates  key servers  and  other items related to encryption  Defining at least two security administrators is a must   because that is the minimum number required to enable recovery keys  For details about  encryption with XIV  see the IBM Redpaper titled X BM XIV Security with Data at Rest  Encryption  REDP 5047      gt  readonly    As the name implies  users assigned to the readonly role can only view system  information  A typical use for the read
438. mand Line Interface   The XCLI Session can be started in Windows by clicking Start     Programs  Alternatively  if  the Create Desktop XCLI icon was selected during the installation  the XCLI Session shortcut  is on the desktop  Additionally  an XCLI executable function is available for use from the  command line  These various methods of starting the XCLI functions are covered in the  following list      gt  XCLI session    Click the XCLI program shortcut in the programs menu or on the desktop  You are  prompted for user credentials and the IP address of the XIV system you want to manage   Alternatively  from the XIV GUI  use the XCLI link in the Tools drop down menu of the  menu bar  or right click in the System view and choose Launch XCLI  as shown in  Figure 4 37 on page 137   Initiating an XCLI Session from within the XIV Storage  Management GUI automatically provides the current user ID and password and connects  to the system selected     Tip  XCLI Session is the easiest way to issue XCLI commands against  XIV Storage Systems     Figure 4 37 on page 137 shows the process of starting XCLI from the Systems menu     IBM XIV Storage System Architecture and Implementation    Modify IP Addresses  Remove System    Create A Group Containing This System    Suspend Monitoring    View Events  View Statistics  View Storage Pools XIV 02 1310114 11 0 0 63  View Volumes by Pools  View Volumes   View Hosts    View Mirroring  View Migration  View Mirroring Connectivity  View Migration 
439. mand to list available output fields     gt  gt  help command vol_list format full    The output from the XCLI command is parsed and compared with the predefined custom  threshold  If the threshold is exceeded  an XCLI command is used to create a custom event  with a custom description and severity level  as shown in Example 7 50  An event rule can be  used on the XIV Storage System to notify a user of the condition     408 IBM XIV Storage System Architecture and Implementation    Example 7 50 Using XCLI to generate a custom event    if  output  gt   Threshold        Command    custom event description  Vol     Volume     exceeded threshold  of     Threshold     GB  severity     Severity     After the script is created  use the Windows Task Scheduler to schedule the script to run  automatically on a daily basis by clicking Start     Programs     Accessories     gt  System  Tools     Scheduled Tasks  as shown in Figure 7 90     Vol_Example ud Eg Vol_Example    Task   Schedule   Settings   Security Task   Schedule   Settings    Securty         T CAWINDOWS Tasks  WVol_Example job E  At 1 00 AM every day  starting 10 20 2010        EA Scripts Wol _Eample  wst     Schedule Task  Start time   ma G    Gat im   CA eripts   Start in  ai Schedule Task Daily    on p   a    Run as  S Set password       L  Run only if logged on  Enabled  scheduled task runs at specified time  C  Show multiple schedules     Figure 7 90 Using Windows Task Scheduler to run custom monitoring scripts       Aft
440. mation  see the IBM XIV Storage System Gen3 Models  281x 11x and 281x 21x Planning Guide  SC27 5412     Additional documentation is available in IBM XIV Storage System documentation in the IBM  Knowledge Center    http   ibm co 1rvfciG   For a smooth and efficient installation of the XIV Storage System  planning and preparation  tasks must take place before the system is scheduled for delivery and installation in the data  center  A sales representative will arrange a Technical Delivery Assessment  TDA  meeting  to go over site specific details and to ensure that the correct information is gathered before  the delivery of the system    Installation planning involves the following major areas     gt  Ordering the appropriate hardware configuration         Current requirements      Future requirements     gt  Configuration planning         Basic configurations      Network connections      Management connections     gt  Physical installation    3 2 1 Basic configuration planning    You must complete the configuration planning worksheets and checklists from the Planning  topic of the IBM XIV Storage System documentation in the IBM Knowledge Center to allow  the IBM Service Support Representative  SSR  to physically install and configure the system   IBM XIV Storage System  gt  IBM XIV Gen3 281x 11x and 281x 21x  gt  Planning      http   ibm co lraoidt    The configuration planning worksheets are also in the IBM XIV Storage System Gen3 Models  281x 11x and 281x 21x Planning Guide
441. mation from the system in the most  timely fashion and with the least impact to the client     Modem connectivity   The modem installed in the rack is optionally used for remote support if the preferred choice  of XIV Remote Support Center is not used  It enables the XIV System Storage Support  Center specialists and  if necessary  a higher level of support  to connect to the   XIV Storage System  Problem analysis and repair actions without a remote connection can  be complicated and time consuming     Remote mirroring connectivity   Planning the physical connections also includes considerations when the XIV Storage  System is installed in a Remote Copy environment  Contact advanced IBM XIV Storage  System support for assistance in planning remote mirroring connectivity to ensure maximum  resilience to hardware failures and connection failures     Remote Copy links  which connect the direct primary system and secondary system  must  also be planned for before the physical installation  The physical Remote Copy links can be  Fibre Channel links  direct or through a SAN  or iSCSI port connections using Ethernet   However  iSCSI is not the best option for this use     Planning for growth   Consider growth and the future I O demands of your business  Most applications and  databases grow quickly and the need for greater storage capacity increases rapidly  Planning  for growth before the implementation of the first XIV Storage System in the environment can  save time and effort in
442. me  the XIV Storage System uses a grid topology  This topology can sustain a  component failure and maximize consistency and transparency from the perspective of  attached hosts  The potential impact of a component failure is vastly reduced because each  module in the system is responsible for a relatively small percentage of the system   s  operation     A controller failure in a typical N 1 system results in a dramatic  up to 50   reduction of  available cache  processing power  and internal bandwidth  Conversely  the loss of a module  in the XIV Storage System translates to only 1 15th of the system resources and does not  compromise performance nearly as much as the same failure with a typical architecture     For more information  see Chapter 6     Performance    on page 287     The XIV Storage System also incorporates innovative provisions to mitigate isolated  disk level performance anomalies through redundancy supported reaction  This is described  in    Redundancy supported reaction    on page 59  Also see    Flexible handling of dirty data    on  page 59     Disaster recovery    Enterprise class environments must account for the possibility of the loss of both the system  and all of the data as a result of a disaster  The XIV Storage System includes the provision for  remote mirror function as a fundamental component of the disaster recovery strategy  For  more information about the remote mirror function in XIV  see IBM XIV Storage System  Business Continuity Funct
443. ment     Show Subsystem Performance System Report  as shown in Figure 7 84        Eem Tivoli Storage Productivity Center  sspc sle 1    Configuration Utility       File View Connection Preferences    Window Help    Element Management           B  al x  A    avigation Tree       Services   Data Manager Disk Manager   Fabric Manager   Tape Manager   Element Manager   Replication Manag  E   Administrative Services    Eb TBM Tivoli Storage Productivity Center Refresh      ili    FE Devices Storage Subsystems   Z total  2 Normal  0 Critical  0 Warning  0 Unreachable   Job Management CIMOM Discovery  _ Reporting    Topology    amp   Monitoring    Storage Subsystem Performance Management    Storage Resourte Group Management Create Subsystem Performance Monitor      E  Analytics   2 ep sng Reporting  Show Subsystem Performance System Report Define By Storage Subsystem Report Define 4  E   Data Manager Boreal  Y Y P   y g Y P      E     Data Manager for Databases    The performance statistics of a storage subsystem are collected by a performance monitor job  Only a storage subsyste  Data Manager for Chargeback performance monitor job run against it    H Disk Manager   H Fabric Manager    Figure 7 84 Show performance report       Storage Subsystem Probes       Afterward  you can drill down into the details of any storage subsystem or even deeper into  the single volume view and create Tivoli Storage Productivity Center reports or graphs  as  shown in Figure 7 85 on page 403     Element
444. ment  personnel  perspectives  storage consolidation becomes an  important consideration  This new approach necessitates storage systems that can easily  and securely support the provisioning  administration  and service level management of  storage resources for multiple resource to be used concurrently     XIV multitenancy  introduced in XIV Storage Software v11 5  brings flexibility and simplicity to  management of tenant data and storage resources across multiple XIV systems through  these methods      gt  Secure division and isolation of XIV storage resources among numerous tenants   gt  Simple  quick delegation of administration tasks and role based permissions     gt  Simple  rapid deployment without the need for extensive planning and tuning and the  ability to upgrade in the field    Domains   XIV multitenancy is based upon the concept of domains  where an XIV Storage System is  logically partitioned into one or more independent containers  each with its own assigned  administrators  This enables secure isolation form other domains of the logical entities  contained within a domain  A user who is associated with a single domain has no knowledge  of the other domains that exist on the system nor about the pools or volumes associated with  those domains  Domains can be associated with these entities      gt  Users and user groups    gt  Storage pools  and  inherently  the volumes that they contain    gt  Hosts and clusters    gt  Remote mirror targets    Note  Although
445. ment software installation               0 000 eee 114  4 2 1 XIV Storage Management  GUI and XCLI  software upgrade                114  4 2 2 XIV Storage Management software installation steps for direct use           115   4 3 XIV Storage Management software USE       2    ee 117  4 3 1 XIV Storage Management GUI used in direct mode                 0005  117  4 3 2 XIV Storage System Command Line Interface              0 000 c eee ees 136   A 4 Storage DOOlS 2  xia    arenes aa Sere ee tise en die Ss KL RSS oS ee oe one eee 141  4 4 1 Function of storage pools             0c ee ees 141  4 4 2 Managing storage pools with the XIV Storage Management GUI             142  4 4 3 Managing storage pools with XIV Command Line Interface                 150   AS i VOUES  sorae bese ni Enen Ar RE Lee ee seek wees Ses Hee bee oe eres 152  4 5 1 Managing volumes with the XIV Storage Management GUI                 153    IBM XIV Storage System Architecture and Implementation    4 5 2 Managing volumes with XIV Command Line Interface                 0   162    4 6 Host definition and mapping           2    0 0 cece teens 164  4 6 1 Assigning LUNs to a host using the XIV Storage Management GUI           164  4 6 2 Assigning logical unit numbers to a host by using the XCLI                 168   Ad QOS EE E 2 656 ead te hie esate ates ae ye E A EA enemas ne paedeee 170  Aad si  MANAGING QOS isase Salen a he eae wala bees Pa eee A ee te 171   4 6  WIUMMGNANCY acisas donne es eee a ea ee eae ws 
446. mins  ou Users dc itso dc storage dc ibm  dc com   dn  cn XIVReadonly ou Users dc itso dc storage  dc ibm  dc com   dn  uid phb ou Users dc itso dc storage  dc ibm  dc com    The XIV administrator must specify that the LDAP server type is    Open Ldap     using the  Idap_config_ set XCLI command as follows     Idap_config set server type    Open Ldap      This command also automatically sets both the user_id_attrib and user_name attrib  values to    uid       Then the xiv_group_attrib configuration value is changed to a description as follows   Idap_config_ set xiv_group attrib description   The role names must be set to reflect the storageadmin and readonly roles  Because there  are no group mappings  they do not need to have the full DN path as when using group    membership  Instead  we need to use only    XIVAdmins    and    XIVReadonly    values for  each role      gt  Idap_config set storage _admin_role    XIVAdmins      gt  Idap_config set read only _role  XIVReadonly    The LDAP service user and password must be defined  This user is a user that needs no  specific permissions  within the directory  and is only used to view the directory schema  Run  the following command     Idap_config set xiv_user    UID XIV 0U Users  DC itso DC storage  DC i1 bm  DC com     Xiv_password PasswOrd   Then  the LDAP server instance must be defined using the Idap_add_server command  as follows    Idap_add server fqdn itso storage ibm com port 389 address 9 155 113 137  base _dn  0U User
447. mote Proxy and check its status    bc h 15 b6     service xivproxy start  Starting IBM XIV remote support proxy   done   bc h 15 b6     service xivproxy status  IBM XIV remote support proxy running    Listen address   9 155 113 137 8988  Target address   195 110 41 141 443  Running since   Sep 27 15 40 56  Open connections   0    Failed connections  0  Total connections   0    Example 7 39 on page 383 shows a query of the XIV Remote Support Proxy agent to check  its status from a remote location by using Telnet  In this example  there are two active remote  support connections  from separate IBM XIV systems  using the proxy     382 IBM XIV Storage System Architecture and Implementation    Example 7 39 Querying the status of the XIV Remote Support Proxy agent using Telnet      telnet 9 155 113 137 8989  Trying 9 155 113 137     Connected to 9 155 113 137   Escape character is          Listen address   9 155 113 137 8988  Target address   195 110 41 141 443  Running since   Sep 27 15 40 56  Open connections   2    Failed connections  0  Total connections   2  Connection to 9 155 113 137 closed by foreign host     After the XIV Remote Support Proxy agent has been configured and started successfully   new support center definitions must be entered on the XIV Storage System  These  definitions are done by your XIV Storage System support personnel  An example of a  configuration is shown in Example 7 40     Example 7 40 support_center_list of entry using XIV Remote Proxy    XIV PFE
448. mputing resources  To explain the principle of parallelism further  it is helpful to consider the  ramifications of both the hardware and software implementations independently  We then  examine virtualization principles in 2 3     Full storage virtualization    on page 24     Important  The XIV Storage System uses parallelism at both hardware and  software levels     2 2 1 Hardware parallelism and grid architecture    The XIV grid design  Figure 2 3 on page 22  has the following characteristics      gt  Both interface and data modules work together in a distributed computing sense  However   the interface modules also have additional functions and features associated with host  system and remote mirroring connectivity      gt  The modules communicate with each other through an internal  redundant  switched network      gt  The software services and distributed computing algorithms running within the modules  collectively manage all aspects of the operating environment     Design principles  The XIV Storage System grid architecture  by virtue of its distributed topology  ensures that  the following design principles are possible      gt  Performance     The relative effect of the loss of a single component is minimized   All modules are able to participate equally in servicing the total workload     This design principle is true regardless of access patterns  The system architecture  inherently enables excellent load balancing  even if certain applications access certain  vol
449. ms miel  Fie view Connection Preferences Window Help  Element Management   al  gt     a  x   jy      4    javigation Tree Storage Subsystems         Administrative Services     IBM Tivoli Storage Productivity Center Add Storage Subsystem     Data Manager     Data Manager for Databases Launch Element Manager     Data Manager for Chargeback     Disk Manager    Greate Virtual Dist             Storage Subsystems       Storage Subsystems Subsystem a Label Type Model Status Available Space  GB  Consumed Space  GB  ConfiguredRealSpace  GB  Available Real Space  GB      Storage Optimizer E   xIv 2810 1300203 IBM XIV 414 A Normal   26 256 35 534 55 696   48 080  EHSAN Planner  A   xI    2810 6000105 IEM XIV Al4 A Normal   25 136 40 064 61 744   48 736           Monitoring    Figure 7 76 List storage subsystems    7 7 2 XIV Storage System Tivoli Storage Productivity Center reports    Tivoli Storage Productivity Center v4 2 includes basic capacity and asset information in  tabular reports and in the topology viewer  In addition  logical unit number  LUN  correlation  information and performance data is available     Tivoli Storage Productivity Center probes collect the following information from the IBM XIV  systems      gt  Storage pools   Volumes   Disks   Ports   Host definitions  LUN mapping  and masking information    YY vV Yy    396 IBM XIV Storage System Architecture and Implementation    Capacity  Space is calculated differently in the XIV Storage Management GUI and the  XCLI th
450. must be placed between single quotation marks  such as    name with spaces        The itso _app02 group user group is empty and has no associated hosts or clusters  The  next step is to associate a host or cluster with the group     2  Associate the itso app02 group user group to host itso app02  as shown in  Example 5 21   Example 5 21 XCLI access_define     gt  gt  access define user _group itso app02 group host itso app02  Command executed successfully    5 9 4 Active Directory group membership and XIV role mapping    In Active Directory  a user can be a member of a single group or multiple groups  An LDAP  group is a collection of users with common characteristics  Group is defined in the Active  Directory container Users  A group is defined first as an empty container  and then existing  users can be assigned as members of this group  A group is represented as a separate object  in the LDAP DIT and gets a distinguished name  DN  assigned to it     Groups defined in the Active Directory can be used for XIV Storage System role mapping   When a user becomes a member of a group in the Active Directory  it gets a new attribute  assigned  The value of the new attribute points to the DN of the group  Member 0f is the name  of that attribute  The Member Of attribute value determines the Active Directory   group membership    To create a group in Active Directory  complete the following steps     1  Start Active Directory Users and Computers by clicking Start     Administrative T
451. n Figure 4 31  displays the details of the selected systems in tabular  format  The listed systems can be sorted by any column  Click a column header to sort by that  column  Click that header again to toggle between ascending and descending order   Right click a column header to customize which column header values are shown or hidden   The Name  Group  and Status columns are required  The following optional columns are  available     IOPS   Hard Size  Hard Used  Hardware Type  Hosts   Soft Size   Soft Used  Utilization  Version  Volumes    YYYY YYYY YV Y    Double click any system row to navigate to the System view for that system     Chapter 4  IBM XIV Storage Management software 133          A All Systems  9   gt  Redbook 0T3  3  a  9 Systems  4 Groups  4 Disconnected       ee sre    ame Group  z l XIV 7804363 Direct XIV connect    E a es PESA    Pn EY     KIV 0  1310114  Redbook2013    l Status       Connection Error    2S ae TIE  Full Mei s                                   I XIV 6001546 Stockholm Briefing C Connection Error          J XIV 1300208 LBS Tucson Full Redundancy  Ae   XIV PFE3_ 7804143 Ungrouped Systems Full Redundancy   a l XIV LAB 01 6000105 Ungrouped Systems Connection Error     l 9 155 500 182 Ungrouped Systems Connection Error    Figure 4 31 All Systems List view    Note  When one or more systems are selected in the List view  the selected rows are  highlighted in orange     Tip  From any of the Systems views  you can select multiple systems by holding 
452. n XIV Gen3 systems equipped with 4 TB or 6 TB drives    2 IBM XIV Storage System Architecture and Implementation    1 2 New features in XIV    The XIV System Software version 11 5 0 and 11 5 1 and other recent offerings provide a  range of new capabilities that enhance its value for cloud services      gt     IBM XIV Cloud Storage for Service Providers  introduced in May 2014  offers a  pay per need scalability matrix  This enables cloud providers to cater to tenant  requirements with ease and efficiency through flexible software licensing  The portfolio  capitalizes on the v11 5 0 enhancements and multitenancy isolation  which enables more  than 120 tenants to securely access and manage data while sharing the same XIV  Storage System infrastructure     XIV multitenancy securely isolates domains of XIV storage resources among numerous  tenants  with the ability to set different quality of service  QoS  levels for each domain  It  enables the division of storage system administration tasks into logical domains  using  role based permissions  It also enables rapid deployments while minimizing the need for  extensive planning  tuning  or field upgrades     Support for RESTful API version 2 0 adds functions for storage administration tasks   including Copy Services     XIV and VMware vCloud Suite Integration functions are available to all XIV releases  through the IBM Storage Integration Server v1 5  It is free of charge and enables VMware  APIs for Storage Awareness  VASA   VMwa
453. n in the upper right corner  in this  example  it is in Full Redundancy  but it can potentially also be Rebuilding or Redistributing    Swipe to the right to go to the Volumes window        i a n    Tota Total     10983 ee M EIEEE    Host  ITSO Blade1l HS22 01       BW  53 6 MB  Latency  1 9 Mms     be sec 100 do   40 20 oman   Hosts vIOPS BW MBps  pcs  ITSO_Blade1_HS22 01 i HOSSSome ee 53 6 Bis ee   ITSO_HS22_blade4 0 0 0 0 6  ITSO_TS5220_02 0 0 0 0 0  ITSO_HS22_blade5 0 0 0 2 0  ITSO_Blade2 0 0 0 0 0  ITSO_Blade9 0 0 0 0 0  garbage 0 0 0 0 0    Figure 7 32 IBM XIV Mobile Dashboard Host view       If the IBM XIV Mobile Dashboard is operated in portrait mode  by rotating your iPad   a list of  up to 27 hosts is displayed instead     From either the Volume view or the Host window  you can log off from the IBM XIV Mobile  Dashboard by using the icon in the upper right corner of the display  When you restart the  application  it recalls the IP address and user that were last used  but not the password  The  password must be entered again     354 IBM XIV Storage System Architecture and Implementation    Mobile Dashboard for the Apple iPhone    The IBM XIV System Mobile Dashboard is available for the Apple iPhone    The demo mode  allows you to try the available monitoring features without actually connecting to an IBM XIV  System  The login sequence is the same as detailed before     There is a performance monitoring summary window for monitoring overall IBM XIV System  performan
454. n model  IBM installs a fully populated  15 module XIV system with partial payment  60  of total price  based on initial use  The  client gets full XIV performance from the first day  Depending on client growth rates and  service level agreement  SLA   IBM procures subsequent systems in advance of client  needs  typically at 70  use     IBM charges one US dollar for initial invoices for the second system and the remaining 40   charges for the first machine  In the same manner  IBM will deliver one additional system   whenever the previous machine reaches the expansion threshold  70  use  in this example   and charges the one US dollar initially for the additional system  At that time  the client must    70 IBM XIV Storage System Architecture and Implementation    also make the remaining payment  that is the 100  price less  1  for the previous system  In  any case  at the end of the one year term  the client pays for any delivered system     Important  Remember that with ASP  the capacity increments are full systems  161 TB   243 TB  325 TB  or 489 TB     The program supports the XIV Storage System machine type 2810 or 2812 and model 214  and later     100  Authorized for Delivered when Delivered when  performance and Machine 1 hits prior Machine hits  capacity expansion threshold expansion   70  utilization  threshold  Initial payment of OEN  60  of total price  1 Initial invoice for  1 Initial invoice for  Machine 2 current Machine    Remaining 40  Remaining   payment tor p
455. n provisioning  For a specified XIV Storage System logical volume  there are  effectively two associated sizes  the logical volume size and the actual volume size  The  physical capacity allocated for the volume is not static  but it increases as host writes fill the  volume     Logical volume size    The logical volume size is the size of the logical volume that is observed by the host  as  defined upon volume creation or as a result of a resizing command  The storage administrator  specifies the volume size in the same manner regardless of whether the volume   s storage  pool is a thin pool or a regular pool     The volume size is specified in one of two ways  depending on units      gt  Interms of gigabytes  The system allocates the soft volume size as the minimum number  of discrete 17 GB increments needed to meet the requested volume size      gt  In terms of blocks  The capacity is indicated as a discrete number of 512 byte blocks  The  system allocates the soft volume size used within the storage pool as the minimum  number of discrete 17 GB increments needed to meet the requested size  specified in  512 byte blocks  However  the size that is reported to hosts is equivalent to the precise  number of blocks defined     The snapshot reserve capacity associated with each storage pool is a soft capacity limit  It is  specified by the storage administrator  although it effectively limits the hard capacity used  collectively by snapshots also     Actual volume size    Tip  D
456. n the flash cache     2 9 Encryption for data at rest    IBM XIV Storage System Gen3 Model 214 with software Version 11 4 0  for machine types  2810 and 2812  introduced industry standard encryption for data at rest while avoiding a  performance impact  All capacity points  1 TB  2 TB  3 TB  4TB and 6 TB  are supported using  self encrypting hard drives  SED  and software based  encryption ready flash cache   Implemented with AES 256 bit keys  encryption can be done with data already on disk  hot  encryption   It is nondisruptive and takes only minutes     Chapter 2  IBM XIV Storage System logical architecture and concepts 45    Key management is accomplished with Tivoli Key Lifecycle Manager or its replacement  IBM  Security Key Lifecycle Manager  which offers production ready key management and is  based on the Key Management Interoperability Protocol  KMIP  Version 1 0  This method  provides centralized and simplified key management and the separation of key storage from  data storage     Figure 2 10 shows the initial configuration of encryption in XIV        Encryption  Initial Configuration    1  Configure TKLM    2 Point XIV to TKLM    4  XIV configures disks  with X MK deri ved  per disk key    5  Request  amp   Receve ESK       6  Use ESK to  Wrap XMK    3  AIV generates  random XMK       T  Store wapped XMK          Figure 2 10 Encryption  Initial configuration    For more information  see the IBM Redpaper  X V Security with Data at Rest Encryption   REDP 5047     2 
457. n the system main window toolbar and click  Shutdown System  as shown in Figure 3 36           xiv XIV Storage Management  l Actions   View   Tools   Help f  K h Settings a Launch XCLI is Launch XIVTop     tem    System Settings   System              Import Systems File LDAP  Export Systems File Pool Alerts Thresholds  Support    Preferences  Modify IP Addresses    Exit Shutdown System       Figure 3 36 System shutdown    Chapter 3  IBM XIV architecture  components  and planning 107    2  To confirm the shutdown  click OK and enter your login password  as shown in  Figure 3 37     Are you sure you want toe shut down the  machine and all its components     Shutdown       Enter Login Password             Figure 3 37 Confirm system shutdown    The shutdown takes less than 5 minutes  When it is finished  all fans and front lights on  modules and all UPS lights are off     Tip  Using the XIV Storage Management GUI is the most convenient and best way to  power off the system     Using the XCLI    From the command prompt  issue the following command  where XIV_01 is the system  name     xcli  c  XIV_01   u admin  p adminadmin shutdown  y    You receive the response     Command executed successful ly  If you are using the XCLI session  use the shutdown procedure shown in Example 3 1     Example 3 1 Executing a shutdown from the XCLI session    User Name  itso   Password        x      Machine IP Hostname  9 155 53 250  connecting    XIV_01 gt  gt shutdown   Password               Warn
458. n upgrading the XIV Storage System Software  firmware   any previous  LDAP configuration on the XIV Storage System might be reset  Ensure that you have  saved the LDAP configuration information if you need to reload it     All users  but not the predefined users  that you eventually created for native authentication  are deactivated  not deleted  when you activate the LDAP mode in the XIV Storage System   Defined users no longer appear in the XIV Storage System user settings  However  they are  not deleted and are shown and activated again if you eventually disable the LDAP  authentication     Chapter 5  Security 251    There are three ways to configure the LDAP on the XIV Storage System      gt  The XIV Storage Management GUI LDAP wizard   gt  The regular XIV Storage Management GUI windows   gt  The XCLI    You can see examples for all methods in the following sections     The first step for the XIV Storage System administrator to do is to verify domain name server   DNS  name resolution  as shown in Example 5 11   Example 5 11 DNS name resolution verification     gt  gt  dns test name itso storage ibm com  Name IP  Primary DNS  IP  Secondary DNS   itso storage ibm com 9 155 113 143    If the dns_test command returns an unexpected result  do not proceed further with the  configuration steps until the DNS name resolution issue is resolved     Important  As a preferred practice  the LDAP server and XIV Storage System must have  their clocks synchronized to the same time source
459. na aaan eee teeta 9  1 6 1 IBM XIV Storage Management tools             0 0 00 cc ees 12  Is     FIOSUSUDDOM sa  as Groceriu gee dace oa deine eat ne dedi ann Hh Geena Ma Grete a de eeepc 15  Chapter 2  IBM XIV Storage System logical architecture and concepts             17  2 1 Architecture overview 2 0 24 edt ae po com de eS wee Bre Ctrenmdes 4 a eke dod 18  7a ed REI S eee a ST Be ee 18  2 1 2 Hardware Clements      2  d2 02 94 2 28 nce bot at cream SHS 6 Oe a8 ee eee ees 18  22 FaArdnellsM eris rerea Genes Rett eee ke Boe eel  amp  foe Rass 21  2 2 1 Hardware parallelism and grid architecture              0 0 0 cee eee eee 21  22 2 SOnWale parallel Mesra pena oe he aA E e a E vedas Seas aes 23  2 3 Full storage VINUalIZAlION so erossid eta daawe seeded Awe E Da 24  2 3 1 XIV Storage System virtualization design        n a eee 24  2A  LOGICal SySICM CONCEDIS   254 4 tirei rretra ten So Gee coeds Pea des 26  2A OGICAMCONSIFICIS 2 4 whe Partin aa eile lew asa ee iaee ashe oe A hee eee al 26  2 4 2 Logical volume layout on physical diskS            0 0 00 cee eee 28  224 3 MUMMCNANCY 4 s 6 0 iy ewe iy bore Aa ie Ae a ied Ae ae Le a a 30  2 9 OS YSICIM Capa I ance ai ins bee dh a a a om OS Ce A ew Ge hs A ena 32  2 54 Netusable Capac  cresi eae aed a wh SO owe eee ee Oa Be a EEA 33  29 2 GIDAS pare Capacny keene niran ewe tld tha eae he hewn ee bended 34  2 5 3 Metadata and system reserve       1    ens 34       Copyright IBM Corp  2014  All rights reserved  iii    iv    2 5 4
460. nagement server is set    6  From the IBM Storage SCOM control Utility Command prompt you now need to add your  IBM XIV systems to the monitoring list  Use the following syntax for this command     scomu   add  t xiv   ip  lt ip address gt    username  lt username gt    password   lt password gt     416 IBM XIV Storage System Architecture and Implementation    Tip  Pay close attention to the syntax  You must use the double dash where required or  the command fails  So  for example    password works  but  password does not     An example of the syntax you use and the expected responses is shown in Example 7 56   The device ID is the serial number of the XIV Storage System  In Example 7 56  the  device ID is 10114 because the XIV Storage System serial number is 1310114  The user  name and password combination must be for an existing user name defined to the   XIV Storage System  If a read only user is used  mirroring is not monitored     Example 7 56 Adding an XIV Storage System to the SCOM monitoring list    scomu   add  t xiv   ip 10 0 20 102   username itso   password password  Connecting to the device       1 IBM XIV Storage System is found    device ID  10114  code level  11 5 0 esp3 p20140623 181834    The connection is OK   Trying to add the connection     The connection has been added     7  The scomu   add command allows you to only define one XIV Storage System IP address  at a time  Repeat the   add command for each XIV Storage System management IP  address  You must
461. nario means that data is initially distributed over all of the drives in the XIV Storage  System configuration  There are no restrictions on the normal functions  The full performance  capacity of all modules in the rack is used  even though some of the modules are unused  CoD modules     The basic configuration rule to keep in mind about the XIV Storage System Gen3 CoD  program is that there can be only up to three de allocated CoD modules in the configuration   This configuration means that every valid CoD configuration always has one  two  or three  de allocated CoD modules in the configuration     There are several considerations for Model 114 and Model 214 CoD configurations      gt  The minimum CoD system configuration is six modules  This configuration requires a  minimum of three and a maximum of five CoD activation features  between three and five  modules are already purchased and between one and three modules are available  for purchase      66 IBM XIV Storage System Architecture and Implementation     gt  The next valid CoD configuration is nine modules  This configuration requires a minimum  of six and a maximum of eight CoD activation features  between six and eight modules are  already purchased and between one and three modules are available for purchase       gt  Participation in the CoD program is valid if there are unactivated CoD modules in the  system      gt  When activating  allocating  CoD modules  ensure that there are remaining unactivated  CoD modul
462. nce  scalability  and ease of  management while harnessing the high capacity and cost benefits of serial attached SCSI   SAS  drives  The system uses off the shelf components  therefore allowing for faster  adoption of newer generation hardware     The XIV Storage System incorporates fully automated recovery processes  A data  redistribution takes place automatically after new hardware is added  removed  or has failed   Only the data necessary to keep the system fully redundant is redistributed  minimizing  recovery time and data movement  Because of this powerful distribution algorithm  the  performance is always consistent     The virtualized grid architecture and algorithms that are used divide the host data into 1 MB  partitions and distribute them pseudo randomlly across all disks  leading to a consistent load  on all components and eliminating hotspots  During the distribution process  the data is  always mirrored by ensuring that each 1 MB partition is kept in at least two separate locations  within the system     Clients receive exceptionally low total cost of ownership because the system software  licensing includes quality of service  QoS   snapshots  thin provisioning  data migration   asynchronous and synchronous mirroring  and an intuitive GUI  combined with dramatic  efficiencies in capacity  power  and space  Because of the unique physical architectural  design of the system  including off the shelf modules  network switches  and power  components  new technolo
463. ncepts  see 2 7     Capacity allocation and thin provisioning    on page 37     Global administrators and domain administrators   To facilitate the creation and subsequent management of domains  the XIV Storage System  11 5 code release introduces the concepts of global administrators and domain  administrators      gt  A global administrator is a user who is not associated with any domain and that has  access rights  as implied by the user   s role  such as  storageadmin  to all of the entities  that are not uniquely associated with any domain      gt  Conversely  a domain administrator is a user who is associated with one or more domains  and has access rights  as implied by the user   s role  such as  storageadmin  to the entities  uniquely associated with his or her associated domains     4 8 2 Managing domains with the XIV Storage Management GUI    In this section  we describe how to manage domains using the XIV Storage Management  GUI  The topic we cover include      gt  Creating domains   Viewing and editing domain properties  Managing domain associations   Viewing domain associations   Limiting domains by performance class  QoS   Deleting domains    YYY V Yy    Managing domains with the XIV Storage Management GUI is fairly simple and intuitive  The  domains page can be reached either through the View     All Systems     Domains option in  the menu bar or from the Domains option in the Systems function icon on the left  as shown  in Figure 4 75        Connectivity j  C
464. ncipalName   Secure LDAP   Group Attribute  memberOf   Bind  amp  Cache      Test  amp  Activation  Finish       Figure 5 57 Unique ID   s tab       13 Ask your LDAP admin for the value of those parameters in your environment  Click Next to  save the settings and proceed     14 In the Groups tab that is shown in Figure 5 58 on page 257  you must define the group  attributes that the XIV Storage System considers for the permissions  These groups must  be defined in LDAP     256 IBM XIV Storage System Architecture and Implementation    LDAP Configuration   Directory Services Groups    Directory Services Groups  a5 Enter the full DN  Distinguished Name  of the groups that will be used to  Server Type provide the StorageAdmin and the ReadOnly permission s to the LDAP users   Adding Directory Services users to these groups will provide them with the  LDAP Servers proper privileges on the XIV system     XIV User       Storage Admin Role    CN xIVAdmins CN Users D                 Unique ID s          Groups l Read Only Role   CN XIVReadonly CN Users    Secure LDAP       Bind  amp  Cache     Test  amp  Activation      Finish            SE  lt n Gs coe    Figure 5 58 Groups tab       Our example has an LDAP group named XIVAdmins and another one named XIVReadonly     15 Define the role with the complete DN path  In our example  the Admin role is  CN XIVAdmins CN Users  DC itso  DC storage  DC ibm DC com and the Read Only  role is CN XIVReadonly CN Users  DC ibm DC storage  DC ibm DC co
465. nd application administrators  as well as read only  users retain their rights to perform the same operations that they have in an environment  that is not based on domains  However  the operations are limited to the resources within  the domain      gt  Storage allocated to a domain can be used to create pools within that domain    gt  A pool  and its volumes  can be associated with only one domain      gt  Hosts  clusters  and targets can be associated with domains in a non exclusive  shared   manner      gt  Resources that are not associated with any domain are accessible only to global  administrators      gt  Quality of service can be set independently for each domain and can be used to limit the  bandwidth or IOPS allowed for a domain or for the storage pools within a domain     2 5 System capacity    The XIV Storage System has two different concepts of storage capacity      gt  Net usable capacity   gt  System reserve capacity    32 IBM XIV Storage System Architecture and Implementation    2 5 1 Net usable capacity    Net usable capacity is the available data storage capacity that comes with the purchased XIV  System configuration  It is a function of the drive size  1 TB  2 TB  3 TB  or 4 TB  and the  number of modules     The calculation of the net usable capacity of the system consists of the total disk count  less  disk space reserved for sparing  which is the equivalent of one module plus three more  disks   This number is then multiplied by the amount of capacity
466. nee would be different for each different disk system     The main point that we want to make here is that the goal is to run production workloads in  the horizontal section of the curve  As you monitor performance  if you begin to notice that  response times are increasing significantly over their normal levels  it is time to determine the  cause before the application owners begin to complain  There are many things that can cause  response times to increase in this way  such as the following reasons      gt  Fibre Channel or iSCSI SAN network issues   gt  Host performance issues causing the I Os to be delivered slowly   gt  Pushing the XIV configuration to its performance limits     operating in the knee        Prolonged periods of high response times associated with high IOPS or bandwidth use is  typically an indication of a performance problem  This can occur because of failure to adhere  to preferred practices at the logical configuration level at any or all stages of the I O path and  as a result of an insufficient storage hardware configuration to meet the peak I O workload  demands  It is critical to consider both avenues  and not just one in isolation  The former issue  can be investigated by using the XIV Storage System GUI in conjunction with host  configuration and monitoring tools to identify potential bottlenecks or non ideal  implementation practices based on the concepts presented in this chapter     The other possible action is to evaluate the potential perfo
467. nfig_get and config_set  as shown in Example 7 42 on page 387     386 IBM XIV Storage System Architecture and Implementation    Example 7 42 XIV Storage System SNMP commands    XIV_1312611 gt  gt config_ get  Name   dns_primary   dns_ secondary   system name  snmp_location   snmp contact    Value    smtp default    Snmp_community XIV  snmp_trap community XIV  Snmp_ type V2C  snmpv3_user   Snmpv3_ encryption type AES  Snmpv3_encryption_ passphrase E  snmpv3_authentication_type SHA  snmpv3_authentication_passphrase ee  system id 40010  machine type 2810  machine model 214  machine serial number 1340010    email sender _address   email reply to address   email subject format  internal email subject_format  iscsi_name   maximal _snapshot_deletion priority     severity    description     iqn 2005 10 com xivstorage 040010  A    timezone 0   fc_proof yes   ntp_ server   ups_ control yes  Support_center_port_ type Management  isns_ server     ipv6 state enabled  ipsec_state disabled  ipsec_track_ tunnels no  impending power_loss detection method UPS    XIV_1312611 gt  gt config_set name snmp_location value IBM Mainz    Command executed successful ly    XIV_1312611 gt  gt config_get name snmp_location  Name Value  snmp_location IBM Mainz    7 6 3 Using SNMP get or walk commands with open source software    You can test SNMP get and walk commands to an XIV Storage System using the open  source software package net snmp on a Windows workstation  This package provides a tool  to compile 
468. ng architecture    on page 43   2 9     Encryption for data at rest    on page 45   2 10     Reliability  availability  and serviceability  RAS     on page 46    YY YYY V Yy       Copyright IBM Corp  2014  All rights reserved  17    2 1 Architecture overview    IBM XIV Storage System Gen3 carries on the XIV tradition of providing several architecture  design factors that contribute to its unique operational capabilities      gt  Virtual  grid based array design  to minimize storage complexity    gt  Self tuning and self healing  to deliver performance and availability without manual tuning      gt  Easy storage management and provisioning  an intuitive graphical user interface  GUI  to  simplify the storage operation within a virtualized storage architecture      gt  Enhanced connectivity and reliability  to strengthen the end to end performance without  disruption to the service      gt  Innovative caching with optional flash cache  coupled with high density storage  to reduce  the footprint and address energy efficiency while sustaining performance     2 1 1 Features    The XIV Storage System architecture incorporates various features designed to uniformly  distribute data across internal resources  This unique data distribution method fundamentally  differentiates the XIV Storage System from conventional storage subsystems  offering  numerous availability  performance  and management benefits across both physical and  logical elements of the system     The XIV Storage Syst
469. ng data  These filters are  separated by the type of transaction  reads or writes   cache properties  hits compared to  misses  and cache memory hits or flash  SSD  cache hits  or the transfer size of I O as seen  by the XIV Storage System  The filter pane has been updated to reflect support for SSD  Caching and to filter between read I Os from the main cache  Mem Hit  and read I Os from  the extended SSD cache     Figure 6 10 shows the filter pane                rrr Interfaces   ORea   Omt  CMemHt   Oo08 kB   64512 KB    G IOPS        ira  2    Hour        mu FE O Tp en i    vine    WSs    gt L AN  J ow KD  ds C Meth ra  KB     catentcy PENE ENEE eis        Figure 6 10 Filter pane for the statistics monitor    Chapter 6  Performance 305       306    The filter pane allows you to select multiple items within a specific filter  for example  if you  want to see reads and writes separated on the graph  By holding down Ctr1 on the keyboard  and selecting the read option and then the write option  you can see both items on the graph     As shown in Figure 6 11  one of the lines represents the read IOPS and the other line  represents the write IOPS  On the GUI  these lines are drawn in separate colors to  differentiate the metrics  The other most popular speed metric is bandwidth  BW    measured in MBps     This selection process can be performed on the other filter items as well     All Interfaces            i Read   Write      OPS    36 000  34 000  32 000  30 000  28 000  26 000
470. ng order    The IOPS  latency  or bandwidth for up to four volumes or four hosts can be viewed in the  Performance Chart section  The controls to select the volumes  hosts  and options operate in  much the same way as the Statistics tool from within the GUI  Figure 6 25         xiv Top   XIV_02_1310114      All Interfa x    Refresh every  4   seconds                   Volumes  amp  Hosts       Performance Chart              ITSO_Blade5_Perf   WS_ESX_5_1   WS_ESX_4 1  WS_ESX 11          13 55 09 13 55 14 13 55 19 13 55 24 13 55 29 13 55 34 13 55 39 13 55 44 13 55 49 13 55 54 13 55 59 13 56 04  September 19  2013       Figure 6 25 Display performance information for up to four volumes or hosts with XIV Top    Chapter 6  Performance 315    6 3 3 Using the XIV Storage System command line interface    The second method to collect statistics is by using the XIV Storage System command line  interface  XCLI  operation  To access the XCLI Session  see Chapter 4     IBM XIV Storage  Management software    on page 111     First  you must retrieve the system   s time  To retrieve the system   s time  issue time_list  and  the system retrieves the current time  See Example 6 1 for an example of retrieving the XIV  Storage System time     Example 6 1 Retrieving the XIV Storage System time     gt  gt  time list  Time Date Time Zone Daylight Saving Time  11 45 42 2010 09 27 GMT no    After the system time is obtained  the statistics_get command can be formatted and  issued     The statistics
471. ngly  Leave these  fields blank to use the standard ports  Server port 389  secure server port 636      260 IBM XIV Storage System Architecture and Implementation    Define LDAP Server       naar ene  masse pam    Figure 5 67 Define LDAP servers    FODH      itso  storage ibm com   Server Address     9 155 113 143   Search DN      CN Us ers  DC itso DC storage  DC ibm L  Server Port    Server Secure Port    Certificate File        In a default Active Directory implementation  for example  a server with the Domain Name  ldap domain de maps to CN Users  DC Ildap  DC domain DC de     6  Click Create to save these settings     LDAP settings     7  Click User Credentials to define the Service User DN  which is used to verify your    In Figure 5 68  you can see that a service user named XIV is defined using a complete    Service User DN  which in this example is    CN XIV CN Users  DC itso  DC storage  DC ibm DC com     Enter and confirm the user password     LDAP  General Service User DN  Password   CETEL TI   LDAP Servers A  Confirm Password TTTTTTT     User Credentials  Role Mapping  Secure LDAP    Parameters    Figure 5 68 LDAP Configuration  User Credentials tab       x CN XIV Chl Users DC zitso DC storage D       Chapter 5  Security    261    8  Click Role Mapping to enter the LDAP attributes that you want to use for the XIV Storage  System login  See Figure 5 69 for an illustration of the values for Microsoft Active Directory  that we used in our example         User ID Attr
472. ngs     Manage  Certificates to open the Certificates Management panel     In the panel  click the Import Certificate icon  as shown in Figure 5 5     Certificates Management       __Authenticate import Certificate   pem    p12        p  close    Figure 5 5 Import certificate  PEM file        6  After the Import Certificate window opens shown in Figure 5 6 opens  click Browse to  open a file browser window and select the signed certificate file  In our example  the  signed certificate file is named itsoCertificate pem     Import Certificate    pem    p12     m Ea   i   Bra te p  Certificate    pem    p12      op ITSOlitsoCertificate pem  Services     All    XCLI    IPSec  w  CIM  Name    Password             Figure 5 6 Import signed certificate  PEM file     Click the corresponding check boxes to select the services that you would like to use this  certificate for  The following options are available     All Use this certificate to secure all communications   XCLI Use this certificate to secure XCLI communication only   IPSec Use this certificate to secure IPSec traffic  for more information    about IPSec  see 5 4     Configuring Internet Protocol Security  connectivity    on page 217      CIM Use this certificate to secure Common Information Model  CIM   agent communications only     212 IBM XIV Storage System Architecture and Implementation    If the certificate type is PCKS12   p12 file extension   enter values for the Name and  Password for the certificate     Click Impo
473. nhances the system high availability and disaster recovery options     3 way mirroring  XIV Gen3 Model running system software version 11 5 0 or later is  required in supporting three way replication feature   Gen2 models are not supported     8 IBM XIV Storage System Architecture and Implementation    1 6 XIV Storage System Software    XIV Storage System Software Version 11 5 x  in conjunction with XIV Gen3 systems   provides the functions of the system  which include the following features      gt     Bundled advanced features     All the features of the XIV Storage System  including advanced features  such as  migration and mirroring  are included at no additional charge and apply to the entire  storage capacity     Non Disruptive Code Load     System software code can be upgraded without requiring downtime  This feature enables     non stop    production environments to remain running while new code is upgraded     The code upgrade is run on all modules in parallel and the process is fast enough to  minimize the impact on host applications     No data migration or rebuild processing is allowed during the upgrade  Mirroring  if any  is  suspended during the upgrade and automatically reactivated upon completion     Storage management operations are also not allowed during the upgrade  although the  status of the system and upgrade progress can be queried  It is also possible to cancel the  upgrade process up to the point of no return     Support for flash  SSD  caching     
474. nique software and hardware that  provide Fibre Channel and IP network Small Computer System Interface  iSCSI  host  connectivity     Chapter 3  IBM XIV architecture  components  and planning 63    Important  Disks of different sizes cannot be intermixed within the same XIV Storage  System configuration  XIV Storage System Software Version 11 0 1 or later is required for  using 3 TB disks  Also  XIV Storage System Software Version 11 4 0 or later is required for  using the SAS SED drives in 2 TB  3 TB  or 4 TB and XIV Storage System software  Version 11 5 1 or later is required for using the SAS SED drives in 6 TB     The bottom of the rack contains three uninterruptible power supplies  UPSes  that supply  power to all XIV Storage System components  They also provide enough battery backup  power for emergency shutdown if main power is lost for more than 30 seconds     A maintenance module and two InfiniBand switches are installed near the middle of the rack   just above module 6  The InfiniBand network provides redundant and fast communication  paths between the modules  This grid network ensures communication between all modules  even if one of the switches or a cable connection fails  It also provides the capabilities for  parallelism and the execution of a data distribution algorithm that contributes to the  performance of the XIV Storage System     All cabling between the modules and switches  including the internal power connections  are  fully redundant using two sets o
475. nk  Figure B 18 shows that  the certificate issued to and by the xivstorage CA is valid        General  lssued To  ERMAILADDRESS cag xivstorage on  CN sivstorage  O xivstorage  L Tucson  ST Arizona  C U5  Issued By  EMAILADDRESS camxivstorage on  CN sivstorage  O sivstorage  L Tucson  5T Arizona  C U5  Valid From  6 29 09 2 24 PM  Expires On  6 29 10 2 24 PM  Type  X509  Serial Number  0  Signature   Bm 15 bObe 6  Signature Algorithm  MOSwithRsaA  Public Key     Sun RSA public key  1024 bits   modulus  150536730995091 0675936705684 90000314 91869988263 283 796281764 88886448082 96689992063 936025114  1187158262602 07 280255 942458541 747085068 94 01681538502256584 090033 974 6303836665 963504 2876751283164 927  321393827597558264985346828836943619731303484 9297 67031031717008539702750869126516194155733126618341  65290624 03 98868860683   public exponent  65537    Version  3          Figure B 18 Certificate information for xivstorage certificate authority    To activate the imported certificate  click Directory Servers  gt   xivhost2 storage tucson ibm com 389     Security  In the General tab  click the  Certificate drop down menu and select xivstorage org sample CA certificate  as shown  in Figure B 19 on page 458     Appendix B  Additional LDAP information 457    Directory Servers  gt  xivhost2 storage tucson ibm com 389    Server Operation    Suffixes Entry Management             Schema Security ServerConfiguration                                   Seneral Certificates CA C
476. nly  For more assistance and directions  see  the IBM XIV Storage System Management Tools Version 4 0 User Guide  SC27 4230 00     Root user operations   The menu that is shown in Figure 5 37 on page 233 list various configuration options for the  Hyper Scale Manager tool  which is available for the root user  Security options are under 5  and 6  The Hyper Scale Manager user must log in to the Hyper Scale Manager with root  credentials to access the menu items  See IBM XIV Storage System Management Tools  Version 4 0 User Guide  SC27 4230 00  for instructions     The LDAP server is set up during the installation of Hyper Scale Manager  See 4 3     XIV  Storage Management software use    on page 117     232 IBM XIV Storage System Architecture and Implementation    IBM Hyper Scale Manager is running    1  Server Configuration Options   2  Gather Manager Logs   3  Show Audit Log   4  Show Upgrade Logs   5  Manager Inventory Options   6  Backup Restore Options   7  Change  root  Password   8  Change  maintenance  Password   9  Change Manager Access Code   10  Start Stop Hyper Scale Manager Service  11  Replace Hyper Scale Manager Certificate  12  Change XIV GUI Communication Ports   13  Change RESTful Interface Port   14  Upgrade Hyper Scale Manager   15  Reboot   16  Shutdown   17  Exit  Your Selection gt     Figure 5 37 Root user menu window    Tip  A good practice is to configure at least one admin level credential  user ID and  password  to be the same as the MSMS login crede
477. nly take care  with the size allocation and reallocation  The name of a storage pool must be unique in the  system     Pool size  The size of the storage pool is specified as an integer multiple of 10   bytes  but  the actual size of the created storage pool is rounded up to the nearest integer multiple of  16x2     bytes  According to this rule  the smallest pool size is 17 GB     When creating a storage pool  the system initially provides a default snapshot size of 10    However  you might want to adjust this value  depending on how snapshots are used  your  workload characteristics  and your requirements for how long snapshots must be kept  This  value can be set at the time of creation or dynamically changed later  depending on   your needs     Snapshot size  The snapshot size  default or specified  is a subset of the specified pool  size  It does not allocate more space     Sizing must consider volumes that are to be added to  or exist in  the specific storage pool   the current allocation of storage in the total system capacity  and future activity within the  storage pool  especially regarding snapshot propagation from creating too many snapshots   Upon depletion of space in a pool  the system progressively deletes snapshots in the pool to  free up space for additional write requests  For more information  see Chapter 1     Snapshots      in IBM XIV Storage System Business Continuity Functions  SG24 7759     The system enables the assignment of the entire available cap
478. nnel  We describe the Call Home function  secure remote support  and repair  procedures  Finally  the Host Attachment Kit now offers a data collection feature that can be  used for problem analysis  It is described at the end of this chapter        Copyright IBM Corp  2014  All rights reserved  327    7 1 Monitoring with XIV Storage Management GUI and XCLI    The XIV Storage Management graphical user interface  GUI  and XIV Storage System  Command Line Interface  XCLI  include many features that allow you to monitor the system   These features include monitoring for alerts  events  and failed components     7 1 1 Monitoring by using the Systems menu    You can show the health state  alerts  and events for multiple IBM XIV systems from the  Systems menu  By selecting the Systems view  as shown in Figure 7 1  you can work witha  particular storage system or show All Systems Alerts or All Systems Events for every XIV  Storage System defined to the GUI  The Systems menu does not offer multiple selections  when only one XIV Storage System is defined to the GUI            Connectivity    ED       on  j   Ties       O      O lt               osan      All Systems Alerts  _ All systems Events         Figure 7 1 Systems menu view    The All Systems window   If you select All Systems  you are taken to a view showing all the defined IBM XIV systems   By default  the current input output operations per second  IOPS  for each XIV Storage  System is displayed  However  by right clicking th
479. nt notification is pushed via Notification Service Provider  Apple or Google  to the    registered mobile client as shown in Figure 7 50            Apple Push    Service Center receives call home events Notification Service    IBM XIV  Connected via XIV Mobile Dashboard Major event on XIV Gen3P1 01c   Network interface to  1 MaintenanceModule 16 on 1 NIC   2 5   link disconnected     Close Launch       Figure 7 50 Push Notification process flow    Notifications       An auto login feature allows users to tap on the notification event and automatically log in to    the system  These system settings can be edited at any time     After you are logged in to the system  the Events view shows all relevant notifications as set    by the demand minimum severity filter  Note that this events view is a new element  the    Events icon is at the bottom  in Version 1 4 of the IBM XIV mobile dashboard  as illustrated in  Figure 7 51   This screen capture is based on an early version of the code  so the rendering    might be somewhat different in the final version      Chapter 7  Monitoring    369    370    Settings re    Full Redundancy    Time Frame  Local Time  Minimum Severity    s Last  Days Mior Major Ci    Major 27 06 14 16     XIV_PFE2_1340010   UPS_PREDICTIVE_RUNTIME_TOO_LOW    Critical 27 06 14 16 08 5  XIV_PFE2_1340010  Test for Mobile Push Notification    26 Jun  6     Major 26 06 14 09 06 3    XIV_PFE2_1340010  FC port 1 FC_Port 8 2   link  disconnected        Volumes    Figure
480. nt with conventional  storage subsystems  while maximizing the overall usefulness of the subsystem     The XIV Storage System virtualization offers the following benefits    gt  Easier volume management         Logical volume placement is driven by the distribution algorithms  freeing the storage  administrator from planning and maintaining volume layout  The data distribution  algorithms manage all of the data in the system collectively without deference to  specific logical volume definitions         Any interaction  whether host or system driven  with a specific logical volume in the  system is inherently handled by all resources  It harnesses all storage capacity  all  internal bandwidth  and all processing power currently available in the system         Logical volumes are not exclusively associated with a subset of physical resources   e Logical volumes can be dynamically resized     e Logical volumes can be thinly provisioned  as described in 2 7     Capacity allocation  and thin provisioning    on page 37      gt  Consistent performance and scalability         Hardware resources are always used equally because all logical volumes always span  all physical resources and are therefore able to reap the performance potential of the  full system and maintain data integrity     e Virtualization algorithms automatically redistribute the logical volumes    data and  workload when new hardware is added  maintaining the system balance while  preserving transparency to the attac
481. ntials  user ID and password      Server admin operations  The menu that is shown in Figure 5 38 on page 234 is the Manager Inventory Options menu     Using this menu  the administrator can manage the inventory of XIV systems monitored by  the Hyper Scale Manager and control their status    From a security standpoint  the following options are available     gt  Reauthenticate all users     This option forces the reauthentication of all GUI logged in users on all XIV  This option  can be used when there is an authentication change for users and you want it to take  effect immediately      gt  Changing the System Machine Account password     The System Machine Account is a system user that monitors the system on the  Hyper Scale Manager  The password can be changed either from the root menu or via the  GUI  In addition  the password must be changed on all systems      gt  Changing the server admin password   This menu option changes the System Machine Account password     See the  BM XIV Storage System Management Tools Version 4 0 User Guide   SC27 4230 00  for instructions     Chapter 5  Security 233    IBM Hyper Scale Manager is running     1  System Inventory List   2  Add System   3  Modify System   4  Remove System   5  System Monitoring Suspend   6  System Monitoring Resume   7  Re authenticate All Users   8  Change System Machine Account  9  Manage System Certificates  10  Manage Capacity Planning Data  11  Back to previous menu  Your Selection gt        Figure 5 38 Mana
482. ntinuity Functions  SG24 7759     Proactive phase out and self healing mechanisms   A further enhancement to the level of reliability standards attained by the XIV Storage System  entails self diagnosis and early detection mechanisms that automatically phase out  components before they actually fail     In real systems  the failure rate is not constant over time  but rather increases with service life  and duty cycle  By actively gathering component statistics to monitor this trend  the system  ensures that components do not operate under conditions beyond an acceptable threshold of  reliability and performance  Therefore  the XIV Storage System self healing mechanisms  increase the already high level of availability of the system even further and also safeguard  critical operations  such as a rebuild from further component failures     Total cost of ownership  TCO  is an important advantage of the XIV Storage System  The  self healing mechanisms make service actions less frequent  When service actions are  necessary to replace drives or modules  the XIV has already automatically undergone rebuild  and redistribution tasks to adapt to the changing configuration  After component replacement   the XIV Storage System automatically absorbs the new hardware into the new configuration   The XIV Storage System leads the industry in the amount of time that is required to adapt to  the new configurations  All of these provisions together minimize maintenance time and costs  and are ke
483. nts of this severity or higher trigger the defined rule     Select the event code trigger  Select the event code to trigger the rule   s activation from  the drop down list  The list of event codes is predefined and cannot be modified  See  the XCLI User Manual  GC27 2213  for a list of all the available event codes and  descriptions to choose from     Rule destinations  Select destinations and destination groups to be notified when the  event s condition occurs  Here  you can select one or more existing destinations or also  define a new destination  See Figure 7 47      364 IBM XIV Storage System Architecture and Implementation    Wizard   Rule Create   Rule destinations X       Domain Select destinations and destinations groups to be notified when the events    condition occurs   Unselected Destinations Selected Destinations         Destination   ei      lt  Create Destination            Snooze x Create Destination    Escalation      Finish             lt    lt o     Figure 7 47 Select destination        Rule snooze  Defines whether the system repeatedly alerts the defined destination  until the event is cleared  If so  a snooze time must be selected  Check Use snooze  timer and enter a snooze time in minutes         Rule escalation  Allows the system to send alerts by other rules if the event is not  cleared within a certain time  If so  an escalation time and rule must be specified     i  Check Use escalation rule    li  Click Escalation Rule    iii  Enter an escalation 
484. nz user group is empty and has no associated host  The next step  is to associate a host or cluster     2  Associate the application_Mainz user group to the Application_host01 host  as shown  in Example 5 7   Example 5 7 XCLI access_define     gt  gt access define user _group Application03 Mainz host Application_ host0l  Command executed successfully     A host has been assigned to the user group  The user group does not have any  users included     3  Add the first user  as shown in Example 5 8     Example 5 8 XCLI user_group_add_user     gt  gt user_group add_user user _group Application03 Mainz user lab_user  Command executed successfully     The user lab_user has been assigned to the Application03_Mainz user group  This user is an  applicationadmin with the Full Access right set to no     5 5 5 Password management and resets    Password management in native authentication mode is internal to the XIV Storage System   The XIV Storage System has no built in password management rules such as password  expiration  preventing reuse of the same passwords  or password strength verification   Furthermore  if you want to log on to multiple systems at the same time through the XIV  Storage Management GUI  your user ID must be registered with the same password on all  XIV systems that are managed by the XIV Storage Management GUI     In native authentication mode  if users can log in  they can change their own passwords     Chapter 5  Security 237    The predefined admin user is the 
485. o dc storage dc ibm dc com  D  cn Manager dc itso dc storage dc ibm dc com  w PASSWOrd uid itso description  dn  uid itso ou Users dc itso dc storage  dc ibm dc com   description  XIVAdmins    We can assign the    XIVReadonly    value to the description attribute  or any other defined  application admin LDAP role in the XIV      We can now test  with XCLI  if that user can authenticate with the LDAP server and has the  correct XIV role mapping  as shown in Example 5 29     Example 5 29 Testing if an LDAP user has the correct XIV role mapping permission     gt  gt ldap_ test user itso password PasswOrd fqdn itso storage ibm com  Command executed successfully     lf a user does not have a value  or an incorrect value  in the description attribute  then an  appropriate error is displayed  as shown in Example 5 30     Example 5 30 Testing an LDAP user without correct XIV role mapping permission     gt  gt Idap_test user PHB password n0ldea fqdn itso storage  ibm com  Error  LOGIN FAILURE_USER MISSING GROUP ATTRIBUTE   Details  User PHB is missing the group attribute    description       gt  gt Idap_test user Wally password KOffee fqdn itso storage  ibm com  Error  LOGIN FAILURE USER HAS NO RECOGNIZED ROLE   Details  User Wally has no recognized LDAP role     Activating LDAP authentication    After you can confirm LDAP users are tested successfully with the correct LDAP permissions   you can enable LDAP authentication by changing the XIV Storage System LDAP mode using  the Idap_se
486. oS limitations  1 K  5 K  and   10 K   In each test  both applications start simultaneously  The noncritical application uses  the QoS after applications first run concurrently for 5 to 10 minutes  Within one minute after  enforcing QoS  the critical application shows performance improvements     302 IBM XIV Storage System Architecture and Implementation    The critical application in Figure 6 6 shows an IOPS improvement from 15 K to 27 K  76   by  limiting noncritical OLTP host application IOPS to 1 K  The critical OLTP host application  IOPS also improved to 53  and 23   respectively  after limiting noncritical host applications  to 5 K and 10 K     IOPS  Six Interface Module   OLTP Application vs  OLTP Application  IOPS Limit 1K 10K    30000 r 30000          1K   OLTP Application                                                       25000 7 T 25000    ome 1 K OLTP Applicatiion  Critical   20000            20000  0    p        5K  OLTP Application  6 15000   15000             5K  OLTP Applicatiion  Critical   10000      T 10000         10K  OLTP Applicatiion  5000 r 5000  om 10K OLTP Applicatiion  o 0  Critical   Elapsed Time       Figure 6 6 QoS illustration IOPS    The average I O response time in both shows similar behavior  The largest response time   RT  was at the 1 K IOPS limit  as shown in Figure 6 7                                RT  Six Interface Module   OLTP Application vs  OLTP Application  IOPS Limit 1K 10K   300 300   250 4   250   200     200   1K  OLTP Appl
487. obile Dashboard             0 00 00 eee eee 351  7 2 2 Mobile Dashboard for Android deviceS             0000 eee ees 356  7 2 3 IBM Storage Mobile dashboard             2 0 00 cece eee 357   7 3 XIV Storage System event notification           0 0 0  eee 359  7 3 1 Configuring the XIV Storage System to send notifications                   359  7 3 2 Setting up event notification      0    eee 359   74  Mobile  push NounCatlon swia8 oeaath cies et oa LeGrand a eae awards 368   7 5 Call Home and remote support          0 0 0    eee eee 371  7 5 1 Call Home feature        nnana Roa ee eee ea Se oe Bee See wees 372  1 0 2 Remote SUDDON  wis jet eG ara eee ee ee a See e eee eS 372  7 5 3 XIV Remote Support Proxy       0 0 0    cc eens 380  FO Ac MSTA ATOM a su of bate Sse cae Se ee  ana edie Gu in ero a SE Bee ah ee eee Se 381   7 6 Simple Network Management Protocol based monitoring                       384  HOA INFONILOMN GOONS    a  struc arto ene  Gta Oe ta eer de Ye al laf A Pa ee ea ence NA 384  7 6 2 Using SNMP commands to confirm the XIV Storage System status           386  7 6 3 Using SNMP get or walk commands with open source software              387   7 7 Using Tivoli Storage Productivity Center           0 0 0  390  7 7 1 Setting up and discovering XIV systems in Tivoli Storage Productivity Center    390  7 7 2 XIV Storage System Tivoli Storage Productivity Center reports              396  7 7 3 Tivoli Storage Productivity Center web based GUI                   005  4
488. obile Dashboard    Fran IBM Storage      ppna iTunes n  r du vill k  pa och h  mta appar        Gratis   Kategori  Naringsliv  Uppdaterad  16 aug 2014  wersion  1 5 2   Storlek  34 2 WE   Spr  k  engelska  Utvecklare  International  Business Machines Corporation     2013 2014 Copyright  IEMA orp    Alde rsgr  ns 4     Kompatibilitet  Kraver ios  6 1 eller senare  Kompatibel  med iPhone  iPad och iPod  touch  Appen   r optimerad f  r  iPhone 5     Kundbetyg    Det finns inte tillr  ckligt  manga betyg f  r att visa ett  genomsnitt f  r den senaste  versionen av denna detta  Programm     Fler iPhone appar  fran IEM Storage    Figure 7 37 IBM Storage Mobile Dashboard    Eeskrivning    Wisa mer fran den har utwecklaren    IBM Storage Mobile Dashboard is a free application that prowides basic monitoring capabilities for IBM storage  systems  Storage administrators can securely check the health and performance status of their IEM Storage    systems by viewing events as well as real time performance metrics     Support fir IEM Storage Mobile Dashboard      Nyheter i version 1 5 2      Bug fixes    iPhone skarmavbild    mo System       Lee  i T    Pa L E    IBM XIV Storage System Architecture and Implementation       Flash Demo System        Remote Copy  50 233 604       interlace Bandwidi      F SS  929 1 191 54    Mpa Mis ME    7 3 XIV Storage System event notification    The XIV Storage System allows you to send alerts by email  SMS messages  and  SNMP traps     7 3 1 Configuring 
489. obile Dashboard  you have the choice to either run in Demo  Mode or to connect to an actual XIV Storage System  Demo Mode can be accessed by  selecting the Demo Mode option indicated by an arrow in the lower right corner of the display   as shown in Figure 7 29 on page 352     Chapter 7  Monitoring 351    352       IBM XIV  Mobile Dashboard       Figure 7 29 IBM XIV Mobile Dashboard Demo Mode    To log on to an actual XIV Storage System  use a valid user  password  and IP address  as  shown in Figure 7 30     User Password    itso  20000008  System IP DNS    9 155 51 68 Connect    Wa ER ER We ENES ESKI ETS  E ee Oe es ee a  a    Figure 7 30 Logging on to an XIV Storage System from the IBM XIV Mobile Dashboard    After you are connected to the XIV Storage System  you can view volume performance or  host performance     Each window also shows the health and redundancy state of the XIV Storage System  The  iOS device has a screen rotation capability  therefore  the output can be shown in either  landscape or portrait mode     The IBM XIV Mobile Dashboard behaves differently depending on which mode you use to  show the output     If you are having issues with screen rotation  consult the following website   http   support apple com kb HT4085    IBM XIV Storage System Architecture and Implementation    Volume performance    Volume performance is shown when the iPad is in landscape mode  as shown in Figure 7 31   From this window  you can see up to 120 seconds worth of performance 
490. ograms in source language  which illustrate programming  techniques on various operating platforms  You may copy  modify  and distribute these sample programs in  any form without payment to IBM  for the purposes of developing  using  marketing or distributing application  programs conforming to the application programming interface for the operating platform for which the sample  programs are written  These examples have not been thoroughly tested under all conditions  IBM  therefore   cannot guarantee or imply reliability  serviceability  or function of these programs        Copyright IBM Corp  2014  All rights reserved  Ix    Trademarks    IBM  the IBM logo  and ibm com are trademarks or registered trademarks of International Business Machines  Corporation in the United States  other countries  or both  These and other IBM trademarked terms are  marked on their first occurrence in this information with the appropriate symbol     or       indicating US  registered or common law trademarks owned by IBM at the time this information was published  Such  trademarks may also be registered or common law trademarks in other countries  A current list of IBM  trademarks is available on the Web at http   www  ibm com legal copytrade shtml    The following terms are trademarks of the International Business Machines Corporation in the United States   other countries  or both     AIX   IBM Flex System   Storwize    DS6000    NetView   System p    DS8000   POWER   System Storage    Flash
491. ollowing topics      gt  IBM XIV Storage System Gens   gt  Hardware planning overview       Copyright IBM Corp  2014  All rights reserved     61    3 1 IBM XIV Storage System Gen3    The XIV Storage System Gen3 Model 214 shares all of the concepts and software  architecture of its predecessor Model 114  Compared to the Model 114  the Model 214  consists of hardware upgrades that deliver significant performance improvements  The  primary hardware component upgrades are in the following areas      gt  Interface and data modules    Processor   Memory   Power Supply Unit   1 TB   2 TB  3 TB  4 TB  and 6 TB serial attached SCSI  SAS  self encrypting drives   SEDs    400 GB flash drive cache option or 800 GB flash drive with 4 TB configurations     gt  Interface modules      Two port 10 GbE adapter    The XIV Gens  shown in Figure 3 1  is a scalable enterprise storage system based on a grid  array of hardware components  The architecture offers the highest performance through  maximized and balanced use of all disks  a true distributed cache implementation that  produces exceptional performance  It also offers superior reliability through its distributed  architecture  redundant components  self monitoring  and self healing attributes        eoi    oA   fo er    A oo a  ie hiii a        i Tata    i      jot Ja mii a   i a  y m ii  a jr tte ial A   a           Dei 1 a    a WE    ioe pee    Figure 3 1 IBM XIV Storage System Gen3  Front and rear views    1 The 1 TB drives are actually
492. omains  the additional association must  be made from the Domains view  as explained under    Managing domain user associations     on page 189     Chapter 5  Security 223    With the introduction of domains  there are two levels of authority for a user in a specific role    gt  Domain administrator    A user who is associated with one or more domains is a domain administrator and has  access rights  as implied by the user   s role  such as readonly or storageadmin  to the  entities uniquely associated with the pertinent domains      gt  Global administrator    A user who is not associated with any domain is a global administrator and has access  rights to all of the entities that are not uniquely associated with a domain     A global administrator who is a storageadmin can create  edit  and delete domains and  can associate resources with a domain     An open or closed policy can be defined so that a global administrator may  or may not  be  able to extend the reach into a domain    Intervention of a global administrator  that has permissions for the global resources of the  system  is only needed for these situations         Initial creation of the domain and assigning a domain administrator      Resolving hardware issues    For more information about managing domains  see 4 8     Multitenancy    on page 174     User groups    A user group is a group of application administrators who share a set of snapshot creation  permissions  The permissions are enforced by associating 
493. on     Maximum values  FC parameters Modell 114  Model 214 1 GbE  and Model 214 10 GbE     Maximum number of Interface Modules with iSCSI ports    Maximum queue depth per FC host port 1400    Maximum queue depth per mapped volume per  host port  target port  volume     Maximum FC ports for host connections  default configuration     24  Maximum FC ports for mirror migration connections  default configuration     Maximum number of concurrent host logins   FC adapter    Maximum number of concurrent host logins   Interface Module    Maximum number of concurrent host logins   15 Module XIV 2000  Maximum number of hosts ports defined  WWPN   IQNs  4000    Figure 3 28 Fibre Channel parameters       Values in Figure 3 28 apply to Version 11 5 of the XIV Storage System Software     iSCSI connections    The external  client provided  Ethernet cables  Model 114 and Model 214  1 GbE   or optical  cables  model 214  10 GbE   are plugged into the patch panel  For planning purposes   highlight the maximum values for various iSCSI parameters for your consideration  As with  Fibre Channel  it is important to plan your connectivity based on these maximums     Maximum values  iSCSI parameters Modell 114   Model 214 1 GbE    Model 214 10 GbE     Maximum number of Interface Modules with iSCSI ports a aa       Maximum number of 1 GB iSCSI ports Interface Module 4 only have 2 ports  22  Maximum number of 10 GB iSCSI ports a i    Maximum number of hosts ports defined  WWPN   IQNs  4000 4000 4000  F
494. on     The use of these operations is obvious  and you can initiate an operation by right clicking one   These following operations are available    gt  Format a volume     A formatted volume returns zeros as a response to any read command  The formatting of  the volume is done logically  and no data is written to the physical storage space allocated  for the volume  Consequently  the formatting action is performed instantly      gt  Rename a volume     A volume can be renamed to a unique name in the system  A locked volume can also be  renamed      gt  Lock and unlock a volume     You can lock a volume so that hosts cannot write to it  A volume that is locked is  write protected  so that hosts can read the data stored on it  but they cannot change it   The volume displays then as a lock icon  In addition  a locked volume cannot be formatted  or resized  In general  locking a volume prevents any operation  other than deletion  that  changes the volume   s image     Lock and unlock  Master volumes are set to unlocked when they are created   Snapshots are set to locked when they are created      gt  Create consistency groups     XIV Storage System enables a higher level of volume management provided by grouping  volumes and snapshots into sets called consistency groups  This grouping is especially  useful for cluster specific volumes     Chapter 4  IBM XIV Storage Management software 161    Copy a volume     You can copy a source volume onto a target volume  All the data that w
495. on disk  This process   referred to as redirect on write  occurs transparently from the host perspective and  uses the virtualized remapping of the updated data to minimize any performance  impact associated with preserving snapshots  regardless of the number of snapshots  defined for a specified master volume     Snapshots  The XIV snapshot process uses redirect on write  which is more  efficient than the copy on write that is used by many other storage subsystems     Data migration efficiency     XIV supports thin provisioning  When migrating from a system that supports only  regular  or thick  provisioning  XIV allows thick to thin provisioning of capacity   Thin provisioned capacity is described in 2 7     Capacity allocation and thin  provisioning    on page 37     Because of the XIV pseudo random distribution of data  the performance impact of  data migration on production activity is minimized because the load is spread evenly  over all resources     Automatic and dynamic flash cache use for improved performance     XIV supports one flash cache extension per module  After the optional flash cache  device is installed  it must be present in all modules   the XIV caching algorithm  manages the flash cache as an extended  read only cache to provide a performance  boost for specific workloads     No need for any specific consideration for flash cache use     e No software  e No decision  e No tuning    XIV allocates flash read cache space dynamically according to detected 
496. onSoft The percentage of total soft space that is allocated to pools   xivUtilizationHard The percentage of total hard space that is allocated to pools   xivFreeSpaceSoft The amount of soft space that is deallocated in GB   xivFreeSpaceHard The amount of hard space that is deallocated in GB     xivIfIOPS 1004 The number of IOPS being executed by module 4 at that moment   xivIfIOPS 1005 The number of IOPS being executed by module 5 at that moment   xivIfIOPS 1006 The number of IOPS being executed by module 6 at that moment   xivIfIOPS 1007 The number of IOPS being executed by module 7 at that moment   xivIfIOPS 1008 The number of IOPS being executed by module 8 at that moment   xivIfIOPS 1009 The number of IOPS being executed by module 9 at that moment     xivifStatus 1004 The status of module 4 at that moment   xivifStatus 1005 The status of module 5 at that moment   xivifStatus 1006 The status of module 6 at that moment   xivi fStatus 1007 The status of module 7 at that moment   xivi fStatus 1008 The status of module 8 at that moment   xivifStatus 1009 The status of module 9 at that moment     Tip  In the output shown in Example 7 44  you can see the xivFreeSpaceSoft output and  xivFreeSpaceHard output  This information is only useful if you want to confirm how much  space is not allocated to a pool  If you have already allocated all usable hard and soft  space to your pools  this command confirms that there is no free space available outside  your existing pools  There migh
497. one  Allow SSD Caching  Yes  LDAP Id  ITSO_domain  ID  2947615100006       Figure 4 86 The Domain Properties pane in the XIV GUI    To edit the properties of a domain using the GUI  right click the domain in the Domains view   and click Edit  as shown in Figure 4 87 on page 183     IBM XIV Storage System Architecture and Implementation    Utilization    Manage Associations    View Associated Pools  View Associated Hosts and Clusters  View Associated Users and User Groups    Limit Traffic by Perf Class  Limit Traffic by new Perf Class    Properties       Figure 4 87 Accessing the Edit pane of a domain in the XIV GUI    This opens the Edit Domain window for the selected domain  which displays and allows you to  edit the properties of the domain  as shown in Figure 4 88        Edit Domain X  Capacity  XIV_PFE2_1340010  Properties Total Capacity  243 392 GB        System Alko  Pools      Systeam  ks   Free  27          176 555 GB     65 820 GB       Domain Hard Size  103 GB  Domain Soft Size  1015 GB  Domain Name      ITSO_domain          os    Figure 4 88 The Edit Domain window in the XIV GUI       In the Edit Domain window  you can modify the properties of the domain as required  For  more information about the properties of a domain  see    The name  the size  and separated  segments are labeled appropriately     on page 177     Chapter 4  IBM XIV Storage Management software 183    Managing domain associations    After a domain has been created  a global administrator with a S
498. onfig set   read_only_role CN XIVReadonly  CN Users DC itso DC storage  DC ibm  DC com  Command executed successfully      gt  gt  Idap_config set  storage_admin_role CN XIVAdmins  CN Users  DC itso DC storage  DC ibm  DC com  Command executed successfully     gt  gt  Idap_config get    Name Value   base dn CN Users  DC i tso DC storage  DC ibm  DC com  Xiv_group_ attrib memberOf   third expiration event 7   version 3   user_id_attrib objectSid   current_server itso storage  ibm com   use ssl no   session cache period 10   second expiration event 14   read only role CN XIVReadonly DC itso DC storage  DC ibm  DC com  Storage admin role CN XIVAdmins   DC itso DC storage  DC ibm  DC com  first_expiration event 30   bind time limit 30     gt  gt  user_group update user _group itso app01 group  Idap_role cn XIVAppAdmin1  DC itso  DC storage  DC ibm  DC com  Command executed successfully     gt  gt  user_group_list user_group itso_app01_ group    Name Access All LDAP Role  Users  itso_app01 group no cn XIVAppAdmin1 DC itso DC storage  DC i bm  DC com    Alternatively  the same configuration steps can be accomplished by using the XIV Storage  Management GUI  To change the LDAP configuration settings using the XIV Storage  Management GUI  open the Tools menu at the top of the main XIV Storage Manager window   click Configure     gt  LDAP     Role Mapping  and change the configuration parameter  settings     Now  by assigning Active Directory group membership  you can grant access to 
499. onfig set base dn  dc xivauth   user_id attrib uid session cache period 10 bind time_limit 30  Command executed successfully       xcli  c  XIV MN00019   u admin  p s8cur8pwd ldap config get    Name Value   base dn dc xivauth  Xiv_group_ attrib description  third expiration event 7   version 3  user_id_attrib sid  current_server   use ssl no   session cache period 10   second expiration event 14   read only role Read Only  storage admin role Storage Administrator  first expiration event 30   bind time limit 30    To complete our description of the LDAP related configuration parameters  at the XIV Storage  System   we describe the parameters that had default values assigned and did not need to be  set explicitly     version Version of LDAP protocol used  the default is 3   This  parameter must never be changed  Both Active Directory and  Oracle Java Services Directory Server Enterprise Edition  support LDAP protocol Version 3     user_id_ attrib LDAP attribute set to identify the user  in addition to user  name  when recording user operations in the XIV Storage  System event log     use ssl Indicates if secure  SSL encrypted  LDAP communication is  mandated  If set to yes without configuring both sides for SSL   any encrypted communication for LDAP authentication on the  XIV Storage System fails     first_expiration_event Number of days before the expiration of the certificate to set  the first alert  Severity warning   Set this parameter to several  days that gives you enough
500. only role is a user who is responsible for monitoring  system status  system reporting  and message logging  This user must not be permitted to  make changes on the system      gt  technician    The technician role has a single predefined user name  technician  assigned to it  and it is  intended to be used by IBM support personnel for maintaining the physical components of  the system  The technician is limited to the following tasks  physical system maintenance  and phasing components in or out of service  The technician has restricted access to the  system and is unable to perform any configuration changes to pools  volumes  or host  definitions on the XIV Storage System      gt  xiv_development    The xiv_development role has this single predefined user name assigned to it and it is  intended to be used by IBM development personnel      gt  xiv_maintenance    The xiv_maintenance role has this single predefined user name assigned to it and it is  intended to be used by IBM maintenance personnel      gt  xiv_hostprofiler    The xiv_hostprofiler role has this single predefined user name assigned to it and it is  intended to be used for gathering additional information about hosts attached to the XIV     User roles  There is no capability to add new user roles or to modify predefined roles  In  native authentication mode  after a user is assigned a role  the only way to assign a new  role is to first delete the user account and then re create it     222 IBM XIV Storage System
501. only user that is authorized to change other users     passwords  Direct access to a user credential repository is not permitted  System security is  enforced by allowing password changes only through the XIV Storage Management GUI and  XCLI     Figure 5 39 shows how to change a password  Right click the selected user in the Users  window and click Change Password from the menu     Category    technician Technician    xiv_development XIV Development  Change Password  xiv_hostprofiler AIV Host Profiler    Properties    xiv_maintenance XIV Maintenance       xiv_msms Storage Administrator    Figure 5 39   XIV Storage Management GUI Change Password menu    The Change Password window that is shown in Figure 5 40 opens  Enter the New Password  and then retype it for verification in the appropriate field  only alphanumeric characters are  allowed   Click Update     Change Password    System  XIV 7826153  Name  admin  New Password  6 12            Retype New Password        pr     Figure 5 40 XIV GUI Change Password window       5 5 6 Managing multiple systems    Managing multiple XIV systems is straightforward in native authentication mode     Authorization rule for managing multiple systems   Because user credentials are stored locally on every XIV Storage System  you must keep the  same user name and password on separate XIV systems to allow for quick transitions  between systems in the XIV Storage Management GUI  This approach is especially useful in  Remote Mirror configurations
502. ool encrypted False  Solid State Non Solid State    Easy Tier  Easy Tier Status pees    Sumber of Disks   Sumber of   olumes  Surfaced   Yolume Space  Un surfaced Yolume Space  Backend   olume Space       Figure 7 80 XIV Storage System ITSO storage pool details in Tivoli Storage Productivity Center GUI    The values shown in Figure 7 79 on page 400 and Figure 7 80 correspond in the following    way   Storage Pool Space The soft size of the pool  10015 GB equals 9 11 TiB   Available Storage Pool Space The unused soft space in the pool  in binary TiB    Configured Capacity Limit The hard size of the pool  5016 GB equals 4 56 TiB     Remaining Configured Capacity The unused hard size in the pool  in binary TiB     400 IBM XIV Storage System Architecture and Implementation    Figure 7 81 shows how Tivoli Storage Productivity Center can report on XIV Storage System  storage pools                                               Navigation Tree Selection Storage Subsystems  T pa a Savica  Storage Pools  By Storage Subsystem  f  Data Sources Number of Rows  19    Discovery Storage Subsystem Storage Pool Type s  Track Format Status Storage Pool Space Available Storage Pool Space   Configuration B l  XIV 2810 13002021BM   test_pool RAID 10  Unknown  ok   45 48 TB  i i aiis Storage Productivity Center        X1y 2810 13002031BM_ bfs_regular RAID 10  Unknown fok   344 00 GB  Eaa aa aa  Q   XIV 2810 130020318M   bfs_source RAID 10   Unknown    ok   96 00 GB  Data Manager for Chargeback a I 
503. ools  gt   Active Directory Users and Computers     2  Right click the Users container and click New     Group     3  Enter a group name and click OK     274 IBM XIV Storage System Architecture and Implementation    The new Active Directory group creation window is shown in Figure 5 79     New Object   Group E       KeA Create in  itso storage ibrm com Users    Tig    Group name       sIvReadonly    Group name  ore Windows 2000        xIvReadonly     Group scope Group type      Domain local i Security  i Global    Distribution    f Universal    cence      Figure 5 79 Creating Active Directory group    To assign an existing user to the new group  complete the following steps     1     Start Active Directory Users and Computers by selecting Start     Administrative  Tools     Active Directory Users and Computers     Expand the Users container  right click the user name that you want to make a member of  the new group  and select Add to a group     In the Select Groups window  click Add     Advanced     Find Now  From the presented  list of existing user groups  click XI VReadonly  and then click OK     You can now see a group selection window  as shown in Figure 5 80  Confirm your choice  by clicking OK     Select Groups H x     Select this object type      Groups or Built in security principals Object Types       From this location     ltso  storage  ibm com Locations         Enter the object names to select  examples      n eadonl Check Mames         Advanced      Cancel    Z
504. or partial configurations  see Figure 3 2 on page 65     There is not an additional disk tier to manage  the XIV Storage System Gen3 software  manages this flash cache automatically     This flash cache feature further improves performance for read workloads  especially random  read workloads     Memory flash card    Each module contains a CompactFlash card  which is shown in Figure 3 20  Also see  Figure 3 18 on page 83 and Figure 3 22 on page 88     CompactFlash         Industrial  Figure 3 20 Module CompactFlash card       This card is the boot device of the module and contains the software and module  configuration files     Important  Because of the configuration files  the Compact Flash Card is not  interchangeable between modules  and it is not user serviceable     86 IBM XIV Storage System Architecture and Implementation    Cooling fans   To provide enough cooling for the disks  processor  and system board  the system includes  10 fans located between the disk drives and the system board  Cool air is pulled from the  front of the module through the disk drives  The air flow and the alignment of the fans ensures  the appropriate cooling of the entire module  even if a fan is failing     Enclosure management card   The enclosure management card is located between the disk drives and the system board  In  addition to the internal module connectivity between the drive backplane and the system  board  this card is the backplane for the 10 fans  It also includes the fan con
505. or through an optional proxy server  The optional Remote Support Proxy can be used  when one or more IBM XIV systems do not have direct access to the Internet  for  example  because of firewall restrictions   You can use the Remote Support Proxy to  facilitate the connection to the XRSC  More information about the Remote Support Proxy  can be found in the IBM XIV Remote Support Proxy Installation and User   s Guide   GA382 0795      gt  Remote Support Center Front Server  Internet     Front Servers are on an IBM DMZ of the Internet and receive connections from the  Remote Support Client and the IBM XIV Remote Support Back Server  Front Servers are  security hardened machines that provide a minimal set of services  namely  maintaining  connectivity to connected Clients and to the Back Server  They are strictly inbound  and  never initiate anything on their own accord  No sensitive information is ever stored on the  Front Server  and all data passing through the Front Server from the Client to the Back  Server is encrypted so that the Front Server cannot access this data      gt  Remote Support Center Back Server  IBM intranet     The Back Server manages most of the logic of the system  It is located within the IBM  intranet  The Back Server is access controlled  Only IBM employees authorized to perform  remote support of the XIV Storage System are allowed to use it  and only through specific    IBM XIV Storage System Architecture and Implementation    support interfaces  not w
506. orage System design  deliver optimized and consistent performance   There is little that clients need to do within an XIV Storage System that can contribute to  performance gains beyond what the XIV Storage System automatically provides  and that  includes the optional flash caching  solid state drive  SSD  caching  feature  However  there  are several practices from a host perspective that can have a positive impact on XIV Storage  System performance     In addition  this chapter describes XIV Storage System performance monitoring techniques  using the IBM XIV Storage Management graphical user interface  GUI  and XIV Top   Performance problem solving techniques are also described  We provide guidance about  how to interpret XIV Storage System performance information to determine objective levels of  XIV Storage System performance characteristics such as response times  I O rates  and  throughput     Performance is one of the primary strengths of the XIV Storage System  This chapter covers  the following topics as they pertain to XIV performance      gt  6 1     XIV Storage System Software and hardware architecture    on page 288   gt  6 2     Practices for optimum performance    on page 294    gt  6 3     Performance monitoring    on page 304    gt  6 4     Performance evaluation    on page 320    A popular topic that this chapter does not cover is the actual performance feeds and speeds  of the XIV Storage System  That information is available in the IBM System Storage XIV 
507. orage ibm com       Figure 5 73 Active Directory query listing XIV accounts    Chapter 5  Security 269    To generate the XIV Storage System Accounts view  we used the LDAP query that is shown  in Example 5 18     Example 5 18 LDAP query for generating a list of XIV user accounts      amp   amp  objectCategory user   cn xiv       description Read Only   description Storage  Administrator   description app           To create this query  click Saved Queries     New     Query     gt  XIV Storage Accounts and  select the query name in this example  Click Define Query  Click Find     Custom Search     gt   Advanced and paste the LDAP query from Example 5 18 into the Enter LDAP Query field     When a new user account is created and its name and attributes satisfy the search criterion   this user account automatically appears in the XIV Storage Accounts view  Any LDAP XIV  Storage Management GUI front end supporting the LDAP Version 3 protocol can be used for  creating views and managing LDAP entries  XIV user accounts      Table 5 4 provides a list of commands that cannot be used for user account management  when LDAP authentication mode is active     Table 5 4 XIV commands unavailable in LDAP authentication mode    XIV command  user_define  user_update    user_rename    user_group_add_user       user_group_remove_user    Authentication  When the XIV Storage System operates in LDAP authentication mode   user account creation  listing  modification  and removal functions are provid
508. osoft System Center  Operations Manager is released  check the release notes to confirm any changes that you    need to perform  An upgrade from Version 1 3 to 2 1 requires you to perform these tasks     1  For the upgrade from Version 1 3 to Version 2 1  you need to delete your IBM XIV  systems by using the scomu command  Use the following syntax for the command     scomu   del  t xiv   ip  lt ip adress gt     2  Before the installation of Version 2 1  you need to delete the old XIV management pack in  SCOM first  as shown in Figure 7 101        Administration    a ac Administration  a  Connected Management Groups  4  sy Device Management  i Agent Managed  Lie Agentless Managed  m  Management Serwers  EF Pending Management  g UNIW Linus Computers  er Management Pads  a a Metwork Management  HE Discovery Rules  a Network Devices    ad Metwork Devices Pending Management F    4    Notifications  Js Channels  fi Subscribers  Bz Subscriptions   a E Product Connectors  J0 Internal Connectors   ag Resource Pools      i Run As Configuration   30  Accounts      Management Packs  93     Marne   FA 360 Application Monitoring Dashboards  E Baselining Tasks Library   ES Client Monitoring Internal Library   ES Client Monitoring Library    E Client Monitoring Overrides Management Pack    BS Client Monitoring Views Library  ES Data Warehouse Internal Library  ES Data Warehouse Library      amp   Default Management Pack  E Distributed Application Designer Library  ES Health Internal Library 
509. ost  performance  and volume performance  You can also view specific performance  measurements  In Figure 7 36 on page 357  the system performance and volume  performance are depicted     356 IBM XIV Storage System Architecture and Implementation    PS  aa  OF    All Systems    5 Connected 5 Connected    Volumes chart view    Bandwidth Latency    Demo Volume 5  Demo Syste  Bandwidth Latency  2 8 mb s 0 0 ms    CURRENT IOPS    3 496    Uc  Sed of 940 27B    Demo Volume 15  4 3 mb s    q On    Volumes Volumes    Figure 7 36 XIV mobile dashboard for Android System and Volumes performance         7 2 3 IBM Storage Mobile dashboard    IBM has released an IBM Storage Mobile Dashboard application that can be used to securely  monitor the performance and health of your IBM Storage System  it supports the following    IBM storage systems    e IBM Storwize   V7000 V7000 Unified   e IBM Flex System   V7000 Storage Node  e IBM Storwize V5000   e IBM Storwize V3700 V3500   e IBM SAN Volume Controller  SVC    e IBM FlashSystem      e IBM XIV Storage System    e IBM TS4500 Tape Library    You need an Apple iOS device  either iPad or iPhone  and a valid Apple ID to download the  IBM Storage Mobile Dashboard application from the App Store  It is a no charge application     Chapter 7  Monitoring 357    358    It can be found in the iTunes store by going to the following website   see Figure 7 37     https   itunes apple com se app ibm storage mobi 1e dashboard id677826483 mt 8    IBM Storage M
510. ount that is  already allocated by the other existing volumes is shown in blue  The amount that is free is  shown in gray  The current size of the volume is displayed as a dotted outline box  around  the storage pool gauge     160 IBM XIV Storage System Architecture and Implementation    2  In the New Size field  type the new value  or drag the edge of the outline box     3  Click Update to resize the volume     Deleting volumes  Using the XIV Storage Management GUI  deleting a volume is as easy as creating one     Important  After you delete a volume or a snapshot  all data stored on the volume is lost  and cannot be restored     All the storage space that was allocated  or reserved  for the volume or snapshot is freed and  returned to its storage pool  The volume or snapshot is then removed from all the logical unit  number  LUN  maps that contain mapping of this volume     Deleting a volume deletes all the snapshots associated with this volume  even snapshots that  are part of snapshot groups  A volume can be deleted even if the volume is in the lock state   but a volume cannot be deleted if the volume is mapped to a host or part of a consistency    group   To delete a volume or snapshot  complete the following steps     1  Right click the row of the volume to be deleted and select Delete   2  Click to delete the volume     Maintaining volumes    There are various other operations that can be issued on a volume  See    Menu option  actions    on page 155 for more informati
511. out data placement impact on performance     a Datais spread across all drives  a 41MB partition distribution  a Even Disk utilization    Oracle  ooo  Partition    VMware 000    Partition    aaa  Partition    Figure 2 4 XIV Storage System pseudo random data distribution       Chapter 2  IBM XIV Storage System logical architecture and concepts 23    For more details about the topic of data distribution and storage virtualization  see 2 4      Logical system concepts    on page 26     2 3 Full storage virtualization    The data distribution algorithms employed by the XIV Storage System are innovative and  unique in that they are deeply integrated into the system architecture itself  instead of at the  host or storage area network level     To appreciate the value inherent to the virtualization design that is used by the XIV Storage  System  consider the various aspects of the physical and logical relationships that make up  conventional storage subsystems  Specifically  traditional subsystems rely on storage  administrators to plan the relationship between logical structures  such as arrays and  volumes  and physical resources  such as disk packs and drives  to strategically balance  workloads  meet capacity demands  eliminate hotspots  and provide adequate performance     2 3 1 XIV Storage System virtualization design    The implementation of full storage virtualization employed by the XIV Storage System  eliminates many of the potential operational drawbacks that can be prese
512. out managing multiple tiers of storage  The XIV is suited  for mixed or random access workloads  including online transaction  processing  video streaming  images  email  and emerging workload  areas  such as Web 2 0 and cloud storage     The focus of this edition is on the XIV Gen3 running Version 11 5 of the  XIV system software  which brings enhanced value for the XIV Storage  system in cloud environments  It offers multitenancy support  VMware  vCloud Suite integration  more discrete performance classes  and  RESTful API enhancements that expand cloud automation integration   Version 11 5 introduces support for three site mirroring to provide high  availability and disaster recovery  It also enables capacity planning  through the Hyper Scale Manager  mobile push notifications for  real time alerts  and enhanced security     We describe many of the unique and powerful concepts that form the  basis of the XIV Storage System logical and physical architecture and  the planning and preparation tasks for deploying the system by using  the XIV Storage Manager GUI or the XIV command line interface  We  also describe the performance characteristics options for alerting and  monitoring  including enhanced secure remote support     This book is for IT professionals who want an understanding of the XIV  Storage System  It is also for readers who need detailed advice on how  to configure and use the system     SG24 7659 08 ISBN 0738439096    Iln  al   T                          N 4  p
513. owever  thinly  provisioned storage pools allow the total hard space to be used by volumes with no guarantee  of preserving any hard space for snapshots     Logical volumes take precedence over snapshots and can be allowed to overwrite snapshots   if necessary  as hard space is used  However  the hard space that is allocated to the storage  pool that is unused  the incremental difference between the aggregate logical and actual  volume sizes  can be used by snapshots in the same storage pool     40 IBM XIV Storage System Architecture and Implementation    Careful management is critical to prevent hard space for both logical volumes and snapshots  from being exhausted  Ideally  hard capacity use must be maintained under a certain  threshold by increasing the pool hard size as needed     Storage pools and snapshots      gt  As described in    Storage pool relationships and rules    on page 36  storage pools  control when and which snapshots are deleted when there is insufficient space  assigned within the pool for snapshots      gt  The soft snapshot reserve capacity and the hard space allocated to the storage pool  are used only as changes occur to the master volumes or the snapshots themselves   not as snapshots are created      gt  For amore detailed explanation of snapshot deletion priority  see IBM XIV Storage  System Business Continuity Functions  SG24 7759     Soft pool size    Soft pool size is the maximum logical capacity that can be assigned to all the volumes and  sn
514. p window  select the appropriate storage pool  as shown in Figure 4 47  Click OK  to move the volume into this pool     Move Volume to Pool    Select Pool    L  mso  hannes    ee  hl  D  lt     Figure 4 47 Move volume to another pool          Pool alert thresholds    You can use the XIV Storage Management GUI to configure pool use thresholds to trigger  color coded visual alerts at various severity levels  These alerts are either system based or   starting with XIV Version 11 5 and GUI version 4 4  thresholds can be set at a pool level  and   therefore  controlled by domains   The defined thresholds are viewable in the XIV Storage  Management GUI by all users who are defined for the particular system  System events are  also created based on the specified values  The default pool use threshold values are for  warning  80    minor  90    and major  95       To configure pool thresholds from the XIV Storage Management GUI Storage Pools view    right click an empty area in the view and choose Pool Thresholds to open a dialog window    as shown in Figure 4 48    Threshold configuration for ITSO_d1_p1_siteA  Volumes Usage V  Use Pool Specific Thresholds   Snapshots Usage Informational  Warning  Minor    Major    Critical        lt o    Figure 4 48 Set pool alert thresholds       Enable a specific class of Volumes Usage or Snapshots Usage threshold alert by checking  the box next to it  To adjust the value of an enabled threshold  click and drag the slider bar or  type in the corre
515. page 170 how to set QoS  by defining performance  classes in terms of IOPS and bandwidth limitation and then assigning specific hosts to a  particular performance class  Each host can be assigned only a single performance class ata  time  However  there is no limit in the number of hosts within a specified class     Chapter 6  Performance 301    Limitation by bandwidth    The interface modules enforce the configured limitations  The intended limitation value  depends on the number of interface modules being used by the hosts within the same  performance class  The maximum rate value specified is multiplied by the number of interface  modules installed in the XIV system to determine the rate for the class     For example  a noncritical host is connected to all six interface modules      gt  Ifthe application administrator intends a 300 MBps limit for that host  the administrator  user must set the QoS bandwidth limit for that host to 300 and the Bandwidth Limit per  Interface is automatically set to 50      gt  With six interface modules  the enforcement is 50 MBps per interface module  thereby  limiting the host to an aggregate bandwidth of 300 MBps  50 MBps x 6 Modules   300  MBps   If only two interface modules were used  the limit for the host is 100 MBps   50 MBps x 2 Modules   100 MBps       gt  Ifthe host has connections to only two interface modules in a full six interface module  system  the actual host bandwidth limitation is only 100 MBps with this performance class
516. panded up to 6 TB  Starting with software Version 11 4  a flash cache of  800 GB per module for a total of 12 TB in a fully populated system with 4 TB drives can be  used optionally to further boost performance     With flash caching  as illustrated in Figure 2 8 on page 44  there is no need to relocate data   Because flash cache is used as read cache only  when data in cache is no longer accessible   it can simply be dropped and replaced by more relevant data     This approach allows for the flash cache to be used effectively in highly dynamic  environments where data patterns are constantly changing  To have a holistic solution  the  caching architecture must also deliver good write performance     Chapter 2  IBM XIV Storage System logical architecture and concepts 43       Flash Cache  mapped as an  extension of memory    Allocates Flash Cache slots  dynamically according to the  detected workload patterns       SAS Layer       Figure 2 8 XIV flash caching overview    The caching algorithm is embedded in the XIV System software  firmware  and makes the  flash cache integration completely transparent to the user or storage administrator  No tuning  of the cache is required to get the potential performance boost     The flash caching feature is supported automatically by the XIV unique caching algorithm   which dynamically adapts to detected I O request patterns     2 8 2 Flash caching algorithm and concepts    Caching operations are split into two groups  main and extended 
517. plete the following steps     1  In the SCOM Administration window  right click Management Packs and select Import  Management Packs  see Figure 7 94  to open the Import Management Packs window           a  File Edit View Go Tasks Tools Help      Search _   By  P Find   E  Tasks       Administration   Manageme  4 8 Administration Al 4 Lookfo  A  Connected Management Groups Warne  4  a Device M nt   a Device Manageme E 3604p  im Agent Managed w  p TA Baseliniy  Gs Agentless Managed  ES Client W  29  Management Servers Ez  ay Pending Management z4 Client M  i  UNEKLinux Computers By Client M  e bel FS Client Mi  E AER A Discovery Wizard   l    a   Network ES Data Wa  J   Discowe   Create Management Pack EE Data Wa    Network 4 Download Managerment Packs    Ki Distribui  s    Network  E Import Management Packs    OE Health I    Figure 7 94 Importing management packs into SCOM    2  Click Add  and then click Add from disk  An online catalog connection message is  displayed  Click No to locate the management pack locally     When the Select Management Packs to Import window opens  select the  C  ProgramFiles IBM Storage Host IBMStorageSCOM mps directory  and then select the  following two files         IBM Storage Common mp      IBM Storage XIV mp    3  When the files are selected  click Open  The Import Management Packs window now lists  the Management Packs to be added     4  Click Install to start the import  as shown in Figure 7 95  When the Management Packs  are successfully 
518. ployed with IBM  for 17 years     Wenzel Kalabza s a certified XIV Product Field Engineer  PFE  based in the storage  competence center in Mainz  Germany  Wenzel joined IBM in 1998 as customer quality  engineer for IBM disk drive failure and performance analysis  He joined the Back Office for  the high end storage system  ESS  in June 2002  In 2005  Wenzel started a PFE role for the  IBM disk storage DS6000     In June 2008  he became a PFE for the XIV storage product   Wenzel holds a degree in Electrical Engineering and Power Economy  and several storage  related certifications     Thanks to the following people for their contributions to this project     Eyal Abraham  Diane Benjuya  Ramy Buechler  Rami Elron  Theodore Gregg  Peter Kisich   Rony Shapiro  Yossi Siles  Oded Kellner  George Thomas  Carlo Saba  Ohad Atia  Marcus  Boelke  Daniel Lereya  Mary J  Connell    IBM    Thanks also to the authors of the previous editions     Jana Jamsek  Suad Musovich  Markus Oscheka  In Kyu Park  Francesco Perillo  Carlo Saba   Hank Sautter  Jim Sedgwick  Eugene Tsypin  Kip Wagner  Alexander Warmuth  Peter Wendler   Axel Westphal  Ralf Wohlfarth  Dietmar Dausner  Itzhack Goldberg  Stephen Solewin  Christian  Schoessler  Patrick Schill  Christian Burns  Thomas Peralto     Special thanks to ESCC team in IBM Mainz  Germany  for hosting the project and making  equipment available in their lab     xii IBM XIV Storage System Architecture and Implementation    Now you can become a published au
519. pply unit  PSU  cage with dual 850 W  PSU assemblies  as shown in Figure 3 19 on page 84  These power supplies can be  replaced individually with no need to stop using the module  The power supply is a  field replaceable unit  FRU   Each power supply is cabled to a different UPS unit     Chapter 3  IBM XIV architecture  components  and planning 83                         2   x lt        Figure 3 19 Redundant module PSUs    Model 214 unique components  Data modules and interface modules in Model 214 have the components described in the  subsections that follow     Six core processor    Model 214 modules are powered by a six core Intel Westmere CPU E5645 processor  which  is based on the 32 nm technology and 2 4 GHz clock frequency  Equipped with 12 MByte L3  cache and DDR3 1333 MHz  the CPU features Hyper Threading technology  HT technology    which delivers two processing threads per physical core  Consequently  a fully configured  system provides the processing power of ninety physical  or 180 logical cores  using the  Hyper  Treading technology  Thanks to the Integrated Power Gates  the power consumption  of inactive kernels is near zero  which makes this processor highly efficient  With six cores  and the mentioned feature  the processor is powerful enough to manage the basic workload  of all modules and the additional workload in the interface modules     Note  Four core and six core modules can be intermixed in Model 114 with software 11 2  or later  in case of FRU repla
520. pshots of a volume   Any of the snapshots can be made writable  and then snapshots can be taken of the newly  writable snapshots  Snapshots of snapshots   Volumes can even be restored from these  writable snapshots     Cross system consistency groups    Chapter 1  IBM XIV Gen3 Storage System overview 9    These groups enable coordinated creation of snapshots for interdependentgroups on  multiple XIV systems  This function is now automated by the GUI in the Hyper Scale  Manager      gt  Synchronous and asynchronous remote mirroring to another XIV Storage System     Synchronous or asynchronous remote mirroring can be performed over FibreChannel   FC  or IP  iSCSI  connections  Both protocols are also supported for three way mirroring  connectivity  Synchronous remote mirroring is used when a zero recovery point objective   RPO  is required  For practical reasons  latency   ensure that the distance is less than  100 km  62 miles   For longer distances  asynchronous replication is more appropriate     Version 11 5 x of the XIV software offers quick start synchronous mirroring with offline  initialization and flexible switching between synchronous and asynchronous mirroring     XIV 3 way mirror  XIV software v11 5 x supports a three site mirroring star topology  with one synchronous and one asynchronous mirror relationship  For details  see the  IBM Redpaper publication titled  BM XIV Storage System Multi site Mirroring   REDP 5129 and the IBM Redbooks publication titled  BM XIV S
521. q    shi All Systems    Ik   f xw _o1_ 6000105     f xivoz431001400       an nn nn nnn nm Em a         Mainz B      f xv_PFE_04 1310133  J of 3 Syst     Figure 7 7 System level alert summary              330 IBM XIV Storage System Architecture and Implementation    As shown in Figure 7 8  selecting the alert icon for the system displays that system   s specific  alerts in a new window                 All Systems      gt  Mainz_Building12  3   gt    Alerts   Q Alerts  21   Description   tJ   lt 1Day KIW _02_1310114 IB Port 1  Module 8  status is Failed Hardware Major   tJ   lt 1 Day AIV_02_ 1340114 IB Port 2  Module  amp   status is Failed Hardware Major   tJ   lt 1 Day AIV_02_ 1340114 Disk 2  Module 8  status is Failed Hardware Major   tJ   lt 1 Day XIV_02 1340114 Disk 8  Module 3  status is Failed Hardware Major   tJ   lt i1Day XIV_02_ 1340114 Disk 6  Module     status is Failed Hardware Major   i   lt 1 Day KIV_O02_ 1370774 Disk 4  Module 6  status is Failed Hardware Major   a  lt 1 Day XIV_02_ 1340114 Disk 9  Module 6  status is Failed Hardware Major   tj   lt 1 Day KIV_O02_ 13107174 Disk 1  Module 3  status is Failed Hardware Major   se Ea  lt 1 Day XIV_02_ 1340114 Disk 7  Module 6  status is Failed Hardware Major  tJ   lt 1 Day RIV O02 13707714 Disk 5  Module 6  status is Failed Hardware Major   tE tJ   lt 1 Day AIV_02_ 13410114 Disk 3  Module 8  status is Failed Hardware Major  tJ   lt iDay XIV_02_ 1340114 Disk 5  Module 9  status is Failed Hardware Major      N  lt 1 D
522. r     manager application by completing the following steps     1  Click Directory Servers     xivhost2 storage tucson ibm com 389     Security     CA  Certificates     Add     2  Copy and paste the certificate authority certificate stored in the cacert pem file  as shown  in Figure B 16        Add Certificate  Paste the certificate into the text field below  The certificate text must be in ASCII format     E    Indicates required field    Serwer  xivhost2 storage tucson ibm cam 389         xivstorage org sample CA Certificate Authority certificate  Certificate   Hame             E    BEGIN CERTIFICATE     Certificate    MIDSTOCArKgJAwIBAgIBADANBgkqghkiG9w0BAQOFAD B 8 MOswCOYOVOQG EwJVUZEQ  MAIGAIUECBMHOX pemSuyTEPMAOGAIUEB MGVHVjc2 9 uMRAMWwEQYDVGQKEwpdaXxZz  dG 9 yy Wa MR MwEOYOVOOQDEw pdaXZadG Sy YW IM SAwHgY  Koz lhvcNAQkBFhF YUBA  akZ2dG Oy  WadlLmoy2z4eFWwOwOTA2 MjkyMTIOMj NarwOxMDA2 MjkyMT1OMj Nal Hwe  CzA BQNVBAYTAIVTM RAwD gy DVOOlEwd Bc ml 6b25hMO8SwOyDVOQHEWwZ UdWNzb2 4x  EZARBgNVBAoTCnhpdnNOb3 hZ 2U xE24RBgNVBAMTC nhpdnNObs hZ2UxIDAeBgkq  hkiG SwO BCOEWEWNAOHhpd nN Ob hz 2 Uub3 nMIGIMAOGC SqG SIb3 DOEBAQUAAAGN  jNZ13dt0EVOn  8 Nv pSpV NF 6 2G SqccA Sw N  ga   id SPHWEpKY mm 9kmGdLFW6   TAI BE  EFfk bor NxeStbeWm mil SAahDyPOxZqNo2H 2 M1 V3 PCwIDAQABodHa          Figure B 16 Importing the certificate authority certificate    3  After the CA and signed certificates are imported into the local keystore  you can use the  local certificate management tool to check whet
523. r information from the system  in real time  in addition to the self monitoring  self healing  and automatic alert functions  implemented within the XIV Storage System Software     This chapter covers the following topics      gt     You can review or request the current system status and performance statistics at  any time     You can set up alerts to be triggered when specific error conditions or problems arise in  the system  Alerts can be conveyed as messages to a user  an email  and Simple Network  Management Protocol  SNMP  trap or a Short Message Service  SMS  text to a mobile  phone     Depending on the nature or severity of a problem  the system can automatically alert the  IBM Remote Support Center  which immediately initiates the necessary actions to  promptly repair the system  The Call Home feature must be configured and working  properly for this feature to work     If you have purchased IBM Tivoli Storage Productivity Center  you can configure it to  monitor and configure the XIV Storage System     You can use SNMP walk and get commands using the IBM supplied XIV SNMP  Management Information Base  MIB  to monitor the health of the XIV Storage System     If you have IBM Systems Director  you can configure it to get SNMP events from the  XIV Storage System     If you are using Microsoft System Center Operations Manager  you can use it to monitor  your XIV Storage System     The secure remote support feature allows remote monitoring and repair by IBM Suppot  perso
524. rage System     Example 4 2 illustrates a common command execution syntax on a given  XIV Storage System     Example 4 2 Simple XCLI command    c  Users itso gt xcli  u itso  p PasswOrd  m 192 168 0 1 user_list    Managing the XIV Storage System by using the XCLI always requires that you specify these  same parameters  To aid in using them  define and use specific environment variables  Open  a command prompt window  in this case in Windows 2008 R2  and set values for specific  environment variables  as shown in Example 4 3     Example 4 3 Script file setup commands    setx XIV_XCLIUSER itso  setx XIV_XCLIPASSWORD PasswOrd  setx XCLI_CONFIG_ FILE  HOMEDRIVE  HOMEPATH  My Documents xcli xiv_systems txt    The XCLI requires user and password options  So  if user and passwords are not specified   the default environment variables XIV_XCLIUSER and XIV_XCLIPASSWORD are used  Also  the  XCLI_CONFIG FILE variable file must be populated before setting the environment variable     The configuration in this example is stored in a file under the user   s home directory  A  separate file can be specified by  f or   file  applicable to configuration creation   configuration deletion  listing configurations  and command execution   Alternatively  the  environment variable XCLI_CONFIG_FILE  if defined  determines the file   s name and path  After  running the setup commands  the shortened command syntax works as shown in   Example 4 4     Example 4 4 Short command syntax    c  Users itso gt
525. rage System initiates SNMP packets when sending traps to SNMP managers      gt  XIV Storage System initiates SMTP traffic when sending emails  for either event  notification through email or for email to SMS gateways       gt  XIV Storage System communicates with remote SSH connections over standard TCP  port 22     SMTP server    For correct operation of the Call Home function  the SMTP server must function as follows      gt  Be reachable on port 25 for the XIV Storage System client specified management  IP addresses      gt  Allow relaying from the XIV Storage System client specified management IP addresses      gt  Allow the XIV Storage System to send emails  The default sender address is  fromxiv il ibm com  but this address can be changed     104 IBM XIV Storage System Architecture and Implementation     gt  Allow recipient addresses of xiv cal lhome western hemisphere vnet ibm com and  xiv cal lhome eastern hemisphere vnet ibm com  Additionally  you can choose the  shorter alias recipient address xiv west vnet ibm com and xiv east vnet ibm com     3 2 4 IBM XIV Storage System physical installation    After all previous planning steps are completed and the system is delivered to its final  location  the physical installation can begin  An IBM SSR completes all necessary tasks and  the first logical configuration steps  up to the point where you can connect the IBM XIV  Storage System through the XIV Storage Management GUI and the XCLI  Configuring  storage pools  logica
526. rage System logical configuration  consider how many logical unit  numbers  LUNs  to configure per host or per application     With an XIV Storage System  there is no need to create many LUNs  As a matter of fact   when planning to deploy applications on an XIV Storage System  the primary design principle  should be fewer LUNs and larger LUNs     Every XIV Storage System LUN  regardless of size  is already  architecturally  automatically  configured within the XIV Storage System for optimum performance  A planning item to any  application migration to the XIV Storage System is the significant consolidation of the number  of LUNs  Small quantities of volumes and LUNs are simpler to manage  Using fewer LUNs  compared to a traditional storage subsystem improves read cache hit rates and space use  because there are fewer    orphaned    physical capacity allocations     However  if you must separate logs from data  or need to separate LUNs to create a disaster  recovery strategy that includes snapshots  consistency groups  and volume replication  you  might need to use more volumes  In addition  certain host platforms still require multiple  volumes  The best approach is to examine the applications first and make a layout strategy  that meets the application needs     One of the most important considerations for the number of LUNs required for optimum  performance in an XIV Storage System environment is application I O threads  As a rule of  thumb  if the application must use mult
527. re always part of only one storage pool   All volumes of a consistency group must belong to the same storage pool     vy y    Storage Pool    Consistency Group                               TestVo  Snapshots from CG                       Figure 4 50 Basic storage hierarchy    4 5 1 Managing volumes with the XIV Storage Management GUI    To start a volume management function from the XIV Storage Management GUI  you can  either click View     Volumes     Volumes and Snapshots from the menu bar or mouse over  the Volumes icon and then select the appropriate menu item  See Figure 4 51        Ga ap   had      Snapshot Tree      Consistency Groups    K Consistency Groups             Figure 4 51 Opening the Volumes menu    Chapter 4  IBM XIV Storage Management software 153    The Volumes and Snapshots menu item is used to list all the volumes and snapshots that  have been defined in this particular XIV Storage System  An example of the resulting window  is shown in Figure 4 52              Name   Size  GB  Used  GB    Consistency     Pool Created SSD  t demo1_07 65 GB 0 GB demot Disabled  Default   t demo1_06 85 GB 0 GB demot Disabled  Default   t demo1_05 65 GB 0 GB demot Disabled  Default   t demo1_04 65 GB 0 GB demot Disabled  Default   t demo1_03 65 GB 0 GB demot Disabled  Default   t demo1_02 85 GB 0 GB demot Disabled  Default   t demo1_01 85 GB 0 GB demot Disabled  Default   E AV_RedBk_DB_10 1015 GB 1015 GB ITSO Disabled  Default    amp   AV_RedBk_DB_09 1015 GB 1015 GB ITSO Di
528. re frequently than other volumes  or access certain parts of a volume  more frequently than other parts  the overall load on the disks and modules is   balanced perfectly     Pseudo random distribution ensures consistent load balancing even after adding  deleting  or  resizing volumes  and adding or removing hardware  This balancing of all data on all system  components minimizes the possibility of a hotspot     1 5 3 Self healing    Protection against concurrent double disk failure is provided by an efficient rebuild process  that brings the system back to full redundancy in minutes  In addition  the XIV Storage  System extends the self healing concept  resuming redundancy even after failures in  components other than disks  such as a failure of a whole module     1 5 4 Fast drive rebuild    The enhanced XIV architecture improves drive rebuild times and remains consistent at  around 13 minutes per TB of data on a 15 module system  XIV does not rebuild unused   zeroed  blocks     Important  Identified rebuild times are estimated and vary in specific environments  You  might experience reduced or increased rebuild times depending on architecture  block  data written  and resource allocations of modules  Refer to 2 10 2     Preserving data  redundancy  Rebuilding and redistributing    on page 51     1 5 5 True virtualization    Unlike other system architectures  storage virtualization is inherent in the basic principles of  the XIV Storage System design  Physical drives and the
529. re shown in Figure 3 13     9890 ATS for worldwide use  single phase  60 A 9811  9813  9891 ATS for United States  Canada  Latin America  and Japan  three phase delta 60A 9820  9892 ATS for EMEA and Asia Pacific  except Japan   three phase wye  30 A 9822  9894 ATS for United States  Canada  Latin America  and Japan  three phasedelta 30A 9824          Figure 3 13 ATS features    Chapter 3  IBM XIV architecture  components  and planning 79    80    Figure 3 13 on page 79 also shows the power cords  line cords  that are associated with each  ATS  Figure 3 14 shows the details associated with each power cord feature  These power  cords are also country specific  Because each country has specific testing and certification  requirements  these power cords cannot be used in countries other than those countries in  which they were intended to be used     98 11 98 90 Line cord for United States  Canada  Latin Hub bell Hub bell Hubbell  America  and Japan with plug  single phase  HBL360P 6V04 HBL360R6W HBL360C6W  60 A  two wires  ground   98 13 98 90 Line cord for EMEA and Asia  acific  exce pt Hardwired or Not applicable Notapplicable  Japan  hard wired  single phase 60 A  two wires uses client    ground provided   connector  98 20 98 91 Line cord for United States  Canada  Latin Hub bell H ub bell Hubbell    America  and Japan with plug  three phase  60 A  HBL460P9V05 HBL460R9OW HBL460C9OW  three wires   ground    98 22 98 92 Line cord for EMEA and As ia acific  exce pt Hardwired or 
530. re vSphere Web Client  vCenter Orchestrator   vCO   vCenter Operations Manager  vCOPs   and VMware vCloud Automation Center   vCAC   As such  the IBM Storage Integration Server delivers a range of IBM storage  integration services in cloud based architectures providing provisioning  automation  and  monitoring     Three site mirroring  also referred to as 3 way mirroring  allows a 3 way replication  scheme where data is mirrored among three mirroring sites  peers  using one  synchronous and one asynchronous connection in a concurrent topology  Thanks to XIV s  unique architecture  the multiple mirroring has near zero impact on system performance     The function is only available on Gen3 systems  with XIV Storage Software v11 5 or later    There is no additional cost  or license requirement     The IBM Hyper Scale Manager now includes a reporting feature that graphically depicts  trending of capacity and use across multi system deployments  It   s a built in feature that  does not require any add ons  tools  or external databases     GUI support for the cross system consistency groups in IBM Hyper Scale Manager that  automates the coordinated creation of snapshots for interdependent consistency groups  on multiple XIV systems     Security enhancements including auditing of user actions and user interface locking after  a predefined period of idle time  allow XIV to meet requirements imposed by the Payment  Card Industry Data Security Standards  PCI DSS      Mobile Push notifi
531. redentials        Each profile has its own list of managed systems    240 IBM XIV Storage System Architecture and Implementation    IBM XIV GUI Properties      General   Shortcut   Compatibility    Security     Hv IBM XIV GUI    Target type  Application  Target location  XIVGUI    Target  orage WAIWAIVGGUadvgui exe h cox  ser _A     Start in   C  Program Files    JBM Storage AMARIGI     Shortcut key    None      Run    Normal window    Comment     Apply    Figure 5 43 User profile for MultiSystem Manager       5 6 Enabling compliance with PCI DSS    PCI  DSS  Payment Card Industry Data Security Standard  is the global data security  standard adopted by the payment card brands for all entities that process  store  or transmit  data     The following security enhancements required by PCI DSS standard are now enabled in XIV  software Version 11 5  and enable clients to comply with PCI DSS regulation and security  requirements     gt  Auditing via syslog    gt  Session Idle Timeout    These two features are in addition to other already available XIV features that all contribute to  make XIV compliant with PCI DSS  as summarized in Figure 5 44 on page 242     Chapter 5  Security 241       PCI DSS Requirement XIV Solution       Section   23 Encrypt all no n con sole administrative access Sup ported   SSL   SL Implement a data r ete ntion and disposal policy that Encryption di sabl eh ost level overwrite   out of  includes    Processes for secure deletion of data XIV scope     disab
532. redistributed  XIV Storage System is data aware  which means that the  work of redistribution is necessary only on partitions that contain actual data  Partitions  that do not contain data do not take up any XIV Storage System performance resources  during redistribution      gt  All disk drives in the original configuration contribute equally to the redistribution activity   This situation results in the fastest redistribution times possible and minimizes stress on  the drives     One of the most impressive and unique aspects of the XIV Storage System grid architecture  is that  as more modules are added to the system  performance basically scales up linearly   Again  this situation is because each module contains a balanced amount of additional  processors  cache  disk performance  and bandwidth capacity     6 1 3 Caching mechanisms    From a total system perspective  the XIV Storage System has ample cache  The XIV Storage  System Gen3 Model 214 system with 4 TB drives  for example  was announced with 48 GB of  cache per module for a fully configured system cache size of 720 GB  The XIV Gens with the  XIV System software Version 11 1 0 or later also offers the option of an extended SSD cache   This extension provides an additional 6 TB of read cache  on a 15 module system   Since XIV  System software Version 11 4 0  the read cache extension with flash drives can be up to   12 TB  on a 15 module system   The flash  SSD  cache can boost performance up to three  times for typi
533. ring      oExec StdIn WriteLine  exit       while  oExec Status    0   WScript Sleep 100       WshShell LogEvent 0   XIV Latency Monitor Script Completed Successfully        lt  script gt    lt  job gt     The script in Example 7 51 on page 410 also begins with defining variables that are used  throughout the process  It then builds an XCLI command that is based on these variables and  runs the command in a shell     The output from XCLI is again customized by using the  t option to limit the display to only  the specific fields in which we are interested  In this case  we need only the write hit medium  latency field  This option makes the output of the XCLI command easy to parse     The XCLI command is structured in a way to provide output during a custom window of time   In Example 7 52  we gather data from every minute during a 24 hour period on the previous  day that the script is run     Example 7 52 Limiting the output of XCLI commands using the  t option    var Command      statistics get count 1440 interval 1 resolution _unit minute  t  write hit_medium_ latency end     EndDate     In Example 7 53 on page 411  each resulting value is compared to the threshold  If any one  of them exceeds the value  it sets a flag to be used to generate a custom event     Example 7 53 Looping through the XCLI command output    while   oExec StdOut AtEnd0fStream      Stringl   oExec StdOut ReadLine       n    Stringl   Stringl replace    s     s   g       if  Stringl  length    0  cont
534. ring subject matter described in this document  The  furnishing of this document does not grant you any license to these patents  You can send license inquiries  in  writing  to    IBM Director of Licensing  IBM Corporation  North Castle Drive  Armonk  NY 10504 1785 U S A     The following paragraph does not apply to the United Kingdom or any other country where such  provisions are inconsistent with local law  INTERNATIONAL BUSINESS MACHINES CORPORATION  PROVIDES THIS PUBLICATION    AS IS    WITHOUT WARRANTY OF ANY KIND  EITHER EXPRESS OR  IMPLIED  INCLUDING  BUT NOT LIMITED TO  THE IMPLIED WARRANTIES OF NON INFRINGEMENT   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE  Some states do not allow disclaimer of  express or implied warranties in certain transactions  therefore  this statement may not apply to you     This information could include technical inaccuracies or typographical errors  Changes are periodically made  to the information herein  these changes will be incorporated in new editions of the publication  IBM may make  improvements and or changes in the product s  and or the program s  described in this publication at any time  without notice     Any references in this information to non IBM websites are provided for convenience only and do not in any  manner serve as an endorsement of those websites  The materials at those websites are not part of the  materials for this IBM product and use of those websites is at your own risk     IBM may use or distribute
535. rives and 6 TB drives   Airflow is from front to back      gt  Building features  such as any ramps  elevators  and floor characteristics  must also  be considered     The following measurements in Figure 3 10 are provided for your convenience        120 cm  47 2 in  120 cm  47 2 in      100 cm  39 4 in              Front Rear    Adjacent rack    10 cem   N T sss  Door    3 9 in     g5       maximum   66 cm  26 0 in         66 cm  26 0 in      g5    maximum  _      _    am       10 cm   3 9 in      Adjacent rack    mv 10178             Figure 3 10 Rack clearances  Model 214 and 114    3 1 8 Power components    This section describes power components and their redundancy   Power redundancy    To prevent the complete rack or single components from failing because of power problems   all power components in the XIV Storage System are redundant     Chapter 3  IBM XIV architecture  components  and planning 77    78     gt  To protect against loss of client utility power  the XIV Storage System attaches to two  independent power sources  The XIV includes two power cables that must be plugged into  redundant external power sources  The other ends of the redundant cables are routed  inside the XIV rack and attached to the XIV Automatic Transfer Switch  ATS   For most  XIV power solutions  the ATS allows power from one of the redundant feeds to power the  XIV rack  If there is an external power failure  the ATS transfers the load to the redundant  power cord      gt  The XIV Storage S
536. rmance class  complete these steps     1  Right click the domain in the Domains view  and select Limit Traffic by Perf Class  as  shown in Figure 4 105                    ITSO_domain3 E   Manage Associations d    View Associated Pools  Ba ITSO_domain_2    _   _  View Associated Hosts and Clusters        EEE    View Associated Users and User Groups    Limit Traffic by Perf Class    Limit Traffic by new Perf Class    Properties       Figure 4 105 Limiting a domain by an existing performance class    2  Inthe dialog window  select the existing performance class from the drop down menu and  click Limit  as shown in Figure 4 106     Limit Traffic by Perf Class    Performance Class   ITSO pfc_100MB             Figure 4 106 Selecting an existing performance class to associate with a domain    3  The GUI opens the QoS Performance class view  where you can confirm that the domain  is now associated with the chosen performance class  as shown in Figure 4 107 on  page 194     Chapter 4  IBM XIV Storage Management software 193           Performance Class         ITSO_3way_pc IOPS Limit    3 000  S00x6  Bandwidth Limit   600  100 X 6   ITSO_pc1_io5000_300MB IOPS Limit   4 998    33  6  Bandwidth Limit   1 800 _  200x6     ITSO_pfc_100MB Bandwidth Limit    96  16X6        Incoming traffic to Domains       3 ITSO_pfc_io1000 IOPS Limit    996  166 X 6           Figure 4 107 A domain successfully associated with an existing performance class    Associating a domain with a new performance clas
537. rmance impact of upgrading and  adding XIV Storage System hardware to meet the specific aggregate I O workload  requirements  This can be investigated  in part  by engaging IBM or an IBM Business Partner  to perform a Disk Magic study  However  keep in mind that Disk Magic assumes that  end to end logical configuration preferred practices have been implemented from the  application layer to the storage subsystem layer  Therefore  attempting to use Disk Magic as  the sole basis for diagnosing or isolating a performance issue might result in drawing an  invalid conclusion and could prolong the duration of the problem     Response times are a good measure of how well the XIV Storage System is performing  The  XIV System GUI uses the term latency  They are both the same thing  The best way to  determine whether response times are good or bad is to compare them to the values  recorded when the application was known to be performing well  If the response times  compare closely  it is likely that the XIV Storage System is still providing good performance   There are several things to consider when evaluating XIV Storage System response times      gt  Do not be alarmed at sudden spikes in IOPS or response times  Most production  applications are not sensitive enough to experience performance issues associated with  spikes that last for only one reporting interval  which in the case of XIV Storage System is  1 minute      gt  Itis the prolonged elevated response times that most transa
538. rmat  12 Hours  Default    Certificates    p    Figure 4 20 Regional Settings tab in the GUI       Chapter 4  IBM XIV Storage Management software 127    Disabled menu item tooltips   For each GUI menu item that is disabled  the menu item contains a tooltip that explains the  reason why the item is disabled  To view the tool tip  move your cursor over the circled f icon  at the right of the menu item  as shown in Figure 4 21        4 admin Storage Administrator   technician Technician   xiv_development   it  Edit   xiv_hostprofiler  Delete   xiv_maintenance   xiv_msms Change Password  trator   Application01 Group Add To Group   Properties Selected user is not in a user group          Figure 4 21 Disable menu item tooltips    Secure Sockets Layer certificate management    Enhanced Secure Sockets Layer  SSL  certificate support in XIV System Management  software 4 4 improves the flexibility and security of managing IBM XIV systems in two ways      gt  Support for the use of self signed certificates for securing communications between the  GUI and XIV Systems running System software Version 11 2 or later  whether via direct  mode  or via the Multisystem Manager  To manage the self signed certificates on an  XIV Storage System  click Systems in the menu bar  click System Settings  then click  Manage Certificates  as shown in Figure 4 22  For more details about certificate  management  see 5 2     x509 certificate validation and management    on page 208           xiv XIV Storage M
539. roup         Application01_Group     m          Application02_ Group  Application01_Group    Figure 5 35 Select User Group window             The lab_admin user has been added as a member to the Application01_Group user group  in this example     8  Verify this group membership under the Application01_Group section of the Users  window  as shown in Figure 5 36          Category       Ungrouped    applicationadmin 0049   5219185 lab_admin domain de Application01_Group          Figure 5 36 View user group membership    Chapter 5  Security 231    The lab_admin user is an applicationadmin with the Full Access right set to no  This user can  now perform snapshots of volumes mapped to the hosts ITSO Apphost1l and ITSO Apphost2   The user can also map  unmap  and delete snapshots from the application group     5 5 3 Security considerations when using Hyper Scale Manager    Hyper Scale Manager allows access and distributes tasks among the following users      gt  Root user   The root user is an OS super user that carries out administrative tasks    gt  Server admin user   The server admin carries out inventory configuration tasks      gt  Maintenance user    The maintenance user carries out Hyper Scale Manager configuration tasks  This user is  the client   s way to interact with any of the Hyper Scale Manager operations by using  Secure File Transfer Protocol  SFTP   such as setting logs  copying the upgrade file  and  getting backups     Note  This section is meant as information o
540. rt to complete the import of the signed certificate into the XIV Storage System   The successfully imported certificate is shown in Figure 5 7     Certificates Management    ag    ri    Authenticated Services 1     a     NX oj             a   Close    Figure 5 7 Imported certificate    7  Optionally  repeat steps 1   6 for any additional IBM XIV systems that you want to secure  with your own certificate     Trusting the signed x509 certificate in the XIV GUI certificate   When you have imported your own certificate into the XIV Storage System  that system will  present this certificate to the management tools  GUI  XCLI  and so on  that you use to  connect to that system  Because this is a new certificate  the GUI reports a certificate error  when connecting to that system  as shown in Figure 5 8        XIV Galactica 1340009_          Figure 5 8 GUI certificate error    Chapter 5  Security 213    Proceed to resolve the certificate error     1  To resolve this error  you must configure the GUI to trust the new certificate  To do so   right click the system and choose Manage Certificate  as shown in Figure 5 9     Modify IP Addresses  Remove System    Move System To       Suspend Monitoring    Manage Certificate          Figure 5 9 Manage Certificate menu option    2  The GUI displays the details of the new certificate  as shown in Figure 5 10  Click Trust  Always to trust this certificate for all future connections     Certificate Details    This security certificate is not tr
541. rticipating in  the rebuild is about 20 times greater than in most average sized conventional RAID arrays   By comparison  the array rebuild workload is greatly dissipated  greatly reducing the  relative impact on host performance         In a conventional RAID array  the whole disk is re created which often includes unused  space         Conventional RAID array rebuilds place many times the normal transactional load on  the disks and substantially reduce effective host performance     54 IBM XIV Storage System Architecture and Implementation     gt  The XIV Storage System maintains universally accessible reserve space on all disks in the  system  as described in    Global spare capacity    on page 34     Standard dedicated spare disks used during a conventional RAID array rebuild might not  be globally accessible to all arrays in the system      gt  Hotspots are statistically eliminated because the XIV Storage System maintains access  density equilibrium  which reduces the chances of isolated workload induced failures      gt  The XIV Storage System data distribution eliminates localized drive stress and associated  additional heat generation      gt  Modules intelligently send information to each other directly  There is no need fora  centralized supervising controller to read information from one disk module and write to  another disk module      gt  All disks are monitored for errors  poor performance  or other signs that might indicate that  a full or partial failure is 
542. rtificate request  as shown in Figure 5 4        Certificates Management      Authenticated Services                             lt      Figure 5 4 Pending CSR    210 IBM XIV Storage System Architecture and Implementation    4  Use the CSR file that you just created to obtain a signed x509 certificate  either from a  trusted CA vendor  or from your organization   s own CA server  For more information about  setting up your own CA server and creating your own signed certificate  see    Certificate  authority setup    on page 460     Tip  Depending on what certificate authority server is used to create your signed  privacy enhanced mail  PEM  file  the contents of the file might differ slightly  For  example  when OpenSSL is used to generate a signed PEM file  the file might contain  plain text metadata details about the CA server and the certificate     To import the PEM file into an XIV Storage System  it must conform to the x509  standard PEM file format  That is  it should contain only the actual encrypted certificate  and the enclosing       BEGIN CERTIFICATE      and       END CERTIFICATE       tags  as shown  below     MITEFTCCAv2gAwI BAgIBJZANBgkqhki GQwOBAQUFADBLMQswCQYDVQQGEwJVUZELMAkGALUECBMC  QVoxDDAKBgNVBAoTA01CTTENMASGALUECXMESVRTTZESMBAGA1UEAxMJeG1 2Q0Fob3NOMB4XDTEz  MDMyMDIZNTkKOMVoXDT EOMDMyMDIZNTkOMVowTDELMAkKGALUEBhMCVVMxCZAJBgNVBAgTAkFaMQ8w  DQYDVQQHEwZUdWNzb24xDTALBgNVBAoTBG1 0c28xEDAOBgNVBAMTB3hpdmhvc3QwggEiMA0GCSqG  SIb3DQEBAQUAA4IBDwAwggEKAoIBAQC4hOTzzsk
543. rtificate store field is set to Trusted Root Certification Authorities  Click Next  to continue     5  The CA certificate is now imported  Click Finish to close the wizard     450 IBM XIV Storage System Architecture and Implementation    After the CA and server certificates are imported into the local keystore  you can then use the  local certificate management tool to check whether the certificates are correctly imported   Open the Console Root     Certificates  Local Computer      Personal     Certificates  folder and select the certificate issued to xivhostl xivhostlldap storage  tucson  ibm com     Figure B 11 shows that the certificate that was issued to  xivhostl xivhostlldap storage tucson ibm com is valid and was issued by the xivstorage  CA  The certificate has a corresponding private key in the keystore  The    Ensures the identity  of the remote computer    text indicates that the certificate has the required server  authentication key usage defined        Certificate El Ed               This certificate is intended for the following purposefs    eEnsures the identity of a remote computer    Issued to    xivhostl xivhostildap  storage  tucson  ibm com  Issued by  xivstorage    Yalid from 6 29 2009 to 6 29 2010    Je You have a private key that corresponds to this certificate     Issuer Statement            Figure B 11 Certificate information window    Appendix B  Additional LDAP information 451    To check the xivstorage certificate  open the Console Root     Certi
544. rule   smsgw   smtpgw   target   volume   cluster  ip_interface  ldap_conf  meta_data_object  sync_schedule  user  user_group  ldap_server  modules_ status  xmirror    Domain event    Consistency group  Event destination group  Event notification group  Data migration   Domain   Host   Volume mapping  Mirroring   Pool   Rule   SMS gateway   SMTP gateway   Fibre Channel or iSCSI connection  Volume mapping  Cluster   IP interface   LDAP configuration  Metadata events  Schedules   User   User group   LDAP server   Modules status   3 way mirror    Client can select the appropriate domain name  if any defined  from the Domain pull down  menu and can get events list related to that corresponding domain as shown in Figure 7 26    on page 346    7 1 8 Viewing events using the XCLI    Table 7 2 on page 348 provides a list of all the event related commands available in the XCLI   This list covers setting up notifications and viewing the events in the system  For a more  in depth description of system monitoring  see Chapter 7     Monitoring    on page 327     Chapter 7  Monitoring 347    Table 7 2 XCLI  All event commands    Defines a Short Message Service  SMS  gateway   Deletes an event notification rule     348 IBM XIV Storage System Architecture and Implementation    Lists event notification rules     rule_rename Renames an event notification rule     rule_update Updates an event notification rule     Lists users in the system per domain     domain _list_objects Lists objects in th
545. ry        ldapsearch  x  H ldap   9 155 113 143 389  x  b  cn Users dc itso dc storage dc ibm dc com  D  cn itso cn Users dc itso dc storage dc ibm dc com  w PasswOrd cn  grep    cn  cn  Users   cn  krbtgt   cn  itso appuserl   cn  Domain Computers   cn  Domain Controllers   cn  xivtestuser3    The queries generating LDAP account lists are provided as a demonstration of LDAP tools  capabilities to perform a search of information stored in the LDAP directory and generate  simple reports  Both queries are issued on behalf of the LDAP administrator account  cn Manager  OpenLDAP   cn    Directory Manager     Oracle Java Directory   and  cn  Administrator        Active Directory   A privileged account  such as LDAP administrator  has  the authority level that allows that person to list  create  modify  and remove other user  accounts     The Active Directory management interface allows you to build custom views based on LDAP  search queries  Figure 5 73 shows the building of a query that generates the list of   XIV Storage System accounts whose names start with XIV  and whose description is one of  the following three     Storage Administrator        Read Only     or starts with    app           E Active Directory Users and Computers  _  Oy x   File Action View Help   cones P       E p      ty Thee m   w  k OXE Selb Beahrae  E Active Directory Users and Comput Description    E  L  Saved Queries L Iy   T   Admin User   Admin    H my Storage Accounts SivEestuserl User    254 itso st
546. s      gt  Signing into the XIV Storage Management GUI    gt  Connecting to IBM XIV systems    gt  Overview of the management and system views   gt  Review of XIV Storage Management GUI features    Next  moving to the XCLI  the following topics are described     Launching the XCLI   XCLI Session features  Customizing the XCLI environment  Using XCLI help    M    vy y    4 3 1 XIV Storage Management GUI used in direct mode  The XIV Storage Management GUI is a multi function tool for individually managing one or    more IBM XIV systems  This section describes the basic steps to follow to get started using  the GUI     Chapter 4  IBM XIV Storage Management software 117    Signing onto the XIV Storage Management GUI    When starting the XIV Storage Management GUI for the first time  a login window prompts  you for a user name and its corresponding password before granting access to the XIV  Storage System  The default user is admin and the default corresponding password is  adminadmin  see Figure 4 7      storage Management    User    admin      Password   TrTTTtitt tt    Login   gt      Licensed Materials   Property of IBM Corporation and other s   Copyright    2008  2012  IBM and  XIV are registered trademarks of IBM Corporation in the United States  other countries  or both        Figure 4 7 Login window with default access    Important  Remember to change the default passwords to correctly secure your system   For more information  see 5 5 5     Password management and resets
547. s  To associate a domain with a new performance class  follow these steps     1  Right click the domain in the Domains view and select Limit Traffic by new Perf Class   as shown in Figure 4 108        Name Utilization                         Edit 1 TB Hard   TSO domain Delete m 3  Manage Associations    stata  View Associated Hosts and Clusters oO eGVO OO T    View Associated Users and User Groups                      a     l 209 3 TB Hard  no domain Limit Traffic by Perf Class CCCJ50Z5  84 UD  Limit Traffic by new Perf Class            ph  gt    gt   gt    144 TEE A bari 3 1 TE Soft  Properties    Figure 4 108 Limiting a domain by a new performance class    2  Inthe dialog window  enter a Name for the new performance class  a value for the I O Limit  or Bandwidth Limit  and click Add  as shown in Figure 4 109          Add Performance Class x    System  XIWV_PFE2_1340010 r  Name    i MTS50_Domain_100MB_100010P5  lOps Limit  6 600 000   1000    Total     Bandwidth Limit  6 60 000   100 Total     E          Figure 4 109 Associating a domain with a new performance class       3  The GUI opens the QoS Performance class view  where you can confirm that the domain  is now associated with the new performance class  as shown in Figure 4 110 on  page 195     194 IBM XIV Storage System Architecture and Implementation       Name Performance Class    33 ITSO_3way_pc IOPS Limit    3 000  500 X    Bandwidth Limit    600  33 ITSO_Domain_100MB_1000IOPS IOPS Limit 996  166 X6 Bandwidth Limit 
548. s  You can use the default  or enter a new address  If there are  email problems  such as the wrong email address  a response email is sent to this  address  Depending on how your email server is configured  you might need to use an  authorized address to ensure correct delivery of notifications  Click Finish     The Create the Gateway summary window opens  as shown in Figure 7 42     Wizard   Gateway Create   Create the Gateway x    Create the Gateway    View the gateway attributes and create the gateway or cancel and discards all  changes in this wizard     Type       Gateway Name   ITSO Mail Gateway    Address Gateway Type   SMTP    Gateway Address   au ibm com    Sender Email   xiv01  yourcompany com au    Finish              sn cw os    Figure 7 42 Create the Gateway  Summary       Chapter 7  Monitoring 361    7  Review the information you entered on this window  If all is correct  click Create  If not   click Back until you are at the information that needs to be changed  Or  select the buttons  on the left to take you directly to the information that needs to be changed     Next  the Events Configuration wizard guides you through the setup of the destinations   where you configure email addresses or SMS receivers  Figure 7 43 on page 362 shows  the Destination window of the Events Configuration wizard     Wizard   Events Configuration   Destination    Destination    Add Destinations  Smnp  email  sms or group of destinations  objects        _    Rule       gs Create De
549. s DC itso DC storage  DC i bm  DC com     In Example 5 27 on page 280  we apply these changes to allow the OpenLDAP connection  using the XCLI  You must be logged in to the XCLI as the admin user     Chapter 5  Security 279    Example 5 27 Configuring XIV Storage System to use OpenLDAP Directory groups for role mapping     gt  gt I dap_config set server_type  Open Ldap   Command executed successfully      gt  gt  Idap_config set xiv_group attrib description  Command executed successfully      gt  gt  Idap_config set read_only role XIVReadonly  Command executed successfully      gt  gt  Idap_config set storage _admin_role XIVAdmins  Command executed successfully      gt  gt  Idap_config set xiv_user    UID XIV  0U Users  DC itso  DC storage  DC ibm  DC com     Xiv_password Passw0rd  Command executed successfully      gt  gt Idap_add_ server fqdn itso storage ibm com port 389 address 9 155 113 137  base_dn  0U Users DC itso DC storage  DC ibm  DC com     Command executed successfully      gt  gt Idap_config_get    Name Value  current_server   version 3  Xiv_group_ attrib description  Storage admin role XIVAdmins  read only role XIVReadonly  session cache period 20   bind time limit 20  user_id_attrib uid   first _expiration event 30   second expiration event 14   third expiration event 7   use ssl no   Xiv_user UID XIV 0U Users  DC itso DC storage  DC i bm  DC com  server type Open Ldap  user_name_attrib uid   group search depth 0   group search max_queries 39    group search s
550. s access control definitions    storageadmin  readonly  and  applicationadmin    user define Defines a new user  storageadmin and securityadmin  user delete Deletes a user  storageadmin and securityadmin    user list Lists all users or a specific user    storageadmin  readonly   securityadmin   applicationadmin    user_rename Renames a user  storageadmin and securityadmin    user_update Updates a user  You can storageadmin   rename the user  change a applicationadmin   password  modify the Access securityadmin  All setting  modify email  area  code  or phone number     user_group add user Adds a user to a user group  user_group_create Creates a user group   user_group delete Deletes a user group     user_group list Lists all user groups ora storageadmin  readonly  and  specific one  applicationadmin  user_group remove _user Removes a user from a user storageadmin  group     user_group update Updates a user group     domain _list_users Lists users associated with storageadmin  securityadmin   domains  applicationadmin  readonly   technician    domain_add_user Associate a user with adomain    storageadmin  securityadmin    domain _remove_user Disassociate a user from a storageadmin securityadmin  domain     Adding users with the XCLI    Before performing the following steps  the XCLI component must be installed on the  management workstation  and a storageadmin user is required  For more information about  installing the XIV Management software  including the XCLI  see 4 2     
551. s aggressive prefetch caching  sophisticated cache  updates  snapshot management  and data distribution  is always maintained regardless of  the system capacity     2 2 2 Software parallelism    In addition to the hardware parallelism  the XIV Storage System also employs sophisticated  algorithms to achieve optimal software parallelism     Modular software design   The XIV Storage System internal operating environment consists of a set of software  functions that are loosely coupled with the hardware modules  These software functions  reside on one or more modules and can be redistributed among modules as required   therefore ensuring resiliency under changing hardware conditions     An example of this modular design is located specifically in the interface modules  All six  interface modules actively manage system services and software functions associated with  managing external I O  Also  three of the interface modules deliver the system   s management  interface service for use with the XIV Storage System     Data distribution algorithms   Data is distributed across all drives in a pseudo random fashion  Patented algorithms provide  a uniform yet random distribution of data  which is divided into 1 MB partitions across all  available disks  to maintain data resilience and redundancy     Figure 2 4 shows how all drives are used evenly by partition units regardless of applications  or the size of assigned logical volumes  The storage administrator does not need to worry  ab
552. s from either list by selecting a host and clicking the appropriate arrow     6  Finally  click Update to save the changes     Unlike in native authentication mode  in LDAP authentication mode  user group membership  cannot be defined using the XIV Storage Management GUI or XCLI  The group membership  is determined at the time the LDAP authenticated user logs in to the XIV Storage System   based on the information stored in the LDAP directory  A description of the process of  determining user group membership can be found in 5 7 4     LDAP role mapping    on   page 247     Starting with XIV Storage System Software v10 2 2  it is possible to delete user groups when  LDAP authentication is enabled     Chapter 5  Security 273    5 9 3 Managing user groups by using the XCLI in LDAP authentication mode    Various commands and options are available to manage user groups  roles  and associated  host resources through the XCLI     To use the XIV Storage Management GUI to define user groups  complete the  following steps   1  Run user_group create  as shown in Example 5 20  to create a user group called  itso _app02 group with the corresponding LDAP role itso _app01_admin   Example 5 20 XCLI user_group_create in LDAP authentication mode     gt  gt  user group create user _group itso app02 group  Idap_role CN itso_app02_ admin  CN Users DC itso DC storage  DC ibm  DC com  Command executed successfully    Spaces  Avoid spaces in user group names  If spaces are required  the group name  
553. s necessary to increase the soft system size beyond the maximum hard system size  for a particular XIV Storage System model  there is a procedure that IBM performs that  can accomplish this task  Contact your IBM Technical Advisor or IBM sales team for more  details     There are conditions that might temporarily reduce the system   s soft limit  For more  information  see 2 10 2     Preserving data redundancy  Rebuilding and redistributing    on  page 51     Depletion of hard capacity    Using thin provisioning creates the inherent danger of exhausting the available physical  capacity  If the soft system size exceeds the hard system size  the potential exists for  applications to fully deplete the available physical capacity     Important  Upgrading the system beyond the full 15 modules in a single frame is currently  not supported     42 IBM XIV Storage System Architecture and Implementation    Snapshot deletion    As mentioned previously  snapshots in regular storage pools can be automatically deleted by  the system to provide space for newer snapshots  For thinly provisioned pools  snapshots can  be deleted to free more physical space for volumes     Volume locking    If more hard capacity is still required after all the snapshots in a thinly provisioned storage  pool have been deleted  all the volumes in the storage pool are locked  preventing any  additional consumption of hard capacity  There are two possible behaviors for a locked  volume  read only  the default behav
554. s publications      n   naana aaaea a xiii  Summary of changes          uaa anaana Sh  Ou oes Cee eae Oe es Bee da XV  May 2014  Ninth Edition    0 0    0    ee ee eee eens XV  Chapter 1  IBM XIV Gen3 Storage System overview                   000 cee 1  Ti  MAT OGUCHOR sek siate  antag tee aie or kich x Sieh wie Soave ee a Soa ao ate SB Sher ae ed Bee De 2  1 2 New feat  res IN XIV nccc piber erid Shae Wa es wee ele OG yee ema YR bee wees 2 3  1 3 Total cost of ownership          0 0 0 0 cc ee eee eee 4  1 4 XIV Gen3 Storage System models and components              0 0000 eee 5  1 5 XIV Gen design features and functions        0 0    00  ee 6  1 5 1 Massive parallelism          0 2 0 0 0    cc eee eens 6  232  NVOLKIOdC DAlAaNClAG  y oes  et aah aoe ake BURNS a eens ed eee eee 7  2353 SSM CANIG os  acne Gigi Re aR BR i SED at Oe ven Se or as Senter eA O08 aide Dk SE S 7  154 IFASLONVETCOUIIG a20 0 ce iarere heee et Rhee oe cae ae Pees eet Reema eed 7  15 5     Ue VINUAlIZAUON  lt 4 4 misemi Se oo ese eee RE Yee oe eee eek noe eee 7  1 5 6 Flash caching   Optional     22  v0s0 424 425540 05 Seca 21065 5 1S oeh Ges Bee EX 8  5 7    TAIN PLOVISIONING  sss te pnh e eG bo Oe oe OE A ae Re eee Oak 8  W0 6 IPTOCCSSING DOW Cl errian Wiss Won ein nal heads a eater wd alae owe Make 8  125 9    SAIN COMMECUV IVY ra eaa ad dow ana ackte aoe ahah bein de abate eben ee anarg a a 8  1 5 10 Inter generational mirroring       2 0    0  eee ees 8  1 6 XIV Storage System Software        nanana
555. s publications  residencies  and workshops with the IBM Redbooks  publications weekly newsletter     https    www redbooks ibm com Redbooks nsf subscribe 0penForm   gt  Stay current on recent Redbooks publications with RSS Feeds     http    www redbooks ibm com rss html    Preface xiii    XiV IBM XIV Storage System Architecture and Implementation    Summary of changes    This section describes the technical changes made in this edition of the book and in previous  editions  This edition might also include minor corrections and editorial changes that are not  identified     Summary of Changes   for SG24 7659 08   for IBM XIV Storage System Architecture and Implementation  as created or updated on May 13  2015    May 2014  Ninth Edition    This revision reflects the addition  deletion  or modification of new and changed information  described below     New information     gt  Inclusion of XIV Storage System Software Version 11 5 features  including multitenancy   enhanced performance classes  mobile notifications  and security updates     gt  Examples and illustrations that reflect XIV Storage Management GUI v4 4     gt  Updated     Similar results can be accomplished on UNIX based platforms by using shell  scripting and crontab for scheduling custom monitoring processes     on page 412    Changed information   gt  Various updates to reflect the XIV Storage Software Version 11 5 1 features     gt  IBM XIV Gens latest hardware       Copyright IBM Corp  2014  All rights reserved 
556. sabled  Default    amp    AV_RedBk_DB_06 1015 GB 1015 GB ITSO Disabled  Default    amp    AV_RedBk_DB_07 1015 GB 1015 GB ITSO Disabled  Default    amp    AV_RedBk_DB_06 1015 GB 1015 GB ITSO Disabled  Default   E AV_RedBk_DB_05 1015 GB 1015 GB ITSO Disabled  Default   E    AV_RedBk_DB_04 1015 GB 1015 GB ITSO Disabled  Default    amp    AV_RedBk_DB_03 1015 GB 1015 GB ITSO Disabled  Default    amp     AV_RedBk_DB_02 1015 GB 1015 GB ITSO Disabled  Default    amp     AV_RedBk_DB_01 1015 GB 1015 GB ITSO Disabled  Default   t 17GB_600 17 GB 0GB test_pool Disabled  Default    amp     17GB_599 17 GB 0GB test_pool Disabled  Default   b 17GB_598 17 GB 0 GB test_pool Enabled  Manually Set   t 17GB_597 17 GB 0 GB test_pool Disabled  Default   t 17GB_596 17 GB 0 GB test_pool Disabled  Default   t 17GB_595 17 GB 0 GB test_pool Disabled  Default    amp  17GB_594 17 GB 0GB test_pool Disabled  Default      17GB_593 17 GB 0GB test_pool Disabled  Default      17GB_592 17 GB 0GB test_pool Disabled  Default           Figure 4 52 Volumes and Snapshots view    Volumes are listed in a tabular format  If the volume has snapshots  then a   or a   icon  displays on the left  Snapshots are listed under their master volumes  and the list can be  expanded or collapsed at the volume level by clicking the   or   icon     Snapshots are listed as a subbranch of the volume of which they are a replica  and their row  is indented and slightly shaded     The Master column of a snapshot shows the name of the volume
557. se  the storage system is  likely to lose the contents of its volatile caches  resulting in a data loss and system  unavailability  To eliminate or greatly reduce this risk  the XIV Storage System rack can be  equipped with lockable doors  The XIV Gen3 rack security kit is available by ordering RPQ  8S1190     Important  Protect your XIV Storage System by locking the rack doors and monitoring  physical access to the equipment     5 2 x509 certificate validation and management    All communication among the XIV graphical user interface  GUI   XIV Storage System  Command Line Interface  XCLI   Hyper Scale Manager  and XIV systems uses Secure  Sockets Layering  SSL  via x509 certificates     The use of x509 certificates provides for secure authentication and encryption of all  communication between the XIV software components  Previous versions required the use of  the default  built in certificate  Beginning with XIV Storage System Software Version 11 2 and  XIV Storage Management software Version 4 1  you have the flexibility to install and use your  own x509 certificates in addition to the built in certificate     You can choose to use a certificate that is signed by either a trusted certificate authority  CA   vendor or your organization   s own private CA server  For more information about creating and  using your own CA server  see    Certificate authority setup    on page 460     Four steps are required to use your own certificate   1  Generate a certificate signing reque
558. se configuration  Host multipathing reliability during path error  recovery in certain operating systems is complicated by increasing numbers of paths per  LUN  Certainly  for host systems with two HBAs  the six paths per LUN method is the best  way to go     The second multipathing configuration  shown in Figure 6 4 on page 298  is more appropriate  for benchmarking and higher performance host systems with the highest I O requirements   The primary difference is the host s ability to handle the higher number of paths per LUN  It is  not a good practice to use this configuration for most production applications  primarily    Chapter 6  Performance 297    because of the complexity that the added paths per LUN imposes on the host multipathing  software     Notice these features of the configuration example in Figure 6 4      gt  Each host is equipped with dual HBAs  Each HBA  or HBA port  is connected to one of  two FC switches     gt  Each of the FC switches has a connection to a separate FC port of each of the six  interface modules     gt  Each LUN has 12 paths      gt  Each host HBA is physically connected to all six of the XIV Storage System interface  modules  This setup provides the ability for each HBA to involve the maximum available    I O capabilities     IBM XIV Storage System          Figure 6 4 Multipath configuration for larger hosts    For XIV Storage System  each interface module has two 2 port Fibre Channel adapters  It is a  good practice that each zone is ph
559. section can be sorted in ascending or descending  order by clicking the column and toggling the direction of the sort indicator  Figure 6 24 on  page 315      IBM XIV Storage System Architecture and Implementation       joec                                                                                                                                                    T   XIV Top  XIV Top  XV 021310114 x     Allinterfaces      Refresh every  4 E seconds itso  Storage  Volumes  amp  Hosts  Volume Name   1OPS Latency  ms  BW  MBps  _ Host Name OPS      Latency  ms    BW  M  XIVWS_HS24_lab13_4 0 Blade5 L 21 05 12991 2 359  XIVWS_HS21_14_1 0 Blade9 HS22V3 0 0 0  WSESX64 0 Blade2 L 21 02 0 0 0  WS _ESX 5 1 0 Blade3 L 21 03 0 0 0  WS ESX 41 0 Blade4 L 21 04 0 0 0  WS _ESX 34 0    Blade10 HS21 20 oOo 00  WS_ESX 21 0    Blade6 L 21 06 E oo o  N i 0 Blade7 HS22V2 0 0 0  0 WS_ESX Team2 0 0 0  0 ITSO_LPAR    0 i o o ooo  0 WS_ESX_Team3 0 0 0  0 WS_ESX Team4 0 0 172  0 Basic_WS Team  _Win 0 0 0  0 Basic_WS Team3_Win 0 0 0  WS_ESX Teams 0 0 0  IMvol8 5GB 0 0     WS_ESX_Team6 0 0 167  IMvol25 5GB 0 o     Basic_WS_Team2_Win 0 0 0  Basic_WS Team6_vol 0 0 WS_ESX_Team1 0 0 555  Basic_WS_Team  _vol 0 0 XIVWS_HS21_14 0 0 0  Basic WS Team4_vol 0 0 ITSO_LPAR2 0 0 0  Basic_WS_Team3_vol 0 0 Basic_WS Team4 Win 0 0 0  Basic_WS_Team2_vol 0 0 XIVWS_HS21_43 0 0 0  Basic_WS Team1_vol     0 o Basic_WS_Team5_Win 0 0 0   0 0 Basic WS Team1_Win 0 0 0          Figure 6 24 Sort columns in ascending or descendi
560. sed    A A M                           Logical View                      For a Thin Storage Pool   the pool soft size is  greater than the pool  hard size                    The snapshot reserve limits the maximum  hard space that can be consumed by  snapshots  but for a Thin Storage Pool it  does not guarantee that hard space will be  available           2   gt          D   gt      ou                   a                                                 Volume 3 Volume 4 napshots Unused  Consumed Consumed Consumed  Hard Space Hard Space ard Space  a ar This is the physical space consumed collectively by the  snapshots in the pool  Since snapshots are differential at  Volume 3 Volume 4 the partition level  multiple snapshots can potentially exist  Allocated Allocated within a single 17GB increment of capacity   Hard Space Hard Space  The consumed hard space grows as host writes In a Thin Storage Pool  the maximum hard space consumed by a volume  accumulate to new areas of the volume  The is not guaranteed to be equal to the size that was allocated  because it is  system must allocate new 17GB increments to possible for the volumes in the pool to collectively exhaust all hard space  the volume as space is consumed  allocated to the pool  This will cause the pool to be locked                             Figure A 3 Volumes and snapshot reserve space within a thinly provisioned storage pool    IBM XIV Storage System Architecture and Implementation    Consider Volume 3 in Figure A 3
561. sed in size  It is limited only by the space that is used  by the volumes and snapshots that are defined within that storage pool     The designation of a storage pool as a regular pool or a thinly provisioned pool can be  dynamically changed even for existing storage pools  Thin provisioning is described in 2 7      Capacity allocation and thin provisioning    on page 37     The storage administrator can relocate logical volumes between storage pools without any  limitations  if there is sufficient free space in the target storage pool          f necessary  the target storage pool capacity can be dynamically increased before  volume relocation  assuming sufficient deallocated capacity is available in the system         When a logical volume is relocated to a target storage pool  sufficient space must be  available for all of its snapshots to be in the target storage pool as well     36 IBM XIV Storage System Architecture and Implementation    Important      gt  When moving a volume into a storage pool  the size of the storage pool is not  automatically increased by the size of the volume  When removing a volume from  a storage pool  the size of the storage pool does not decrease by the size of the  volume      gt  The system defines capacity using decimal metrics  1 GB is 1 000 000 000 bytes  using decimal metrics  By contrast  1 GiB is 1 073 741 824 bytes using binary  metrics     The following principles apply to snapshots    gt  Snapshots are structured in the same manner
562. ser    cimn  USER_HAS FAILED TO_RUN_C    User  cimi  USER_HAS FAILED TO_RUN_C    User    itso  fSER_HAS FAILED TO _RUN_C    User    cimn  USER_HAS FAILED TO_RUN_C    User    cim  9 20 13  Nee amen f USER_HAS FAILED_TO_RUN_C    User  cimi  9 20 13  12 54 PM vI     USER_HAS FAILED TO RUN C User    cimr  9 20 13  12 54 PM    USER_HAS FAILED TO _RUN_C    User    cimr    Figure 7 38 Setup notification and rules       2  From the toolbar  click Setup to start the Events Configuration wizard  The wizard guides  you through the configuration of gateways  destinations  and rules  From the initial  Welcome panel  click Next or Gateway to open the Events Configuration   Gateway  window  as shown in Figure 7 39     Chapter 7  Monitoring 359    Wizard   Events Configuration   Gateway    Gateway    Add SMTP  Email  Gateways or SMS gateways  Note that you must first define    Welcome   an SMTP gateway before you define an SMS gateway   N    Destination       a Define Gateway       Rule    Finish        lt       lt      Figure 7 39 Define Gateway window          3  Click Define Gateway  The Gateway Create Welcome window that is shown in  Figure 7 40 opens  Click Next  The Gateway Create   Select gateway type window opens   as shown in Figure 7 40     Wizard   Gateway Create   Select gateway type    Select gateway type    SMTP gateways are used to send Email notifications  SMS gateways are used  to send SMS notifications   a    gemma    Name   SMTP     SMS  Address  Sender  Finish    Figure 7
563. served for the pool  The total physical capacity allocated to the constituent  individual volumes and collective snapshots at a particular time within a regular pool reflects  the current use by hosts because the capacity is dynamically used as required  However  the  remaining unallocated space within the pool remains reserved for the pool and cannot be  used by other storage pools     In contrast  a thinly provisioned storage pool is not fully backed by hard capacity  meaning  that the entirety of the logical space within the pool cannot be physically provisioned unless  the pool is transformed first into a regular pool  However  benefits can be realized when  physical space consumption is less than the logical space assigned because the amount of  logical capacity assigned to the pool that is not covered by physical capacity is available for  use by other storage pools     Figure 2 7 on page 40 shows a regular storage pool and a thin pool with these  characteristics      gt  Inthe regular pool  the host system sees a 34 GB LUN  a 51 GB LUN  and a 68 GB LUN   The storage pool size is the total of all three LUNs  which is 153 GB  About 40  of this  storage is used      gt  Inthe thin pool  the host system sees the same three LUN sizes  and the total storage pool  size is also 153 GB  The difference is that the total space corresponding to unused    Chapter 2  IBM XIV Storage System logical architecture and concepts 39    portions of each LUN  34 GB  51 GB  and 68 GB in the X
564. shot as  measured at the GUI    Created  System Time  Shows the creation time of a snapshot as  measured at the XIV Storage System    Created on Master  GUI Time   Created on Master  System Time     Creator Volume or snapshot creator name    Serial Number Volume or snapshot serial number       Most of the volume related and snapshot related actions can be selected by right clicking any  row in the table to display a drop down menu of options  The options in the menu differ slightly  for volumes and snapshots     Menu option actions  The following actions can be performed through these menu options      gt  Adding or creating volumes  see    Creating volumes    on page 156     gt  Resizing a volume  see    Resizing volumes    on page 160     gt  Deleting a volume or snapshot  see    Deleting volumes    on page 161    gt  Formatting a volume    gt  Renaming a volume or snapshot    gt  Creating a consistency group with these volumes    gt  Adding to a consistency group     gt  Removing from a consistency group    Chapter 4  IBM XIV Storage Management software 155    156     gt  Moving volumes between storage pools   See    Moving volumes between storage pools    on page 148      gt  Creating a snapshot    gt  Creating a snapshot  advanced     gt  Overwriting a snapshot    gt  Copying a volume or snapshot    gt  Locking and unlocking a volume or snapshot    gt  Mappings    gt  Change SSD caching state    gt  Displaying properties of a volume or snapshot    gt  Changing a snapshot
565. simov_109 51 GB 0 GB mirror_pool Enabled  Default     E b adams_067 51 GB 0 GB mirror_pool Enabled  Default   ag w asimov_042 51 GB 0 GB mirror_pool Enabled  Default   b asimov_044 51 GB 0GB mirror_pool Enabled  Default   BS b asimov_101 51 GB 0 GB mirror_pool Enabled  Default    Figure 4 119 SSD field on Volumes and Snapshots view    By default  any newly created volume inherits the current system level cache setting     System Level Settings      gt  If flash cache is disabled from System Level Settings  it is disabled  by default  for every  new volume defined      gt  If flash cache is enabled from System Level Settings  it is enabled  by default  for every  new volume defined     In the Volumes and Snapshots view shown in Figure 4 119  right click a volume row and  select Change SSD Caching State from the pop up menu     IBM XIV Storage System Architecture and Implementation    You are presented a dialog box where you can change the status of the SSD Caching   Figure 4 120      Change SSD Caching State    Volume  abby_10       Default  Enabled    Recommended   It is recommended to use the default system SSD caching state    To change this  go to Menu   Tools   Settings   System   Parameters   O Manual    Enable    Disable       Figure 4 120 Change Volume SSD Caching State window    The following information applies to the Change SSD Caching State window    gt  If the Default  Enabled  setting is selected  the volume follows the current system settings      gt  You can ov
566. sing  cache  including optional flash cache   and host interfaces  They are composed  of    off the shelf    systems that are based on Intel technology     18 IBM XIV Storage System Architecture and Implementation    The modules are redundantly connected to one another through an internal switched  network  as shown in Figure 2 1     All of the modules work together  concurrently  as elements of a grid architecture  This helps  the system harness the parallelism that is inherent in such a distributed computing  environment     We describe the grid architecture in 2 2     Parallelism    on page 21     Data  Modules    Interface  Modules    Interface  Modules    Data  Modules       UPS Units       Figure 2 1 XIV Storage System major hardware elements    Important  Flash cache is an optional feature  However  if you opt for the flash cache  extension  flash cache devices must be installed in a   modules     Chapter 2  IBM XIV Storage System logical architecture and concepts 19    Data modules   At a conceptual level  data modules function as the elementary building blocks of the system   They provide storage capacity  processing power  and caching functions in addition to  advanced system managed services  The data modules    abilities to share and manage  system software and services are key elements of the physical architecture  as shown in  Figure 2 2     Note  Figure 2 2 depicts the conceptual architecture only  Do not misinterpret the number of  connections or modules and o
567. snapshot is nearly invisible to the I O  characteristics of production application workload  Snapshots complete near instantly within  the XIV Storage System  When a snapshot is issued  no data is copied  The snapshot creates  system pointers to the original data  As the host writes modified data in the master volume   the XIV Storage System redirects the write data to a new partition  Only the data that was  modified by the host is copied to the new partition  This prevents moving the data multiple  times and simplifies the internal management of the data  See IBM XIV Storage System  Business Continuity Functions  SG24 7759 for details about how the snapshot function is  implemented     Chapter 6  Performance 293    6 2 Practices for optimum performance  There are several practices that can have improve XIV Storage System performance     Important  XIV architecture is designed to support real world client production  environments     Real world production environments involve multiple application servers making multiple  simultaneous I O demands on storage systems     When clients decide to purchase the XIV Storage System  they have the reasonable  expectation that they will migrate existing applications or install new applications to the  XIV Storage System and experience great performance    In this section  we describe the following topics     gt  Sizing    gt  Number of LUNs    gt  Multipathing considerations     gt  Host considerations     Application threads   Host bus
568. sponding numerical value     Important  When pool specific thresholds are enabled  they override or take precedence  on the system level thresholds     Chapter 4  IBM XIV Storage Management software 149    Events  The XIV Storage System has several predefined events that are triggered when  system pool use is depleting  Rules can be set to receive email alerts for these events  For  more information about setting up email event notifications  see Chapter 7     Monitoring    on  page 327     The system wide pool thresholds can be copied from one XIV system to another by copying  the system configuration of the source system and then selecting Paste Pool Threshold from  the target system pop up menu  The specific pool thresholds can be copied from one pool to  another within the same XIV system  but cannot be copied from one XIV system to another  XIV system     4 4 3 Managing storage pools with XIV Command Line Interface    All of the operations described in 4 4 2     Managing storage pools with the XIV Storage  Management GUI    on page 142 can also be accomplished through the XIV command line  interface  XCLI      Listing pool related commands    To get a list of all the storage pool related XCLI commands  enter the following command  from the XCLI command shell     help category storage pool    Important  The commands shown in this section are based on the assumption that you  started an XCLI session on the selected system  as described in    XCLI session features     on pa
569. ss all of the disks in  the system  It disperses the 1 MB partitions in a pseudo random distribution  For more details  about the architecture of the system  see Chapter 2     IBM XIV Storage System logical  architecture and concepts    on page 17     For disk systems  one of the most important contributors to performance is the number of disk  drives that can simultaneously work together to handle an application   s I O requirements   Traditionally  this situation has been limited by the number of disk drives that can be  connected to Redundant Array of Independent Disks  RAID  controller pairs  As we know  XIV  Storage System does not follow this traditional approach  Instead  XIV Storage System evenly  distributes every logical unit number  LUN  assigned to an application across every disk drive  in every module of the XIV Storage System  This situation is true for every XIV Storage  System LUN size and every XIV Storage System module configuration  This situation means  that  on average  an application server is using every XIV Storage System disk drive equally   To emphasize this point  see Figure 6 1  which shows a LUN striped across a traditional RAID  5 array that consists of eight disk drives        e Traditional Storage with RAID Array      LUNs carved out of single Array    e The LUN enjoys the performance of 8  spindles    e LUNs compete for the performance of 8  spindles    Figure 6 1 Ejight drive RAID array             IBM XIV Storage System Architecture and Imp
570. ss to the system  For instructions  see    Adding users with the  XIV Storage Management GUI    on page 225     The following restrictions apply when working with passwords in native authentication mode     For security purposes  passwords are not shown in user lists    Passwords are user changeable  Users can change only their own passwords    Only the predefined user admin can change the passwords of other users    Passwords are changeable from both the XCLI and the XIV Storage Management GUI   Passwords are case sensitive    User password assignment is mandatory at the time a new user account is created   Creating user accounts with an empty password or removing a password from an existing  user account is not permitted     YYYY YV V Y    User roles   There are nine predefined user roles  in the XIV Storage Management GUI and the XCLI    Roles are referred to as categories and are used for day to day operation of the XIV Storage  System  The first four categories listed  storageadmin  applicationadmin  securityadmin  and  read only  are allowed to have multiple users created with these roles  the other four are  preassigned by the system and do not allow additional users to be created with these roles   The following section describes predefined roles  their level of access  and applicable use      gt  storageadmin    The storageadmin  Storage Administrator  role is the user role with highest level of access  available on the system  A user assigned to this role can perfor
571. st  CSR  file from the XIV Storage System     2  Obtain a signed certificate using the CSR file  either from a CA vendor  or with your own  CA server     3  Install the signed certificate on the XIV Storage System     4  Instruct the XIV GUI to trust the new signed certificate     208 IBM XIV Storage System Architecture and Implementation    5 2 1 Managing x509 certificates with the XIV Storage Management GUI    This section shows how to prepare and configure the XIV Storage System to use x509  certificates     Creating a CSR and importing the signed x509 certificate  The following steps demonstrate how to use the XIV GUI to use your own x509 certificate     1  In the GUI  navigate to the System view of the chosen XIV Storage System and click  Systems     System Settings     Manage Certificates to open the Certificates  Management panel shown in Figure 5 1     Certificates Management    Generate CSR      Authenticated   Services           lt       Figure 5 1 Certificates Management panel          2  Click the Generate CSR icon in this panel to open the Generate CSR panel  as shown in  Figure 5 2     Generate CSR         Name  itsoCentificate  Subject      ICN xivhost O itsolL Tucson ST AZIC Ut  Bits  2 045       pe  co ck    Figure 5 2 Generate CSR file             Enter a unique value for the name of the certificate in the Name field  In our example  we  use the value itsoCertificate for the name     In the Subject field  enter a value for the subject of the certificate  The
572. st to the  certificate authority to be signed  For more information about signing this certificate  see     Signing a certificate for the xivhost1 server    on page 462  After the signed certificate    Generating the CA Signed Certificate Request Close       xivhost2_cert pem file is returned  you must import the certificate into the local machine   s    personal keystore     Appendix B  Additional LDAP information    455    To add the signed certificate to the    Directory Service Manager    manager application  click  Directory Servers     xivhost2 storage tucson ibm com 389     Security  gt    Certificates     Add  Copy and paste the certificate stored in the xivhost2_cert pem file  as  shown in Figure B 15     Add Certificate    Paste the certificate into the text field below  The certificate text must be in ASCI format       Indicates required    Server  xivhost2 storage tucson ibm cam 389    Certificate   xivstorage org sample CA certificate  Name        Certificate  Certificate        Data   Version  3  0x2   Serial Number  2  0x2   Signature Algorithm  mdSWithRSAEncryption    ae            ee  Not Before  Jul 2 22 48 43 2009 GMT  Not After  Jul 2 22 48 43 2010 GMT    Subject Public Key Info        Figure B 15 Adding signed certificate    Importing a certificate authority certificate   Until the xivstorage org CA is designated as a trusted root  any certificate signed by that CA  is untrusted  You must import the CA   s certificate using the    Directory Service Manage
573. stall  GUI language    2  The initial installation window for the XIV Storage Management GUI installation is  displayed  Click Next to continue     3  The next window prompts you to accept the IBM License Software Agreement  Read the  license  select   accept both the IBM and the non IBM terms and click Next to proceed     Chapter 4  IBM XIV Storage Management software 115    4  The installation window that is shown in Figure 4 4 is where the installation directory is  specified  Enter an installation location or proceed with the default location provided     Click Next to proceed     E TBM XIV Storage Management GUI lol  j  S   Choose Install Folder       Introduction         License Agreement Please choose a destination folder for this installation      Configure Installation   Pre Installation Summary   Installing       Where would you like to install   Program Files IBM Storage Ivi sI aUI      Restore Default Folder    Choose            InstallAnyvwhere      Cancel     Previous               Figure 4 4 Choose the installation directory    5  For new installations  or if installing in a new directory and a previous GUI installation  exists  a program shortcut called IBM XIV 4 4 is created in the Start menu folder  In  addition  three optional desktop icons are created  as indicated in Figure 4 5  If you  choose to install into a folder that already contains an installation of the GUI  this dialog is  skipped  Therefore  click Next to proceed     k   ea     Choose Shortcuts
574. stem configuration  the XIV System moves  existing primary and secondary data partitions to the new hardware  This process occurs in  such a way that results in an even distribution of partitions across all disk drives and modules   At no time during this process does the XIV System become non redundant  This distribution  process consists of the following activities      gt  Creation of a target data distribution   gt  Initiation of the redistribution of the redundant data according to the new target data  distribution  Known as redistribution    Redistribution is further described in    Redistribution after adding modules or drives    on  page 57     When the full redundancy of data is compromised because of a disk drive or module failure   the XIV Storage System immediately identifies the non redundant partitions and begins the  rebuild process  The rebuild process is similar to the redistribution process  and consists of  the following activities      gt  Creation of a target data distribution     gt  Copying of the non redundant partitions and writing them according to the new target  distribution  known as rebuilding     gt  Simultaneously initiation of the redistribution of the redundant data according to the new  target data distribution  known as redistribution    Note  After an XIV Storage System component failure  rebuild and redistribution begin  immediately and at the same time     The sections that follow describe XIV data rebuild and redistribution     Chapter 
575. stem from  another vendor    For each iSCSI IP interface  you can define these configuration options      gt  IP address  mandatory    gt  Network mask  mandatory    gt  Default gateway  optional     The default and highest possible MTU is 9000 MTU     Note  With Model 214  10 GbE   the number of iSCSI ports is divided in half  per interface  module  However  because there are 10 GbE ports  the iSCSI bandwidth is five times  greater than with Model 114 and Model 214  1 GbE      90 IBM XIV Storage System Architecture and Implementation    3 1 11 InfiniBand module interconnect    The internal network is based on two redundant 36 port InfiniBand switches  InfiniBand is a  switch fabric architecture characterized as fast with low latency     Each of the modules  data or interface  has an InfiniBand HCA that is cabled to each of the  InfiniBand switches  The switches are also linked to each other  See Figure 3 24 for a logical  view of this connectivity  For external views of the adapter and its ports  see Figure 3 18 on  page 83  Figure 3 21 on page 87  and Figure 3 22 on page 88        Module  1 Module  2    Figure 3 24 InfiniBand internal cabling    Module  15          This network topology enables maximum bandwidth use because the switches are used in an  active active configuration  The InfiniBand switches are also tolerant to any failure of the  following individual network components      gt  Ports   gt  Links   gt  Switches    Figure 3 25 shows the two InfiniBand switches 
576. stem to report a maximum soft size that is  temporarily less than the allocated soft capacity  The soft and hard system sizes do not revert  to the original values until a replacement disk or module is phased in  and the resulting  redistribution process is completed     Chapter 2  IBM XIV Storage System logical architecture and concepts 57    Important  Although it is possible to resize or create volumes  snapshots  or storage pools  while a rebuild is underway  do not perform these activities until the system completes the  rebuild process and restores full data redundancy     2 10 3 Exclusive additional functions for reliability and availability    This section describes other features that contribute to XIV Storage System reliability  and availability     Disaster recovery   All high availability SAN implementations must account for the contingency of data recovery  and business continuance following a disaster  as defined by the organization   s recovery  point and recovery time objectives  The provision within the XIV Storage System to efficiently  and flexibly create nearly unlimited snapshots  coupled with the ability to define consistency  groups of logical volumes  constitutes integral elements of the data preservation strategy  In  addition  the XIV data mirroring function facilitates excellent potential recovery point and  recovery time objectives as a central element of the full disaster recovery plan  For more  information  see IBM XIV Storage System Business Co
577. stination       Finish          E   E fom coe  Figure 7 43 Add Destination window    8  Click Create Destination to open the Welcome window  Then  click Next to proceed  The  Select Destination type window opens  as shown in Figure 7 44  On this window  you  configure the following settings         Type  Event notification destination type can be either a destination group  containing  other destinations   SNMP manager for sending SNMP traps  email address for  sending email notification  or mobile phone number for SMS notification     e SNMP   e EMAIL   e SMS   e Group of Destinations    362 IBM XIV Storage System Architecture and Implementation    Domain  Name    Finish       Wizard   Destination Create   Select Destination type     lt      Select Destination type    Event notification destination type can be either a destination group  containing  other destinations   SNMP manager for sending SNMP traps  Email address  for sending Email notification  or cellular phone number for SMS notification        SNMP     EMAIL     SMS       Group of Destinations         Cancel        Net  Finish         Figure 7 44 Select Destination type window        Depending on the selected type  the remaining configuration information that is  required differs  but is self explanatory     The final step in the Events Creation wizard is creating a rule  A rule determines what  notification is sent  It is based on event severity  event code  or both     9  Click Create Rule  as shown in Figure 7 
578. strategy  in    deferred maintenance     This means that IBM is alerted with the third failing disk in the  system and arranges the replacement of all three failing disks in one repair action by the  IBM SSR  Optionally  with extended maintenance  each failing disk is replaced immediately  after it was failed     InfiniBand host channel adapter    The InfiniBand host channel adapter  HCA  is a 2x double data rate  DDR  host channel  adapter that features 20 Gbps of internal bandwidth and has low latency  The two ports are  cabled to redundant InfiniBand switches inside the XIV Storage System Gen3 rack  The  InfiniBand HCA has the task of protocol processing  which offloads this workload from the  module   s processor and communicates with the processor complex over eight lanes of PCle  2 0 bus bandwidth  InfiniBand does extensive end to end link level protocol checking  so it is  reliable     Flash cache    One of the most important features of the XIV Gen3 is the upgrade with flash cache  The  optional flash cache option is available for Gen3 Model 214 and Model 114 running software  Version 11 1 0 or later  XIV Gen3 systems can be equipped with a 400 GB SSD for every  module  and the XIV Gens with 4 TB or 6 TB drives can be equipped with a 400 GB or 800  GB SSD for every module  The installation is nondisruptive  For a 15 module system  this  configuration represents 6 TB of read flash cache with the 400 GB SSD feature  and with 800  GB SSD  it has 12 TB read flash cache  F
579. sword for this  user as well  The password is not saved  it is only used for this wizard process  Click Next     Welcome    Serwer Type  LDAF Servers     XWVUser         Unique ID s    Groups    Secure LDAP    Bind  amp  Cache    Test  amp  Activation    Finish       Figure 5 56 XIV User tab    LDAP Configuration   Directory Services Service User x       Directory Services Service User  Specify the user account name and its full DN  Distinguished Name  that will    be used to authenticate the XIV system to the Directory Services you ve  configured     Service User DN  CN XIV CN Users DC  itso      Password        SEER E  Confirm Password       ssssesss  cu  finish    Chapter 5  Security    255    12 In the Unique ID   s tab  set the parameters for the login  See Figure 5 57   In our example   the default selections are used  The ID Attribute is set to sAMAccountName  the Name  Attribute to userPrincipalName  and the Group Attribute to memberOf  In Oracle Directory  Server environments  for the Name Attribute  use uid  and for Group Attribute in the XIV  Storage System  use isMember Of        LDAP Configuration   Directory Services Unique Identifiers    Directory Services Unique Identifiers       E Jezis _ specify the Unique ID s that will be used to uniquely identify and authenticate  Server Type   the LDAP user  Default recommended value have been applied here   LDAP Severs      XIV User    armenia ID Attribute  sAMAccountName  Unique ID s  a oe SEE   Name Attribute  userPri
580. system  Any of the interface modules that are  connected to the host can service the request because the modules work in an  active active capacity  The XIV does not balance the load for write requests across the  different interface modules  Load balancing must be implemented by host administrators  by using multipathing and by the SAN administrators  using correct zoning  to equally  distribute the host requests among all interface modules     For more information about host attachment  see the Redbooks publication  X V Storage  System  Host Attachment and Interoperability  SG24 7904     2  The interface module uses the system configuration information to determine the location  of the primary module that houses the referenced data  This can be either an interface  module  including the interface module that received the write request  or a data module   The data is written only to the local cache of the primary module     3  The primary module uses the system configuration information to determine the location  of the secondary module that houses the copy of the referenced data  Again  this module  can be either an interface module or a data module  but it is not the same as the primary  module  The data is redundantly written to the local cache of the secondary module     Chapter 2  IBM XIV Storage System logical architecture and concepts 49    50    After the data is written to cache in both the primary and secondary modules  the host  receives an acknowledgment that the
581. t  Network Time Protocol  time server      XIV Storage System can be used with a Network Time Protocol  NTP  time server to  synchronize the system time with other systems  To use this time server  the IP address   or server name   netmask  and gateway must be configured  It is a preferred practice to  enter the information for an NTP server      gt  Time zone     Usually the time zone depends on the location where the system is installed  However   exceptions can occur for remote locations where the time zone equals the time of the host  system location      gt  Email sender address   The email address to show as the sender in the email notification    gt  Remote access     The modem number or a client side IP address must be configured for remote support   This network connection must have outbound connectivity to the Internet     This basic configuration data is entered in the system by the IBM SSR after the physical  installation  See    Basic configuration    on page 105     Other configuration tasks  such as defining storage pools  volumes  and hosts  are the  responsibility of the storage administrator and are described in Chapter 4     IBM XIV Storage  Management software    on page 111     Network connection considerations    Network connection planning is also essential to installing XIV Storage System  To deploy  and operate the system in your environment  several network connections are required      gt  Fibre Channel connections for host I O over Fibre Channel   
582. t Modify LUN Mapping from the menu  see  Figure 4 66      Edit  Delete    j  Create a Cluster with Selected Hosts    Mowe to Cluster    Add Port    Limit Traffic by Perf Class  Limit Traffic by new Perf Class    Modify LUN Mapping    View LUN Mapping    f    Show Statistics    Properties          Figure 4 66 Map LUN to host      When the LUN Mapping for Host window opens  Figure 4 67   select an available volume  from the left pane     The XIV Storage Management GUI suggests a LUN ID to which to map the volume  which  can be changed to meet your requirements     All Systems  View By My Groups  ITSO        Name Size  GB     Zejn_02   vol_211  TP_BACKUP_LVM  SLES Data _2  sles Data _1  Rybozyme  RedHat Data_2  RedHat Data_1       LUN Mapping for Host ITSO_Win2008    103 0     51 0  1015 0  51 0  51 0  275 0  51 0  51 0       myvol_13   myvol_12   myvol_11   myvol_10  ITSO_Blade9_LUN_4Mirr  ITSO_Blade9_Lun_4_mirr  ITSO_Blade9_LUN_3Mirr  ITSO_Blade9_Lun_3_mirr  ITSO_Blade9_LUN_2Mirr  ITSO_Blade9_Lun_2_mirr  ITSO_Blade9_LUN_1Mirr  ITSO_Blade9_Lun_1_mirr  ITSO test_10  ITSO test_09  ITSO test_08    FALETE        Figure 4 67 Map FC volume to FC host       223 0  223 0  223 0  223 0  103 0  103 0  103 0  103 0    103 0  103 0  172 0  103 0   17 0   17 0   17 0      Unmap          Chapter 4  IBM XIV Storage Management software    Serial       System Time  10 35 am Q    Size  GB           167       3  Click Map and the volume is assigned immediately     There is no difference in mappin
583. t a module or the restart of client visible machine services as they   happen     Starting an XRSC connection using the GUI    The XRSC definitions are configured at the time the system is installed  To start the  connection from the GUI  click Tools     gt  Support Center  as shown in Figure 7 56           aw XIV Storage Management  systems   Actions   View     Help    ih  KI th Settings ia Launch XCLI ia Launch XIVTop  A AllSystems  2   gt  Gaza    Commands Log    Collect Support Logs  Partitions Count    KIVTOP  KCLI    Management       Figure 7 56 Starting an XRSC Remote Support Center connection       IBM XIV Storage System Architecture and Implementation    Select the wanted support center from the list and click the Connect Support Center icon   as shown in Figure 7 57        Support Center Status  no connection       Front MRSC 2 195 110 41 1    Connect Support Center f    Fort Type  Management          se ee es    Close    Figure 7 57 Select the wanted support center and click the Connect Support Center icon       The window shown in Figure 7 58 prompts you for the Session Timeout  Idle Timeout  and  Connection Password values  The timeout values are specified in minutes and disconnect the  session when they expire  The password  if set  must be given to the IBM Support  representative for them to establish a connection  Use of a password is not required and can  be left blank     Using Never for the timeout values results in the connection remaining open until expli
584. t and manager  instead of the client and server  terms that are used in many other TCP IP protocols  An SNMP agent is implemented in the  XIV Storage System  which sends SNMP traps to an SNMP manager  such as IBM Systems  Director  to indicate that an event has occurred  By default  the trap is sent to UDP port 162   The SNMP manager can also request certain information from the XIV Storage System using  SNMP get or walk commands  These commands are sent to the XIV Storage System on  UDP port 161     Management Information Base   The information that you can receive from the XIV Storage System by sending an SNMP get  request  or the contents of an SNMP trap sent from the XIV Storage System  are defined in  an MIB  The structure of a MIB is defined as an Internet standard in RFC 1155  The MIB  forms a tree structure that consists of object identifiers  OIDs      Most hardware and software vendors provide you with extended MIB objects to support their  own requirements  The SNMP standards allow this extension by using the private subtree   which is called an enterprise specific MIB  Because each vendor has a unique MIB subtree  under the private subtree  there is no conflict among vendors    original MIB extensions     You can use the mib_get command from the XCLI     For an SNMP trap sent by an XIV Storage System  the MIB defines the following object IDs     1 3 6 1 4 1 2021 77 1 3 1 1 1 xivEventIndex A unique value for each event  1 3 6 1 4 1 2021 77 1 3 1 1 2 xivEventCode Th
585. t be significant free space within your pools     lf you want to cut the output back to a single field  OID   use the syntax shown in  Example 7 45  You can also run the snmpget command to get the same output     Example 7 45 SNMP walks with a single OID    C  usr bin gt snmpwalk  v 2c  c XIV  m XIV MIB 10 10 1 10 xivFailedDisks  XIV MIB  xivFailedDisks   INTEGER  0    C  usr bin gt snmpwalk  v 2c  c XIV  m XIV MIB 10 10 1 10 xivFreeSpaceSoft  XIV MIB  xivFreeSpaceSoft   INTEGER  17111    If you start the SNMP walk without a start point  you get a more interesting output  You see  the Linux version being run by the XIV Storage System modules and the uptime of the  module you are probing  as shown in Example 7 46     Example 7 46 Using the snmpwalk command without an OID    C  usr share snmp mibs gt snmpwalk  v 2c  c XIV  m XIV MIB 10 10 1 10  SNMPv2 SMI  mib 2 1 1 0   STRING   Linux nextra Wal1StC0O module 4  2 6 16 46 268 xiv 220 x86 64 ixssl0 2 4  1 SMP Tue Nov 16 00 43 46 UTC 2010  x86 _ 64   SNMPv2 SMI   mib   SNMPv2 SMI   mib     Lez  Led    as  0   OID  SNMPv2 SMI  enterprises 8072 3 2 10  Pi   0   Timeticks   235647520  27 days  6 34 35 20    Chapter 7  Monitoring 389    7 7 Using Tivoli Storage Productivity Center    Starting with Version 10 2 2 of the XIV Storage System Software  integration with Tivoli  Storage Productivity Center v4 2 or higher also allows XIV Storage System performance  monitoring from Tivoli Storage Productivity Center     Tivoli Storage Producti
586. t software    on  page 111 for more information about that topic     3 2 5 System power on and power off    106    Strictly follow these procedures to power on and power off your XIV Storage System     Power on  To power on the system  complete these steps     1  On each UPS  look for the Test button on the control panel  on the front of the UPS   as  illustrated in Figure 3 34        Figure 3 34 Locate Test button    Important  Do not confuse the Test button with the power off button  which is normally  protected by a cover  The Test button is the one circled in red in Figure 3 34     2  Use both hands  as shown in Figure 3 35  to press each of the three Test buttons  simultaneously     IBM XIV Storage System Architecture and Implementation       Figure 3 35 Use both hands to press the three Test buttons simultaneously    This action starts applying power to the components in the rack and initiates the boot process  for the interface modules and data modules     Powering off the system    Powering off the system must be done only from either the XIV Storage Management GUI or  the XCLI  You must be logged on as Storage Administrator  the storageadmin role      Important  Do not power off the XIV Storage System by using the UPS power button   because this action can result in the loss of data and system configuration information     Using the XIV Storage Management GUI  From the XIV Storage Management GUI  complete the following steps     1  Click Systems     System Settings i
587. t the Directory Service Control Center  DSCC  link in the Services section   Authenticate to the Directory Service Manager application  In the Common Tasks tab  click  Directory Entry Management     Create New Suffix or Replication Topology  Then   complete the following steps     1  Enter Suffix Name  Specify the new suffix DN  In our example  we use dc xivauth   Click Next     2  Choose Replication Options  Accept the default Do Not Replicate Suffix  LDAP  replication is beyond the scope for this book      3  Choose Servers  Click xivhost2 storage tucson ibm com 389 in the Available Servers  list and click Add  The server name is displayed in the Chosen Servers list  Click Next       Choose Settings  Accept the default of Use Default Settings     Choose Database Location Options  Accept the default database location  Click Next       Choose Data Options  Select Create Top Entry for the Suffix  Click Next     N      O A      Review the settings for the suffix about to be created and click Finish if they are correct   After the new suffix creation is confirmed  you can proceed with LDAP entry creation     To create an LDAP entry login to the Java Console using your own user ID and password   select the Directory Service Control Center  DSCC  link in the Services section   Authenticate to Directory Service Manager application  In the Common Tasks tab  click  Directory Entry Management     Create New Entry     438 IBM XIV Storage System Architecture and Implementation    Now yo
588. t using the Oracle Java web console tool  complete the   following steps    1  Point your web browser to HTTPS port 6789  in our example      https   xivhost2 storage  tucson  ibm com 6789       2  Log on to the system and select Directory Service Control Center  DSCC  and  authenticate to Directory Service Manager     3  Click Directory Servers     xivhost2 storage tucson ibm com 389     Security     gt   Certificates     Request CA Signed Certificate  Complete the certificate request form  A  sample of the certificate request form is shown in Figure B 13     Request CA Signed Certificate    This will generate a certificate request  The text of the request will appear on the progress dialog  This text should be submitted to a  Certificate Authority who will process it and issue a certificate  You can submit the request either by sending the text in an  amp mail  message to the CA or by submitting it through the CA s web site       Indicates required field  Server  xivhost2 storage tucson ibm cam 389    Certificate Details      Specify Values Separately       Common Name ieni   xiv hest2 storage  tucson  ibm com  Organization  o    xivstorage   Organizational Unit fou     ITSO   City Locality  1    Tucson   State Province  st     Arizona   Country  ic   lus       Specify as Subject DN       Subject DN                Figure B 13 Certificate request    IBM XIV Storage System Architecture and Implementation    4  Copy the generated certificate shown in Figure B 14  Request into 
589. tSid   AQUAAAAAAAUVAAAAZaIKWj UHFDf 781VQQAAA    SAMAccountName  XIVReadonly   SAMAccountType  268435456   grouplype   2147483646   objectCategory  CN Group CN Schema  CN Configuration DC itso DC storage  DC ibm   DC com    In the first ldapsearch query  we intentionally limited our search to the member Of attribute  at  the end of the 1dapsearch command  so that the output is not obscured with unrelated  attributes and values  The value of the memberOf attribute contains the DN of the group     The second ldapsearch query illustrates the CN XIVReadonly LDAP object content  Among  other attributes  it contains the member attribute that points at the DN of the user defined as a  member  The attribute member is a multivalued attribute  there can be more than one user  assigned to the group as a member  Member0f is also a multivalued attribute  and a user can  be a member of multiple groups     The XIV Storage System can now be configured to use the member0f attribute for role  mapping  In Example 5 23 on page 277  we map the Active Directory group XIVReadonly to  the XIV read_only_role  XIVStorageadmin to the storage_admin_role  and XIV user group  app01_ group to Active Directory group XIlVapp01_ group  You must be logged on as admin     276 IBM XIV Storage System Architecture and Implementation    Example 5 23 Configuring XIV to use Active Directory groups for role mapping     gt  gt  Idap_config set xiv_group_attrib member0f   Command executed successfully     gt  gt  Idap_c
590. t_mode XCLI command  as shown in Example 5 31 on page 282     Chapter 5  Security 281    Example 5 31 Enabling LDAP in XIV Storage System     gt  gt Ildap_mode_set mode Active    Warning  ARE YOU SURE YOU WANT TO ENABLE LDAP AUTHENTICATION y n   Command executed successfully     To disable access  repeat the same command with the mode Inactive option     5 9 6 Managing multiple systems in LDAP authentication mode    The task of managing multiple XIV systems can be simplified by using LDAP authentication  mode  Because user credentials are stored centrally in the LDAP directory  it is no longer  necessary to synchronize user credentials among multiple XIV systems  After a user account  is registered in LDAP  multiple XIV systems can use credentials stored in LDAP directory for  authentication     Because the user   s password is stored in the LDAP directory  all connected XIV systems  authenticate the user with this password  If the password is changed  all XIV systems  automatically accept the new password  This mode of operation is often referred to as single  sign on  SSO   Figure 5 81   This mode allows for quick transitions between systems in the  XIV Storage Management GUI because the password is entered only once  This approach is  especially useful in Remote Mirror configurations  where the storage administrator is required  to frequently switch from source to target system        LDAP Single Sign On         LDAP    protocol    XCLI and GUI users    LDAP  protocol     
591. te how to create user groups  add users  with application  administrator role  to the group  and how to define host associations for the group     1  Ensure that you are logged in as admin  or another user with storage administrator rights   and in the Users window  In our scenario  we create a user group called  ApplicationOl Group     2  To adda user group  either click the Add User Group icon  shown in Figure 5 29   or  right click in an empty area of the User Group table and select Add User Group from the  menu  as shown in Figure 5 29           Ungrouped    Add User  Add User Group    Configure LDAP  LDAP Wizard  Export          Figure 5 29 Add User Group    3  From the Add User Group window that opens  enter a meaningful group name and then  click Add     Note  Additional field called Domain is presented only if domain is already defined to  the XIV system  see Figure 5 30  otherwise this field is hidden     228 IBM XIV Storage System Architecture and Implementation       Add User Group    System  XM PFEZ 1340010    Domain  no domain      Name  A   LDAP Role    Full Access     Invalid user group name  Valid name cannot be an empty string    Sa    Figure 5 30 Enter new user group name                   LDAP role  The LDAP Role field is not applicable to user group definition in native  authentication mode and has no effect  even if a value is entered     If a user group has the Full Access flag turned on  all members of that group have  unrestricted access to all snapsho
592. ted for Tivoli Storage  Productivity Center         Password  The password of the XIV Storage System     Click Add and complete step 4 for the other IP addresses  as shown in Figure 7 68 on  page 392     iE Configure Devices      Configure storage subsystem connections    Select Device Type  i  P   dd new storage subsystems or CIMOMs by providing the connection properties  Once the connection    wf Select Device properties have been added click next to continue  IF you wish to remove one of the connections   select it  5 Configure storage From the table and click remove   subsystem  connections Device Type jem aly r   Discover storage  subsystems IP Address  ja  155 53 252  Select Storage  Subsystems Username   ftpeadmir  Summary    Results  Add Clear      IP Address    9 155 53 250  9 155 53 251       Remove      Figure 7 68 Configure storage subsystem connections       After all three IP addresses are added  click Next and the wizard automatically performs  a discovery     392 IBM XIV Storage System Architecture and Implementation       7  Click Next again and the discovered XIV Storage System is shown as unconfigured  storage  as shown in Figure 7 69         Configure Devices    Select Storage Subsystems    Select Device Type  x oP Tivoli Storage Productivity Center discovered new storage subsystems  Select the unconfigured storage    w Select Device subsystems that you wish to configure     Configure storage  subsystem IP Address    connections piss      w Discover storag
593. tem    Create A Group Containing This System    ATSXIV   10115  ee     7  Suspend Monitoring    View Events  View Statistics    View Storage Pools XIV 7826153    View Volumes by Pools    IOPS  109 793  View Volumes  View Hosts    View Mirroring  View Migration    Show Certificate    XIV 7820784 View XIV Connectivity  View Migration Connectivity    Launch XCLI    Copy System Configuration    XIV 1310062 Dantooine Properties    Figure 6 20 Starting XIV Top from the main GUI desktop        gt  Start XIV Top from the XIV Storage Management GUI desktop  Figure 6 21      xiv XIV Storage Management    Systems   Actions   View   Tools   Help    ih  wai  Th Settings EM Launch xcu GW Launch xivTop     All Systems  2   gt    System            Figure 6 21 Start XIV Top from the XIV Storage Management GUI Desktop     gt  XIV Top can also be started within the statistic view from the lower left corner of the XIV  Storage Management GUI Statistics Monitor Filter pane  see Figure 6 10 on page 305      312 IBM XIV Storage System Architecture and Implementation    The XIV Top tool that is shown in Figure 6 22 quickly shows the volumes or hosts that are    consuming the most system resources at any given time  Information can be sorted in various    ways and exported to a file for use in soreadsheet applications              XIV Top  XIV LAB 03 1300203       Volumes  amp  Hosts    Volume Name    XIV_ORA_oravg_LPAR1_npiv    Host Name    p7 770 02_XIV_RAC_VI01    Latency  mS    BW  MBps        XI
594. tem concepts    on page 26      gt  Application write access patterns determine the rate at which the allocated hard volume  Capacity is used and  therefore  the rate at which the system allocates additional  increments of 17 GB  up to the limit defined by the logical volume size  As a result  the  storage administrator has no direct control over the actual capacity allocated to the volume  by the system at any specified point in time      gt  During volume creation  or when a volume has been formatted  there is zero physical  capacity assigned to the volume  As application writes accumulate to new areas of the  volume  the physical capacity allocated to the volume grows in increments of 17 GB and  can ultimately reach the full logical volume size      gt  Increasing the logical volume size does not affect the actual volume size     Thinly provisioned storage pools   Where volumes are effectively thinly provisioned automatically by the system  storage pools  can be defined by the storage administrator  when using the XIV Storage Management GUI   as either regular or thinly provisioned  When using the IBM XIV Storage System  Command Line Interface  XCLI   there is no specific parameter to indicate thin provisioning  for a storage pool  You indirectly and implicitly create a storage pool as thinly provisioned by  specifying a pool soft size greater than its hard size     With a regular pool  the    host apparent    capacity is guaranteed to be equal to the physical  capacity re
595. tems   Actions   View   Tools   Help ih            AllSystems  7  a Connectivity      System Selector    I a systems  ik   f Apollo  1300474      f Starbuck   MNO00027 A    ittleton J Toaster   mn00016  4 of 4 Systems P   XIV Galactica 1340009   z I KIV 1310062 Dantooine  oy   f xv 1310077 Alba     Tucson Lab   f xiw 7826153    J of 3 Systems          Figure 4 27 The System Selector menu    Tip  To select multiple systems from the System Selector menu  hold the Ctrl key while  clicking each system     Views Selector menu    The GUI supports several view styles for displaying information about the systems being  managed  To change the current view  use the Views Selector menu by pressing Alt X  or by    Chapter 4  IBM XIV Storage Management software 131    clicking the triangle icon at the far right of the hierarchical navigation  as shown in  Figure 4 28     xv XWV Storage Management    Systems   Actions   View   Tools   Help    ih       A AllSystems  8    Connectiving   J    Figure 4 28 Views Selector menu          When viewing all systems or a group of systems  three useful views are available  Use the  Views Selector menu to modify the current view to best suit the management task you are  performing     The Connectivity view  shown in Figure 4 29 on page 132  provides a three dimensional view  of the selected systems  with visual indicators for replication relationships between systems  and group membership  For each system  the system name  serial number  system software
596. th high efficiency power supply units      Example 7 13 The psu_list command     gt  gt  psu_list  Component ID Status Currently Functioning Hardware Status Power    1 PSU 1 1 OK yes OK 143 12W  1 PSU 1 2 OK yes OK 104 14W  1 PSU 15 1 OK yes OK 143 12W  1 PSU 15 2 OK yes OK 100 20W    By using the  x parameter  more information about the actual values can be displayed  See  Example 7 14     Example 7 14 The psu_list  x psu 1 PSU 1 1 command     gt  gt  psu_list  x psu 1 PSU 1 1   lt XCLIRETURN STATUS  SUCCESS  COMMAND LINE  psu_list  x psu 1 PSU 1 1  gt    lt QUTPUT gt    lt psu id  3e403100014  gt    lt component_id value  1 PSU 1 1   gt    lt status value  0K   gt    lt currently functioning value  yes   gt    lt requires service value     gt    lt service reason value     gt    lt hardware_ status value  0K   gt    lt serial value  PMA0963415G01GR   gt    lt part_number value  0963415 05   gt    lt original serial value  PMA0963415G01GR   gt    lt original part_number value  0963415 05   gt    lt fru_descriptor value  DC   gt    lt original fru_descriptor value  DC   gt    lt firmware_version value  1 06   gt    lt voltage 12v value   12 18V   gt    lt voltage 5v value   5 11V   gt    lt current value   12 07A   gt    lt power value  147 01W   gt    lt  psu gt      lt  OUTPUT gt    lt  XCLIRETURN gt     Events   Events can also be managed with XCLI commands  Various commands are available to list   filter  close  and send notifications for the events  There are many comman
597. th the domain      gt  Associating a pool with a domain when it has a pre existing association with another  domain removes the association with the other domain     For more information about storage pools in XIV  see 2 6     Storage pool concepts    on  page 35     Managing domain host associations    To manage host associations with a domain  right click the domain in the Domains view and  select Manage Associations     Hosts  as shown in Figure 4 91 on page 186     Chapter 4  IBM XIV Storage Management software 185    186       Name Utilization                                                 ITSO_domain_2 l b  Manage Associations d Pools a  i 516 GB Soft  View Associened Pook L Hosts    View Associated Hosts and Clusters Clusters  View Associated Users and User Groups Targets  i  oo Users    Limit Traffic by Perf Class  Limit Traffic by new Perf Class    User Groups          Properties       Figure 4 91 Accessing the Manage Domain   s Associations screen Hosts tab in the XIV GUI    In the Manage Domain   s Associations screen that appears  Figure 4 92   select the hosts and  use the arrows to associate or remove the hosts from the domain  Click Update to apply the  changes                 Manage Domains Associations  ITSQO_domain  x  Users  Hosts to Associate Associated Hosts  User Groups Advanced WS _Lpar 2   Advanced WS Lpar_1  Advanced WS Lpar_ 3    Hosis Advanced_WS_Lpar_4  Advanced WS Lpar 5  Clusters Avancar big a aa  Basic WS_Team1 Win  Basic WS_ Team  Win  Targets
598. the  XIV Storage System     A user in Active Directory can be a member of multiple groups  If this user is a member of  more than one group with corresponding role mapping  XIV fails authentication for this user  because the role cannot be uniquely identified  In Example 5 24 on page 278  the  xivtestuser1 user can be mapped to Storage Admin and Read Only roles  which is why the  authentication failure followed by the USER_HAS MORE_THAN ONE RECOGNIZED ROLE error  message occurs     Chapter 5  Security 277    Example 5 24 LDAP user mapped to multiple roles authentication failure      xcli  c  XIV 6000050   u xivtestuserl  p PasswOrd Idap_user_test  Error    USER HAS MORE THAN ONE RECOGNIZED ROLE  Details  User xivtestuser has more than one recognized LDAP role       ldapsearch  LLL  H Idap   9 155 113 143 389  D  cn itso cn Users dc itso dc storage dc ibm dc com  w PasswOrd  b  cn Users dc itso dc storage dc ibm dc com cn xivtestuserl member0f    dn  CN xivtestuserl  CN Users DC itso DC storage DC ibm  DC com  memberOf  CN XIVReadonly CN Users DC itso DC storage DC ibm  DC com  memberOf  CN XIVAdmins CN Users DC itso DC storage  DC ibm DC com    An LDAP user can be a member of multiple Active Directory groups and successfully  authenticate to an XIV Storage System if only one of those groups is mapped to an   XIV Storage System role  As illustrated in Example 5 25  the xivtestuser2 user is a member of  two Active Directory groups  XIVAdmins and NonXIVgroup  Only XIVAdmins is m
599. the  authentication process and access the XIV Storage System      gt  In addition  the client can see the XRSC connectivity status at any time  disconnected   idle  or in session  and can choose to forcibly disconnect the connection regardless of  whether a support session is in progress or not     Although forcibly terminating a support session using the timeout or force disconnect  mechanisms is not desirable  these mechanisms do exist and the client has full control over  whether to proceed with a support session     The initiation or loss of connection to the XRSC causes the system to generate events that  can be seen on the machine s event log  These events can be forwarded to any destination of  the client   s choice  like any other event using the XIV Storage System event rules  mechanism   Connection loss events  whether because of a transport error  timeout  or due to  specific client action  specify whether the connection was idle or in use at the time of  disconnection  A warning event is issued 15 minutes before the timeout parameter  disconnects a busy support session  If the connection is lost because of a network error  before the timeout for the session has expired  the system automatically tries to reconnect to  any of the configured XRSC servers     While a support session is in progress  the XIV Storage System generates events and shows  the machine   s status on the GUI window as usual  Therefore  for example  the client can see  the process of phasing ou
600. the  xivhost2_cert_req pem file     i  Operation Completed Successfully  The Request was successfully generated     Generating the CA Signed Certificate Request for xivhost2 storage tucson ibm com 38 9       Done     The request is   Certificate request generated by Sun Java tm   System Directory 6  0    Common Name  xivhost2  storage  tucson  ibm  com  Email   not specified    Phone   not specified    Organization  xivstorage   State  Arizona   Country  US          BEGIN NEW CERTIFICATE REQUE  4ITBw 7 CCAScCAQAwf 7 ELMAKGAIUEBHMCVYMxEDAQBghVBAgT BOF yaxpybmExDzAh  BghVBAcTBLRIYSNwb 7 ENMASGAIUEC MESVRIT ZETMBEGAIUECHMKeG L2csRycmFn  ZTEQHCYGAIUEAsM Peal ZaG9zdDlucsRyvcmFn24550dWNzb24duaW  tLmNvbT CE      Cop  BgkghkiG WwOBAQEFAAOB OAwg   kCqY EAolxzk ay16NDTiLOWdMmQhreJTFy     9PY    MBL BLyvtFItMLqvwGub haouH  g2c8rEPLyHAHtvwthwut LWOJ 5Zry LP OEMS Es Select All    SEMUZ1KWASMEQLZF dyllQ3gtATCisZZ1 IdPgQXw25wVQ1nfjJWssDN2sbkk  YXPKGP53R MCAWEAAaAAMAGGCS qG ST b3DQEBBAUAAAGBATKxS13kWqIutw y  PO eee eee Ore a tence  Search Google for     BEGIN NEW          kwc69n 694nRXc81Rca999G6EgT ZOM7 eScF Int DKyExvemKLSYT fSwm5SKt    3   paa View Selection Source  Finoa2p2enJd UaTayvyicobuu       You must copy the request and send it to the Certificate Authority to obtain your certific ate     Operation Completed Successtully       Figure B 14 Generated certificate    Signing and importing a server certificate   After the CER is generated  xivhost2_cert_req pem   you must send the reque
601. the Ctrl  key while clicking each system  While one or more systems are selected  you can perform  an action on those systems together by right clicking any selected system  This action  brings up a contextual menu  allowing you to perform the wanted action     Messages    When the Status area alerts the user  messages of real time problems in the environment are  reported  See Figure 4 32 for an example of a real time alert that is displayed at the upper left  side of the GUI panel  These are examples of the types of messages      gt  Hardware problem  disk  modules  fan  or service   Utilization problem  pool hard capacity    System status   Uncleared alerting events   System to system connection problem    YY vV Yy    A Al Systems  3   gt  Mainz_Building12  3   gt     p  i    N New Hardware Alert  XIV 02 1370114 UPS CHARGE LEVEL          Figure 4 32 Event messaging    If a configuration related message is noted and clicked  regardless of which XIV Storage  System is being administered  the user is taken directly to the system in question to further  review the message contents  The user is taken to the event log where the additional details  can be viewed  See    All Systems Events window    on page 329     Search and view filtering    The XIV Storage Management GUI features a Search function  This function allows for easy  searches within the XIV Storage Management GUI for configuration related items  You can  search across all the GUI managed storage systems  and you can
602. the MIB and issue SNMP commands  You can download net snmp from the  Source Forge web page     http   sourceforge net projects net snmp files net snmp     Chapter 7  Monitoring 387    Consideration  Rtrieve the MIB contents from an XIV Storage System by running  mib_ get     Force a compilation of all MIBs to compile the XIV Storage System MIB by running the  following command     C  usr bin gt snmptranslate  Dparse mibs   In the output that you get  look for messages such as the ones shown in Example 7 43  The  module numbers might be different  depending on how many MIBs exist in that folder   Example 7 43 MIB translation messages    XIV MIB is in C  usr share snmp mibs XIV MIB 10 2 4 txt   Module 72 XIV MIB is in C  usr share snmp mibs xiv 10 2 x mib txt  Checking file  C  usr share snmp mibs XIV MIB 10 2 4 txt     XIV MIB is now in C  usr share snmp mibs XIV MIB 10 2 4 txt    Now you are ready to use an SNMP walk command starting with the xiv OID  The only thing  that you need to change in this line is the management IP address of the XIV Storage  System     C  usr bin gt  snmpwalk  v 2c  c XIV  m XIV MIB 10 10 1 10 xiv    In this command  the parameters have the following meanings      v 2c Forces SNMP Version 2c     c XIV The community name  It is case sensitive     m XIV MIB Forces the use of the XIV Storage System MIB   10 10 1 10 An XIV Storage System management module IP address   Xiv The root of the XIV Storage System MIB     In Example 7 44  you see some typical o
603. the XIV Storage System to send notifications    You can configure the XIV Storage System using flexible rules to ensure that notification is  sent to the correct person  or group of people  according to the various parameters  This  event notification is similar to  but not quite the same  as XIV Storage System Call Home   which is described in 7 5     Call Home and remote support    on page 371     7 3 2 Setting up event notification    Configuration options are available from the XIV Storage Management GUI  You have the  flexibility to create a detailed events notification plan based on specific rules  This flexibility  allows the storage administrator to decide  for example  where to direct alerts for various  event types  All these settings can also be done with XCLI commands     Setup notification and rules with the GUI  To set up email or SMS notification and rules  complete the following steps     1  From the XIV Storage Management GUI main window  select the Monitor icon  From the  Monitor menu  select Events to open the Events window  as shown in Figure 7 38     xv XIV Storage Management  systems   Actions   View   Tools   Help ih  wI    A AllSystems  0   gt  GORGE TH     Events         System Time    E   Min Severity    System Time  FA   Event Code        Date  Local Time     9 20 13  1 08 PM FE2     USER HAS FAILED TO_RUN_C    User  cim  9 20 13  1 06 PM     USER_HAS FAILED TO_RUN_C User    cimn  USER_HAS FAILED TO_RUN_C    User  cimr  USER_HAS FAILED TO_RUN_C    U
604. the XIV system on which you want to create the domain  specify the  pools you want to associate with the domain  and enter a unique Domain Name  Also  indicate whether to allow SSD caching on the volumes within this domain  and  optionally   modify the LDAP Domain ID to use when configuring multitenancy with LDAP  authentication     6  After completing the fields in the Create Domain and Associate Pools tabs  click Create to  create the domain     If you choose to create a domain and associate it with existing pools  the domain will  automatically be created with the minimum resources  those shown in the Properties tab  in Figure 4 81 on page 179  to support the selected pools  as indicated in Figure 4 83     Create Domain and Associate Pools    The domain will be created with the  minimum resources that are required  for the selected pools           Cancel    Figure 4 83 Alert when creating a domain and associating pools          7  You can now verify that the domain was created from the Domains view  as show in  Figure 4 84     xiv XIV Storage Management       Systems   Actions   View   Tools   Help    O      Create Domain C    Create Domain and Associate Pools  38  Export    All Systems  12   gt  Mainz  2   gt  XIV_02_1310114 v Domains v   Domain  5    System Time  4 14PM Q       Name de Utilization     Volumes  102 GB Used Volumes 5 TB Hard  ITSO_d1  _                   10  622     5 TB Pools allocated    993 GB Used Volumes 145 2 TB Hard  T  46  239  101  11 003    63 8 
605. the disks within a particular module  contain the secondary copies of data on any of the disks in the module  Therefore  during a  rebuild that results from a module failure in a fully configured XIV Storage System  there are  168 disks  180 disks in the system minus 12 disks in a module  reading and 168 disks writing   concurrently     Important  The rebuilding phase is a high priority  self healing process to restore XIV to  full redundancy  At the end of the rebuilding period  the XIV Storage System is again fully  redundant     The XIV Storage System rebuild process has the following characteristics      gt  The rebuild of data is many times faster than conventional RAID array rebuilds and can  complete in a short period for a fully provisioned system         Statistically  the chance of exposure to data loss or a cascading hardware failure is  minimized because of both the short rebuild time required and the low I O workload  imposed on any particular disk     Chapter 2  IBM XIV Storage System logical architecture and concepts 53    Rebuilding conventional RAID arrays can take many hours to complete  depending on  the type of the array  the number of drives  and the ongoing host generated  transactions to the array  The stress imposed on the drives of conventional RAID arrays  during rebuilds is high  raising the risk of additional hardware failure of the RAID  member disks     In XIV  a typical rebuild is measured in minutes  not hours  For example  a fully  populated 1
606. the resource associated with the event is a link to the  Overview window  In this way  details about the resource are easily available for investigation  into the cause of a specific alert        Overview         Capacity 7   Last 30 days Space by Host  Capacity    a a o e e B e a 0 0 4 6   Space by Host   Space by Pool   Space by Volume  Overall System Activity    Most Active Volumes    TiB          Most Active Modules      6   8      8 8    0 6 4       E  Free Capacity A Used Capacity m Virtual Ca       adams stgbladeh4    Space by Pool Space by Volume    Largest Pools Largest Volumes    20  4 b  4   wa    1 000     5  an  iv  5 J 0 u u m o  v U   test_pool stg  4 0 stg   41 c   01 cx  02 cx  03    cr   U    mirror_pool Residen   co_Pool                   Figure 7 89 Tivoli Storage Productivity Center GUI overview customization    406 IBM XIV Storage System Architecture and Implementation    7 8 Custom monitoring    The previous sections of this chapter focused on the predefined methods of monitoring the  XIV Storage System  We now look at ways to combine the various commands  options  and  features so that you customize the monitoring of the XIV Storage System based on your  specific needs or requirements     Combining the power of XCLI with the flexibility of scripting languages creates endless  possibilities and ways to monitor the system  For example  you can create a script to monitor  a specific component and alert you when it exceeds a custom threshold that you defin
607. the user groups with hosts or  clusters  User groups have the following characteristics      gt  Only users assigned to the applicationadmin role can be members of a user group    gt    A user can be a member of a single user group     gt  A maximum of eight user groups can be created     gt  Group names are case sensitive     gt  In native authentication mode  a user group can contain up to eight members      gt  If auser group is defined with access all    yes     users assigned to the applicationadmin  role who are members of that group can manage all snapshots on the system      gt  A user must be assigned to the storageadmin role to be permitted to create and manage  user groups     Important  A user group membership can be defined only for users assigned to the  applicationadmin role     User group and host associations  Hosts and clusters can be associated with only a single user group  When a user is a member    of a user group that is associated with a host  that user is allowed to manage snapshots of the  volumes mapped to that host   User group and host associations have the following properties      gt  User groups can be associated with both hosts and clusters  This configuration enables  limiting group member access to specific volumes      gt  Ahost that is part of a cluster can be associated only with a user group through user group  to cluster association  Any attempts to create user group association for that host fail     224 IBM XIV Storage System Architec
608. ther representations as a precise hardware layout     FC Ports       iSCSI  Management Ports  Host Interface    Data Module    Interface and data modules are connected each other through an internal switching network       Figure 2 2 XIV Storage System architectural overview    Interface modules  Interface modules are equivalent to data modules in all aspects  with the following exceptions      gt  In addition to disk  cache  and processing resources  interface modules include both Fibre  Channel and IP network Small Computer System Interface  iSCSI  interfaces for host  system connectivity  remote mirroring  and data migration activities  Figure 2 2  conceptually illustrates the placement of interface modules within the topology of the  XIV Storage System architecture      gt  The system services and software functions associated with managing external I O is  located exclusively on the interface modules     Module interconnect switches   The XIV Storage System contains a redundant switched network  based on InfiniBand  that   transmits both data and metadata traffic between the modules  Traffic can flow between two  interface modules  between two data modules  and between an interface module and a data  module     20 IBM XIV Storage System Architecture and Implementation    2 2 Parallelism    The concept of parallelism pervades all aspects of the XIV Storage System architecture by  using a balanced  redundant data distribution scheme with a pool of distributed  or grid   co
609. thod  O Passkey      Certificate  Certificate    las ktopiTSOVtsoCenificate pem          Figure 5 18 Add IPSec Connection with certificate authentication    In the Remote IP field  enter the IP address of the remote workstation you will use to  connect over IPSec     Choose which XIV Storage System interface type on which you want to establish the  IPSec connections  The available choices are Management and VPN     Select the radio button for the authentication method that you want to use         For Certificate authentication  click Browse to select and upload your certificate file   For more information about obtaining certificates  see 5 2 1     Managing x509  certificates with the XIV Storage Management GUI    on page 209  and    Certificate  authority setup    on page 460     218 IBM XIV Storage System Architecture and Implementation        For Passkey authentication  enter the passkey to be used by the host to authenticate in  the Passkey field  as shown in Figure 5 19  Repeat the passkey in the Passkey Verify       field      Add IPsec Connection  Remote IP  9 155 113 144  Interface     VPN    Authentication method      Passkey     Certificate  Passkey    SSSR RR EE  Passkey Verify     pesceees              Figure 5 19 Add IPSec Connection with passkey authentication    3  Click Create to create the IPSec connection on the XIV System  The completed  connection is shown in Figure 5 20     IPsec    IPsec Connections      Enable IPsec      Interface Remote IP             
610. thor  too    Here   s an opportunity to spotlight your skills  grow your career  and become a published  author  all at the same time  Join an ITSO residency project and help write a book on your  area of expertise  while honing your experience using leading edge technologies  Your efforts  will help to increase product acceptance and customer satisfaction  as you expand your  network of technical contacts and relationships  Residencies run from two to six weeks  and  you can participate either in person or as a remote resident working from your home base   Find out more about the residency program  browse the residency index  and apply online     ibm com redbooks residencies html    Comments welcome    Your comments are important to us   We want our books to be as helpful as possible  Send us your comments about this book or  other IBM Redbooks publications in one of the following ways    gt  Use the online Contact us IBM Redbooks publications form   ibm com redbooks   gt  Send your comments by email   redbooks us ibm com   gt  Mail your comments     IBM Corporation  International Technical Support Organization  Dept  HYTD Mail Station P099   2455 South Road   Poughkeepsie  NY 12601 5400    Stay connected to IBM Redbooks publications     gt  Find us on Facebook   http   www  facebook  com IBMRedbooks    gt  Follow us on twitter   http   twitter com ibmredbooks    gt  Look for us on LinkedIn   http   www  1 inkedin com groups  home  amp gid 2130806     gt  Explore new Redbook
611. tial storage issues  The mobile device notifications feature was  introduced with XIV Storage System Software v11 5     The prerequisite is to have Call Home enabled on the XIV system  see 7 5 1     Call Home  feature    on page 372   The IBM XIV Mobile Dashboard application must be to be installed on  a mobile device  The Mobile Dashboard application can be downloaded from the following  mobile device applications store      gt  Android device store   https   play google com store apps details id com ibm xiv mobile android amp hl en   gt  iOS device store  http   itunes apple com us app ibm xiv mobi  1e dashboard id465595012 mt 8  The subscription to the push service is on a user system basis  On an iOS platform  after    installing and signing on to the mobile application for the first time  you must confirm to accept  push notifications  On an Android platform  users are automatically enabled for notifications     A new Notifications setting in the mobile user controls panel lets you specify whether or not to  receive notifications from the XIV system  See Figure 7 49     Notifications    You can change the  notification display mode  and minimum severity  in the XIV GUI       Figure 7 49 Controlling notification on mobile device    368 IBM XIV Storage System Architecture and Implementation    The push notification service is based on the XIV Service Center  When new events are  received from XIV system and match with certain event rule setup in Service Center  the  releva
612. ties in TBs of an XIV Storage System Gen3  with 4 TB drives           Figure 3 5 CoD capacities for an XIV Storage System Gen3 with 4 TB drives    Figure 3 6 shows an example of the valid capacities in TBs of an XIV Storage System Gen3  with 6 TB drives     277118    409700   420921   424233  453300   456867          Figure 3 6 CoD capacities for an XIV Storage System Gen3 with 6 TB drives    Chapter 3  IBM XIV architecture  components  and planning 69    3 1 4 Advanced System Placement    IBM Advanced System Placement  ASP  is a pay as you go program that lets organizations  purchase IBM XIV Storage Systems for only a fraction of the price upon installation  The ASP  program complements the Capacity on Demand pricing program     For details and official terms of the offer  see the IBM Announcement Letter Number 314 041  about IBM System Storage Advanced System Placement     http   ibm co ZF505J    This acquisition program serves a highly flexible way to provide XIV storage  It is available for  new and current IBM clients and is ideal for cloud service providers  It is also a good fit for  clients with rapidly growing storage requirements who need highly flexible ways to add  storage     Advanced System Placement might be good to consider for clients who meet one or more the  following situations      gt  Clients who buy more than 160 TB of usable capacity per year     gt  Clients with unpredictable growth needs who are not sure when they will need the extra  Capacity and wo
613. tificate from a  CA  and installing the server and CA certificates     Windows Server SSL configuration    To configure SSL for LDAP on a Windows Server  you must install the Management Console   MMC  snap in to manage local certificates  Then  you must create a certificate request   CER  and have the CER signed by a CA  Finally  you import the signed certificate into the  local keystore  import a CA certificate as a trusted root CA  and then reboot the server for the  new configuration to take effect     Installation of the local certificates Management Console snap in    Install the certificate snap in for MMC to allow you to manage the certificates in your local  machine keystore by completing the following steps     1  Start the MMC by selecting Start     Run  Enter mmc  a and select OK   2  Click the File      Add Remove Snap in menu to open the Add Remove Snap in window     3  Click Add to open the Add Standalone Snap In window  Click the Certificates snap in and  then click Add     4  Select the Computer Account option to manage system wide certificates  Click Next  to continue     5  Click the Local Computer option to manage certificates on the local computer only  Click  Finish and then Close  Then  click OK to complete the snap in installation     6  Click File     gt  Save as and save the console configuration in the sSYSTEMROOT  system32  directory with a file name of localcert msc     7  Create a shortcut in the Administrative Tools folder in your Start menu by r
614. tifies  analyzes  and defends against these and other possible attack routes      gt  Simplicity of implementation and design     Simplicity enhances security  facilitates implementation at the client site  decreases staff  training costs  and ultimately lowers total cost of ownership  TCO  by allowing more issues  to be resolved quickly and with fewer unnecessary visits by support personnel to client  premises      gt  Accessibility by support personnel     The auditing features of the XRSC both enhance security and enable easy reassignment  of a Support case among support personnel  The XRSC can expedite escalation of  support cases to higher level support and allows IBM SSRs to pool knowledge to resolve  complex client issues     Underlying architecture  The XIV remote support mechanism has four major components      gt  Remote Support Client  machine internal     The Remote Support Client is a software component inside the XIV Storage System that  handles remote support connectivity  It relies only on a single outgoing Transmission  Control Protocol  TCP  connection  and has no capability to receive inbound connections  of any kind  The Client is controlled by using XCLI and is charged with starting a  connection  terminating a connection  because of timeout or client request   and trying the  connection again in case it terminates unexpectedly      gt  Optional Remote Support Proxy    The Remote Support Client can access the Remote Support Center Front Server directly   
615. tigating event  such as a component  failure or malfunction  and safely carried out according to a predefined schedule     In addition to the system   s diagnostic monitoring and autonomic maintenance  a proactive  and systematic approach to maintenance is augmented because the entirety of the logical  topology is continually preserved  optimized  and balanced according to the physical state of  the system     The modular system design also expedites the installation of any replacement or upgraded  components  while the automatic and transparent data redistribution across all resources  eliminates the downtime  even in the context of individual volumes  associated with these  Critical activities     High availability   The rapid restoration of redundant data across all available drives and modules in the system  during hardware failures  and the equilibrium resulting from the automatic redistribution of  data across all newly installed hardware  are fundamental characteristics of the XIV Storage  System architecture  These capabilities minimize exposure to cascading failures and the  associated loss of access to data     Consistent performance    The XIV Storage System can adapt to the loss of an individual drive or module efficiently and  with relatively minor impact compared to monolithic architectures     Chapter 2  IBM XIV Storage System logical architecture and concepts 47    48    Although predefined traditional monolithic systems employ an N 1 hardware redundancy  sche
616. time in minutes   iv  Click Create Escalation Rule     12 On the summary window shown in Figure 7 48  review the information that you entered   Go back if you need to make changes  If everything is correct  click Create        Wizard   Rule Create   Create the rule x       View the rule attributes and create the rule or cancel and discards all changes       Rule Name     Tie       Domain Name   ai  Min Severity   cc  Destinations   n ee          Gow          Figure 7 48 Rule Create window    Chapter 7  Monitoring 365    Setting up notifications and rules using the XCLI    You use the same process to set up the XIV Storage System for notification using the XCLI as  you used with the XIV Storage Management GUI  The three step process includes all the  required configurations to allow the XIV Storage System to provide notification of events      gt  Gateway   gt  Destination   gt  Rules    The gateway definition is used for SMTP and SMS messages  There are various commands  that are used to create and manage the gateways for the XIV Storage System  Example 7 25  shows an SMTP gateway being defined  The gateway is named test and the messages from  the XIV Storage System are addressed to xiv us ibm com     When added  the existing gateways are listed for confirmation  In addition to gateway address  and sender address  the port and reply to address can also be specified  There are various  other commands that are available for managing a gateway     Example 7 25 The smtpgw_define 
617. tion is dramatically simple and fast  remote mirroring is easy and is  supported even between XIV Gen3 and the XIV second generation Storage System  By  reducing complexity  the system minimizes the IT resources required to manage storage   freeing individuals for other tasks     The XIV Storage System Gen3 uses a grid array of low cost  high capacity   2 TB  3 TB    4 TB  or 6 TB  SAS drives for storing data  which provides performance similar to Fibre  Channel  FC  drives in traditional storage systems  The grid architecture used in the XIV  Storage System eliminates the need for    idle spare drives    in the event of a drive failure  As a  result  all drives in the system are fully used  reducing the number of idle components       The 1 TB drives are actually capacity limited 2 TB drives     4 IBM XIV Storage System Architecture and Implementation    The system   s use of very high density drives maximizes physical space per floor tile  offering  maximum capacities of 489 usable TB  in 6 TB disk drive configurations   High density  storage can significantly reduce power  space  and cooling costs  and offers much lower cost  per terabyte relative to comparable systems     These features and more reduce the overall TCO of the XIV Storage System     1 4 XIV Gen3 Storage System models and components    The XIV Gen3 Storage System family consists of two machine types and two models    gt  Machine type model 2812 114  2812 214   gt  Machine type model 2810 114  2810 214    Not
618. to as purchasing a module activation  feature  The XIV sends reports to IBM about allocated storage through the Call Home feature   modem or email   and IBM invoices clients if licensed capacity is exceeded  An XIV Storage  System that is in the CoD program must be able to call home to IBM   This is mandatory      The advantage of CoD is that storage purchases can be deferred until the storage capacity is  needed  There is a small price premium associated with purchasing CoD storage over the  traditional way of paying for all storage capacity in the whole configuration up front  It is  common for clients to stay in the XIV Capacity on Demand program until the XIV Storage  System configuration has reached nine modules and then switch to purchasing normal   non CoD  modules to further expand the capacity of the XIV Storage System  Switching from  a CoD configuration to a non CoD configuration is allowed  but then you cannot later  purchase more CoD capacity     The most important aspect of all CoD configurations is that the system is delivered with the  same hardware configuration as the non CoD system  All modules are active  The XIV uses  the performance capabilities of all the disk drives in the configurations  purchased storage   and CoD de allocated and unpurchased storage     Benefit  All CoD configurations are delivered with the same hardware as a full system  and  all modules and all ports are active  The restriction is only on the capacity that you can use     This sce
619. to the system     Details about these configuration options and the various capacities  drives  ports  and  memory are provided in Figure 3 2     Rack Configuration       Total number of modules 6 9 10 11 12 13 14 15   Configuration type  partial partial partial partial partial partial partial full  Total number of data modules 3 3 4 5 6 7 8 9  Total number of interface modules 3 6 6 6 6 6 6 6  Number of active interface modules 2 4 4 5 5 6 6 6  Interface module 9 state Disabled Disabled Enabled Enabled Enabled Enabled Enabled  Interface module 8 state Enabled Enabled Enabled Enabled Enabled Enabled Enabled  Interface module 7 state Enabled Enabled Enabled Enabled Enabled Enabled Enabled  Interface module 6 state Disabled Disabled Disabled Disabled Disabled Enabled Enabled Enabled  Interface module 5 state Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled  Interface module 4 state Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled  FC ports 8 16 16 20 20 24 24 24  iSCSI ports  1 Gbps     mod 114  6 14 14 18 18 22 22 22  iSCSI ports  10 Gbps     mod 214  4 8 8 10 10 12 12 12  Number of disks 72 108 120 132 144 156 168 180  Usable capacity  1  2   3 4  6TB  28 TB 44 TB 51 TB 56 TB 63 TB 67 TB 75 TB 81 TB  55 TB 88 TB 102 TB 111 TB 125 TB 134 TB 149 TB 161 TB  84 TB 132 TB 154 TB 168 TB 190 TB 203 TB 225 TB 243 TB  112 TB 177 TB 207 TB 225 TB 254 TB 272 TB 301 TB 325 TB  169 TB 267 TB 311 TB 338 TB 382 TB 409 TB 453 TB 489 TB    of CPUs  one per Module
620. top when found yes     gt  gt Idap_list_servers  FQDN Address Base DN      itso storage ibm com 9 155 113 137 QU Users DC itso DC storage DC ibm DC com    Alternatively  the same configuration steps can be accomplished by using the XIV Storage  Management GUI  To change the LDAP configuration settings in the XIV Storage  Management GUI  open the Tools menu at the top of the main XIV Storage Manager window   click Configure     gt  LDAP     Role Mapping  and change the configuration parameter  settings     280 IBM XIV Storage System Architecture and Implementation    Associating roles in OpenLDAP  Because we are just using a text string to identify a user in an XIV Storage System group role   the string must be added to the description attribute     In Example 5 28  we add the    XIVAdmins       role association to the itso user  Because we are  using a command line utility  a text file is used to feed in the relevant commands into the  ldapmodify command     Example 5 28 Adding role association to an OpenLDAP user      Cat user_mod xivadmins itso   dn  uid itso ou Users dc itso dc storage  dc ibm dc com  changetype  modify   replace  description   description  XIVAdmins      ldapmodify  x  r  f user_mod xivadmins itso  D  cn Manager dc itso dc storage dc ibm dc com  w PASSWOrd  v  Idap_initialize   lt DEFAULT gt     replace description    XIVAdmins  modifying entry     uid itso ou Users dc itso dc storage dc ibm dc com   modify complete      Idapsearch  LLL  b ou Users dc its
621. torage Administrator role can  manage the system resources associated with that domain  The resource associations that  such a user can manage include     Pools   Hosts  Clusters  Targets  Users    User Groups    YYYY YV Y     Note  Domain user associations can only be managed by the Global Storage  Administrator through the XIV GUI when local authentication is in use  When LDAP  authentication is in use  enabled   domain user associations must be managed directly  within the chosen LDAP solution     Also  with LDAP enabled  a global administrator can associate user groups to a domain   but cannot disassociate user groups from a domain with LDAP active     Further  a domain administrator with a Storage Administrator role has the ability to manage  domain user and user group associations  However  such a user has no ability to manage  other domain resource associations     Note  When local authentication is active  only local users that are not associated with a  local group can be associated with a domain  To associate a local user that is a member of  a local group with a domain  you must associate the user group with the domain     For more information about domain administrators in XIV  see    Global administrator and  domain administrator    on page 223     Managing domain pool associations    To manage pool associations with a domain  right click the domain in the Domains view  and  select Manage Associations     Pools  as shown in Figure 4 89        Ba ITSO_domain_2    
622. torage System  Business Continuity Functions  SG24 7759      gt  Support for thin provisioning     Thin provisioning allows administrators to overprovision allocated storage within a storage  pool  This task is done by defining volume sizes that are larger than the physical capacity  of the storage pool  Unlike other approaches  the physical capacity of the storage pool  needs to be only larger than the actual size of the volumes used within that pool  Physical  capacity of the storage pool needs to be increased only when actual written data of the  volumes comes close to the physical pool size      gt  Support for Microsoft Windows Server 2012     The XIV Storage System enables you to take advantage of recent Microsoft Windows  enhancements  such as space reclamation  that can help you increase capacity use and  lower TCO      gt  Support for in band data migration of heterogeneous storage     The XIV Storage System is also capable of acting as a host  gaining access to volumes on  an existing storage system  The system is configured as a proxy to respond to requests  between the current hosts and the storage while migrating all existing data in the  background  In addition  the XIV Storage System supports thick to thin data migration   which allows the system to reclaim any allocated space that is not occupied by   actual data      gt  Authentication using Lightweight Directory Access Protocol  LDAP      LDAP can be used to provide user logon authentication  allowing the XI
623. torage System occurs at the management level  All physical system resources  disks   CPUs  memory  and interfaces  are shared among domains  As such  domain administrators  do not have the ability to modify physical system resources  However  they can be notified of  events relating to physical system attributes  because these events might affect the objects  within their domain  For example  a domain administrator can be alerted upon the failure of a  drive or the disconnection of an interface link     Domain creation   The creation of domains within the XIV Storage System is performed by a global storage  administrator  which is a user with the role of storage administrator who is not associated  with any domains  By default  the built in admin user account is a global storage  administrator     When creating a domain  the global administrator assigns system resources to that domain   There are certain resources within the XIV Storage System that have finite limits  Examples  include storage capacity and number of volumes  As such  upon creation of a domain  the  global administrator must determine the quantity of these finite resources to assign to the  domain  For more information about domain creation and the assignment of system  resources to a domain  see 4 8     Multitenancy    on page 174     Domain attributes  Domains includes these important characteristics      gt  A domain is a logical partition of the system   s resources  It represents a subset of the  system  
624. trol and the logic  to generate hardware alarms in the case of problems in the module     3 1 10 Interface modules    From a hardware perspective  the XIV Gens interface modules are the same as the data  modules in the corresponding Model 114 or Model 214  See the diagram in Figure 3 21 on  page 87  Additional hardware  Fibre Channel HBAs  and Ethernet adapters differentiate the  interface module from a data module     Redundant  power supplies    a Ls      fig R   T  hb    mn ETT z CEL  D d   m           iscsi      IE ae    Dual  Fibre channel       Figure 3 21 Interface module    Depending on the Gen3 model  a different number of adapters are installed in the interface  modules      gt  Model 114 and 214  1 GbE          Two 2 port 8 Gbps Fibre Channel HBAs      One 4 port iSCSI 1 Gbps Ethernet adapter     gt  Model 214  10 GbE        Two 2 port 8 Gbps Fibre Channel HBAs      One 2 port iSCSI 10 Gbps Ethernet adapter    These two interface adapter types are used for host attachment to the XIV Storage System   The ports can also be used to establish remote mirror links and data migration paths with  another remote XIV or storage systems from other vendors  migration      Chapter 3  IBM XIV architecture  components  and planning 87    For the number of usable iSCSI ports in XIV Gens partial configurations  see Figure 3 2 on  page 65     Figure 3 22 on page 88 shows a schematic  rear view  of the two interface modules with Fibre  Channel and iSCSI ports  All Fibre Channel and i
625. ts on the system     At this stage  the user group Application01 Group still has no members and no  associations defined  Next  we create an association between a host and the user group     4  Right click the name of the user group that you created to open a menu  and select  Update Access Control  as shown in Figure 5 31     ame   Category      Ungrouped    lee Soe ea oe  d AU   i  i  iF Orm ai Ou i       Edit  Delete    Update Access Control    View Accesible Volumes  Properties    Sort By            Figure 5 31 Update Access Control for a user group    The User Group Access Control window shown in Figure 5 32 on page 230 opens  The  window contains the names of all the hosts and clusters defined to the XIV Storage  System  The left pane shows the list of unauthorized hosts and clusters for this user  group  and the right pane shows the list of hosts that have already been associated with  the user group     Chapter 5  Security 229    User Group Access Control x    Access Control for Application01_Group  Unauthorized Hosts   Clusters Authorized Hosts   Clusters    CLU_SOLMAN  SR  test  p6 5704ab 2v19  Application_host01             Figure 5 32 Access Control Definitions window       5  Add or remove hosts from either list by selecting a host and clicking the appropriate arrow   Finally  click Update to save the changes     You can verify which group that hosts have been associated with by viewing it in the Hosts  and Clusters window  See Figure 5 33           ow Name   Typ
626. ture and Implementation     gt  When a host is added to a cluster  the association of that host is removed  Limitations on  the management of volumes mapped to the host is controlled by the association of the  cluster      gt  When a host is removed from a cluster  the association of that cluster remains unchanged   This configuration enables continuity of operations so that all scripts relying on this  association continue to work     Optional account attributes  In this section  we describe optional attributes for email and phone numbers      gt  Email  Email is used to notify specific users about events through email messages  Email  addresses must follow standard formatting procedures     Acceptable value  Any valid email address  A default value is not defined      gt  Phone and area code  Phone numbers are used to send SMS messages to notify specific  users about system events  Phone numbers and area codes can be a maximum of  63 digits  hyphens      and periods        Acceptable value  Any valid telephone number  A default value is not defined     5 5 2 Managing user accounts with the XIV Storage Management GUI    This section illustrates the use of the XIV Storage Management GUI in native authentication  mode for creating and managing user accounts  as well as for creating user groups and  defining group membership     Adding users with the XIV Storage Management GUI    The following steps require that you initially log on to the XIV Storage System with storage  admin
627. u associate with that user  explicity  Furthermore  for a  local user that is associated with one or more domains  removal of that local user from its  last domain association deletes that user from the system  In other words  you cannot  convert a domain user to a global user     For more information about XIV user roles  see    User roles    on page 221     Managing domain user group associations    To manage local user group associations with a domain  right click the domain in the  Domains view and select Manage Associations     User Groups  as shown in Figure 4 99       Utilization    18 GS Used Vikumes       Edit  Ba ITSO_domain_  pp   Manage Associations    Pools  View Associated Pools Hosts  View Associated Hosts and Clusters Clusters  View Associated Users and User Groups Targets  Users  Limit Traffic by Perf Class  Limit Traffic by new Perf Class  Properties          Figure 4 99 Accessing the Manage Domain   s Associations screen User Groups tab in the XIV GUI    In the Manage Domain   s Associations screen that appears  Figure 4 100 on page 191    select the user groups and use the arrows to associate or remove the user groups from the  domain  Click Update to apply the changes     190 IBM XIV Storage System Architecture and Implementation       Manage Domain s Associations  JTSO_domain  x    Users  User Groups to Associate Associated User Groups  User Groups cb group thilo_app_x3655  StudentWin 1_ Group  Hast StudentWin5 grp  StudentWin6Grp  XIV residency 2014  Cl
628. u can start the New Entry configuration wizard by completing the following steps     1  Select a server instance  Oracle Java Directory allows you to create multiple instances of  an LDAP server  However  the only instance that uses port 389 for non SSL LDAP and  port 636 for SSL LDAP communication can be used for XIV LDAP authentication services   Select an instance configured on port 384  as shown in Figure B 4        Step 1 Specify the Directory Server    Choe the Directory Server where the entry will be created        Server    xivhost  storage tucson ibm com 389         Cancel          Figure B 4 Selecting a Directory Server instance    2  Select the new entry location  as shown in Figure B 5  The LDAP administrator  determines the location of a new entry  Unlike the Active Directory LDAP repository  where  location is directly linked to the domain name  Oracle Java Directory LDAP server provides  greater flexibility in terms of placement for the new entry        Step 2 Specify Entry Location    Provide the location ON where the entry will be written in the Directory Server     a    Indicates required field    Parent for example  de example de com  DN     Previous i    Figure B 5 Selecting the entry location       Cancel             Appendix B  Additional LDAP information 439    440    The location of all entries for XIV Storage System accounts must be the same because  the XIV Storage System has only one LDAP configuration parameter that specifies the  location  In our 
629. uctivity Center    Modules XIV Gen3 with 2 TB XIV Gen3 with 3 TB       Chapter 7  Monitoring 399    Modules XIV Gen3 with 2 TB XIV Gen3 with 3 TB    Storage pools   Tivoli Storage Productivity Center can report on XIV Storage System storage pools  To assist  with this action  new Configured Real Space and Available Real Space columns  reporting on  the hard capacity of a storage pool  were added to the Storage Pool Details report  This  report can be accessed by clicking Data Manager     Reporting     Asset     By Storage  Subsystem      lt Subsystem Name gt      Storage Pools        To demonstrate how to interpret the values shown in Tivoli Storage Productivity Center  see  Figure 7 79  where an XIV Storage System pool called  7SO was created  The hard size of  the pool is 5016 GB and the soft size of the pool is 10015 GB  shown in the XIV Storage  Management GUI as 10 TB   There is one volume in the pool  sized at 1099 GB  In that  volume is 533 GB of actual data                                 10 TB Wol    Figure 7 79 ITSO pool shown in XIV Storage Management GUI       In Figure 7 80 on page 400  the details of the ITSO pool are shown in the Tivoli Storage  Productivity Center GUI     Detail for Storage Pool ITSO    Storage Subsystem Aly Fest    Type RAID 10  Status DE    Storage Pool Space 10 27 TB  Available Storage Pool Space 1 03 TB    Configured Capacity Limit 10 27 TB  Remaining Configured Capacity 961 58 GB  Is Space Efficient true    Is pool encryptable False  Is p
630. uld like to defer payment     gt  Clients about to launch a major new application   gt  Clients who are acquiring another company   gt  Clients who are deploying private clouds     gt  Client who expect a new contract or client    The acquisition is simple  IBM installs a full system with partial payment  based on initial use   When use and capacity requirements grow  there is no need for hardware configuration  changes or intervention from an IBM sales support representative nor any key activation  In  contrast to the CoD program  Advanced System Placement does not require detailed  capacity monitoring  It also provides the ability to run several parallel ASP tracks for multi site  data centers and client needs  Clients sign a contract for standard a one year fixed term     A financed version of the ASP program is available through IBM Global Financing  By  combining this program with a hardware lease program  payments become predictable and  manageable  The offering can be proposed as a capital acquisition model or  in many cases   as an operating expense  Opex model   with payments spread over 36 months  60  stepping  up to 100  or no payments stepping up to 100       For each agreement  there may be one initial machine and any number of additional  machines called    subsequent machines    that are acquired one at a time  There is no limit to  the number of agreements that the client may have in place at any one time     Figure 3 7 on page 71 depicts a one year acquisitio
631. ultiple applications on  multiple application servers  If there is adequate spare performance capacity in the XIV  Storage System to handle the performance requirements of the new application  all that is  required is to create new LUNs and assign them to the host  However  if the XIV system is to  be used to the maximum of the performance that it can deliver  you can use the quality of  service  QoS  feature to ensure that your business critical applications are served in priority  with adequate performance  from an input output operations per second  IOPS  and  bandwidth standpoints  for details  see 4 7     QoS feature    on page 170      Because of the grid architecture  the XIV Storage System actually works more efficiently as  multiple application servers are attached  The XIV evenly distributes the production workload  over the performance resources of the multiple XIV Storage System interface modules and   therefore  the entire grid architecture     6 1 2 Grid architecture    Each XIV Storage System module contains disk drives that contribute to the data storage  capacity and performance capacity of the XIV Storage System configuration  If there is  enough available performance capacity within the XIV to handle the new application   s  performance requirements  the only configuration activity required is to create new LUNs   This situation assumes that there is also enough available data storage capacity  But what are  the considerations if the XIV does not have addit
632. umber of 17 GB increments needed to meet the block designated  Capacity     Capacity  The initial physical capacity allocated by the system upon volume creation  can be less than this amount  as described in    Logical and actual volume sizes    on  page 38      gt  A maximum total of 12 000 volumes  including snapshots  can be concurrently created on  the system     Storage pools   Storage pools are administrative boundaries that enable storage administrators to manage  relationships between volumes and snapshots and to define separate capacity provisioning  and snapshot requirements for separate applications or departments  Storage pools are not  tied in any way to physical resources  nor are they part of the data distribution scheme  We  describe storage pools and their associated concepts in 2 6     Storage pool concepts    on  page 35     Snapshots   A snapshot represents a point in time copy of a volume  Snapshots are like volumes  except  snapshots incorporate dependent relationships with their source volumes  which can be  either logical volumes or other snapshots  Because they are not independent entities  a  particular snapshot does not necessarily wholly consist of partitions that are unique to that  snapshot  Conversely  a snapshot image does not share all of its partitions with its source  volume if updates to the source occur after the snapshot was created     2 4 2 Logical volume layout on physical disks    The XIV Storage System manages the distribution of log
633. umeric characters even if your LDAP product of choice  supports it  If you eventually decide to migrate user credentials between local and LDAP  repositories or vice versa  the task can be greatly simplified if the same set of rules is applied  to both local and centralized repositories  In fact  the set of rules enforced by the XIV Storage  System for local user names must be used for LDAP as well because it is the most restrictive  of the two  For details about XIV Storage System limitations for user names  see    User name     on page 220     Special consideration must be given to using the    space    character in user names  Although  this feature is supported by LDAP  it has a potential for making certain administrative tasks  more difficult because the user names in this case must be enclosed in quotation marks to be  interpreted correctly     The same set of locally stored predefined user names exists on the XIV Storage System  regardless of the authentication mode  Users technician and admin are always authenticated  locally even on a system with activated LDAP authentication mode  Avoid creating LDAP user  accounts with the same names     If a user account with the same user name is registered in both local and LDAP repositories   and LDAP authentication mode is in effect  LDAP authentication takes precedence  and the  XIV Storage System performs authentication using LDAP account credentials  The only  exception to this rule is the predefined user names listed in th
634. umes  or certain parts within a volume  more frequently      gt  Compatibility     Modules consist of standard    off the shelf    components     Because components are not specifically engineered for the system  the resources  and time required for the development of newer hardware technologies are minimized   This benefit  coupled with the efficient integration of computing resources into the grid  architecture  enables the system to realize the rapid adoption of newer hardware  technologies available without the need to deploy a whole new subsystem      gt  Scalability     Computing resources can be dynamically changed     The architecture can be    scaled out    by adding new modules to accommodate both  new capacity and new performance demands     The architecture can also be    scaled up    by adding more modules  up to a total of 15  modules     Chapter 2  IBM XIV Storage System logical architecture and concepts 21    Figure 2 3 contains a conceptual depiction of the scalable grid architecture of the XIV        Figure 2 3 XIV Storage System scalable conceptual grid architecture    Proportional scalability   Within the XIV Storage System  each module contains all of the pertinent hardware elements  that are necessary for a grid topology  processing  caching  and storage   All modules are  connected through a scalable network  This aspect of the grid infrastructure enables the  relative proportions of cache  processor  disk  and interconnect bandwidth to remain optimal  
635. unt value  4   gt    lt ethernet_port_count value  4   gt    lt io_ allowed value  yes   gt    lt io_ enabling priority value  0   gt    lt serial value  MBC0944037G3E64   gt    lt original serial value  MBC0944037G3E64   gt    lt part_number value  98Y3335   gt    lt original_part_number value  98Y3335   gt    lt usm_version value  3 6RC1   gt    lt bmc_version value  5 06 00000000   gt    lt bios version value  5 00 00000000   gt     Chapter 7  Monitoring 9341     lt fpga_version value  1 00 00000000   gt     lt ses_ version value  3 1 0 18   gt     lt pdb firmware value  4 01   gt     lt pcm_1 firmware value  1 06   gt     lt pcm 2 firmware value  1 06   gt     lt fan_controller firmware value  UCD90910 2 0 9 0000 100520  2 2 0    gt     lt battery firmware value  0 00   gt     lt sas_version value  0a030002h   gt     lt infiniband hca_ version value  2 9 1810   gt     lt cna_version value  2 9 1200   gt     lt memory_gb value  24   gt     lt temperature value  24   gt     lt normalized_ temperature value  22   gt     lt chassis serial value  SHM0984831PUJDT   gt     lt chassis_part_number value  0984831 01   gt     lt electronics serial value  FTS0941313G167X   gt     lt electronics part_number value  0941313 04   gt    lt  modul e gt      lt  QUTPUT gt    lt  XCLIRETURN gt     In Example 7 11  the ups_list command describes the status of the uninterruptible power  supply  UPS  component  It provides details about when the last test was performed and the  results  Equally
636. ure 7 15 gives an overview of the criteria and meaning of the various severity levels     severity  The Events are categorized in these five categories     K hs   Critical    Critical    an event have occured where one ore more parts have failed  and the redundancy and machine operation can be affected    a    Major    Major    an event have occured where a part have failed and the  redundancy is temporary affected   ex  failing disk    x   Minor    Minor    an event occured where a part have failed but system is still fully  redundant and have no operational impact   ity   Warning    Warning    information for the user that something in the system have  changed but no impact for the system   fi    Informational    Informational event is for information only without any impact or    danger for system operation    Figure 7 15 Event severity    334 IBM XIV Storage System Architecture and Implementation       Event notification configuration    The Events window offers a toolbar  Figure 7 16  that contains a setup wizard  with the ability  to view and modify gateways  destinations  and rules  The wizard can also modify the email  addresses for the XIV Storage System and export the events to a comma delimited  CSV  file  for use in an external spreadsheet program        ai  Setup Ega Rules Ch Email Settings  a  Export    Figure 7 16 Event rules configuration    Clicking the Setup icon starts the Events Configuration wizard  which guides you through the  process to create gateways
637. ure and Implementation       LDAP Configuration    General    Servers    User Credentials    Role Mapping    Secure LDAP    Parameters       Figure 5 84 Enabling SSL for Active Directory LDAP communication    Use SSL    Certificate About To Expire  Days in advance         30    First Warning  Second Warning    Third Warning   7    5 10 2 Maintaining the SSL certificate       A new SSL certificate must be installed before the existing one expires  If you let your SSL  certificate expire  XIV Storage System LDAP authentication is no longer possible until you  either disable SSL or install the new certificate on both the LDAP server and the XIV Storage  Server  Before the SSL certificate expires  the XIV Storage System issues three notification    events  The first    LDAP SSL Certificate About to Expire    event is shown in Figure 5 85     Event Properties    Severity   Date     Index        Figure 5 85 First notification of SSL certificate of LDAP server expiration    Event Code   T  Shooting     Description     Warning  2011 10 04 16 51 38  61639    SSL Certificate of LDAP server       itso storage ibm com  is about to expire on    2011 11 01 14 55 16  first notification         Chapter 5  Security    285    286 IBM XIV Storage System Architecture and Implementation       Performance    This chapter describes how the IBM XIV Storage System software and hardware work  together to provide high performance characteristics  These characteristics  which are  inherent in the XIV St
638. ure called the Directory Information Tree  DIT   Objects are arranged within the DIT  based on their distinguished name  DN   Distinguished name defines the location of an object  within the DIT  Each object is also referred to as an entry in a directory belonging to an object  class  An object class describes the content and purpose of the object  It also contains a list  of attributes  such as a telephone number or surname  that can be defined in an object of that  object class     As shown in Figure 5 46  the object with the DN cn mbarlen  ou Marketing  o IBM belongs to    object class objectClass ePerson     Directory Root  Top     _    ou Marketing    cn mbarlen cn tbanen  objectClass   Person objectClass   Person  objectClass ePerson objectClass   ePerson  mail manong ibm com mail thomas acme com  sn Barlen sn Barlen  givenName Maron  telephoneNumber 112 devicel D PrinterSales  objectClass cimPrinter  cn Klaus objectClass   ePrinter  objectClass Person location Printer room 3rd floor  objectClass ePerson owner John Doe  mail Ktebbe ibm com Quevename ispr01  sn Tebbe MmaxCopies 10       Figure 5 46 Example of a Directory Information Tree  DIT     Object class ePerson contains the following attributes      gt  cn  common name   mail   sn  Surname   givenName  telephoneNumber    YY vV Yy    Chapter 5  Security 245    Each attribute has a value assigned to it      gt  cn mbarlen  mail marion   ibm com  sn Barlen  givenName Marion  telephoneNumber 112    YY vV Yy    In this 
639. ures through scripts  The business  requirements can be accommodated dynamically by modifying the QoS classes to ensure  that the wanted level of performance is achieved on time     Important  When using the QoS performance class feature  XIV consistently limits  throughput to the specified QoS limits  regardless of the host  domain  or pool I O demand     4 8 Multitenancy    XIV multitenancy brings flexibility and simplicity to management of tenant data and storage  resources across multiple XIV systems  Multitenency provides several advantages      gt  Secure division and isolation of XIV Storage resources among numerous tenants    gt  Simple  quick delegation of administration tasks and role based permissions    gt  Simple  rapid deployment without the need for extensive planning and tuning  as well as  field upgradability    In this section  we cover the details of domain administration using the XIV Storage System  management software     IBM XIV Storage System Architecture and Implementation    4 8 1 Domains    As discussed in 2 4 3     Multitenancy    on page 30  a domain is a logical subset of the XIV  system  Just as an XIV Storage System has hard and soft capacities  so does a domain   When you create a domain  you define the hard and soft capacities available to that domain   and those parameters define the aggregate hard and soft capacities that can be consumed  and allocated by the pools within the domain  For more information about the hard and soft  Capacity co
640. used for XIV Storage System support and for the IBM personnel to maintain and repair  the system  This device is used only to gain remote access to the XIV System through the  modem for support personnel  When there is a software or hardware problem that needs  attention  a remote connection is required and used to analyze and possibly repair the faulty  system  If there is no XIV Remote Support Center  XRSC  or other broadband connection  available  the only way to connect is through the modem and maintenance module  For more  information about remote connections  see    XIV Remote Support Center    on page 101     Modem   The modem installed in the rack is an option to use for remote support if the preferred choice  of XIV Remote Support Center is not selected  It enables the IBM specialists and higher level  support to connect to the XIV  Problem analysis and repair actions without a remote  connection can be complicated and time consuming     Modem  The modem is not available in all countries     Chapter 3  IBM XIV architecture  components  and planning 93    3 2 Hardware planning overview    This section provides an overview of planning considerations for the XIV Storage System   including a reference listing of the information that is required for the setup  The following  information is included in this section      gt  Physical installation requirements   gt  Delivery requirements    gt  Site requirements    gt  Cabling requirements    For more detailed planning infor
641. used only one at a time  For optimum performance  it is best to use all of  the interface modules all of the time     This task can be accomplished by using six host servers with one XIV Storage System LUN  or by one host server with six LUNs  Because most computing environments use multiple    296 IBM XIV Storage System Architecture and Implementation    application servers  having one LUN per server is fine  But when the XIV is dedicated to one  host system  consider matching the number of LUNs to the number of multipathing paths     This consideration of the number of hosts and LUNs is closely linked to queue depth  as  described in    Host bus adapter and disk queue depth    on page 299     Compared to other storage systems  the XIV Storage System configuration typically ends up  with a lower overall LUN count because the XIV Storage System architecture removes the  limitations of traditional RAID arrays     Older storage architectures often require small volumes  such as meta volumes  to use more  drive spindles  Older architectures also require many LUNs to employ striping techniques to  engage enough disk spindles to handle high I O requirements  XIV Storage System is  optimized to use all drive spindles and eliminates the inconvenience of managing many  volumes     6 2 3 Multipathing considerations    XIV Storage System optimum performance is realized through the maximum use of the grid  architecture  This use is the most important consideration to achieve maximum XIV
642. using a tree like table view  This view can be useful when accessing the current  storage related views and making changes accordingly          Size  GB  pn      s  AIX_PFE_pool    E AIX _PFE_LPAR 4  E AIX _PFE_LPAR 2  E AIX_PFE_LPAR 3    Ss andy _july2012    E     andy voli  t andy_vwol2  E andy_vol2 snapshot_00002      s  dirk test    E dirk_test    Ss GR_Poolt    E data  E data   E datas  E data4  Figure 4 17 Tree Table       Export to comma separated values format   In addition to the previously supported events and statistics frames  the XIV Storage  Management GUI Version 4 4 supports exporting to comma separated values  CSV  for all  GUI tabular views  The new Export icon is available for all of these views  as shown in  Figure 4 18  When you click the icon  a window opens to prompt you to save the export file to  your local workstation     O ee ae  xiv XIV Storage Manage na t         T SE     Es d    _   i      Systems   Actions   View   Tools   Help fy  O a Add Voldr                  es Eg Export       All Systems  8   gt  Tucson Lab  3   gt  v Volumes and Snapshots w              Name     Size  GB    Used  GBY   Consistency           Figure 4 18 Export to CSV icon    126 IBM XIV Storage System Architecture and Implementation    System management  General settings    To reach the general settings window  use the GUI Tools menu  Alt   t   and then click  Management  A new option introduced in GUI 4 4 is the GUI session timeout setting  as  highlighted in Figure 4 19  
643. usted  You can trust this  certificate for this session only  Trust Once  or always  Trust    Always       Status  Not trustee     Issuedto  xivhost          Issued by  xiVoA       Validity  from  Mar 25  2013  to  Apr 24  2013     Details  Show Details    eit nee e IE EE p    Figure 5 10 Certificate Details window             The certificate error is resolved and you are now able to securely connect to this system  from the GUI using your own x509 certificate     214 IBM XIV Storage System Architecture and Implementation    Note  The XIVTop tool uses the same certificate store as the XIV GUI  Trusting a certificate  in the GUI means that the XIVTop tool will also trust that certificate     5 3 Configuring IPv6 addresses    The use of IPv6 addressing for XIV Storage System management and virtual private network   VPN  ports is supported by XIV Storage System Software Version 11 1 and later  To use  IPv6 addressing  you must first enable it on the XIV Storage System     5 3 1 Enabling IPv6 support    In the GUI  navigate to the System view of the chosen XIV Storage System and click  Systems     System Settings     System to open the System panel  Then  click the  Parameters tab  as shown in Figure 5 11        XIV_PFE2_ 1340010 Settings    General iSCSI Name iqn 2005 10 com xivstorage 040010  Time fone Europe Berlin    Parameters  NTP Server  SNMP DNS Primary    DNS Secondary  Misc    Use IPv6 Yes     No    Volume Default 55D Caching es  Domain access policy Open id    Host man
644. usters  Targets  Pools             Figure 4 100 Managing domain local user group associations in the XIV GUI    For more information about XIV user groups  see    User groups    on page 224     Viewing domain associations  You can view the following domain resource associations in the XIV GUI    gt  Pools     gt  Hosts and clusters   gt  Users and user groups    To view any of these resource associations  right click the domain in the Domains view and  select the appropriate menu item  as shown in Figure 4 101        Name Utilization             Edit    k E PE ie  Manage Associations      16 GB Soft  View Associated Pools    View Associated Hosts and Clusters  View Associated Users and User Groups       Limit Traffic by Perf Class  Limit Traffic by new Perf Class    Properties       Figure 4 101 Viewing domain resource associations in the XIV GUI    Chapter 4  IBM XIV Storage Management software 191    The related view in the XIV GUI will display only those resources that are associated with the  domain  As an example  Figure 4 102 shows the Pools view for a single domain called  ITSQ_domain     Domain       Ss ITSO pool 1 ITSO_domain       Figure 4 102 Viewing the pool resource associations for a single domain    Deleting a domain    To delete a domain  right click the domain in the Domains view and select Delete  as shown  in Figure 4 103     Utilization       Edit       ETS ll    Manage Associations 103 GB Soft   103 GB Hard   Ba test2 View Associated Pools     f n i      
645. utput  If your XIV Storage System is using Version  10 2 2 or earlier  you also get a list of XIV Storage System events  If that is the case  do not  leave the snmpwalk command running  press Ctrl c to stop it  XIV Storage System code  Versions 10 2 4 and higher do not list XIV Storage System events through the snmpwalk  command     Example 7 44 The output of the snmpwalk command    C  usr bin gt snmpwalk  v 2c  c XIV  m XIV MIB 10 10 1 10 xiv  XIV MIB  xivMachineStatus   STRING   Full Redundancy   XIV MIB  xivFailedDisks   INTEGER  0  XIV MIB  xivUtilizationSoft   Gauge32  69  XIV MIB  xivUtilizationHard   Gauge32  90  XIV MIB  xivFreeSpaceSoft   INTEGER  49770  XIV MIB  xivFreeSpaceHard   INTEGER  7954  XIV MIB  xivIfIOPS 1004   Gauge32  6519  XIV MIB  xivIfIOPS 1005   Gauge32  6773  XIV MIB  xivIfIOPS 1006   Gauge32  6515  XIV MIB  xivIfIOPS 1007   Gauge32  6557  XIV MIB  xivIfIOPS 1008   Gauge32  6517  XIV MIB  xivIfIOPS 1009   Gauge32  6575  XIV MIB  xivIfStatus 1004   STRING   OK   XIV MIB  xivIfStatus 1005   STRING   OK   XIV MIB  xivIfStatus 1006   STRING   OK   XIV MIB  xivIfStatus 1007   STRING   OK     388 IBM XIV Storage System Architecture and Implementation    XIV MIB  xivIfStatus 1008  XIV MIB   xivI fStatus 1009    STRING   OK   STRING   OK     The following fields are shown in Example 7 44 on page 388     xivMachineStatus Shows if a disk rebuild or redistribution is occurring   xivFailedDisks The number of failed disks in the XIV Storage System   xivUtilizati
646. ve direct access to the Internet  for example  because of firewall restrictions   You can use  the XIV Remote Support Proxy to facilitate the connection to the XIV Remote Support Center   For more information about the Remote Support Proxy  see the  nstallation and User   s Guide   GA32 0795     Chapter 3  IBM XIV architecture  components  and planning 101    To initiate the remote connection process  complete the following steps     1  Initiate an Internet based Secure Shell  SSH  connection to XRSC by using either the  XIV GUI or XCLI       XRSC identifies the XIV Storage System and marks it as    connected        IBM Support connects to XRSC using SSH over the IBM intranet     XRSC authenticates IBM Support with the IBM intranet       XRSC then shows the connected client system available to IBM Support     Ooo fF W N      IBM Support then chooses which system to support and connect to  Only allowed IBM XIV  systems are shown  IBM Support logs the intended activity     7  A fully recorded support session starts     8  When complete  IBM Support terminates the session and the XRSC disconnects the  XIV Storage System array from the remote support system     The XRSC Internet servers are hardcoded in XIV Storage System Software  Therefore  no  further configuration is required by the client to enable this function  aside from turning this  feature on using the XIV Storage Management GUI or XCLI  This service provides an  expedient means for IBM Support to gather required infor
647. ve interface modules  multiply by 4     Performance class creation using the XCLI  Using the XCLI enables you to create  an unlimited performance class  which is not possible from the GUI   as shown in  Example 4 15  The unlimited performance class is useful when using the  drag and drop function of the GUI for dynamic adjustments based on business needs     Example 4 15 QoS  Creating a    no limit    performance class with XCLI    XIV_PFE2 1340010 gt  gt perf_class create perf class No limit _pfc  Command executed successfully    XIV_PFE2_ 1340010 gt  gt perf_ class list   Performance class Max IO rate IOPS  Max BW rate MB s   No limit _pfc 0 0   XIV_PFE2_ 1340010 gt  gt     XCLI commands related to performance class handling are self explanatory and listed  below in Example 4 16 on page 173     Example 4 16 QoS  XCLI performance class command set    XIV_PFE2_ 1340010 gt  gt help search perf_class    Category Name Description   system perf class list Lists Performance Classes   system perf class create Creates a Performance Class   system perf class delete Deletes a Performance Class   system perf class rename Renames a Performance Class   system perf class set rate Sets the rate for a Performance Class  system perf class add host Adds a host to a Performance Class  system perf class remove host Removes a host from its Performance Class  system perf class _add_ pool Adds a pool to a Performance Class  system perf class remove pool Removes a pool from its Performance Class  s
648. vents  Therefore  events must be monitored by the client as described in 7 3     XIV  Storage System event notification    on page 359     When the Call Home feature is configured and events are received by the XRSC  periodic  heartbeat events are also received  The heartbeats are monitored by IBM and the client is  notified if the heartbeats are not received or are no longer received     There is an IBM service  called Electronic Service Call  ESC    where you can monitor  service calls that are specific to a customer account ID  The ESC  gives you the ability to  verify that a service ticket has been raised following an appropriate event  and to open a new  service call  The ESC  website is shown     http    www ibm com support esc    Contact your local IBM SSR to have your user ID associated with a specific customer ID  in ESC      The SMTP address for Call Home is configured separately from the general XIV Storage  System SMTP setting  If the client   s mail server gateway changes  a service call must be  logged to have the internal Call Home SMTP setting changed     Tip  Email relaying on the SMTP gateway server might need to be enabled to allow  Call Home events to be sent to IBM     7 5 2 Remote support    The XIV Storage System is repaired by trained IBM service personnel  either remotely with  the help of the XRSC  or on site by an IBM SSR  When problems arise  a remote support  specialist can connect to the system to analyze the problem  repair it remotely if possib
649. ver Enterprise Edition  support LDAP protocol Version 3     user_id attrib LDAP attribute set to identify the user  in addition to user  name  when recording user operations in the XIV event log   The default objectSiD value corresponds to the existing  attribute name in Active Directory LDAP object class     use ss  Indicates if secure  SSL encrypted  LDAP communication is  mandated  The default value is no  If set to yes without  configuring both sides for SSL encrypted communication   LDAP authentication fails at the XIV Storage System     first_expiration_event Number of days before the expiration of the certificate to set  the first alert  Severity    warning      Set this parameter to several  days that gives you enough time to generate and deploy a new  security certificate     second expiration event Number of days before the expiration of the certificate to set  the second alert  Severity    warning        third expiration event Number of days before the expiration of the certificate to set  the third alert  Severity    warning         Now that all configuration and verification steps are completed  the XIV Storage System is  ready for the LDAP mode to be activated     Appendix B  Additional LDAP information 437    Creating user accounts in Oracle Java Directory    Creating an account in Oracle Java Directory can be done in many ways using various LDAP  clients  We used the LDAP graphical user interface  GUI  client that is part of the Java System  Directory Service 
650. ves lets you store 489TB of data  in a single rack using the same floor space  but with a lower cost per TB and lower power  consumption per TB than the previous systems  Compared to XIV equipped with 4 TB  drives  the 6TB drives offer 33 percent lower power consumption per TB at up to 12  percent lower price     1 3 Total cost of ownership    The total cost of ownership  TCO  calculation for traditional enterprise storage systems  usually includes the following costs      gt  Cost of initial purchase   Cost of subsequent upgrades   Cost of hardware and software maintenance  Cost of storage management   Cost of electricity and cooling    Yv vy Yy    The XIV Storage System includes software licenses for all features and functions at no  additional charge  There is no need to purchase additional software licensing when you  decide to add more capacity to your system or use an advanced feature  such as mirroring or  data migration  To augment the capacity  additional hardware must be purchased  Clients  may also take advantage of the Capacity on Demand option  acquire XIV systems using  Advanced System Placement  or capitalize on IBM XIV Cloud Storage for Service Providers  solution offering     The IBM XIV Storage System Management software suite  along with the virtualized grid  architecture  greatly simplifies the layout and management of data within the storage system   which reduces the cost of managing it  Snapshots and test environments are created in  seconds  Data migra
651. view  Without  filtering the events  it might be difficult to find the entries for a specific incident or information   Figure 7 13 shows the possible filter options for the events        After    Min Severity  None    Type  All      Alerting  iter    Before  Event Code  All    Domain  All hi Uncleared                    Figure 7 13 Event filter    Chapter 7  Monitoring 333    If you double click a specific event in the list  you can get more information about that event   along with the best troubleshooting actions to take     Figure 7 14 shows details for a major event where an internal network link is down  For this  type of event  contact XIV Storage System Support immediately  Notification happens  automatically if Call Home and remote support are enabled  as described in 7 5     Call Home  and remote support    on page 371  A problem record is generated with XIV Storage System  Support  and an IBM Service Support Representative  SSR  contacts the client to report the  problem and follow up with repair actions        Event Properties    System  AIV PFE 04 1310133  Severity  Major    Date  Local Time   2 26 13  5 01 PM    Index  290 707   Event Code  COMPONENT NETWORK _LINK_IS DOWN   T  Shooting  Please contact support    Description  Network interface to  1 MaintenanceModule 16 on 1 NIC 3 5   link  disconnected     OK          Figure 7 14 Event properties    Event severity    The events are classified into a level of severity depending on their effect on the system   Fig
652. viewed to restrict access to the CA  and  most importantly  to the private key as far as possible     To certify the CA certificate for 365 days  run the OpenSSL command directly  as shown in    Example B 14     Example  B 14 Generating the CA certificate    openssl  req  new  x509  days 365  keyout  root xivstorage orgCA private cakey pem   out  root xivstorage orgCA cacert pem  Generating a 1024 bit RSA private key    wee ttttt                writing new private key to   root xivstorage orgCA private cakey pem     Enter PEM pass phrase     Verifying   Enter PEM pass phrase     You are about to be asked to enter information that will be incorporated    into your certificate request     What you are about to enter is what is called a Distinguished Name or a DN   There are quite a few fields but you can leave some blank   For some fields there will be a default value    If you enter      the field will be left blank     Appendix B  Additional LDAP information 461    462    Country Name  2 letter code   US     State or Province Name  full name   Arizona    Locality Name  eg  city   Tucson    Organization Name  eg  company   xivstorage    Organizational Unit Name  eg  section       Common Name  eg  YOUR name     xivstorage  Email Address    ca xivstorage org    During the creation of the certificate  any missing information must be provided  Also  the  information that has been defined by using the defaults in the openss1 cnf file must be  confirmed  The password for the CA priv
653. vity Center is an integrated suite for managing storage systems   Capacity  storage networks  and replication  For information about Tivoli Storage Productivity  Center  see   BM Tivoli Storage Productivity Center V5 2 Release Guide  SG24 8204     7 7 1 Setting up and discovering XIV systems in Tivoli Storage Productivity  Center    If you are still using Tivoli Storage Productivity Center v4 1 x  Tivoli Storage Productivity  Center manages and monitors the XIV Storage System through its CIM agent  embedded in  the XIV Storage System code   You need to upgrade to Tivoli Storage Productivity Center  v4 2 or later so that you can use the new data collection process and the Native API to  interface with the XIV Storage System     To add an XIV Storage System to your Tivoli Storage Productivity Center configuration   complete the following steps     1  Create an XIV Storage System user and password that will be used by Tivoli Storage  Productivity Center     2  Note the IBM XIV Storage System management IP address     3  Start the Tivoli Storage Productivity Center configure devices wizard to discover and  probe the XIV Storage System     4  Create a performance monitor     XIV Storage System user creation   Create a normal XIV Storage System user and password on the XIV Storage System by  using the XIV Storage Management GUI  as shown in Figure 7 65  This user and password is  used in Tivoli Storage Productivity Center        Name  F   tycadmin   New Password   6 12    eeeeceee 
654. w confirms your selection and allows you to begin copying the  settings to the target system  or to cancel the operation  If you choose to proceed  the dialog  window shows the progress of the operation as it completes     Mass Support Configuration  Copying Support Configuration from Starbuck      MNO0027 to 1 system    Click on    Start    in order to start operation     EEE    Figure 4 25 Copying configuration settings  Dialog window       IBM XIV Storage System Architecture and Implementation    System Selector menu    Available from the hierarchical navigation is a quick access System Selector menu for viewing  the status of all systems under management and easy navigating to a specific system  This  menu is available from the All Systems and group views  To access the System Selector  menu  press Alt S or click the triangle icon to the right of the All Systems or Group Name  links  as shown in Figure 4 26  Press Alt S repeatedly to cycle though the systems that are  shown in the menu          xw XIV Storage Management    systems   Actions   View   Tools   Help    ih           AN Systems      Lonnectivity ii    xiv XIV Storage Management          Systems   Actions   View   Tools   Help    ih   lt     A All Systems  7   gt  Tucson Lab aj   Lonnectivity kd    System Selector Alt s                         Figure 4 26 Access the System Selector menu    When activated  the System Selector menu is displayed  as illustrated in Figure 4 27        av XIV Storage Management    Sys
655. workload   Then  at 14 45  it starts to perform its share of the job of handling the I O workload  Ina  normal situation  all interface modules work together all the time     There are certain older operating systems  such as VMware ESX 3 5  that do not use more  than one path to a volume  On these operating systems  ensure that you use more than one  volume and that the paths for the volumes are balanced across all interface modules  You can  accomplish this task by changing the preferred path for these volumes so that these operating  systems cannot harm the performance of other operating systems or applications     xv XIV Storage Management m    X  File   View   Tools   Hep           itso    All Systems  View By My Groups   gt  XIV 02 1310114   Statistics System Time  09 37 am Q       Compare Interfaces    9VEVTVEVS  4       nf  a  23    E  J  L           L  12 30 12 45 1300 13 15 13 30 1345 1400 14 15 14 30 14 45 15 00 1515 15 30 15 45 16 00 1615 16 30  16 Sep 2011    rary    Interfaces E    Hi  _  64 512  KB        I0PS a  Volumes pa me a   4 cae Day      iai Write    Miss  0 8  KB  _   gt 812 KB       Latency    Top ML raos   rw   ane    Jeena Qa   ew  O Custom       329       Figure 6 33 Interface module balance    Chapter 6  Performance 325    326 IBM XIV Storage System Architecture and Implementation    Monitoring    In this chapter  we describe the various methods and functions that are available to monitor  the IBM XIV Storage System  We also show how you can gathe
656. workload  patterns     XIV supports optional  selective flash cache activation per logical volume  host  volume      Chapter 2  IBM XIV Storage System logical architecture and concepts 25        XIV supports nondisruptive online upgrade     Flash caching  For details about flash caching  see 2 8     Flash caching  architecture    on page 43  or consult the Redpaper publication  Solid State Drive  Caching Implementation in the IBM XIV Storage System  REDP 4842      gt  Quality of service  QoS      The XIV disks and cache are shared at all times among all applications that are running on  the various host servers attached to the XIV system  This approach greatly simplifies the  tasks of the storage administrator  However  when the system is running at full capacity  it  can have the adverse effect that noncritical applications are served at the same level as  the business critical applications  The QoS feature allows you to prevent such situations   With QoS  the storage administrator can specify and enforce limits on the performance of  low priority workloads by limiting input output operations per second  IOPS  and  bandwidth on a per host basis  The multitenancy feature introduced in XIV System  software Version 11 5 extends QoS functions to the enforcement of limits upon hosts or  storage pools and domains  For more information  see 2 4 3     Multitenancy    on page 30  and to 4 7     QoS feature    on page 170     2 4 Logical system concepts    In this section  we elaborat
657. xample 6 3 The statistics_get command example     gt  gt  statistics get end 2009 06 16 11 45 00 count 10 interval 1  resolution_unit minute    316 IBM XIV Storage System Architecture and Implementation    Figure 6 26 shows sample output of the statistics  The output shown is a small portion of the  data provided     Time Read Hit Medium    Ops Read Hit Medium   Latency Read Hit Medium   Throughput  2008 06 16 11  l S418 zahl 111282  2003 06 16 11  S583 2769 119298  2003 06 16 11  SBS ray 121695  2003 06 16 11  3430 312  118067  2003 06 16 11  3548 S108 117711    00 06 16 11  Sard eds 109533  eUUS U6 16 11  esl  Serl gzl  eUUS UE 16 11    abol Babe rEGF  eUUS U6 16 11  code S168 74384  eUUS U6 16 11  alas 3449 BS 100       Figure 6 26 Output from statistics_get command    Extending this example  assume that you want to filter out a specific host defined in the XIV  Storage System  By using the host filter in the command  you can specify for which host you  want to see performance metrics  which allows you to refine the data that you are analyzing     See Example 6 4 for an example of how to perform this operation  See Figure 6 27 for a  sample of the output for the command     Example 6 4 The statistics_get command using the host filter     gt  gt  statistics get host adams end 2009 06 16 11 45 00 count 10 interval 1  resolution unit minute    Time Read Hit Medium    0ps Read Hit Medium   Latency Read Hit Medium   Throughput  2003 06 16 149 2092 4489   2003 06 16 136 2689 421
658. xcli  c XIV_LAB config get    Name Value   dns_primary 192 168 1 2   dns_ secondary 192 168 1 3   system name XIV LAB 01 EBC   internal email subject format 2810 Al4  6012345   severity    description   iscsi_name iqn 2005 10 com xivstorage 000105  maximal snapshot deletion priority 4   timezone  7200   fc_proof yes   ntp_server 192 168 1 100   ups_control yes   Support _center_port type Management    The XCLI is installed as part of the FULL GUI installation  or it can be installed alone     1 7 Host support    The XIV Storage System can be attached to various host operating systems  including the  following ones     Microsoft Windows   VMware ESX   IBM AIX   HPUX   Linux  also zLinux and Linux on POWER     Oracle Solaris    YYYY YV Y    For details about each operating system and versions supported  see the IBM XIV  interoperability matrix or the IBM System Storage Interoperation Center  SSIC  at the  following website     http    www ibm com systems support storage config ssic index jsp    There are also various software agents available to help you manage environments that  connect to an XIV Storage System     Chapter 1  IBM XIV Gen3 Storage System overview 15    An IBM storage driver for OpenStack is also available  For more information about this topic   see the IBM Redpaper publication  Using the IBM XIV Storage System in OpenStack Cloud  Environments  REDP 4971   You can also consult the following resources    gt  IBM Storage Integration Server   http   ibm co lwgeri0
659. y    gt  Default gateway  optional     The default and highest possible maximum transmission unit  MTU  is 9000 MTU     Model 214  10 GbE     In Model 214  10 GbE   slot 3 of the interface module is equipped with a 10 GbE adapter  The  adapter is a Mellanox ConnectX 2 EN network interface card  as shown in Figure 3 23 on  page 90  It serves two 10 GbE ports using Optical Transceiver Modules  SFP       Chapter 3  IBM XIV architecture  components  and planning 89       SFP    Optical Transceivers          Figure 3 23 Model 214 10 GbE adapter    The 10 GbE adapter provides enhanced iSCSI host connectivity and adequate infrastructure  for potential FCoE  Fibre Channel over Ethernet  functions  if IBM decides to offer FCoE     There are up to twelve 10 GbE ports available for iSCSI over IP Ethernet services  The  number of active ports depends on the number of modules installed in the rack  See   Figure 3 2 on page 65  The active ports are connected to the client   s IP network through the  patch panel  For that reason  the patch panel in Model 214  10 GbE  differs from the patch  panel in the previous Model 114 and Model 214  1 GbE   as shown in Figure 3 26 on   page 92     You can operate iSCSI connections for various uses      gt  As an iSCSI target that attached hosts can connect to using the iSCSI protocol    gt  As an iSCSI initiator for remote mirroring when connected to another iSCSI port    gt  As an iSCSI initiator for data migration when connected to an iSCSI storage sy
660. y features  each system is assigned three IP  addresses  When running a command  the XCLI utility is provided with these three IP  addresses and tries each of them sequentially until communication with one of the IP  addresses is successful  You must pass at least one of the IP addresses  IP1  IP2  and IP3   with each command  To avoid redundantly typing and recalling IP addresses  use a  predefined configuration name  By default  XCLI uses the system configurations defined  when adding systems to the XIV Storage Management GUI  To list the current configurations   use the command shown in Example 4 1     Example 4 1 List Configurations XCLI command excerpt    c  Users itso gt xcli  L   System Managements IPs   XIV LAB 03 1300203 192 168 0 1  192 168 0 2  192 168 0 3  XIV 02 1310133 192 168 0 4  192 168 0 5  192 168 0 6    138 IBM XIV Storage System Architecture and Implementation    Commands  When running a command  you must specify either a configuration or IP  address  but not both     To issue a command against a specific XIV Storage System  you must supply the user name  and the password for that system  The default user is admin and the default password is  adminadmin  which can be used with the following parameters      u user Or  user user Sets the user name that is used to run the  command     p password or  password password The XCLI password that must be specified to run a  command in the system     m IP1   m IP2   m IP3   Defines the IP addresses of the    XIV Sto
661. y to the low TCO of the XIV     Disk scrubbing    The XIV Storage System maintains a scrubbing algorithm that runs continuously as a  background process scanning all disks for checksum errors  It assures data integrity by  alerting corrective actions before user data becomes compromised     Therefore  redundancy is not only implemented as part of the basic architecture of the  system  but it is also continually monitored and restored as required  In summary  the data  scrubbing process has the following attributes     y    Verifies the integrity and redundancy of stored data  even across mirrors  Enables early detection of disk errors and their early recovery   Runs as a background process on each module and all disks simultaneously  Zeroes out partitions that are not allocated to the user data space    v vy y    58 IBM XIV Storage System Architecture and Implementation    A complete scrubbing cycle takes about one week for a system with 1 TB disks  two weeks  for a system with 2 TB disks  and so on     Enhanced monitoring and disk diagnostic tests    The XIV Storage System continuously monitors the performance level and reliability  standards of each disk drive within the system  using an enhanced implementation of  Self Monitoring Analysis and Reporting Technology  SMART  tools  As typically implemented  in the storage industry  SMART tools indicate whether certain thresholds have been  exceeded  which gives an alert that a disk is at risk for failure and therefore needs to
662. ysically connected to one port on each XIV Storage  System Fibre Channel adapter  For example  switch A   s zone can be connected to port 1 on  the interface modules and switch B   s zone can be connected to port 3 on the   Interface Modules     298 IBM XIV Storage System Architecture and Implementation    6 2 4 Host considerations    The XIV Storage System provides maximum performance when the application hosts can  engage all the components of the XIV Storage System grid architecture with parallel I O  requests to the LUNs  Ideally  the host workload can be tailored to use multiple threads to  simultaneously use multiple paths and access data on multiple volumes     The following considerations can significantly affect XIV Storage System performance     M    Application threads   HBA and disk queue depth   Logical Volume Manager  LVM  striping  Operating system tunables    vy y    Application threads    The XIV Storage System grid architecture excels at and experiences peak performance when  applications employ multiple threads to handle the parallel execution of I Os  All modern  commercial applications employ multiple I O threads  The number of threads are often  tunable  From an XIV Storage System performance perspective  it is best to use the  maximum number of threads possible without having a negative impact performance impact  on the application within the host server     For single threaded applications  if there is no compelling reason to run them in a serial  fash
663. ystem    Name  domain_list_users  domain list objects  domain attach object  domain detach object  domain policy get  domain policy set  domain_list   domain global _list  domain create  domain_update   domain delete  domain_rename   domain _add_pool  domain_remove_pool  domain_move_pool  domain _move_gp  domain_manage  domain_add_user  domain _remove_user  perf class add domain    perf class remove domain    Description   Lists users associated with domain s   Lists objects attached to domain s   Associate Object to a Domain   Disassociate Object from a Domain   Get domain related policies    Set domain related policies    Lists all Domains or the specified one   Lists the Global Domain    Creates a Domain    Updates a Domain    Deletes a Domain    Renames a Domain    Associate Pool to a Domain   Disassociate Pool from a Domain    Move Pool from One Domain to Another   Move Pool from One Domain to Another   Move Pool from One Domain to Another   Associate User to a Domain   Disassociate User to a Domain    Adds a Domain to a Performance Class   Removes a Domain from its Performance Class     To list the existing domains in a system  run the following command     domain list    Chapter 4  IBM XIV Storage Management software 197    For a list of users associated with a domain  run the domain_list_users command   substituting the appropriate value for the domain parameter  as show in Example 4 18   Example 4 18 Listing the users associated with a domain with the XCLI    XIV_PFE
664. ystem Planning Guide  SC27 5412     Chapter 3  IBM XIV architecture  components  and planning 75    Weight and height reduction    The XIV Gens weight and height reduction feature removes the top four modules from the  rack and ships them separately  This option leaves the rack weighing approximately 1018 kg   2240 lbs   This option reduces the weight loading on floors and elevators that are used when  moving the XIV Storage System rack from the truck to the final position in the installation site   An IBM Service Support Representative installs the components that were shipped  separately during system installation     Also  if this feature is ordered  the IBM SSR can also remove the rack top cover to reduce the  rack total height to help with moving the rack through low clearance obstacles     Power consumption    Table 3 4 lists the power consumption of the XIV Gen3 module configurations  The  measurements were taken in an environment with a room temperature of 25   C  77   F      Table 3 4 XIV power consumption    Modules   disk Model 281x 114 with SSDs in Model 281x 214 with SSDs in  in rack drives kVA High performance  1 and 2 kVA High performance  2 TB  3  TB 3 TB  TB 4TB 6 TB     e fz 29 29 25 2 6 26 2 6  9 fio 4 3 4 2 3 6 3 8 3 9 3 9  4 7 4 7 4 0 4 2 4 3 4 3    e fe fee      erres  w fen f    5 8 6 1 6 2 6 2       Important  Model 214 reduces power consumption by up to 16  compared to previous  models and generations  thanks to the high efficiency power supply unit  
665. ystem has three internal UPSes  It can run on two of these UPSes so  that no system component loses power if one of the three UPSes experiences a hardware  failure  This redundant design is n 1 because the XIV has one redundant UPS      gt  The UPS complex has enough battery reserves to sustain two emergency power  shutdowns      gt  Each module has two independent power supplies  During normal operation  both power  supplies operate on half of the maximal load  If one power supply fails  the remaining  operational power supply can take over  and the module continues its operation without  any noticeable impact  After the failing power supply is replaced  the power load balancing  is restored     Automatic Transfer Switch    The Automatic Transfer Switch  ATS  shown in Figure 3 11 on page 79 supplies power to all  three UPSes and to the maintenance module  If there is a power problem on one line  the ATS  reorganizes the power and switches to the other line  The operational components take over  the load from the failing power source or power supply  This rearrangement is performed by  the ATS in a seamless manner so that the system operation continues without any application  impact     Important  When connecting the XIV Storage System to a 30 A power source  ensure that  the facility circuit breakers can handle the inrush currents and differing power loads  For  example  D Curve type breakers provide higher tolerances to allow temporary loads to flow  without tripping the f
666. ystem perf class add domain Adds a Domain to a Performance Class   system perf class remove domain Removes a Domain from its Performance Class     XIV_PFE2_1340010 gt  gt   Figure 4 74 shows the GUI overview of performance classes  where hosts in the Unlimited    Group  No_limit_pfc  can be dragged to the QoS class  In addition  both IOPS and  bandwidth limits can be adjusted by right clicking either setting and clicking Edit     Chapter 4  IBM XIV Storage Management software 173                  Incoming traffic to Pools          Tso _p2 no domain ITSO_3way_pe  Incoming traffic to Domains    fo Tso ITSO_3way_pe    ITSO_pc1_i05000_300MB IOPS Limit    4 998  833 X6 Bandwidth Limit    1 800    ITSO_pfc_100MB Bandwidth Limit    96      a       ITSO_pfc_101000 IOPS Limit     an  om              ITSO_pfc_io2000 IOPS Limit   4 998    a a    ITSO_pfc_io3000 IOPS Limit   3 000              ITSO_pfc_i04000 1OPS Limit    3 996    No_limit_pfc          Traffic from Hosts    QB ITSO_x3550 25    Figure 4 74 QoS  GUI  drag and drop of a host between performance classes          no domain  ITSO_d1 No_limit_pfc    To export all the details shown in the QoS GUI overview  click the Export icon in the toolbar at  the top of the GUI window  This function creates a   csv file that contains the information  about each defined performance classes     As you can see  the XIV GUI offers an intuitive method for managing QoS delivery in  IBM XIV systems     The XCLI also allows you to schedule QoS feat
667. ze 51 GB                Pool Hard Size 34 GB   Pool Hard Size 34 GB                         Volume   Volume II Volume Ill  17 GB 17 GB  Pool hard size  gt   17 GB x   number of volumes in the pool         Pool Soft Size 51 GB                      Pool Hard Size 34 GB         l  l  Volume II  34 GB  l  l                      Figure 4 53 Planning the number of volumes in a thin provisioned pool    Figure 4 53 shows the volumes with the minimum amount of capacity  but the principle can be  used for larger volumes as well  Plan carefully the number of volumes or the hard size of the  thinly provisioned pool because of the minimum hard capacity that is consumed by one  volume     If you create more volumes in a thinly provisioned pool than the hard capacity can cover  the  I O operations against the volumes fail at the first I O attempt     Volumes  Plan the volumes in a thin provisioned pool in accordance with this formula     Pool Hard Size  gt   17 GB x  number of volumes in the pool     The size of a volume can be specified either in gigabytes  GB   gibibytes  GiB   or in blocks   where each block is 512 bytes   If the size is specified in blocks  volumes are created in the  exact size specified  and the size is not rounded up  It means that the volume shows the exact  block size and capacity to the hosts but consumes a 17 GB size in the XIV Storage System   This capability is relevant and useful in migration scenarios     If the size is specified in GB  the actual volume size
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
  MANUALE ISTRUZIONI PXAL3 (W)  media bridge user manual  - Hellweg    NGS Flexi Style Aloha    Copyright © All rights reserved. 
   Failed to retrieve file