VMAX 101 VMAX 101 with vSphere Recommended Practices David Robertson vSpecialist Twitter: @daverdfw EMC CONFIDENTIAL—INTERNAL USE ONLY. 1 Agenda • History of Symmetrix • VMAX Hardware/Software Overview • What’s new with Enginuity 5875 (Danube) • Recommended Practices for Using VMAX with VMware • Q&A EMC CONFIDENTIAL—INTERNAL USE ONLY. 2 Evolution of Symmetrix Continuous Improvement in Efficiency and Effectiveness Centralized Distributed Virtualized Single servers Single applications 1985–1995 Multiple servers Multiple applications 1995–2005 Virtualized servers Consolidated applications 2005–2010 Direct Attached Storage Storage Area Networks Virtual Storage Symmetrix 4400 Symmetrix 5500 Symmetrix 3000/5000 Symmetrix 8000 Symmetrix DMX-1/-2 Symmetrix DMX-3 Symmetrix DMX-4 Symmetrix VMAX Flash Drives World’s first integrated cached disk array (ICDA) World’s first terabyte ICDA disk array “Open Symmetrix” Created new Direct Matrix World’s first World’s most managed data “enterprise architecture incrementally cost-effective, from all major storage” revolutionizes scalable 1 PB disk high-performing, server platforms market category high-end storage array secure, energyefficient high-end array Purpose-built to deliver infrastructure services within the data center Symmetrix is the enabler to evolving high-end infrastructure EMC CONFIDENTIAL—INTERNAL USE ONLY. 3 Symmetrix Evolution Symmetrix 4 Symmetrix 3 Symmetrix 2 3330/5330 3430/5430 3700/5700 Symmetrix 5500-3 16Mb DRAM 1GB Cache Board Symmetrix 4400 4Mb DRAM 256MB Cache Board 5.25” HDA Hyper Volume Extension 3.5” HDA Symmetrix ESP SDMS EOS EDM ‘90 ‘91 ‘92 ‘93 ‘94 ‘95 ‘96 ‘97 Symmetrix 4200 Dynamic Sparing NonDisruptive Microcode Load DMX Symmetrix 4.8 DMX800 DMX1000 DMX2000 3630/5630 3830/5830 3900/5900 Symmetrix 3000* Symmetrix 4800 Symmetrix 6 DMSP System Calls Ultra SCSI SA-Failover PowerPath Fibre Channel SDDF ‘98 Symmetrix 5230-4 InfoMover Symmetrix 5100-9 Celerra RAID-S FDRSOS FWD SCSI SRDF Ext Dist SRDF Host Comp Symmetrix Manager DataReach MPLF TimeFinder 3380/3390 Intermix 3GB/9GB Intermix SRDF PDS Assist SDS HDC DMX-4 Dynamic Cache Partitions Virtual LUN RAID-6 2107 CU mainframe Symmetrix 6.5 DMX-2 Symmetrix 5 8130 8430 8730 ‘99 >4GB Cache SymmOptimizer File SMMF New TF Splits Switch SRDF R1/R2 FC Fabric Support Virtual Provisioning Instant VTOC Flash Drives 1TB SATA Drives FAST VP FLM VAAI FAST ‘00 ‘01 ‘02‘03‘04‘05‘06‘07 ‘08‘09‘10 Symmetrix 5.5 8230 8530 8830 Symmetrix 7 DMX-3 DMX-3 DMX1500 950 DMX2500 DMX3500 DMX4500 VMAX Series Virtual Matrix Autoprovisioning Groups Enhanced Virtual LUN 20 Years of Storage Leadership! EMC CONFIDENTIAL—INTERNAL USE ONLY. 4 Symmetrix VMAX Series with Enginuity • Supports from 96 to 2400 drives – Up to 240 drives per Storage Bay – Up to 10 Storage Bays • Connectivity: – Fibre – FICON – iSCSI – GigE • More host connection ports – 128 Fibre Channel host/SAN – 32 Fibre Channel remote replication – 64 iSCSI – 64 FICON host – 32 GigE remote replication EMC CONFIDENTIAL—INTERNAL USE ONLY. 5 EMC Symmetrix: The World’s Most Trusted Storage Platforms 96 to 2,400 drives for up to 2 PB of usable capacity One to eight VMAX Engines (16 directors) Fibre Channel, iSCSI, Gigabit Ethernet, FICON connectivity Up to 1 TB (512 GB usable) global mirrored memory 8 Gb/s Fibre Channel, FICON, and Fibre Channel SRDF Symmetrix VMAX: Virtual Matrix Architecture Symmetrix DMX: The Direct Matrix Architecture 32 to 2,400 drives Two to 12 front-end/back-end directors FICON, ESCON, Fibre Channel, iSCSI, Gigabit Ethernet connectivity Up to 512 (256 usable) GB global memory CAPACITY AND PERFORMANCE SCALABILITY Note: Combinations may be limited or restricted based on configuration EMC CONFIDENTIAL—INTERNAL USE ONLY. 6 Symmetrix Architecture – “Big Picture” Host Reads – “Cache Hit” if data is already in cache – “Cache Miss” is staged from disk Host Systems Host Writes – All host writes are to cache – “Write Pendings”are asynchronous written to disk Front-end Host Adapters Global Memory (Cache) Back-end Disk Adapters • Front-end connects hosts to the system • Back-end connects the physical drives – Director – Physical drives EMC CONFIDENTIAL—INTERNAL USE ONLY. 7 Symmetrix VMAX Virtual Matrix Architecture High-Availability Symmetrix Director Pair Up to 128 ports per system, two hot-pluggable modules per director Back-end connections for Flash, Fibre Channel, and SATA disks (up to 128 ports, 2,400 disks, 2.1 PB) Four Quad-core Intel processors at 2.33 GHz per core (16 cores per engine) Global mirrored memory and redundant CPU complexes that can be accessed and shared across Symmetrix engines Virtual Matrix interface connects and shares resources, providing massive scalability in a single system Up to eight engines per Symmetrix system EMC CONFIDENTIAL—INTERNAL USE ONLY. 8 VMAX Hardware Overview EMC CONFIDENTIAL—INTERNAL USE ONLY. 9 VMAX Engine Overview EMC CONFIDENTIAL—INTERNAL USE ONLY. 10 VMAX Engine Overview EMC CONFIDENTIAL—INTERNAL USE ONLY. 11 VMAX Engine Overview EMC CONFIDENTIAL—INTERNAL USE ONLY. 12 Engine IO module layout EMC CONFIDENTIAL—INTERNAL USE ONLY. 13 Engine Numbering and Population Order Population Order System Bay Engine # Populated 8 Engine 8 Populated 6 Engine 7 Populated 4 Engine 6 Populated 2 Engine 5 Populated 1 Engine 4 Populated 3 Engine 3 Populated 5 Engine 2 Populated 7 Engine 1 EMC CONFIDENTIAL—INTERNAL USE ONLY. Director # Dir 16 Dir 15 Dir 14 Dir 13 Dir 12 Dir 11 Dir 10 Dir 9 Dir 8 Dir 7 Dir 6 Dir 5 Dir 4 Dir 3 Dir 2 Dir 1 14 VMAX Storage Bay Configuration Standard Configuration Up to four directly connected Storage Bays Up to six daisy chained Storage Bays Up to eight Disk Director pairs (Octants) Daisy Chained Daisy Direct Direct Connect Chained Connect Direct Daisy Direct Connect Chained Connect Daisy Chained Engine 8 Dir 15/16 Octant 6 Engine 7 Octant 2 Engine 5 Engine 7 Dir 13/14 Engine 6 Dir 11/12 Octant 4 Engine 6 Octant 8 Engine 8 Octant 3 Engine 3 Octant 7 Engine 1 Engine 5 Dir 9/10 Engine 4 Dir 7/8 Octant 5 Engine 2 Octant 1 Engine 4 Engine 3 Dir 5/6 Engine 2 Dir 3/4 Engine 1 Dir 1/2 EMC CONFIDENTIAL—INTERNAL USE ONLY. 15 VMAX Drive and Protection Types EMC CONFIDENTIAL—INTERNAL USE ONLY. 16 Supported Drive Types EMC CONFIDENTIAL—INTERNAL USE ONLY. 17 Data Protection Options Option Characteristics RAID 1 RAID 5 RAID 6 Unprotected Protection Performance Cost Write to two separate physical drives Read from single drive - DMSP 2 1 2 Parity based protection Striped data and parity – 3+1 and 7+1 Configurations 3 2 1 Two parity drives – 6 + 2 and 14 + 2 Data Availability is primary Performance is a secondary consideration New with Enginuity 5772 1 3 1 Not recommended EMC CONFIDENTIAL—INTERNAL USE ONLY. N/A 18 Choose RAID Protection That Makes Sense for Your Workload Highest Availability RAID 6 MIRRORED RAID 5 High High Highest Performance Requirement Color indicates performance overhead EMC CONFIDENTIAL—INTERNAL USE ONLY. 19 RAID types and Recommendations EMC CONFIDENTIAL—INTERNAL USE ONLY. 20 VMAX Service Processor EMC CONFIDENTIAL—INTERNAL USE ONLY. 21 Symmetrix Service Processor • EMC personnel interface to the Symmetrix – Rack-mounted server with KVM & UPS – Windows XP Operating System • Runs SymmWin application – Used to: • Configure the Symmetrix • Run diagnostics, procedures, and other maintenance utilities • Launch Inlines commands • Service processor also runs Solutions Enabler SYMCLI and Symmetrix Management Console server • Secure Service Credentials ensure only authorize access • EMC Remote allows Support Engineers to access the service processor remotely – Secure IP network connection – Modem EMC CONFIDENTIAL—INTERNAL USE ONLY. 22 SymmWin • Graphical-based tool for configuring and monitoring a Symmetrix System – Runs locally on the service processor – May also run on stand-alone PC • Provides interface to Inlines • Automatically runs periodic checks and performs “Call Home” • Can be accessed remotely using EMCRemote EMC CONFIDENTIAL—INTERNAL USE ONLY. 23 Enginutiy Release Numbering Major Release Level Service Processor Code (Minor Release Level) 5874.34.29.[03] Family Number Supported Hardware: 8 Symm8 VMAX 7 Symm7 DMX-3, DMX-4 6 Symm6 DMX, DMX-2 EMC CONFIDENTIAL—INTERNAL USE ONLY. Emulation Code Level (Build #) Revision Number of QA test code 24 VMAX Device Configuration EMC CONFIDENTIAL—INTERNAL USE ONLY. 25 Symmetrix Device • Logical abstraction of a disk drive – EMC terms often used are hyper-volume, slice, split, device, or volume • Industry term is LUN – Logical Unit – Approximately 64,000 devices per system • Each devices is assigned a unique hex identifier – Emulates either a FBA and CKD device – Maximum size = ~240 GB TDEV • Meta Devices can be created to go beyond this limit Symmetrix Device DEV 1bc4 • Mapped to persistent locations on physical disk – Protection from media failure • RAID 1 Mirroring • RAID 5 and RAID 6 parity based protection – Replication • Local • Remote EMC CONFIDENTIAL—INTERNAL USE ONLY. 26 Symmetrix Device, continued • Symmetrix Devices are provisioned to hosts – Physical connectivity – Map to front-end director port • Assign Channel Address – Mask device to specific HBA – Feature referred to as Auto-provisioning Groups Symmetrix Device DEV 1bc4 EMC CONFIDENTIAL—INTERNAL USE ONLY. 27 Hypervolumes EMC CONFIDENTIAL—INTERNAL USE ONLY. 28 Physical Disk and Hyper Volumes Physical Disk Hyper Volumes 10 GB 8 GB 9 GB 6 GB 146 GB 8 GB 11 GB 8 GB 36 GB EMC CONFIDENTIAL—INTERNAL USE ONLY. 29 Metavolumes A metavolume is two or more Symmetrix system hypervolumes presented to the host as a single addressable device. EMC CONFIDENTIAL—INTERNAL USE ONLY. 30 Gatekeeper Devices • A Gatekeeper can be any volume accessible to the host Gatekeeper – Appear like any other volume (Typically <10MB) – Usually configured as a small device – Should not be used by the host for normal data processing • Best practice is to dedicate devices as Gatekeepers – When a SYMCLI session is started, gatekeeper and database locks are used to avoid conflicts • Semaphore – Once the CDB sequence is processed, the gatekeeper is closed and the lock released, freeing the device for other processing • Solutions Enabler commands executed on the Symmetrix Service Processor uses a pseudo Gatekeeper device – Storage Processor does not have direct access to any devices EMC CONFIDENTIAL—INTERNAL USE ONLY. 31 In-Band Communicates • Host to the Symmetrix communication is performed using standard SCSI Write Buffer/Read Buffer commands • Devices designated to receive commands are called Gatekeepers – Typically minimum sized volumes – Simply used to pass commands and return response Gatekeeper SYMCLI Commands EMC CONFIDENTIAL—INTERNAL USE ONLY. 32 VMAX Virtual Provisioning EMC CONFIDENTIAL—INTERNAL USE ONLY. 33 Virtual Provisioning Device Types • Thin Device – Host-addressable device – Seen by the operating system as a “normal” device – Used in the same way as other host-addressable devices • Can be replicated both locally and remotely – Physical storage need not be completely allocated at device creation – Physical storage is allocated from a pool of DATA devices – Remains Not Ready until bound to a pool, though can be addressed and configured by a host • DATA Device – An internal, non-addressable device – Provides the physical storage that is used to supply disk space for a thin device – Placed in a thin storage pool to which the thin device has been associated or “bound” – Multiple RAID protection types • RAID 1, RAID 5, RAID 6 • RAID 5 support in DMX is for 3+1 only EMC CONFIDENTIAL—INTERNAL USE ONLY. 34 Virtual Provisioning with VMAX Virtual Provisioning Application perceived Virtual Devices Reported Capacity Allocated Allocated Allocated Virtual Provisioning enables a large volume to be presented to a host while consuming physical storage from a shared pool only as needed. Data Devices TDAT 1 TDAT 2 TDAT 3 TDAT 4 TDAT 5 TDAT 6 TDAT 7 TDAT 8 TDAT 1 TDAT 2 TDAT 3 TDAT 4 TDAT 5 TDAT 6 TDAT 7 TDAT 8 EMC CONFIDENTIAL—INTERNAL USE ONLY. … TDAT 1 TDAT 2 TDAT 3 TDAT 4 TDAT 5 TDAT 6 TDAT 7 TDAT 8 TDAT 1 TDAT 2 TDAT 3 TDAT 4 TDAT 5 TDAT 6 TDAT 7 TDAT 8 35 Virtual Provisioning Steps Step 1 create TDAT’s Data Devices or TDAT’s Step 2 create Pool add TDAT”s Same Drive Type Same RAID Level “TDAT” Thin Devices Step 3 create TDEV’s Storage Pool “TDAT” TDEV EMC CONFIDENTIAL—INTERNAL USE ONLY. 36 Thin Pool Concepts To Hosts / Storage Groups Metahead TDEV TDEV ….. TDEV TDEV TDEV TDEV TDEV Thin Devices TDEV TDEV size and number is independent of TDAT and drive partitions Metavolume Data Devices TDAT 1 Volumes With Protection 7+1 or 6+2 in this example 2 3 4 7+1 Pool 1 2 3 4 EMC CONFIDENTIAL—INTERNAL USE ONLY. 1 2 3 4 1 2 3 4 1 2 3 4 Thin Pools 5 3+1 Pool 1 2 3 5 1 2 3 5 1 2 3 5 1 2 3 5 Volumes With Protection 3+1 Physical Disks 37 Thin Pool Concepts with AutoProvisioning HBA AutoProvisioning Groups Masking View HBA HBA FA - XY FA - XY HBA HBA FA - XY HBA Initiator Group Port Group FA - XY Storage Group Metahead TDEV TDEV TDEV ….. Thin Devices TDEV TDEV TDEV TDEV TDEV Metavolume TDEV size and number is independent of TDAT and drive partitions. TimeFinder , SRDF and Open Replicator relationships are configured at the TDEV level. Data Devices TDAT 1 Volumes With Protection 7+1 or 6+2 in this example 2 3 4 7+1 Pool 1 2 3 4 EMC CONFIDENTIAL—INTERNAL USE ONLY. 1 2 3 4 1 2 3 4 1 2 3 4 5 Thin Pools 3+1 Pool 1 2 3 5 1 2 3 5 1 2 3 5 1 2 3 5 Volumes With Protection 3+1 Physical Disks 38 Virtual Provisioning Thin Pools Pool type specific to Virtual Provisioning • Thin pools can be created at the same time as DATA devices • They can also be created with no associated DATA devices • There is no default thin pool • The first DATA device added to the thin pool defines its protection type • Thin pools can contain devices of only a single protection type – If first device added is RAID 1, all additional devices must be RAID 1 EMC CONFIDENTIAL—INTERNAL USE ONLY. Thin Pool With DATA Devices 39 Host Writes to Thin devices • The initial bind of a thin device to a pool causes 1 thin device extent to be allocated per thin device • When a write is performed to a logical block address that does not exist on a previously allocated extent, a new thin device extent will be allocated from the pool • A round-robin mechanism is used to balance the allocation of DATA device extents across all available DATA devices in the pool • A 4 member thin meta would cause 4 extents to be allocated EMC CONFIDENTIAL—INTERNAL USE ONLY. Host Write I/Os to Thin Devices Thin Pool Thin Devices 40 Extent Allocation on Host Writes to Logical Block Addresses Logical Block Addresses on a Thin Device The host sees the thin device the same as a regular device The disk still contains a range of logical block addresses LBA 0 The LBA range will be equal to the number of 512 byte blocks in the entire device The extent allocation mechanism does not change this LBA N-1 N = Number of blocks in the thin device reported capacity EMC CONFIDENTIAL—INTERNAL USE ONLY. 41 Extent Allocation on Host Writes to Logical Block Addresses (Continued) Thin device extents contain 768 KB or 12 Symmetrix Tracks Logical Block Addresses in a 12 Track Thin Device Extent Each extent contains 1536 x 512 byte blocks Extent allocation is only triggered if the host writes to an LBA that is not part of a previously allocated extent 0 KB - 768 KB LBA 0 EMC CONFIDENTIAL—INTERNAL USE ONLY. LBA 1535 42 Extent Allocation on Host Writes to Logical Block Addresses (Continued) Initial bind causes one thin extent to be allocated Host sends an 8 KB write to LBA 872 which is part of a previously allocated extent Example of Extent Allocation LBA 0 - 1535 – The write is accepted and acknowledgement is returned with no allocation performed Host sends an 8 KB write to LBA 72588 LBA 72192 - 73727 LBA 73728 - 75263 – Extent allocation is performed, the write is accepted, and an ack is returned Host sends an 8 KB write to LBA 73724 – No extent allocation is performed for the first 2 KB, extent allocation is performed for the second 6 KB, the write is accepted, and an ack is returned EMC CONFIDENTIAL—INTERNAL USE ONLY. 43 VMAX Management Overview EMC CONFIDENTIAL—INTERNAL USE ONLY. 44 EMC Solutions Enabler Introduction • Symmetrix Command Line Interface (SYMCLI) – Nearly all host environments – Also installed on Service Processor • Provides a host with a comprehensive command set for managing a Symmetrix storage environment – Invoked from the host OS command line – Scripts that may provide further integration with OS and application • Separate components licenses • Security and access controls – Monitor only – Host-based and user-based controls EMC CONFIDENTIAL—INTERNAL USE ONLY. Detailed Configuration Information Status On-line Configuration Changes Performance Control 45 EMC Symmetrix Management Console Simplifies storage management for virtual data centers • Quickly provision resources on demand – – – – Fully Automated Storage Tiering (FAST) Auto-provisioning Groups Virtual Provisioning Enhanced Virtual LUN technology • Ease of use – – – Tasks view Wizards Templates • Management integration – Symmetrix Management Console “Ease-of-use” capabilities EMC CONFIDENTIAL—INTERNAL USE ONLY. Symmetrix Management Console and SMI-S on Service Processor • Complements EMC Symmetrix Manager and SYMCLI • Lightweight software requiring minimal host resources • Web-based GUI • SMC/SPA also is available as a vApp virtual appliance on PowerLink 46 EMC Symmetrix Performance Analyzer • Simplify storage management – – Intuitive, automated trending of Key Performance Indicators (KPIs) Improve long-term planning for upgrades and consolidation • Monitor Symmetrix operations – – Real-time data collection—five-second intervals Diagnostics • Easily drill down to device-level views of performance • Choose time period to track – 24 hours, one week, one month, six months, year to date, custom • FAST monitoring – – EMC CONFIDENTIAL—INTERNAL USE ONLY. Monitor storage type usage and performance Monitor Storage Groups and volume level metrics 47 VMAX Provisioning Overview EMC CONFIDENTIAL—INTERNAL USE ONLY. 48 Symmetrix VMAX: Easy, Quick, and Automated Storage Provisioning Auto-provisioning Groups simplifies initial configurations and all future changes and additions 1 3 5 2 4 6 1 2 Create Initiator Group Add/Remove Initiator EMC CONFIDENTIAL—INTERNAL USE ONLY. 3 4 Create Port Group Add/Remove Port 5 6 Create Storage Group Add/Remove Device 49 Symmetrix VMAX: Easy, Quick, and Automated Storage Provisioning for Virtual Servers with a Single Action Traditional Mapping and Masking Auto-provisioning Groups HBA HBA HBA HBA HBA Port A HBA HBA HBA HBA DEV DEV DEV Port B Port C HBA DEV DEV DEV DEV DEV DEV HBA HBA HBA HBA Port A HBA HBA DEV DEV DEV DEV DEV DEV DEV DEV DEV Port B Port C HBA Port D 40 Individual Masking Operations Five ESX servers x two HBAs x four storage ports HBA Port D HBA HBA Single Setup to Build and Associate Groups ~160 clicks to complete 15 clicks to complete Includes initial configuration and repeated for every change or add Simplifies initial configurations and all future changes and additions EMC CONFIDENTIAL—INTERNAL USE ONLY. 50 EMC VMAX Storage Scale-out architecture for unmatched performance and hyper-consolidation New “ease-of-use” capabilities to provision thousands of virtual and/or physical servers in minutes Support for Enterprise Flash, Fibre Channel, and SATA FAST for tiering storage in VMware environments Enhanced Virtual LUN Technology for nondisruptive mobility Robust enterprise class BC and DR solutions with TimeFinder and SRDF EMC CONFIDENTIAL—INTERNAL USE ONLY. 51 What’s new with Enginuity 5875 (Danube) EMC CONFIDENTIAL—INTERNAL USE ONLY. 52 EMC CONFIDENTIAL—INTERNAL USE ONLY. 53 VMware vStorage APIs for Array Integration Support for VAAI • Block Zero 10-times less I/O for VMware vStorage Virtual Machine File System (VMFS) formatting/reallocation • Hardware-Assisted Locking Block-level locking allows up to 10-times more virtual machines per data store • Full Copy Offload replication to array for 10-times faster virtual machine deployments, clones, snapshots, and VMware Storage vMotion EMC CONFIDENTIAL—INTERNAL USE ONLY. 54 EMC CONFIDENTIAL—INTERNAL USE ONLY. 55 EMC Virtual Storage Integrator MORE EFFICIENCY MORE SCALE VIRTUAL STORAGE INTEGRATOR MORE SECURITY EMC CONFIDENTIAL—INTERNAL USE ONLY. Microsoft Hyper-V VMware Virtual Storage Integrator simplifies virtual server management while preserving architectural control of the storage infrastructure 56 FAST VP: Sub-LUN Optimization ~5% is active ~95% is inactive Flash drives: optimize performance SATA: optimize cost and capacity Device Pool Storage Pool Allows most inactive data to move to SATA drives with no performance impact EMC CONFIDENTIAL—INTERNAL USE ONLY. 57 FAST with Virtual Pools (FAST VP) • A new level of Fully Automated Storage Tiering – Automated tiered storage for virtual pools – Sub-LUN data movement for virtual pools • Automatically responds to changes in the production workload • More efficient use of capacity – Place very busy data on enterprise Flash drives – Place mostly idle data on Fibre Channel and SATA drives EMC CONFIDENTIAL—INTERNAL USE ONLY. 58 Virtual Provisioning Levels of Granularity EMC CONFIDENTIAL—INTERNAL USE ONLY. 59 Elements of FAST • Storage Type – a shared storage resource with common technologies • FAST Policy – manages data placement and movement across Storage Types to achieve service levels for one or more Storage Groups • Storage Group – logical grouping of devices for common management • Storage Class – combination of Storage Types and FAST Policies to meet service level objectives for Storage Groups Storage Class Storage Types R53_200_EFD 200 GB EFD RAID 5 (3+1) R57_146_FC 146 GB 15K FC RAID 5 (7+1) R614_1000_SATA 1 TB SATA RAID 6 (14+2) EMC CONFIDENTIAL—INTERNAL USE ONLY. FAST Policies Storage Groups Production 25% 50% 25% Development ProductionApp1_SG ProductionApp2_SG 25% 100% Dev_SG 60 FAST VP Implementations • FAST VP tasks split between microcode and FAST controller • Performance data collected by microcode – Data collected at LUN and subLUN level • Performance data analyzed by FAST controller • Controller generates a “Performance Movement Policy” • Microcode applies policy – Executes sub-LUN data movements between tiers using Virtual LUN VP Mobility EMC CONFIDENTIAL—INTERNAL USE ONLY. Microcode FAST Controller Collect Performance Data Analyze Performance Data FAST VP Execute Data Movement Generate Performance Movement Policy 61 Federated Live Migration Complete technology refreshes in days versus months • Fully nondisruptive data migration for faster deployment of new technologies • Leverages intelligence of storage array and host multi-pathing • Supports Zero Space Reclaim for savings and efficiencies Federated Live Migration • No remediation when migrating pre-qualified configurations • Manage both array and host redirection from EMC Symmetrix Management Console or CLI EMC CONFIDENTIAL—INTERNAL USE ONLY. 62 Zero Space Reclaim Reclaim allocated, but unused capacity when migrating to a new Symmetrix VMAX • Runs “in-line” as data is migrated from old Symmetrix DMX to VMAX 0101 0000 0101 0000 0101 0000 0101 0000 0101 0000 0000 0000 0000 0101 0000 0101 0101 0101 Migration 0101 0101 0101 0101 0101 0101 0101 0000 0101 0000 0101 • Supports Federated Live Migration and EMC Open Replicator for Symmetrix migration solutions All allocated, but unwritten space is reclaimed after zero detection check is performed on incoming data EMC CONFIDENTIAL—INTERNAL USE ONLY. 63 10 Gigabit Ethernet Support Storage infrastructure to enable and accelerate data center network convergence • Hot pluggable I/O modules to easily intermix and upgrade connectivity • Supports 10 Gigabit Ethernet for iSCSI and EMC SRDF replication EMC CONFIDENTIAL—INTERNAL USE ONLY. 64 Enginuity Performance Enhancements Software optimization improves performance for large-block sequential I/O • Accelerates data warehousing/ business intelligence analytics • Faster EMC TimeFinder/Clone and VLUN with less application impact 2X Gb/s • Enabler for FAST VP sub-LUN relocations Enginuity 5874 Enginuity 5875 • New and existing Symmetrix VMAX systems with Enginuity Up 5875to two-times more I/O bandwidth EMC CONFIDENTIAL—INTERNAL USE ONLY. 65 VMAX and vSphere Recommended Practices EMC CONFIDENTIAL—INTERNAL USE ONLY. 66 VMAX FA Flag Settings for vSphere • SPC-2 • SCSI 3 (Optional) No effect on ESX anymore. • Unique WWN (UWN) • Common Serial Number (C) • OS2007 (Optional) Screenshot from within VirtualCenter using the VSI4 EMC CONFIDENTIAL—INTERNAL USE ONLY. 67 Connectivity Considerations with VMAX • VMware ESX Servers should have multiple physical HBA • VMware Servers should be connected to multiple directors – Directors 7 and 8 in single engine configurations – Connections to different directors in different engines in multiple engine configuration • Connect each HBA to a minimum of two ports on different directors – Not a requirement but strongly recommended – I/O intensive workload will benefit – Servicing of the array is less impacting EMC CONFIDENTIAL—INTERNAL USE ONLY. 68 Connectivity Considerations with VMAX− Cont. Ideal Minimum Configuration HBA1 HBA2 EMC CONFIDENTIAL—INTERNAL USE ONLY. HBA1 HBA2 VMware vSphere Servers 69 Connectivity Considerations with VMAX− Cont. HBA1 HBA2 EMC CONFIDENTIAL—INTERNAL USE ONLY. HBA1 HBA2 VMware vSphere Servers 70 Path Management with VMAX • PowerPath/VE is strongly recommended for vSphere environment – Avoid POC that do not represent real environments • NMP policy is available with vSphere – Use Round Robin policy for Symmetrix arrays • esxcli nmp satp setdefaultpsp -P VMW_PSP_RR -s VMW_SATP_SYMM – May need additional tuning. Depends on workload EMC CONFIDENTIAL—INTERNAL USE ONLY. 71 Using the VSI to configure Multipathing policy EMC CONFIDENTIAL—INTERNAL USE ONLY. 72 VMAX FA Configuration for SPC-2 • Turned on per Fibre Channel port or per initiator • Do not activate in a live system if not previously set • Default from 5773 (DMX-4) EMC CONFIDENTIAL—INTERNAL USE ONLY. 73 Performance and Storage Layout – vSphere with VMAX • Physical Disk Size and Protection – Depends on the IO characteristics of the workload • Do not present SAN storage to ESX server farm as one large SCSI disk • LUN Layout – Avoid using same set of disks for applications with different I/O characteristics • Use Virtual Provisioning – Always provides optimal balance in VMware environments • Configuration for I/O intensive application data – Follow best practices recommendations for a physical server EMC CONFIDENTIAL—INTERNAL USE ONLY. 74 Partition Alignment (VMFS and Guest OS) • Intel-based systems are misaligned due to metadata written by the BIOS to handle LBA to CHS translation – Partition Misalignment affects VMFS and Guest OS partitions • Host-based Partition Utilities can be used to Align Partitions: – For Linux and VMFS Alignment use fdisk • Offset partition to 64 KB boundary • Aligned VMFS partitions are now automatically created by vSphere Client – For Windows Operating Systems (2003 in particular) use the diskpart utility • Create partition aligned on 64 KB boundary • Use diskpar for versions of pre-Windows 2003 System at SP1 – Earlier versions of diskpart will show partitions as aligned, even if they are not • For Metavolumes (MetaLUNs) only the base device needs to be aligned EMC CONFIDENTIAL—INTERNAL USE ONLY. 75 Effects of Partition Misalignment • Symmetrix uses either 32 or 64K track size • In an Aligned System, the 64 KB write would be serviced by a single drive • File-system misalignment affects performance in two ways: – Misalignment causes disk crossings: I/O broken across two drives – Misalignment causes stripe crossings: I/O broken across stripe elements • Even if disk operations are buffered by cache, there is performance impact EMC CONFIDENTIAL—INTERNAL USE ONLY. 76 VMAX Virtual Provisioning in VMware vSphere Environments • vSphere provides native thin provisioning – Either one can be used – Both features can be used but increases risk • VMAX Virtual Provisioning simplifies drive and DA workload distribution – Provides additional benefits besides optimizing storage use – Ensure enough paths and TDEVs to support the workload • VMAX Virtual Provisioning provides additional benefits – Zero Reclaim and Rebalancing EMC CONFIDENTIAL—INTERNAL USE ONLY. 77 VMAX Virtual Provisioning for vSphere– Performance Considerations • RAID protection of data devices – Balance between performance versus resiliency • Fully allocate Virtually Provisioned devices if – Applications sensitive to latency – The risk of oversubscription is too high • Optimum performance when IOs are track aligned – VMware File System is aligned on 64 KB boundary – Virtual disks should be aligned • Including boot volumes EMC CONFIDENTIAL—INTERNAL USE ONLY. 78 VMAX Virtual Provisioning for vSphere– Performance Considerations – Cont. • Striped versus Concatenated thin metavolumes – Depends on type of workload • Small block versus large block • Random versus sequential • Reads versus writes – Influenced by presence or absence of SRDF – Concatenated thin metavolumes can be grown • Frequently exploited feature in VMware environments • Striped metas can be grown as of 5875 and SE 7.2 • Most VMware environments have small block random read workload – Beware of customer tests that do not represent reality EMC CONFIDENTIAL—INTERNAL USE ONLY. 79 VMAX Zero Space Reclamation • Reclaims thin pool storage by deallocating unnecessary track groups – Scans each track group and discards those containing all zeros – Deallocated tracks are presented as all zeros by Symmetrix to host Thin Pool 0000000000000000 100110010001111 • Primary use is post migration from “thick” to “thin” – Migration performed using TimeFinder/Clone or Open Replicator for Symmetrix • Reclamation should be run prior to configuring any replication relationships – Thin devices in active TimeFinder or SRDF relationships will be skipped EMC CONFIDENTIAL—INTERNAL USE ONLY. 80 VMAX Zero Space Reclamation – Cont. • Very useful tool in VMware environments – Relevant if customer upgraded to vSphere VMware Thin Zeroedthick EMC CONFIDENTIAL—INTERNAL USE ONLY. Eagerzeroedthick 81 VMAX Virtual Provisioning Automated Pool Rebalancing • Rebalances allocated tracks across data devices contained within thin pool • Levels out imbalances caused by thin pool expansion – Or unbinding thin devices from the thin pool • Scheduled process that runs at given intervals Thin Pool – User defines imbalance as a percentage utilization difference within the pool (user configurable 1% to 50%) • In VMware environments, storage requirements can increase rapidly – Mass VM deployment (VDI, testing environments, etc…) • Virtual environments are very dynamic – Adding datastores, removing datastores • Automated Pool Rebalancing maintains performance and gives best TCO EMC CONFIDENTIAL—INTERNAL USE ONLY. 82 VMware vSphere and FAST • FAST currently operates at the sub-LUN level – Great value in vSphere environments – RDMs, dedicated datastores • Considerations are the same as that for physical servers • Configure a single standard size of device on all tiers – Increases probability of like-sized devices being available to perform swap • Meta devices are moved/swapped as a complete entity • For optimal system performance use Optimizer in concert with FAST – Optimizer will balance load within a tier • Utilize EMC Virtual Storage Integrator to identify the Storage Type EMC CONFIDENTIAL—INTERNAL USE ONLY. 83 Summary • EMC VMAX is an ideal platform for the private cloud • EMC VMAX provides highly available and scalable platform for virtualized datacenters • Future evolution of the platforms will support the virtualized data centers of the future EMC CONFIDENTIAL—INTERNAL USE ONLY. 84 Q&A EMC CONFIDENTIAL—INTERNAL USE ONLY. 85 THANK YOU EMC CONFIDENTIAL—INTERNAL USE ONLY. 86
© Copyright 2024