Implementing IBM Storewise v7000 unified

download Implementing IBM Storewise v7000 unified

of 372

Transcript of Implementing IBM Storewise v7000 unified

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    1/371ibm.com/redbooks

    Front cover

    Implementing the IBM

    Storwize V7000 Unified

    Jure Arzense

    Nancy Kinne

    Daniel Owe

    Jorge Quint

    Jon Tat

    Consolidates storage and file servingworkloads into an integrated system

    Simplifies management and

    reduces cost

    Integrated support for IBM

    Real-time Compression

    http://www.redbooks.ibm.com/http://www.redbooks.ibm.com/http://www.redbooks.ibm.com/http://www.redbooks.ibm.com/
  • 8/11/2019 Implementing IBM Storewise v7000 unified

    2/371

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    3/371

    International Technical Support Organization

    Implementing the IBM Storwize V7000 Unified

    December 2013

    SG24-8010-01

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    4/371

    Copyright International Business Machines Corporation 2013. All rights reserved.

    Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule

    Contract with IBM Corp.

    Second Edition (December 2013)

    This edition applies to Version 7.1.0.5 of the IBM Storwize V7000 code and Version v1.4.2.0-27-2273 of theIBM Storwize V7000 File Module code.

    Note: Before using this information and the product it supports, read the information in Notices onpage xi.

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    5/371

    Copyright IBM Corp. 2013. All rights reserved.iii

    Contents

    Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi

    Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii

    Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii

    Authors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii

    Now you can become a published author, too! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xv

    Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xv

    Stay connected to IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi

    Chapter 1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.1 A short history lesson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

    1.2 About the rest of this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

    1.3 Latest release highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

    1.3.1 USB Access Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

    1.3.2 Call-home installation enhancement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41.3.3 SSH tunnel from the IFS Management Node to the Storwize V7000 Node . . . . . . 4

    Chapter 2. Terminology and file serving concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

    2.1 Terminology for storage and file services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

    2.1.1 Terminology for random access mass storage. . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

    2.1.2 Terminology for file systems and file sharing, file access, and file transfer . . . . . . 7

    2.2 File serving with file sharing and file transfer protocols. . . . . . . . . . . . . . . . . . . . . . . . . 11

    2.2.1 The Network File System protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

    2.2.2 The Server Message Block protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

    2.2.3 The File Transfer Protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

    2.2.4 The Hypertext Transfer Protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

    2.2.5 The Secure Copy Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182.2.6 The Secure Shell File Transfer Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

    Chapter 3. Architecture and functions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213.1 High-level overview of Storwize V7000 Unified. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

    3.1.1 Storwize V7000 Unified storage subsystem: the Storwize V7000 . . . . . . . . . . . . 22

    3.1.2 Storwize V7000 Unified file server subsystem: The file modules . . . . . . . . . . . . . 22

    3.2 Storwize V7000 Unified system configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

    3.2.1 Storwize V7000 Unified storage subsystem configuration . . . . . . . . . . . . . . . . . . 23

    3.2.2 Storwize V7000 Unified file server subsystem configuration . . . . . . . . . . . . . . . . 24

    3.3 Storwize V7000 Unified storage functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

    3.4 Storwize V7000 Unified file serving related functionality. . . . . . . . . . . . . . . . . . . . . . . . 26

    3.4.1 Storwize V7000 Unified file sharing and file transfer protocols . . . . . . . . . . . . . . . 27

    3.4.2 Storwize V7000 Unified NFS protocol support . . . . . . . . . . . . . . . . . . . . . . . . . . . 283.4.3 Storwize V7000 Unified SMB and CIFS protocol support. . . . . . . . . . . . . . . . . . . 29

    3.4.4 Storwize V7000 Unified cluster manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

    3.4.5 Storwize V7000 Unified product limits. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

    Chapter 4. Access control for file serving clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

    4.1 Authentication and authorization in general . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

    4.1.1 UNIX authentication and authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

    4.1.2 Windows authentication and authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

    4.1.3 UNIX and Windows authentication and authorization in Storwize V7000 Unified. 39

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    6/371

    iv Implementing the IBM Storwize V7000 Unified

    4.2 Methods used for access control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

    4.2.1 Kerberos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

    4.2.2 User names and user IDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

    4.2.3 Group names and group identifiers in UNIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

    4.2.4 Resource names and security identifiers in Windows. . . . . . . . . . . . . . . . . . . . . . 40

    4.2.5 UID/GID/SID mapping in the Storwize V7000 Unified. . . . . . . . . . . . . . . . . . . . . . 40

    4.2.6 Directory services in general. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414.2.7 Windows NT 4.0 Domain Controller and SAMBA Primary Domain Controller . . . 41

    4.2.8 Lightweight Directory Access Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

    4.2.9 Microsoft Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

    4.2.10 Services for UNIX and Identity Management for UNIX . . . . . . . . . . . . . . . . . . . . 41

    4.2.11 Network Information Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

    4.2.12 Access control list in general. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

    4.2.13 GPFS NFSv4 ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

    4.2.14 POSIX bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

    4.2.15 ACL mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

    4.3 Access control with Storwize V7000 Unified . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

    4.3.1 Authentication methods supported . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

    4.3.2 Active Directory authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444.3.3 AD with SFU authentication or with Identity Management for UNIX . . . . . . . . . . . 44

    4.3.4 SAMBA primary domain controller authentication. . . . . . . . . . . . . . . . . . . . . . . . . 44

    4.3.5 LDAP authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

    4.3.6 Network Information Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

    4.4 Access control limitations and considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

    4.4.1 Authentication limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

    4.4.2 Authorization limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

    Chapter 5. Storage virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495.1 User requirements that drive storage virtualization. . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

    5.2 Storage virtualization terminology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

    5.2.1 Realizing the benefits of Storwize V7000 Unified storage virtualization . . . . . . . . 53

    5.2.2 Using internal physical disk drives in the Storwize V7000 Unified . . . . . . . . . . . . 535.2.3 Using external physical disk drives in the Storwize V7000 Unified . . . . . . . . . . . . 55

    5.3 Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56

    Chapter 6. NAS use cases and differences: SONAS and Storwize V7000 Unified. . . 576.1 Use cases for Storwize V7000 Unified . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

    6.1.1 Unified storage with both file and block access . . . . . . . . . . . . . . . . . . . . . . . . . . 58

    6.1.2 Multi-user file sharing with centralized snapshots and backup. . . . . . . . . . . . . . . 59

    6.1.3 Availability and data protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

    6.1.4 Information life-cycle management (ILM), hierarchical storage management (HSM),

    and archiving solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

    6.2 Storwize V7000 Unified and SONAS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

    6.2.1 SONAS brief overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616.2.2 Implementation differences between Storwize V7000 Unified and SONAS . . . . . 63

    Chapter 7. IBM General Parallel File System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 657.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

    7.2 GPFS technical concepts and architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

    7.2.1 Split brain situations and GPFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

    7.2.2 GPFS file system pools and Storwize V7000 storage pools. . . . . . . . . . . . . . . . . 68

    7.2.3 File system pools in GPFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

    7.2.4 GPFS file sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

    7.2.5 GPFS parallel access and byte-range locking . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    7/371

    Contentsv

    7.2.6 GPFS synchronous internal replication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72

    7.2.7 Active Cloud Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72

    7.2.8 GPFS and hierarchical storage management (HSM) . . . . . . . . . . . . . . . . . . . . . . 73

    7.2.9 GPFS snapshots. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

    7.2.10 GPFS quota management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

    Chapter 8. Copy services overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758.1 Storage copy services of the Storwize V7000 Unified . . . . . . . . . . . . . . . . . . . . . . . . . 76

    8.1.1 FlashCopy for creating point-in-time copies of volumes . . . . . . . . . . . . . . . . . . . . 76

    8.1.2 Metro Mirror and Global Mirror for remote copy of volumes . . . . . . . . . . . . . . . . . 78

    8.2 File system level copy services of the Storwize V7000 Unified file modules . . . . . . . . 79

    8.2.1 Snapshots of file systems and file sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

    8.2.2 Asynchronous replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

    Chapter 9. GUI and CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

    9.1 Graphical user interface setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

    9.1.1 Web server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

    9.1.2 Management GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

    9.1.3 Web browser and settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

    9.1.4 Starting the browser connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 869.2 Command-line interface setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88

    9.3 Using the GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

    9.3.1 Menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90

    9.4 Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

    9.4.1 File commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95

    9.4.2 Block Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

    Chapter 10. Planning for implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

    10.1 IBM SONAS/V7000 Unified Questionnaire . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98

    10.1.1 Opportunity details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

    10.1.2 Capacity requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

    10.1.3 Performance requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10110.1.4 Client communication protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

    10.1.5 Data protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110

    10.1.6 Data center requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

    10.1.7 Storwize V7000 Unified specific questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114

    10.1.8 Service requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116

    10.2 Planning steps sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116

    10.2.1 Perform the physical hardware planning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117

    10.2.2 Define the environment and services needed. . . . . . . . . . . . . . . . . . . . . . . . . . 117

    10.2.3 Plan for system implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117

    10.2.4 Plan for data migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118

    10.3 Support, limitations, and tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118

    10.4 Storwize V7000 Unified advanced features and functions . . . . . . . . . . . . . . . . . . . . 119

    10.4.1 Licensing for advanced functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119

    10.4.2 External virtualization of SAN-attached back-end storage . . . . . . . . . . . . . . . . 119

    10.4.3 Remote Copy Services (for block I/O access only). . . . . . . . . . . . . . . . . . . . . . 120

    10.4.4 FlashCopy (block volumes only). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120

    10.4.5 General GPFS recommendation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120

    10.4.6 GPFS internal synchronous replication (NSD failure groups). . . . . . . . . . . . . . 121

    10.4.7 Manage write-caching options in Storwize V7000 Unified and on client side. . 121

    10.4.8 Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122

    10.5 Miscellaneous configuration planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122

    10.5.1 Set up local users to manage the Storwize V7000 Unified system. . . . . . . . . . 122

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    8/371

    vi Implementing the IBM Storwize V7000 Unified

    10.5.2 Define call home and event notifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123

    10.5.3 Storage pool layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123

    10.6 Physical hardware planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

    10.6.1 Plan for space and layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

    10.6.2 Planning for Storwize V7000 Unified environment . . . . . . . . . . . . . . . . . . . . . . 125

    10.7 System implementation planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

    10.7.1 Configuration details and settings that are required for setup. . . . . . . . . . . . . . 12710.7.2 Configuration options for file access only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135

    10.7.3 Configuration options for Block I/O access only . . . . . . . . . . . . . . . . . . . . . . . . 137

    Chapter 11. Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13911.1 Process overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140

    11.2 Task checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140

    11.3 Hardware unpack, rack, and cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142

    11.3.1 Preparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142

    11.3.2 Review packing slips and check components. . . . . . . . . . . . . . . . . . . . . . . . . . 142

    11.3.3 Confirm environmentals and planning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144

    11.3.4 Rack controller enclosures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144

    11.3.5 Rack expansion enclosures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144

    11.3.6 Rack file modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145

    11.3.7 Cabling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145

    11.4 Power on and check out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151

    11.4.1 Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151

    11.4.2 Power on expansions and controllers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151

    11.4.3 Power on file modules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151

    11.5 Install the latest software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152

    11.5.1 Determine current firmware and code levels. . . . . . . . . . . . . . . . . . . . . . . . . . . 152

    11.5.2 Preparation for reload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152

    11.5.3 Reinstall the software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153

    11.6 Initialize the system. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154

    11.6.1 Configure USB key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154

    11.6.2 Initialize the Storwize V7000 controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15711.6.3 Initialize the file modules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158

    11.7 Base configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160

    11.7.1 Connect to the graphical user interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160

    11.7.2 Easy Setup wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161

    11.7.3 Set up periodic configuration backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177

    11.8 Manual setup and configuration changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

    11.8.1 System names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

    11.8.2 System licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

    11.8.3 Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179

    11.9 Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183

    11.9.1 Public Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183

    11.9.2 Service ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18311.9.3 Internet Small Computer System Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184

    11.9.4 Fibre Channel ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185

    11.9.5 Fibre Channel ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186

    11.10 Alerting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187

    11.10.1 Email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187

    11.10.2 SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189

    11.10.3 Syslog Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190

    11.11 Directory Services and Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

    11.11.1 Domain Name System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    9/371

    Contentsvii

    11.11.2 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

    11.12 Health check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193

    11.13 User security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193

    11.13.1 Change passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194

    11.13.2 Create cluster users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196

    11.13.3 Create local users by using local authentication for NAS access. . . . . . . . . . 197

    11.14 Storage controller configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19911.14.1 External SAN requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200

    11.14.2 Configure storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200

    11.15 Block configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200

    11.15.1 Copy Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201

    11.16 File Services configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205

    11.16.1 File service components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205

    11.16.2 File systems examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207

    Chapter 12. Antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215

    12.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216

    12.2 Scanning individual files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217

    12.3 Scheduled scan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217

    12.4 Set up and configure antivirus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218

    12.4.1 Antivirus setup steps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219

    Chapter 13. Performance and monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225

    13.1 Tuning Storwize V7000 Unified for performance . . . . . . . . . . . . . . . . . . . . . . . . . . . 226

    13.1.1 Disk and file-system configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226

    13.1.2 Network Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228

    13.1.3 Client Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228

    13.2 Monitoring the performance of Storwize V7000 Unified . . . . . . . . . . . . . . . . . . . . . . 229

    13.2.1 Graphical Performance Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

    13.2.2 Command Line Interface (CLI) Performance Monitoring . . . . . . . . . . . . . . . . . 231

    13.2.3 Tivoli Storage Productivity Center. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231

    13.3 Identifying and resolving performance problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23213.3.1 Health Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232

    13.3.2 Network Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233

    13.3.3 High Latencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233

    Chapter 14. Backup and recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23514.1 Cluster backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236

    14.1.1 Philosophy for file and block . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236

    14.1.2 Storage enclosure backup (Storwize V7000) . . . . . . . . . . . . . . . . . . . . . . . . . . 236

    14.1.3 File module backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237

    14.2 Cluster recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238

    14.2.1 Storage enclosure recovery (V7000) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238

    14.3 Data backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240

    14.3.1 Data backup philosophy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240

    14.3.2 Tivoli Storage Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240

    14.3.3 Network Data Management Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246

    14.4 Data recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253

    14.4.1 Tivoli Storage Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253

    14.4.2 Asynchronous data recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254

    14.4.3 Network Data Management Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254

    Chapter 15. Troubleshooting and maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255

    15.1 Maintenance philosophy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    10/371

    viii Implementing the IBM Storwize V7000 Unified

    15.2 Event logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256

    15.2.1 Storwize V7000 storage controller event log (block). . . . . . . . . . . . . . . . . . . . . 258

    15.2.2 V7000 Unified File Module Event log file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261

    15.2.3 Block . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262

    15.2.4 File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264

    15.2.5 Working with compressed volumes out of space conditions. . . . . . . . . . . . . . . 266

    15.3 Collect support package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27015.4 Information center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272

    15.4.1 Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273

    15.4.2 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273

    15.4.3 Search results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273

    15.4.4 Offline information center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274

    15.5 Call home and alerting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274

    15.5.1 Simple Network Management Protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274

    15.5.2 Email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274

    15.5.3 Call home . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275

    15.6 IBM Support Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275

    15.7 Changing parts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276

    15.8 Preparing for recovery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27615.8.1 Superuser password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277

    15.8.2 Admin password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277

    15.8.3 Root password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277

    15.8.4 Service IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277

    15.8.5 Test GUI connection to the Storwize V7000 storage enclosure . . . . . . . . . . . . 277

    15.8.6 Assist On-site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277

    15.8.7 Backup config saves . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278

    15.9 Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278

    15.9.1 Software package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278

    15.9.2 Software upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280

    Chapter 16. Real-time Compression in the IBM Storwize V7000 Unified. . . . . . . . . . 287

    16.1 General considerations: Compression and block volume compression use cases. . 28816.2 Compressed file system pool configurations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288

    16.2.1 Selectively compressed file system with two pools. . . . . . . . . . . . . . . . . . . . . . 288

    16.2.2 Configuring a selective compressed file system. . . . . . . . . . . . . . . . . . . . . . . . 290

    16.2.3 Compression rules by file set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296

    16.2.4 Use case for compressing and uncompressing existing data. . . . . . . . . . . . . . 299

    16.3 Capacity Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315

    16.3.1 Planning capacity with the NAS Compression Estimation Utility . . . . . . . . . . . 315

    16.3.2 Installing and using the NAS Compression Estimation Utility . . . . . . . . . . . . . . 316

    16.3.3 Using NAS Compression Estimation Utility. . . . . . . . . . . . . . . . . . . . . . . . . . . . 316

    16.3.4 Capacity planning for selectively compressed file systems . . . . . . . . . . . . . . . 317

    16.4 Compression metrics for file systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320

    16.5 Managing compressed file systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32216.5.1 Adding a compressed pool to a file system. . . . . . . . . . . . . . . . . . . . . . . . . . . . 322

    16.5.2 Making a selectively compressed file system uncompressed. . . . . . . . . . . . . . 325

    16.6 Compression saving reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327

    16.6.1 Reporting basic overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327

    16.6.2 Reporting of compression in the GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328

    16.6.3 Compression reporting by using the CLI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332

    Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335

    IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    11/371

    Contentsix

    Other publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335

    Online resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336

    Help from IBM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337

    Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    12/371

    x Implementing the IBM Storwize V7000 Unified

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    13/371

    Copyright IBM Corp. 2013. All rights reserved.xi

    Notices

    This information was developed for products and services offered in the U.S.A.

    IBM may not offer the products, services, or features discussed in this document in other countries. Consultyour local IBM representative for information on the products and services currently available in your area. Anyreference to an IBM product, program, or service is not intended to state or imply that only that IBM product,program, or service may be used. Any functionally equivalent product, program, or service that does notinfringe any IBM intellectual property right may be used instead. However, it is the user's responsibility toevaluate and verify the operation of any non-IBM product, program, or service.

    IBM may have patents or pending patent applications covering subject matter described in this document. Thefurnishing of this document does not grant you any license to these patents. You can send license inquiries, inwriting, to:IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A.

    The following paragraph does not apply to the United Kingdom or any other country where suchprovisions are inconsistent with local law:INTERNATIONAL BUSINESS MACHINES CORPORATIONPROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR

    IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer ofexpress or implied warranties in cer tain transactions, therefore, this statement may not apply to you.

    This information could include technical inaccuracies or typographical errors. Changes are periodically madeto the information herein; these changes will be incorporated in new editions of the publication. IBM may makeimprovements and/or changes in the product(s) and/or the program(s) described in this publication at any timewithout notice.

    Any references in this information to non-IBM websites are provided for convenience only and do not in anymanner serve as an endorsement of those websites. The materials at those websites are not part of thematerials for this IBM product and use of those websites is at your own risk.

    IBM may use or distribute any of the information you supply in any way it believes appropriate without incurringany obligation to you.

    Any performance data contained herein was determined in a controlled environment. Therefore, the resultsobtained in other operating environments may vary significantly. Some measurements may have been madeon development-level systems and there is no guarantee that these measurements will be the same ongenerally available systems. Furthermore, some measurements may have been estimated throughextrapolation. Actual results may vary. Users of this document should verify the applicable data for theirspecific environment.

    Information concerning non-IBM products was obtained from the suppliers of those products, their publishedannouncements or other publicly available sources. IBM has not tested those products and cannot confirm theaccuracy of performance, compatibility or any other claims related to non-IBM products. Questions on thecapabilities of non-IBM products should be addressed to the suppliers of those products.

    This information contains examples of data and reports used in daily business operations. To illustrate themas completely as possible, the examples include the names of individuals, companies, brands, and products.

    All of these names are fictitious and any similarity to the names and addresses used by an actual businessenterprise is entirely coincidental.

    COPYRIGHT LICENSE:

    This information contains sample application programs in source language, which illustrate programmingtechniques on various operating platforms. You may copy, modify, and distribute these sample programs inany form without payment to IBM, for the purposes of developing, using, marketing or distributing applicationprograms conforming to the application programming interface for the operating platform for which the sampleprograms are written. These examples have not been thoroughly tested under all conditions. IBM, therefore,cannot guarantee or imply reliability, serviceability, or function of these programs.

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    14/371

    xii Implementing the IBM Storwize V7000 Unified

    Trademarks

    IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business MachinesCorporation in the United States, other countries, or both. These and other IBM trademarked terms aremarked on their first occurrence in this information with the appropriate symbol ( or ), indicating USregistered or common law trademarks owned by IBM at the time this information was published. Such

    trademarks may also be registered or common law trademarks in other countries. A current list of IBMtrademarks is available on the Web at http://www.ibm.com/legal/copytrade.shtml

    The following terms are trademarks of the International Business Machines Corporation in the United States,other countries, or both:

    Active Cloud Engine

    AFS

    AIX

    BladeCenter

    DS4000

    Easy Tier

    FlashCopy

    Global Technology Services

    GPFS

    IBM

    PartnerWorld

    PureFlex

    Real-time Compression

    Redbooks

    Redbooks (logo)

    Smarter Planet

    Storwize

    System Storage

    System x

    Tivoli

    XIV

    z/OS

    The following terms are trademarks of other companies:

    Intel, Intel Xeon, Intel logo, Intel Inside logo, and Intel Centrino logo are trademarks or registered trademarksof Intel Corporation or its subsidiaries in the United States and other countries.

    Linux is a trademark of Linus Torvalds in the United States, other countries, or both.

    Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in theUnited States, other countries, or both.

    UNIX is a registered trademark of The Open Group in the United States and other countries.

    Other company, product, or service names may be trademarks or service marks of others.

    http://www.ibm.com/legal/copytrade.shtmlhttp://www.ibm.com/legal/copytrade.shtml
  • 8/11/2019 Implementing IBM Storewise v7000 unified

    15/371

    Copyright IBM Corp. 2013. All rights reserved.xiii

    Preface

    In this IBM Redbooks publication we introduce the IBM Storwize V7000 Unified

    (V7000U). Storwize V7000 Unified is a virtualized storage system designed to consolidateblock and file workloads into a single storage system. Advantages include simplicity of

    management, reduced cost, highly scalable capacity, performance, and high availability.Storwize V7000 Unified storage also offers improved efficiency and flexibility through built-in

    solid-state drive (SSD) optimization, thin provisioning, IBM Real-time Compression, andnondisruptive migration of data from existing storage. The system can virtualize and reuse

    existing disk systems offering a greater potential return on investment.

    We suggest that you familiarize yourself with the following books to get the most from this

    publication:

    Implementing the IBM Storwize V7000 V6.3, SG24-7938 Implementing the IBM System Storage SAN Volume Controller V6.3, SG24-7933 Real-time Compression in SAN Volume Controller and Storwize V7000, REDP-4859

    SONAS Implementation Guide and Best Practices Guide, SG24-7962 SONAS Concepts, Architecture, and Planning Guide, SG24-7963

    Authors

    Jure Arzensekis an Advisory IT Specialist for IBM Sloveniaand works as a PFE for the CEEMEA Level 2 team, supportingPureFlex and IBM BladeCenter products. He has been with

    IBM since 1995 and has worked in various technical support

    and technical education roles in EMEA and CEE. Jure holds adegree in Computer Science from the University of Ljubljana.His other areas of expertise include IBM System x servers,

    SAN, SVC, Storwize V7000, System Storage DS3000, IBMDS4000, and DS5000 products and network operating

    systems for the Intel platform. He has co-authored thirteenother IBM Redbooks publications.

    Nancy Kinneyworked as an IBM US Remote Technical

    Support Engineer for IBM Global Technology Services in theAustin AIX/IBM System Storage center where she acquired

    end-to-end experience in troubleshooting FC technologies.She holds an IBM Midrange Specialist Certification as well as

    NetApp/N-Series NCDA Certification. She is currently anInfrastructure Architect. She has a wide range of experience

    working with FC Storage technologies from multiple vendors aswell as working with multipathing drivers for OSs attaching tostorage, and networking technologies.

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    16/371

    xiv Implementing the IBM Storwize V7000 Unified

    This book was produced by a team of specialists working at Brocade CommunicationsSystems, San Jose; IBM Manchester Labs, UK, and the IBM International Technical Support

    Organization, San Jose Center.

    Previous authors:

    Andreas BaerNitzan Iron

    Tom JahnPaul Jenkin

    Jorge QuintalBosmat Tuv-El

    We extend our thanks to the following people for their contributions to this project, including

    the development and PFE teams in Hursley:

    Robin FindlayCarlos FuenteGeoff Lane

    Andrew MartinCameron McAllister

    Paul MerrisonSteve Randle

    Matt Smith

    Daniel Owenis the Performance Architect for Storwize V7000

    Unified. Prior to joining STG System Storage he worked withinPOWER Systems, developing technology to improve the

    performance of applications on POWER/AIX. Daniel is aChartered Engineer who has over a decade's worth ofexperience working on the performance of computer systems.

    Jorge Quintalis a Storage Managing Consultant currentlyproviding Development Support for IBM Real-time

    Compression. He joined IBM through the acquisition ofSequent Computer Systems in 1999 and during his time at

    IBM, he has worked for Storage Lab Services as one of theoriginal members working with SAN File System, SVC,

    network-attached storage (NAS), and as lead for N-Seriesservices development and implementations. Jorge also workedfor an extended period as an IBM XIV Technical Advisor.

    Jon Tateis a Project Manager for IBM System Storage SANSolutions at the International Technical Support Organization

    (ITSO), San Jose Center. Before joining the ITSO in 1999, heworked in the IBM Technical Support Center, providing Level 2

    support for IBM storage products. Jon has 27 years ofexperience in storage software and management, services,

    and support, and is both an IBM Certified IT Specialist and anIBM SAN Certified Specialist. He is also the UK Chairman ofthe Storage Networking Industry Association.

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    17/371

    Prefacexv

    Barry Whyte

    Muhammad ZubairChris CantoPeter Eccles

    IBM Hursley

    Duane BollandJackson Shea

    IBM Beaverton

    Norm BogardIBM Orlando

    Chris Saul

    IBM San Jose

    Sangam Racherla

    IBM ITSO

    Achim Christ

    Nils HausteinMichael Jahn

    Thomas LutherAlexander Saupp

    IBM Germany

    Special thanks to the Brocade staff for their unparalleled support of this residency in terms ofequipment and support in many areas:

    Silviano GaonaBrian StefflerMarcus Thordal

    Jim Baldyga

    Brocade Communications Systems

    Now you can become a published author, too!

    Heres an opportunity to spotlight your skills, grow your career, and become a published

    authorall at the same time! Join an ITSO residency project and help write a book in yourarea of expertise, while honing your experience using leading-edge technologies. Your efforts

    will help to increase product acceptance and customer satisfaction, as you expand yournetwork of technical contacts and relationships. Residencies run from two to six weeks inlength, and you can participate either in person or as a remote resident working from your

    home base.

    Find out more about the residency program, browse the residency index, and apply online at:

    ibm.com/redbooks/residencies.html

    Comments welcome

    Your comments are important to us!

    http://www.redbooks.ibm.com/residencies.htmlhttp://www.redbooks.ibm.com/residencies.htmlhttp://www.redbooks.ibm.com/residencies.htmlhttp://www.redbooks.ibm.com/residencies.html
  • 8/11/2019 Implementing IBM Storewise v7000 unified

    18/371

    xvi Implementing the IBM Storwize V7000 Unified

    We want our books to be as helpful as possible. Send us your comments about this book or

    other IBM Redbooks publications in one of the following ways:

    Use the online Contact usreview Redbooks form found at:

    ibm.com/redbooks

    Send your comments in an email to:

    [email protected]

    Mail your comments to:

    IBM Corporation, International Technical Support Organization

    Dept. HYTD Mail Station P0992455 South RoadPoughkeepsie, NY 12601-5400

    Stay connected to IBM Redbooks

    Find us on Facebook:

    http://www.facebook.com/IBMRedbooks

    Follow us on Twitter:

    http://twitter.com/ibmredbooks

    Look for us on LinkedIn:

    http://www.linkedin.com/groups?home=&gid=2130806

    Explore new Redbooks publications, residencies, and workshops with the IBM Redbooks

    weekly newsletter:

    https://www.redbooks.ibm.com/Redbooks.nsf/subscribe?OpenForm

    Stay current on recent Redbooks publications with RSS Feeds:

    http://www.redbooks.ibm.com/rss.html

    http://www.redbooks.ibm.com/http://www.redbooks.ibm.com/http://www.redbooks.ibm.com/contacts.htmlhttp://www.facebook.com/IBMRedbookshttp://twitter.com/ibmredbookshttp://www.linkedin.com/groups?home=&gid=2130806https://www.redbooks.ibm.com/Redbooks.nsf/subscribe?OpenFormhttp://www.redbooks.ibm.com/rss.htmlhttp://www.redbooks.ibm.com/rss.htmlhttps://www.redbooks.ibm.com/Redbooks.nsf/subscribe?OpenFormhttp://www.linkedin.com/groups?home=&gid=2130806http://twitter.com/ibmredbookshttp://www.facebook.com/IBMRedbookshttp://www.redbooks.ibm.com/contacts.htmlhttp://www.redbooks.ibm.com/http://www.redbooks.ibm.com/
  • 8/11/2019 Implementing IBM Storewise v7000 unified

    19/371

    Copyright IBM Corp. 2013. All rights reserved.1

    Chapter 1. Introduction

    The IBM Storwize V7000 Unified integrates the serving of storage and file related services,

    such as file sharing and file transfer capabilities, in one system. The Storwize V7000 Unifiedcan provide storage system virtualization as well, using the mature virtualization capabilities

    of the IBM SAN Volume Controller (SVC). It is an integrated storage server, storagevirtualization, and file server appliance.

    1

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    20/371

    2 Implementing the IBM Storwize V7000 Unified

    1.1 A short history lesson

    IT infrastructure concepts and products advance and change over time, adjusting to changingrequirements and tasks at hand. For instance, in many computing environments, a

    centralized approach with a strictly specified design and infrastructure components has beensuperseded by a client/server approach, with a decentralized and less proprietary, moreinteroperable infrastructure. This infrastructure is easier to be adopted by new concepts and

    tasks.

    As always, IT architects have to work with the concepts, technology, and designs that are

    available at a given point-in-time. For instance, it used to be the case that the servers inclient/server environments could use only internal storage. This changed with the dawn ofexternal Redundant Array of Independent Disks (RAID) and RAID storage systems. If we look

    at storage as a service, this previously internal-only service was now out-tasked to aspecialized device, enabling new infrastructure concepts.

    The serving of storage from a central element in the infrastructure to many storage clients,and the implementation of high availability by mirroring data to two independent storageservers has now became more prevalent in the industry. These specialized storage servers

    are in essence, storage server appliances. What was simply called a server because ithoused all elements in one device and provided a service to clients, now became a client

    itself, a storage client. They need to use the storage service provided by the storage serversto be able to build their own added value services on top.

    Servers were becoming more used for specialized tasks, and later, the hardware andsoftware was adapted to support this specialization to a certain degree.

    One of these tasks was organizing files in file systems and making the file system space andthe files themselves accessible by file sharing clients. These adapted servers are known asfile servers. With external storage, these devices are now storage clients in one aspect andfile servers in another. They usea lower-level service (storage) andprovidea higher-levelservice (file serving).

    To enhance the functionality, availability, disaster tolerance, and other aspects of a file servingsubinfrastructure, new types of devices were developed and introduced. These were

    specialized single purpose file servers (a file server appliance). They are solely designed toprovide only the functionality that is implemented into the product of the given vendor, withoutthe explicit ability to use them for different tasks (as with multi-purpose servers).

    This specialization, which can have many other advantages, led to appliances that werecalled network-attached storage(NAS). Although strictly speaking, it is not serving storagebut serving files.

    This gave us a modular, layered infrastructure in which each logical layer also corresponds

    with a class of device that provides services that are only related to that layer. A storage

    server serves storage to a storage client. A file server serves files to a file client. Thesedevices are connected to each other using different forms of external networks, usingspecialized protocols to provide their service.

    When file server appliances started to be used to generate storage volumes from files in their

    file system, they made these volumes accessible to storage clients by using Internet SmallComputer System Interface (iSCSI) and Fibre Channel (FC). This meant that these devices

    provided services belonging to two different functional layers, and they acted as both fileservers and storage servers. To make the distinction, they were called Unified Storage. TheIBM approach to this type of storage is to take a storage server that can provide storagevirtualization and integrateit with a file server product in one device.

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    21/371

    Chapter 1. Introduction3

    This integrated product is theIBM Storwize V7000 Unified Storage,as shown in Figure 1-1.

    Figure 1-1 IBM Storwize V7000 Unified Storage

    Internally, this device is still built with a layered approach, whereby a storage server servesstorage to external storage clients and to the internal file server. And, the file server provides

    file services to external file clients. This is a truly integrated storage server, storagevirtualization, and file server appliance.

    1.2 About the rest of this book

    This book starts off providing the basics of the terminology and concepts of storage and fileservices and how they relate to each other. Building on that, we introduce file sharing and file

    transfer methods in general. The architecture of the Storwize V7000 is briefly explained, aswell as the specifics of the implementation of the file-related functionality and the access

    control options. Storage-related functions like virtualization and copy services are coveredmore briefly because these topics are already covered in available ITSO publications; these

    functions are the same as in the IBM Storwize V7000. We recommend having a copy of thefollowing book available to help your understanding of the Storwize V7000 piece of the

    equation, Implementing the IBM Storwize V7000 V6.3, SG24-7938.

    Information of the file server-related part of the product, such as the IBM General Parallel FileSystem (GPFS) and differences to Scale Out Network Attached Storage (SONAS) areincluded as well. For more information about SONAS, see the following publications:

    SONAS Implementation Guide and Best Practices Guide, SG24-7962 SONAS Concepts, Architecture, and Planning Guide, SG24-7963

    For GPFS, we recommend, Implementing the IBM General Parallel File System (GPFS) in a

    Cross Platform Environment, SG24-7844.

    The theoretical part of the book is followed by the implementation chapters of the book. Theuser interfaces, planning for implementation, and the actual implementation of the Storwize

    V7000 Unified are described. This includes the antivirus implementation, performance andmonitoring overview, backup and recovery, and troubleshooting and maintenance.

    This book aims to help to understand file services and how they are implemented in the

    Storwize V7000 Unified and to help to successfully implement, run, and maintain the product.

    V7000

    Unified

    V7000Unified

    V7000

    Unified

    V7000Unified

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    22/371

    4 Implementing the IBM Storwize V7000 Unified

    1.3 Latest release highlights

    Although the Storwize V7000 Unified received various small updates in various areas, thereare several new enchancements and features worthy of note.

    1.3.1 USB Access Recovery

    If a system is relocated or the network is changed, access to the management interface may

    get lost if there is not very careful planning. This change allows for a quick and easy way torecover the file module console and re-set the management Ips. This will be discussed indetail in the implementation and troubleshooting chapter.

    1.3.2 Call-home installation enhancement

    This is an enhancement which allows our clients to use call home setup enabling bettertracking for quick access to machines installed in the field or when needing to send a CE into

    the field. After the System Setup wizard completes the user is prompted to complete the

    Support Services wizard.

    1.3.3 SSH tunnel from the IFS Management Node to the Storwize V7000 Node

    This enables the Host Software Group 3rd party plugins designed for V7000 to transparentlywork on V7000 Unified as will be discussed in Chapter 9, GUI and CLI on page 83.

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    23/371

    Copyright IBM Corp. 2013. All rights reserved.5

    Chapter 2. Terminology and file serving

    concepts

    This chapter describes terminology that is used for storage and file services, as well asclient/server file sharing and file transfer protocols.

    2

    The Storwize V7000 Unified provides file and block storage. The terminology in this

    chapter pertains mostly to file storage. For detailed block storage information, consult the

    following Redbook: Implementing the IBM Storwize V7000 V6.3, SG24-7938.

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    24/371

    6 Implementing the IBM Storwize V7000 Unified

    2.1 Terminology for storage and file services

    The Storwize V7000 Unified provides block and file storage to clients. With an integratedproduct like the Storwize V7000 Unified, it is essential to use coherent terminology.

    The main focus when designing infrastructures is the service that the products provide (for

    example, is it the kind of service the client asks for, are the requirements met?). Even thoughour products perform input/output (I/O) operations, it is services like the mapping of logical

    volumes and the sharing of files that are important to have in mind.

    2.1.1 Terminology for random access mass storage

    The lowest level of service provided to permanently store and retrieve data for use in upper

    layers in computer systems is random access mass storage, hereafter referred to asstorage.Storage, for instance, is provided by hard disk drives (HDDs), solid-state drives (SSDs), and

    (using HDDs and SSDs) by Redundant Array of Independent Disks (RAID) controllers and thecontrollers of external storage systems and storage servers. Oftentimes, the term blockstorageis used, although in many cases it is not needed to use the term block.

    The prefix blockoriginates in the disk data organization architecture. For instance, thefixed-block architecture (FBA, or shorter FB) uses records of data written in blocks of a

    specific size. Logical block address (LBA), an FBA that is common today, uses a fixed sectorsize of 512 bytes. Referring to storage with the prefix blockleaves out other architecturessuch as count key data (CKD), used for instance in IBM z/OS. In cases where it is needed to

    differentiate from CKD, it makes sense to refer to the storage asfixed block storage(FB storage) without omitting the termfixed.

    LBA storage, as used by open systems, provides the storage to upper layers of the system asa sequence of blocks, which is called a volume. For the term, volumeas well, the prefix blockis notneeded to differentiate from upper layer facilities and protocols. The term is not neededbecause these protocols do not provide storage or volumes in any form. They usestorage in

    the form of volumes and provide upper layer services.

    Storage that is provided by physical random access mass storage devices such as HDDs or

    SSDs is referred to asphysical volume(PV), for instance in RAID and in Logical VolumeManager (LVM) software components of an operation system.

    Using physical volumes to start with, there are volumes that are called logical volumes(LV)being presented in different places. As such, the term logical volumehas been overused andit depends on either the context it is being used in or upon a further definition to be

    understood. An LV can be a logical volume that is provided by a computer systems internalRAID adapter, an external storage system, or an LVM. All these LVs have in common thatthey also present a sequence of blocks that can be used the same way a PV would. For upper

    layers that use these volumes, the source is transparent. This means that they do not know if

    they are using a PV or an LV. For instance an LV, like a PV, might be used by a file system(FS) or a database management system (DBMS). The diagram in Figure 2-1 on page 7shows a storage server providing logical volumes to a storage client.

    A computer system accessing a logical volume mapped to it is astorage client. A logicalvolume that is served to a storage client by a storage server (storage system) is often referredto as aLUN. This usage of the termLUNis wrong because LUN is short for logical unitnumber, an addressing scheme that is used to identifya logical unit (LU). This addressingscheme is used for Small Computer System Interface (SCSI) based systems, using the

    different flavors of SCSI, Internet SCSI (iSCSI), and Fibre Channel (FC). A logical volume isonly one kind of a SCSI logical unit(LU), identified by a LUN. However, LUs are not limitedto

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    25/371

    Chapter 2. Terminology and file serving concepts7

    be logical volumes. They can be other devices that are addressed by the SCSI addressing

    scheme as well, for instance tape devices.

    Summarized, withstorage servers,we provide the servicestoragewhen we map logicalvolumes to storage clients.

    Figure 2-1depicts a storage server providing logical volumes to a storage client.

    Figure 2-1 Storage server providing logical volumes to a storage client

    2.1.2 Terminology for file systems and file sharing, file access, and file transfer

    Operating systems of storage clients put a structure on and organize the storage space of

    logical volumes to store and retrieve data. Usually an LVM takes the logical volumes fromstorage servers to build LVM logical volumes. On top of the LVM logical volumes are the

    facilities to structure them to enable the writing, accessing, and reading of data, such as FS orDBMS.

    Sometimes there is a bit of confusion aboutfile systemsandfile serving and file sharing,

    which is partly rooted in the naming of the networking protocols that are used to share andaccess file resources.

    A file system(or file system) is used to control how information is stored and retrieved.Without a file system, information placed in a storage area would be one large body ofinformation with no way to tell where one piece of information stops and the next begins.

    By separating the information into individual pieces, and giving each piece a name, the

    information is easily separated and identified. Taking its name from the way paper basedinformation systems are named, each piece of information is called a file. The structure and

    logic rules used to manage the groups of information and their names is called a file system.

    Physical volumes (HDDs and SSDs) are used to

    generate logical volumes in a storage server.

    These LV are mapped to a storage client.

    The logical volumes provided by the storage

    system are being used to generate logical

    volumes in the LVM of the storage client.

    The logical volumes of the LVM are being used

    by file systems or DBMS

    Storage Client

    upper layer applications and

    protocols

    Storage ServerStorage System Controllers

    logical

    volumes

    Logical Volume Manager

    LVM logical

    volumes

    DBMS / FS

    organized

    data

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    26/371

    8 Implementing the IBM Storwize V7000 Unified

    There are many different kinds of file systems. Each one has different structure and logic.

    Each one has different properties of speed, flexibility, security, size and more. Some filesystems have been designed to be used for specific applications. For example the ISO 9660file system is designed specifically for optical disks.

    File systems can be used on many different kinds of storage devices. Each storage deviceuses a different kind of media. The most common storage device in use today is a hard drivewhose media is a disc that has been coated with a magnetic film. The film has ones and zeros

    'written' on it sending electrical pulses to a magnetic read-write head. Other media that areused are magnetic tape, optical disc, and flash memory. In some cases, the computer's main

    memory (RAM) is used to create a temporary file system for short term use.

    File systems are used to implement type of data store to store, retrieve and update a set offiles. File system refers to either the abstract data structures used to define files, or theactual software or firmware components that implement the abstract ideas.

    Some file systems are used on local data storage devices; others provide file access via anetwork protocol (e.g. NFS, SMB, or 9P clients). Some file systems are virtual, in that the

    files supplied are computed on request (e.g. proxies) or are merely a mapping into adifferent file system used as a backing store. The file system manages access to both the

    content of files and the metadata about those files. It is responsible for arranging storagespace; reliability, efficiency, and tuning with regard to the physical storage medium areimportant design considerations.

    File sharingis a means of making data that is already organizedin a file system accessibletousers of other (network connected) computer systems. These file sharing protocols, alsocalledfile access protocols, use client/server infrastructures. We do not intend to describePeer-to-Peer (P2P) file sharing protocols in this publication. Thefile serverpart of the protocolmakes the files accessible for thefile clientpart of the protocol. It is common and technicallycorrect to say files are beingshared, not only because the server shares access to the fileswith the client, but also because these files might be accessed by multiple clients (shared).

    Some common file sharing protocols that allow users to access files on another computer

    systems file system in a similar way as they access data in their local file system, are thedifferent versions of theNetwork File System(NFS) protocol and the Server Message Block(SMB) protocol. The SMB protocol often is referred to as Common Internet File System(CIFS). CIFS is only aspecific dialect(one version) of the SMB protocol. See 2.2.2, TheServer Message Block protocol on page 13for more information about the SMB protocol.The newest versions of the file sharing protocols NFS and SMB are NFSv4.1 and SMB 2.1.

    The terms used for NFS and SMB servers and clients areNFS file server,NFS file client,SMB file server, and SMB file client. Sometimes, the software instances are calledNFS fileserviceand SMB file serviceto distinguish them from the computer systems hardware theyrun on. In short, the terms NFS server and NFS client, and SMB server and SMB client, are

    used as well.

    The diagram in Figure 2-2, as an example, shows a file server using logical volumes, the filesystem ext3, and the file sharing protocol NFS to make files accessible to an NFS client.

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    27/371

    Chapter 2. Terminology and file serving concepts9

    Figure 2-2 File server housing a file system and sharing files, file client accessing files

    Other methods of making files accessible and transferring files are the File Transfer Protocol

    (FTP), the Hypertext Transfer Protocol (HTTP) and its flavors, as well as the Secure Shell(SSH)-based protocols Secure Copy Protocol (SCP) and Secure FTP (SFTP). The terms

    used for FTP and HTTP servers and clients areFTP file server(for short:FTP server),FTPfile client(for short:FTP client),HTTP server, andHTTP client.

    Specialized file servers are commonly called network-attached storage(NAS). Although NASproducts are network attached, they are file servers that use internal or external storage (inwhich case they themselves are storage clients). Although the term NAS is widely used, it

    might help to think of them as a file server appliance or simply as special purpose file servers.

    The diagram in Figure 2-3shows the different layers from storage to the access of files andhow they relate to each other. The example that is shown is using a storage server to

    provision logical volumes to a storage client (the file server). The file server then uses theselogical volumes to organize data in form of files in file systems. The file server then provides

    access to the content of these file systems to file clients by using file access protocols.

    The logical volumes provided by the storage

    system are being used to generate logical

    volumes in the LVM of the storage client.

    The logical volumes provided by the LVM are

    being used by the ext3 file system for saving file

    system structures and files.

    NFS File Server

    (Storage Client)

    NFS File Client

    The client part of the file sharing protocol NFS is

    being used to access the exports.

    The server part of the file sharing protocol NFS is

    being used to export subsets of the file systems

    files.

    Logical Volume Manager

    LVM logical

    volumes

    ext3 File System

    saved files

    NFS File Client

    accessed files

    NFS File Service

    shared files

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    28/371

    10 Implementing the IBM Storwize V7000 Unified

    Figure 2-3 Storage server providing LV to file server, file server sharing files, file client accessing files

    SAN

    Physical volumes (HDDs and SSDs) are used to

    generate logical volumes in a storage server.

    These LV are mapped to a storage client.

    Client network

    NFS File Client

    NFS File Server

    (Storage Client)

    Storage Server

    Storage System Controllers

    logical

    volumes

    The logical volumes provided by the storage

    system are being used to generate logical

    volumes in the LVM of the storage client.

    The logical volumes provided by the LVM are

    being used by the ext3 file system for saving file

    system structures and files.

    The server part of the file sharing protocol NFS is

    being used to export subsets of the file systems

    files.

    The client part of the file sharing protocol NFS is

    being used to access the exports.

    ext3 File System

    saved files

    Logical Volume Manager

    LVM logical

    volumes

    NFS File Client

    accessed files

    NFS File Service

    shared files

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    29/371

    Chapter 2. Terminology and file serving concepts11

    2.2 File serving with file sharing and file transfer protocols

    One important aspect of distributed computing is being able to access files on a remotesystem. To the user, remotely located files should have a transparent image. That is, the user

    should not be concerned whether the file is on a remote or local system. This also means thatonly a single set of commands should be defined to control local and remote files. The filesharing protocols NFS and SMB use the concept of integrating access to shared parts of

    remote file systems into the local file system structures. The following list includes some ofthe design issues for file access protocols:

    Access: A file should appear to a user as a local file whether it is on a remote or localmachine. The path name to both local and remote files should be identical.

    Concurrency: The access to a file must be synchronized so that a modification by one

    process does not cause any undesired effect to other processes that depend on the samefile.

    Failure and recovery: Both the client and the server must provide a recovery mechanism

    such that if one or both fails, the other will carry out a set of expected behaviors.

    Mobility: If a file is moved from one system to another, the client must still be able to

    access that file without any alteration.

    Scalability: A wide range of network sizes and workloads must be supported.

    Other ways of serving and transferring files are for instance FTP, HTTP, SCP, and SFTP. They

    are designed with different goals in mind, for instance, HTTP is mainly used to serve contentto World Wide Web (WWW) clients, whereas FTP is being used to transfer files to and from

    remote locations without the goal of making the remote files available to processes of thelocal machine transparently.

    2.2.1 The Network File System protocol

    The Network File System (NFS) is a distributed file system protocol first developed by SunMicrosystems (Sun) in 1984. It is designed to enable client computer users to access filesover a network from remote systems in a similar way as though they were accessing files in a

    local storage.

    Overview of the Network File System protocolThe portions of a file system tree made accessible are called exportson the server side andmountson the client side so basically, local physical file systems on an NFS server are madeaccessible to NFS clients. NFS, because of its roots, is found mostly on UNIX and Linux like

    systems and is included in the base operating system or distributions. NFS is the standard forthese systems to share and access files over a network. There are NFS implementationsavailable for many other operating systems as well.

    NFS initially only used the stateless User Datagram Protocol (UDP) as the transport layer butimplementations using the stateful Transmission Control Protocol (TCP) started to appear aswell. NFS is based on Remote Procedure Call (RPC), which is an interprocess

    communication protocol used to start routines in another address space, such as in a remotecomputer system. NFS is described and defined in Request for Comments (RFC) documentsand might be implemented at no charge.

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    30/371

    12 Implementing the IBM Storwize V7000 Unified

    Network File System Version 2The first version of NFS available outside of Sun Microsystems was NFS Version 2 (NFSv2).

    It was published in 1989 in RFC 1094. NFSv2 needs a port mapper (rpc.portmap, portmap,rpcbind), which assigns the ports on which the NFS services will listen. These ports aretemporary and change when the NFS server restarts. Additional configuration is necessary

    for the ports that are used to become permanent, which makes NFS usable through firewalls,which allow traffic to only specified ports.

    NFSv2 has some limitations concerning use cases, scalability, and performance. It supports

    files only up to 2 GB, because of the 32 bit file size. The size of any single data transfer

    cannot exceed 8 KB, which hinders performance because of the high amount of NFSrequests. Another performance limiting factor is that NFSv2 works only in a synchronous way.

    Data must be written to the file system by the NFS server before the write is acknowledged tothe client (so calledstable writes). This limits the scalability of NFSv2.

    NFSv2 does not support Kerberos authentication. To grant NFS clients access to exports, theaccess is granted to the computer system that the NFS client is running on. This means anyuser on that system is able to access the exports. The limits for users are only file and

    directory permissions.

    Network File System Version 3NFS Version 3 (NFSv3) was published in 1995 in RFC 1813. It still uses the port mapper.

    NFSv3 removed some limitations and introduced some changes. The file offset is now 64 bit,allowing the support for files larger than 2 GB. The maximum transfer size limit of 8 KB isgone; the client and server can agree upon the transfer size.

    NFSv3 introduced an asynchronous method of operation (so called unstable writes). Withunstable writes, the server does not need to acknowledge the write to the file system to theclient immediately and thus can delay the write. The server must acknowledge the write only

    when it receives a commit request. This speeds up client writes and enables the server toefficiently write the data, mostly independent from the clients write operations. The NFSv3

    client is able to detect uncommitted data in an error situation and can recover from that.

    When NFSv3 was introduced, support for TCP as a transport-layer increased. Some vendorshad already added support for NFSv2 with TCP as a transport. Sun Microsystems added

    support for TCP as a transport at the same time it added support for Version 3. Using TCP asa transport made using NFS over a Wide Area Network (WAN) become more feasible.

    NFSv3 still grants access to the computer system and does not authenticate the user, and

    does not support Kerberos. This limits the use of NFSv3 to trusted networks.

    Sun Microsystems handed over the maintenance of NFS to the Internet Engineering TaskForce (IETF) before NFS Version 4 was defined and published.

    Note:RFC documents are sometimes referred to as beingInternet standards. This is notthe case, although some RFCs become a standard as well. An RFC might, for example,

    propose and describe Internet-related protocols and methods. Even though not officially astandard, it allows implementations of protocols to adhere to a specific RFC so that

    implementations based on a certain RFC might be able to interact and be compatible witheach other. The nameRFCcan be misleading; an RFC, when published, is not changed.In case there is a need for a change, a new RFC is published with a new RFC number.

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    31/371

    Chapter 2. Terminology and file serving concepts13

    Network File System Version 4NFS Version 4 (NFSv4) was published in 2000 in RFC 3010. In 2003, it was revised andpublished in RFC 3530. It was also influenced by Andrew File System (AFS) and CIFSwhich included performance improvements, mandated strong security, and introduced a

    stateful protocol. The NFSv4 server does not rely on a port mapper anymore. NFSv4 requiresTCP as the transport layer; it listens on the well known port TCP 2049. It is a stateful protocol,

    maintaining the state of objects on the server. This way the server knows about the intentionsof clients and some problems with stateless operation can be avoided. NFSv4 improves

    performance and functionality, for instance, with file system semantics for the MicrosoftWindows operating systems. It supports Windows access control lists (Windows ACLs), butnot the Portable Operating System Interface (POSIX) based on UNIX ACL, in addition to

    UNIX permissions. The security model in NFSv4 builds upon Kerberos, Low InfrastructurePublic Key Mechanism (LIPKEY), and Simple Public Key Mechanism Version 3 (SPKM-3).

    The method that is used is agreed upon by the NFS client and NFS server. Also to benegotiated are other security mechanisms such as which encryption algorithm is being used.

    A recent development is NFS version 4.1 (NFSv4.1), which was published in 2010 in RFC5661. NFSv4.1 offers new features, for instance, to use clustered installations with parallelprocessing.

    2.2.2 The Server Message Block protocolThe Server Message Block (SMB) protocol is an application-layer network protocol for

    sharing file and printing resources in a Distributed Computing Environment. Common InternetFile System (CIFS) is considered the modern dialect of SMB. It enables the access to shared

    remote resources in a similar way as though they were part of the local system. Most usageof SMB involves computers running Microsoft Windows.

    Initially, the SMB protocol was developed by IBM and further developed by Microsoft, Intel,

    IBM, 3Com, and others. An early mention of SMB is in the IBM Personal Computer SeminarProceedingsdocument from October 1984. In 1987, the SMB protocol was officially definedin a Microsoft/Intel document called Microsoft Networks/OpenNET-FILE SHARING

    PROTOCOL. Thereafter, it was developed by Microsoft and others. It has been mainly used

    with client computers running the IBM OS/2 OS versions and the Microsoft Windows family ofOSs, where the SMB protocol with the functionality to act as SMB server and SMB client isbuilt in. SMB server and SMB client implementations for other platforms became available

    and are in widespread use today.

    Overview of the original Server Message Block protocolThe SMB protocol has been developed further over the years, which results in many variantsof the protocol, called dialects. It retained compatibility with an earlier version with the abilityto negotiate the dialect to be used for a session. The dialects are defined by a standardcommand set and are identified by a standard string such as PC NETWORK PROGRAM 1.0

    Note:There are a broad range of ACL formats, which differ in syntax and semantics. TheACL format defined by Network File System version 4 (NFSv4) is called NFSv4 ACL.

    GPFS supports the NFSv4 ACL format; this implementation is sometimes referred to asGPFS NFSv4 ACL. The Storwize V7000 Unified system stores all user files in GPFS.

    Access protection in the Storwize V7000 Unified system is implemented in GPFS usingNFSv4 ACLs, and is enforced for all of the protocols that are supported by the Storwize

    V7000 Unified system: CIFS, NFS, FTP, HTTPS, and SCP. The implementation of NFSv4ACLs in GPFS does not imply that GPFS or the Storwize V7000 Unified system supportsNFSv4. The Storwize V7000 Unified system supports NFS version 2 (NFSv2) and NFS

    version 3 (NFSv3).

  • 8/11/2019 Implementing IBM Storewise v7000 unified

    32/371

    14 Implementing the IBM Storwize V7000 Unified

    (the first dialect of the SMB protocol), MICROSOFT NETWORKS 3.0, DOS LANMAN 2.1, or

    NTLM 0.12 (the SMB dialect NTLAN Manager, which is designated as CIFS).

    The name of the SMB protocol refers to the packets of data sent between the client andserver (the Server Message Blocks). Each SMB contains a request from an SMB client or a

    response from an SMB server (client/server, request response protocol).

    The SMB protocol is used to provide access to resources and access resources, calledshares. Shares can be subsets of file systems and its contents, printers, and serial ports andsome other resources. The termshareis also used because the resources might beaccessed by multiple clients (shared between them), with the protocol providing the lockingmechanisms. The SMB protocol, being a presentation/application layer protocol, has been

    implemented on top of various transport layer protocols, with NetBIOS over TCP/IP being themost common. In general, it is independent from the transport protocol, but expects it to beconnection-oriented. With changes, it can be implemented on top of a stateless protocol such

    as UDP as well.

    As stated before, the SMB protocol is compatible with an earlier version, for both the server

    and the client. When an SMB client con