Sunteți pe pagina 1din 87

Dell Compellent

Module 3: Storage Center Administration

Compellent Storage Center Administration Objectives


After completing the administration section of this module, you will be able to:
Identify Compellent Core and Application software Install the Storage Center application Describe a day in the life of a Page Describe the creation and use of volumes and volume folders Describe the creation and use of servers and server folders Perform volume to server mapping Copy Mirror Migrate Volumes

Confidential

Storage Center Software

Confidential

Compellent Storage Center Software Overview

Core Software

Licensed Applications

Hardware Core Software Licensed Applications

Confidential

COMPELLENT STORAGE CENTER


Storage Center Core Phone Home Variable Page Sizes Cache Virtual Ports
license) (requires a

Space Reclamation
(Enterprise Manager)

Copy-Mirror-Migrate Virtualization Fluid Data Architecture

Thin Write/Import Boot from SAN

Storage Center Applications


Data Progression Data Instant Replay Fast Track Remote Instant Replay Dynamic Capacity Dynamic Controllers Live Volume

Confidential

Compellent Storage Center - Applications


Tier 1 Tier 2

Data Progression

Tier 3

Original

Replay

Data Instant Replay

FastTrack

Dynamic Capacity

HQ

DR

Remote Instant Replay Dynamic Controllers Enterprise Manager


6

Confidential

Installing Storage Center

Confidential

Storage Center Startup Wizard


Installation Steps to install a Dell Compellent Array
What is an HSN and where do I get one? Planning the IP network Initializing via Command Shell Completing the Storage Center Startup Wizard

Confidential

What is an HSN?
A hardware serial number assigned by Dell Compellent for every controller How does the HSN get assigned to a controller? In dual controller configurations, how many licenses are required? Peer controller vs Leader controller

Confidential

IP Considerations
Eth0 is the management IP Eth0 for every controller Dual controllers require a third management IP Eth1 is heartbeat or IPC Eth1 connects with small blue Ethernet cable Eth1 IP is by default in range of 11.0.10.x Ensure Eth1 IP are unique in dual controllers Each iSCSI port needs an IP Separate networks for management and iSCSI

10

Confidential

Hardware Initialization
Connect via serial port on controller List of HSNs provided on PO or given by co-pilot Licenses provided by HSN and distributed via co-pilot Set HSN in command shell Use label maker to label each controller on front and back for easier identification

11

Confidential

Record all IPs


Run net show command to see HSN, eth0 and eth1 Record all IPs
Array Name CML 1 HSN/SSN HSN/SSN CML 2 HSN/SSN HSN/SSN CML 3 HSN/SSN HSN/SSN CML 4 HSN/SSN HSN/SSN 10382/10383 10382 10383 10376/10377 10376 10377 10378/10379 10378 10379 10380/10381 10380 10381 172.20.20.51 172.20.20.52 172.20.20.48 172.20.20.49 172.20.20.50 11.0.10.242 11.0.10.150 255.0.0.0 192.168.16.21 192.168.16.51 255.0.0.0 192.168.16.22 192.168.16.52 172.20.20.45 172.20.20.46 172.20.20.47 11.0.10.178 11.0.10.155 255.0.0.0 192.168.16.18 192.168.16.48 255.0.0.0 192.168.16.19 192.168.16.49 192.168.16.50 11.0.10.70 172.20.20.42 172.20.20.43 172.20.20.44 255.0.0.0 192.168.16.15 192.168.16.45 255.0.0.0 192.168.16.16 192.168.16.46 192.168.16.47 Eth0 (management) Mgmt IP Eth1 (virtual group) (heartbeat) 172.20.20.41 11.0.10.14 255.0.0.0 192.168.16.12 192.168.16.42 255.0.0.0 192.168.16.13 192.168.16.43 192.168.16.44 Eth1 Subnet Mask iSCSI 1 iSCSI 2 iSCSI Control Port 192.168.16.41

12

Confidential

Step 1 End User License Agreement

13 Confidential

Step 2 - License Key


License file in format of snXXXXX where XXXXX is the HSN number of the leader controller Browse to license file and click Load License

14

Confidential

Step 3a - Create Disk Folder

15 Confidential

Step 3b Hot Spares

Step 3c - Disk Folder Attributes

Step 4a Add Controller

Step 4b New Controller IP

Step 5 Time Settings

Step 6a Management IP

Step 6b System Setup Cache

Steps 7, 8, 9 SMTP, Updates, User Setup


Configure SMTP mail server Select the method for Storage Center to handle updates If no Internet connection, select No Phone Home Set the User Session Timeout and enter email addresses Default timeout is 2 hours

Step 10a - Configure IO Cards

24

Confidential

Step 10b - iSCSI IP

25

Confidential

Step 11a - Configure Ports

26

Confidential

Step 11c iSCSI Control Port

27

Confidential

Step 11d Configure Local Ports

28

Confidential

Step 11e Configure FC Local Ports

29

Confidential

Step 11h FC Fault Domains

30

Confidential

Step 11i FC Fault Domain

31

Confidential

Step 11 iSCSI Fault Domains

32

Confidential

Step 11l Configure SAS Ports

33

Confidential

Step 11m Apply Local Port Changes

34

Confidential

Step 12 Generate SSL Certificate

35

Confidential

Accessing Storage Center


Storage Center is web based GUI Use IP entered in Step 6 as Management IP Launch a browser & enter management IP Default username is Admin Default password is mmm Both username and password are case sensitive

36

Confidential

Configuring a Windows Host


Server Host has a NIC dedicated to the Compellent iSCSI network Server Host has a second NIC for management of server Management IP on server should be static if using Enterprise Manager

37

Confidential

iSCSI and MPIO


Server hosts act as initiator so setup the Dell Compellent array as iSCSI target Windows 2003 requires iSCSI initiator to be downloaded Windows 2008 requires iSCSI to be installed as feature MPIO (multipath IO) needs to be installed

38

Confidential

MPIO Properties

39

Confidential

Dynamic Block Architecture

40

Confidential

Fluid Data Architecture


Dynamic Block Architecture
Metadata: Block Level Business Metrics
Creation, Access, and Modification time Relative Frequency of Access Disk drive type/RAID level

The only storage solution that virtualises blocks inside the volume
Application Volumes, e.g.

SharePoint Exchange

Oracle DB

File System

Page pool

Sophisticated data movement engine Improves Performance Unique Patented Design Benefits: Optimized data placement All volumes span all drives Higher performance Change RAID levels anytime No performance tuning Simplified capacity planning
R10 R5 R6 R10 R5 R6

SSD

FC15K

FC 10K

SATA/SAS

Disk Virtualization

Conventional Storage System

Compellent Storage Center

42

Confidential

Core: Dynamic Block Architecture


Key attributes recorded at write

FC10K RAID10
12:05:09 Metadata

Data virtualized and managed at block level

More efficient management of data at disk level


43

Confidential

RAID Levels

44

Confidential

Common RAID Levels

A E I M

B F J N RAID 0

C G K O

D H L P

A B C D

A B C D

RAID 1

A E I M QRST crc

B F J MNOP crc Q

C G IJKL crc N R RAID 5

D EFGH crc K O S

ABCD crc H L P T

A C E G

A C E G RAID 10

B D F H

B D F H

45

Confidential

RAID 0 Overview
H G F E D C B A

A E I M RAID 0 Volume
46

B F J N

C G K O

D H L P

Confidential

RAID 1 Overview
H G F E D C B A

A B C D RAID 1 Volume
47

A = B C D

Confidential

RAID 5 Overview
A I Q X 6 A1 A9 B7 crc B J U Y 7 A2 A0 crc C5 C K R Z 8 A3 crc B8 C6 D L S 1 9 crc B1 B9 C7 E M T 2 crc A4 B2 B0 C8 RAID 5-9 F N U crc 10 A5 B3 C1 C9 G O crc 3 11 A6 B4 C2 C0 H crc V 4 12 A7 B5 C3 D1 crc P W 5 13 A8 B6 C4 D2

A E I M QRST crc
RAID 5-5 Volume

B F J
MNOP crc

C G
IJKL crc

D
EFGH crc

N R

K O S

ABCD crc H L P T

48

Confidential

RAID 10 Overview
H G F E D C B A

Stripe

Stripe

A C E G RAID 10 Volume
49

A Mirror C E G

B D F H Mirror

B D F H

Confidential

Dual Redundancy
66% overhead RAID 10 Dual Mirror Data Data Data Data Mirror Mirror Mirror Mirror Mirror Mirror Mirror Mirror

Additional mirror of data/parity increases availability Protects against 2 drive failures in the same stripe set
34% overhead RAID 6-6
Data Data Data Data Parity Parity

20% overhead RAID 6-10

Data

Data

Data

Data

Data

Data

Data

Data

Parity

Parity

Dynamic Capacity
3 TB Dynamic Capacity Presented 1TB 1TB 1TB

Capacity presented to servers can be significantly larger than the physically available storage

300GB

300GB

300GB

300GB

300GB

1.5TB Physical Storage


51

Confidential

Dynamic Capacity Concerns

2TB

300GB

300GB

300GB

300GB

300GB

1.5TB Physical Storage

Fluid Data Architecture


Simplify management Ideal for virtual servers Independence from drive type, interface type and RAID Block-level intelligence Manages data inside the volume Tracks frequency of access Enables unique feature/benefits

Sophisticated data movement engine Set policies and let the system run Optimized data placement

No waste when storing data Buy fewer disk drives Save on energy and floor space

53

Confidential

Core: Fluid Data Architecture


Metadata for each block includes
Creation, Access, and Modification time Frequency of access Type and Tier of disk drive RAID level Corresponding volume

54

Confidential

Fluid Data Architecture


Fluid Data Architecture the Page Pool
Collection of allocated and unallocated disk blocks Maps pages to volumes Maintains metadata Default page size is 2MB (4,096 blocks)
Volume

Automated, Sophisticated Block Management


Change RAID levels by re-pointing pages System manages data mapping across multiple RAID levels Individual files can span multiple drive types and RAID levels
Page pool

Page Pool grows/shrinks as needed

55

Confidential

Tier Level Redundancy


Each tier within the page pool has its own redundancy configuration. The redundancy level of each tier can be modified to reflect the levels of RAID protection desired for the tier.
Single Redundancy configures the tier for RAID10, RAID 5/5, and RAID 5/9. Dual Redundancy configures the tier for RAID10DM, RAID 6/6, and RAID 6/10.

Levels can be modified on the fly.

56

Confidential

Fluid Data Architecture


Two types of pages, Accessible and Historical (Replay). Accessible pages are pages that can be read or written by a server at the current time. Historical pages are read-only pages (set by Data Instant Replay). Data Progression uses the accessibility to determine the class of storage a page should use.
C1

57

Confidential

Fluid Data Architecture


Pages are identified into the following categories:
Accessible Recently Accessed
These are the active pages the volume is using the most Read-write pages that have not been recently used Read-only pages the volume is using the most Think Replays Read-only pages that have not been recently used

Accessible Non-recently accessed Historical Accessible

Historical Non-recently accessed Historical Non-Accessible


Read-only data pages that are not being currently accessible by a volume That is, they have been aged due to a newer version of the page System maintains these pages for recovery purposes and are placed on the lowest cost storage possible

58

Confidential

Configure My Volume Defaults

59

Confidential

Page Lifecycle

Page Lifecycle
How it all works together:
Storage system has two tiers of disk Volumes are configured to use Recommended Storage Profile Tier 1 is single redundancy; Tier 3 is dual redundancy A single Replay occurs once per day and is retained for 3 days The volume was created today Volume size is 1TB

PAGES

61

Confidential

Page Lifecycle
READ A READ C2 Write C2 READ E1 Write E1

Time 2 C2 Time 1 DATA A B C1 D E TIER1 RAID10 E1 Changes DIR TIER1 RAID5 TIER3 RAID6

Expiration complete

62

Confidential

Page Lifecycle
Volume 1 READ A READ B READ C2 Write C3 READ E1 Write E2
Recover a Replay
This becomes a new branch. The new branch shares read-only blocks.

READ D Time 3 DATA Time 2 DATA Time 1 DATA A B C1 D E C2 E1 C3 E2 Changes DIR


Recovery of Volume 1 -> Volume 2

DIR TIER1 RAID10

TIER1 RAID5

TIER3 RAID6

63

Confidential

Page Lifecycle
Volume 1 READ A READ C2 Write C3 READ E1 Write E2 READ A Volume 2 READ C2 Write C4 READ E1 Write E3

Time 3 C3 E2 C4 E3

Recovery View Time 2 DATA Time 1 DATA


64

C2 A B C1 D

E1 E

Changes DIR

Confidential

Volume Configuration Best Practices


The Combination of Data Progression, Fast Track, and Data Instant Replay provide a powerful, automated storage system. Compellent recommends following our best practices to best advantage these features. Replay best practice
o All volumes should have at least one replay scheduled per day. o Exception is log, swap, and pagefile volumes no need to progress this data.

Volume best practices


o Configure all volumes for the Recommended Storage Profile. o This profile uses T1 R10 for writes and R5 and/or R6 across tiers for Replays. o Exception is log, swap, and pagefile volumes suggest the High Priority (Tier1) Profile.

65

Confidential

Disk Folders

66

Confidential

Disks and Disk Folders


Disk Folder 1
Disk Disk Disk Disk Disk Disk Disk Disk Disk Disk Disk Disk

Volume

Volume

Classified Assigned
Disk Folder 2
Disk Disk Disk Disk Disk Disk Disk Disk Disk Disk Disk Disk

Volume

Volume

Non-Classified Temp
67

Confidential

Volumes and Volume Folders

68

Confidential

Volumes and Volume Folders


Admin
Database Volumes
Volume Volume Volume

Volume Manager
Email Volumes
Volume

Volume

Volume

69

Confidential

Creating Volumes

1 2

70

Confidential

Creating a Volume: Confirmation

71

Confidential

Servers and Server Folders

72

Confidential

Servers and Server Folders


Windows Server Folder Netware Server Folder

Windows

Email

Netware Database

73

Confidential

Mounting an iSCSI Volume to a Server

74

Confidential

Creating Server(s)

75

Confidential

Mounting a Fibre Channel Volume to a W2008 Server

Right click on unallocated partition to get New Simple Volume Wizard. Disk Management Windows Server 2008
76

Confidential

Mounting a Fibre Channel Volume to a W2003 Server

Disk Management Windows Server 2003


77

Confidential

Virtual Servers One to Many

78

Confidential

Server Clusters Many to One

79

Confidential

Lab 3.1: Creating Volumes, Servers, and Mappings

80

Confidential

Copy Mirror Migrate

81

Confidential

Copy

Mirror Migrate

82

Confidential

Copy a Volume

Once the volume copy is complete, the new volume is no longer updated by changes made to the original volume.
83

Confidential

Mirror a Volume

The destination volume cannot be mapped to a server.

84

Confidential

Migrate a Volume

85

Confidential

Lab 3.2: Copy a Volume Mirror a Volume Migrate a Volume

86

Confidential

Dell Compellent
Thank you

S-ar putea să vă placă și