Top Banner
IBM XIV Storage System Product overview GC27-3912-01
160

IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Jul 07, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

IBM XIV Storage System

Product overview

GC27-3912-01

���

Page 2: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Note:

Before using this information and the product it supports, read the information in “Notices” on page 141 and “Notices” onpage 142.

This edition applies to version 10, release 2.4, of IBM XIV Storage System and to all subsequent releases andmodifications until otherwise indicated in new editions.

© Copyright IBM Corporation 2011.US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contractwith IBM Corp.

Page 3: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Contents

Introduction . . . . . . . . . . . . . vPurpose and scope . . . . . . . . . . . . v

Document version . . . . . . . . . . . vIntended audience . . . . . . . . . . . vNotices used in this document . . . . . . . vDocument conventions. . . . . . . . . . viTerms and abbreviations . . . . . . . . . vi

Getting information, help, and service . . . . . viHow to send your comments . . . . . . . . vi

Chapter 1. Overview: The IBM XIVStorage System . . . . . . . . . . . 1Features and functionality . . . . . . . . . . 1Hardware overview . . . . . . . . . . . . 2

Hardware components . . . . . . . . . . 2Supported interfaces . . . . . . . . . . . 3Management options . . . . . . . . . . 4

Reliability . . . . . . . . . . . . . . . 5Redundant components and no single point offailure . . . . . . . . . . . . . . . 5Data mirroring. . . . . . . . . . . . . 5Self-healing mechanisms . . . . . . . . . 5Protected cache . . . . . . . . . . . . 5Redundant power . . . . . . . . . . . 6

Performance . . . . . . . . . . . . . . 6Functionality . . . . . . . . . . . . . . 7

Upgradability . . . . . . . . . . . . . 8

Chapter 2. Connectivity . . . . . . . . 9Target Connectivity . . . . . . . . . . . . 9

Defining a remote target object . . . . . . . 11Adding ports to remote target . . . . . . . 11Connecting between local and target ports . . . 12Symmetric connectivity for mirroring . . . . . 13

IP and Ethernet connectivity. . . . . . . . . 13Ethernet ports . . . . . . . . . . . . 14Management connectivity . . . . . . . . 14Field technician ports . . . . . . . . . . 15Configuration guidelines summary . . . . . 16

Host system attachment . . . . . . . . . . 16Balanced traffic and no single point of failure . . 16Dynamic rate adaptation . . . . . . . . . 16Attaching volumes to hosts . . . . . . . . 17Advanced host attachment . . . . . . . . 17CHAP authentication of iSCSI hosts . . . . . 17Clustering hosts into LUN maps . . . . . . 19Supporting VMWare extended operations . . . 21QoS performance classes . . . . . . . . . 22Updating the call home contact list . . . . . 23Host system attachment commands . . . . . 24

Chapter 3. Volumes and Snapshotsoverview . . . . . . . . . . . . . . 27The volume life cycle . . . . . . . . . . . 27

Support for Symantec Storage Foundation ThinReclamation . . . . . . . . . . . . . 28

Snapshots . . . . . . . . . . . . . . . 29Redirect on write . . . . . . . . . . . 29Storage utilization . . . . . . . . . . . 32The snapshot auto-delete priority . . . . . . 32Snapshot name and association . . . . . . . 32The snapshot lifecycle . . . . . . . . . . 32Snapshot and snapshot group format . . . . . 37Accepting the electronic license . . . . . . . 38

Chapter 4. Consistency groupsoverview . . . . . . . . . . . . . . 41Creating a consistency group . . . . . . . . 41Taking a snapshot of a consistency group . . . . 41The snapshot group life cycle . . . . . . . . 43Restoring a consistency group . . . . . . . . 44

Chapter 5. Storage pools overview. . . 45Protecting snapshots on a Storage Pool level . . . 46Thin provisioning . . . . . . . . . . . . 46

Chapter 6. Synchronous remotemirroring . . . . . . . . . . . . . . 49Remote mirroring basic concepts . . . . . . . 49Remote mirroring operation . . . . . . . . . 50Configuration options . . . . . . . . . . . 51

Volume configuration . . . . . . . . . . 51Communication errors . . . . . . . . . . 52Coupling activation. . . . . . . . . . . 52

Synchronous mirroring statuses. . . . . . . . 53Link status . . . . . . . . . . . . . 53Operational status . . . . . . . . . . . 54Synchronization status. . . . . . . . . . 54

I/O operations . . . . . . . . . . . . . 55Synchronization process . . . . . . . . . . 56

State diagram. . . . . . . . . . . . . 56Coupling recovery . . . . . . . . . . . 57Uncommitted data . . . . . . . . . . . 57Constraints and limitations . . . . . . . . 57Last-consistent snapshots . . . . . . . . . 58Secondary locked error status . . . . . . . 59

Role switchover . . . . . . . . . . . . . 60Role switchover when remote mirroring isoperational . . . . . . . . . . . . . 60Role switchover when remote mirroring isnonoperational . . . . . . . . . . . . 60Resumption of remote mirroring after rolechange . . . . . . . . . . . . . . . 62

Miscellaneous . . . . . . . . . . . . . 63Remote mirroring and consistency groups . . . 63Using remote mirroring for media error recovery 64Supported configurations . . . . . . . . . 64I/O performance versus synchronization speedoptimization . . . . . . . . . . . . . 64

© Copyright IBM Corp. 2011 iii

Page 4: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Implications regarding other commands . . . . 64

Chapter 7. Asynchronous remotemirroring . . . . . . . . . . . . . . 67Chapter scope . . . . . . . . . . . . . 68

Features highlights . . . . . . . . . . . 68Terminology . . . . . . . . . . . . . 70Specifications . . . . . . . . . . . . . 70

Technological overview . . . . . . . . . . 71Replication scheme . . . . . . . . . . . 71Snapshot-based technology . . . . . . . . 72Mirroring special snapshots . . . . . . . . 73Initializing the mirroring . . . . . . . . . 73The sync job . . . . . . . . . . . . . 75Mirroring schedules and intervals . . . . . . 76The mirror snapshot (ad-hoc sync job) . . . . 77Determining replication and mirror states . . . 78Walking through the asynchronous mirroringprocess . . . . . . . . . . . . . . . 88Peers roles. . . . . . . . . . . . . . 94Activating the mirroring . . . . . . . . . 94

Mirroring consistency groups . . . . . . . . 96Setting a consistency group to be mirrored . . . 98Setting-up a mirrored consistency group. . . . 98Adding a mirrored volume to a mirroredconsistency group . . . . . . . . . . . 99Removing a volume from a mirrored consistencygroup . . . . . . . . . . . . . . . 99

Administering asynchronous mirroring tasks . . . 99Accommodating disaster recovery scenarios . . 99Overview of select asynchronous mirroringcommands . . . . . . . . . . . . . 104

Chapter 8. Data migration . . . . . . 109Data migration overview . . . . . . . . . 109I/O handling in data migration . . . . . . . 110Data migration stages . . . . . . . . . . 110Handling failures . . . . . . . . . . . . 112

Chapter 9. Event handling . . . . . . 113Event information . . . . . . . . . . . . 113Viewing events . . . . . . . . . . . . . 114Defining events notification rules . . . . . . . 114

Alerting events configuration limitations . . . 115Defining destinations . . . . . . . . . . . 115Defining gateways. . . . . . . . . . . . 115

Chapter 10. Access control . . . . . 117User roles and permission levels . . . . . . . 117

Predefined users . . . . . . . . . . . 118Application administrator . . . . . . . . 119

Authentication methods . . . . . . . . . . 120Native authentication. . . . . . . . . . 121LDAP-authentication . . . . . . . . . . 122Switching between LDAP and nativeauthentication modes. . . . . . . . . . 127

Administering access control . . . . . . . . 128Logging and event reporting . . . . . . . 128Access control commands . . . . . . . . 128Glossary of access control concepts . . . . . 130

Chapter 11. Tivoli Storage ProductivityCenter and SMI-S interoperability. . . 131

Chapter 12. Nondisruptive code load 133

Glossary . . . . . . . . . . . . . 135

Notices . . . . . . . . . . . . . . 141Notices . . . . . . . . . . . . . . . 142Copyrights . . . . . . . . . . . . . . 143Trademarks . . . . . . . . . . . . . . 143

Index . . . . . . . . . . . . . . . 145

iv IBM XIV Storage System: Product overview

Page 5: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Introduction

The IBM® XIV® Storage System is designed for secure, dependable,enterprise-grade data storage and access, straightforward installation andupgrading, and full scalability. The system contains proprietary and innovativealgorithms that offset hardware malfunctions, minimize maintenance, and provideflexibility. The system uses off-the-shelf hardware components that are easy tointegrate and support.

Purpose and scope

This document contains a complete hardware and software system overview of theIBM XIV Storage System. Relevant tables, charts, graphic interfaces, sampleoutputs, and appropriate examples are also provided.

Document version

This document supports version 11.0.0 of the IBM XIV Storage System code.

Intended audience

This document is a reference for administrators and IT staff that work with theIBM XIV Storage System.

Notices used in this document

The caution and danger statements used in this document also appear in themultilingual IBM XIV Storage System Safety Notices document. Each caution anddanger statement is numbered for easy reference to the corresponding statementsin the safety document.

The following types of notices and statements are used in this document:

Note These notices provide important tips, guidance, or advice.

ImportantThese notices provide information or advice that might help you avoidinconvenient or problem situations.

AttentionThese notices indicate possible damage to programs, devices, or data. Anattention notice is placed just before the instruction or situation in whichdamage could occur.

CautionThese statements indicate situations that can be potentially hazardous topeople because of some existing condition, or where a potentiallydangerous situation might develop because of some unsafe practice. Acaution statement is placed just before the description of a potentiallyhazardous procedure step or situation.

DangerThese statements indicate situations that can be potentially lethal or

© Copyright IBM Corp. 2011 v

Page 6: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

extremely hazardous to people. A danger statement is placed just beforethe description of a potentially lethal or extremely hazardous procedurestep or situation.

Document conventions

The following conventions are used in this document:

boldfaceText in boldface represents menu items and lowercase or mixed-casecommand names.

italics Text in italics is used to emphasize a word. In command syntax, it is usedfor variables for which you supply actual values.

monospaceText in monospace identifies the data or commands that you type, samplesof command output, or examples of program code or messages from thesystem.

Terms and abbreviations

A complete list of terms and abbreviations can be found in the “Glossary” on page135.

Getting information, help, and serviceIf you need help, service, technical assistance, or just want more information aboutIBM products, you will find a variety of sources to assist you. The following tableprovides a list of Web pages that you can view to get information about IBMproducts and services and to find the latest technical information and support:

Table 1. IBM Web sites for help, information and service

Web site Description

http://www.ibm.com Main IBM home page

http://www.ibm.com/storage/support IBM Support home page

http://www.ibm.com/planetwide IBM Support page with pointers to therelevant contact information for a specificcountry

How to send your commentsYour feedback is important in helping us provide the most accurate andhigh-quality information. If you have comments or suggestions for improving thisdocument, send us your comments by e-mail to [email protected] or use theReaders' Comments form at the back of this publication. Be sure to include thefollowing:v Exact publication titlev Form number (for example, GC26-1234-02)v Page numbers to which you are referring

If the Reader's Comment Form in the back of this manual is missing, you candirect your mail to:

vi IBM XIV Storage System: Product overview

Page 7: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

International Business Machines CorporationInformation DevelopmentDepartment GZW9000 South Rita RoadTucson, Arizona 85744-0001 U.S.A.

When you send information to IBM, you grant IBM a nonexclusive right to use ordistribute the information in any way it believes appropriate without incurring anyobligation to you.

Introduction vii

Page 8: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

viii IBM XIV Storage System: Product overview

Page 9: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Chapter 1. Overview: The IBM XIV Storage System

This chapter covers the various features and functions of the IBM XIV StorageSystem, including an overview of its hardware and software components. Thisoverview includes a brief description of its key design principles from the system'spoint of view, but does not cover the functionality from the user's point of view,which is covered in the subsequent chapters.

Features and functionalityThe IBM XIV Storage System is characterized by the following set of features:

Performance

v Perfect load balancingv Cache and disks in every modulev Extremely fast rebuild time in the event of disk failurev Constant, predictable high performance with zero tuning

Reliability

v Unique data distribution method that eliminates "hot spots"v Fault tolerance, failure analysis, and self-healing algorithmsv No single-point-of-failure

Scalability

v Support for thin provisioningv Support for instant space reclamationv Data migration

Connectivity

v iSCSI and Fibre Channel (FC) interfacesv Multiple host access

Snapshots

v Innovative snapshot functionality, including support for practicallyunlimited number of snapshots, snap-of-snap and restore-from-snap

Replication

v Synchronous and asynchronous replication of a volume (as well as aconsistency group) to a remote system

Ease of management

v Support for storage pools administrative unitsv Remote configuration managementv Non-disruptive maintenance and upgradesv Management software, including a graphical user interface (GUI) and a

command-line interface (CLI)v Notifications of events through e-mail, SNMP, or SMS messagesv XIV is supported by the following IBM products:

– IBM Tivoli Storage Productivity Center Suite. The IBM Tivoli StorageProductivity Center suite of storage infrastructure management toolscan help customers improve time to value, as well as reduce the

© Copyright IBM Corp. 2011 1

Page 10: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

complexity of managing their storage environments by centralizing,simplifying and optimizing storage tasks associated with storagesystems, storage networks, replication services and capacitymanagement.

– The Tivoli Storage FlashCopy Manager supports application-awaresnapshots with XIV. IBM Tivoli® Storage FlashCopy® Managersoftware provides fast application-aware backups and restoresleveraging advanced snapshot technologies in IBM storage systems.

– Tivoli Storage Manager (with Tivoli Storage FlashCopy Manager aspart of it) supported XIV-based backup and restore. IBM Tivoli®

Storage Manager software provides a wide range of storagemanagement capabilities from a single point of control, helpingcompanies ride the information tidal wave.

Hardware overviewThis section provides a general overview of the IBM XIV Storage System hardware.

Hardware componentsThe IBM XIV Storage System configuration includes data modules, interfacemodules, Ethernet switches, and uninterruptible power supply units.

Data ModulesEach Data module contains 12 disks DDR3 and 24GB of cache memory.IBMXIV supports all sorts of Near-line (7200rpm) SAS drives, in particular 2TB.The disk drives serve as the nonvolatile memory for storing data in the

Figure 1. IBM XIV Storage System

2 IBM XIV Storage System: Product overview

Page 11: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

storage grid and the cache memory is used for caching data previouslyread, prefetching of data from a disk, and for delayed destaging ofpreviously written data.

Note: Data modules are located on both upper and lower sections of theRack.

InfiniBand Switch (x2)

v Dual power supplyv Each IB switch is connected to each XIV modulev Both IB switches are inter-connected on their ports 16,17v Port 18 is left empty for sparev Ports 19-36 are inactive

Maintenance ModuleAllows remote support access using a modem.

Interface Modules (IM)Each contains disk drives and cache memory similar to the Data Modules.In addition, these modules have Host Interface Adapters with FC andiSCSI ports.

8Gbps FC

v 2 dual-port FC HBAs on each interface module, i.e. 4 ports on eachinterface module, i.e. 24 ports on a full rack.

Uninterruptible power supply module complexThe uninterruptible power supply module complex consists of three units.It maintains an internal power supply in the event of a temporary failureof the external power supply. In the case of a continuous external powerfailure, the uninterruptible power supply module complex maintainspower long enough for a safe and ordered shutdown of the IBM XIVStorage System. The IBM XIV Storage System can sustain the failure of oneuninterruptible power supply unit while protecting against external powerfailures.

ATS The Automatic Transfer Switch (ATS) switches between line cords in orderto allow redundancy of external power.

ModemAllows the system to receive a connection for remote access by IBMsupport. The modem connects to the maintenance module.

Data and interface modules are generically referred to as "modules". Modulescommunicate with each other by means of the PCIe Adapter. Each module containsredundant ports for module to module communication. The ports are all linked tothe internal network through the switches. In addition, for monitoring purposes,the UPSs are directly connected to the individual modules.

Supported interfacesThe following interfaces are supported by the IBM XIV Storage System:v Fibre Channel for host-based I/Ov Gigabit Ethernet for host-based I/O using the iSCSI protocolv Gigabit Ethernet for management (GUI or CLI) connectivityv Remote access interfaces:

Chapter 1. Overview: The IBM XIV Storage System 3

Page 12: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

– Call-home connection - connecting the IBM XIV Storage System to an IBMtrouble-ticketing system.

– Broadband connection (VPN) - provides a two-way broadband access to thesystem for remote access by IBM support.

– Modem - for incoming calls only. The customer has to provide telephone lineand number. The modem provides secondary means for providing remoteaccess for IBM Support.

Management optionsThe IBM XIV Storage System provides several management options.

GUI and CLI management applicationsThese applications must be installed on each workstation that will be usedfor managing and controlling the system. All configurations andmonitoring aspects of the system can be controlled through the GUI or theCLI.

SNMPThird-party SNMP-based monitoring tools are supported using the IBMXIV MIB.

E-mail notificationsThe IBM XIV Storage System can notify users, applications or both throughe-mail messages regarding failures, configuration changes, and otherimportant information.

SMS notificationsUsers can be notified through SMS of any system event.

Figure 2. The IBM XIV Storage System Interfaces

4 IBM XIV Storage System: Product overview

Page 13: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

ReliabilityIBM XIV Storage System reliability features include data mirroring, spare storagecapacity, self-healing mechanisms, and data virtualization.

Redundant components and no single point of failureIBM XIV Storage System hardware components are fully redundant, and ensurefailover protection for each other to prevent a single point of system failure.

System failover processes are transparent to the user because they are swiftly andseamlessly completed.

Data mirroringData arriving from the host for storage is temporarily placed in two separatecaches before it is permanently written to two disk drives located in separatemodules. This guarantees that the data is always protected against possible failureof individual modules, and this protection is in effect even before data has beenwritten to the nonvolatile disk media.

Self-healing mechanismsThe IBM XIV Storage System includes built-in mechanisms for self-healing to takecare of individual component malfunctions and to automatically restore full dataredundancy in the system within minutes.

Self-healing mechanisms dramatically increase the level of reliability in the IBMXIV Storage System. Rather than necessitating a technician's on-site intervention inthe case of an individual component malfunction to prevent a possible malfunctionof a second component, the automatically restored redundancy allows a relaxedmaintenance policy based on a pre-established routine schedule.

Self-healing mechanisms are not just started in a reactive fashion following anindividual component malfunction, but also proactively - upon detection ofconditions indicating potential imminent failure of a component. Often, potentialproblems are identified well before they might occur with the help of advancedalgorithms of preventive self-analysis that are continually running in thebackground. In all cases, self-healing mechanisms implemented in the IBM XIVStorage System identify all data portions in the system for which a second copyhas been corrupted or is in danger of being corrupted. The IBM XIV StorageSystem creates a secure second copy out of the existing copy, and it stores it in themost appropriate part of the system. Taking advantage of the full datavirtualization, and based on the data distribution schemes implemented in the IBMXIV Storage System, such processes are completed with minimal data migration.

As with all other processes in the system, the self-healing mechanisms arecompletely transparent to the user, and the regular activity of responding to I/Odata requests is thoroughly maintained with no degradation to systemperformance. Performance, load balance, and reliability are never compromised bythis activity.

Protected cacheIBM XIV Storage System cache writes are protected. Cache memory on a module isprotected with ECC (Error Correction Coding). All write requests are written totwo separate cache modules before the host is acknowledged. The data is laterdestaged to disks.

Chapter 1. Overview: The IBM XIV Storage System 5

Page 14: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Redundant powerRedundancy of power is maintained in the IBM XIV Storage System through thefollowing means:v Three uninterruptible power supply units - the system can run indefinitely on

two uninterruptible power supply units. No system component will lose powerif a single uninterruptible power supply unit fails.

v Redundant power supplies in each data and interface module. There are twopower supplies for each module and each power supply for a module ispowered by a different uninterruptible power supply unit.

v Redundant power for Ethernet switches - each Ethernet switch is powered bytwo uninterruptible power supply units. One is a direct connect; one is throughthe Ethernet switch redundant power supply.

v Redundant line cords - to protect against the loss of utility power, two line cordsare supplied to the ATS. If utility power is lost on one line cord, the ATSautomatically switches to the other line cord, without impacting the system.

v In the event of loss of utility power on both line cords, the uninterruptiblepower supply units will maintain power to the system until an emergencydestage of all data in the system can be performed. Once the emergency destagehas completed, the system will perform a controlled power down.

PerformanceTheIBM XIV Storage System is a ground breaking, high performance storageproduct designed to help enterprises overcome this challenge through anexceptional mix of game-changing characteristics and capabilities

Breakthrough architecture and designThe revolutionary design of IBM XIV Storage System enables exceptionalperformance optimization typically unattainable by traditionalarchitectures. This optimization results in superior utilization of systemresources and automatic workload distribution across all system harddrives. It also empowers administrators to tap into the system’s rich set ofbuilt-in, advanced functionality such as thin provisioning, mirroring andsnapshots without adversely affecting performance.

Consistent, predictable performance and scalabilityThe IBM XIV Storage System’s ability to optimize load distribution acrossall disks for all workloads, coupled with a powerful distributed cacheimplementation, facilitates high performance that scales linearly withadded storage enclosures. Because this high performance isconsistent—without the need for manual tuning—users can enjoy the samehigh performance during the typical peaks and troughs associated withvolume and snapshot usage patterns, even after a component failure.

Resilience and self-healingThe IBM XIV Storage System maintains resilience during hardware failures,continuing to function with minimal performance impact. Additionally, thesolution’s advanced self-healing capabilities allow it to withstandadditional hardware failures once it recovers from the initial failure.

Automatic optimization and managementUnlike traditional storage solutions, the IBM XIV Storage Systemautomatically optimizes data distribution through hardware configurationchanges such as component additions, replacements or failure. This helpseliminate the need for manual tuning or optimization.

6 IBM XIV Storage System: Product overview

Page 15: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

FunctionalityIBM XIV Storage System functions include point-in-time copying, automaticnotifications, and ease of management through a GUI or CLI.

Snapshot management

The IBM XIV Storage System provides powerful snapshot mechanisms for creatingpoint-in-time copies of volumes.

The snapshot mechanisms include the following features:v Differential snapshots, where only the data that differs between the source

volume and its snapshot consumes storage spacev Instant creation of a snapshot without any interruption of the application,

making the snapshot available immediatelyv Writable snapshots, which can be used for a testing environment; storage space

is only required for actual data changesv Snapshot of a writable snapshot can be takenv High performance that is independent of the number of snapshots or volume

sizev The ability to restore from snapshot to volume or snapshot

Consistency groups for snapshots

Volumes can be put in a consistency group to facilitate the creation of consistentpoint-in-time snapshots of all the volumes in a single operation. This is essentialfor applications that use several volumes concurrently and need a consistentsnapshot of all these volumes at the same point in time.

Storage pools

The storage space of the IBM XIV Storage System can be administrativelyportioned into storage pools to enable the control of storage space consumption forspecific applications or departments. Storage pools are used to administer thestorage resources of volumes and snapshots.

Remote monitoring and diagnostics

IBM XIV Storage System can email important system events to IBM Support. Thisallows IBM to immediately detect hardware failures warranting immediateattention and react swiftly (e.g., dispatch service personnel). Additionally, IBMsupport personnel can conduct remote support and generate diagnostics for bothmaintenance and support purposes. All remote support is subject to customerpermission and remote support sessions are protected with a challenge responsesecurity mechanism.

SNMP

Third-party SNMP-based monitoring tools are supported for the IBM XIV StorageSystem MIB.

Chapter 1. Overview: The IBM XIV Storage System 7

Page 16: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Multipathing

The parallel design underlying the activity of the Host Interface modules and thefull data virtualization achieved in the system implement thorough multi-pathingaccess algorithms. Thus, as the host connects to the system through severalindependent ports, each volume can be accessed directly through any of the HostInterface modules, and no interaction has to be established across the variousmodules of the Host Interface array.

Automatic event notifications

The system can be set to automatically transmit appropriate alarm notificationmessages through SNMP traps, or e-mail messages. The user can configure varioustriggers for sending events and various destinations depending on the type andseverity of the event. The system can also be configured to send notifications untila user acknowledges their receipt.

Management through GUI and CLI

The IBM XIV Storage System offers a user-friendly and intuitive GUI applicationand CLI commands to configure and monitor the system. These featurecomprehensive system management functionality, encompassing hosts, volumes,consistency groups, storage pools, snapshots, mirroring relationships, datamigration, events and more.

For more information, see Chapter 1, “Overview: The IBM XIV Storage System,” onpage 1 and the IBM XIV Storage System XCLI User Manual.

External replication mechanisms

External replication and mirroring mechanisms in the IBM XIV Storage System arean extension of the internal replication mechanisms and of the overall functionality ofthe system. These features provide protection against a site disaster to ensureproduction continues. The mirroring can be performed over either Fibre Channelor iSCSI, and the host-to-storage protocol is independent of the mirroring protocol.

UpgradabilityThe IBM XIV Storage System is available in a partial rack system comprised of asfew as six (6) modules, or as many as fifteen (15) modules per rack.

Partial rack systems may be upgraded by adding data and interface modules, upto the maximum of fifteen (15) modules per rack.

The system supports a non-disruptive upgrade of the system, as well as hotfixupdates.

8 IBM XIV Storage System: Product overview

Page 17: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Chapter 2. Connectivity

This chapter describes the way the storage system connects internally andexternally.

Target connectivityDefines the communication topology between a local storage system andremote storage system.

IP and interface connectivityIntroduces various configuration options of the storage system.

Host connectivityIntroduces various topics regarding the way the storage system connects toits hosts.

Target ConnectivityThe Target Connectivity feature enables defining the communication topologybetween a local storage system and remote storage system.

Introduction

The Target Connectivity feature enables defining the communication topologybetween a local storage system and remote storage system. This allows enablingremote mirroring and data migration. The system can be defined so that the localstorage system can both write or read to and from the remote storage system, orallow the target storage system to write to or read from the local system.

Target connectivity definition includes:1. Defining a remote target object2. Adding all remote target ports3. Define connectivity between local system ports and remote target.

This chapter explains the concepts behind remote target definitions, and alsodescribes the process of manually defining remote targets through CLI commands.

Note: The entire remote target definition process is easily performed through theGUI wizard, which also allows defining a symmetric connection between twosystems in a single process.

Defining a remote target object

A remote target object is defined through the target_define command. The remotetarget object represents a storage system other than the current system. Onceremote target objects are defined they can be used for either data migration (fromany storage system) or mirroring (from other IBM XIV systems only).

The user needs to specify the protocol used to access the remote target, either FibreChannel or iSCSI. When defining a remote target that is specified to remotelymirror volumes, the target_allow_mirroring command should be executed. Thiscommand, which allows mirroring, will let administrators working from a remotesystem to define mirroring slave volumes on the local system.

© Copyright IBM Corp. 2011 9

Page 18: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Remote target object are referenced in the mirror_create (creating a remote mirror)and dm_create (creating a data migration process) commands. Remote targetobjects can be manipulated through these commands:v target_delete

v target_rename

v target_list

v target_update

Adding ports to a remote target

Once a remote target object is defined, the user can add the remote target portaddresses to the system.

Defining a port is done by simply defining the Fibre Channel port or iSCSIaddress. The port type must conform to the target type.

Note: If remote mirroring is will be used over the remote target than both iSCSItarget and iSCSI initiator ports on the remote system must be defined. If theremote target is defined for data migration only, it is enough to define only theiSCSI target ports on the remote target.

Ports can be added to the system through the target_port_add command. Afterthe ports are added they can be managed using these commands:v target_port_delete (Allows deleting a target port.)v target_port_activate (Allows activating a target port.)v target_port_deactivate (Allows deactivating a target port.)v target_port_list (Allows listing and showing the status of target ports.)

Defining connectivity between local ports and remote targetports

Four logical command groups allow managing connectivity between local portsand remote target ports.

v target_connectivity_define

This command is used to defineconnectivity between a local system portand a remote port on a remote target. Thiscommand defines the connectivity as anoptional path that can be used. The usermust ensure that the two ports are actuallyconnected.

v fc_connectivity_list,ipinterface_run_traceroute

These commands are used to list whichremote target ports are visible. Local targetports are shown using thefc_connectivity_list command and remotetarget IP interfaces are listed using theipinterface_run_traceroute command.

v target_connectivity_list This command is used to view the currentdefinitions as well as the current connectionstatus.

v target_connectivity_delete,target_connectivity_activate,target_connectivity_deactivate

These commands are used to delete, activateand deactivate target connectivity.

10 IBM XIV Storage System: Product overview

Page 19: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Symmetric connectivity for mirroring

When defining mirroring of a volume on a remote system, the local system mustbe defined as a remote target on the remote system. This is required sincemirroring roles can be switched and therefore all definitions must be symmetric.

Defining a remote target objectDefine a remote target object in order to allow for data migration or mirroring(from other IBM XIV Storage Systems).

The remote target object - a storage system other than the local - is definedthrough the target_define command. The target_define command specifies thefollowing connectivity attributes:

target The local name of the target storage system.

protocolThe protocol used to access the remote target (either Fibre Channel oriSCSI).

iscsi_nameThe iSCSI name of the target.

system_idThe ID of the target as viewed by the target.

xiv_featuresDeclares whether the target is an IBM XIV Storage System. If so, mirroringis applicable. If not, only data migration is applicable.

Target-related commands

Remote target objects can be manipulated through the following commands:

target_deleteDeletes a target. The deleted target is no longer viewed by the local storagesystem.

target_renameRenames the target.

Note: The attribute that is renamed is the name of the target as viewed bythe local storage system.

target_listLists the target's ports along with their activity status and mirroring-relatedvalues Chapter 2, “Connectivity,” on page 9.

target_updateUpdates mirroring-related attributes.

Adding ports to remote targetAfter a remote target object is defined, you can add the remote target portaddresses to the local system.

Defining a port is done by simply providing the Fibre Channel port or iSCSIaddress. This is done according to the following guidelines:v The port type must conform to the target type.

Chapter 2. Connectivity 11

Page 20: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

v Both iSCSI target and the iSCSI initiator ports on the remote system are requiredfor remote mirroring.

The ports are added to the system through the target_port_add command. Thiscommand provides the local system with the following:

target The name of the target system.

ipaddressThe IP address of the port on the target system (for iSCSI type targetsonly).

fcaddressThe FC address of the port on the target system (for FC type targets only).

The added port is set to active state, making it available for use.

Port-related commands

After the ports are added, they can be managed using the following commands:

target_port_deleteDeletes the address of a specific target port.

target_port_deactivateSets the port to be unavailable for use without deleting it.

target_port_activateReactivate an inactive port.

target_port_listListing ports of a given target along with their addresses and active status.

Connecting between local and target portsOnce added, the target system's ports are connected to the ports of the localsystem.

The connectivity between ports is an optional path that is available for use. It isdefined using the target_connectivity_define command:

target The target system.

ipaddress/fcaddressThe port address (ipaddress for iSCSI; fcaddress for FC).

local_ipinterfaceThe interface on the local system.

local_portThe FC port (applicable for FC connectivity only).

Table 2. Port connectivity commands

Command Description

target_connectivity_define This command is used to define connectivity between alocal system port and a remote port on a remote target.This command defines the connectivity as an optionalpath that can be used. The user must ensure that thetwo ports are actually connected.

12 IBM XIV Storage System: Product overview

Page 21: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Table 2. Port connectivity commands (continued)

Command Description

fc_connectivity_listipinterface_run_traceroute

These commands are used to list which remote targetports are visible. Local target ports are shown using thefc_connectivity_list command and remote target IPinterfaces are listed using theipinterface_run_traceroute command.

target_connectivity_list This command is used to view the current definitionsand the current connection status.

target_connectivity_deletetarget_connectivity_activatetarget_connectivity_deactivate

These commands are used to delete, activate, anddeactivate target connectivity.

Port connectivity-related commands

List commands

fc_connectivity_listLists all available targets throughout the FC network.

ipinterface_run_tracerouteLists all available connectivity to remote IP nodes using the ICMPtrace-route mechanism.

target_connectivity_listLists the local system's ports definitions and status.

Management commands

target_connectivity_deleteDeletes a port connectivity.

target_connectivity_deactivateSetting a connection between ports to be unavailable.

target_connectivity_activateActivates a deactivated connectivity.

Symmetric connectivity for mirroringRemote mirroring features role switchover between the local and remote system.This requires the target system to have a symmetric connection to the local system.That is, just as the local system have a definition of the remote system, the remotesystem has to view the local system as its own remote.

Symmetric connectivity is achieved through the target_mirroring_allowcommand.

IP and Ethernet connectivity

The following topics provide a basic explanation of the various Ethernet ports andIP interfaces that can be defined and various configurations that are possiblewithin the IBM XIV Storage System.

The IBM XIV Storage System IP connectivity provides:v iSCSI services over IP or Ethernet networksv Management communication

Chapter 2. Connectivity 13

Page 22: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Ethernet ports

The following three types of Ethernet ports are available:

iSCSI service portsThese ports are used for iSCSI over IP or Ethernet services. A fullyequipped rack is configured with six Ethernet ports for iSCSI service.These ports should connect to the user's IP network and provideconnectivity to the iSCSI hosts. The iSCSI ports can also acceptmanagement connections.

Management portsThese ports are dedicated for IBM XIV command-line interface (XCLI) andIBM XIV Storage Management GUI communications, as well as being usedfor outgoing SNMP and SMTP connections. A fully equipped rack containsthree management ports.

Field technician portsThese ports are used for incoming management traffic only (usage is bothXCLI and IBM XIV Storage Management GUI access). The ports areutilized only for the field technician's laptop computer and must not beconnected to the user's IP network.

Management connectivity

Management connectivity is used for the following functions:v Executing XCLI commands through the IBM XIV command-line interface (XCLI)v Controlling the IBM XIV Storage System through the IBM XIV Storage

Management GUIv Sending e-mail notification messages and SNMP traps about event alerts

To ensure management redundancy in case of module failure, the IBM XIV StorageSystem management function is accessible from three different IP addresses. Eachof the three IP addresses is handled by a different hardware module. The variousIP addresses are transparent to the user and management functions can beperformed through any of the IP addresses. These addresses can be accessedsimultaneously by multiple clients. Users only need to configure the IBM XIVStorage Management GUI or XCLI for the set of IP addresses that are defined forthe specific system.

Note: All management IP interfaces must be connected to the same subnet and usethe same network mask, gateway, and MTU.

XCLI and IBM XIV Storage Management GUI management

The IBM XIV Storage System management connectivity system allows users tomanage the system from both the XCLI and IBM XIV Storage Management GUI.Accordingly, the XCLI and IBM XIV Storage Management GUI can be configuredto manage the system through iSCSI IP interfaces. Both XCLI and IBM XIV StorageManagement GUI management is run over TCP port 7778. With all trafficencrypted through the Secure Sockets Layer (SSL) protocol.

System-initiated IP communication

The IBM XIV Storage System can also initiate IP communications to send eventalerts as necessary. Two types of system-initiated IP communications exist:

14 IBM XIV Storage System: Product overview

Page 23: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Sending e-mail notifications through the SMTP protocolE-mails are used for both e-mail notifications and for SMS notificationsthrough the SMTP to SMS gateways.

Sending SNMP traps

Note: SMPT and SNMP communications can be initiated from any of thethree IP addresses. This is different from XCLI and IBM XIV StorageManagement GUI, which are user initiated. Accordingly, it is important toconfigure all three IP interfaces and to verify that they have networkconnectivity.

Field technician ports

The IBM XIV Storage System supports two Ethernet ports. These ports arededicated for the following reasons:v Field technician usev Initial system configurationv Direct connection for service staff when they can not connect to customer

networkv Directly manage the IBM XIV Storage System through a laptop computer

Laptop connectivity - configuring using DHCP

Two field technician ports are provided for redundancy purposes. This ensures thatfield technicians will always be able to connect a laptop to the IBM XIV StorageSystem. These two ports use a Dynamic Host Configuration Protocol (DHCP)server. The DHCP server will automatically assign IP addresses to the user's laptopand connects the laptop to the IBM XIV Storage System network. A laptopconnected to any of the field technician ports is assigned an IP address and theIBM XIV Storage Management GUI or IBM XIV command-line interface (XCLI)will typically use the predefined configuration direct-technician-port.

Note: The two field technician laptop ports are used only to connect directly to theIBM XIV Storage System and should never be connected to the customer'snetwork.

Laptop connectivity - configuring without DHCP

If the technician's laptop is not setup to receive automatic IP configurationinformation through DHCP, the laptop should be defined using these parameters:

IP address:14.10.202.1

Netmask:255.255.255.0

Gateway:none

MTU:1536

The field technician ports accept both XCLI and IBM XIV Storage ManagementGUI communications. SNMP and SMTP alerts are not sent through these ports.

Chapter 2. Connectivity 15

Page 24: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Note: Each of the field technician ports is connected to a different module.Therefore, if a module fails, the port will become inoperative. When this happens,the laptop should be connected to the second port.

Configuration guidelines summary

When shipped, the IBM XIV Storage System does not have any IP managementconfigurations. Accordingly, the following procedures should be performed whenfirst setting up the system:v Connecting a laptop to one of the field technician laptop ports on the patch

panelv Configuring at least one management IP interfacev Continuing the configuration process from either the technician port or from the

configured IP interface

Note: It is important to define all three management IP interfaces and to testoutgoing SNMP and SMTP connections from all three interfaces. The dest_testcommand can be used to test outgoing notifications on a specific module.

Host system attachmentThe IBM XIV Storage System attaches to hosts of various operating systems.

The IBM XIV Storage System attaches to hosts through a set of Host AttachmentKits and complementary utilities.

Note: The term host system attachment was previously known as host connectivity ormapping. These terms are obsolete.

Balanced traffic and no single point of failureAll host traffic (I/O) is served through up to six interface modules (modules 4-9).Although the IBM XIV Storage System distributes the traffic across all systemmodules , the storage administrator is responsible for ensuring that host I/Ooperations are equally distributed among the different interface modules.

The workload balance should be watched and reviewed when host traffic patternschange. The IBM XIV Storage System does not automatically balance incominghost traffic. The storage administrator is responsible for ensuring that hostconnections are made redundantly in such a way that a single failure, such as in amodule or HBA, will not cause all paths to the machine to fail. In addition, thestorage administrator is responsible for making sure the host workload isadequately spread across the different connections and interface modules.

Dynamic rate adaptationThe IBM XIV Storage System provides a mechanism for handling insufficientbandwidth and external connections for the mirroring process.

The mirroring process replicates a local site on a remote site (See the Chapter 6,“Synchronous remote mirroring,” on page 49 and Chapter 7, “Asynchronousremote mirroring,” on page 67 chapters later on this document). To accomplishthis, the process depends on the availability of bandwidth between the local andremote storage systems.

16 IBM XIV Storage System: Product overview

Page 25: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

The mirroring process' sync rate attribute determines the bandwidth that isrequired for a successful mirroring. Manually configuring this attribute, the usertakes into account the availability of bandwidth for the mirroring process, wherethe IBM XIV Storage System adjusts itself to the available bandwidth. Moreover, insome cases the bandwidth is sufficient, but external IOs latency causes themirroring process to fall behind incoming IOs, thus to repeat replication jobs thatwere already carried out, and eventually to under-utilize the available bandwidtheven if it was adequately allocated.

The IBM XIV Storage System prevents IO time-outs through continuouslymeasuring the IO latency. Excess incoming IOs are pre-queued until they can besubmitted. The mirroring rate dynamically adapts to the number of pre-queuedincoming IOs, allowing for a smooth operation of the mirroring process.

Attaching volumes to hostsWhile the IBM XIV Storage System identifies volumes and snapshots by name,hosts identify volumes and snapshots according to their logical unit number(LUN).

A LUN is an integer that is used when attaching a system's volume to a registeredhost. Each host can access some or all of the volumes and snapshots on the storagesystem, up to a set maximum. Each accessed volume or snapshot is identified bythe host through a LUN.

For each host, a LUN identifies a single volume or snapshot. However, differenthosts can use the same LUN to access different volumes or snapshots.

Advanced host attachmentThe IBM XIV Storage System provides flexible host attachment options.

The following host attachment options are available:v Definition of different volume mappings for different ports on the same hostv Support for hosts that have both Fibre Channel and iSCSI ports. Although it is

not advisable to use these two protocols together to access the same volume, adual configuration can be useful in the following cases:– As a way to smoothly migrate a host from Fibre Channel to iSCSI– As a way to access different volumes from the same host, but through

different protocols

CHAP authentication of iSCSI hostsThe MS-CHAP extension enables authentication of initiators (hosts) to the IBM XIVStorage System and vice versa in unsecured environments.

When CHAP support is enabled, hosts are securely authenticated by the IBM XIVStorage System. This increases overall system security by verifying that onlyauthenticated parties are involved in host-storage interactions.

Definitions

The following definitions apply to authentication procedures:

CHAP Challenge Handshake Authentication Protocol

Chapter 2. Connectivity 17

Page 26: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

CHAP authenticationAn authentication process of an iSCSI initiator by a target throughcomparing a secret hash that the initiator submits with a computed hash ofthat initiator's secret which is stored on the target.

InitiatorThe host.

Oneway (unidirectional CHAP)CHAP authentication where initiators are authenticated by the target, butnot vice versa.

Supported configurations

CHAP authentication typeOneway (unidirectional) authentication mode, meaning that the Initiator(host) has to be authenticated by the IBM XIV Storage System.

MDS CHAP authentication utilizes the MDS hashing algorithm.

Access scopeCHAP-authenticated Initiators are granted access to the IBM XIV StorageSystem via mapping that may restrict access to some volumes.

Authentication modes

The IBM XIV Storage System supports the following authentication modes:

None (default)In this mode, an initiator is not authenticated by the IBM XIV StorageSystem.

CHAP (oneway)In this mode, an initiator is authenticated by the IBM XIV Storage Systembased on the pertinent initiator's submitted hash, which is compared to thehash computed from the initiator's secret stored on the IBM XIV StorageSystem.

Changing the authentication mode from None to CHAP requires an authenticationof the host. Changing the mode from CHAP to None doesn't require anauthentication.

Complying with RFC 3720

The IBM XIV Storage System CHAP authentication complies with the CHAPrequirements on the following Web site:http://tools.ietf.org/html/rfc3720

Secret lengthThe secret has to be between 96 bits and 128 bits; otherwise, the systemfails the command, responding that the requirements are not fulfilled.

Initiator secret uniquenessUpon defining or updating an initiator (host) secret, the system comparesthe entered secret's hash with existing secrets stored by the system anddetermines whether the secret is unique. If it is not unique, the systempresents a warning to the user, but does not prevent the command fromcompleting successfully.

18 IBM XIV Storage System: Product overview

Page 27: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Clustering hosts into LUN mapsTo enhance the management of hosts, the IBM XIV Storage System allowsclustering them together, where the clustered hosts are provided with identicalmappings. The mapping of volumes to LUN identifiers is defined per cluster andapplies to all of the hosts in the cluster.

Adding and removing hosts to a cluster are done as follows:

Adding a host to a clusterAdding a host to a cluster is a straightforward action in which a host isadded to a cluster and is connected to a LUN:v Changing the host's mapping to the cluster's mapping.v Changing the cluster's mapping to be identical to the mapping of the

newly added host.

Removing a host from a clusterThe host is disbanded from the cluster, maintaining its connection to theLUN:v The host's mapping remains identical to the mapping of the cluster.v The mapping definitions do not revert to the host's original mapping

(the mapping that was in effect before the host was added to thecluster).

v The host's mapping can be changed.

Notes:

v The IBM XIV Storage System defines the same mapping to all of the hosts of thesame cluster. No hierarchy of clusters is maintained.

v Mapping a volume to a LUN that is already mapped to a volume.

Figure 3. A Volume, a LUN and clustered Hosts

Chapter 2. Connectivity 19

Page 28: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

v Mapping an already mapped volume to another LUN.

Volume mappings exceptionsThe IBM XIV Storage System facilitates association of cluster mappings to a hostthat is added to a cluster. The system also facilitates easy specification of mapping

Figure 4. You can't map a volume to a LUN that is already mapped

Figure 5. You can't map a volume to a LUN, if the volume is already mapped.

20 IBM XIV Storage System: Product overview

Page 29: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

exceptions for such host; such exceptions are warranted to acommodate caseswhere a host must have a mapping that is not defined for the cluster (e.g., Bootfrom SAN).

Mapping a volume to a host within a clusterIt is impossible to map a volume or a LUN that are already mapped.

For example, the host host1 belongs to the cluster cluster1 which has amapping for the volume vol1 to lun1:1. Mapping host1 to vol1 and lun1 fails as both volume and LUN are

already mapped.2. Mapping host1 to vol2 and lun1 fails as the LUN is already mapped.3. Mapping host1 to vol1 and lun2 fails as the volume is already mapped.4. Mapping host1 to vol2 and lun2 succeeds with a warning that the

mapping is host-sepcific.

Listing volumes that are mapped to a host/clusterMapped Hosts that are part of a Cluster are listed (that is, the list is at aHost-level rather than Cluster-level).

Listing mappingsFor each Host, the list indicates whether it belongs to a Cluster.

Adding a host to a clusterPrevious mappings of the Host are removed, reflecting the fact that theonly relevant mapping to the Host is the Cluster's.

Removing a host from a clusterThe Host regains its previous mappings.

Supporting VMWare extended operationsThe IBM XIV Storage System supports VMWare extended operations that wereintroduced in VMWare ESX Server 4 (VMWare vStorage API).

The purpose of the VMWare extended operations is to offload operations from theVMWare Server onto the storage system. The IBM XIV Storage System supportsthe following operations:

Full copyThe ability to copy data from one storage array to another without writingto the ESX Server.

Block zeroingZeroing-out a block as a means for freeing it and make it available forprovisioning.

Hardware-assisted lockingAllowing for locking volumes within an atomic command.

Writing zeroesThe Write Zeroes command allows for zeroing large storage areas without sendingthe zeroes themselves.

Whenever an new VM is created, the ESX server creates a huge file full of zeroesand sends it to the storage system. The Write Zeroes command is a way to tell astorage controller to zero large storage areas without sending the zeroes. To meetthis goal, both VMWare's generic driver and our own plug-in utilizes the WRITESAME 16 command.

Chapter 2. Connectivity 21

Page 30: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

This method differs from the former method where the host used to write andsend a huge file full of zeroes.

Note: The write zeroes operation is not a thin provisioning operation, as itspurpose is not to allocate storage space.

Hardware-assisted lockingThe hardware-assisted locking feature utilizes VMWare new Compare and Writecommand for reading and writing the volume's metadata within a single operation.

Upon the replacement of SCSI2 reservations mechanism with Compare and Writeby VMWare, the IBM XIV Storage System provides a faster way to change themetadata specific file, along with eliminating the necessity to lock all of the filesduring the metadata change.

The legacy VMWare SCSI2 reservations mechanism is utilized whenever the VMserver performs a management operation, that is to handle the volume's metadata.This method has several disadvantages, among them the mandatory overall lock ofaccess to all volumes, which implies that all other servers are refrained fromaccessing their own files. In addition, the SCSI2 reservations mechanism entailsperforming at least four SCSI operations (reserve, read, write, release) in order toget the lock.

The introduction of the new SCSI command, called Compare and Write (SBC-3,revision 22), results with a faster mechanism that is displayed to the volume as anatomic action that doesn't not require to lock any other volume.

Note: The IBM XIV Storage System supports single-block Compare and Writecommands only. This restriction is carried out in accordance with VMWare.

Backwards compatibility

The IBM XIV Storage System maintains its compatibility with older ESX versionsas follows:v Each volume is capable of connecting legacy hosts, as it still supports SCSI

reservations.v Whenever a volume is blocked by the legacy SCSI reservations mechanism, it is

not available for an arriving COMPARE AND WRITE command.v The Admin is expected to phase out legacy VM servers to fully benefit from the

performance improvement rendered by the hardware-assisted locking feature.

Fast copyThe Fast Copy functionality allows for VN cloning on the storage system withoutgoing through the ESX server.

The Fast copy functionality speeds up the VM cloning operation by copying datainside the storage system, rather than issuing READ and WRITE requests from thehost. This implementation provide a great improvement in performance, since itsaves host to storage system intra-storage system communication. Instead, thefunctionality utilizes the huge bandwidth within the storage system.

QoS performance classesThe IBM XIV Storage System allows the user to allocate more I/O rates forimportant applications.

22 IBM XIV Storage System: Product overview

Page 31: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

The QoS Performance Classes feature allows the user to allocate more I/O toapplications that are considered to be more important, through prioritizing theirhosts. Each of the hosts that are connected to the storage system is associated witha group. This group is attributed with a rate limitation.

This limitation attribute and the association of host with the group limit the I/Orates of a specified host in the following way:v Host rate limitation groups are independent of other forms of host grouping (i.e.

Clusters)v The group can be associated with an unlimited number of hostsv By default, the host is not associated with any host rate limiting group

Max bandwidth limit attribute

The host rate limitation group has a max bandwidth limit attribute, which is thenumber of blocks per second. This number could be either:v A value between min_rate_limit_bandwidth_blocks_per_sec and

max_rate_limit_bandwidth_blocks_per_sec (both are available from the storagesystem's configuration).

v Zero (0) for unlimited bandwidth.

Commands

Host rate limiting is carried out through the following commands:

Performance class level

perf_class_createCreate a Performance Class.

perf_class_deleteDelete a Performance Class.

perf_class_renameRenaming a Performance Class.

perf_class_listListing Performance Classes and their hosts0

Host level

perf_class_add_hostAdding a host to a group.

perf_class_remove_hostRemoving a host from a group.

perf_class_list_hostsListing the group's hosts.

perf_class_set_rateSetting a rate limitation for a group.

perf_class_get_rateDisplaying the rate limitation value per group.

Updating the call home contact listIt is important that the contact list remain current to ensure the appropriatepersonnel is notified in the event of a service issue that requires IBM to contact thecustomer.

Chapter 2. Connectivity 23

Page 32: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Updating the contact list is done through the XIV GUI. Please refer to the XIV GUIfor the procedures for making the appropriate changes.

Host system attachment commandsThe IBM XIV Storage System manages host attachment through host commands,cluster commands, and mapping commands.

Table 3 and Figure 6 on page 25 list the command sets that are available.

Table 3. Commands used for host attachment

Command set Commands

Host commands For adding and managing hosts and providing them withports, the following commands are available:

v host_define

v host_add_port

v host_remove_port

v host_update

v host_list

v host_rename

v host_delete

Cluster commands For creating and managing clusters, and populating themwith hosts, the following commands are available:

v cluster_create

v cluster_add_host

v cluster_remove_host

v cluster_list

v cluster_rename

v cluster_delete

Mapping commands For creating and managing maps and populating them withhosts, the following commands are available:

v map_vol

v unmap_vol

v mapping_list

v vol_mapping_list

Other As of today, HP-UX hosts requires a special attachmentmethod, provided by the following command:

v special_type_set

24 IBM XIV Storage System: Product overview

Page 33: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Figure 6. Host system attachment commands

Chapter 2. Connectivity 25

Page 34: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

26 IBM XIV Storage System: Product overview

Page 35: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Chapter 3. Volumes and Snapshots overview

Volumes are the basic storage data units in the IBM XIV Storage System. Snapshotsof volumes can be created, where a snapshot of a volume represents the data onthat volume at a specific point in time. Volumes can also be grouped into largersets called Consistency Groups and Storage Pools.

The basic hierarchy may be described as follows:v A volume can have multiple snapshots.v A volume can be part of one and only one Consistency Group.v A volume is always a part of one and only one Storage Pool.v All volumes in a Consistency Group must belong to the same Storage Pool.

The following subsections deal with volumes and snapshots specifically.

The volume life cycleThe volume is the basic data container that is presented to the hosts as a logicaldisk.

The term volume is sometimes used for an entity that is either a volume or asnapshot. Hosts view volumes and snapshots through the same protocol.Whenever required, the term master volume is used for a volume to clearlydistinguish volumes from snapshots.

Each volume has two configuration attributes: a name and a size. The volumename is an alphanumeric string that is internal to the IBM XIV Storage System andis used to identify the volume to both the GUI and CLI commands. The volumename is not related to the SCSI protocol. The volume size represents the number ofblocks in the volume that the host sees.

The volume can be managed by the following commands:

Create Defines the volume using the attributes you specify

Resize Changes the virtual capacity of the volume. For more information, see“Thin provisioning” on page 46.

Copy Copies the volume to an existing volume or to a new volume

FormatClears the volume

Lock Prevents hosts from writing to the volume

UnlockAllows hosts to write to the volume

RenameChanges the name of the volume, while maintaining all of the volumespreviously defined attributes

Delete Deletes the volume. See Instant Space Reclamation below.

The following query commands list volumes:

© Copyright IBM Corp. 2011 27

Page 36: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Listing VolumesThis command lists details of all volumes, or a specific volume accordingto a given volume or pool.

Finding a Volume Based on a SCSI Serial NumberThis command prints the volume name according to its SCSI serialnumber.

These commands are available when you use both the IBM XIV StorageManagement GUI and the IBM XIV command-line interface (XCLI). See the IBMXIV Storage System XCLI User Manual for the commands that you can issue in theXCLI.

Figure 7 shows the commands you can issue for volumes.

Support for Symantec Storage Foundation Thin ReclamationThe IBM XIV Storage System supports Symantec's Storage Foundation ThinReclamation API.

The IBM XIV Storage System features instant space reclamation functionality,enhancing the existing IBM XIV Thin Provisioning capability. The new instantspace reclamation function allows IBM XIV users to optimize capacity utilization,thus saving costs, by allowing supporting applications, to instantly regain unusedfile system space in thin-provisioned XIV volumes instantly.

The IBM XIV Storage System is one of the first high-end storage systems to offerinstant space reclamation. The new, instant capability enables third party productsvendors, such as Symantec Thin Reclamation, to interlock with the The IBM XIVStorage System such that any unused space is detected instantly and automatically,and immediately reassigned to the general storage pool for reuse.

This enables integration with thin-provisioning-aware Veritas File System (VxFS)by Symantec, which ultimately enables to leverage the IBM XIV Storage Systemthin-provisioning-awareness to attain higher savings in storage utilization.

Figure 7. Volume operations

28 IBM XIV Storage System: Product overview

Page 37: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

For example, when data is deleted by the user, the system administrator caninitiate a reclamation process in which the IBM XIV Storage System frees thenon-utilized blocks and where these blocks are reclaimed by the available pool ofstorage.

Instant space reclamation doesn't support space reclamation for the followingobjects:v Mirrored volumesv Volumes that have snapshotsv Snapshots

SnapshotsA snapshot is a logical volume reflecting the contents of a given source volume at aspecific point-in-time.

The IBM XIV Storage System uses advanced snapshot mechanisms to create avirtually unlimited number of volume copies without impacting performance.Snapshot taking and management are based on a mechanism of internal pointersthat allow the master volume and its snapshots to use a single copy of data for allportions that have not been modified.

This approach, also known as Redirect-on-Write (ROW) is an improvement of themore common Copy-on-Write (COW), which translates into a reduction of I/Oactions, and therefore storage usage.

With the IBM XIV snapshots, no storage capacity is consumed by the snapshotuntil the source volume (or the snapshot) is changed.

Redirect on writeThe IBM XIV Storage System uses the Redirect-on-Write (ROW) mechanism.

The following items are characteristics of using ROW when a write request isdirected to the master volume:1. The data originally associated with the master volume remains in place.2. The new data is written to a different location on the disk.3. After the write request is completed and acknowledged, the original data is

associated with the snapshot and the newly written data is associated with themaster volume.

In contrast with the traditional copy-on-write method, with redirect-on-write theactual data activity involved in taking the snapshot is drastically reduced.Moreover, if the size of the data involved in the write request is equal to thesystem's slot size, there is no need to copy any data at all. If the write request issmaller than the system's slot size, there is still much less copying than with thestandard approach of Copy-on-Write.

In the following example of the Redirect-on-Write process, The volume is displayedwith its data and the pointer to this data.

Chapter 3. Volumes and Snapshots overview 29

Page 38: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

When a snapshot is taken, a new header is written first.

The new data is written anywhere else on the disk, without the need to copy theexisting data.

Figure 8. The Redirect-on-Write process: the volume's data and pointer

Figure 9. The Redirect-on-Write process: when a snapshot is taken the header is written first

30 IBM XIV Storage System: Product overview

Page 39: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

The snapshot points at the old data where the volume points at the new data (thedata is regarded as new as it keep updating by I/Os).

The metadata established at the beginning of the snapshot mechanism isindependent of the size of the volume to be copied. This approach allows the userto achieve the following important goals:

Continuous backupAs snapshots are taken, backup copies of volumes are produced atfrequencies that resemble those of Continuous Data Protection (CDP). Instantrestoration of volumes to virtually any point in time is easily achieved incase of logical data corruption at both the volume level and the file level.

Figure 10. The Redirect-on-Write process: the new data is written

Figure 11. The Redirect-on-Write process: The snapshot points at the old data where thevolume points at the new data

Chapter 3. Volumes and Snapshots overview 31

Page 40: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

ProductivityThe snapshot mechanism offers an instant and simple method for creatingshort or long-term copies of a volume for data mining, testing, andexternal backups.

Storage utilizationThe IBM XIV Storage System allocates space for volumes and their Snapshots in away that whenever a Snapshot is taken, additional space is actually needed onlywhen the volume is written into.

As long as there is no actual writing into the volume, the Snapshot does not needactual space. However, some applications write into the volume whenever aSnapshot is taken. This writing into the volume mandates immediate spaceallocation for this new Snapshot. Hence, these applications use space lessefficiently than other applications.

The snapshot auto-delete prioritySnapshots are associated with an auto-delete priority to control the order in whichsnapshots are automatically deleted.

Taking volume snapshots gradually fills up storage space according to the amountof data that is modified in either the volume or its snapshots. To free up spacewhen the maximum storage capacity is reached, the system can refer to theauto-delete priority to determine the order in which snapshots are deleted. Ifsnapshots have the same priority, the snapshot that was created first is deletedfirst.

Snapshot name and associationA snapshot can either be taken of a source volume, or from a source snapshot. Thename of a snapshot is either automatically assigned by the system at creation timeor given as a parameter of the XCLI command that creates it. The snapshot'sauto-generated name is derived from its volume's name and a serial number. Thefollowing are examples of snapshot names:MASTERVOL.snapshot_XXXXXNewDB-server2.snapshot_00597

Parameter Description Example

MASTERVOL The name of the volume. NewDB-server2

XXXXX A five-digit, zero filledsnapshot number.

00597

The snapshot lifecycleThe roles of the snapshot determine its life cycle.

Figure 12 on page 33 shows the life cycle of a snapshot.

32 IBM XIV Storage System: Product overview

Page 41: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

The following operations are applicable for the snapshot:

Create Creates the snapshot (a.k.a. taking a snapshot)

RestoreCopies the snapshot back onto the volume. The main snapshotfunctionality is the capability to restore the volume.

UnlockingUnlocks the snapshot to make it writable and sets the status to Modified.Re-locking the unlocked snapshot disables further writing, but does notchange the status from Modified.

DuplicateDuplicates the snapshot. Similar to the volume, which can be snapshottedinfinitely, the snapshot itself can be duplicated.

A snapshot of a snapshotCreates a backup of a snapshot that was written into. Taking a snapshot ofa writable snapshot is similar to taking a snapshot of a volume.

Overwriting a snapshotOverwrites a specific snapshot with the content of the volume.

Delete Deletes the snapshot.

Creating a snapshotFirst, a snapshot of the volume is taken. The system creates a pointer to thevolume, hence the snapshot is considered to have been immediately created. This

Figure 12. The snapshot life cycle

Chapter 3. Volumes and Snapshots overview 33

Page 42: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

is an atomic procedure that is completed in a negligible amount of time. At thispoint, all data portions that are associated with the volume are also associated withthe snapshot.

Later, when a request arrives to read a certain data portion from either the volumeor the snapshot, it reads from the same single, physical copy of that data.

Throughout the volume life cycle, the data associated with the volume iscontinuously modified as part of the ongoing operation of the system. Whenever arequest to modify a data portion on the master volume arrives, a copy of theoriginal data is created and associated with the snapshot. Only then the volume ismodified. This way, the data originally associated with the volume at the time thesnapshot is taken is associated with the snapshot, effectively reflecting the way thedata was before the modification.

Locking and unlocking snapshotsInitially, a snapshot is created in a locked state, which prevents it from beingchanged in any way related to data or size, and only enables the reading of itscontents. This is called an image or image snapshot and represents an exact replica ofthe master volume when the snapshot was created.

A snapshot can be unlocked after it is created. The first time a snapshot isunlocked, the system initiates an irreversible procedure that puts the snapshot in astate where it acts like a regular volume with respect to all changing operations.Specifically, it allows write requests to the snapshot. This state is immediately setby the system and brands the snapshot with a permanent modified status, even ifno modifications were performed. A modified snapshot is no longer an imagesnapshot.

An unlocked snapshot is recognized by the hosts as any other writable volume. Itis possible to change the content of unlocked snapshots, however, physical storagespace is consumed only for the changes. It is also possible to resize an unlockedsnapshot.

Master volumes can also be locked and unlocked. A locked master volume cannotaccept write commands from hosts. The size of locked volumes cannot bemodified.

Duplicating image snapshotsA user can create a new snapshot by duplicating an existing snapshot. Theduplicate is identical to the source snapshot. The new snapshot is associated withthe master volume of the existing snapshot, and appears as if it were taken at theexact moment the source snapshot was taken. For image snapshots that have neverbeen unlocked, the duplicate is given the exact same creation date as the originalsnapshot, rather than the duplication creation date.

With this feature, a user can create two or more identical copies of a snapshot forbackup purposes, and perform modification operations on one of them withoutsacrificing the usage of the snapshot as an untouched backup of the mastervolume, or the ability to restore from the snapshot.

A snapshot of a snapshotWhen duplicating a snapshot that has been changed using the unlock feature, thegenerated snapshot is actually a snapshot of a snapshot. The creation time of thenewly created snapshot is when the command was issued , and its content reflectsthe contents of the source snapshot at the moment of creation.

34 IBM XIV Storage System: Product overview

Page 43: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

After it is created, the new snapshot is viewed as another snapshot of the mastervolume.

Restoring volumes and snapshotsThe restoration operation provides the user with the ability to instantly recover thedata of a master volume from any of its locked snapshots.

Restoring volumes

A volume can be restored from any of its snapshots, locked and unlocked.Performing the restoration replicates the selected snapshot onto the volume. As aresult of this operation, the master volume is an exact replica of the snapshot thatrestored it. All other snapshots, old and new, are left unchanged and can be usedfor further restore operations. A volume can even be restored from a snapshot thathas been written to. Figure 13 shows a volume being restored from three differentsnapshots.

Restoring snapshots

The snapshot itself can also be restored from another snapshot. The restoredsnapshot retains its name and other attributes. From the host perspective, thisrestored snapshot is considered an instant replacement of all the snapshot contentwith other content. Figure 14 on page 36 shows a snapshot being restored fromtwo different snapshots.

Figure 13. Restoring volumes

Chapter 3. Volumes and Snapshots overview 35

Page 44: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Full Volume CopyFull Volume Copy overwrites an existing volume, and at the time of its creation it islogically equivalent to the source volume.

After the copy is made, both volumes are independent of each other. Hosts canwrite to either one of them without affecting the other. This is somewhat similar tocreating a writable (unlocked) snapshot, with the following differences andsimilarities:

Creation time and availabilityBoth Full Volume Copy and creating a snapshot happen almost instantly.Both the new snapshot and volume are immediately available to the host.This is because at the time of creation, both the source and the destinationof the copy operation contain the exact same data and share the samephysical storage.

Singularity of the copy operationFull Volume Copy is implemented as a single copy operation into anexisting volume, overriding its content and potentially its size. The existingtarget of a volume copy can be mapped to a host. From the hostperspective, the content of the volume is changed within a singletransaction. In contrast, creating a new writable snapshot creates a newobject that has to be mapped to the host.

Figure 14. Restoring snapshots

36 IBM XIV Storage System: Product overview

Page 45: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Space allocationWith Full Volume Copy, all the required space for the target volume isreserved at the time of the copy. If the storage pool that contains the targetvolume cannot allocate the required capacity, the operation fails and has noeffect. This is unlike writable snapshots, which are different in nature.

Taking snapshots and mirroring the copied volumeThe target of the Full Volume Copy is a master volume. This mastervolume can later be used as a source for taking a snapshot or creating amirror. However, at the time of the copy, neither snapshots nor remotemirrors of the target volume are allowed.

Redirect-on-write implementationWith both Full Volume Copy and writable snapshots, while one volume isbeing changed, a redirect-on-write operation will ensure a split so that theother volume maintains the original data.

PerformanceUnlike writable snapshots, with Full Volume Copy, the copying process isperformed in the background even if no I/O operations are performed.Within a certain amount of time, the two volumes will use different copiesof the data, even though they contain the same logical content. This meansthat the redirect-on-write overhead of writes occur only before the initialcopy is complete. After this initial copy, there is no additional overhead.

AvailabilityFull Volume Copy can be performed with source and target volumes indifferent storage pools.

Snapshot and snapshot group formatThis operation deletes the content of a snapshot - or a snapshot group - whilemaintaining its mapping to the host.

The purpose of the formatting is to allow customers to backup their volumes viasnapshots, while maintaining the snapshot ID and the LUN ID. More than a singlesnapshot can be formatted per volume.

Required reading

Some of the concepts this topic refers to are introduced in this chapter as well as ina later chapter on this document. Consult the following reading list to get a graspregarding these topics.

Snapshots“The snapshot lifecycle” on page 32

Snapshot groups“The snapshot group life cycle” on page 43

Attaching a host“Host system attachment” on page 16

The format operation results with the followingv The formatted snapshot is read-onlyv The format operation has no impact on performancev The formatted snapshot does not consume spacev Reading from the formatted snapshot always returns zeroesv It can be overridden

Chapter 3. Volumes and Snapshots overview 37

Page 46: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

v It can be deletedv Its deletion priority can be changed

Restrictions

No unlockThe formatted snapshot is read-only and can't be unlocked.

No volume restoreThe volume that the formatted snapshot belongs to can't be restored fromit.

No restore from another snapshotThe formatted snapshot can't be restored from another snapshot.

No duplicatingThe formatted snapshot can't be duplicated.

No re-formatThe formatted snapshot can't be formatted again.

No volume copyThe formatted snapshot can't serve as a basis for volume copy.

No resizeThe formatted snapshot can't be resized.

Use case1. Create a snapshot for each LUN you would like to backup to, and mount it to

the host.2. Configure the host to backup this LUN.3. Format the snapshot.

4. Re-snap. The LUN ID, Snapshot ID and mapping are maintained.

Restrictions in relation to other XIV operations

Snapshots of the following types can't be formatted:

Internal snapshotFormatting an internal snapshot hampers the process it is part of, thereforeis forbidden.

Part of a sync jobFormatting a snapshot that is part of a sync job renders the sync jobmeaningless, therefore is forbidden.

Part of a snapshot groupA snapshot that is part of a snapshot group can't be treated as anindividual snapshot.

Snapshot group restrictionsAll snapshot format restrictions apply to the snapshot group formatoperation.

Accepting the electronic licenseThe storage system’s electronic license has to be accepted prior to creatingvolumes.

38 IBM XIV Storage System: Product overview

Page 47: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

The IBM XIV Storage System allows the user to accept the MFG (licenseagreement) electronically, with a click. The acceptance of the license is aprecondition to the creation of volumes on the system.

The acceptance is available both from the GUI and CLI. Relevant CLI commands:

elicense_acceptAllows to accept the license.

elicense_status_getTells whether a license was already accepted.

elicense_blob_getReturns the license text.

Chapter 3. Volumes and Snapshots overview 39

Page 48: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

40 IBM XIV Storage System: Product overview

Page 49: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Chapter 4. Consistency groups overview

Consistency groups can be used to take simultaneous snapshots of multiplevolumes, thus ensuring consistent copies of a group of volumes.

Creating a synchronized snapshot set is especially important for applications thatuse multiple volumes concurrently. A typical example is a database application,where the database and the transaction logs reside on different storage volumes,but all of their snapshots must be taken at the same point in time.

This chapter contains the following sections:

Creating a consistency groupConsistency groups are created empty and volumes are added to them later on.

The consistency groups is an administrative unit of multiple volumes facilitatessimultaneous snapshotting of multiple volumes, mirroring of volume groups, andadministration of volume sets.

Taking a snapshot of a consistency groupTaking a snapshot for the entire consistency group means that a snapshot is takenfor each volume of the consistency group at the same point-in-time. Thesesnapshots are grouped together to represent the volumes of the consistency groupat a specific point in time.

Figure 15. The consistency group's life-cycle

© Copyright IBM Corp. 2011 41

Page 50: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

In Figure 16, a snapshot is taken for each of the consistency group's volumes in thefollowing order:

Time = t0

Prior to taking the snapshots, all volumes in the consistency group areactive and being read from and written to.

Time = t1

When the command to snapshot the consistency group is issued, I/O issuspended .

Time = t2

Snapshots are taken at the same point in time.

Time = t3

I/O is resumed and the volumes continue their normal work.

Time = t4

After the snapshots are taken, the volumes resume active state andcontinue to be read from and written to.

Most snapshot operations can be applied to each snapshot in a grouping, known asa snapshot set. The following items are characteristics of a snapshot set:v A snapshot set can be locked or unlocked. When you lock or unlock a snapshot

set, all snapshots in the set are locked or unlocked.v A snapshot set can be duplicated.

Figure 16. A snapshot is taken for each volume of the consistency group

42 IBM XIV Storage System: Product overview

Page 51: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

v A snapshot set can be deleted. When a snapshot set is deleted, all snapshots inthe set are also deleted.

A snapshot set can be disbanded which makes all the snapshots in the setindependent snapshots that can be handled individually. The snapshot set itself isdeleted, but the individual snapshots are not.

The snapshot group life cycleMost snapshot operations can be applied to snapshot groups, where the operationaffects every snapshot in the group.

Taking a snapshot groupCreates a snapshot group. .

Restoring consistency group from a snapshot groupThe main purpose of the snapshot group is the ability to restore the entireconsistency group at once, ensuring that all volumes are synchronized tothe same point in time. .

Listing a snapshot groupThis command lists snapshot groups with their consistency groups and thetime the snapshots were taken.

Note: All snapshots within a snapshot group are taken at the same time.

Lock and unlockSimilar to unlocking and locking an individual snapshot, the snapshotgroup can be rendered writable, and then be written to. A snapshot groupthat is unlocked cannot be further used for restoring the consistency group,even if it is locked again.

Figure 17. Most snapshot operations can be applied to snapshot groups

Chapter 4. Consistency groups overview 43

Page 52: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

The snapshot group can be locked again. At this stage, it cannot be used torestore the master consistency group. In this situation, the snapshot groupfunctions like a consistency group of its own.

OverwriteThe snapshot group can be overwritten by another snapshot group.

RenameThe snapshot group can be renamed.

Restricted namesDo not prefix the snapshot group's name with any of thefollowing:1. most_recent2. last_replicated

DuplicateThe snapshot group can be duplicated, thus creating another snapshotgroup for the same consistency group with the time stamp of the firstsnapshot group.

Disbanding a snapshot groupThe snapshots that comprise the snapshot group are each related to itsvolume. Although the snapshot group can be rendered inappropriate forrestoring the consistency group, the snapshots that comprise it are stillattached to their volumes. Disbanding the snapshot group detaches allsnapshots from this snapshot group but maintains their individualconnections to their volumes. These individual snapshots cannot restorethe consistency group, but they can restore its volumes individually.

Changing the snapshot group deletion priorityManually sets the deletion priority of the snapshot group.

Deleting the snapshot groupDeletes the snapshot group along with its snapshots.

Restoring a consistency groupRestoring a consistency group is a single action in which every volume thatbelongs to the consistency group is restored from a corresponding snapshot thatbelongs to an associated snapshot group.

Not only does the snapshot group have a matching snapshot for each of thevolumes, all of the snapshots have the same time stamp. This implies that therestored consistency group contains a consistent picture of its volumes as theywere at a specific point in time.

Note: A consistency group can only be restored from a snapshot group that has asnapshot for each of the volumes. If either the consistency group or the snapshotgroup has changed after the snapshot group is taken, the restore action does notwork.

44 IBM XIV Storage System: Product overview

Page 53: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Chapter 5. Storage pools overview

The storage space of the IBM XIV Storage System is portioned into storage pools,where each volume belongs to a specific storage pool.

Storage pools provide the following benefits:

Improved management of storage spaceSpecific volumes can be grouped together in a storage pool. This enablesyou to control the allocation of a specific storage space to a specific groupof volumes. This storage pool can serve a specific group of applications, orthe needs of a specific department.

Improved regulation of storage spaceSnapshots can be automatically deleted when the storage capacity that isallocated for snapshots is fully consumed. This automatic deletion isperformed independently on each storage pool. Therefore, when the sizelimit of the storage pool is reached, only the snapshots that reside in theaffected storage pool are deleted. For more information, see “The snapshotauto-delete priority” on page 32.

Facilitating thin provisioningThin provisioning is enabled by Storage Pools.

Storage pools as logical entities

A storage pool is a logical entity and is not associated with a specific disk ormodule. All storage pools are equally spread over all disks and all modules in thesystem.

As a result, there are no limitations on the size of storage pools or on theassociations between volumes and storage pools. For example:v The size of a storage pool can be decreased, limited only by the space consumed

by the volumes and snapshots in that storage pool.v Volumes can be moved between storage pools without any limitations, as long

as there is enough free space in the target storage pool.

Note: For the size of the storage pool, please refer to the IBM XIV Storage Systemdata sheet.

All of the above transactions are accounting transactions, and do not impose anydata copying from one disk drive to another. These transactions are completedinstantly.

Moving volumes between storage pools

For a volume to be moved to a specific storage pool, there must be enough roomfor it to reside there. If a storage pool is not large enough, the storage pool must beresized, or other volumes must be moved out to make room for the new volume.

A volume and all its snapshots always belong to the same storage pool. Moving avolume between storage pools automatically moves all its snapshots together withthe volume.

© Copyright IBM Corp. 2011 45

Page 54: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Protecting snapshots on a Storage Pool levelSnapshots that participates in the mirroring process can be protected in case ofPool space depletion.

This is done by attributing both snapshots (or snapshot groups) and the storagepool with a deletion priority. The snapshots are attributed with a deletion prioritybetween 0 - 4 and the storage pool is configured to disregard snapshots whosepriority is above a specific value. Snapshots with a lower delete priority (i.e.,higher number) than the configured value might be deleted by the systemwhenever the Pool space depletion mechanism implies so, thus protectingsnapshots with a priority equal or higher to this value.

Thin provisioningThe IBM XIV Storage System supports thin provisioning, which provides theability to define logical volume sizes that are much larger than the physicalcapacity installed on the system. Physical capacity needs only to accommodatewritten data, while parts of the volume that have never been written to do notconsume physical space.

This chapter discusses:v Volume hard and soft sizesv System hard and soft sizesv Pool hard and soft sizesv Depletion of hard capacity

Volume hard and soft sizes

Without thin provisioning, the size of each volume is both seen by the hosts andreserved on physical disks. Using thin provisioning, each volume is associatedwith the following two sizes:

Hard volume sizeThis reflects the total size of volume areas that were written by hosts. Thehard volume size is not controlled directly by the user and depends onlyon application behavior. It starts from zero at volume creation orformatting and can reach the volume soft size when the entire volume hasbeen written. Resizing of the volume does not affect the hard volume size.

Soft volume sizeThis is the logical volume size that is defined during volume creation orresizing operations. This is the size recognized by the hosts and is fullyconfigurable by the user. The soft volume size is the traditional volumesize used without thin provisioning.

System hard and soft size

Using thin provisioning, each IBM XIV Storage System is associated with a hardsystem size and soft system size. Without thin provisioning, these two are equal tothe system's capacity. With thin provisioning, these concepts have the followingmeaning:

Hard system sizeThis is the physical disk capacity that was installed. Obviously, thesystem's hard capacity is an upper limit on the total hard capacity of all

46 IBM XIV Storage System: Product overview

Page 55: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

the volumes. The system's hard capacity can only change by installing newhardware components (disks and modules).

Soft system sizeThis is the total limit on the soft size of all volumes in the system. It can beset to be larger than the hard system size, up to 79TB. The soft system sizeis a purely logical limit, but should not be set to an arbitrary value. It mustbe possible to upgrade the system's hard size to be equal to the soft size,otherwise applications can run out of space. This requirement means thatenough floor space should be reserved for future system hardwareupgrades, and that the cooling and power infrastructure should be able tosupport these upgrades. Because of the complexity of these issues, thesetting of the system's soft size can only be performed by IBM XIVsupport.

Pool hard and soft sizes

The concept of storage pool is also extended to thin provisioning. When thinprovisioning is not used, storage pools are used to define capacity allocation forvolumes. The storage pools control if and which snapshots are deleted when thereis not enough space.

When thin provisioning is used, each storage pool has a soft pool size and a hardpool size, which are defined and used as follows:

Hard pool sizeThis is the physical storage capacity allocated to volumes and snapshots inthe storage pool. The hard size of the storage pool limits the total of thehard volume sizes of all volumes in the storage pool and the total of allstorage consumed by snapshots. Unlike volumes, the hard pool size is fullyconfigured by the user.

Soft pool sizeThis is the limit on the total soft sizes of all the volumes in the storagepool. The soft pool size has no effect on snapshots.

Thin provisioning is managed for each storage pool independently. Each storagepool has its own soft size and hard size. Resources are allocated to volumes withinthis storage pool without any limitations imposed by other storage pools. This is anatural extension of the snapshot deletion mechanism, which is applied evenwithout thin provisioning. Each storage pool has its own space, and snapshotswithin each storage pool are deleted when the storage pool runs out of spaceregardless of the situation in other storage pools.

The sum of all the soft sizes of all the storage pools is always the same as thesystem's soft size and the same applies to the hard size.

Storage pools provide a logical way to allocate storage resources per application orper groups of applications. With thin provisioning, this feature can be used tomanage both the soft capacity and the hard capacity.

Depletion of hard capacity

Thin provisioning creates the potential risk of depleting the physical capacity. If aspecific system has a hard size that is smaller than the soft size, the system willrun out of capacity when applications write to all the storage space that is mappedto hosts. In such situations, the system behaves as follows:

Chapter 5. Storage pools overview 47

Page 56: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Snapshot deletionSnapshots are deleted to provide more physical space for volumes. Thesnapshot deletion is based on the deletion priority and creation time.

Volume lockingIf all snapshots have been deleted and more physical capacity is stillrequired, all the volumes in the storage pool are locked and no writecommands are allowed. This halts any additional consumption of hardcapacity.

Note: Space that is allocated to volumes that is unused (that is, the differencebetween the volume's soft and hard size) can be used by snapshots in the samestorage pool.

The thin provisioning implementation in the IBM XIV Storage System managesspace allocation per storage pool. Therefore, one storage pool cannot affect anotherstorage pool. This scheme has the following advantages and disadvantages:

Storage pools are independentStorage pools are independent in respect to the aspect of thin provisioning.Thin provisioning volume locking on one storage pool does not create aproblem in another storage pool.

Space cannot be reused across storage poolsEven if a storage pool has free space, this free space is never reused foranother storage pool. This creates a situation where volumes are lockeddue to the depletion of hard capacity in one storage pool, while there isavailable capacity in another storage pool.

Important: If a storage pool runs out of hard capacity, all of its volumes are lockedto all write commands. Although write commands that overwrite existing data canbe technically serviced, they are blocked to ensure consistency.

48 IBM XIV Storage System: Product overview

Page 57: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Chapter 6. Synchronous remote mirroring

IBM XIV Storage System features synchronous and asynchronous remote mirroringfor disaster recovery. Remote mirroring can be used to replicate the data betweentwo geographically remote sites. The replication ensures uninterrupted businessoperation if there is a total site failure.

Remote mirroring provides data protection for the following types of site disasters:

Site failureWhen a disaster happens to a site that is remotely connected to anothersite, the second site takes over and maintains full service to the hostsconnected to the first site. The mirror is resumed after the failing siterecovers.

Split brainAfter a communication loss between the two sites, each site maintains fullservice to the hosts. After the connection is resumed, the sites complementeach other's data to regain mirroring.

Synchronous and asynchronous remote mirroring

The two distinct methods of remote mirroring - synchronous and asynchronous -are described on this chapter and on the following chapter. Throughout thischapter, the term remote mirroring refers to synchronous remote mirroring, unlessclearly stated otherwise.

Remote mirroring basic conceptsSynchronous remote mirroring provides continuous availability of criticalinformation in the case of a disaster scenario.

A typical remote mirroring configuration involves the following two sites:

Primary siteThe location of the master storage system.

A local site that contains both the data and the active servers.

Secondary siteThe location of the secondary storage system.

A remote site that contains a copy of the data and standby servers.Following a disaster at the master site, the servers at the secondary sitebecome active and start using the copy of the data.

MasterThe volume or storage system which is mirrored. The master volume orstorage system is usually at the master site.

Slave The volume or storage system to which the master is mirrored. The slavevolume or storage system is usually at the Secondary site.

One of the main goals of remote mirroring is to ensure that the secondary sitecontains the same (consistent) data as the master site. With remote mirroring,services are provided seamlessly by the hosts and storage systems at the secondarysite.

© Copyright IBM Corp. 2011 49

Page 58: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

The process of ensuring that both storage systems contain identical data at alltimes is called remote mirroring. Synchronous remote mirroring is performed duringeach write operation. The write operation issued by a host is sent to both themaster and the slave storage systems.

To ensure that the data is also written to the secondary system, acknowledgementof the write operation is only issued after the data has been written to both storagesystems. This ensures the consistency of the secondary storage system to themaster storage system except for the contents of any last, unacknowledged writeoperations. This form of mirroring is called synchronous mirroring.

In a remote mirroring system, reading is performed from the master storagesystem, while writing is performed on both the master and the slave storagesystems, as previously described.

The IBM XIV Storage System supports configurations where server pairs performalternate master or secondary roles with respect to their hosts. As a result, a serverat one site might serve as the master storage system for a specific application,while simultaneously serving as the secondary storage system for anotherapplication.

Remote mirroring operationRemote mirroring operations involve configuration, initialization, ongoing operation,handling of communication failures, and role switching activities.

The following list defines the remote mirroring operation activities:

ConfigurationLocal and remote replication peers are defined by an administrator whospecifies the primary and secondary volumes. For each coupling, severalconfiguration options can be defined.

InitializationRemote mirroring operations begin with a master volume that containsdata and a formatted slave volume. The first step is to copy the data fromthe master volume to the slave volume. This process is called initialization.Initialization is performed once in the lifetime of a remote mirroringcoupling. After it is performed, both volumes are considered synchronized.

Ongoing OperationAfter the initialization process is complete, remote mirroring is activated.During this activity, all data is written to the master volume and then tothe slave volume. The write operation is complete after anacknowledgement from the slave volume. At any point, the master andslave volumes are identical except for any unacknowledged (pending)writes.

Handling of Communication FailuresFrom time to time the communication between the sites might break down,and it is usually preferable for the primary site to continue its function andto update the secondary site when communication resumes. This process iscalled synchronization.

Role SwitchingWhen needed, a replication peer can change its role from master to slave

50 IBM XIV Storage System: Product overview

Page 59: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

or vice versa, either as a result of a disaster at the primary site,maintenance operations, or because of a drill that tests the disasterrecovery procedures.

Configuration optionsThe remote mirroring configuration process involves configuring volumes andvolume pair options.

When a pair of volumes point to each other, it is referred to as a coupling. In acoupling relationship, two volumes participate in a remote mirroring system with theslave peer serving as the backup for the master peer. The coupling configuration isidentical for both master volumes and slave volumes.

Table 4. Configuration options for a volume

Name Values Definition

Role None, Master, Slave Role of a volume.

(Primary and Secondary aredesignations.)

Peer Remote target identificationand the name of the volumeon the remote target.

Identifies the peer volume.

Table 5. Configuration options for a coupling

Name Values Definition

Activation Active, Stand-by. Activates or deactivatesremote mirroring.

Volume configurationThe role of each volume and its peer volumes on the IBM XIV Storage Systemmust be defined for it to function within the remote mirroring process.

The following concepts are to be configured for volumes and the relations betweenthem:v Volume rolev Peer

The volume role is the current function of the volume. The following volume rolesare available:

None The volume is created using normal volume creation procedures and is notconfigured as part of any remote mirroring configuration.

Master volumeThe volume is part of a mirroring coupling and serves as the mastervolume.

All write operations are made to this master volume. It ensures that writeoperations are made to the slave volume before acknowledging theirsuccess.

Slave volumeThis volume is part of a mirroring coupling and serves as a backup to themaster volume.

Chapter 6. Synchronous remote mirroring 51

Page 60: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Data is read from the slave volume, but cannot be written to it.

A peer is a volume that is part of a coupling. A volume with a role other than nonehas to have a peer designation, and a corresponding master or slave volumeassigned to it.

Configuration errors

In some cases, configuration on both sides might be changed in a non-compatibleway. This is defined as a configuration error. For example, switching the role of onlyone side when communication is down causes a configuration error whenconnection resumes.

Mixed configurationThe volumes on a single storage system can be defined in a mixture ofconfigurations.

For example, a storage system can contain volumes whose role is defined asmaster, as well as volumes whose roles are defined as slave. In addition, somevolumes might not be involved in a remote mirroring coupling at all.

The roles assigned to volumes are transient. This means a volume that is currentlya master volume can be defined as a slave volume and vice versa. The term localrefers to the master volume, and remote refers to the slave volume for processesthat switch the master and slave assignments.

Communication errorsWhen the communication link to the secondary volume fails or the secondaryvolume itself is not usable, processing to the volume continues as usual. Thefollowing occurs:v The system is set to an unsynchronized state.v All changes to the master volume are recorded and then applied to the slave

volume after communication is restored.

Coupling activationRemote mirroring can be manually activated and deactivated per coupling. Whenit is activated, the coupling is in Active mode. When it is deactivated, the couplingis in Standby mode.

These modes have the following functions:

Active Remote mirroring is functioning and the data is being written to both themaster and the slave volumes.

StandbyRemote mirroring is deactivated. The data is not being written to the slavevolume, but it is being recorded in the master volumes which will latersynchronize the slave volume.

Standby mode is used mainly when maintenance is performed on thesecondary site or during communication failures between the sites. In thismode, the master volumes do not generate alerts that the mirroring hasfailed.

The coupling lifecycle has the following characteristics:v When a coupling is created, it is always initially in Standby mode.

52 IBM XIV Storage System: Product overview

Page 61: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

v Only a coupling in Standby mode can be deleted.v Transitions between the two states can only be performed from the UI and on

the volume.

Synchronous mirroring statusesThe status of the synchronous remote mirroring volume represents the state of thestorage volume in regard to its remote mirroring operation.

The state of the volume is a function of the status of the communication link andthe status of the coupling between the master volume and the slave volume. “Linkstatus” describes the various statuses of a synchronous remote mirroring volumeduring remote mirroring operations.

Table 6. Synchronous mirroring statuses

Entity Name Values Definition

Link Status v Up

v Down

Specifies if thecommunications link is upor down.

Coupling Operational status v Operational

v Non-operational

Specifies if remotemirroring is working.

Synchronizationstatus

v Initialization

v Synchronized

v Unsynchronized

v Consistent

v Inconsistent

Specifies if the master andslave volumes areconsistent.

Last-secondary-timestamp

Point-in-time date Time stamp for when thesecondary volume waslast synchronized.

Synchronizationprocess progress

Synchronization status Amount of data remainingto be synchronizedbetween the master andslave volumes due tonon-operational coupling.

Secondary locked Boolean True, if secondary waslocked for writing due tolack of space; otherwisefalse. This can happenduring thesynchronization processwhen there is not enoughspace for thelast-consistent snapshot.

Configuration error Boolean True, if the configurationof the master andsecondary slave isinconsistent.

Link statusThe status of the communication link can be either up or down. The link status ofthe master volume is, of course, also the link status of the slave volume.

Chapter 6. Synchronous remote mirroring 53

Page 62: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Operational statusThe coupling between the master and slave volumes is either operational ornon-operational. To be operational, the link status must be up and the coupling mustbe activated. If the link is down or if the remote mirroring feature is in Standbymode, the operational status is non-operational.

Synchronization statusThe synchronization status reflects the consistency of the data between the masterand slave volumes. Because the purpose of the remote mirroring feature is toensure that the slave volume is an identical copy of the master volume, this statusindicates whether this objective is currently attained.

The possible synchronization statuses for the master volume are:

InitializationThe first step in remote mirroring is to create a copy of the data from themaster volume to the slave volume, at the time when the mirroring was setto place. During this step, the coupling status remains initialization.

Synchronized (master volume only)This status indicates that all data that was written to the primary volumeand acknowledged has also been written to the secondary volume. Ideally,the primary and secondary volumes should always be synchronized. Thisdoes not imply that the two volumes are identical because at any time,there might be a limited amount of data that was written to one volume,but was not yet written to its peer volume. This means that their writeoperations have not yet been acknowledged. These are also known aspending writes.

Unsynchronized (primary volume only)

After a volume has completed the initialization stage and achieved thesynchronized status, a volume can become unsynchronized.This occurs when it is not known whether all the data that was written tothe primary volume was also written to the secondary volume. This statusoccurs in the following cases:v Communications link is down - As a result of the communication link

going down, some data might have been written to the primary volume,but was not yet written to the secondary volume.

v Secondary system is down - This is similar to communication linkerrors because in this state, the primary system is updated while thesecondary system is not.

v Remote mirroring is deactivated - As a result of the remote mirroringdeactivation, some data might have been written to the primary volumeand not to the secondary volume.

It is always possible to reestablish the synchronized status when the link isreestablished or the remote mirroring feature is reactivated, no matter what wasthe reason for the unsynchronized status.

Because all updates to the primary volume that are not written to the secondaryvolume are recorded, these updates are written to the secondary volume. Thesynchronization status remains unsynchronized from the time that the coupling isnot operational until the synchronization process is completed successfully.

54 IBM XIV Storage System: Product overview

Page 63: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Synchronization progress statusDuring the synchronization process while the secondary volumes are beingupdated with previously written data, the volumes have a dynamicsynchronization process status.

This status is comprised of the following sub-statuses:

Size to completeThe size of data that requires synchronization.

Part to synchronizeThe size to synchronize divided by the maximum size-to-synchronize sincethe last time the synchronization process started. For couplinginitialization, the size-to-synchronize is divided by the volume size.

Time to synchronizeEstimate of the time, which is required to complete the Synchronizationprocess and achieve synchronization, based on past rate.

Last secondary time stampA time stamp is taken when the coupling between the primary and secondaryvolumes becomes non-operational.

This time stamp specifies the last time that the secondary volume was consistentwith the primary volume. This status has no meaning if the coupling'ssynchronization state is still initialization. For synchronized coupling, thistimestamp specifies the current time. Most importantly, for an unsynchronizedcoupling, this timestamp denotes the time when the coupling becamenon-operational.

The timestamp is returned to current only after the coupling is operational and theprimary and secondary volumes are synchronized.

I/O operationsI/O operations are performed on the primary and secondary volumes acrossvarious configuration options.

I/O on the primary

Read All data is read from the primary (local) site regardless of whether thesystem is synchronized.

Write

v If the coupling is operational, data is written to both the primary andsecondary volumes.

v If the coupling is non-operational, an error is returned.

The error reflects the type of problem that was encountered. For example,remote mirroring has been deactivated, there is a locked secondary error,or there is a link error.

I/O on the secondary

A secondary volume can have LUN maps and hosts associated with it, but it isonly accessible as a read-only volume. These maps are used by the backup hostswhen a switchover is performed. When the secondary volume becomes the

Chapter 6. Synchronous remote mirroring 55

Page 64: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

primary volume, hosts can write to it on the remote site. When the primaryvolume becomes a secondary volume, it becomes read-only and can be updatedonly by the new primary volume.

Read Data is read from the secondary volume like from any other volume.

Write An attempt to write on the secondary volume results in a volumeread-only SCSI error.

Synchronization processWhen a failure condition has been resolved, remote mirroring begins the process ofsynchronizing the coupling. This process updates the secondary volume with allthe changes that occurred while the coupling was not operational.

This section describes the process of synchronization.

State diagramCouplings can be in the Initialization, Synchronized, Timestamp, or Unsychronizedstate.

The following diagram shows the various coupling states that the IBM XIV StorageSystem assumes during its lifetime, along with the actions that are performed ineach state.

The following list describes each coupling state:

Figure 18. Coupling states and actions

56 IBM XIV Storage System: Product overview

Page 65: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

InitializationThe secondary volume has a Synchronization status of Initialization.During this state, data from the primary volume is copied to the secondaryvolume.

SynchronizedThis is the working state of the coupling, where both the primary andsecondary volumes are consistent.

TimestampRemote mirroring has become non-operational so a time stamp is recorded.During this status, the following actions take place:1. Coupling deactivation, or the link is down2. Coupling is reactivated, or the link is restored.

UnsynchronizedRemote mirroring is non-operational because of a communications failureor because remote mirroring was deactivated. Therefore, the primary andsecondary volumes are not synchronized. When remote mirroring resumes,s.jpg are taken to return to the Synchronized state.

Coupling recoveryRemote mirroring recovers from non-operational coupling.

When remote mirroring recovers from a non-operational coupling, the followingactions take place:v If the secondary volume is in the Synchronized state, a last-consistent snapshot

of the secondary volume is created and named with the stringsecondary-volume-time-date-consistent-state.

v The primary volume updates the secondary volume until it reaches theSynchronized state.

v The primary volume deletes the special snapshot after all couplings that mirrorvolumes between the same pair of systems are synchronized.

Uncommitted dataWhen the coupling is in an Unsynchronized state, for Best-effort coupling, thesystem must track which data in the primary volume has been changed, so thatthese changes can be committed to the secondary when the coupling becomesoperational again.

The parts of the primary volume that must be committed to the secondary volumeand must be marked are called uncommitted data.

Note: There is only metadata that marks the parts of the primary volume thatmust be written to the secondary volume when the coupling becomes operational.

Constraints and limitationsCoupling has constraints and limitations.

The following constraints and limitations exist:v The Size, Part, or Time-to-synchronize are relevant only if the Synchronization

status is Unsynchronized.v The last-secondary-time stamp is only relevant if the coupling is

Unsynchronized.

Chapter 6. Synchronous remote mirroring 57

Page 66: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Last-consistent snapshotsBefore the synchronization process is initiated, a snapshot of the secondary volumeis created. This snapshot is created to ensure the usability of the secondary volumein case of a primary site disaster during the synchronization process.

If the primary volume is destroyed before the synchronization is completed, thesecondary volume might be inconsistent because it may have been only partiallyupdated with the changes that were made to the primary volume. The reason forthis possible inconsistency is the fact that the updates were not necessarilyperformed in the same order in which they were written by the hosts.

To handle this situation, the primary volume always creates a snapshot of thelast-consistent secondary volume after re-connecting to the secondary machine, andbefore starting the synchronization process.

The last consistent snapshot

The Last Consistent snapshot (LCS) is created by the system on the Slave peer insynchronous mirroring just before mirroring resynchronization needs to take place.Mirroring resynchronization takes place after link disruption, or a manualmirroring deactivation. In both cases the Master will continue to accept host writes,yet will not replicate them onto the Slave as long as the link is down, or themirroring is deactivated.

Once the mirroring is restored and activated, the system takes a snapshot of theSlave (LCS), which represents the data that is known to be mirrored, and only thenthe non yet mirrored data written to the Master is replicated onto the Slavethrough a resynchronization process.

The LCS is deleted automatically by the system once the resynchronization iscomplete for all mirrors on the same target , but if the Slave peer role is changedduring resynchronization � this snapshot will not be deleted.

The external last consistent snapshot

Prior to the introduction of the external last consistent snapshot, whenever thepeer's role was changed back to Slave and sometime whenever a newresynchronization process had started, the system would detect an LCS on the peerand would not create a new one. If, during such an event, the peer was not part ofa mirrored consistency group (mirrored CG) it would meant that not all volumeshave the same LCS timestamp. If the peer was part of a mirrored consistencygroup, we would have a consistent LCS but not as current as possibly expected.This situation is avoided thanks to the introduction of the external last consistentsnapshot.

Whenever the role of a Slave with an LCS is changed to Master while mirroringresynchronization is in progress (in the system/target not specific to this volume),the LCS is renamed external last consistent (ELCS). The ELCS retains the LCSdeletion priority of 0. If the peer's role is later changed back to Slave and sometimeafterwards a new resynchronization process starts, a new LCS will be created.

Subsequently changing the Slave role again will rename the existing external lastconsistent snapshot to external last consistent x (x being the first available numberstarting from 1) and will rename the LCS to external last consistent. The deletionpriority of external last consistent will be 0, but the deletion priority of the new

58 IBM XIV Storage System: Product overview

Page 67: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

external last consistent x will be the system default (1), and can thus be deletedautomatically by the system upon pool space depletion.

It is crucial to validate whether the LCS or an ELCS (or even ELC x) should serveas a restore point for the Slave peer if resynchronization cannot be completed.While snapshots with deletion priority 0 are not automatically deleted by thesystem to free space, the external last consistent and external last consistent xsnapshots can be manually deleted by the administrator if so required. As thedeletion of such snapshots might leave an inconsistent peer without a consistentsnapshot to be restored from (in case the resynchronization cannot complete due toMaster unavailability) � it should generally be avoided even when pool space isdepleted, unless the peer is guaranteed to be consistent.

Manually deleting the last consistent snapshotv Only the XIV support team can delete the last consistent snapshot. The XIV

support team uses the delete_mirror_snapshots CLI command.v The XIV support team can also configure a mirroring so that it does not create

the last consistent snapshot. This is required when the system that contains thesecondary volume is fully utilized and an additional snapshot cannot be created.

Last consistent snapshot timestampA timestamp is taken when the coupling between the primary and secondaryvolumes becomes non-operational. This timestamp specifies the last time that thesecondary volume was consistent with the primary volume.

This status has no meaning if the coupling's synchronization state is stillInitialization. For synchronized couplings, this timestamp specifies the current time.Most importantly, for unsynchronized couplings, this timestamp denotes the timewhen the coupling became non-operational.

Table 7 provides an example of a failure situation and describes the time specifiedby the timestamp.

Table 7. Example of the last consistent snapshot time stamp process

Time Status of coupling Action Last consistenttimestamp

Up to 12:00 Operational andsynchronized

Current

12:00 - 1:00 Failure caused thecoupling to becomenon-operational. Thecoupling isUnsynchronized.

Writing continues to the primaryvolume. Changes are marked so thatthey can be committed later.

12:00

13:00 Connectivity resumes andremote mirroring isoperational.Synchronization begins.The coupling is stillUnsynchronized.

All changes since the connection wasbroken are committed to thesecondary volume, as well as currentwrite operations.

12:00

13:15 Synchronized Current

Secondary locked error statusWhile the synchronization process is in progress, there is a period in which thesecondary volume is not consistent with the primary volume, and a last-consistentsnapshot is maintained. While in this state, I/O operations to the secondary

Chapter 6. Synchronous remote mirroring 59

Page 68: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

volume can fail because there is not enough space. There is not enough spacebecause every I/O operation potentially requires a copy-on-write of a partition.

Whenever I/O operations fail because there is not enough space, all couplings inthe system are set to the secondary-locked status and the coupling becomesnon-operational. The administrator is notified of a critical event, and can free spaceon the system containing the secondary volume.

If this situation occurs, contact an IBM XIV field engineer. After there is enoughspace, I/O operations resume and remote mirroring can be reactivated.

Role switchover

Role switchover when remote mirroring is operationalRole switching between primary and secondary volumes can be performed fromthe IBM XIV Storage Management GUI or the XCLI after the remote mirroringfunction is operational. After role switchover occurs, the primary volume becomesthe secondary volume and vice versa.

There are two typical reasons for performing a switchover when communicationsbetween the volumes exist. These are:

Drills Drills can be performed on a regular basis to test the functioning of thesecondary site. In a drill, an administrator simulates a disaster and teststhat all procedures are operating smoothly.

Scheduled maintenanceTo perform maintenance at the primary site, switch operations to thesecondary site on the day before the maintenance. This can be done as apreemptive measure when a primary site problem is known to occur.

This switchover is performed as an automatic operation acting on the primaryvolume. This switchover cannot be performed if the primary and secondaryvolumes are not synchronized.

Role switchover when remote mirroring is nonoperationalA more complex situation for role switching is when there is no communicationbetween the two sites, either because of a network malfunction, or because theprimary site is no longer operational. The XCLI command for this scenario isreverse_role. Because there is no communication between the two sites, thecommand must be issued on both sites concurrently, or at least beforecommunication resumes.

Switchover procedures differ depending on whether the primary and secondaryvolumes are connected or not. As a general rule, the following is true:v When the coupling is deactivated, it is possible to change the role on one side

only, assuming that the other side will be changed as well before communicationresumes.

v If the coupling is activated, but is either unsynchronized, or nonoperational dueto a link error, an administrator must either wait for the coupling to besynchronized, or deactivate the coupling.

v On the secondary volume, an administrator can change the role even if couplingis active. It is assumed that the coupling will be deactivated on the primaryvolume and the role switch will be performed there as well in parallel. If not, aconfiguration error occurs.

60 IBM XIV Storage System: Product overview

Page 69: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Switch secondary to primaryThe role of the secondary volume can be switched to primary using the IBM XIVStorage Management GUI or the XCLI. After this switchover, the following is true:v The secondary volume is now the primary.v The coupling has the status of unsynchronized.v The coupling remains in standby mode, meaning that the remote mirroring is

deactivated. This ensures an orderly activation when the role of the other site isswitched.

The new primary volume starts to accept write commands from local hosts.Because coupling is not active, in the same way as any primary volume, itmaintains a log of which write operations should be sent to the secondary whencommunication resumes.

Typically, after switching the secondary to the primary volume, an administratoralso switches the primary to the secondary volume, at least before communicationresumes. If both volumes are left with the same role, a configuration error occurs.

Secondary consistencyIf the user is switching the secondary to a primary volume, and a snapshot of thelast-consistent state exists, then the link was broken during the process ofsynchronizing. In this case, the user has a choice between using the most-updatedversion, which might be inconsistent, or reverting to the last_consistent snapshot.Table 8 outlines this process.

Table 8. Disaster scenario leading to a secondary consistency decision

Time Status of remote mirroring Action

Up to 12:00 Operational Volume A is the primary volume and volume Bis the secondary volume.

12:00 Nonoperational because ofcommunications failure

Writing continues to volume A and volume Amaintains the log of changes to be committedto volume B.

13:00 Connectivity resumes andremote mirroring is operational.

A last_consistent snapshot is generated onvolume B. After that, volume A starts to updatevolume B with the write operations thatoccurred since communication was broken.

13:05 Primary site is destroyed and allinformation is lost.

13:10 Volume B is becoming the primary. Theoperators can choose between using themost-updated version of volume B, whichcontains only parts of the write operationscommitted to volume A between 12:00 and13:00, or use the last-consistent snapshot,which reflects the state of volume B at 12:00.

If a last-consistent snapshot exists and the role is changed from secondary toprimary, the system automatically generates a snapshot of the volume. Thissnapshot is named most_updated snapshot. It is generated to enable a safe reversionto the latest version of the volume, when recovering from user errors. Thissnapshot can only be deleted by the IBM XIV Storage System support team.

If the coupling is still in the initialization state, switching cannot be performed. Inthe extreme case where the data is needed even though the initial copy was notcompleted, a volume copy can be used on the primary volume.

Chapter 6. Synchronous remote mirroring 61

Page 70: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Switch primary to a secondaryWhen coupling is inactive, the primary machine can switch roles. After such aswitch, the primary volume becomes the secondary one.

Unsynchronized primary becoming a secondary

Because the primary volume is inactive, it is also in the unsynchronized state, andit might have an uncommitted data list. All these changes will be lost. When thevolume becomes secondary, this data must be reverted to match the data on thepeer volume, which is now the new primary volume. In this case, an event iscreated, summarizing the size of the changes that were lost.

The uncommitted data list has now switched its semantics, and instead of being alist of updates that the local volume (old primary, new secondary) needs to updateon the remote volume (old secondary, new primary), the list now represents theupdates that need to be taken from the remote to the local volume.

Upon reestablishing the connection, the local volume (current secondary, whichwas the primary) will update the remote volume (new primary) with thisuncommitted data list to update, and it is the responsibility of the new primaryvolume to synchronize these lists to the local volume (new secondary).

Resumption of remote mirroring after role changeWhen the communication link is resumed after a switchover of roles in which bothsides were switched, the coupling now contains one secondary and one primaryvolume.

Note: After a role switchover, the coupling is in standby. The coupling can beactivated before or after the link resumes.

Table 9 describes the system when the coupling becomes operational, meaning afterthe communications link has been resumed and the coupling has been reactivated.When communications is resumed, the new primary volume (old secondary) mightbe in the unsynchronized state, and have an uncommitted data list to synchronize.

The new secondary volume (old primary), might have an uncommitted data list tosynchronize from the new primary volume. These are write operations that werewritten after the link was broken and before the role of the volume was switchedfrom primary to secondary. These changes must be reverted to the content of thenew primary volume. Both lists must be used for synchronization by the newprimary volume.

Table 9. Resolution of uncommitted data for synchronization of the new primary volume

Time Status of remotemirroring

Action

Up to12:00

Operational andsynchronized

Volume A is the primary volume and volume B is thesecondary volume.

12:00 to12:30

Communication failure,coupling becomesnonoperational

Volume A still accepts write operations from the hosts andmaintains an uncommitted data list marking these writeoperations. For example, volume A accepted a write operationto blocks 1000 through 2000, and marks blocks 1000 through2000 as ones that need to be copied to volume B afterreconnection.

62 IBM XIV Storage System: Product overview

Page 71: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Table 9. Resolution of uncommitted data for synchronization of the new primaryvolume (continued)

Time Status of remotemirroring

Action

12:30 Roles changed on bothsides

Volume A is now secondary and volume B is primary. VolumeA should now revert the changes done between 12:00 and 12:30to their original values. This data reversion is only performedafter the two systems reconnect. For now, volume A reverts thesemantics of the uncommitted data list to be data that needs tobe copied from volume B. For example, blocks 1000 through2000 need to be copied now from volume B.

12:30 to13:00

Volume B is primary,volume A is secondary,coupling isnonoperational

Volume A does not accept changes because it is a secondary ina nonoperational coupling. volume B is now a primary in anonoperational coupling, and maintains its own uncommitteddata list of the write operations that were performed since itwas defined as the primary. For example, if the hosts wroteblocks 1500 through 2500, volume B marks these blocks to becopied to volume A.

13:00 Connectivity resumes Volume B and volume A communicate and volume B mergesthe lists of uncommitted data. Volume B copies to volume Aboth the blocks that changed in volume B between 12:30 and13:00, as well as the blocks that changed in volume A between12:00 and 12:30. For example, volume B could copy to volumeA blocks 1000 through 2500, where blocks 1000 through 1500would revert to their original values at 12:00 and blocks 1500through 2500 would have the values written to volume Bbetween 12:30 and 13:00. Changes written to volume Abetween 12:00 and 12:30 are lost.

Reconnection when both sides have the same roleSituations where both sides are configured to the same role can only occur whenone side was switched while the link was down. This is a user error, and the usermust follow these guidelines to prevent such a situation:v Both sides need to change roles before the link is resumed.v As a safety measure, it is recommended to first switch the primary to secondary.

If the link is resumed and both sides have the same role, the coupling will notbecome operational.

To solve the problem, the user must use the role switching mechanism on one ofthe volumes and then activate the coupling.

In this situation, the system behaves as follows:v If both sides are configured as secondary volumes, a minor error is issued.v If both sides are configured as primary volumes, a critical error is issued. Both

volumes will be updated locally with remote mirroring being nonoperationaluntil the condition is solved.

Miscellaneous

Remote mirroring and consistency groupsThe following assumptions ensure that consistency group procedures arecompatible with the remote mirroring function:v All volumes in a consistency group are mirrored on the same system (as all

primaries on a system are mirrored on the same system).v All volumes in a consistency group have the same role.

Chapter 6. Synchronous remote mirroring 63

Page 72: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

v The last_consistent snapshot is created and deleted system-wide, and therefore itis consistent across the consistency group.

Note: An administrator can incorrectly switch the roles of some of the volumes ina consistency group, while keeping others in their original role. This is notprevented by the system and is detected at the application level.

Using remote mirroring for media error recoveryIf a media error is discovered on one of the volumes of the coupling, the peervolume is then used for a recovery.

Supported configurationsv Either fibre-channel or iSCSI can serve as the protocol between the primary and

secondary volumes. A volume accessed through one protocol can besynchronized using another protocol.

v The remote system must be defined as an XIV in the remote-target connectivitydefinitions.

v All the peers of volumes that belong to the same consistency group on a systemmust reside on a single remote system.

v Primary and secondary volumes must contain the same number of blocks.

I/O performance versus synchronization speed optimizationThe IBM XIV Storage System has two global parameters, controlling the maximumrate used for initial synchronization and for synchronization after nonoperationalcoupling.

These rates are used to prevent a situation where synchronization uses too many ofthe system or communication line resources.

This configuration parameter can be changed at any time. These parameters are setby the IBM XIV Storage System technical support representative.

Implications regarding other commandsv Renaming a volume changes the name of the last_consistent and most_updated

snapshots.v Deleting all snapshots does not delete the last_consistent and most_updated

snapshot.v Resizing a primary volume resizes its secondary volume.v A primary volume cannot be resized when the link is down.v Resizing, deleting, and formatting are not permitted on a secondary volume.v A primary volume cannot be formatted. If a primary volume must be formatted,

an administrator must first deactivate the mirroring, delete the mirroring, formatboth the secondary and primary volumes, and then define the mirroring again.

v Secondary or primary volumes cannot be the target of a copy operation.v Locking and unlocking are not permitted on a secondary volume.v Last_consistent and most_updated snapshots cannot be unlocked.v Deleting is not permitted on a primary volume.v Restoring from a snapshot is not permitted on a primary volume.v Restoring from a snapshot is not permitted on a secondary volume.

64 IBM XIV Storage System: Product overview

Page 73: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

v A snapshot cannot be created with the same name as the last_consistent ormost_updated snapshot.

Chapter 6. Synchronous remote mirroring 65

Page 74: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

66 IBM XIV Storage System: Product overview

Page 75: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Chapter 7. Asynchronous remote mirroring

Asynchronous mirroring enables you to attain high availability of critical datathrough a process that asynchronously replicates data updates that are recorded ona primary storage peer to a remote, secondary peer.

The relative merits of asynchronous and synchronous mirroring are best illustratedby examining them in the context of two critical objectives:v Responsiveness of the storage systemv Currency of mirrored data

With synchronous mirroring, host writes are acknowledged by the storage systemonly after being recorded on both peers in a mirroring relationship. This yieldshigh currency of mirrored data (both mirroring peers have the same data), yetresults in less than optimal system responsiveness because the local peer cannotacknowledge the host write until the remote peer acknowledges it. This type ofprocess incurs latency that increases as the distance between peers increases.

XIV features both asynchronous mirroring and synchronous mirroring.Asynchronous mirroring is advantageous in various use cases. It represents acompelling mirroring solution in situations that warrant replication betweendistant sites because it eliminates the latency inherent to synchronous mirroring,and might lower implementation costs. Careful planning of asynchronousmirroring can minimize the currency gap between mirroring peers, and can help torealize better data availability and cost savings.

With synchronous mirroring (first image below), response time (latency) increasesas the distance between peers increases, but both peers are synchronized. Withasynchronous mirroring (second image below), response time is not sensitive todistance between peers, but the synchronization gap between peers is sensitive tothe distance.

Figure 19. Synchronous mirroring extended response time lag

© Copyright IBM Corp. 2011 67

Page 76: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Note: Synchronous mirroring is covered in Chapter 6, “Synchronous remotemirroring,” on page 49.

Chapter scopeThis chapter presents the following key aspects of the XIV asynchronous mirroringfunctionality:v Feature highlightsv Terminologyv Specificationsv A technology overview of XIV asynchronous mirroringv Initializing XIV asynchronous mirroringv Walking through an XIV asynchronous mirroring processv Administering XIV asynchronous mirroringv Asynchronous mirroring of consistency groupsv Accommodating disaster recovery scenarios with XIV asynchronous mirroringv Analyzing XIV asynchronous mirroring

Features highlightsThe IBM XIV Storage System blends existing and new XIV technologies to producean advanced mirroring solution with unique strengths.

The following are highlights of IBM XIV Storage System asynchronous mirroring:

Advanced Snapshot-based TechnologyIBM XIV asynchronous mirroring is based on XIV snapshot technology,which streamlines implementation while minimizing impact on generalsystem performance. The technology leverages functionality that haspreviously been effectively employed with synchronous mirroring and isdesigned to support mirroring of complete systems – translating tohundreds or thousands of mirrors.

Mirroring of Consistency GroupsIBM XIV supports definition of mirrored consistency groups, which ishighly advantageous to enterprises, facilitating easy management ofreplication for all volumes that belong to a single consistency group. This

Figure 20. Asynchronous mirroring - no extended response time lag

68 IBM XIV Storage System: Product overview

Page 77: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

enables streamlined restoration of consistent volume groups from a remotesite upon unavailability of the primary site.

Automatic and Manual ReplicationAsynchronous mirrors can be assigned a user-configurable schedule forautomatic, interval-based replication of changes, or can be configured toreplicate changes upon issuance of a manual (or scripted) user command.Automatic replication allows you to establish crash-consistent replicas,whereas manual replication allows you to establish application-consistentreplicas, if required. The XIV implementation allows you to combine bothapproaches because you can define mirrors with a scheduled replicationand you can issue manual replication jobs for these mirrors as needed.

Multiple RPOs and Multiple SchedulesIBM XIV asynchronous mirroring enables each mirror to be specified adifferent RPO, rather than forcing a single RPO for all mirrors. This can beused to prioritize replication of some mirrors over others, potentiallymaking it easier to accommodate application RPO requirements, as well asbandwidth constraints.

Flexible and Independent Mirroring IntervalsIBM XIV asynchronous mirroring supports schedules with intervalsranging between 20 seconds and 12 hours. Moreover, intervals areindependent from the mirroring RPO. This enhances the ability to fine tunereplication to accommodate bandwidth constraints and different RPOs.

Flexible pool managementIBM XIV asynchronous mirroring enables the mirroring of volumes andconsistency groups that are stores in thin provisioned pools. This applies toboth mirroring peers.

Bi-Directional MirroringIBM XIV systems can host multiple mirror sources and targetsconcurrently, supporting over a thousand mirrors per system. Furthermore,any given IBM XIV Storage System can have mirroring relationships withseveral other IBM XIV systems. This enables enormous flexibility whensetting mirroring configurations.

The number of systems with which the Storage System can have mirroringrelationships is specified out side this document (see the IBM XIV StorageSystem Data Sheet).

Concurrent Synchronous and Asynchronous MirroringThe IBM XIV Storage System can concurrently run synchronous andasynchronous mirrors.

Easy Transition between Peer RolesIBM XIV mirror peers can be easily changed between master and slave.

Easy Transition From Independent Volume Mirrors into Consistency GroupMirror

The IBM XIV Storage System allows for easy configuration of consistencygroup mirrors, easy addition of mirrored volumes into a mirroredconsistency group, and easy removal of a volume from a mirroredconsistency group while preserving mirroring for such volume.

Control over Synchronization Rates per TargetThe asynchronous mirroring implementation enables administrators toconfigure different system mirroring rates with each target system.

Chapter 7. Asynchronous remote mirroring 69

Page 78: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Comprehensive Monitoring and EventsIBM XIV systems generate events and monitor critical asynchronousmirroring-related processes to produce important data that can be used toassess the mirroring performance.

Easy Automation via ScriptsAll asynchronous mirroring commands can be automated through scripts.

TerminologyMirror coupling (sometimes referred to as coupling)

A pairing of storage peers (either volumes or consistency groups) that areengaged in a mirroring relationship.

Master and SlaveThe roles that correspond with the source and target storage peers for datareplication in a mirror coupling. These roles can be changed by a systemadministrator after a mirror is created to accommodate customer needs andsupport failover and failback scenarios. A valid mirror can have only onemaster peer and only one slave peer.

Peer DesignationA user-configurable mirroring attribute that describes the designationassociated with a coupling peer. The master is designated by default asprimary and the slave is designated by default as secondary. These valuesserve as a reference for the original peer's designation regardless of anyrole change issued after the mirror is created, but should not be mistakenfor the peer's role (which is either master or slave).

Last replicated snapshotA snapshot that represents the latest state of the master that is confirmedto be replicated to the slave.

Most recent snapshotA snapshot that represents the latest synchronized state of the master thatthe coupling can revert to in case of disaster.

Sync JobThe mirroring process responsible for replicating any data updatesrecorded on the master since the Last Replicated Snapshot was taken.These updates are replicated to the slave.

ScheduleAn administrative object that specifies how often a Sync Job is created foran associated mirror coupling.

IntervalA schedule parameter that indicates the duration between successive SyncJobs.

RPO Recovery Point Objective – an objective for the maximal datasynchronization gap acceptable between the master and the slave. Anindicator for the tolerable data loss (expressed in time units) in the event offailure or unavailability of the master.

RTO Recovery Time Objective - an objective for the maximal time to restoreservice after failure or unavailability of the master.

Specifications

The following specifications apply to the mirroring operation:

70 IBM XIV Storage System: Product overview

Page 79: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Minimum link bandwidth10Mbps.

Recommended link bandwidth20Mbps and up.

Maximum round trip latency250ms.

Technological overviewThe IBM XIV Storage System asynchronous mirroring blends existing and newtechnologies.

The asynchronous mirroring implementation is based on snapshots and featuresthe ability to establish automatic and manual mirroring with the added flexibilityto assign each mirror coupling with a different RPO. The ability to specify adifferent schedule for each mirror independently from the RPO helps accommodatespecial mirroring prioritization requirements without subjecting all mirrors to thesame mirroring parameters. The paragraphs below detail the following IBM XIVasynchronous mirroring aspects, technologies, and concepts:v The replication schemev The snapshot-based technologyv IBM XIV asynchronous mirroring special snapshotsv Initializing IBM XIV asynchronous mirroringv The mirroring replication unit: the Sync Jobv Mirroring schedules and intervalsv The manual (ad-hoc) Sync Jobv Determining mirror state through the RPOv Mirrored consistency groupsv IBM XIV asynchronous mirroring and pool space depletion

Replication schemeIBM XIV asynchronous mirroring supports establishing mirroring relationshipsbetween an IBM XIV Storage System and other XIV systems.

Each of these relationships can be either synchronous or asynchronous and asystem can concurrently act as a master in one relationship and act as the slave inanother relationship. There are also no practical distance limitations forasynchronous mirroring – mirroring peers can be located in the same metropolitanarea or in separate continents.

Each IBM XIV Storage System can have mirroring relationships with other IBMXIV Storage Systems. Multiple concurrent mirroring relationships are supportedwith each target.

Chapter 7. Asynchronous remote mirroring 71

Page 80: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Snapshot-based technologyIBM XIV features an innovative snapshot-based technology for asynchronousmirroring that facilitates concurrent mirrors with different recovery objectives.

With IBM XIV asynchronous mirroring, write order on the master is not preservedon the slave. As a result, a snapshot taken of the slave at any moment is mostlikely inconsistent and therefore not valid. To ensure high availability of data in theevent of a failure or unavailability of the master, it is imperative to maintain aconsistent replica of the master that can ensure service continuity.

This is achieved through XIV snapshots. XIV asynchronous mirroring employssnapshots to record the state of the master, and calculates the difference betweensuccessive snapshots to determine the data that needs be copied from the master tothe slave as part of a corresponding replication process. Upon completion of thereplication process, a snapshot is taken of the slave and reflects a valid replica ofthe master.

Below are select technological properties that explain how the snapshot-basedtechnology helps realize effective asynchronous mirroring:v XIV's support for a practically unlimited number of snapshots facilitates

mirroring of complete systems with practically no limitation on the number ofmirrored volumes supported

v XIV implements memory optimization techniques that further maximize theperformance attainable by minimizing disk access.

Figure 21. The replication scheme

72 IBM XIV Storage System: Product overview

Page 81: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Mirroring special snapshotsThe status and scope of the synchronization process is determined through the useof snapshots.

The following two special snapshots are used:

most_recent snapshotThis snapshot is the most recent snapshot taken of the master (being eithera volume or consistency group), prior to the creation of a new replicationprocess (Sync Job – see below). This snapshot exists only on the master.

last_replicated snapshotThis is the most recent snapshot that is confirmed to have been fullyreplicated to the slave. Both the master and the slave have this snapshot.On the slave, the snapshot is taken upon completion of a replicationprocess, and replaces any previous snapshot with that name. On themaster, the most_recent snapshot is renamed last_replicated after the slaveis confirmed to have a corresponding replica of the master's most_recentsnapshot.

XIV maintains three snapshots per mirror coupling: two on the master and one onthe slave. A valid (recoverable) state of the master is captured in the last_replicatedsnapshot, and on an identical snapshot on the slave. The most_recent snapshotrepresents a recent state of the master that needs be replicated next to the slave.The system determines the data to replicate by comparing the master's snapshots.

Initializing the mirroringAn XIV mirror is easily created using the CLI or GUI. First, the mirror is createdand activated, then an initialization phase starts.

XIV mirrors are created in standby state and must be explicitly activated. Duringthe Initialization phase, the system generates a valid replica of the state of themaster on the slave. Until the Initialization is over, there is no valid replica on theslave to help recover the master (in a case of disaster). Once the Initializationphase ends, a snapshot of the slave is taken. This snapshot represents a validreplica of the master and can be used to restore a consistent state of the master indisaster recovery scenarios.

The Initialization takes the following s.jpg (all part of an atomic operation):

Figure 22. Location of special snapshots

Chapter 7. Asynchronous remote mirroring 73

Page 82: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

The Master start initializing the SlaveWhen a new mirror is defined, a snapshot of the Master is taken. Thissnapshot represents the initial state of the Master prior to the issuing of themirror. The objective of the Initialization is to reflect this state on the Slave.

Initialization finishesOnce the Initialization finishes, an ongoing mirroring commences througha sync job.

AcknowledgementThe slave acknowledges the completion of the Initialization to the Master.

Off-line replicating the master onto the slaveThe IBM XIV Storage System allows for this volume replica to be transferredoff-line to the slave.

At the beginning of the Initialization of the mirror, the user states which volumewill be replicated from the master to the slave. This replica of the master istypically much larger than the schedule-based replicas that accumulate differencesthat are made during a small amount of time. The IBM XIV Storage System allowsfor this volume replica to be transferred off-line to the slave. This method oftransfer is sometimes called "Truck Mode" and is accessible through themirror_create command.

Off-line initialization of the mirror replicates the master onto the slave withoutbeing required to utilize the inter-site link. The off-line replication requires:v Specifying the volume to be mirrored.v Specifying the initialization type to the mirror creation command.v Activating the mirroring.

Figure 23. Asynchronous mirroring over-the-wire initialization

74 IBM XIV Storage System: Product overview

Page 83: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Meeting the above requirements, the system takes a snapshot of the master, andcompares it with the slave volume. Only areas where differences are found arereplicated as part of the initialization. Then, the slave peer's content is checkedagainst the master and not just automatically considered a valid replica. This checkoptimizes the initialization time through taking into consideration the availablebandwidth between the master and slave and whether the replica is identical tothe master volume (that is, there where no writes to the master during theinitialization).

The sync jobData synchronization between the master and slave is achieved through a processrun by the master called a Sync Job.

The Sync Job updates the slave with any data that was recorded on the mastersince the latest Sync Job was created. The process can either be startedautomatically based on a user-configurable schedule, or manually based on auser-issued command.

Calculating the data to be replicated as part of the Sync JobWhen the Sync Job is started, a snapshot of the master's state at that time is taken(the most_recent snapshot).

After any outstanding Sync Job are completed, the system calculates the datadifferences between this snapshot and the most recent master snapshot thatcorresponds with a consistent replica on the slave (the last_replicated snapshot).This difference constitutes the data to be replicated next by the Sync Job.

The replication is very efficient because it only copies data differences betweenmirroring peers. For example, if only a single block was changed on the master,only a single block will be replicated to the slave.

Chapter 7. Asynchronous remote mirroring 75

Page 84: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Mirroring schedules and intervalsThe IBM XIV Storage System implements a scheduling mechanism that is used todrive a recurring asynchronous mirroring process.

Each asynchronous mirror has a specified schedule, and the schedule's intervalindicates how often a Sync Job is created for that mirror.

Asynchronous mirroring has the following features:v The schedule concept. A schedule specifies an interval for automatic creation of

Sync Jobs; a new Sync Job is normally created at the arrival of a new interval.v A Sync Job is not created if another scheduled Sync Job is running when a new

interval arrivesv Custom schedules can be created by usersv Schedule intervals can be set to any of the following values: 30 seconds, 1 min, 2

min, 5 min, 10 min, 15 min , 30 min , 1 hour, 2 hours, 3 hours, 6 hours, 8 hours,12 hours. The schedule start hour is 00:00.

Note: The IBM XIV Storage System offers a built-in, non-configurable schedulecalled min_interval with a 20s interval. It is only possible to specify a 20sschedule using this predefined schedule.

v When creating a mirror, two schedules are specified - one per peer. The slave'sschedule can help streamline failover scenarios - controlled by either XIV or a3rd party process.

v A single schedule can be referenced by multiple couplings on the same system.

Figure 24. : The Asynchronous mirroring Sync Job

76 IBM XIV Storage System: Product overview

Page 85: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

v Sync Job creation for mirrors with the same schedule takes place at exactly thesame time. This is in contrast with mirrors having different schedules with thesame interval. Despite having the same interval, Sync Jobs for these types ofmirrors are not guaranteed to take place at the same time.

v A unique schedule called Never is provided to indicate that no Sync Jobs areautomatically created for the pertinent mirror (see below).

Schedules are local to a single XIV system

Schedules are local to the XIV system where they are defined and are setindependently of system-to-system relationships. A given source-to-targetreplication schedule does not mandate an identical schedule defined on the targetfor reversed replication. To maintain an identical schedule for reverse replication (ifthe master and slave roles need be changed), independent identical schedules mustbe defined on both peers.

Schedule sensitivity to timezone difference

The schedules of the peers of a mirroring couple have to be defined in a way thatwon't be impacted from timezone differences. For example, if the timezonedifference between the master and slave sites is two hours, the interval is 3 hoursand the schedule on one peer is (12PM, 3AM, 6AM,...), the schedule on the otherpeer needs to be (2AM, 5AM, 8AM). Although some cases do not call for shiftedschedules (for example, a timezone difference of 2 hours and an interval of onehour), this issue can't be overlooked.

The master and the slave also have to have their clocks synchronized (for exampleusing NTP). Avoiding such a synchronization could hamper schedule-relatedmeasurements, mainly RPO.

The Never schedule

The system features a special, non-configurable schedule called Never that denotesa schedule with no interval. This schedule indicates that no Sync Jobs areautomatically created for the mirror so it is only possible to issue replication forthe mirror through a designated manual command.

Note: A manual snapshot mirror can be issued to every mirror that is assigned auser-defined schedule.

The mirror snapshot (ad-hoc sync job)You can manually issue a dedicated command to run a mirror snapshot, inaddition to using the schedule-based option.

This type of mirror snapshot can be issued for a coupling regardless of whether ithas a schedule. The command creates a new snapshot on the master and manuallyinitiates a Sync Job that is queued behind outstanding Sync Jobs.

The mirror snapshot:v Accommodates a need for adding manual replication points to a scheduled

replication process.v Creates application-consistent replicas (in cases where consistency is not

achieved via the scheduled replication).

Chapter 7. Asynchronous remote mirroring 77

Page 86: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

The following characteristics apply to the manual initiation of the asynchronousmirroring process:v Multiple mirror snapshot commands can be issued – there is no maximum limit

on the number of mirror snapshots that can be issued manually.v A mirror snapshot running when a new interval arrives delays the start of the

next interval-based mirror scheduled to run, but does not cancel the creation ofthis Sync Job.– The interval-based mirror snapshot will be cancelled only if the running

snapshot mirror (ad-hoc) has never finished.

Other than these differences, the manually initiated Sync Job is identical to aregular interval-based Sync Job.

Determining replication and mirror statesThe mirror state indicates whether the master is mirrored according to objectivesthat are specified by the user.

As asynchronous mirroring endures a gap that may exist between the master andslave states, the user must specify a restriction objective for the mirror – the RPO –or Recovery Point Objective. The system determines the mirror state by examiningif the master's replica on the slave. The mirror state is considered to be OK only ifthe master replica on the slave is newer than the objective that is specified by theRPO.

RPO and RTOThe evaluation of the synchronization status is done based on the mirror's RPOvalue. Note the difference between RPO and RTO.

RPO Stands for Recovery Point Objective and represents a measure of themaximum data loss that is acceptable in the event of a failure orunavailability of the master.

RPO unitsEach mirror must be set an RPO by the administrator, expressed intime units. Valid RPO values range between 30 seconds and 24hours. An RPO of 60 seconds indicates that the slave's state shouldnot be older than the master's state by more than 60 seconds. Thesystem can be instructed to alert the user if the RPO is missed, andthe system's internal prioritization process for mirroring is alsoadjusted.

RTO Stands for Recovery Target Objective and represents the amount of time ittakes the system to recover from a failure or unavailability of the master.

The mirror's RTO is not administered in XIV.

Mirror status valuesThe mirror status is determined based on the mirror state and the mirroring status.

During the progress of a Sync Job and until it completes, the slave replica isinconsistent because write order on the master is not preserved during replication.Instead of reporting this state as inconsistent, the mirror state is reported based onthe timestamp of the slave's last_replicated snapshot as one of the following:

RPO_OKSynchronization exists and meets its RPO objective.

78 IBM XIV Storage System: Product overview

Page 87: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

RPO_LaggingSynchronization exists but lags behind its RPO objective.

InitializingMirror is initializing.

Definitions of mirror state and status:

The mirror status is determined based on the mirror state and the mirroring status.

Mirror stateDuring the progress of a Sync Job and until it completes, the slave replicais inconsistent because write order on the master is not preserved duringreplication. Instead of reporting this state as inconsistent, the mirror state isreported based on the timestamp of the slave's last_replicated snapshot asone of the following:

Definition of RPO_OKSynchronization exists and meets its RPO objective.

Definition of RPO_LaggingSynchronization exists but lags behind its RPO objective.

InitializingMirror is initializing.

Mirroring statusThe mirroring status denotes the status of the replication process andreflects the activation state and the link state.

Effective recovery currencyMeasures as the delta between the current time and the timestampof the last_replicated snapshot

Declaring on RPO_OKThe Effective recovery currency is positive.

Declaring on RPO_LaggingThe Effective recovery currency is negative.

Figure 25. The way RPO_OK is determined

Chapter 7. Asynchronous remote mirroring 79

Page 88: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Examples of the way mirror status is determined:

The mirroring status denotes the status of the replication process and reflects theactivation state and the link state.

The following example portrays the way the mirroring status is determined. Thetime-axis denotes time and the schedule of the sync jobs ( t0 - t5). Both RPO statesare displayed in red and green at the upper section of the image.

First sync job - RPO is OK

Time: t0

A sync job starts. RPO_OK is maintained as long as the sync job endsbefore t1.

Time: ta

As the sync job ends at ta, prior to t1, the status is RPO_OK.

Effective recovery currencyDuring the sync job run the value of Effective recovery currency (the blackgraph on the upper section of the image) changes. This value goes up aswe are getting farther from t0, goes down - to the RPO setting - once thesync job complete, and does not resume climbing as long as the nextschedule has arrived.

Figure 26. The way RPO_Lagging is determined

80 IBM XIV Storage System: Product overview

Page 89: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Second sync job - RPO is lagging

Time: t1

A sync job starts. RPO_OK is maintained as long as the sync job endsbefore t2.

Time: t2

The sync job should have ended at this point, but it is still running.

The sync job the was scheduled to run on this point in time is cancelled.

Time: tb

As the sync job ends at tb, which is after t2, the status is RPO_Lagging.

Effective recovery currencyThe value of Effective recovery currency k.jpg climbing as long as the nextsync job hasn't finished.

Third sync job - RPO is OK

Time: t3

A new sync job starts. At this point the status is RPO_Lagging.

Time: tc

As the sync job ends prior to t4, the status is RPO_OK.

Figure 27. Determining the asynchronous mirroring status – example part 1

Figure 28. Determining the asynchronous mirroring status – example part 2

Chapter 7. Asynchronous remote mirroring 81

Page 90: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Effective recovery currencyThe value of Effective recovery currency k.jpg climbing until the next syncjob has finished (this happens at tc). This value immediately returns to theRPO setting until the time of the next schedule.

The added-value of multiple RPOs

The system bases its internal replication prioritization on the mirror RPO; hence –support for multiple RPOs corresponding with true recovery objectives helpsoptimize the available bandwidth for replication.

The added-value of multiple Schedules

You can attain a target RPO using multiple schedule interval options. A variableschedule that is decoupled from the RPO helps optimize the replication process toaccommodate RPO requirements without necessarily modifying the RPO.

Mirrored consistency groupsIBM XIV enables mirrored consistency groups and mirroring of volumes tofacilitate the management of mirror groups.

Asynchronous mirroring of consistency groups is accomplished by taking asnapshot group of the master consistency group in the same manner employed forvolumes, either based on schedules, or manually through a dedicated commandoption.

The peer synchronization and status are managed on a consistency group-level,rather than on a volume-level. This means that administrative operations arecarried out on the whole consistency group, rather than on a specific volumewithin the consistency group. This includes operations such as activation, andmirror-wide settings such as a schedule.

The synchronization status of the consistency group reflects the combined status ofall mirrored volumes pertaining to the consistency group. This status is determinedby examining the (system-internally-kept) status of each volume in the consistencygroup. Whenever a replication is complete for all volumes and their state isRPO_OK, the consistency group mirror status is also RPO_OK. On the other hand,

Figure 29. Determining Asynchronous mirroring status – example part 3

82 IBM XIV Storage System: Product overview

Page 91: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

if the replication is incomplete or any of the volumes in a mirrored consistencygroup has the status of RPO_Lagging, the consistency group mirror state is alsoRPO_Lagging.

Storage space required for the mirroringIBM XIV enables to manage the storage required for the mirroring onthin-provisioned pools on both the master and the slave.

Throughout the course of the mirroring, the last_replicated and most_recentsnapshots may exceed the space allocated to the volume and its snapshots. Thelack of sufficient space on the master can prevent host writes, where the lack ofspace on the slave can disrupt the mirroring process itself.

IBM XIV enables to manage the storage required for the mirroring onthin-provisioned pools. This way, The IBM XIV Storage System manages andallocates space according to the schemes described in the“Thin provisioning” onpage 46 chapter.

Upon depletion of space on each of the peers, the “Pool space depletion”mechanism takes effect.

Pool space depletionPool space depletion is a mechanism that takes place whenever the mirroring canno longer be maintained due to lack of space for incoming write requests issued bythe host.

Whenever a pool does not have enough free space to accommodate the storagerequirements warranted by a new host write, the system runs a multi-stepprocedure that progressively deletes snapshots within that pool until enough spaceis made available for a successful completion of the write request.

This multi-step procedure is progressive, meaning that the system proceeds to thenext step only if following the execution of the current step, there is stillinsufficient space to support the write request.

Protecting snapshots through setting their deletion priority:

Protected snapshots have precedence over other snapshots during the Pool spacedeletion process.

The concept of protected snapshots assigns the Storage Pool with an attribute thatis compared with the snapshots' auto-deletion priority attribute. Whenever asnapshot has a deletion priority that is higher that the pool's attribute, it isconsidered protected.

For example, if the deletion priority of the depleting storage is set to 3, the systemwill delete snapshots with the deletion priority of 4. Snapshots with priority level1, 2 and 3 will not be deleted.

Chapter 7. Asynchronous remote mirroring 83

Page 92: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

If the deletion priority of the depleting storage is set to 4, the system willdeactivate mirroring before deleting any snapshots.

If the deletion priority of the depleting storage is set to 0, the system can deleteany snapshot regardless of deletion priority.

Figure 30. The deletion priority of the depleting storage is set to 3

Figure 31. The deletion priority of the depleting storage is set to 4

84 IBM XIV Storage System: Product overview

Page 93: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Deletion priority conventions

Protecting the deletion priority of the last replicated snapshotThe deletion priority of mirroring-related snapshots is set implicitly by thesystem and cannot be customized by the user (see below).

Last replicated and most recent snapshotsThe deletion priority of the asynchronous mirroring last_replicated andmost_recent snapshots on the master is set to 1.

Last replicated snapshot on the slaveThe deletion priority of the last_replicated snapshot on the slave and the isset to 0 (see below).

Default value of the snapshot protecting CLIBy default, the value of the protected_snapshot_priority parameter of thepool_config_snapshots command is 0.

Changing this valueIf the protected_snapshot_priority parameter is changed, thesystem and user-created snapshots with a deletion prioritynominally equal or lower than the protected setting will be deletedonly after the internal mirroring snapshots are .

For example, if the protected_snapshot_priority is changed to 1, allsystem and user�created snapshots with deletion priority 1 (whichincludes ALL snapshots created by the user, assuming that theirdeletion priority was not changed) will be protected and will bedeleted only after internal mirroring snapshots are.

Other snapshotsNon mirroring-related snapshots are created by default with a deletionpriority 1.

Protecting the last replicated snapshots

The last replicated snapshots represent a consistent replica of the Master inasynchronous mirroring. Both the Master and the Slave have a last replicatedsnapshot, however, these two snapshots are protected differently.

LRSslave

The slave must have an available consistent copy of the master at all times,where the master does not have to have such availability (as the LRSmasteritself is regarded consistent). As a result, this snapshot is never deleted.

Figure 32. The deletion priority of the depleting storage is set to 0

Chapter 7. Asynchronous remote mirroring 85

Page 94: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Upon pool space depletion on the Slave, whenever there is no space for themirroring process, the pool will be locked.

The deletion priority of the LRS on the slave is 0.

LRSmaster

The last replicated snapshot on the master is available for deletion duringpool space depletion.

The deletion priority of the LRS on the master is 1.

Pool space depletion on the master:

The depletion procedure on the master takes the following s.jpg.

Step �1� - deletion of unprotected snapshots

The following snapshots are deleted:

v Regular (not related to mirroring) snapshotsv Snapshots of the mirroring processes that are no longer activev The snapshot of any Snapshot Mirror (a.k.a. ad hoc sync job)

that has not started yet

The deletion is subject to the deletion priority of the individualsnapshot. In the case of deletion priority clash, older snapshots aredeleted first.

Success criteria:The user reattempts operation, re-enables mirroring and resumesreplication. If this fails, the system proceeds to step 2 (below).

Step �2� - deletion of the snapshot of any outstanding (pending) scheduled syncjob If replication still does not resume after the actions taken on step 1:

The following snapshots are deleted:

v All snapshots that were not deleted in step 1.

Success criteria:The system reattempts operation, re-enables mirroring and resumesreplication.

Step �3� - automatic deactivation of the mirroring and deletion of the snapshotdesignated as the mirror most_recent snapshot

If the replication still does not resume:

The following takes place:

v An automatic deactivation of the mirroringv Deletion of the most_recent snapshotv An event is generated.

Ongoing ad-hoc sync jobThe snapshot created during the ad-hoc sync job is considered as amost_recent snapshot, although it is not named as such and notsuplicated with a snapshot in that name. Following the completionof the ad-hoc sync job, and only after this completion, the snapshotis duplicated and the duplicate is named last_replicated.

Upon a manual reactivation of the mirroring process:

1. The mirroring activation state changes to Active2. A most_recent snapshot is created

86 IBM XIV Storage System: Product overview

Page 95: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

3. A new sync job starts

Step �4� - deletion of the last_replicated snapshot

If more space is still required:

The following takes place:

v Deletion of the last_replicated snapshot (on the Master)v An event is generated.

Following the deletion:

1. The mirroring remains deactivated, and must be manuallyreactivated.

2. The mirroring changes to change tracking state. Host I/O to theMaster are tracked but not replicated

3. The system marks storage areas that were written into since thelast_replicated snapshot was created

Step �5� - deletion of the most_recent snapshot that is created when activatingthe mirroring in Change Tracking state

If more space is still required:

The following takes place:

v Deletion of the most_recent snapshot (on the Master).v An event is generated.

Following the deletion:Deletion of this most_recent snapshot in this state leaves themaster with neither a snapshot nor a bitmap, mandating fullinitialization. To minimize the likelihood for such deletion, thissnapshot is automatically assigned a special (new) deletion prioritylevel. This deletion priority implies that the system should deletethe snapshot only after all other last_replicated snapshots in thepool were deleted. Note that the new priority level will only beassigned to a mirror with a consistent Slave replica and not to amirror that was just created (whose first state is also initialization).

Step �6� - deletion of protected snapshots

If more space is still required:

The following takes place:

v An event is generated.v Deletion of all protected snapshots, regardless of the mirroring.

These snapshots are deleted according to their deletion priorityand age.

Following the deletion:

v The Master's state changes to Init (distinguished from theInitialization phase mirrors start with)

v The system stops marking new writesv A most_recent snapshot is createdv The system creates and runs a sync job encompassing all of the

tracked changes trackedv following the completion of this sync job, a last_replicated

snapshot is created on the Master, and the mirror state changesto rpo_ok or rpo_lagging, as warranted by the Effective RPO

Chapter 7. Asynchronous remote mirroring 87

Page 96: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

If pool space depletes during the Init:

v The Master's state remains Initializationv An event is generatedv The mirroring is deactivatedv The most_recent snapshot is deleted (mandating a Full

Initialization)

Upon manual mirroring activation during the Init:

v The Master's state remains Initializationv A most_recent snapshot is createdv The system starts a Full Initialization based on the most_recent

snapshot

Pool space depletion on the slave:

Pool space depletion on the Slave means that there is no room available for thelast_replicated snapshot. In this case, the mirroring is deactivated.

Snapshots with a Deletion Priority of 0 are special snapshots that are created bythe system on the Slave peer and are not automatically deleted to free space,regardless of the pool space depletion process. The asynchronous mirroring slavepear has one such snapshot: the last_replicated snapshot.

Walking through the asynchronous mirroring processThis section walks you through creating an asynchronous mirroring relationship,starting from the initialization all the way through completing the first scheduledSync Job.

Step 1Time is 01:00 when the command to create a new mirror is issued. In this example,an RPO of 120 minutes and a schedule of 60 minutes are specified for the mirror.

The mirroring process must first establish a baseline for ensuing replication. Thiswarrants an Initialization process during which the current state of the master isreplicated to the slave peer. This begins with the host writes being briefly blocked(1). The state of the master peer can then be captured by taking a snapshot of themaster state: the most_recent snapshot (2), which serves as a baseline for ensuingschedule-based mirroring. After this snapshot is created, host writes are no longerblocked and continue to update the storage system (3). At this time, no snapshotexists on the slave yet.

88 IBM XIV Storage System: Product overview

Page 97: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Step 2After the state of the master is captured, the data that needs to be replicated aspart of the Initialization process is calculated. In this example, the master'smost_recent snapshot represents the data to be replicated through the first Sync Job(4).

Step 3During this step, the Initialization Sync Job is well in progress. The mastercontinues to be updated with host writes – the updates are noted in the order theyare written – first 1, then 2 and finally 3. The initialization Sync Job replicates theinitial master peer's state to the slave peer (5).

Figure 33. Asynchronous mirroring walkthrough – part 1

Figure 34. Asynchronous mirroring walkthrough – part 2

Chapter 7. Asynchronous remote mirroring 89

Page 98: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Step 4Moments later, the Initialization Sync Job completes. After it completes, the slave'sstate is captured by taking a snapshot: the last_replicated snapshot (6). Thissnapshot reflects the state of the master as captured in the most_recent snapshot.In this example, it is the state just before the initialization phase started.

Step 5During this step, the master's last_replicated snapshot is created. The most_recentsnapshot on the master is renamed last_replicated (7) and represents the mostrecent point-in-time that the master can be restored if needed (because this state iscaptured in the slave's corresponding snapshot).

Figure 35. Asynchronous mirroring walkthrough – part 3

Figure 36. Asynchronous mirroring walkthrough – part 4

90 IBM XIV Storage System: Product overview

Page 99: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

When the initialization phase ends, the master and slave peers have an identicalrestore time point, which they can be reverted to if needed.

Step 6Based on the mirror's schedule, a new interval arrives in a manner similar to theInitialization phase: host writes are blocked (1), and a new master most_recentsnapshot is created (2), reflecting the master peer's state at this time.

Then, host writes are no longer blocked (3).

The update number (4) occurs after the snapshot is taken and is not reflected inthe next Sync Job. This is shown by the color-shaded cells in the most_recentsnapshot figure.

Figure 37. Asynchronous mirroring walkthrough – part 5

Figure 38. Asynchronous mirroring walkthrough – part 6

Chapter 7. Asynchronous remote mirroring 91

Page 100: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Step 7A new Sync Job is set. The data to be replicated is calculated based on thedifference between the master's most_recent snapshot and the last_replicatedsnapshot (4).

Step 8The Sync Job is in process. During the Sync Job, the master continues to beupdated with host writes (update 5).

The sync job data is not replicated to the slave in the order by which it wasrecorded at the master – the order of updates on the slave is different.

Figure 39. Asynchronous mirroring walkthrough – part 7

Figure 40. Asynchronous mirroring walkthrough – part 8

92 IBM XIV Storage System: Product overview

Page 101: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Step 9The Sync Job is completed. The Slave's last_replicated snapshot is deleted (6) andreplaced (in one atomic operation) by a new last_replicated snapshot.

Step 10The Sync Job is completed with a new last_replicated snapshot representing theupdated slave's state (7).

The slave's last_replicated snapshot reflects the master's state as captured in themost_recent snapshot. In this example, it is the state at the beginning of the mirrorschedule's interval.

Figure 41. Asynchronous mirroring walkthrough – part 9

Figure 42. Asynchronous mirroring walkthrough – part 10

Chapter 7. Asynchronous remote mirroring 93

Page 102: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Step 11A new master last_replicated snapshot created. In one transaction - the currentlast_replicated snapshot on the master is deleted (8) and the most_recent snapshotis renamed the last_replicated (9).

The interval sync process is now complete - the master and slave both have anidentical restore time point to which they can be reverted if needed.

Peers rolesPeers' statuses denote their roles within the coupling definition.

After creation, a coupling has exactly one peer that is set to be the master peer,and exactly one peer that is set to be the slave peer. Each of the peers can have thefollowing available statuses:

None The peer is not part of a coupling definition.

MasterThe actual source peer in a replication coupling. This type of peer serveshost requests, and is the source for synchronization updates to the slave. Amaster peer can be changed to a slave directly while in asynchronousmirroring.

Slave The actual target peer in a replication coupling. This type of peer does notserve host requests, and accepts synchronization updates from acorresponding master. A slave can be changed to a master directly while inasynchronous mirroring.

Activating the mirroringThe state of the mirroring is derived from the state of its components.

The remote mirroring process hierarchically manages the states of the entities thatparticipate in the process. It manages the states for the mirroring based on thestates of the following components:v Linkv Activation

Figure 43. Asynchronous mirroring walkthrough – part 11

94 IBM XIV Storage System: Product overview

Page 103: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

The following mirroring states are possible:

Non-operationalThe coupling state is defined as non-operational if at least one of thefollowing conditions is met:v The activation state is standby.v The link state is error.v The slave peer is locked.

OperationalAll of the following conditions must be met for the coupling to be definedas operational:v The activation state is active.v The link is OK.v The peers have different roles.v The slave peer is not locked.

Link statesThe link state is one of the factors determining the coupling operational status.

The link state reflects the connection from the master to the slave. A failed link or afailed slave system both manifest as a link error. The link state is one of the factorsdetermining the coupling operational status.

The available link states are:

OK The link is up and functioning.

Error The link is down.

Activation statesWhen the coupling is created, its activation is in standby state. When the couplingis enabled, its activation is in active state.

StandbyWhen the coupling is created, its activation is in standby state.

The synchronization is disabled:v Sync jobs do not run.v No data is copied.v The coupling can be deleted.

Active The synchronization is enabled:v Sync jobs can be run.v Data can be copied between peers.

Regardless of the activation state:v The mirroring type can be changed to synchronous.v Peer roles can change.

Deactivating the couplingDeactivating the coupling stops the mirroring process.

The mirroring is terminated by deactivating the coupling, causing the system to:v Terminate, or delete the mirroringv Stop the mirroring process as a result of:

Chapter 7. Asynchronous remote mirroring 95

Page 104: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

– A planned network outage– An application to reduce network bandwidth– A planned recovery test

The deactivation pauses a running sync job and no new sync jobs will be createdas long as the active state of the mirroring is not restored. However, thedeactivation does not cancel the interval-based status check by the master and theslave. The synchronization status of the deactivated coupling is calculated on thestart of each interval, as if the coupling was active.

Deactivating a coupling while a sync job is running, and not changing that statebefore the next interval begins, leads to the synchronization status becomingRPO_Lagging, as described in the following outline. Upon the deactivation:

On the masterThe activation state changes to standby; replication pauses (and recordswhere it paused); replication resumes upon activation.

Note: An ongoing sync job resumes upon activation, no new sync job willbe created until the next interval.

On the slaveNot available.

Regardless of the state of the coupling:v Peer roles can be changed

Note: For consistency group mirroring: deactivation pauses all running sync jobspertaining to the consistency group. It is impossible to deactivate a single volumesync job within a consistency group.

Mirroring consistency groupsGrouping volumes into a consistency group provides a means to maintain aconsistent snapshot of the group of volumes at the secondary site.

The following assumptions make sure that consistency group semantics work withremote mirroring:

Consistency Group-level managementMirroring of consistency groups is managed on a consistency group-level,rather than on a volume-level. For example, the synchronization status ofthe consistency group is determined after examining all mirrored volumesthat pertain to the consistency group.

Starting with an empty consistency groupOnly an empty consistency group can be defined as a mirrored consistencygroup. If you want to define an existing non-empty consistency group asmirrored, the volumes within the consistency group must first be removedfrom the consistency group and added back only after the consistencygroup is defined as mirrored.

Adding a volume to an already consistency groupOnly mirrored volumes can be added into a mirrored consistency group.This operations requires the following:v Volume peer is on the same system as the peers of the consistency group

96 IBM XIV Storage System: Product overview

Page 105: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

v Volume replication type is identical to the type used by the consistencygroup. For example, async_interval.

v Volume belongs to the same storage pool of the consistency groupv Volume has the same schedule as the consistency groupv Volume has the same RPO as the consistency groupv Volume and consistency group are in the same synchronization status

(SYNC_BEST_EFFORT for synchronous mirroring, RPO OK forasynchronous mirroring)

If the mirrored consistency group is configured with a user-definedschedule, meaning not using the Never schedule:

Mirrored consistency group or volume should not havenon-started snapshot mirrors, non-finished snapshot mirrors (adhoc Sync Jobs), or both.

If the mirrored consistency group is configured with a Neverschedule:

Mirrored consistency group or volume should not havenon-started, non-finished snapshot mirrors, non-finishedsnapshot mirrors (ad hoc Sync Jobs), or both. The status of themirrored consistency group shall be Initialization until the nextSync Job is completed.

Adding a mirrored volume to a non-mirrored consistency groupIt is possible to add a mirrored volume to a non-mirrored consistencygroup, and it will retain its mirroring settings.

A single sync job for the entire consistency groupThe mirrored consistency group has a single Sync Job for all pertinentmirrored volumes within the consistency group.

Location of the mirrored consistency groupAll mirrored volumes in a consistency group are mirrored on the samesystem.

Retaining mirroring attributes of a volume upon removing it from a mirroredconsistency group

When removing a volume from a mirrored consistency group, thecorresponding peer volume is removed from the peer consistency group.Mirroring is retained (same configuration as the consistency group fromwhich it was removed). Peer volume is also removed from peerconsistency group. Ongoing consistency group Sync Jobs will continue.

Mirroring activation of a consistency groupActivation and deactivation of a consistency group affects all consistencygroup volumes.

Role updatesRole updates concerning a consistency group affects all consistency groupvolumes.

Dependency of the volume on its consistency group

v It is not possible to directly activate, deactivate, or update role of a givenvolume within a consistency group from the UI.

v It is not possible to directly change the interval of a given volume withina consistency group.

v It is not possible to set independent mirroring of a given volume withina consistency group.

Chapter 7. Asynchronous remote mirroring 97

Page 106: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Protecting the mirrored consistency groupConsistency group-related commands, such as moving a consistency group,deleting a consistency group and so on, are not allowed as long as theconsistency group is mirrored. You must remove mirroring before you candelete a consistency group, even if it is empty.

Setting a consistency group to be mirroredVolumes added to a mirrored consistency group have to meet some prerequisites.

Volumes that are mirrored together as part of the same consistency group share thesame attributes:v Targetv Poolv Sync typev Mirror rolev Schedulev Mirror statev Last_replicated snapshot timestamp

In addition, their snapshots are all part of the same last_replicated snapshot group.

To obtain the consistency of these attributes, setting the consistency group to bemirrored is done by first creating a consistency group, then setting it to bemirrored and only then populating it with volumes. These settings mean thatadding a new volume to a mirrored consistency group requires having the volumeset to be mirrored exactly as the other volumes within this consistency group,including the last_replicated snapshot timestamp (which entails an RPO_OK statusfor this volume).

Note: A non-mirrored volume cannot be added to a mirrored consistency group. Itis possible, however, to add a mirrored volume to a non-mirrored consistencygroup, and have this volume retain its mirroring settings.

Setting-up a mirrored consistency groupThe process of creating a mirrored consistency group comprises the following s.jpg.

Step 1 Define a consistency group as mirrored (the consistency group must beempty).

Step 2 Activate the mirror.

Step 3 Add a corresponding mirrored volume into the mirrored consistencygroup. The mirrored consistency group and the mirrored volume musthave the following identical parameters:v Source and targetv Poolsv Mirroring typev RPOv Schedule names (both local and remote)v Mirror state is RPO_OKv Mirroring status is Activated

98 IBM XIV Storage System: Product overview

Page 107: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Note: It is possible to add a mirrored volume to a non-mirroredconsistency group. In this case, the volume retains its mirroring settings.

Adding a mirrored volume to a mirrored consistency groupAfter the volume is mirrored and shares the same attributes as the consistencygroup, you can add the volume to the consistency group after certain conditionsare met.

The following conditions must be met:v The volume is on the same system as the consistency groupv The volume belongs to the same storage pool as the consistency groupv Both the volume and the consistency group do not have outstanding sync jobs,

either scheduled or manual (ad hoc)v The volume and consistency group have the same synchronization status

(synchronized="best_effort" and async_interval="rpo_ok")v The volume's and consistency group's special snapshots, most_recent and

last_replicated, have identical timestamps (this is achieved by assigning thevolume to the schedule that is utilized by the consistency group)

v In the case that the consistency group is assigned with schedule="never", thestatus of the consistency group is initialization as long as no sync job has run.

Removing a volume from a mirrored consistency groupRemoval of a volume from a mirrored consistency group is easy and preservesvolume mirroring.

When you remove a volume from a mirrored consistency group, the correspondingpeer volume is removed from the peer consistency group; mirroring is retainedwith the same configuration as the consistency group from which it was removed.All ongoing consistency group's sync jobs keep running.

Administering asynchronous mirroring tasksAdministering asynchronous mirroring tasks.

Accommodating disaster recovery scenariosA disaster is a situation where one of the sites (either the master or the slave) fails,or the communication between the master site and the slave site is lost.

The IBM XIV asynchronous mirroring attains synchronization between Master andSlave peers through a recurring data replication process called a Sync Job. Runningat user-configurable schedules, the Sync Job takes a snapshot (called themost_recent snapshot) of the Master and compares this snapshot with anothersnapshot representing the latest Master state already replicated to the Slave (and avalid recovery point for DR scenarios - called last_replicated snapshot). The SyncJob then synchronizes the Master data corresponding to these differences with theSlave. At the completion of a sync job, a new last_replicated snapshot is createdboth on the Slave and on the Master.

Disaster recovery scenarios handle cases in which one of the snapshots mentionedabove becomes unavailable. These cases are:

Unplanned service disruption

Chapter 7. Asynchronous remote mirroring 99

Page 108: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

�1� FailoverUnplanned service disruption starts with a failover to the Slave.

The Slave is promoted and becomes the new Master, serving hostrequests

�2� RecoveryNext, whenever the Master and link are restored, the replication isset from the promoted Slave (the new Master) onto the demotedMaster (the new Slave).

�Alternately:� No recoveryIf recovery is not possible, a new mirroring is establishedon the Slave. The original mirroring is deleted and a newmirroring relationship is defined.

�3� FailbackFollowing the recovery, the original mirroring configuration isreestablished. The Master maintains its role and replicates to theSlave.

Planned service disruption

�1� FailoverPlanned service disruption starts with a failover to the Slave. TheSlave is promoted to become the new Master, and the Master isdemoted to become the new Slave. The promoted Slave serves hostrequests, and replicates to the demoted Master.

�2� FailbackFollowing the recovery, the original mirroring configuration isreestablished. The Master maintains its role and replicates to theSlave.

TestingTesting the slave replica.

Unintentional/erroneous role change

�1� RecoveryRecovery from unintentional/erroneous implementation of theXCLI/GUI change role command on the Slave.

These cases are described in the following topics.

Note: Please contact XIV Support in case of disaster or for any testing of DisasterRecovery, in order to get clear guidelines and to secure a successful test.

Unplanned service disruptionFollowing a failure, the Master is no longer servicing, nor available.

The failure disrupts the replication of all outstanding sync jobs and results in theloss of the data that was recorded since the timestamp of the last_replicatedsnapshot.

FailoverThe Slave must be promoted to Master because of the disruption.

Procedure1. On the host systems, configure the host connectivity so that the hosts can

communicate with the Slave.

100 IBM XIV Storage System: Product overview

Page 109: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

2. On the Slave system, promote the Slave to become the Master by issuing themirror_change_role command. This will implicitly revert the Slave to thelast_replicated snapshot.

3. Map the mirror-related volumes on the Slave to the relevant host by issuing themap_vol command on the Slave system.

RecoveryWhenever the Master becomes available after the Failover and the originalreplication configuration is desired (i.e., failback), the replication has to beestablished from the new Master (the promoted Slave) to the old Master, and onlyafterwards a proper Failback procedure could be carried out

Before you begin

Note: Following a Failover, do not change the role of the new Master back to Slaveprior to a proper establishing of an operational mirroring replication from the newMaster to the old Master. Failing to do so will result in loss of the data written tothe Slave after its promotion to Master (since the old Master will be reverted to itslast_replicated snapshot, dated to before the Failover).

Prior to the establishing of the mirroring between the promoted Slave and the oldMaster, verify the following:1. The role of the old Slave is now Master2. Hosts are configured to write directly to the new Master3. The mirroring is properly configured4. Connectivity is up between the old master and the new Master (such

connectivity is required before the Master can be changed to Slave, to ensurethat the Master will be reverted to a point-in-time corresponding with thelast_replicated snapshot on the other new Master)

Procedure1. On the Master system, demote the Master to Slave by issuing the

mirror_change_role command.

Note: In case of pool space depletion and the deletion of the new Master'ssnapshot, the demotion will not be possible.

2. On the slave system, activate the mirroring by issuing the mirror_activatecommand. Mirroring upon failover is in standby state and must be explicitlyset to active state. Upon activation, the mirroring will run from the promotedSlave (the new Master) to the demoted Master (the new Slave).

No recoveryWhenever the Master cannot be recovered, yet mirroring needs be established forthe data on the Slave, the mirroring definition is deleted and a new mirroringdefinition is set.

Procedure1. Delete the mirroring between Master and Slave by issuing the mirror_delete

command on the Slave system.2. Perform the following actions to define a new mirroring on the Slave system:

a. Connect to the host by setting configuration with relevant target issuing therelevant commands.

a. Create new mirror by issuing the mirror_create command.

Chapter 7. Asynchronous remote mirroring 101

Page 110: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

a. Activate the mirror by issuing the mirror_activate command.3. Delete the mirroring between Master and Slave by issuing the mirror_delete

command on the Slave system.4. Perform the following actions to define a new mirroring on the Slave system:

a. Connect to the host by setting configuration with relevant target issuing therelevant commands.

a. Create new mirror by issuing the mirror_create command.a. Activate the mirror by issuing the mirror_activate command.

FailbackFailback restores the original mirroring configuration to what it was prior to thefailover.

Before you begin

Prior to carrying out the steps listed below, verify the following:1. The role of the old Slave is now Master2. The role on the old Master is now Slave3. Hosts are configured to write directly to the new Master4. The mirroring is properly configured

Procedure1. On the host systems, configure the host connectivity so that hosts can

communicate with the old Master.2. Perform the following actions on the old Slave system:

a. Stop I/O from the hosts.b. Wait for the next scheduled sync job to start. Issue the schedule_list

command to check the mirror's schedule interval. Determine if it isworthwhile to change the mirror's schedule to one with a shorter interval(through issuing the mirror_change_schedule command) to expedite thecreation of the next sync job.

c. Change the mirror schedule to 'never'. This schedule setting guarantees thatno new sync jobs will be automatically created by the system.

d. Wait for the active sync job to complete. You can verify that no sync job isrunning, by issuing the sync_job_list command and ensuring that no syncjobs are listed for the mirror.

e. Switch the roles between the peers by issuing the mirror_switch_rolescommand. This will demote the Master to Slave and will promote the Slaveto Master.Once the link is up – the mirroring will resume (there is no need toexplicitly activate it).

3. Perform the following actions on the old Master system:a. Verify that mirroring schedule parameters are configured as needed.b. Map all mirror-related volumes on the Master to the relevant host by

issuing the map_vol command.c. Deactivate the mirroring by issuing the mirror_deactivate command for the

period during which the Master system will be unavailable.

Planned service disruptionThe amount of data loss can be predetermined when the service disruption is aplanned process.

102 IBM XIV Storage System: Product overview

Page 111: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

FailoverThe service disruption is planned. The Master is unable to serve hosts requests fora planned period of time during which the Slave needs to function as Master.Being a planned process, the failover can be set to occur immediately following thecompletion of a sync job, resulting in minimal data loss, or no data loss (if hostsare quiesced (paused) before the creation of the last sync job).

Procedure1. On the host systems, configure the host connectivity so that hosts can

communicate with the Slave.2. Perform the following steps on the Master system:

a. Stop I/O for the relevant hosts.b. Wait for the next scheduled sync job to start. Issue the schedule_list

command to check the mirror's schedule interval. Determine if it isworthwhile to change the mirror's schedule to one with a shorter interval(by issuing the mirror_change_schedule command) to expedite the creationof the next sync job.

c. Change the mirror schedule to 'never'. This schedule setting guarantees thatno new sync jobs will be automatically created by the system.

d. Wait for the active sync job to complete. You can verify that no sync job isrunning by issuing the sync_job_list command and ensuring that no syncjobs are listed for the mirror.

e. Switch the roles between the peers by issuing the mirror_switch_rolescommand. This will demote the Master to Slave and will promote the Slaveto Master.Once the link is up, the mirroring will resume (there is no need to explicitlyactivate it).

3. Perform the following steps on the Slave system:a. Verify that mirroring schedule parameters are configured as needed.b. Map all mirror-related volumes on the Master to the relevant host by

issuing the map_vol command.c. Deactivate the mirroring by issuing the mirror_deactivate command for the

period during which the Master system will be unavailable.

What to do next

Since the mirror_switch_roles command yields an active mirroring relationship,the mirroring does not need to be explicitly recovered following the plannedFailover procedure. However, the mirroring must be explicitly deactivated (usingthe mirror_deactivate command) as long as the demoted Master is unavailable.After the Master becomes available again, the mirroring must be activated usingthe mirror_activate command.

Testing for service disruptionThe IBM XIV Storage System allows for validating the mirror replica on the Slavewithout disrupting the mirroring.

The validation is achieved through mapping the Slave to the host.

Note: The Failover and Failback processes cannot be tested without disrupting themirroring.

Chapter 7. Asynchronous remote mirroring 103

Page 112: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Failover testProcedure1. Promote the Slave to Master by issuing the mirror_change_role command on

the Slave system. This will implicitly revert the Slave to the last_replicatedsnapshot.

2. Map all mirror-related volumes on the Master to the relevant host by issuingthe map_vol command on the Slave system.

3. Verify that the new Master is functional and hosts can be read from and writeinto it.

Following the testProcedure1. Perform the following actions on the Slave system:

a. Remove the mappings between the Slave and the hosts.b. Demote the new Master back to Slave by issuing the mirror_change_role

command. The peer will be reverted to the last_replicated snapshot.

Note: Ensure that the connectivity is up between the old Master and newMaster, in order to ensure that the Master will be reverted to apoint�in�time corresponding with the last_replicated snapshot on the newMaster.

2. Issue the mirror_activate command on the Master system.

Nondisruptive testingProcedure1. Perform the following actions to duplicate the last_replicated snapshot:

a. Duplicate the last_replicated snapshot by issuing the snapshot_duplicate(or snap_group_duplicate) command.

b. Map all mirror-related volumes on the Master to the relevant host byissuing the map_vol command.

2. Perform the following actions to copy the last_replicated snapshot:a. Copy the last_replicated snapshot to a new volume by issuing the vol_copy

command.b. Map all mirror-related volumes on the Master to the relevant host by

issuing the map_vol command.

Note: The duplicated/copied replica is an independent copy that is createdsolely for testing purposes, and cannot become a mirroring peer in itself.Therefore, if the duplicated/copied replica is written into by hosts as part ofthe test, the new data cannot be updated to the real mirror replica.

Unintentional/erroneous application of role changeIf the XCLI/GUI mirror_change_role command was unintentionally issued on theSlave, the Slave can simply be changed back to its original role.

Overview of select asynchronous mirroring commandsGeneral

mirror_createThis command creates a new mirror definition.

This command includes parameters for specifying mirror type, target, RPO,schedule, the ability to initialize from referenced snapshot, and more.

104 IBM XIV Storage System: Product overview

Page 113: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

mirror_deleteThis command deletes a mirror.

The command deletes the mirroring relationship – not the correspondingobjects (volumes or consistency groups). The command deletes themirroring definition from both master and slave. In case there is nocommunication between the master and slave, this command could beoperated from the slave.

mirror_activateThis command activates the mirror.

The command sets the mirror to Active state. In this state, the slave isupdated together with the master.

mirror_deactivateThis command deactivates the mirror.

The command sets the mirror to Standby state. In this state, only themaster is updated. This command can deactivate a batch of mirrors aswell.

mirror_change_roleThis command changes the role of the local mirror peer between masterand slave.

The command needs be run on each mirror peer separately.

For synchronous mirroring, another command, mirror_switch_roles, can beused.

mirror_switch_roleThis command switches between the roles of the master and the slavevolumes. In order to switch roles, the following conditions have to be met:v The coupling is operational and synchronizedv The master volume is identical to the last_replicated snapshot (in other

words - all pertinent volume updates need be replicated)v In asynchronous mirroring - the mirrored volume has to be identical to

the last_replicated snapshot.

The command can be performed only on the master.

Prior to the switch, the system stops accepting new writes to the localvolume and performs all pending writes. Only after all pending writeshave been committed, the roles are switched. After the command isexecuted, the coupling is deactivated and the user has to activate it inorder to restart synchronization. It is advised to create a snapshot beforedeactivating the coupling in order to enable recovery from logical errorsdue to incorrect server configurations.

After the command is executed, the volume that was previously the mastervolume becomes the slave volume and the volume that was previously theslave volume becomes the master volume.

mirror_change_rpo(*)

This command changes the mirror RPO.

The RPO has to be larger than the mirror's corresponding scheduleinterval.

mirror_change_schedule(*)

This command changes the mirror's assigned schedule.

Chapter 7. Asynchronous remote mirroring 105

Page 114: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

The schedule's interval has to be shorter than the mirror's correspondingRPO.

mirror_change_remote_schedule(*)

This command changes the schedule of a remote peer.

The schedule's interval doesn't have to be shorter than the mirror'scorresponding RPO.

mirror_change_designationThis command changes the peers' designation, so the primary becomessecondary and the secondary becomes a primary.

Mirroring has to be operational for this command to take effect.

Special

mirror_create_snapshotThis command creates a snapshot on both mirror peers; the snapshot setsthe scope for an ad-hoc sync job.

In asynchronous replication, the command establishes a process that takesa point-in-time snapshot (at the moment the command was issued) of thesource peer (Master) and synchronizes that point-in-time with the Slave.

The process sets a new sync job to copy the differences between thatsnapshot and the most recent snapshot that is guaranteed to besynchronized with the target peer.

In contrast, in synchronous replication, the command takes a snapshot ofthe source peer (Master) and the target peer (Slave) at exactly the sametime.

mirror_cancel_snapshotThis command cancels all ad-hoc sync jobs for a master.

The command cancels all snapshot mirrors (ad-hoc sync jobs) of a specifiedmaster volume or a master consistency group, that have not started to runyet.

Statistics

mirror_listThis command lists details of defined mirrors

The output details include schedule, designation, role, sync type, syncstate, active state, operational state, sync progress, size to synchronize, rpo,last_replicated_snapshot timestamp, and more.

mirror_statistics_get(*)

This command lists information on completed sync jobs for a specifiedmirror.

The command presents statistics that are automatically gathered by thesystem on past sync jobs corresponding to a specified mirrored volume orconsistency group. The displayed information includes the following:mirrored object type (volume/cg), Job type (scheduled/ad hoc), Job size(MB), Date and time created, Date and time started to run, Date and timecompleted, and more.

sync_job_list(*)

This command lists information on pending or running sync jobs.

106 IBM XIV Storage System: Product overview

Page 115: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

The output details the following; Mirroring coupling (volume/CG), type,Mirror Schedule, creation time, and more.

rpo_thresholds_set(*)

This command sets a system-wide RPO threshold for all mirrors that oncecrossed will trigger the creation of an event.

Absolute and relative thresholds can be specified.

rpo_thresholds_get(*)

This command displays the RPO threshold set by rpo_threshold_set.

Schedules

schedule_createThis command defines a schedule.

Valid schedule intervals are: 30s, 1m, 2m, 5m, 10m, 15m, 30m, 1h, 2h, 3h,4h, 6h, 8h, 12h (there is also a min_interval schedule with anon�configurable 20s interval).

schedule_deleteThis command deletes a schedule definition.

schedule_listThis command lists all schedule definitions.

schedule_renameThis command renames a schedule.

schedule_changeThis command changes the interval of an existing schedule.

(*) The command is only applicable to asynchronous mirroring. It is irrelevant forsynchronous mirroring.

Chapter 7. Asynchronous remote mirroring 107

Page 116: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

108 IBM XIV Storage System: Product overview

Page 117: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Chapter 8. Data migration

The use of any new storage system frequently requires the transfer of largeamounts of data from the previous storage system to the new IBM XIV StorageSystem. This can require many hours or even days; usually an amount of time thatmost enterprises cannot afford to be without a working system. The data migrationfeature enables production to be maintained while data transfer is in progress.

Given the nature of the data migration process, it is recommended that you consultand rely on the IBM XIV Storage System support team when planning a datamigration.

Data migration overviewThe data migration feature enables the smooth transition of a host working withthe previous storage system to an IBM XIV Storage System by:v Immediately connecting the host to the XIV and providing the host with direct

access to the most up-to-date data even before data has been copied from theprevious storage system.

v Synchronizing the XIV from the previous storage system by transparentlycopying the contents of the previous storage system to the XIV as a backgroundprocess.

During data migration, the host is connected directly to the XIV and isdisconnected from the previous storage system. The XIV is connected to theprevious storage system, as shown in Figure 44. The XIV and the previous storagesystem must remain connected, until both storage systems are synchronized anddata migration is completed. The previous storage system perceives the XIV as ahost, reading from and optionally writing to the volume that is being migrated.The host reads and writes data to the XIV, while the XIV might need to read orwrite the data to the previous storage system to serve the command of the host.

The communication between the host and the XIV and the communication betweenthe XIV and the previous storage system is fibre-channel.

Figure 44. The Data migration process is performed per volume.

© Copyright IBM Corp. 2011 109

Page 118: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

I/O handling in data migrationServing read requests

During this stage the IBM XIV Storage System will serve all the host's data readrequests. This will be performed in a transparent manner without requiring anyaction by the host, as follows:v If the requested data has already been copied to the XIV, it is served from the

XIV.v If the requested data has not yet been copied to the XIV, the XIV will retrieve it

from the previous storage system and then serve it to the host.

Serving write requests

During this stage the XIV will serve all host's data write requests. This will beperformed in a transparent manner without requiring any action by the host.

Data migration provides the following two alternative XIV configurations forhandling write requests from a host:

Source updating:A host's write requests are written by the XIV to the XIV, as well as to theprevious storage system. In this case, the previous storage system remainscompletely updated during the background copying process. Throughoutthe process, the volume of the previous storage system and the volume ofthe XIV are identical.

Write commands are performed synchronously, so the XIV onlyacknowledges the write operation after writing to itself, writing to theprevious storage system, and receiving an acknowledgement from theprevious storage system. Furthermore, if, due to a communication error orany other error, the writing to the previous storage system fails, the XIVwill report to the host that the write operation has failed.

No source updating:A host's write requests are only written by the XIV to the XIV and are notwritten to the previous storage system. In this case, the previous storagesystem is not updated during the background copying process, andtherefore the two storage systems will never be synchronized. The volumeof the previous storage system will remain intact and will not be changedthroughout the data migration process.

Data migration stagesFigure 45 on page 111 describes the process of migrating a volume from a previousstorage system to the IBM XIV Storage System. It also shows how the XIVsynchronizes its data with the previous storage system, and how it handles thedata requests of a host throughout all these stages of synchronization.

110 IBM XIV Storage System: Product overview

Page 119: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Initial configuration

The XIV volume must be formatted before data migration can begin. The XIV mustbe connected as a host to the previous storage system whose data it will beserving.

The volume on the previous storage system and the volume on the XIV must havean equal number of blocks. This is verified upon activation of the data migrationprocess.

You can then initiate data migration and configure all hosts to work directly andsolely with the XIV.

Data migration is defined through the dm_define command.

Testing the data migration configuration

Before connecting the host to the XIV, use the dm_test XCLI command to test thedata migration definitions to verify that the XIV can access the previous storagesystem.

Activating data migration

After you have tested the connection between the XIV and the previous storagesystem, activate data migration using the dm_activate XCLI command and connectthe host to the XIV. From this point forward, the host reads and writes data to theXIV, and the XIV will read and optionally write to the previous storage system.

Figure 45. Data migration s.jpg

Chapter 8. Data migration 111

Page 120: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Data migration can be deactivated using the dm_deactivate command. It can thenbe activated again. While the data migration is deactivated, the volume cannot beaccessed by hosts (neither read nor write access).

Background copying and serving I/O operations

Once data migration is initiated, it will start a background process of sequentiallycopying all the data from the previous storage system to the XIV.

Synchronization is achieved

After all of a volume's data has been copied, the data migration achievessynchronization. After synchronization is achieved, all read requests are servedfrom the XIV.

If source updating was set to Yes, the XIV will continue to write data to both itselfand the previous storage system until data migration settings are deleted.

Deleting data migration

Data migration is stopped by using a delete command. It cannot be restarted.

Handling failuresUpon a communication error or the failure of the previous storage system, the IBMXIV Storage System will stop serving I/O operations to hosts, including both readand write requests.

If the XIV encounters a media error on the previous storage system (meaning thatthe XIV cannot read a block on the previous storage system), then the XIV willreflect this state on its own storage system (meaning that it will mark this sameblock and an error on its own storage system). The state of this block will indicatea media error even though the disk in the XIV has not failed.

112 IBM XIV Storage System: Product overview

Page 121: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Chapter 9. Event handling

The IBM XIV Storage System monitors the health, the configuration changes, andthe activity of your storage systems, and generates system events. These events areaccumulated by the system and can help the user in the following two ways:v Users can view past events using various filters. This is useful for

troubleshooting and problem isolation.v Users can configure the system to send one or more notifications, which are

triggered upon the occurrence of specific events. These notifications can befiltered according to the events, severity and code. Notifications can be sentthrough e-mail, SMS messages, or SNMP traps.

Event informationEvents are created by various processes, including the following:v Object creation or deletion, including volume, snapshot, map, host, and storage

poolv Physical component eventsv Network events

Each event contains the following information:v A system-wide unique numeric identifierv A code that identifies the type of the eventv Creation timestampv Severityv Related system objects and components, such as volumes, disks, and modulesv Textual descriptionv Alert flag, where an event is classified as alerting by the event notification rules.v Cleared flag, where alerting events can be either uncleared or cleared. This is

only relevant for alerting events.

Event information can be classified with one of the following severity levels:

CriticalRequires immediate attention

Major Requires attention soon

Minor Requires attention within the normal business working hours

WarningNonurgent attention is required to verify that there is no problem

InformationalNormal working procedure event

© Copyright IBM Corp. 2011 113

Page 122: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Viewing eventsThe IBM XIV Storage System provides the following variety of criteria fordisplaying a list of events:v Before timestampv After timestampv Codev Severity from a certain value and upv Alerting events, meaning events that are sent repeatedly according to a snooze

timerv Uncleared alerts

The number of displayed filtered events can be restricted.

Defining events notification rulesThe IBM XIV Storage System monitors the health, configuration changes, andactivity of your storage systems and sends notifications of system events as theyoccur. Event notifications are sent according to the following rules:

Which eventsThe severity, event code, or both, of the events for which notification issent.

Where The destinations or destination groups to which notification is sent, such ascellular phone numbers (SMS), e-mail addresses, and SNMP addresses.

Notifications are sent according to the following rules:

DestinationThe destinations or destination groups to which a notification of an eventis sent.

Filter A filter that specifies which events will trigger the sending of an eventnotification. Notification can be filtered by event code, minimum severity(from a certain severity and up), or both.

AlertingTo ensure that an event was indeed received, an event notification can besent repeatedly until it is cleared by an XCLI command or the IBM XIVStorage Management GUI. Such events are called alerting events. Alertingevents are events for which a snooze time period is defined in minutes.This means that an alerting event is resent repeatedly each snooze timeinterval until it is cleared. An alerting event is uncleared when it is firsttriggered, and can be cleared by the user. The cleared state does not implythat the problem has been solved. It only implies that the event has beennoted by the relevant person who takes the responsibility for fixing theproblem. There are two schemes for repeating the notifications until theevent is clear: snooze and escalation.

SnoozeEvents that match this rule send repeated notifications to the samedestinations at intervals specified by the snooze timer until they arecleared.

EscalationYou can define an escalation rule and escalation timer, so that if events arenot cleared by the time that the timer expires, notifications are sent to the

114 IBM XIV Storage System: Product overview

Page 123: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

predetermined destination. This enables the automatic sending ofnotifications to a wider distribution list if the event has not been cleared.

Alerting events configuration limitationsThe following limitations apply to the configuration of alerting rules:v Rules cannot escalate to nonalerting rules, meaning to rules without escalation,

snooze, or both.v Escalation time should not be defined as shorter than snooze time.v Escalation rules must not create a loop (cycle escalation) by escalating to itself or

to another rule that escalates to it.v The configuration of alerting rules cannot be changed while there are still

uncleared alerting events.

Defining destinationsEvent notifications can be sent to one or more destinations, meaning to a specificSMS cell number, e-mail address, or SNMP address, or to a destination groupcomprised of multiple destinations. Each of the following destinations must bedefined as described:

SMS destination

An SMS destination is defined by specifying a phone number. When defining adestination, the prefix and phone number should be separated because some SMSgateways require special handling of the prefix.

By default, all SMS gateways can be used. A specific SMS destination can belimited to be sent through only a subset of the SMS gateways.

E-mail destination

An e-mail destination is defined by an e-mail address. By default, all SMTPgateways are used. A specific destination can be limited to be sent through only asubset of the SMTP gateways.

SNMP managers

An SNMP manager destination is specified by the IP address of the SNMPmanager that is available to receive SNMP messages.

Destination groups

A destination group is simply a list of destinations to which event notifications canbe sent. A destination group can be comprised of SMS cell numbers, e-mailaddresses, SNMP addresses, or any combination of the three. A destination groupis useful when the same list of notifications is used for multiple rules.

Defining gatewaysEvent notifications can be sent by SMS, e-mail, or SNMP manager. This stepdefines the gateways that will be used to send e-mail or SMS.

Chapter 9. Event handling 115

Page 124: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

E-mail (SMTP) gateways

Several e-mail gateways can be defined to enable notification of events by e-mail.By default, the IBM XIV Storage System attempts to send each e-mail notificationthrough the first available gateway according to the order that you specify.Subsequent gateways are only attempted if the first attempted gateway returns anerror. A specific e-mail destination can also be defined to use only specificgateways.

All event notifications sent by e-mail specify a sender whose address can beconfigured. This sender address must be a valid address for the following tworeasons:v Many SMTP gateways require a valid sender address or they will not forward

the e-mail.v The sender address is used as the destination for error messages generated by

the SMTP gateways, such as an incorrect e-mail address or full e-mail mailbox.

E-mail-to-SMS gateways

SMS messages can be sent to cell phones through one of a list of e-mail-to-SMSgateways. One or more gateways can be defined for each SMS destination.

Each such e-mail-to-SMS gateway can have its own SMTP server, use the globalSMTP server list, or both.

When an event notification is sent, one of the SMS gateways is used according tothe defined order. The first gateway is used, and subsequent gateways are onlytried if the first attempted gateway returns an error.

Each SMS gateway has its own definitions of how to encode the SMS message inthe e-mail message.

116 IBM XIV Storage System: Product overview

Page 125: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Chapter 10. Access control

The IBM XIV Storage System features role-based authentication either natively orby using LDAP-based authentication. The system provides:

Role-based access controlBuilt-in roles for access flexibility and a high level of security according topredefined roles and associated tasks.

Two methods of access authenticationThe IBM XIV Storage System supports the following methods ofauthenticating users:

Native authenticationThis is the default mode for authentication of users and groups onthe IBM XIV Storage System. In this mode, users and groups areauthenticated against a database on the system.

LDAP When enabled, the system authenticates the users against an LDAPrepository.

Following the description of access control methods, this chapter provides auxiliaryinformation:v Reporting of logging and eventsv Reference to access control cli commandsv Glossary for access control terms

User roles and permission levelsUser roles allow specifying which roles are applied and the various applicablelimits.

Note: None of these system-defined users have access to data.

Table 10. Available user roles

User role Permissions and limits Typical usage

Read only Read only users can only list andview system information.

The system operator, typically, butnot exclusively, is responsible formonitoring system status andreporting and logging allmessages.

© Copyright IBM Corp. 2011 117

Page 126: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Table 10. Available user roles (continued)

User role Permissions and limits Typical usage

Applicationadministrator

Only application administratorscan perform the following tasks:

v Creating snapshots ofspecifically assigned volumes

v Mapping their own snapshot toa specifically assigned host

v Deleting their own snapshot

Application administratorstypically manage applications thatrun on a particular server.Application managers can bedefined as limited to specificvolumes on the server. Typicalapplication administratorfunctions are the following:

v Managing backupenvironments:

– Creating a snapshot forbackups

– Mapping a snapshot tobackup server

– Deleting a snapshot afterbackup is complete

– Updating a snapshot for newcontent within a volume

v Managing software testingenvironment:

– Creating a new applicationinstance

– Testing the new applicationinstance

Storageadministrator

The storage administrator haspermission to perform allfunctions, except:

v Maintenance of physicalcomponents or changing thestatus of physical components

v Only the predefinedadministrator, named admin,can change the passwords ofother users

Storage administrators areresponsible for all administrationfunctions.

Technician The technician is limited to thefollowing tasks:

v Physical system maintenance

v Phasing components in or outof service

Technicians maintain the physicalcomponents of the system. Onlyone predefined technician isspecified per system. Techniciansare IBM XIV Storage Systemtechnical support team members.

Notes:

1. All users can view the status of physical components; however, onlytechnicians can modify the status of components.

2. User names are case sensitive.3. Passwords are case sensitive.

Predefined usersThere are several predefined users configured on the IBM XIV Storage System.These users cannot be deleted.

118 IBM XIV Storage System: Product overview

Page 127: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Storage administratorThis user id provides the highest level of customer access to the system.

Predefined user name: admin

Default password: adminadmin

TechnicianThis user id is used only by IBM XIV Storage System service personnel.

Predefined user name: technician

Default password: Password is predefined and is used only by the IBMXIV Storage System technicians.

Note: Predefined users are always authenticated by the IBM XIV Storage System,even if LDAP authentication has been activated for them.

Application administratorThe primary task of the application administrator is to create and managesnapshots. Application administrators manage snapshots of a specific set ofvolumes. The user group to which an application administrator belongs determinesthe set of volumes which the application administrator is allowed to manage.

User groupsA user group is a group of application administrators who share the same set ofsnapshot creation permissions. This enables a simple update of the permissions ofall the users in the user group by a single command. The permissions are enforcedby associating the user groups with hosts or clusters. User groups have thefollowing characteristics:v Only users who are defined as application administrators can be assigned to a

group.v A user can belong to only a single user group.v A user group can contain up to eight users.v If a user group is defined with access_all="yes", application administrators who

are members of that group can manage all volumes on the system.

Storage administrators create the user groups and control the various permissionsof the application administrators.

User group and host associationsHosts and clusters can be associated with only a single user group. When a userbelongs to a user group that is associated with a host, it is possible to managesnapshots of the volumes mapped to that host. User and host associations have thefollowing properties:v User groups can be associated with both hosts and clusters. This enables limiting

application administrator access to specific volumes.v A host that is part of a cluster cannot also be associated with a user group.v When a host is added to a cluster, the associations of that host are broken.

Limitations on the management of volumes mapped to the host is controlled bythe association of the cluster.

v When a host is removed from a cluster, the associations of that host become theassociations of the cluster. This enables continued mapping of operations so thatall scripts will continue to work.

Chapter 10. Access control 119

Page 128: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Listing hostsThe command host_list lists all groups associated with the specified host,showing information about the following fields:

Range All hosts, specific host

DefaultAll hosts

Listing clustersThe command cluster_list lists all clusters that are associated with a usergroup, showing information about the following fields:

Range All clusters, specific cluster

DefaultAll clusters

Command conditionsThe application administrator can perform specific operations through a set ofcommands. Many of the commands are condition-dependent. Table 11 lists thevarious commands that application administrators can execute according toassociation definitions and applicable conditions. If the application administrator isa member of a group defined with access_all="yes", then it is possible to performthe command on all volumes.

Table 11. Application administrator commands

Relevant command Conditions

cg_snapshot_create At least one volume in the consistency group is mappedto a host or cluster that is associated with a user groupcontaining the user executing the command.

map_volunmap_vol

Application administrators can use these commands tomap snapshots of volumes that meet both of thefollowing conditions:

1. The volumes were created by an applicationadministrator.

2. The master volume is mapped to a host or clusterassociated with a user group containing the user.

vol_locksnapshot_duplicatesnapshot_deletesnapshot_change_priority

The snapshot master volume is mapped to a host orcluster that is associated with the user group containingthe user and the snapshot that was created by anapplication administrator.

snap_group_locksnap_group_duplicatesnap_group_deletesnap_group_change_priority

At least one of the master volumes of the snapshots inthis group is mapped to a host or cluster that isassociated with the user group containing the user, andthe specific snapshot group was created by anapplication administrator.

snapshot_create The volume is mapped to a host or cluster that isassociated with the user group containing the userexecuting the command. If the command overwrites asnapshot, then the overwritten snapshot must be onepreviously created by an application administrator.

Authentication methodsThe following authentication methods are available:

120 IBM XIV Storage System: Product overview

Page 129: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Native (default)The user is authenticated by the IBM XIV Storage System based on thesubmitted username and password, which are compared to user credentialsdefined and stored on the IBM XIV Storage System.

The user must be associated with an IBM XIV Storage System user rolethat specifies pertinent system access rights.

This mode is set by default.

LDAP

The user is authenticated by an LDAP directory based on the submittedusername and password, which are used to connect with the LDAP server.

Note: “LDAP-authentication” on page 122

Predefined users authenticationThe administrator and technician roles are always authenticated by theIBM XIV Storage System, regardless of the authentication mode. They arenever authenticated by LDAP.

Native authenticationThis is the default mode for authentication of users and groups on the IBM XIVStorage System. In this mode, users and groups are authenticated against adatabase on the system. User management is performed locally on the IBM XIVStorage System.

User configurationConfiguring users requires defining the following options:

Role Specifies the role category that each user has when operating the system.The role category is mandatory. for explanations of each role.

Name Specifies the name of each user allowed to access the system.

PasswordAll user-definable passwords are case sensitive.Passwords are mandatory, can be 6 to 12 characters long, use uppercase orlowercase letters as well as the following characters: ~!@#$%^&*()_+-={}|:;<>?,./\[] .

E-mail E-mail is used to notify specific users about events through e-mailmessages. E-mail addresses must follow standard addressing procedures.E-mail is optional. Range: Any legal e-mail address.

Phone and area codePhone numbers are used to send SMS messages to notify specific usersabout events. Phone numbers and area codes can be a maximum of 63digits, hyphens (-) and periods (.) Range: Any legal telephone number; Thedefault is N/A

Password managementPassword management is very straightforward in the IBM XIV Software System.The IBM XIV Software System provides a high level of security. The followingrestrictions apply when working with passwords:v For security purposes, passwords are not shown in user lists.v Passwords are user changeable. Users can change only their own passwords.v A user with the predefined password of admin can change the passwords of

other users.

Chapter 10. Access control 121

Page 130: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

v Passwords are changeable from both the XCLI and the IBM XIV StorageManagement GUI.

v Passwords are case-sensitive.Range: 6 - 12 characters (a - z, A - Z, 0 - 9)

LDAP-authenticationLightweight Directory Access Protocol (LDAP) support enables the IBM XIVStorage System to authenticate users through an LDAP repository.

When LDAP authentication is enabled, the username and password of a useraccessing the IBM XIV Storage System (through CLI or GUI) are used by the IBMXIV system to login into a specified LDAP directory. Upon a successful login, theIBM XIV Storage System retrieves the user's IBM XIV group membership datastored in the LDAP directory, and uses that information to associate the user withan IBM XIV administrative role.

The IBM XIV group membership data is stored in a customer defined,pre-configured attribute on the LDAP directory. This attribute contains stringvalues which are associated with IBM XIV administrative roles. These values mightbe LDAP Group Names, but this is not required by the IBM XIV Storage System.The values the attribute contains, and their association with IBM XIVadministrative roles, are also defined by the customer.

Supported domains

The IBM XIV Storage System supports LDAP authentication of the followingdirectories:v Microsoft Active Directoryv SUN directoryv Open LDAP

LDAP multiple-domain implementation

In order to support multiple LDAP servers that span over different domains, andin order to use the memberOf property, the IBM XIV Storage System allows formore than one role for the Storage Administrator and the Read�Only roles.

The predefined XIV administrative IDs “admin” and “technician” are alwaysauthenticated by the IBM XIV Storage System, whether or not LDAP authenticationis enabled.

Responsibilities division between the LDAP directory and thestorage systemFollowing are responsibilities and data maintained by the IBM XIV system and theLDAP directory:

LDAP directory

v Responsibilities - user authentication for IBM XIV users, and assignmentof IBM XIV related group in LDAP.

v Maintains - Users, username, password, designated IBM XIV relatedLDAP groups associated with IBM XIV Storage System.

IBM XIV Storage System

122 IBM XIV Storage System: Product overview

Page 131: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

v Responsibilities - Determination of appropriate user role by mappingLDAP group to an IBM XIV role, and enforcement of IBM XIV usersystem access.

v Maintains - mapping of LDAP group to IBM XIV role.

LDAP authentication processIn order to use LDAP authentication, you must perform the following major s.jpg:1. Define an LDAP server and system parameters2. Define an XIV user on this LDAP server. The storage system uses this user

when searching for authenticated users. This user is later on referred to assystem's configured service account.

3. Identify an LDAP attribute in which to store values associated with IBM XIVuser roles

4. Define a mapping between values stored in the LDAP attribute and IBM XIVuser roles

5. Enable LDAP authentication

Once LDAP has been configured and enabled, the predefined user is granted withlogin credentials authenticated by the LDAP server, rather than the IBM XIVStorage System itself.

Testing the authentication

The storage administrator can test the LDAP configuration prior to its activation.Look for the ldap_test command later on this chapter.

LDAP configuration scenarioFollowing is an overview of an LDAP configuration scenario:1. Storage administrator defines the LDAP server(s) to the IBM XIV storage

system.

Figure 46. The XIV logs on to a specified LDAP directory

Chapter 10. Access control 123

Page 132: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

2. Storage administrator defines the LDAP base DN, communication, and timeoutparameters to the IBM XIV storage system.

3. Storage administrator defines the LDAP XIV group attribute to be used forstoring associations between LDAP groups and XIV storage administrator roles.These are the storage administrator and readonly roles using the ldap_config_setcommand.

4. Storage administrator defines the mapping between LDAP group name andIBM XIV application administrator roles using the user_group_createcommand.

5. Storage administrator enables LDAP authentication.

LDAP login scenarioLDAP-authenticated login scenario takes the following course:

Initiation

If initiated from the GUI

1. User launches the IBM XIV Storage System GUI.2. IBM XIV Storage System presents the user with a login screen.3. User logs in submitting the required user credentials (e.g.,

username and password).

If initiated from the CLI

1. User logs into the CLI with user credentials (username andpassword).

Authentication

1. IBM XIV Storage System attempts to log into LDAP directory using theuser-submitted credentials.

2. If login fails:v The IBM XIV Storage System attempts to log into the next LDAP

server.v If login fails again on all servers, a corresponding error message is

returned to the user.3. If login succeeds, the IBM XIV Storage System will determine the IBM

XIV role corresponding to the logged-in user, by retrieving theuser-related attributes from the LDAP directory. These attributes werepreviously specified by the IBM XIV-to-LDAP mapping.v The IBM XIV Storage System will inspect whether the user role is

allowed to issue the CLI.v If the CLI is permitted for the user's role, it will be issued against the

system, and any pertinent response will be presented to the user.v If the CLI is not permitted for the user's role, the IBM XIV Storage

System will send an error message to the user.

Supported user name characters

The login mechanism supports all characters, including �@�, �*� and �\�, to allowsnames of the following format:v UPN: name@domainv NT domain: domain\name

Searching within indirectly-associated groups:

124 IBM XIV Storage System: Product overview

Page 133: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

In addition to the users search, the IBM XIV Storage System allows for searchingindirectly-associated Active Directory groups.

Searching for indirectly-associated Active Directory groups is done separately fromthe user search that was described above. This search of indirectly-associatedgroup utilizes the group attribute memberof and it conveys the following flow.

Note: This search does not apply to SUN directory, as you get all theindirectly-associated groups on the users validation query.

The IBM XIV Storage System search for the group membership starts with thegroups the user is directly associated with and spans to other groups. The memberofattribute is searched for within each of these groups. The search goes on until oneof the following stop criteria is met:

Stop when found

v A group membership that matches one of the configured LDAP rules isfound

v The search command is set to stop searching upon finding a group.

Don't stop when found

v A group membership that matches one of the configured LDAP rules isfound

v The search command does not stop once a group membership is found.It is set to continue onto the next group.

v The search command is set to stop upon reaching a search limit (seeReaching a limit below).

Multiple findings

v More than a single group membership that matches one of theconfigured LDAP rules were found– Every match will be counted once even if it was found several times

(arrived at it from several branches).– The search doesn't avoid checking groups that were previously

checked from other branches.

Reaching a limitOne of the following limits is met (the limits are set as part of the searchcommand):v The search reached the search depth limit.

This search attribute limits the span of the search operation within thegroups tree.

v The search reached the maximum number of queries limit.

Users validationDuring the login, the system validates the user as follows:

Chapter 10. Access control 125

Page 134: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Step �1� - Issuing a user searchThe system issues an LDAP search for the user's entered username.

The request is submitted on behalf of the system's configured serviceaccount and the search is conducted for the LDAP server, base DN andreference attribute as specified in the XIV LDAP configuration.

The base DN specified in the XIV LDAP configuration serves as a referencestarting point for the search – instructing LDAP to locate the valuesubmitted (the username) in the attribute specified (whose value isspecified in user_name_attrib).

Step �2� - If a single user is found - issuing an XIV role searchThe system issues a second search request, this time submitted onbehalf of the user (with the user's credentials), and will search forXIV roles associated with the user, based on XIV LDAPconfiguration settings (as specified in parameter xiv_group_attrib).

If a single XIV role is found - permission is grantedThe system inspects the rights associated with that role andgrant login to the user. The user's permissions are incorrespondence with the role associated by XIV, base onXIV LDAP configuration.

If no XIV role is found for the user, or more than one role wasfound If the response by LDAP indicates that the user is either

not associated with an XIV role (no user role name isfound in the referenced LDAP attribute for the user), or isactually associated with more than a single role (multipleroles names are found) – login will fail and acorresponding message will be returned to the user.

If no such user was found, or more than one user were foundIf LDAP returns no records (indicating no user with the usernamewas found) or more than a single record (indicating that the

Figure 47. The way the system validates users through issuing LDAP searches

126 IBM XIV Storage System: Product overview

Page 135: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

username submitted is not unique), the login request fails and acorresponding message is returned to the user.

Establishing an IBM XIV service account for LDAP queriesThe IBM XIV Storage System carries out the LDAP search through a serviceaccount. This service account is established via the ldap_config_set command (seehere“Access control commands” on page 128).

Switching between LDAP and native authentication modesThis section describes system behavior when switching between LDAPauthentication and native authentication.

After changing authentication modes from native to LDAP

The system will start authenticating users other than "admin" or "technician"against the LDAP server, rather than the local IBM XIV storage system userdatabase. However, the local user account data will not be deleted:v Users without an account on the LDAP server will not be granted access to the

XIV system.v Users with an LDAP account who are not associated with an XIV role on the

LDAP directory will not be granted access to the XIV system.v Users with an LDAP account who are associated with an XIV role on the LDAP

directory will be granted access to the XIV system if the following conditions aremet:– The XIV role on LDAP is mapped to a valid XIV role on the XIV system– The user is associated only to one XIV role on LDAP

The following commands related to user account management will be disabled.These operations must be performed on the LDAP directory.v user_definev user_renamev user_updatev user_group_add_userv user_group_remove_user

After changing authentication modes from LDAP to native

The system will start authenticating users against the locally defined IBM XIV userdatabase. Users and groups which were defined prior to switching from native toLDAP authentication will be reenabled. The IBM XIV system will allow localmanagement of users and groups. The following commands related to user accountmanagement will be enabled:v user_definev user_renamev user_updatev user_group_add_userv user_group_remove_user

Users must be defined locally on XIV and be associated with local IBM XIV usergroups in order to gain access to the system.

Chapter 10. Access control 127

Page 136: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Administering access control

Logging and event reporting

Command execution logThe IBM XIV Software System provides logs for tracking command execution andwho has performed the command. This log is implemented through the event log.

Object creation trackingFor each system object such as a volume, host, snapshot, consistency group, orpool, the system k.jpg track of the user who executed the command that createdthe object. This is part of the object's attributes shown in the relevant listcommand.

Event report destinationsThe system provides mechanisms for sending reports to variety of destinations,including:v Telephone numbersv E-mail addresses

The configured e-mail or phone number per user can serve as the destinations forthese notifications. See “User configuration” on page 121 for an explanation ofdestination parameters.

For a detailed explanation about handling events and setting up notification, see“Event report destinations.”

Access control commandsThe following IBM XIV command-line interface (XCLI) commands are available formanaging role-based access control (RBAC). For a detailed explanation of thesecommands, see the chapter detailing “Access control” in the relevant (for therelease you are using) IBM XIV Storage System XCLI User Manual.

User-related commands

You can use the following user-related commands to manage role-based accesscontrol:

user_defineDefines a new user.

user_updateUpdates the attributes of the user.

user_listLists all users, or a specific user.

user_renameRenames the user.

user_deleteDeletes the user.

User groups-related commands

You can also use the following user group-related commands to manage role-basedaccess control:

128 IBM XIV Storage System: Product overview

Page 137: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

user_group_createCreates a user group.

user_group_update

v Assigns the user group with a Lightweight Directory Access Protocol(LDAP) role.

v Updates the user group name.

user_group_add_userAdds a user to a user group.

user_group_remove_userRemoves a user from a user group.

user_group_listLists all user groups along with their users.

user_group_renameRenames a user group.

user_group_deleteDeletes a user group.

Role-based access control commands

The following list of access-related commands can be used to manage role-basedaccess control:

access_defineAssociates a user group with a host and a cluster.

access_deleteDissociates a user group from the host and cluster with which it is associated.

access_listLists access associations.

Configuration-related commands

You can also use the following LDAP server configuration-related commands:

ldap_config_setSets up the LDAP configuration parameters.

ldap_config_getLists the configuration attributes of an LDAP server that works with thestorage system.

ldap_mode_setEnables/disables LDAP authentication to the storage system.

ldap_mode_getReturns the authentication mode of the storage system (active/inactive).

ldap_user_testThis command authenticates the user's credentials on the LDAP machine.

ldap_testValidates the LDAP settings prior to the activation.

Chapter 10. Access control 129

Page 138: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Non-LDAP commands

The following commands are available in non-LDAP mode and are not available inLDAP mode:

user_defineDefining a new user on the XIV system.

user_updateModifying the XIV user's details.

user_renameRenaming an XIV user.

user_group_add_userAdding a user the an XIV Application Administrator user group.

user_group_remove_userRemoving a user from an XIV application administration user group.

Glossary of access control conceptsThe following key definitions apply throughout the discussion on role-based accesscontrol:

LDAP Lightweight Directory Access Protocol.

LDAP attributeA property of an LDAP object, with a single or multiple values. A specialobject attribute is designated by an LDAP administrator to hold user groupmemberships values corresponding to XIV roles.

LDAP authenticationA method for authenticating users by validating the user's submittedcredentials against data stored on an LDAP directory.

LDAP DirectoryA hierarchical database stored on an LDAP server and accessed throughLDAP calls.

LDAP ServerA server that provides directory services through LDAP.

LDAP statusThe status of an LDAP server.

Microsoft Active DirectoryMicrosoft Active Directory provides a directory (lookup), DNS andauthentication services.

XIV MappingAn association of data on the LDAP server (a specific LDAP attribute) anddata on the XIV. This is required to determine which access rights to grantto an authenticated LDAP user.

130 IBM XIV Storage System: Product overview

Page 139: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Chapter 11. Tivoli Storage Productivity Center and SMI-Sinteroperability

The IBM XIV Storage System integrates with Tivoli Storage Productivity Center(TPC) by providing system configuration information.

Tivoli Storage Productivity Center then displays this information to TPC end users.In addition to query support, TPC provides a means to launch the XIV GUIdirectly from within the TotalStorage Productivity Center GUI.

Queries of system configuration are supported starting with the Tivoli StorageProductivity Center version 4.1 and IBM XIV Storage System microcode version10.1 and up. Tivoli Storage Productivity Center will be allowed to queryconfiguration data including:v Storage poolsv Volumesv Disksv Hosts and host mappingsv Fibre Channel ports

These queries, when combined with SCSI inquiry data that Tivoli StorageProductivity Center collects from the hosts, allowsit to correlate LUNs reported bythe IBM XIV Storage System to LUNs as seen by the host systems. Also, when theIBM XIV Storage System is a back end to the IBM System Storage SAN VolumeController (SVC), the Tivoli Storage Productivity Center can correlate LUNsreported by the IBM XIV Storage System to SAN Volume Controller-managed disks(MDisks).

© Copyright IBM Corp. 2011 131

Page 140: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

TPC utilizes a CIM agent which is embedded on the IBM XIV Storage System,where SMI-S 1.2 is supported. This agent queries the IBM XIV Storage Systemusing the smis_user ID. The smis_user ID is allowed read only access to the IBMXIV Storage System.

The IBM XIV CIM provider will publish itself as a service using the ServiceLocation Protocol (SLP) as a Service Agent (SA). This CIMOM (CommonInformation Model Object Manager) provider broadcasts its address to allow adirectory look-up by a CIM agent, in this case, TotalStorage Productivity Center.This then allows Tivoli Storage Productivity Center to query for the IP address,namespace, and supported profiles for the IBM XIV CIM provider, thusdiscovering it.

CIM and IBM XIV user groups

An IBM XIV CIM user is permitted to run commands like vol_list and pool_list,regardless of the IBM XIV user group it belongs to.

Related TPC documentation

Relevant documentation includes:v Adding a userv Collecting the logv Application Programming Interface Reference, available on the IBM XIV

Information Center

Figure 48. TPC interoperability with IBM XIV Storage System

132 IBM XIV Storage System: Product overview

Page 141: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Chapter 12. Nondisruptive code load

Non-disruptive-code-load (a.k.a. Hot Upgrade) enables the IBM XIV StorageSystem to upgrade its software from a current version to a newer version withoutdisrupting application service.

The upgrade process is run on all modules in parallel and is designed to be quickenough so that the applications' service on the hosts will not be damaged. Theupgrade requires that neither data migration nor rebuild processes are run, andthat all internal network paths are active.

During the Non-Disruptive Code Load process there is a point in time dubbed the'upgrade-point-of-no-return', before which the process can still be aborted (eitherautomatically by the system - or manually through a dedicated CLI). Once thatpoint is crossed - the Non-Disruptive Code Load process is not reversible.

Following are notable characteristics of the Non-disruptive code load:

Duration of the upgrade processThe overall process of downloading new code to storage system andmoving to the new code is done online to the application/Host.

The duration of the upgrade process is affected by the following factors:v The upgrade process requires to stop all IOs. If there are a lot of IOs in

the system, or there are slow disks, the system might not be able to stopthe IOs fast enough, so it will restart them and try again after a shortwhile, taking into consideration some retries.

v The upgrade process installs a valid version of the software and thenretains its local configuration. This process might take a considerableamount of time, depending on the future changes in the structure of theconfiguration.

Prerequisites and constraints

v The process cannot run if a data migration process or a rebuild processis active. An attempt to start the upgrade process when either a datamigration or a rebuild process is active will fail.

v Generally, everything that happens after the point-of-no-return is treatedas if it happened after the upgrade is over.

v As long as the overall hot upgrade is in progress (up to several minutes)no management operations are allowed (save for status querying), andno events are processed.

v Prior to the point-of-no-return, a manual abort of the upgrade isavailable.

Effect on mirroringMirrors are automatically deactivated before the upgrade, and reactivatedafter it is over.

Effect on management operationsDuring the Non-Disruptive Code Load process it is possible to query thesystem about the upgrade status, and the process can also be abortedmanually before the 'point-of-no-return'. If a failure occurs before this point- the process will be aborted automatically.

© Copyright IBM Corp. 2011 133

Page 142: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Handling module or disk failure during the upgradeIf the failure occurs before the point-of-no-return, it will abort the upgrade.If it happens after that point, the failure is treated as if it happened afterthe upgrade is over.

Handling power failure during the upgradeAs for power failure before the point-of-no-return - power is beingmonitored during the time the system prepares for the upgrade (before thepoint-of-no-return). If a power failure is detected, the upgrade will beaborted and the power failure will be taken care of by the old version.

134 IBM XIV Storage System: Product overview

Page 143: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Glossary

The following is an alphabetical list of terms and abbreviations that are usedthroughout this document.

Active directoryMicrosoft Active Directory (AD) provides directory (lookup), DNS andauthentication services.

Alerting eventAn event that triggers recurring event notifications until it is cleared.

API See Application program interface (API).

Application program interface (API)The interface through which the application accesses the operating systemand the other services.

Authorization levelThe authorization level determines the permitted access level to thevarious functions of the IBM XIV Storage Management GUI:

Read onlyOnly viewing is allowed.

Full Enables access to all the configuration and control functions,including shutdown of the system. This level requires a password.

Auto delete priorityAs the storage capacity reaches its limits, snapshots are automaticallydeleted to make more space. The deletion takes place according to thevalue set for each snapshot, as follows:

1 last to be deleted

4 first to be deleted

Each snapshot is given a default auto delete priority of 1 at creation.

Clearing eventsThe process of stopping the recurring event notification of alerting events.

CLI The IBM XIV command-line interface (XCLI). See Command line interface(CLI)

Command line interface (CLI)The nongraphical user interface used to interact with the system throughset commands and functions. The IBM XIV command-line interface (XCLI)for the IBM XIV Storage System.

Completion codeThe returned message sent as a result of running CLI commands.

Consistency groupA cluster of specific volumes that can all be snapshotted, mirrored andadministered simultaneously as a group. A volume can only be associatedwith a single consistency group.

The volumes within a consistency group are grouped into a single volumeset. The volume set can be snapshotted into multiple snapshot sets underthe specific consistency group. See also Snapshot set, Volume set.

© Copyright IBM Corp. 2011 135

Page 144: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

CouplingThe two peers (volumes or consistency groups) between which a mirroringrelationship was set.

Data moduleA module dedicated to data storage. A fully-configured rack contains 9dedicated data modules, each with 12 disks.

DestinationSee Event destination.

EscalationA process in which event notifications are sent to a wider list of eventdestinations because the event was not cleared within a certain time.

Event destinationAn address for sending event notifications.

Event notification ruleA rule that determines which users are to be notified, for which events andby what means.

Event notificationThe process of notifying a user about an event.

Event A user or system activity that is logged (with an appropriate message).

Fabric The hardware that connects workstations and servers to storage devices ina SAN. The SAN fabric enables any-server-to-any-storage deviceconnectivity through the use of fibre-channel switching technology.

FC-AL Also known as arbitrated loop. A fibre-channel topology that requires nofibre-channel switches. Devices are connected in a one-way loop fashion.

FC-HBAFibre-channel host bus adapter.

FC See Fibre channel.

Fibre channelSerial data transfer architecture developed by a consortium of computerand mass storage device manufacturers and now being standardized byANSI.

Functional areaOne of the high level groupings of icons (functional modules) of theleft-hand pane of the IBM XIV Storage Management GUI screen. Forexample: Monitor, Configuration or Volume management. See Functionalmodule.

Functional moduleOne of the icons of a functional area, on the left-hand pane of the IBM XIVStorage Management GUI screen. For example, System (under Monitor) orHosts and LUNs (under Configuration). See Functional area.

Graphical user interface (GUI)On-screen user interface supported by a mouse and a keyboard.

H/W Hardware.

HBA Host bus adapter.

Host interface moduleThe interface data module serves external host requests with the ability tostore data. A fully-configured rack has 6 interface data modules.

136 IBM XIV Storage System: Product overview

Page 145: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Host A host is a port name of a host that can connect to the system. The systemsupports fibre channel and iSCSI hosts.

I/O Input/output.

Image snapshotA snapshot that has never been unlocked. It is the exact image of themaster volume it was copied from, at the time of its creation. See alsosnapshot.

Internet ProtocolSpecifies the format of packets (also called datagrams), and theiraddressing schemes. See also Transmission Control Protocol (TCP).

IOPs Input/output (I/O) per second.

IP See Internet Protocol.

iSCSI Internet SCSI. An IP-based standard for linking data storage devices over anetwork and transferring data by carrying SCSI commands over IPnetworks.

LatencyAmount of time delay between the moment an operation is issued, and themoment it is committed.

LDAP Lightweight Directory Access Protocol.

LDAP attributeAn attribute defined in an LDAP directory data model.

LDAP authenticationA method for authenticating users by validating the user's submittedcredentials against data stored on an LDAP directory.

LDAP directoryA hierarchical database stored on an LDAP server and accessed throughLDAP calls.

LDAP serverA server that provides directory services through LDAP.

LDAP statusThe status of an LDAP server.

Load balancingEven distribution of load across all components of the system.

LockingSetting a volume (or snapshot) as unwritable (read-only).

LUN mapA table showing the mappings of the volumes to the LUNs.

LUN Logical unit number. Exports a systems volume into a registered host.

Master volumeA volume that has snapshots is called the master volume of its snapshots.

MIB Management information base. A database of objects that can be monitoredby a network management system. SNMP managers use standardized MIBformats to monitor SNMP agents.

Microsoft Active directorySee Active Directory

Glossary 137

Page 146: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Mirror peerA peer (volume or consistency group) that is designated to be a replica of aspecified source peer data.

MirroringSee Remote mirroring.

Modified StateA snapshot state. A snapshot in modified state can never be used forrestoring its master volume.

MultipathingEnables host interface modules direct access to any volume.

Peer Denotes a constituent side of a coupling. Whenever a coupling is defined,a designation is specified for each peer - one peer is designated primaryand the other is designated secondary.

Pool See Storage pool.

Primary peerA peer whose data is mirrored for backup on a remote storage system.

Rack The cabinet that stores all of the hardware components of the system.

Remote mirroringThe process of replicating the content of a source peer (volume orconsistency group) to a designated mirror peer.

Remote target connectivityA definition of connectivity between a port set of a remote target and amodule on the local storage system.

Remote targetAn storage system on a remote site, used for mirroring, data migration,and so on.

Role Denotes the actual role that the peer is fulfilling as a result of a specificcondition, either a master or a slave.

Rule See Event notification rule.

SAN Storage area network.

SCSI Small computer system interface.

Secondary peerA peer that serves as a backup of a primary peer.

SMS gatewayAn external server that is used to send SMSs.

SMTP gatewayAn external host that is used to relay e-mail messages through the SMTPprotocol.

Snapshot setThe resulting set of synchronized snapshots of a volume set in aconsistency group. See also Consistency group, Volume set.

SnapshotA point-in-time snapshot or copy of a volume. See also Image snapshot.

SNMP agentA device that reports information through the SNMP protocol to SNMPmanagers.

138 IBM XIV Storage System: Product overview

Page 147: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

SNMP managerA host that collects information from SNMP agents through the SNMPprotocol.

SNMP trapAn SNMP message sent from the SNMP agent to the SNMP manager,where the sending is initiated by the SNMP agent and not as a response toa message sent from the SNMP manager.

SNMPSimple Network Monitor Protocol. A protocol for monitoring networkdevices. See also MIB, SNMP agent, SNMP manager, SNMP trap.

SnoozeThe process of sending recurring event notifications until the events arecleared.

Storage poolA reserved area of virtual disk space serving the storage requirements ofthe volumes.

Sync best effort modeA mode of remote mirroring in which I/O operations are not suspendedwhen communication between a primary and secondary volume is broken.

SynchronizationThe process of making the primary volume and secondary volumeidentical after a communication down time or upon the initialization of themirroring.

Target See Remote target.

TCP/IPSee Transmission Control Protocol, Internet Protocol.

Thin provisioningThin provisioning provides the ability to define logical volume sizes thatare much larger than the physical capacity installed on the system.

Transmission Control ProtocolTransmission Control Protocol (TCP) on top of the Internet Protocol (IP)establishes a virtual connection between a destination and a source overwhich streams of data can be exchanged. See also IP.

Trap See SNMP trap.

Unassociated volumeA volume that is not associated with a consistency group. See Consistencygroup.

Uninterruptible power supplyThe uninterruptible power supply provides battery backup power for adetermined period of time, particularly to enable the system to powerdown in a controlled manner, on the occurrence of a lengthy power outage.

Volume cloningCreating a snapshot from a volume.

Volume setA cluster of specific volumes in a consistency group, which can all besnapshotted simultaneously, thus, creating a synchronized snapshot of allof them. The volume set can be snapshotted into multiple snapshot sets ofthe specific consistency group. See also Snapshot set, Volume set.

Glossary 139

Page 148: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

VolumeA discrete unit of storage on disk, tape or other data recording mediumthat supports some form of identifier and parameter list, such as a volumelabel or input/output control.

A volume is a logical address space, having its data content stored on thesystems disk drives. A volume can be virtually any size as long as the totalallocated storage space of all volumes does not exceed the net capacity ofthe system. A volume can be exported to an attached host through a LUN.A volume can be exported to multiple hosts simultaneously. See alsoStorage pool, Unassociated volume.

WWPNWorld Wide Port Name

XCLI IBM XIV command-line interface (XCLI) command set. See Command lineinterface.

XDRP The disaster recovery program for the XIV – The remote mirror feature ofthe XIV.

XIV-LDAP mappingAn association of data on the LDAP server (a specific LDAP attribute) anddata on the XIV. This is required to determine the access rights that shouldbe granted to an authenticated LDAP user.

140 IBM XIV Storage System: Product overview

Page 149: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Notices

This information was developed for products and services offered in the U.S.A.

IBM may not offer the products, services, or features discussed in this document inother countries. Consult your local IBM representative for information on theproducts and services currently available in your area. Any reference to an IBMproduct, program, or service is not intended to state or imply that only that IBMproduct, program, or service may be used. Any functionally equivalent product,program, or service that does not infringe any IBM intellectual property right maybe used instead. However, it is the user's responsibility to evaluate and verify theoperation of any non-IBM product, program, or service.

IBM may have patents or pending patent applications covering subject matterdescribed in this document. The furnishing of this document does not give youany license to these patents. You can send license inquiries, in writing, to:

IBM Director of LicensingIBM CorporationNorth Castle DriveArmonk, NY 10504-1785U.S.A.

For license inquiries regarding double-byte character set (DBCS) information,contact the IBM Intellectual Property Department in your country or sendinquiries, in writing, to:

IBM World Trade Asia CorporationLicensing2-31 Roppongi 3-chome, Minato-kuTokyo 106-0032, Japan

The following paragraph does not apply to the United Kingdom or any othercountry where such provisions are inconsistent with local law:INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THISPUBLICATIONS “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHEREXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIEDWARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESSFOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express orimplied warranties in certain transactions, therefore, this statement may not applyto you.

This information could include technical inaccuracies or typographical errors.Changes are periodically made to the information herein; these changes will beincorporated in new editions of the publications. IBM may make improvementsand/or changes in the product(s) and/or program(s) described in this publicationat any time without notice.

Any references in this information to non-IBM Web sites are provided forconvenience only and do not in any manner serve as an endorsement of those Websites. The materials at those Web sites are not part of the materials for this IBMproduct and use of those Web sites is at your own risk.

© Copyright IBM Corp. 2011 141

Page 150: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

IBM may use or distribute any of the information you supply in any way itbelieves appropriate without incurring any obligation to you.

Licensees of this program who wish to have information about it for the purposeof enabling: (i) the exchange of information between independently createdprograms and other programs (including this one) and (ii) the mutual use of theinformation which has been exchanged, should contact:

IBM CorporationAlmaden Research650 Harry RoadBldg 80, D3-304, Department 277San Jose, CA 95120-6099U.S.A.

Such information may be available, subject to appropriate terms and conditions,including in some cases, payment of a fee.

The licensed program described in this document and all licensed materialavailable for it are provided by IBM under terms of the IBM Customer Agreement,IBM International Program License Agreement or any equivalent agreementbetween us.

Any performance data contained herein was determined in a controlledenvironment. Therefore, the results obtained in other operating environments mayvary significantly. Some measurements may have been made on development-levelsystems and there is no guarantee that these measurements will be the same ongenerally available systems. Furthermore, some measurements may have beenestimated through extrapolation. Actual results may vary. Users of this documentshould verify the applicable data for their specific environment.

Information concerning non-IBM products was obtained from the suppliers ofthose products, their published announcements or other publicly available sources.IBM has not tested those products and cannot confirm the accuracy ofperformance, compatibility or any other claims related to non-IBM products.Questions on the capabilities of non-IBM products should be addressed to thesuppliers of those products.

This information is for planning purposes only. The information herein is subject tochange before the products described become available.

If you are viewing this information softcopy, the photographs and colorillustrations may not appear.

Notices

This document is confidential and proprietary to IBM XIV.

Contents of this and any related documentation may not be copied or transmittedin any printed or electronic manner or format, or in any other way disclosed toothers, for any purpose other than that for which it is furnished, without the priorwritten consent of IBM Ltd.

Brand names and product names mentioned in this manual may be trademarks orregistered trademarks of their respective companies and are hereby acknowledged.

142 IBM XIV Storage System: Product overview

Page 151: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

2011 IBM. All rights reserved. IBM XIV, the XIV logo, and Storage Reinvented aretrademarks of IBM XIV. All other trademarks are the property of their respectiveowners.

2011 Document Revision 11.0.0

IBM Information Systems Corporate Headquarters:

USAXIV Inc.175 Crossing Blvd., Suite 400Framingham, MA 01702Tel: +1-800-4700-XIV (+1-800-470-0948)Fax: +972-3-6959749

IsraelXIV Ltd.1 Azrieli CenterTel Aviv 67021Tel: +972-3-6074672

[email protected]

www.xivstorage.com

Copyrights

© Copyright IBM Corporation 2011. US Government Users Restricted Rights - Use,duplication or disclosure restricted by GSA ADP Schedule Contract with IBMCorp.

References in this documentation to IBM products, programs, or services do notimply that IBM intends to make these available in all countries in which IBMoperates. Any reference to an IBM product, program or service is not intended tostate or imply that only IBM's product, program or service may be used. Anyfunctionally equivalent product, program or service that does not infringe any ofIBM's intellectual property rights may be used instead of the IBM product,program or service. Evaluation and verification of operation in conjunction withother products, except those expressly designated by IBM, are the user'sresponsibility.

Trademarks

IBM, the IBM logo, and ibm.com® are trademarks or registered trademarks ofInternational Business Machines Corp., registered in many jurisdictions worldwide.Other product and service names might be trademarks of IBM or other companies.A current list of IBM trademarks is available on the Web at “Copyright andtrademark information” at Copyright and trademark information website(www.ibm.com/legal/copytrade.shtml).

Microsoft is a trademark of Microsoft Corporation in the United States, othercountries, or both.

Notices 143

Page 152: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

144 IBM XIV Storage System: Product overview

Page 153: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Index

Aabout this document

how to send your comments viaccess control 117

command execution log 128commands 128event report destinations 128logging and event reporting 128object creation tracking 128

access_all 120, 121acknowledgement 73active

activation state 94, 95Active Directory 125Active mode 52adding ports to remote target 11address, IBM viadministering

access control 117advanced host attachment 17advanced snapshot mechanism 29alarm notification 7algorithms 5, 7application administrator 117, 119

access_all 120command conditions 120

associationsuser groups and hosts 119

asynchronousremote mirroring 88, 89, 90, 91, 92,

93, 94asynchronous mirroring 49

scheduling 76scope of the chapter 68

asynchronous mirroring processwalkthrough 88

asynchronous remote mirroringpeer roles 94role transmission 77, 94, 95, 99state machine 94XCLI 104

Atomic test & set 22ATS 22authentication 120

xiv 121authentication modes

switching 127auto delete priority 32automatic

recovery from failure 5automatic event notifications 7available consistent copy

during mirroring 83

Bbackup

continuous 29, 32backups 51bandwidth 2

bandwidth utilization 16Block zeroing 21Broadband connection 4

Ccache

protection 5cache memory 2cache module 2call home

contact list 24Call-home connection 4canceling

sync job 71, 83, 86CDP (continuous data protection) 32change tracking 86CHAP 17CLI

management options 4CLI (command line interface) 7CLI management 14click-to-accept 39clustering

hosts 19command execution log 128commands

fc_connectivity_list 12host attachment 21, 24ipinterface_run_traceroute 12target_connectivity_activate 12target_connectivity_deactivate 12target_connectivity_define 12target_connectivity_delete 12target_connectivity_list 12

comments, how to send vicomponent

redundancy 5components, hardware 2configuration 123

multi-rack 7configuration guidelines summary 16configured sync rate 16connectivity 16, 17

hardware 2consistency group 44

creating 41consistency groups 7

and remote mirroring 63mirroring 82mirroring-related tasks 82overview 41restore 44restoring 41snapshots 42, 43

contact listcall home 24

continuous backup 29, 32continuous data protection 29Copy-on-Write (COW) 29, 32coupling 70

coupling (continued)activation 52constraints and limitations 57definition 51last consistent snapshot

timestamp 59last-consistent snapshots 58modes 52states 56, 94, 95types 52uncommitted data 57

COW (copy-on-write) 29COW (Copy-on-Write) 29, 32creating

consistency group 41creating a vm 21

DData (Cache) modules 2data differences 75data migration

deleting 110failures 112I/O handling 110overview 109read requests 110stages

activating 110initial configuration 110synchronization 110testing 110

write requests 110Data mirroring 5Data module 2data replication 75data virtualization 5, 7deactivating the mirroring 95defining gateways 115deleting snapshots

as part of the pool depletionprocess 71, 83, 86

deleting the mirroring 95destination groups 115destinations

defining 115e-mail 115SMS 115

diagnostics 7diff

the data that is sent by the syncjob 75

differences calculation 73disaster recovery 49, 67, 99disaster recovery types 49, 50disconnects prevention 16Don't stop when found

a stop criteria 125dr

disaster recovery 99Dynamic rate adaptation 16

© Copyright IBM Corp. 2011 145

Page 154: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Ee-mail (SMTP) gateways 115e-mail destination 115e-mail notifications 4e-mail-to-SMS gateways 115ECLS 58ECLS x 58electronic license 39error

link state 94, 95error code protection 5ESX

COMPARE AND WRITE 22fast copy 22SCSI2 reservations mechanism 22write zeroes 21

Ethernet connectivity 13Ethernet ports 14

field technician ports 14iSCSI service ports 14management ports 14

eventhandling 113information 113notification rules 114viewing 114

event notifications 7event report destinations 128external connection congestion 16external last consistent snapshot 58external replication mechanisms 7

Ffailback 99, 100, 103failover 99, 100, 103failover process 5failover test 103fast copy 22fc_connectivity_list 12features and functionality 1field technician ports

Ethernet ports 15laptop connectivity

configuring using DHCP 15configuring without DHCP 15

form, reader comment viformat

snapshot and snapshot group 37Full copy 21Full Volume Copy 36

Ggateways

defining 115e-mail (SMTP) 115e-mail-to-SMS 115

Gigabit Ethernet 3global spare storage 5glossary 135group rate limitation 23groups, destination 115GUI

management options 4

GUI (continued)updating the call home contact

list 24GUI (graphic user interface) 7GUI management 14gui/cli initiated LDAP login 124

Hhard capacity, depletion 46hardware components 2hardware connectivity 2Hardware-assisted locking 21, 22HBA 16host

clustering 19communication with the slave

volume 100rate 23

host connectivity 16, 17Host Interface module 2host system attachment 16, 17host-based I/O 3hosts

associations 119hot upgrade 133how to send your comments vi

II/O 16

rate limitation 23I/O operations 55IBM

address viIBM XIV role

in relation to access control 122image snapshots

duplicating 34implementation

of LDAP 122indirectly associated groups

of LDAP users 125init

to be distinguished fromintialization 86

initializationsynchronization status 54the first phase of asynchronous

mirroring 88, 89, 90, 91, 92, 93, 94Initialization 73initialization type 73, 74initiator

iSCSI 17instant space reclamation 28interfaces

call home 24supported 3

internal snapshots 37IP communication, system-initiated 14IP connectivity 13IP connectivity, guidelines summary 16ipinterface_run_traceroute 12iSCSI CHAP authentication 17

Llast consistent snapshot 58last replicated snapshot

deletion priority 83last secondary timestamp 55last_replicated

deletion 71, 83, 86snapshot 73timestamp 78, 79

last_replicated snapshot 100latency

overcoming latency that is inherent tosynchronous mirroring 67, 68

LCS 58LDAP 130

authentication 120, 122authentication mode

switch to and from 127authentication scenarios 125directory 122group mapping 122service account 127use cases 123user validation 125

LDAP authentication scenarios 124LDAP server

definition 123ldap_test 123license

electronic 39life-cycle

of a volume 27Lightweight Directory Access

Protocol 122limiting

host rates 23link

states 94, 95link status

synchronous mirroring statuses 54Locking

of the pool during pool spacedepletion 83

logical unit numbers 16low sync rate 16LUN ID 37

Mmanagement connectivity 14management options 4managers, SNMP 115manual deletion

of last consistent snapshot 58manual reactivation

of the mirror process 86map_vol 100mapping

mirror related volumes 100mapping, LUN, 16master 70

role type 94master LRS 83master site 49master volumes 27max sync rate 16

146 IBM XIV Storage System: Product overview

Page 155: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

maximum number of queriesas a search limit 125

mechanismsself-healing 5

memberofgroup attribute 125

methodsof access control 117

MFG 39Microsoft Active Directory 122mirror state 78mirror_activate 100mirror_change_role 100mirror_change_schedule 100mirror_create 73, 74, 100mirror_delete 100mirror_switch_roles 100mirroring

data 5remote 49, 67, 88, 89, 90, 91, 92, 93,

94scheduling asynchronous

mirroring 76sepcifications 70termination, deletion, deactivation 95

mirroring and snapshots 71, 73mirroring consistency groups 82, 96, 98,

99mirroring relationships 71mirroring resynchronization 58Modem 4modes

Active 52Standby 52

moduledata 2Host Interface 2UPS 2

modulescache 5

most_recent 73, 74deletion 71, 83, 86snapshot 73

multi-rack configuration 7multipathing 7Multiple concurrent mirroring

relationships 71Multiple findings

during a search within indirectlyassociated groups 125

multiple targets 71

Nnative

authentication 120never

a default schedule 76Never

schedule 100Non-disruptive code load 133Nondisruptive testing 103none

role type 94nonoperational

coupling state 94, 95nonvolatile disk media 5

notices 141notifications

e-mail 4SMS 4SNMP 4

Oobject creation tracking 128of an LDAP server 123of the initialization 73off-line intialization 73, 74OK

link state 94, 95Open LDAP 122operational

coupling state 94, 95operational status

synchronous mirroring statuses 54options

management 4outstanding sync jobs

disruption 100

Ppassword management 121peers 70pending writes 54Performance classes

(QoS) 23planned service disruption 103Planned service disruption 99point of failure 5pool space depletion 83, 86

on the slave 88protected snapshots 83

pool_config_snapshots 83predefined users 118

authentication 120protected snapshots 83protected_snapshot_priority 83provisioning

thin 7provisioning, thin 46

QQoS

performance classes 23

Rreader comment form processing virecovery 100, 103

from a disaster 99recovery point objective 78recovery target objective 78redirect-on-write

in the context of mirroring 71Redirect-on-Write (ROW) 29, 32redundancy 5redundant components 5redundant power 6reliability 5

remote mirroring 49and consistency groups 63basic concepts 49, 50best-effort coupling recovery 57configuration options 51coupling 52disaster recovery types 49, 50for media error recovery 64operation 49, 50resuming after role change 62role switchover 60synchronization 54, 56synchronous mirroring statuses 53volume configuration 51

remote monitoring 7replication 67, 68replication mechanisms 7replication scheme 71replication state 78restoring 44

snapshots 35volumes 35

restricted prefixto a snapshot group 43

resynchronization 58role switchover 60

when remote mirroring isnonoperational 60

when remote mirroring isoperational 60

role transmissionwithin the asynchronous mirroring

process 77, 94, 95, 99role-based

access control 117role-based access control

application administrator 119configuring users 121

roleswithin the asynchronous mirroring

process 94ROW (redirect-on-write) 29ROW (Redirect-on-Write) 29, 32rpo 78RPO 78RPO_Lagging 78, 79, 80, 95RPO_OK 78, 79, 80RTO 78

Sscheduling

asynchronous mirroring 76scrubbing 5SCSI error

while writing to a secondaryvolume 55

search flowof indirectly-associated groups 125

secondary site 49secondary volume

last consistent 58self-healing

mechanism 5self-healing mechanisms 5semantics

of mirrored consistency groups 82

Index 147

Page 156: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

sepcifications 70service disruption

testing 103single physical copy of data 33single point of failure 5slave 70

promoting during failover 100role type 94

slave LRS 83slave replica

inconsistent 78, 79smis_user 118SMS destination 115SMS notifications 4snapshot 33, 35

atomic procedure of creating a 33format 37storage utilization 32

Snapshotassociation 32name 32serial number 32

snapshot architecturein the context of mirroring 71

snapshot groupformat 37

snapshot groups 42, 43, 44snapshot ID 37snapshot management 7snapshots 29, 32

auto delete priority 32depletion of hard capacity 46duplicating 34locking and unlocking 34protected 83restoring 35unprotected (from deletion) 86

Snapshots 27, 29snapshots, overview 27snapshotting 29, 32

consistency groups 7snapshot management 7

Snapshotting 29SNMP 7SNMP managers 115SNMP notifications 4spare storage 5standby

activation state 94, 95Standby mode 52states

coupling 56stop criteria

for searching indirectly associatedgroups 125

Stop when founda stop criteria 125

storageglobal spare 5

storage administrator 16, 118storage pool

depletion of hard capacity 46hard and soft sizes 46

storage pools 7mirroring 83moving volumes 45, 46overview 45, 46

SUN directory 122switchover 60Symantec Storage Foundation Thin

Reclamation 28symmetric connectivity for mirroring 13sync job 75

canceling 71, 83, 86pausing 95pending 86progress 78, 79snapshot that is part of a 37

sync ratelow 16

synchronization 55synchronization status

how is it determined 78, 79, 80synchronous mirroring statuses 54

synchronizedremote mirroring 49, 67, 68

synchronous mirroring 49statuses 53

synchronous mirroring statuses 55synchronous remote mirroring

I/O operations 55system

hard and soft sizes 46system attachment

see: host system attachment 16, 17

Ttarget connectivity 11, 12Target connectivity 13Target Connectivity 9target object

defining 11target_connectivity_activate 12target_connectivity_deactivate 12target_connectivity_define 12target_connectivity_delete 12target_connectivity_list 12technician 118terminating the mirroring 95the unmap bit 21thin provisioning 7, 46

mirroring 83time stamp 55timestampof last_replicated

snapshot 100transmission

of roles 77, 94, 95, 99truck mode 73, 74type

of intialization 73, 74

Uuncommitted data 57Unintentional/erroneous role change 99unplanned service disruption 100Unplanned service disruption 99unprotected snapshots

deletion 86upgradability 8UPS module 2

use casesLDAP 123

user groups 119associations 119

user rolesapplication administrator 117permission levels 117read only 117storage administrator 117technician 117

user searchLDAP 125

users validationusing LDAP 125

Vvm cloning 22volume

configuration 51volume configuration

mixed configuration 52volumes 27

Full Volume Copy 36hard and soft sizes 46restoring 35

Wwrite zeroes 21

XXCLI

asynchronous mirroring 104xiv authentication 121XIV GUI

updating the call home contactlist 24

XIV mapping 130XIV role search

LDAP 125XIV-to-LDAP mapping 124

148 IBM XIV Storage System: Product overview

Page 157: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Readers’ Comments — We'd Like to Hear from You

IBM XIV Storage SystemProduct overview

Publication No. GC27-3912-01

We appreciate your comments about this publication. Please comment on specific errors or omissions, accuracy,organization, subject matter, or completeness of this book. The comments you send should pertain to only theinformation in this manual or product and the way in which the information is presented.

For technical questions and information about products and prices, please contact your IBM branch office, yourIBM business partner, or your authorized remarketer.

When you send comments to IBM, you grant IBM a nonexclusive right to use or distribute your comments in anyway it believes appropriate without incurring any obligation to you. IBM or any other organizations will only usethe personal information that you supply to contact you about the issues that you state on this form.

Comments:

Thank you for your support.

Send your comments to the address on the reverse side of this form.

If you would like a response from IBM, please fill in the following information:

Name Address

Company or Organization

Phone No. Email address

Page 158: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

Readers’ Comments — We'd Like to Hear from YouGC27-3912-01

GC27-3912-01

����Cut or FoldAlong Line

Cut or FoldAlong Line

Fold and Tape Please do not staple Fold and Tape

Fold and Tape Please do not staple Fold and Tape

PLACE

POSTAGE

STAMP

HERE

International Business Machines

_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

__

_

Page 159: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document
Page 160: IBM XIV Storage System: Product overview · IBM XIV Storage System. Relevant tables, charts, graphic interfaces, sample outputs, and appropriate examples are also provided. Document

����

Printed in USA

GC27-3912-01