Documente Academic
Documente Profesional
Documente Cultură
THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED AS IS, WITHOUT EXPRESS OR IMPLIED WARRANTIES OF ANY KIND. 2012 Dell Inc. All rights reserved. Reproduction of this material in any manner whatsoever without the express written permission of Dell Inc. is strictly forbidden. For more information, contact Dell. Dell, the DELL logo, and the DELL badge are trademarks of Dell Inc. Microsoft, Windows, Windows Vista, Windows Server, and Active Directory are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell disclaims any proprietary interest in the marks and names of others.
July 2012
Table of Contents
1 2 Preface ................................................................................................................................................................. 1 Introduction ....................................................................................................................................................... 2 2.1 2.2 3 FluidFS Overview ....................................................................................................................................... 2 Migration Overview ................................................................................................................................... 2
Planning and Preparing for NAS Migration ................................................................................................... 3 3.1 NAS Migration Methodology ................................................................................................................... 3 Discovery Phase ................................................................................................................................. 3 Mapping and Design Phase ............................................................................................................. 4 Performance Analysis Phase ........................................................................................................... 4 Provisioning Phase ............................................................................................................................ 4 Data Validation and Cutover Phase................................................................................................ 5 Post-Migration Phase ....................................................................................................................... 5
NAS Migration Topologies ....................................................................................................................... 5 Single File Server to a Single FluidFS NAS System ....................................................................... 5 Many File Servers to a Single FluidFS NAS System....................................................................... 6
3.2.1 3.2.2 4
FluidFS Considerations for NAS Migration .................................................................................................... 8 4.1 4.2 Optimizing Resource Utilization ............................................................................................................. 8 Additional FluidFS Migration Guidelines ................................................................................................ 9 Linux/NFS Environments .................................................................................................................. 9 Windows/CIFS Environments ........................................................................................................ 10
4.2.1 4.2.2 5
Performing Data Migration to FluidFS .......................................................................................................... 11 5.1 5.2 Prerequisites .............................................................................................................................................. 11 CIFS Migration Procedures ..................................................................................................................... 11 SecureCopy ....................................................................................................................................... 11 Robocopy ......................................................................................................................................... 24
5.3.1
July 2012
ii
Validation and Cutover ................................................................................................................................... 27 6.1 6.2 6.3 6.4 Pre-Cutover Verification ........................................................................................................................ 27 Cutover...................................................................................................................................................... 27 Post-Cutover Verification ...................................................................................................................... 27 Post-Cutover Maintenance ................................................................................................................... 28
Conclusion ....................................................................................................................................................... 29
July 2012
iii
Acknowledgements
This white paper was produced by the Dell Enterprise Storage Solutions Engineering team. Authors: Nicholas Busick and Animesh Pillai We would like to thank the following Dell team members for their significant support during development and review: Noman Chaudhry, Dave Brown, Ron Stefani, and Sharon Hanson
Feedback
Please give us feedback on the quality and usefulness of this document by sending an email to StorageSolutionsFeedback@Dell.com.
July 2012
iv
1 Preface
Dell network-attached storage (NAS) storage systems based on the Fluid File System (FluidFS) deliver scalable and highly available enterprise-class file services to clients running Microsoft Windows , Linux, and UNIX operating systems under the Common Internet File System (CIFS) and Network File System (NFS) protocols. Dells FluidFS NAS systems integrate seamlessly into existing customer environments, and consolidate file and block data to a unified storage system. The Dell FluidFS supports online capacity scaling, snapshots, asynchronous replication, quotas, and the Network Data Management Protocol (NDMP). This white paper presents guidance for migrating to the Dell FluidFS NAS system in an environment with clients running Microsoft Windows and Linux under the CIFS and NFS protocols. The following topics are presented: Overview of Dell FluidFS NAS systems. Preparation and planning guidelines for migration to a Dell FluidFS NAS system. Insight into common migration topologies. Special considerations for migrating to a Dell FluidFS NAS system. Guidance for migrating NAS data to a FluidFS NAS system using commonly available tools. Guidance for validating data and functionality on a new FluidFS NAS system. Description of fail-over capability from the old NAS storage system to the FluidFS NAS system.
The target audience for this paper is solution architects, application and storage engineers, system administrators, and IT managers. The reader is assumed to be generally knowledgeable about Microsoft Windows and Linux operating systems, CIFS and NFS protocols, network technologies, file system permissions, and user authentication technologies.
July 2012
2 Introduction
2.1 FluidFS Overview
FluidFS is an enterprise-class distributed file system that gives customers tools for easily and efficiently managing file data. FluidFS removes the scaling limitations of traditional file systems. It also supports scale-out performance and scale-up capacity expansion, all within a single namespace for easier administration. Because FluidFS optimizes performance and scalability, it is an excellent choice for a wide range of use cases and deployment environments.
July 2012
Figure 2 captures the general flow of these phases, which are detailed in the following sections.
Discovery
Performance Analysis
PostMigration
If Validation Fails
July 2012
In these scenarios, data can be copied as is, or the structure can be reorganized during the migration. If copied as is, the mapping and design phase is minimal, but data may not be organized in the most desirable layout. Migrations are typically a good time to look at the layout of the data structure and ensure that it is in line with the functional organization of the company it serves. When consolidating many file servers to a single Dell FluidFS NAS system, carefully consider how these separate shares and file systems will be merged into a structured and consolidated environment.
A rough estimate of the amount of time for the baseline copy of the migration can be derived from full backups of the file server(s). However, many factors will affect the actual transfer time and throughput, including user workload and simultaneous threads in the migration tool. Additional factors that can limit transfer throughput include: CPU Memory Disk subsystem Number of network interfaces Speed of network interfaces (10 Mbit, 100 Mbit, 1 Gbit, 10 Gbit) Network load-balancing mechanisms Overall network infrastructure NOTE: The overall throughput is determined by the slowest component in the data path from source to destination NAS system.
July 2012
Additional information on provisioning the Dell FluidFS NAS system can be found in the Administrators Guide associated with the FluidFS platform.Active Data Migration Phase This phase begins when the environment has been set up according to the recommendations in this paper, and all previous phases are complete. In this phase, data is transferred from the source systems to the destination system. A variety of tools can be used, including Quest SecureCopy or Microsoft Robocopy for Windows CIFS environments, and GNU rsync for Linux or Unix NFS environments. (See section 5.2, CIFS Migration Procedures, for more information about these tools.)
July 2012
Within this topology, two migration approaches can be used: all-at-once or staggered. 3.2.1.1 All-at-once or Bucket-Dump Migration This method migrates data in its entirety without any structural changes. The data is kept completely intact and the folder hierarchy for the target is an exact replica of the source. All data is migrated in a single migration window with a single cutover, and the source system is typically decommissioned after completion. 3.2.1.2 Staggered or Staged Migration This method migrates data chunk by chunk in a staged or staggered manner. Typically, the data is restructured as captured in the Mapping and Design phase, and there may be multiple mini migrations and cutovers for each data set. This approach is typically used when careful structural design must be adhered to, or when business use cases prevent simultaneous cutover for the entire storage system. Additional considerations to ensure optimal performance and balanced resource utilization during and after the data migration are outlined in section 4, FluidFS Considerations for NAS Migration.
July 2012
Additional considerations to ensure optimal performance and balanced resource utilization during and after the data migration are outlined in section 4, FluidFS Considerations for NAS Migration.
July 2012
NIC-2/IP-2 NIC-3/IP-3
Staging Server
NIC-4/IP-4
Source Side Staging Server Static Route (Windows 2008 example): 1. route -p add NAS-IP mask 255.255.255.255 IP-1 metric 1 2. route -p add AliasIP-1 mask 255.255.255.255 IP-2 metric 1 3. route -p add AliasIP-2 mask 255.255.255.255 IP-3 metric 1 4. route -p add AliasIP-4 mask 255.255.255.255 IP-4 metric 1 Staging Server Static Route (Linux Centos 6.2 example): 1. ip route add NAS-IP dev NIC-1 2. ip route add AliasIP-1 dev NIC-2 3. ip route add AliasIP-2 dev NIC-3 4. ip route add AliasIP-3 dev NIC-4
Target Side Staging Server Static Route (Windows 2008 example): 1. route -p add VIP-1 mask 255.255.255.255 IP-1 metric 1 2. route -p add VIP-2 mask 255.255.255.255 IP-2 metric 1 3. route -p add VIP-3 mask 255.255.255.255 IP-3 metric 1 4. route -p add VIP-4 mask 255.255.255.255 IP-4 metric 1 Staging Server Static Route (Linux Centos 6.2 example): 1. ip route add VIP-1 dev NIC-1 2. ip route add VIP-2 dev NIC-2 3. ip route add VIP-3 dev NIC-3 4. ip route add VIP-4 dev NIC-4
As mentioned earlier, the migration server and associated static routes migration design can be avoided if multiple clients of adequate size are used for the migration process.
July 2012
Ideally, the number of NICs and IP addresses on the migration server or the number of clients to be used for the migration should be equal to the maximum number of VIPs supported by the FluidFS platform being introduced into the environment. In effect, this means that the data set must be logically partitioned into the same number of equally-sized chunks and migrated across their own respective data paths. As shown in Figure 6, this allows simultaneous data copies that use separate dedicated storage and network resources within and across the network and FluidFS.
July 2012
5) Map the source and destination NFS exports to the migration server or clients using distinct mount points. An example is shown below; the parameters in bold type will vary by environment:
# mount -o rw,bg,hard,intr,tcp,vers=3,timeo=2,retrains=10,rsize=32768,wsize=32768 \ FluidFS-VIP:/<NFS Export> /<Mount Point>
6) Apply appropriate permissions to the root level of each destination NFS export, based on the source from which it will be migrated. This is especially important, because it is difficult to set permissions after the entire data set has been migrated. 7) Decide whether permissions will be migrated with the data. Each tool identified in this document is capable of migrating only the data or migrating the data along with associated user identification (UID) and group identification (GID) permissions.
4) 5)
6)
7)
July 2012
10
5.2.1 SecureCopy
Quest SecureCopy is a comprehensive migration solution that automates the copying of data between file servers without the use of agents or scripts. It can easily copy files, folders, and NT File System (NTFS) permissions. With its multi-threaded, high-speed architecture, SecureCopy simplifies and dramatically reduces the time required for migration projects. This section demonstrates the use of SecureCopy for file data migration from an existing file server to the FluidFS NAS system.
July 2012
11
Initial GUI When first launched, the GUI shown in Figure 7 provides the starting point for configuring the jobs to be used during the migration process. The horizontal icon bar at the top contains shortcuts to commonly used tasks. The left section has tabs for Jobs, Job Status, and Logs and Reports. Most configuration will occur within the Jobs tab. The right section gives detailed configuration options based on the task selected on the left pane. This interface also provides context-sensitive help for quick reference.
July 2012
12
Create a New Job To create a new file data migration job, click New on the horizontal icon bar at the top. In the Create New Job window, Dell recommends including the FluidFS virtual IP in the job name for tracking purposes.
Figure 8 SecureCopy New Job Creation with VIP Number for Reference
July 2012
13
After entering the Job Name, click OK. The new job is created as shown in Figure 9.
July 2012
14
New Job Configuration: Configuring File Copy Locations Under the newly created job, select Copy Locations. The right section will list the available input options, such as setting the source and target folders. These should be configured based on the results of the Mapping and Design phase discussed earlier in this paper. This section also provides the option to create a VSS snapshot on the source (if supported) to ensure that open files are copied. If required, check the box next to Create initial source folder under target folder shown in Figure 10.
July 2012
15
New Job Configuration: Synchronization Under the newly created job, select Synchronization to access options for configuring which files to copy or purge, how dates are handled, and whether or not to copy permissions.
July 2012
16
New Job Configuration: Optional Filter Settings As shown in Figure 11, select Filters under the new jobs to access file and folder filter settings based on name, date, size, and folder depth or recursion level.
July 2012
17
New Job Configuration: Performance and Throttling Settings As shown in Figure 13, select Performance under the new job to specify file verification, and set parameters for multi-threading, bandwidth throttling, and how to handle locked files. These options should already be defined as part of the migration plan. NOTE: FluidFS can drive SecureCopy jobs at the maximum configurable performance settings.
July 2012
18
New Job Configuration: Email Settings As shown in Figure 14, select Email under the new job to configure settings for email notifications.
July 2012
19
New Job Configuration: Scheduling Select the new job in the left pane and click Schedule on the horizontal icon bar at the top of the GUI to launch the scheduler shown in Figure 15.
Click the Schedule tab for options shown in Figure 16 to specify time, date, duration, repetition, and other schedule-related parameters for the job.
July 2012
20
After completing the schedule configuration, click OK to save the scheduled task. View scheduled tasks by accessing the Windows Task Scheduler Library in Microsoft Server Manager. An example screenshot from Microsoft Windows Server 2008 R2 is shown in Figure 17.
Job Status To view the status of the job, click Job Status in the left pane. Double click on the currently running job to get additional information as shown in Figure 18.
July 2012
21
Job Logs and Reports Dashboard To see the detailed dashboard view shown in Figure 19, click Logs and Reports in the left pane and highlight a particular job. This provides a high-level view of each completed job, with information such as processing time, errors, job speed, file types, total data processed, and average file size.
s
Figure 19 SecureCopy Job Logs and Reports - Dashboard
July 2012
22
SecureCopy Command Line Interface (CLI) SecureCopy can also be run through a CLI. Different SecureCopy jobs can be included in a batch file and executed simultaneously. A sample batch file that would run four predefined jobs simultaneously is shown below:
SecureCopy.bat
start "Window1" "C:\Program Files\ScriptLogic Corporation\Secure Copy 6\SecureCopyCmd.exe" /Job="FluidFS_VIP_1" /Q & start "Window2" "C:\Program Files\ScriptLogic Corporation\Secure Copy 6\SecureCopyCmd.exe" /Job="FluidFS_VIP_2" /Q & start "Window3" "C:\Program Files\ScriptLogic Corporation\Secure Copy 6\SecureCopyCmd.exe" /Job="FluidFS_VIP_3" /Q & start "Window4" "C:\Program Files\ScriptLogic Corporation\Secure Copy 6\SecureCopyCmd.exe" /Job="FluidFS_VIP_4" /Q &
July 2012
23
5.2.2 Robocopy
Robocopy, which is a shortened name for Robust File Copy, was introduced with the Windows Server 2003 Resource Kit and is included in all editions of Windows 7. Its many strengths include the ability to copy all NTFS file attributes and to mirror the contents of an entire folder hierarchy across local volumes or over a network. NOTE: Robocopy has a large number of command line switches that can drastically change its behavior. In this example, the most common and recommended switches are used to migrate NAS file data and permissions. Preserving Source Volume Root Permissions This is the initial step in any copy process. In the example shown below, the root permissions are copied using Robocopy from the source volume (D) to the destination volume (N): C:\>robocopy D: N: /COPY:DATSOU /MIR /XD * /XF *
Once the root volume permissions are copied, verify that the administrator account used for the migration still has Full control access to both the source and destination volumes.
July 2012
24
Copying Data and Permissions from Source to Destination Volume In this step, data and permissions are copied from the source volume to the destination using Robocopy. The Robocopy syntax and switches used in this example are detailed following the example. To begin the copy of data and permissions, run the command below, substituting the appropriate parameters for the source, destination, and log file locations. The number of threads may also be changed, depending on the environment, or eliminated completely. The syntax is as follows: robocopy <Source> <Destination> /ZB /MIR /COPYALL /R:1 /W:1 /MT:32 /XD <Directory> <Directory>.. <Directory> /LOG+:<LogFilePath> The following is example of a Robocopy syntax used for migration: robocopy D:\ N:\ /Z /MIR /COPYALL /R:1 /W:1 MT:32 /XD .clusterConfig $RECYCLE.BIN System Volume Information /LOG+:C:\RobocopyDtoN.txt The switches for the above command are shown in Table 1.
Table 1 Robocopy Switches Used in Example
Options
/Z /MIR /COPYALL /R /W /MT[:N] /XD /LOG+
Description
Uses Restart mode Mirrors a directory tree. Copies all file information. Specifies the number of retries on failed copies. The default value of N is 1,000,000 (or, one million retries). Specifies the wait time between retries, in seconds. The default value of N is 30 (wait time 30 seconds). Creates multi-threaded copies with N threads. N must be an integer between 1 and 128. The default value for N is 8. Excludes directories that match the specified names and paths. Writes the status output to the log file (appends the output to the existing log file).
To find more command line switches and information, run the robocopy /? command, or see the Microsoft TechNet website. NOTE: In addition to the baseline copy, Dell recommends performing multiple delta copies of the data to reduce the cutover time. To achieve this, run the above command manually at regular intervals or as a scheduled task in Windows.
July 2012
25
5.3.1 rsync
The rsync utility is a software application and network protocol for Unix-like and Linux systems. This utility synchronizes files and directories from one location to another, using delta encoding when appropriate to minimize data transfers. A key feature of rsync that is not included in most similar utilities is that mirroring occurs with just one transmission in each direction. The rsync utility can copy or display directory contents and copy files, with optional compression and recursion. Copying Data and Permissions from Source to Destination Volume In this step, data and permissions are copied from the source volume to the destination using rsync. The syntax and switches used in this example are detailed after the example below. To copy data and permissions, run the following command, substituting the appropriate parameters for the source, destination, and log file locations: rsync -av /<Source Directory> /<Destination Directory> NOTE: Trailing slashes on the source and destination directories can drastically change the folder organization. You must read and fully understand the impact of using trailing slashes before starting the migration of important data. The command line switches for the above command are shown in Table 2.
Table 2 rsync Switches Used in Example
Options
-a -v -r -p -t -g -o -D
Description
archive mode; equals rlptgoD increase verbosity recurse into directories preserve permissions preserve modification times preserve group preserve owner (super-user only) same as --devices specials
To find more command line switches and information, run the man rsync command, or visit rsync.samba.org NOTE: In addition to the baseline copy, Dell recommends performing multiple delta copies of the data to reduce the cutover time. To achieve this, run the above command manually at regular intervals, or schedule it as a cron job.
July 2012
26
6.2 Cutover
The cutover procedure will vary, depending on several factors. If downtime is acceptable in the customer environment, the data is already accessible and the only copy required is the baseline copy. In all other cases, downtime must be scheduled for this step of the migration process. A rough indicator of the length of the downtime window is the time required to complete the previous delta copy. Once the downtime window is scheduled, the following tasks must be completed: 1) Restrict end-user access to the source file server. 2) Perform a final delta copy of the dataset using the previously used migration tool. 3) Create any remaining or additional CIFS shares or NFS exports on the FluidFS NAS system using the NAS manager or NAS CLI. 4) Create any quotas on the FluidFS NAS system that correspond to the source file server. 5) Enable access to the FluidFS NAS system by reconfiguring it to look like the original file server(s) through VIP modification, DNS aliases, and/or hostname modifications. 6) If the original file server(s) must coexist, redirect user mappings or inform users of the updated network share structure. 7) Configure and enable FluidFS NAS volume snapshots to provide data protection and rapid recovery
July 2012
27
July 2012
28
7 Conclusion
Many decisions, complexities, and methodologies come into play when performing a NAS file server migration. This document has outlined some of the most common scenarios, provided general guidance, technical how-to, and discussed FluidFS specific considerations when planning, executing, and validating a migration.
July 2012
29
Additional Resources
For more information about data migration solutions for your organization, contact your Dell account representative or visit www.dell.com/services. http://support.dell.com is focused on meeting your needs with proven services and support. http://DellTechCenter.com is an IT Community where you can connect with Dell customers and employees to share knowledge, best practices, and information about Dell products and your installations. Referenced or recommended Dell publications:
Robocopy for older versions of Microsoft Windows: Windows Download Center, Windows Server 2003 Resource Kit Tools:
http://www.microsoft.com/en-us/download/details.aspx?id=17657
July 2012
30