Implementing IBM Storewise v7000 unified
-
Upload
annette-sahores -
Category
Documents
-
view
224 -
download
0
Transcript of Implementing IBM Storewise v7000 unified
-
8/11/2019 Implementing IBM Storewise v7000 unified
1/371ibm.com/redbooks
Front cover
Implementing the IBM
Storwize V7000 Unified
Jure Arzense
Nancy Kinne
Daniel Owe
Jorge Quint
Jon Tat
Consolidates storage and file servingworkloads into an integrated system
Simplifies management and
reduces cost
Integrated support for IBM
Real-time Compression
http://www.redbooks.ibm.com/http://www.redbooks.ibm.com/http://www.redbooks.ibm.com/http://www.redbooks.ibm.com/ -
8/11/2019 Implementing IBM Storewise v7000 unified
2/371
-
8/11/2019 Implementing IBM Storewise v7000 unified
3/371
International Technical Support Organization
Implementing the IBM Storwize V7000 Unified
December 2013
SG24-8010-01
-
8/11/2019 Implementing IBM Storewise v7000 unified
4/371
Copyright International Business Machines Corporation 2013. All rights reserved.
Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule
Contract with IBM Corp.
Second Edition (December 2013)
This edition applies to Version 7.1.0.5 of the IBM Storwize V7000 code and Version v1.4.2.0-27-2273 of theIBM Storwize V7000 File Module code.
Note: Before using this information and the product it supports, read the information in Notices onpage xi.
-
8/11/2019 Implementing IBM Storewise v7000 unified
5/371
Copyright IBM Corp. 2013. All rights reserved.iii
Contents
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Authors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Now you can become a published author, too! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xv
Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xv
Stay connected to IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
Chapter 1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.1 A short history lesson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 About the rest of this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3 Latest release highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3.1 USB Access Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3.2 Call-home installation enhancement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41.3.3 SSH tunnel from the IFS Management Node to the Storwize V7000 Node . . . . . . 4
Chapter 2. Terminology and file serving concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.1 Terminology for storage and file services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.1.1 Terminology for random access mass storage. . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.1.2 Terminology for file systems and file sharing, file access, and file transfer . . . . . . 7
2.2 File serving with file sharing and file transfer protocols. . . . . . . . . . . . . . . . . . . . . . . . . 11
2.2.1 The Network File System protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.2.2 The Server Message Block protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.2.3 The File Transfer Protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.2.4 The Hypertext Transfer Protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.2.5 The Secure Copy Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182.2.6 The Secure Shell File Transfer Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Chapter 3. Architecture and functions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213.1 High-level overview of Storwize V7000 Unified. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
3.1.1 Storwize V7000 Unified storage subsystem: the Storwize V7000 . . . . . . . . . . . . 22
3.1.2 Storwize V7000 Unified file server subsystem: The file modules . . . . . . . . . . . . . 22
3.2 Storwize V7000 Unified system configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3.2.1 Storwize V7000 Unified storage subsystem configuration . . . . . . . . . . . . . . . . . . 23
3.2.2 Storwize V7000 Unified file server subsystem configuration . . . . . . . . . . . . . . . . 24
3.3 Storwize V7000 Unified storage functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.4 Storwize V7000 Unified file serving related functionality. . . . . . . . . . . . . . . . . . . . . . . . 26
3.4.1 Storwize V7000 Unified file sharing and file transfer protocols . . . . . . . . . . . . . . . 27
3.4.2 Storwize V7000 Unified NFS protocol support . . . . . . . . . . . . . . . . . . . . . . . . . . . 283.4.3 Storwize V7000 Unified SMB and CIFS protocol support. . . . . . . . . . . . . . . . . . . 29
3.4.4 Storwize V7000 Unified cluster manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
3.4.5 Storwize V7000 Unified product limits. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Chapter 4. Access control for file serving clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
4.1 Authentication and authorization in general . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
4.1.1 UNIX authentication and authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
4.1.2 Windows authentication and authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
4.1.3 UNIX and Windows authentication and authorization in Storwize V7000 Unified. 39
-
8/11/2019 Implementing IBM Storewise v7000 unified
6/371
iv Implementing the IBM Storwize V7000 Unified
4.2 Methods used for access control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
4.2.1 Kerberos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
4.2.2 User names and user IDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
4.2.3 Group names and group identifiers in UNIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
4.2.4 Resource names and security identifiers in Windows. . . . . . . . . . . . . . . . . . . . . . 40
4.2.5 UID/GID/SID mapping in the Storwize V7000 Unified. . . . . . . . . . . . . . . . . . . . . . 40
4.2.6 Directory services in general. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414.2.7 Windows NT 4.0 Domain Controller and SAMBA Primary Domain Controller . . . 41
4.2.8 Lightweight Directory Access Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
4.2.9 Microsoft Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
4.2.10 Services for UNIX and Identity Management for UNIX . . . . . . . . . . . . . . . . . . . . 41
4.2.11 Network Information Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
4.2.12 Access control list in general. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
4.2.13 GPFS NFSv4 ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
4.2.14 POSIX bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
4.2.15 ACL mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
4.3 Access control with Storwize V7000 Unified . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
4.3.1 Authentication methods supported . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
4.3.2 Active Directory authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444.3.3 AD with SFU authentication or with Identity Management for UNIX . . . . . . . . . . . 44
4.3.4 SAMBA primary domain controller authentication. . . . . . . . . . . . . . . . . . . . . . . . . 44
4.3.5 LDAP authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
4.3.6 Network Information Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
4.4 Access control limitations and considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
4.4.1 Authentication limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
4.4.2 Authorization limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Chapter 5. Storage virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495.1 User requirements that drive storage virtualization. . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
5.2 Storage virtualization terminology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
5.2.1 Realizing the benefits of Storwize V7000 Unified storage virtualization . . . . . . . . 53
5.2.2 Using internal physical disk drives in the Storwize V7000 Unified . . . . . . . . . . . . 535.2.3 Using external physical disk drives in the Storwize V7000 Unified . . . . . . . . . . . . 55
5.3 Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Chapter 6. NAS use cases and differences: SONAS and Storwize V7000 Unified. . . 576.1 Use cases for Storwize V7000 Unified . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
6.1.1 Unified storage with both file and block access . . . . . . . . . . . . . . . . . . . . . . . . . . 58
6.1.2 Multi-user file sharing with centralized snapshots and backup. . . . . . . . . . . . . . . 59
6.1.3 Availability and data protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
6.1.4 Information life-cycle management (ILM), hierarchical storage management (HSM),
and archiving solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
6.2 Storwize V7000 Unified and SONAS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
6.2.1 SONAS brief overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616.2.2 Implementation differences between Storwize V7000 Unified and SONAS . . . . . 63
Chapter 7. IBM General Parallel File System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 657.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
7.2 GPFS technical concepts and architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
7.2.1 Split brain situations and GPFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
7.2.2 GPFS file system pools and Storwize V7000 storage pools. . . . . . . . . . . . . . . . . 68
7.2.3 File system pools in GPFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
7.2.4 GPFS file sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
7.2.5 GPFS parallel access and byte-range locking . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
-
8/11/2019 Implementing IBM Storewise v7000 unified
7/371
Contentsv
7.2.6 GPFS synchronous internal replication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
7.2.7 Active Cloud Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
7.2.8 GPFS and hierarchical storage management (HSM) . . . . . . . . . . . . . . . . . . . . . . 73
7.2.9 GPFS snapshots. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
7.2.10 GPFS quota management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Chapter 8. Copy services overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758.1 Storage copy services of the Storwize V7000 Unified . . . . . . . . . . . . . . . . . . . . . . . . . 76
8.1.1 FlashCopy for creating point-in-time copies of volumes . . . . . . . . . . . . . . . . . . . . 76
8.1.2 Metro Mirror and Global Mirror for remote copy of volumes . . . . . . . . . . . . . . . . . 78
8.2 File system level copy services of the Storwize V7000 Unified file modules . . . . . . . . 79
8.2.1 Snapshots of file systems and file sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
8.2.2 Asynchronous replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Chapter 9. GUI and CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
9.1 Graphical user interface setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
9.1.1 Web server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
9.1.2 Management GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
9.1.3 Web browser and settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
9.1.4 Starting the browser connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 869.2 Command-line interface setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
9.3 Using the GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
9.3.1 Menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
9.4 Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
9.4.1 File commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
9.4.2 Block Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Chapter 10. Planning for implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
10.1 IBM SONAS/V7000 Unified Questionnaire . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
10.1.1 Opportunity details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
10.1.2 Capacity requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
10.1.3 Performance requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10110.1.4 Client communication protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
10.1.5 Data protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
10.1.6 Data center requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
10.1.7 Storwize V7000 Unified specific questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
10.1.8 Service requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
10.2 Planning steps sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
10.2.1 Perform the physical hardware planning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
10.2.2 Define the environment and services needed. . . . . . . . . . . . . . . . . . . . . . . . . . 117
10.2.3 Plan for system implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
10.2.4 Plan for data migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
10.3 Support, limitations, and tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
10.4 Storwize V7000 Unified advanced features and functions . . . . . . . . . . . . . . . . . . . . 119
10.4.1 Licensing for advanced functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
10.4.2 External virtualization of SAN-attached back-end storage . . . . . . . . . . . . . . . . 119
10.4.3 Remote Copy Services (for block I/O access only). . . . . . . . . . . . . . . . . . . . . . 120
10.4.4 FlashCopy (block volumes only). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
10.4.5 General GPFS recommendation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
10.4.6 GPFS internal synchronous replication (NSD failure groups). . . . . . . . . . . . . . 121
10.4.7 Manage write-caching options in Storwize V7000 Unified and on client side. . 121
10.4.8 Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
10.5 Miscellaneous configuration planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
10.5.1 Set up local users to manage the Storwize V7000 Unified system. . . . . . . . . . 122
-
8/11/2019 Implementing IBM Storewise v7000 unified
8/371
vi Implementing the IBM Storwize V7000 Unified
10.5.2 Define call home and event notifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
10.5.3 Storage pool layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
10.6 Physical hardware planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
10.6.1 Plan for space and layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
10.6.2 Planning for Storwize V7000 Unified environment . . . . . . . . . . . . . . . . . . . . . . 125
10.7 System implementation planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
10.7.1 Configuration details and settings that are required for setup. . . . . . . . . . . . . . 12710.7.2 Configuration options for file access only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
10.7.3 Configuration options for Block I/O access only . . . . . . . . . . . . . . . . . . . . . . . . 137
Chapter 11. Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13911.1 Process overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
11.2 Task checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
11.3 Hardware unpack, rack, and cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
11.3.1 Preparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
11.3.2 Review packing slips and check components. . . . . . . . . . . . . . . . . . . . . . . . . . 142
11.3.3 Confirm environmentals and planning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
11.3.4 Rack controller enclosures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
11.3.5 Rack expansion enclosures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
11.3.6 Rack file modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
11.3.7 Cabling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
11.4 Power on and check out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
11.4.1 Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
11.4.2 Power on expansions and controllers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
11.4.3 Power on file modules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
11.5 Install the latest software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
11.5.1 Determine current firmware and code levels. . . . . . . . . . . . . . . . . . . . . . . . . . . 152
11.5.2 Preparation for reload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
11.5.3 Reinstall the software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
11.6 Initialize the system. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
11.6.1 Configure USB key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
11.6.2 Initialize the Storwize V7000 controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15711.6.3 Initialize the file modules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
11.7 Base configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
11.7.1 Connect to the graphical user interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
11.7.2 Easy Setup wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
11.7.3 Set up periodic configuration backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
11.8 Manual setup and configuration changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
11.8.1 System names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
11.8.2 System licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
11.8.3 Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
11.9 Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
11.9.1 Public Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
11.9.2 Service ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18311.9.3 Internet Small Computer System Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
11.9.4 Fibre Channel ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
11.9.5 Fibre Channel ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
11.10 Alerting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
11.10.1 Email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
11.10.2 SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
11.10.3 Syslog Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
11.11 Directory Services and Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
11.11.1 Domain Name System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
-
8/11/2019 Implementing IBM Storewise v7000 unified
9/371
Contentsvii
11.11.2 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
11.12 Health check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
11.13 User security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
11.13.1 Change passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
11.13.2 Create cluster users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
11.13.3 Create local users by using local authentication for NAS access. . . . . . . . . . 197
11.14 Storage controller configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19911.14.1 External SAN requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
11.14.2 Configure storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
11.15 Block configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
11.15.1 Copy Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
11.16 File Services configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
11.16.1 File service components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
11.16.2 File systems examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Chapter 12. Antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
12.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
12.2 Scanning individual files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
12.3 Scheduled scan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
12.4 Set up and configure antivirus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
12.4.1 Antivirus setup steps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Chapter 13. Performance and monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
13.1 Tuning Storwize V7000 Unified for performance . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
13.1.1 Disk and file-system configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
13.1.2 Network Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
13.1.3 Client Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
13.2 Monitoring the performance of Storwize V7000 Unified . . . . . . . . . . . . . . . . . . . . . . 229
13.2.1 Graphical Performance Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
13.2.2 Command Line Interface (CLI) Performance Monitoring . . . . . . . . . . . . . . . . . 231
13.2.3 Tivoli Storage Productivity Center. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
13.3 Identifying and resolving performance problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23213.3.1 Health Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
13.3.2 Network Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
13.3.3 High Latencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Chapter 14. Backup and recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23514.1 Cluster backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
14.1.1 Philosophy for file and block . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
14.1.2 Storage enclosure backup (Storwize V7000) . . . . . . . . . . . . . . . . . . . . . . . . . . 236
14.1.3 File module backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
14.2 Cluster recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
14.2.1 Storage enclosure recovery (V7000) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
14.3 Data backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
14.3.1 Data backup philosophy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
14.3.2 Tivoli Storage Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
14.3.3 Network Data Management Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
14.4 Data recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
14.4.1 Tivoli Storage Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
14.4.2 Asynchronous data recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
14.4.3 Network Data Management Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
Chapter 15. Troubleshooting and maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
15.1 Maintenance philosophy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
-
8/11/2019 Implementing IBM Storewise v7000 unified
10/371
viii Implementing the IBM Storwize V7000 Unified
15.2 Event logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
15.2.1 Storwize V7000 storage controller event log (block). . . . . . . . . . . . . . . . . . . . . 258
15.2.2 V7000 Unified File Module Event log file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
15.2.3 Block . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
15.2.4 File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
15.2.5 Working with compressed volumes out of space conditions. . . . . . . . . . . . . . . 266
15.3 Collect support package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27015.4 Information center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
15.4.1 Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
15.4.2 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
15.4.3 Search results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
15.4.4 Offline information center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
15.5 Call home and alerting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
15.5.1 Simple Network Management Protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
15.5.2 Email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
15.5.3 Call home . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
15.6 IBM Support Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
15.7 Changing parts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
15.8 Preparing for recovery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27615.8.1 Superuser password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
15.8.2 Admin password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
15.8.3 Root password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
15.8.4 Service IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
15.8.5 Test GUI connection to the Storwize V7000 storage enclosure . . . . . . . . . . . . 277
15.8.6 Assist On-site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
15.8.7 Backup config saves . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
15.9 Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
15.9.1 Software package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
15.9.2 Software upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
Chapter 16. Real-time Compression in the IBM Storwize V7000 Unified. . . . . . . . . . 287
16.1 General considerations: Compression and block volume compression use cases. . 28816.2 Compressed file system pool configurations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
16.2.1 Selectively compressed file system with two pools. . . . . . . . . . . . . . . . . . . . . . 288
16.2.2 Configuring a selective compressed file system. . . . . . . . . . . . . . . . . . . . . . . . 290
16.2.3 Compression rules by file set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
16.2.4 Use case for compressing and uncompressing existing data. . . . . . . . . . . . . . 299
16.3 Capacity Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
16.3.1 Planning capacity with the NAS Compression Estimation Utility . . . . . . . . . . . 315
16.3.2 Installing and using the NAS Compression Estimation Utility . . . . . . . . . . . . . . 316
16.3.3 Using NAS Compression Estimation Utility. . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
16.3.4 Capacity planning for selectively compressed file systems . . . . . . . . . . . . . . . 317
16.4 Compression metrics for file systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
16.5 Managing compressed file systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32216.5.1 Adding a compressed pool to a file system. . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
16.5.2 Making a selectively compressed file system uncompressed. . . . . . . . . . . . . . 325
16.6 Compression saving reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
16.6.1 Reporting basic overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
16.6.2 Reporting of compression in the GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
16.6.3 Compression reporting by using the CLI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
-
8/11/2019 Implementing IBM Storewise v7000 unified
11/371
Contentsix
Other publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Online resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
Help from IBM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
-
8/11/2019 Implementing IBM Storewise v7000 unified
12/371
x Implementing the IBM Storwize V7000 Unified
-
8/11/2019 Implementing IBM Storewise v7000 unified
13/371
Copyright IBM Corp. 2013. All rights reserved.xi
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in other countries. Consultyour local IBM representative for information on the products and services currently available in your area. Anyreference to an IBM product, program, or service is not intended to state or imply that only that IBM product,program, or service may be used. Any functionally equivalent product, program, or service that does notinfringe any IBM intellectual property right may be used instead. However, it is the user's responsibility toevaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. Thefurnishing of this document does not grant you any license to these patents. You can send license inquiries, inwriting, to:IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A.
The following paragraph does not apply to the United Kingdom or any other country where suchprovisions are inconsistent with local law:INTERNATIONAL BUSINESS MACHINES CORPORATIONPROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer ofexpress or implied warranties in cer tain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically madeto the information herein; these changes will be incorporated in new editions of the publication. IBM may makeimprovements and/or changes in the product(s) and/or the program(s) described in this publication at any timewithout notice.
Any references in this information to non-IBM websites are provided for convenience only and do not in anymanner serve as an endorsement of those websites. The materials at those websites are not part of thematerials for this IBM product and use of those websites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without incurringany obligation to you.
Any performance data contained herein was determined in a controlled environment. Therefore, the resultsobtained in other operating environments may vary significantly. Some measurements may have been madeon development-level systems and there is no guarantee that these measurements will be the same ongenerally available systems. Furthermore, some measurements may have been estimated throughextrapolation. Actual results may vary. Users of this document should verify the applicable data for theirspecific environment.
Information concerning non-IBM products was obtained from the suppliers of those products, their publishedannouncements or other publicly available sources. IBM has not tested those products and cannot confirm theaccuracy of performance, compatibility or any other claims related to non-IBM products. Questions on thecapabilities of non-IBM products should be addressed to the suppliers of those products.
This information contains examples of data and reports used in daily business operations. To illustrate themas completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to the names and addresses used by an actual businessenterprise is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programmingtechniques on various operating platforms. You may copy, modify, and distribute these sample programs inany form without payment to IBM, for the purposes of developing, using, marketing or distributing applicationprograms conforming to the application programming interface for the operating platform for which the sampleprograms are written. These examples have not been thoroughly tested under all conditions. IBM, therefore,cannot guarantee or imply reliability, serviceability, or function of these programs.
-
8/11/2019 Implementing IBM Storewise v7000 unified
14/371
xii Implementing the IBM Storwize V7000 Unified
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business MachinesCorporation in the United States, other countries, or both. These and other IBM trademarked terms aremarked on their first occurrence in this information with the appropriate symbol ( or ), indicating USregistered or common law trademarks owned by IBM at the time this information was published. Such
trademarks may also be registered or common law trademarks in other countries. A current list of IBMtrademarks is available on the Web at http://www.ibm.com/legal/copytrade.shtml
The following terms are trademarks of the International Business Machines Corporation in the United States,other countries, or both:
Active Cloud Engine
AFS
AIX
BladeCenter
DS4000
Easy Tier
FlashCopy
Global Technology Services
GPFS
IBM
PartnerWorld
PureFlex
Real-time Compression
Redbooks
Redbooks (logo)
Smarter Planet
Storwize
System Storage
System x
Tivoli
XIV
z/OS
The following terms are trademarks of other companies:
Intel, Intel Xeon, Intel logo, Intel Inside logo, and Intel Centrino logo are trademarks or registered trademarksof Intel Corporation or its subsidiaries in the United States and other countries.
Linux is a trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in theUnited States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Other company, product, or service names may be trademarks or service marks of others.
http://www.ibm.com/legal/copytrade.shtmlhttp://www.ibm.com/legal/copytrade.shtml -
8/11/2019 Implementing IBM Storewise v7000 unified
15/371
Copyright IBM Corp. 2013. All rights reserved.xiii
Preface
In this IBM Redbooks publication we introduce the IBM Storwize V7000 Unified
(V7000U). Storwize V7000 Unified is a virtualized storage system designed to consolidateblock and file workloads into a single storage system. Advantages include simplicity of
management, reduced cost, highly scalable capacity, performance, and high availability.Storwize V7000 Unified storage also offers improved efficiency and flexibility through built-in
solid-state drive (SSD) optimization, thin provisioning, IBM Real-time Compression, andnondisruptive migration of data from existing storage. The system can virtualize and reuse
existing disk systems offering a greater potential return on investment.
We suggest that you familiarize yourself with the following books to get the most from this
publication:
Implementing the IBM Storwize V7000 V6.3, SG24-7938 Implementing the IBM System Storage SAN Volume Controller V6.3, SG24-7933 Real-time Compression in SAN Volume Controller and Storwize V7000, REDP-4859
SONAS Implementation Guide and Best Practices Guide, SG24-7962 SONAS Concepts, Architecture, and Planning Guide, SG24-7963
Authors
Jure Arzensekis an Advisory IT Specialist for IBM Sloveniaand works as a PFE for the CEEMEA Level 2 team, supportingPureFlex and IBM BladeCenter products. He has been with
IBM since 1995 and has worked in various technical support
and technical education roles in EMEA and CEE. Jure holds adegree in Computer Science from the University of Ljubljana.His other areas of expertise include IBM System x servers,
SAN, SVC, Storwize V7000, System Storage DS3000, IBMDS4000, and DS5000 products and network operating
systems for the Intel platform. He has co-authored thirteenother IBM Redbooks publications.
Nancy Kinneyworked as an IBM US Remote Technical
Support Engineer for IBM Global Technology Services in theAustin AIX/IBM System Storage center where she acquired
end-to-end experience in troubleshooting FC technologies.She holds an IBM Midrange Specialist Certification as well as
NetApp/N-Series NCDA Certification. She is currently anInfrastructure Architect. She has a wide range of experience
working with FC Storage technologies from multiple vendors aswell as working with multipathing drivers for OSs attaching tostorage, and networking technologies.
-
8/11/2019 Implementing IBM Storewise v7000 unified
16/371
xiv Implementing the IBM Storwize V7000 Unified
This book was produced by a team of specialists working at Brocade CommunicationsSystems, San Jose; IBM Manchester Labs, UK, and the IBM International Technical Support
Organization, San Jose Center.
Previous authors:
Andreas BaerNitzan Iron
Tom JahnPaul Jenkin
Jorge QuintalBosmat Tuv-El
We extend our thanks to the following people for their contributions to this project, including
the development and PFE teams in Hursley:
Robin FindlayCarlos FuenteGeoff Lane
Andrew MartinCameron McAllister
Paul MerrisonSteve Randle
Matt Smith
Daniel Owenis the Performance Architect for Storwize V7000
Unified. Prior to joining STG System Storage he worked withinPOWER Systems, developing technology to improve the
performance of applications on POWER/AIX. Daniel is aChartered Engineer who has over a decade's worth ofexperience working on the performance of computer systems.
Jorge Quintalis a Storage Managing Consultant currentlyproviding Development Support for IBM Real-time
Compression. He joined IBM through the acquisition ofSequent Computer Systems in 1999 and during his time at
IBM, he has worked for Storage Lab Services as one of theoriginal members working with SAN File System, SVC,
network-attached storage (NAS), and as lead for N-Seriesservices development and implementations. Jorge also workedfor an extended period as an IBM XIV Technical Advisor.
Jon Tateis a Project Manager for IBM System Storage SANSolutions at the International Technical Support Organization
(ITSO), San Jose Center. Before joining the ITSO in 1999, heworked in the IBM Technical Support Center, providing Level 2
support for IBM storage products. Jon has 27 years ofexperience in storage software and management, services,
and support, and is both an IBM Certified IT Specialist and anIBM SAN Certified Specialist. He is also the UK Chairman ofthe Storage Networking Industry Association.
-
8/11/2019 Implementing IBM Storewise v7000 unified
17/371
Prefacexv
Barry Whyte
Muhammad ZubairChris CantoPeter Eccles
IBM Hursley
Duane BollandJackson Shea
IBM Beaverton
Norm BogardIBM Orlando
Chris Saul
IBM San Jose
Sangam Racherla
IBM ITSO
Achim Christ
Nils HausteinMichael Jahn
Thomas LutherAlexander Saupp
IBM Germany
Special thanks to the Brocade staff for their unparalleled support of this residency in terms ofequipment and support in many areas:
Silviano GaonaBrian StefflerMarcus Thordal
Jim Baldyga
Brocade Communications Systems
Now you can become a published author, too!
Heres an opportunity to spotlight your skills, grow your career, and become a published
authorall at the same time! Join an ITSO residency project and help write a book in yourarea of expertise, while honing your experience using leading-edge technologies. Your efforts
will help to increase product acceptance and customer satisfaction, as you expand yournetwork of technical contacts and relationships. Residencies run from two to six weeks inlength, and you can participate either in person or as a remote resident working from your
home base.
Find out more about the residency program, browse the residency index, and apply online at:
ibm.com/redbooks/residencies.html
Comments welcome
Your comments are important to us!
http://www.redbooks.ibm.com/residencies.htmlhttp://www.redbooks.ibm.com/residencies.htmlhttp://www.redbooks.ibm.com/residencies.htmlhttp://www.redbooks.ibm.com/residencies.html -
8/11/2019 Implementing IBM Storewise v7000 unified
18/371
xvi Implementing the IBM Storwize V7000 Unified
We want our books to be as helpful as possible. Send us your comments about this book or
other IBM Redbooks publications in one of the following ways:
Use the online Contact usreview Redbooks form found at:
ibm.com/redbooks
Send your comments in an email to:
Mail your comments to:
IBM Corporation, International Technical Support Organization
Dept. HYTD Mail Station P0992455 South RoadPoughkeepsie, NY 12601-5400
Stay connected to IBM Redbooks
Find us on Facebook:
http://www.facebook.com/IBMRedbooks
Follow us on Twitter:
http://twitter.com/ibmredbooks
Look for us on LinkedIn:
http://www.linkedin.com/groups?home=&gid=2130806
Explore new Redbooks publications, residencies, and workshops with the IBM Redbooks
weekly newsletter:
https://www.redbooks.ibm.com/Redbooks.nsf/subscribe?OpenForm
Stay current on recent Redbooks publications with RSS Feeds:
http://www.redbooks.ibm.com/rss.html
http://www.redbooks.ibm.com/http://www.redbooks.ibm.com/http://www.redbooks.ibm.com/contacts.htmlhttp://www.facebook.com/IBMRedbookshttp://twitter.com/ibmredbookshttp://www.linkedin.com/groups?home=&gid=2130806https://www.redbooks.ibm.com/Redbooks.nsf/subscribe?OpenFormhttp://www.redbooks.ibm.com/rss.htmlhttp://www.redbooks.ibm.com/rss.htmlhttps://www.redbooks.ibm.com/Redbooks.nsf/subscribe?OpenFormhttp://www.linkedin.com/groups?home=&gid=2130806http://twitter.com/ibmredbookshttp://www.facebook.com/IBMRedbookshttp://www.redbooks.ibm.com/contacts.htmlhttp://www.redbooks.ibm.com/http://www.redbooks.ibm.com/ -
8/11/2019 Implementing IBM Storewise v7000 unified
19/371
Copyright IBM Corp. 2013. All rights reserved.1
Chapter 1. Introduction
The IBM Storwize V7000 Unified integrates the serving of storage and file related services,
such as file sharing and file transfer capabilities, in one system. The Storwize V7000 Unifiedcan provide storage system virtualization as well, using the mature virtualization capabilities
of the IBM SAN Volume Controller (SVC). It is an integrated storage server, storagevirtualization, and file server appliance.
1
-
8/11/2019 Implementing IBM Storewise v7000 unified
20/371
2 Implementing the IBM Storwize V7000 Unified
1.1 A short history lesson
IT infrastructure concepts and products advance and change over time, adjusting to changingrequirements and tasks at hand. For instance, in many computing environments, a
centralized approach with a strictly specified design and infrastructure components has beensuperseded by a client/server approach, with a decentralized and less proprietary, moreinteroperable infrastructure. This infrastructure is easier to be adopted by new concepts and
tasks.
As always, IT architects have to work with the concepts, technology, and designs that are
available at a given point-in-time. For instance, it used to be the case that the servers inclient/server environments could use only internal storage. This changed with the dawn ofexternal Redundant Array of Independent Disks (RAID) and RAID storage systems. If we look
at storage as a service, this previously internal-only service was now out-tasked to aspecialized device, enabling new infrastructure concepts.
The serving of storage from a central element in the infrastructure to many storage clients,and the implementation of high availability by mirroring data to two independent storageservers has now became more prevalent in the industry. These specialized storage servers
are in essence, storage server appliances. What was simply called a server because ithoused all elements in one device and provided a service to clients, now became a client
itself, a storage client. They need to use the storage service provided by the storage serversto be able to build their own added value services on top.
Servers were becoming more used for specialized tasks, and later, the hardware andsoftware was adapted to support this specialization to a certain degree.
One of these tasks was organizing files in file systems and making the file system space andthe files themselves accessible by file sharing clients. These adapted servers are known asfile servers. With external storage, these devices are now storage clients in one aspect andfile servers in another. They usea lower-level service (storage) andprovidea higher-levelservice (file serving).
To enhance the functionality, availability, disaster tolerance, and other aspects of a file servingsubinfrastructure, new types of devices were developed and introduced. These were
specialized single purpose file servers (a file server appliance). They are solely designed toprovide only the functionality that is implemented into the product of the given vendor, withoutthe explicit ability to use them for different tasks (as with multi-purpose servers).
This specialization, which can have many other advantages, led to appliances that werecalled network-attached storage(NAS). Although strictly speaking, it is not serving storagebut serving files.
This gave us a modular, layered infrastructure in which each logical layer also corresponds
with a class of device that provides services that are only related to that layer. A storage
server serves storage to a storage client. A file server serves files to a file client. Thesedevices are connected to each other using different forms of external networks, usingspecialized protocols to provide their service.
When file server appliances started to be used to generate storage volumes from files in their
file system, they made these volumes accessible to storage clients by using Internet SmallComputer System Interface (iSCSI) and Fibre Channel (FC). This meant that these devices
provided services belonging to two different functional layers, and they acted as both fileservers and storage servers. To make the distinction, they were called Unified Storage. TheIBM approach to this type of storage is to take a storage server that can provide storagevirtualization and integrateit with a file server product in one device.
-
8/11/2019 Implementing IBM Storewise v7000 unified
21/371
Chapter 1. Introduction3
This integrated product is theIBM Storwize V7000 Unified Storage,as shown in Figure 1-1.
Figure 1-1 IBM Storwize V7000 Unified Storage
Internally, this device is still built with a layered approach, whereby a storage server servesstorage to external storage clients and to the internal file server. And, the file server provides
file services to external file clients. This is a truly integrated storage server, storagevirtualization, and file server appliance.
1.2 About the rest of this book
This book starts off providing the basics of the terminology and concepts of storage and fileservices and how they relate to each other. Building on that, we introduce file sharing and file
transfer methods in general. The architecture of the Storwize V7000 is briefly explained, aswell as the specifics of the implementation of the file-related functionality and the access
control options. Storage-related functions like virtualization and copy services are coveredmore briefly because these topics are already covered in available ITSO publications; these
functions are the same as in the IBM Storwize V7000. We recommend having a copy of thefollowing book available to help your understanding of the Storwize V7000 piece of the
equation, Implementing the IBM Storwize V7000 V6.3, SG24-7938.
Information of the file server-related part of the product, such as the IBM General Parallel FileSystem (GPFS) and differences to Scale Out Network Attached Storage (SONAS) areincluded as well. For more information about SONAS, see the following publications:
SONAS Implementation Guide and Best Practices Guide, SG24-7962 SONAS Concepts, Architecture, and Planning Guide, SG24-7963
For GPFS, we recommend, Implementing the IBM General Parallel File System (GPFS) in a
Cross Platform Environment, SG24-7844.
The theoretical part of the book is followed by the implementation chapters of the book. Theuser interfaces, planning for implementation, and the actual implementation of the Storwize
V7000 Unified are described. This includes the antivirus implementation, performance andmonitoring overview, backup and recovery, and troubleshooting and maintenance.
This book aims to help to understand file services and how they are implemented in the
Storwize V7000 Unified and to help to successfully implement, run, and maintain the product.
V7000
Unified
V7000Unified
V7000
Unified
V7000Unified
-
8/11/2019 Implementing IBM Storewise v7000 unified
22/371
4 Implementing the IBM Storwize V7000 Unified
1.3 Latest release highlights
Although the Storwize V7000 Unified received various small updates in various areas, thereare several new enchancements and features worthy of note.
1.3.1 USB Access Recovery
If a system is relocated or the network is changed, access to the management interface may
get lost if there is not very careful planning. This change allows for a quick and easy way torecover the file module console and re-set the management Ips. This will be discussed indetail in the implementation and troubleshooting chapter.
1.3.2 Call-home installation enhancement
This is an enhancement which allows our clients to use call home setup enabling bettertracking for quick access to machines installed in the field or when needing to send a CE into
the field. After the System Setup wizard completes the user is prompted to complete the
Support Services wizard.
1.3.3 SSH tunnel from the IFS Management Node to the Storwize V7000 Node
This enables the Host Software Group 3rd party plugins designed for V7000 to transparentlywork on V7000 Unified as will be discussed in Chapter 9, GUI and CLI on page 83.
-
8/11/2019 Implementing IBM Storewise v7000 unified
23/371
Copyright IBM Corp. 2013. All rights reserved.5
Chapter 2. Terminology and file serving
concepts
This chapter describes terminology that is used for storage and file services, as well asclient/server file sharing and file transfer protocols.
2
The Storwize V7000 Unified provides file and block storage. The terminology in this
chapter pertains mostly to file storage. For detailed block storage information, consult the
following Redbook: Implementing the IBM Storwize V7000 V6.3, SG24-7938.
-
8/11/2019 Implementing IBM Storewise v7000 unified
24/371
6 Implementing the IBM Storwize V7000 Unified
2.1 Terminology for storage and file services
The Storwize V7000 Unified provides block and file storage to clients. With an integratedproduct like the Storwize V7000 Unified, it is essential to use coherent terminology.
The main focus when designing infrastructures is the service that the products provide (for
example, is it the kind of service the client asks for, are the requirements met?). Even thoughour products perform input/output (I/O) operations, it is services like the mapping of logical
volumes and the sharing of files that are important to have in mind.
2.1.1 Terminology for random access mass storage
The lowest level of service provided to permanently store and retrieve data for use in upper
layers in computer systems is random access mass storage, hereafter referred to asstorage.Storage, for instance, is provided by hard disk drives (HDDs), solid-state drives (SSDs), and
(using HDDs and SSDs) by Redundant Array of Independent Disks (RAID) controllers and thecontrollers of external storage systems and storage servers. Oftentimes, the term blockstorageis used, although in many cases it is not needed to use the term block.
The prefix blockoriginates in the disk data organization architecture. For instance, thefixed-block architecture (FBA, or shorter FB) uses records of data written in blocks of a
specific size. Logical block address (LBA), an FBA that is common today, uses a fixed sectorsize of 512 bytes. Referring to storage with the prefix blockleaves out other architecturessuch as count key data (CKD), used for instance in IBM z/OS. In cases where it is needed to
differentiate from CKD, it makes sense to refer to the storage asfixed block storage(FB storage) without omitting the termfixed.
LBA storage, as used by open systems, provides the storage to upper layers of the system asa sequence of blocks, which is called a volume. For the term, volumeas well, the prefix blockis notneeded to differentiate from upper layer facilities and protocols. The term is not neededbecause these protocols do not provide storage or volumes in any form. They usestorage in
the form of volumes and provide upper layer services.
Storage that is provided by physical random access mass storage devices such as HDDs or
SSDs is referred to asphysical volume(PV), for instance in RAID and in Logical VolumeManager (LVM) software components of an operation system.
Using physical volumes to start with, there are volumes that are called logical volumes(LV)being presented in different places. As such, the term logical volumehas been overused andit depends on either the context it is being used in or upon a further definition to be
understood. An LV can be a logical volume that is provided by a computer systems internalRAID adapter, an external storage system, or an LVM. All these LVs have in common thatthey also present a sequence of blocks that can be used the same way a PV would. For upper
layers that use these volumes, the source is transparent. This means that they do not know if
they are using a PV or an LV. For instance an LV, like a PV, might be used by a file system(FS) or a database management system (DBMS). The diagram in Figure 2-1 on page 7shows a storage server providing logical volumes to a storage client.
A computer system accessing a logical volume mapped to it is astorage client. A logicalvolume that is served to a storage client by a storage server (storage system) is often referredto as aLUN. This usage of the termLUNis wrong because LUN is short for logical unitnumber, an addressing scheme that is used to identifya logical unit (LU). This addressingscheme is used for Small Computer System Interface (SCSI) based systems, using the
different flavors of SCSI, Internet SCSI (iSCSI), and Fibre Channel (FC). A logical volume isonly one kind of a SCSI logical unit(LU), identified by a LUN. However, LUs are not limitedto
-
8/11/2019 Implementing IBM Storewise v7000 unified
25/371
Chapter 2. Terminology and file serving concepts7
be logical volumes. They can be other devices that are addressed by the SCSI addressing
scheme as well, for instance tape devices.
Summarized, withstorage servers,we provide the servicestoragewhen we map logicalvolumes to storage clients.
Figure 2-1depicts a storage server providing logical volumes to a storage client.
Figure 2-1 Storage server providing logical volumes to a storage client
2.1.2 Terminology for file systems and file sharing, file access, and file transfer
Operating systems of storage clients put a structure on and organize the storage space of
logical volumes to store and retrieve data. Usually an LVM takes the logical volumes fromstorage servers to build LVM logical volumes. On top of the LVM logical volumes are the
facilities to structure them to enable the writing, accessing, and reading of data, such as FS orDBMS.
Sometimes there is a bit of confusion aboutfile systemsandfile serving and file sharing,
which is partly rooted in the naming of the networking protocols that are used to share andaccess file resources.
A file system(or file system) is used to control how information is stored and retrieved.Without a file system, information placed in a storage area would be one large body ofinformation with no way to tell where one piece of information stops and the next begins.
By separating the information into individual pieces, and giving each piece a name, the
information is easily separated and identified. Taking its name from the way paper basedinformation systems are named, each piece of information is called a file. The structure and
logic rules used to manage the groups of information and their names is called a file system.
Physical volumes (HDDs and SSDs) are used to
generate logical volumes in a storage server.
These LV are mapped to a storage client.
The logical volumes provided by the storage
system are being used to generate logical
volumes in the LVM of the storage client.
The logical volumes of the LVM are being used
by file systems or DBMS
Storage Client
upper layer applications and
protocols
Storage ServerStorage System Controllers
logical
volumes
Logical Volume Manager
LVM logical
volumes
DBMS / FS
organized
data
-
8/11/2019 Implementing IBM Storewise v7000 unified
26/371
8 Implementing the IBM Storwize V7000 Unified
There are many different kinds of file systems. Each one has different structure and logic.
Each one has different properties of speed, flexibility, security, size and more. Some filesystems have been designed to be used for specific applications. For example the ISO 9660file system is designed specifically for optical disks.
File systems can be used on many different kinds of storage devices. Each storage deviceuses a different kind of media. The most common storage device in use today is a hard drivewhose media is a disc that has been coated with a magnetic film. The film has ones and zeros
'written' on it sending electrical pulses to a magnetic read-write head. Other media that areused are magnetic tape, optical disc, and flash memory. In some cases, the computer's main
memory (RAM) is used to create a temporary file system for short term use.
File systems are used to implement type of data store to store, retrieve and update a set offiles. File system refers to either the abstract data structures used to define files, or theactual software or firmware components that implement the abstract ideas.
Some file systems are used on local data storage devices; others provide file access via anetwork protocol (e.g. NFS, SMB, or 9P clients). Some file systems are virtual, in that the
files supplied are computed on request (e.g. proxies) or are merely a mapping into adifferent file system used as a backing store. The file system manages access to both the
content of files and the metadata about those files. It is responsible for arranging storagespace; reliability, efficiency, and tuning with regard to the physical storage medium areimportant design considerations.
File sharingis a means of making data that is already organizedin a file system accessibletousers of other (network connected) computer systems. These file sharing protocols, alsocalledfile access protocols, use client/server infrastructures. We do not intend to describePeer-to-Peer (P2P) file sharing protocols in this publication. Thefile serverpart of the protocolmakes the files accessible for thefile clientpart of the protocol. It is common and technicallycorrect to say files are beingshared, not only because the server shares access to the fileswith the client, but also because these files might be accessed by multiple clients (shared).
Some common file sharing protocols that allow users to access files on another computer
systems file system in a similar way as they access data in their local file system, are thedifferent versions of theNetwork File System(NFS) protocol and the Server Message Block(SMB) protocol. The SMB protocol often is referred to as Common Internet File System(CIFS). CIFS is only aspecific dialect(one version) of the SMB protocol. See 2.2.2, TheServer Message Block protocol on page 13for more information about the SMB protocol.The newest versions of the file sharing protocols NFS and SMB are NFSv4.1 and SMB 2.1.
The terms used for NFS and SMB servers and clients areNFS file server,NFS file client,SMB file server, and SMB file client. Sometimes, the software instances are calledNFS fileserviceand SMB file serviceto distinguish them from the computer systems hardware theyrun on. In short, the terms NFS server and NFS client, and SMB server and SMB client, are
used as well.
The diagram in Figure 2-2, as an example, shows a file server using logical volumes, the filesystem ext3, and the file sharing protocol NFS to make files accessible to an NFS client.
-
8/11/2019 Implementing IBM Storewise v7000 unified
27/371
Chapter 2. Terminology and file serving concepts9
Figure 2-2 File server housing a file system and sharing files, file client accessing files
Other methods of making files accessible and transferring files are the File Transfer Protocol
(FTP), the Hypertext Transfer Protocol (HTTP) and its flavors, as well as the Secure Shell(SSH)-based protocols Secure Copy Protocol (SCP) and Secure FTP (SFTP). The terms
used for FTP and HTTP servers and clients areFTP file server(for short:FTP server),FTPfile client(for short:FTP client),HTTP server, andHTTP client.
Specialized file servers are commonly called network-attached storage(NAS). Although NASproducts are network attached, they are file servers that use internal or external storage (inwhich case they themselves are storage clients). Although the term NAS is widely used, it
might help to think of them as a file server appliance or simply as special purpose file servers.
The diagram in Figure 2-3shows the different layers from storage to the access of files andhow they relate to each other. The example that is shown is using a storage server to
provision logical volumes to a storage client (the file server). The file server then uses theselogical volumes to organize data in form of files in file systems. The file server then provides
access to the content of these file systems to file clients by using file access protocols.
The logical volumes provided by the storage
system are being used to generate logical
volumes in the LVM of the storage client.
The logical volumes provided by the LVM are
being used by the ext3 file system for saving file
system structures and files.
NFS File Server
(Storage Client)
NFS File Client
The client part of the file sharing protocol NFS is
being used to access the exports.
The server part of the file sharing protocol NFS is
being used to export subsets of the file systems
files.
Logical Volume Manager
LVM logical
volumes
ext3 File System
saved files
NFS File Client
accessed files
NFS File Service
shared files
-
8/11/2019 Implementing IBM Storewise v7000 unified
28/371
10 Implementing the IBM Storwize V7000 Unified
Figure 2-3 Storage server providing LV to file server, file server sharing files, file client accessing files
SAN
Physical volumes (HDDs and SSDs) are used to
generate logical volumes in a storage server.
These LV are mapped to a storage client.
Client network
NFS File Client
NFS File Server
(Storage Client)
Storage Server
Storage System Controllers
logical
volumes
The logical volumes provided by the storage
system are being used to generate logical
volumes in the LVM of the storage client.
The logical volumes provided by the LVM are
being used by the ext3 file system for saving file
system structures and files.
The server part of the file sharing protocol NFS is
being used to export subsets of the file systems
files.
The client part of the file sharing protocol NFS is
being used to access the exports.
ext3 File System
saved files
Logical Volume Manager
LVM logical
volumes
NFS File Client
accessed files
NFS File Service
shared files
-
8/11/2019 Implementing IBM Storewise v7000 unified
29/371
Chapter 2. Terminology and file serving concepts11
2.2 File serving with file sharing and file transfer protocols
One important aspect of distributed computing is being able to access files on a remotesystem. To the user, remotely located files should have a transparent image. That is, the user
should not be concerned whether the file is on a remote or local system. This also means thatonly a single set of commands should be defined to control local and remote files. The filesharing protocols NFS and SMB use the concept of integrating access to shared parts of
remote file systems into the local file system structures. The following list includes some ofthe design issues for file access protocols:
Access: A file should appear to a user as a local file whether it is on a remote or localmachine. The path name to both local and remote files should be identical.
Concurrency: The access to a file must be synchronized so that a modification by one
process does not cause any undesired effect to other processes that depend on the samefile.
Failure and recovery: Both the client and the server must provide a recovery mechanism
such that if one or both fails, the other will carry out a set of expected behaviors.
Mobility: If a file is moved from one system to another, the client must still be able to
access that file without any alteration.
Scalability: A wide range of network sizes and workloads must be supported.
Other ways of serving and transferring files are for instance FTP, HTTP, SCP, and SFTP. They
are designed with different goals in mind, for instance, HTTP is mainly used to serve contentto World Wide Web (WWW) clients, whereas FTP is being used to transfer files to and from
remote locations without the goal of making the remote files available to processes of thelocal machine transparently.
2.2.1 The Network File System protocol
The Network File System (NFS) is a distributed file system protocol first developed by SunMicrosystems (Sun) in 1984. It is designed to enable client computer users to access filesover a network from remote systems in a similar way as though they were accessing files in a
local storage.
Overview of the Network File System protocolThe portions of a file system tree made accessible are called exportson the server side andmountson the client side so basically, local physical file systems on an NFS server are madeaccessible to NFS clients. NFS, because of its roots, is found mostly on UNIX and Linux like
systems and is included in the base operating system or distributions. NFS is the standard forthese systems to share and access files over a network. There are NFS implementationsavailable for many other operating systems as well.
NFS initially only used the stateless User Datagram Protocol (UDP) as the transport layer butimplementations using the stateful Transmission Control Protocol (TCP) started to appear aswell. NFS is based on Remote Procedure Call (RPC), which is an interprocess
communication protocol used to start routines in another address space, such as in a remotecomputer system. NFS is described and defined in Request for Comments (RFC) documentsand might be implemented at no charge.
-
8/11/2019 Implementing IBM Storewise v7000 unified
30/371
12 Implementing the IBM Storwize V7000 Unified
Network File System Version 2The first version of NFS available outside of Sun Microsystems was NFS Version 2 (NFSv2).
It was published in 1989 in RFC 1094. NFSv2 needs a port mapper (rpc.portmap, portmap,rpcbind), which assigns the ports on which the NFS services will listen. These ports aretemporary and change when the NFS server restarts. Additional configuration is necessary
for the ports that are used to become permanent, which makes NFS usable through firewalls,which allow traffic to only specified ports.
NFSv2 has some limitations concerning use cases, scalability, and performance. It supports
files only up to 2 GB, because of the 32 bit file size. The size of any single data transfer
cannot exceed 8 KB, which hinders performance because of the high amount of NFSrequests. Another performance limiting factor is that NFSv2 works only in a synchronous way.
Data must be written to the file system by the NFS server before the write is acknowledged tothe client (so calledstable writes). This limits the scalability of NFSv2.
NFSv2 does not support Kerberos authentication. To grant NFS clients access to exports, theaccess is granted to the computer system that the NFS client is running on. This means anyuser on that system is able to access the exports. The limits for users are only file and
directory permissions.
Network File System Version 3NFS Version 3 (NFSv3) was published in 1995 in RFC 1813. It still uses the port mapper.
NFSv3 removed some limitations and introduced some changes. The file offset is now 64 bit,allowing the support for files larger than 2 GB. The maximum transfer size limit of 8 KB isgone; the client and server can agree upon the transfer size.
NFSv3 introduced an asynchronous method of operation (so called unstable writes). Withunstable writes, the server does not need to acknowledge the write to the file system to theclient immediately and thus can delay the write. The server must acknowledge the write only
when it receives a commit request. This speeds up client writes and enables the server toefficiently write the data, mostly independent from the clients write operations. The NFSv3
client is able to detect uncommitted data in an error situation and can recover from that.
When NFSv3 was introduced, support for TCP as a transport-layer increased. Some vendorshad already added support for NFSv2 with TCP as a transport. Sun Microsystems added
support for TCP as a transport at the same time it added support for Version 3. Using TCP asa transport made using NFS over a Wide Area Network (WAN) become more feasible.
NFSv3 still grants access to the computer system and does not authenticate the user, and
does not support Kerberos. This limits the use of NFSv3 to trusted networks.
Sun Microsystems handed over the maintenance of NFS to the Internet Engineering TaskForce (IETF) before NFS Version 4 was defined and published.
Note:RFC documents are sometimes referred to as beingInternet standards. This is notthe case, although some RFCs become a standard as well. An RFC might, for example,
propose and describe Internet-related protocols and methods. Even though not officially astandard, it allows implementations of protocols to adhere to a specific RFC so that
implementations based on a certain RFC might be able to interact and be compatible witheach other. The nameRFCcan be misleading; an RFC, when published, is not changed.In case there is a need for a change, a new RFC is published with a new RFC number.
-
8/11/2019 Implementing IBM Storewise v7000 unified
31/371
Chapter 2. Terminology and file serving concepts13
Network File System Version 4NFS Version 4 (NFSv4) was published in 2000 in RFC 3010. In 2003, it was revised andpublished in RFC 3530. It was also influenced by Andrew File System (AFS) and CIFSwhich included performance improvements, mandated strong security, and introduced a
stateful protocol. The NFSv4 server does not rely on a port mapper anymore. NFSv4 requiresTCP as the transport layer; it listens on the well known port TCP 2049. It is a stateful protocol,
maintaining the state of objects on the server. This way the server knows about the intentionsof clients and some problems with stateless operation can be avoided. NFSv4 improves
performance and functionality, for instance, with file system semantics for the MicrosoftWindows operating systems. It supports Windows access control lists (Windows ACLs), butnot the Portable Operating System Interface (POSIX) based on UNIX ACL, in addition to
UNIX permissions. The security model in NFSv4 builds upon Kerberos, Low InfrastructurePublic Key Mechanism (LIPKEY), and Simple Public Key Mechanism Version 3 (SPKM-3).
The method that is used is agreed upon by the NFS client and NFS server. Also to benegotiated are other security mechanisms such as which encryption algorithm is being used.
A recent development is NFS version 4.1 (NFSv4.1), which was published in 2010 in RFC5661. NFSv4.1 offers new features, for instance, to use clustered installations with parallelprocessing.
2.2.2 The Server Message Block protocolThe Server Message Block (SMB) protocol is an application-layer network protocol for
sharing file and printing resources in a Distributed Computing Environment. Common InternetFile System (CIFS) is considered the modern dialect of SMB. It enables the access to shared
remote resources in a similar way as though they were part of the local system. Most usageof SMB involves computers running Microsoft Windows.
Initially, the SMB protocol was developed by IBM and further developed by Microsoft, Intel,
IBM, 3Com, and others. An early mention of SMB is in the IBM Personal Computer SeminarProceedingsdocument from October 1984. In 1987, the SMB protocol was officially definedin a Microsoft/Intel document called Microsoft Networks/OpenNET-FILE SHARING
PROTOCOL. Thereafter, it was developed by Microsoft and others. It has been mainly used
with client computers running the IBM OS/2 OS versions and the Microsoft Windows family ofOSs, where the SMB protocol with the functionality to act as SMB server and SMB client isbuilt in. SMB server and SMB client implementations for other platforms became available
and are in widespread use today.
Overview of the original Server Message Block protocolThe SMB protocol has been developed further over the years, which results in many variantsof the protocol, called dialects. It retained compatibility with an earlier version with the abilityto negotiate the dialect to be used for a session. The dialects are defined by a standardcommand set and are identified by a standard string such as PC NETWORK PROGRAM 1.0
Note:There are a broad range of ACL formats, which differ in syntax and semantics. TheACL format defined by Network File System version 4 (NFSv4) is called NFSv4 ACL.
GPFS supports the NFSv4 ACL format; this implementation is sometimes referred to asGPFS NFSv4 ACL. The Storwize V7000 Unified system stores all user files in GPFS.
Access protection in the Storwize V7000 Unified system is implemented in GPFS usingNFSv4 ACLs, and is enforced for all of the protocols that are supported by the Storwize
V7000 Unified system: CIFS, NFS, FTP, HTTPS, and SCP. The implementation of NFSv4ACLs in GPFS does not imply that GPFS or the Storwize V7000 Unified system supportsNFSv4. The Storwize V7000 Unified system supports NFS version 2 (NFSv2) and NFS
version 3 (NFSv3).
-
8/11/2019 Implementing IBM Storewise v7000 unified
32/371
14 Implementing the IBM Storwize V7000 Unified
(the first dialect of the SMB protocol), MICROSOFT NETWORKS 3.0, DOS LANMAN 2.1, or
NTLM 0.12 (the SMB dialect NTLAN Manager, which is designated as CIFS).
The name of the SMB protocol refers to the packets of data sent between the client andserver (the Server Message Blocks). Each SMB contains a request from an SMB client or a
response from an SMB server (client/server, request response protocol).
The SMB protocol is used to provide access to resources and access resources, calledshares. Shares can be subsets of file systems and its contents, printers, and serial ports andsome other resources. The termshareis also used because the resources might beaccessed by multiple clients (shared between them), with the protocol providing the lockingmechanisms. The SMB protocol, being a presentation/application layer protocol, has been
implemented on top of various transport layer protocols, with NetBIOS over TCP/IP being themost common. In general, it is independent from the transport protocol, but expects it to beconnection-oriented. With changes, it can be implemented on top of a stateless protocol such
as UDP as well.
As stated before, the SMB protocol is compatible with an earlier version, for both the server
and the client. When an SMB client con