IBM SONAS Best Practices


Book Description

As IBM® Scale Out Network Attached Storage (SONAS) is adopted, it is important to provide information about planning, installation, and daily administration. This IBM Redbooks® publication also describes leading tuning practices information gained by those who implement and support SONAS. These preferred practices are based on hands-on experience from the field. Monitoring of the SONAS system is included. This IBM Redbooks publication provides information about IBM SONAS features and function at the 1.5.1 level. This book is the companion to the IBM SONAS Implementation Guide, SG24-7962 IBM Redbooks publication. It is intended for readers who have implemented SONAS and are responsible for daily administration and monitoring.




IBM SONAS Implementation Guide


Book Description

IBM® Scale Out Network Attached Storage (SONAS) is a scale out network-attached storage offering that is designed to manage vast repositories of information in enterprise environments that require large capacities, high levels of performance, and high availability. SONAS provides a range of reliable, scalable storage solutions for various storage requirements. These capabilities are achieved by using network access protocols such as Network File System (NFS), Common Internet File System (CIFS), Hypertext Transfer Protocol Secure (HTTPS), File Transfer Protocol (FTP), and Secure Copy Protocol (SCP). Using built-in RAID technologies, all data is well-protected with options to add more protection through mirroring, replication, snapshots, and backup. These storage systems are also characterized by simple management interfaces that make installation, administration, and troubleshooting uncomplicated and straightforward. This IBM Redbooks® publication is the companion to IBM SONAS Best Practices, SG24-8051. It is intended for storage administrators who have ordered their SONAS solution and are ready to install, customize, and use it. It provides backup and availability scenarios information about configuration and troubleshooting. This book applies to IBM SONAS Version 1.5.5. It is useful for earlier releases of IBM SONAS as well.




SONAS Implementation and Best Practices Guide


Book Description

IBM® Scale Out Network Attached Storage (SONAS) is a Scale Out NAS offering designed to manage vast repositories of information in enterprise environments requiring very large capacities, high levels of performance, and high availability. The IBM SONAS appliance provides a range of reliable, scalable storage solutions for a variety of storage requirements. These capabilities are achieved by using network access protocols such as NFS, CIFS, HTTPS, FTP, and SCP. Using built-in RAID technologies, all data is well protected with options to add additional protection through mirroring, replication, snapshots, and backup. These storage systems are also characterized by simple management interfaces that make their installation, administration, and troubleshooting uncomplicated and straightforward. This IBM Redbooks® publication is the companion to the IBM Redbooks publication, SONAS Concepts, Architecture, and Planning Guide, SG24-7963. It is intended for storage administrators who have ordered their SONAS solution and are ready to install, customize, and use it. A quick start scenario takes you through common SONAS administration tasks to familiarize you with the SONAS system through the GUI and CLI. Backup and availability scenarios as well as best practices for setting up and troubleshooting hints and tips are included.




IBM Scale Out Network Attached Storage Implementation Guide


Book Description

This book is the companion to IBM SONAS Best Practices, SG24-8051 and is intended for storage administrators who have ordered their SONAS solution and are ready to install, customize, and use it. It provides backup and availability scenarios information about configuration and troubleshooting. IBM Scale Out Network Attached Storage (SONAS) is a scale out network-attached storage offering that is designed to manage vast repositories of information in enterprise environments that require large capacities, high levels of performance, and high availability. It provides a range of reliable, scalable storage solutions for various storage requirements. These capabilities are achieved by using network access protocols such as Network File System (NFS), Common Internet File System (CIFS), Hypertext Transfer Protocol Secure (HTTPS), File Transfer Protocol (FTP), and Secure Copy Protocol (SCP). --




IBM System Storage DS5000 Series Implementation and Best Practices Guide


Book Description

This IBM® Redbooks® publication represents a compilation of best practices for deploying and configuring the IBM System Storage® DS5000 Series family of products. This book is intended for IBM technical professionals, Business Partners, and customers responsible for the planning, deployment, and maintenance of the IBM System Storage DS5000 Series family of products. We realize that setting up DS5000 Storage Servers can be a complex task. There is no single configuration that will be satisfactory for every application or situation. First, we provide a conceptual framework for understanding the hardware in a Storage Area Network. Then, we offer our guidelines, hints, and tips for the physical installation, cabling, and zoning, using the Storage Manager setup tasks. Next, we provide a quick guide to help you install and configure the DS5000 using best practices. After that, we turn our attention to the performance and tuning of various components and features, including numerous guidelines. We look at performance implications for various application products such as IBM DB2®, Oracle, IBM Tivoli® Storage Manager, Microsoft SQL server, and in particular, Microsoft Exchange server. Then we review the various tools available to simulate workloads and to measure, collect, and analyze performance data. We also consider the IBM AIX® environment, including IBM High Availability Cluster Multiprocessing (HACMPTM) and IBM General Parallel File System (GPFSTM). This edition of the book also includes guidelines for managing and using the DS5000 with the IBM System Storage SAN Volume Controller (SVC) and IBM Storwize® V7000.




Fabric Resiliency and Best Practices for IBM c-type Products


Book Description

This IBM Redpaper publication describes best practices for deploying and using advanced Cisco NX-OS features to identify, monitor, and protect Fibre Channel (FC) Storage Area Networks (SANs) from problematic devices and media behavior. The paper focuses on the IBM c-type SAN switches with firmware Cisco MDS NX-OS Release 8.4(2a).




SAN and Fabric Resiliency Best Practices for IBM b-type Products


Book Description

This IBM® Redpaper® publication describes best practices for deploying and using advanced Broadcom Fabric Operating System (FOS) features to identify, monitor, and protect Fibre Channel (FC) SANs from problematic devices and media behavior. Note that this paper primarily focuses on the FOS command options and features that are available since version 8.2 with some coverage of new features that were introduced in 9.0. This paper covers the following recent changes: SANnav Fabric Performance Impact Notification




IBM ProtecTIER Implementation and Best Practices Guide


Book Description

This IBM® Redbooks® publication provides best practice guidance for planning, installing, configuring, and employing the IBM TS7600 ProtecTIER® family of products. It provides the latest best practices for the practical application of ProtecTIER Software Version 3.4. This latest release introduces the new ProtecTIER Enterprise Edition TS7650G DD6 model high performance server. This book also includes information about the revolutionary and patented IBM HyperFactor® deduplication engine, along with other data storage efficiency techniques, such as compression and defragmentation. The IBM System Storage® TS7650G ProtecTIER Deduplication Gateway and the IBM System Storage TS7620 ProtecTIER Deduplication Appliance Express are disk-based data storage systems: The Virtual Tape Library (VTL) interface is the foundation of ProtecTIER and emulates traditional automated tape libraries. For your existing ProtecTIER solution, this guide provides best practices and suggestions to boost the performance and the effectiveness of data deduplication with regards to your application platforms for your VTL and FSI (systems prior to version 3.4). When you build a ProtecTIER data deduplication environment, this guide can help IT architects and solution designers plan for the best option and scenario for data deduplication for their environments. This book can help you optimize your deduplication ratio, while reducing the hardware, power and cooling, and management costs. This Redbooks publication provides expertise that was gained from an IBM ProtecTIER System Client Technical Specialist (CTS), Development, and Quality Assurance teams. This planning should be done by the Sales Representative or IBM Business Partner, with the help of an IBM System CTS or IBM Solution Architect.




IBM Platform Computing Solutions Reference Architectures and Best Practices


Book Description

This IBM® Redbooks® publication demonstrates and documents that the combination of IBM System x®, IBM GPFSTM, IBM GPFS-FPO, IBM Platform Symphony®, IBM Platform HPC, IBM Platform LSF®, IBM Platform Cluster Manager Standard Edition, and IBM Platform Cluster Manager Advanced Edition deliver significant value to clients in need of cost-effective, highly scalable, and robust solutions. IBM depth of solutions can help the clients plan a foundation to face challenges in how to manage, maintain, enhance, and provision computing environments to, for example, analyze the growing volumes of data within their organizations. This IBM Redbooks publication addresses topics to educate, reiterate, confirm, and strengthen the widely held opinion of IBM Platform Computing as the systems software platform of choice within an IBM System x environment for deploying and managing environments that help clients solve challenging technical and business problems. This IBM Redbooks publication addresses topics to that help answer customer's complex challenge requirements to manage, maintain, and analyze the growing volumes of data within their organizations and provide expert-level documentation to transfer the how-to-skills to the worldwide support teams. This IBM Redbooks publication is targeted toward technical professionals (consultants, technical support staff, IT Architects, and IT Specialists) who are responsible for delivering cost-effective computing solutions that help optimize business results, product development, and scientific discoveries.




SAN Boot Implementation and Best Practices Guide for IBM System Storage


Book Description

Booting servers from a storage area network (SAN) is being used increasingly in complex data center environments today, due to its significant benefits over the traditional method of booting from local disks. SAN Boot enables organizations to maximize consolidation of their IT resources, minimize their equipment costs, and realize the considerable management benefits of centralizing the boot process. In SAN Boot, you can deploy diskless servers in an environment where the boot disk is located on (often RAID-capable) storage connected to the SAN. The server (initiator) communicates with the storage device (target) through the SAN using the Fibre Channel host bus adapter (HBA). The system downtime is greatly minimized in case a critical component such as a processor, memory, or host bus adapter fails and needs to be replaced. The system administrator needs to swap only the hardware and reconfigure the HBA's BIOS, switch zoning, and host-port definitions on the storage server. The system image still exists on the logical drive, therefore the server is fully operational after the hardware swap and configuration change is completed. This IBM® Redbooks® publication can help you with the SAN Boot implementation. We present various SAN Boot scenarios using IBM System Storage® products that include DS5000, DS8000®, XIV®, and SVC. The operating systems that are covered include Windows 2008, Red Hat Linux, SUSE Linux, and VMware.