American Megatrends, Inc. All trademarks and trade names used in this document refer to either the entities claiming the marks and names or their products. American Megatrends, Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
Step One: Power your system on ....................2 Step Two: Get the IP address ...................... 2 Step Three: Connecting to the StorTrends storage appliance from another system ....3 Step Four: Logging on to the StorTrends storage appliance ............4 ...
Page 4
Control Panel : Network Settings : TCP/IP Settings Page ............. 46 Control Panel : Network Settings : TCP/IP Settings Page : DHCP or Static IP Address ..47 Control Panel : Network Settings : TCP/IP Settings Page : Create Teaming ......50 ...
Page 5
Step 4 : Assign a SAN Target ....................94 Step 5 : Enable the Port of the Target on the StorTrends storage appliance ......94 Step 6 : Enable iSNS on the StorTrends storage appliance (optional) ........94 ...
Page 6
Storage : Continuous Data Protection (CDP) : CDP Window to access the Retrospect window ..........................114 Storage : Continuous Data Protection (CDP) : Retrospect Window ........115 Storage : Continuous Data Protection (CDP) : Scrolling Snapshots ........115 ...
Page 7
Attach a Keyboard, Monitor and External USB CD-ROM Drive ........... 179 Fully Boot into ManageTrends ..................... 179 Insert the StorTrends iTX Installation CD (with the build you want to upgrade to) ....180 Upgrade Procedure (using the Command Line Interface) ........... 180 ...
Page 8
Create Journal Assisted Replication (JAR) ................227 Appendix F Setting up DHCP from the Console Interface ..........235 Logging on from the Console Interface ..................235 viii StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
Page 9
Figure 3: Effect of Latency and Losses in TCP ..............258 Figure 4: Effect of Latency and Losses in StorTrends Transfer Protocol ......258 WDS in StorTrends iTX: Compression and Data Deduplication for WAN Asynchronous Replication ..........................259 ...
Page 10
Target ......................... 275 IS-NIC ........................... 275 iSNS ............................. 275 ISP ............................275 Journaling ..........................275 LAN ............................275 Mail Server ........................... 276 StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
Page 11
Notification ..........................277 NTP ............................277 Open ............................. 277 OSI ............................278 OSI Layer 3 .......................... 278 Packet ........................... 278 Parameters ........................... 278 Protocol ..........................278 Proxy Server ......................... 278 ...
Page 12
WAN ............................. 287 WDS ............................. 287 WINS ............................ 287 WWN ............................ 287 XFS ............................287 Index ............................288 StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
Limited Warranty The buyer agrees that if this product proves to be defective, American Megatrends is only obligated to repair or replace this product at American Megatrends’ discretion according to the terms and conditions of the warranty registration card that accompanies this product.
Once the StorTrends storage appliance is fully operational, you will see the following screen. Write down the IP Address listed in the “Ip Address” field. If you have both NICs connected to your network, there will be two IP Addresses.
Step Three: Connecting to the StorTrends storage appliance from another system Type the IP Address of the StorTrends storage appliance that you just wrote down into your Internet Browser. Chapter One : Storage Appliance Configuration...
Both the user name and password are case sensitive. StorTrends iTX has a built in feature that logs you out in the event that it detects no activity for 20 minutes and will display a message that states, “Your session has expired.”...
StorTrends storage appliance to send emails through it. If you click Cancel, you will be prompted with a warning dialog box that states, “You have opted to cancel the E-Mail alert configuration. E-Mail alert configuration has to be enabled to receive notifications on disk failures, volume events, System and Hardware events.
Page 20
Critical/Fatal Check this box to trigger an email notification to be sent whenever a critical or fatal event is recorded. A Critical or Fatal event can be an event such as a hard disk drive failure. Apply button To save changes, left click the Apply button.
Use the following instructions as a basis. Note: The Quick and Easy Setup Wizard will select all the physical hard disk drives present in the StorTrends iTX StorTrends storage appliance to create the RAID array. SAN and NAS volume names are automatically generated. A default NAS Share is also automatically created.
RAID 1 • RAID 5 This step will create a Logical disk and a storage pool from all the physical hard disk drives available in the system/controller with the RAID type you specify. Note: Once you select Next, you cannot come back to this step.
Step Three: SAN or NAS or Both Once an array has been created in the box, you can select how you want to use your StorTrends storage appliance. You are provided with the following options: • Only SAN • Only NAS •...
Note: You can use the slider bar to adjust the size of each Volume type. If you have selected Only NAS or Only SAN, then you will only be able to adjust the slider for that type of Volume. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
Note: You can change the default names for volumes and containers at this point. Also note that uppercase characters are not allowed in target names. Additionally, if you are planning to use the snap-assisted replication feature, uppercase characters should be avoided in both the container and volume names.
Page 26
Do not close the window or click anywhere else until the operation completes. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
Step Six: All Done No Errors STOP! YOU SHOULD NOW BE UP AND RUNNING. ALL THE OTHER SECTIONS CAN BE SKIPPED. Chapter One : Storage Appliance Configuration...
Step One: Advanced Wizard If the storage has not been configured on your StorTrends storage appliance, you will be prompted to run the Wizard. Click the Advanced option and then click Next. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
Step Two: Create a New Storage Pool Select Create new storage pool and then click Next. Note: Your StorTrends storage appliance may or may not have the exact same hardware RAID controller card as the one in the screen capture. Chapter One : Storage Appliance Configuration...
Step Three: Select Pool Select the Disks Select the Disks that you want to use in your Storage Pool. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
Click the Next button to continue. You will be prompted to wait while it configures the box. Do not close the window or click anywhere else. Chapter One : Storage Appliance Configuration...
Step Four: Configure SAN Volume STOP! This section allows you to configure a SAN Volume and a SAN Target on to the StorTrends storage appliance. If you have configured this StorTrends storage appliance as a NAS Only unit, SKIP THIS STEP and go to Step Five: Configure NAS Volume.
Name must be alphanumeric, not have any spaces and be between one and 63 characters in length. Enter Volume Size In the Enter Volume Size field, enter the size that you want to use for your SAN Volume. The field is measured in Gigabytes GB. Chapter One : Storage Appliance Configuration...
For example, if the storage device has an actual physical size of 500 GB, the user can assign a size of up to 256 TB per box. Based on the consumption of the storage device’s physical capacity, more physical drive capacity can be added later as desired.
Select SAN as the Dialect Type. Create Target and Target Name Place a check next to the Create New Target field. Enter a name for your Target. The Target Name must be alphanumeric, not have any spaces and be between one and 63 characters in length.
Step Five: Configure NAS Volume STOP! This section allows you to configure a NAS Volume and a NAS Share on to the StorTrends storage appliance. If you only want to configure this StorTrends storage appliance as a SAN Only unit, SKIP THIS STEP by clicking the Finish button and go to Step Six: Summary View and Status.
For example, if the storage device has an actual physical size of 500 GB, the user can assign a size of up to 256 TB per box. Based on the consumption of the storage device’s physical capacity, more physical drive capacity can be added later as desired.
Create Share and Share Name Place a check next to Create New Share if you wish to create a NAS Share at this time, otherwise click the Add button and continue on to the next step. If you want to create a NAS Share now, in the Share Name field, enter a unique name for your NAS Share.
When you are finished adding your Volumes, click the Finish button. A summary will appear. Your StorTrends storage appliance will be automatically configured based on the values that you have entered. Do not close the window or click anywhere else until the operation completes. Chapter One : Storage Appliance Configuration...
Step Seven: All Done No Errors STOP! YOU SHOULD NOW BE UP AND RUNNING. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
Connecting to the StorTrends storage appliance from another system Type the IP Address of the StorTrends storage appliance into your Internet Browser. (Microsoft Internet Explorer 6.0 Service Pack 1 and Mozilla Firefox 1.5.04 or later are supported) Chapter Two : Managing the StorTrends Storage Appliance...
Logging on to the StorTrends storage appliance You will be prompted to provide a username and password before you can gain access to it. Enter your username and password. Default user name: itxadmin Default password: password Note: When you login using the default itxadmin password, you have full administrative powers.
ManageTrends Hardware Health Information On the top bar there is a health icon. Click on the Hardware Heath icon to view the Hardware Health Information screen. This page displays all information relevant to the hardware health of your StorTrends storage appliance. Here you can view the current status of the system’s fans, temperatures and motherboard voltages.
ManageTrends provides you with capacity growth trends. This allows you to plan for additional storage purchases ahead of time. At the heart of StorTrends stack is a very powerful SRM module that takes care of Trending, Analysis and Reporting.
XML aware application. For example, Microsoft Office Excel program. Save as Text button This button allows you to export the event log as a plain text file so that you can view it in a standard word processor application.
Status of the StorTrends storage appliance and of many of its individual components. Date and Time The Date and Time Settings page displays the Time Zone, Server Date, Server Time, NTP Configuration, and NTP server information. This page also has a Synchronize With Local System button.
The System Information page also displays the System Name, Version Number, Build Date, Manufacturer, System Uptime, System Date and System Time information. This page also lists the IP and MAC Addresses (always 2 minimum) of the StorTrends storage appliance.
Type your network’s NTP server’s FQDN or IP address into this field. Synchronize with Use this button to set the StorTrends storage appliance’s time to be the same as that of the Local System button system being used to access the StorTrends storage appliance.
Control Panel : System : Information Icon : Update StorTrends iTX software Page The Update StorTrends software page allows you to upgrade the StorTrends software. This page displays input boxes for the FTP Address, Path, Username and Password. Field/Item Description FTP Address Type your FTP server name or IP address into this field.
Control Panel : System : Information Icon : System Control Page This page allows you to shutdown or reboot your StorTrends storage appliance. Select the appropriate button. You also have the option to allow the StorTrends storage appliance to shutdown automatically on critically high temperatures.
This field displays the remaining minutes of power. Mode This field allows you to select the mode for the system that you are connecting to the UPS. For example, the Master system is the system that is connected directly to the UPS via serial cable or USB cable.
Control Panel : Themes Allows you to use different color configurations for the GUI. Control Panel : Themes : Red Control Panel : Themes : Olive Green Chapter Two : Managing the StorTrends Storage Appliance...
Control Panel : Themes : Blue Note: You must clear the cache on your Internet browser in order to see the new theme. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
Community Name. Default community name is public. Firewall The Firewall Settings: Allowed/Blocked Sites page allows you to Add, Delete and Modify allowed or blocked sites. This page allows you to input the Start IP, Start Port, Protocol, Subnet Mask and End Port. File Protocols The File Protocols page allows you to pick from Windows, Unix, Apple or HTTP/FTP protocols.
MTU by comparing MTUs and selecting the smaller of the two. Interface Link Status This field allows you to see the link status of the network adapters. The link can be either UP or DOWN. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
Bad Packets Received This field reports the number of bad packets received. In other words, a bad frame that was marked as an error by PHY. Control Panel : Network Settings : Network Statistics Page : Transmission Details...
(Receiver ring buff overflows errors) CRC Errors CRC stands for Cyclic Redundancy Check. A CRC can be used in the same way as a checksum to detect accidental alteration of data during transmission or storage. CRCs are...
Failure to do so may indicate that the link has failed or that the PHY has an incorrect link configuration. This register only increments if transmits are enabled. This register is not valid in internal SerDes1 mode (TBI mode for the 82544GC/EI) and is only valid when the Ethernet controller is operating at full duplex.
Control Panel : Network Settings : TCP/IP Settings Page Use this page to view or update the TCP/IP settings for the network interfaces on the StorTrends storage appliance. Simply select the network interface from the dropdown menu that you want to configure or view.
Control Panel : Network Settings : TCP/IP Settings Page : DHCP or Static IP Address DHCP or Static Description Obtain IP and DNS By default the TCP/IP setting is set to obtain an IP Address and DNS server address from Server Addresses a DHCP server. Automatically...
Page 62
This dropdown menu allows you to select the NIC to configure (if applicable). Interface dropdown menu Obtain IP and DNS By default the TCP/IP setting is set to obtain an IP Address and DNS server address from Server Addresses a DHCP server. Automatically...
Page 63
Press the <ENTER> key to continue. This field must have an entry and cannot be left blank. If you do not have a primary DNS installed on your network, enter 0.0.0.0 for the value of this field.
Balance TLB (Transmit Load Balance) Note: Whether you choose NIC-1 or NIC-2 as the primary NIC, the IP address of the network team will be that previously assigned to NIC-1. Control Panel : Network Settings : TCP/IP Settings Page : Create Teaming : Balance Round Robin This option transmits packets in sequential order from the first available slave-NIC in the team through the last.
Community Name Enter the community name that your network uses. A community name is a secret identity based on plain-text that is used to authenticate queries to agents of managed network devices. A read-only community name allows systems to gather statistics from your SNMP device. The most commonly used community name is public.
IP addresses to block or allow. You can also specify which ports and protocol to block or allow. By default the Blocked Sites page is displayed. If it is not, left click the Blocked Sites link to enter a range of IP addresses that you want to block.
Page 67
Left click the Trusted Sites link to enter a range of IP addresses that you want to always allow. Field/Item Description Start IP Address This field allows you to enter the start address of the subnet you want to either block or always allow.
Control Panel : Network Settings : Firewall Settings Page : Modifying You can edit any of the IP address ranges by selecting the IP address range from the main Firewall window. You can enter your adjustments and left clicking on the Modify button for the changes to take effect.
Microsoft CIFS is a proposed standard protocol that allows programs to make requests for files and services on remote systems running Microsoft Windows operating systems on the Internet. Note: If you navigate away from the Set Windows File Protocol page or it did not appear first, click the Windows link. Field/Item Description WINS Address Type the WINS server’s IP address into this field.
Disable Windows File Server Protocol (CIFS) If you want to change the settings, you must disable CIFS first. To disable the Windows File Server Protocol (CIFS), left click the Disable button. Enable Windows File Server Protocol (CIFS) Complete all the fields and then, to enable the Windows File Server Protocol (CIFS), left click the Enable button.
Control Panel : Network Settings : File Protocols Settings Page : Set Network File System (NFS) Protocol Page To access the Set Network File System (NFS) Protocol page, click the NFS link. Field/Item Description Enable Set Network File Left click this box to enable NFS.
Control Panel : Network Settings : File Protocols Settings Page : Set Apple File Protocol Page To access the Set Apple File Protocol page, click the Apple link. Field/Item Description Enable Apple File Left click this box to enable AFP.
Control Panel : Network Settings : File Protocols Settings Page : Set HTTP/FTP File Protocol Page To access the Set HTTP/FTP File Protocol page, click the HTTP/FTP link. Field/Item Description Enable HTTP Sharing Left click this box to enable HTTP sharing.
Secondary Server Name/IP, Organizational Unit, Admin Name and Admin Password. The NIS Settings page allows you to Enable NIS and to Add or Remove to or from the IP Address List. This page displays the Domain Name, IP Address List.
This button allows you to remove a user. Properties button This button allows you to view and edit the properties of a user. For example, you can change the password and/or change the Full Name of the user. You will not be able to change the User Name (Login Name).
Full permissions to local access. If you do not have a specific group or do not want to add this user to a group, simply skip that step. Type in a password for the user and then confirm it by typing it in again in the Confirm Password field.
Removing a User To delete a user, highlight their name and click the Remove button. After you confirm that you really want to remove the user, the list will refresh and a message will appear stating that the “User successfully deleted.”...
Control Panel : Users and Groups Settings : Groups List Page The Groups List page displays the Total Number of Groups, the Group Name, Group ID and the Type. This page allows you to Create New groups and Remove groups. This page also allows you to change Group Properties.
To create a new group, simply click the Create New button. The Create New Group page opens. It is very intuitive and easy to use. Simply, type in a Group Name (one word). Select the user(s) you want to be a part of the Group.
Removing a Group To delete a Group, highlight the Group Name and click the Remove button. After you confirm that you really want to remove the Group, the list will refresh and a message will appear stating that the “Group successfully deleted.”...
Control Panel : Users and Groups Settings : ADS Settings Page The ADS Settings page allows you to Enable ADS. This page has fields for the Workgroup/Domain Name, Pre-Windows 2000 Domain Name, Primary Server Name/IP, Secondary Server Name/IP, Organizational Unit, Admin Name and Admin Password.
Page 82
Description Server Name/IP Type the Host Name or IP Address of the Active Directory Services server into this field. Select if the Host Name or IP Address is that of an Active Directory, Microsoft Windows NT 4.0 Domain or Workgroup.
Below become editable when this option is selected. IP Address Type the IP address for the NIS server in the system and left click the Add to the List button. IP Address List The IP address for each NIS server in the system that you have entered is listed in this field.
Icon Description ISNS The ISNS Setting page allows you to enable/disable the ISNS service and set an alias name. This page also allows you to configure support for Multiple ISNS servers. Portals The iSCSI- Portal Settings page allows you to Enable iSCSI Service and the Portal(s).
This field displays the Alias name. This is configurable. ISNS Server IP field This field allows you to enter the IP address of an ISNS server that you want to add to the ISNS server IP list, thereby registering the StorTrends iTX server appliance with that server.
This is a list of the system’s ports with their accompanying Port, Target IP Address, section Portal Tag and Status information. You can click on a port to enable or disable it. You can also modify the Portal Tag value (you must disable the portal before changing its tag).
This field allows you to set the immediate data value option. The default value for this field is Yes. Initial R2T field This field allows you to set the initial R2T value option. The default value for this field is Apply button Use this button to save changes and make the changes active.
The Target Statistics page displays the Device Statistics and the Error Statistics. Field/Item Description Device Statistics This list contains sent and received statistical information for SCSI payload, iSCSI PDUs, and iSCSI PDU bytes. Error Statistics This list contains count statistical information for failed login attempts, failed sessions, failed header digest sessions, and failed format error sessions.
The iSCSI Session Management page displays the Session List. Field/Item Description Session List This list allows you to view active sessions. It also allows you to terminate any of the listed sessions. Terminate button Use this button to terminate a selected session.
The Bi-directional Authentication page displays the Initiators List gathered from those iSNS servers that this box has registered with or you can enter the name of an iSCSI initiator or username and password, manually if you are not using iSNS.
SNMP Traps The SNMP Alert Settings page allows you to Enable SNMP Alert Notifications. This page also allows you to input the Community Name, Target IP. This page allows you to select the alert types which are to trigger SNMP notifications.
Critical/Fatal box Check this box to trigger an SNMP alert notification to be sent whenever a critical or fatal event is recorded. A Critical or Fatal event can be an event such as a hard disk drive failure. Apply button To save changes, left click the Apply button.
Critical/Fatal Check this box to trigger an email notification to be sent whenever a critical or fatal event is recorded. A Critical or Fatal event can be an event such as a hard disk drive failure. Apply button To save changes, left click the Apply button.
Control Panel : License Settings Icon Description Update License The License Information page allows you to view/update the license for the StorTrends storage appliance. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
After your changes have been processed by an AMI Support Representative, you’ll receive a new license key in the form of a text document. After you save the new key to a location on your hard drive, use the Browse button to navigate to the location of that file, and then simply select the Update License button to complete the process.
RAID Management Allows you to configure RAID arrays using Software RAID or supported H/W RAID controllers. Physical Disks Management The Physical Disks Management page displays all physical disks attached to the RAID controller. Note: Click the Rescan button to refresh the information on this screen.
This field displays whether or not the physical disk is being used as a Global Spare. In Use This field displays if the physical disk is available or is being used as part of a Volume. Status This field displays the status of the physical disk. The physical disk status can be in any of...
Slot Index This field displays the slot index number of the physical disk. Disk Type This field displays the type of physical disk is being used, such as SCSI, IDE, SATA and so on. Spare Type This field displays the type of spare that the physical disk is being used as (global, distributed or dedicated).
RAID Level This field displays the type of RAID array of the Logical Disk. Status This field displays the status of the physical disk. The physical disk status can be in any of the following states: Initializing The Logical Disk is being initialized.
RAID Level This field displays the type of RAID array of the Logical Disk. Logical Device Status This field displays the status of the physical disk. The physical disk status can be in any of the following states: Initializing The Logical Disk is being initialized.
Page 101
Physical Disks This field displays all the physical disks involved in this Logical Disk. The physical Port Involved location of the physical disk on the Controller and on which Controller it is attached to is displayed. Blink Disk button Clicking on this button will cause the physical disks involved in this LD to blink.
Select this option to transform the Logical Disk from one raid level to another. Name This field displays the name of the Logical Device name. Status This field displays the status of the logical disk. The disk can be in any of the following states: Initializing The Logical Disk is being initialized.
Page 103
Field Description RAID Level This field displays the type of RAID array of the Logical Disk. If you are transforming the Logical Disk, you can modify the RAID Level. Organized as This field displays how the Logical Disk is organized.
The iSCSI protocol increases the capabilities and performance of storage data transmissions. Because of the wide use of IP networks, iSCSI can be used to transmit data over LANs, WANs, or the Internet and can enable location-independent data storage and retrieval.
Zoning allows the administrator to limit access to storage nodes to certain initiators only. This is to help minimize risk of file system corruption. Initiators will only be able to see the iSCSI targets and the LUNs/Targets on StorTrends storage appliances registered to this iSNS server that belongs to the same DD (also known as Zone).
Select the type of Cache you want to use for the RAID array in the Cache Option drop down menu. Use the drop down menu in this step to select the cache level (such as Read, Read/Write, Write Back, or No Cache).
1 or more Logical Disks. Click on the Create Storage Pool link. In the Enter Storage Pool Name field, select a LD from the list, and then enter a name for your Storage Pool. The Storage Pool Name must be alphanumeric, not have any spaces and be between one and 63 characters in length.
SAN Target. Click on the iSCSI icon located under the Control Panel node. Select the Portals icon. Select the IP Address of the port that you want to Enable, enter a new portal tag if desired, click on the Enable Portal checkbox, and left click the Apply button.
Description From the application server, open the Microsoft Initiator application. Left click the Available Targets or Targets tab and left click the Refresh button. The Target appears in the Select a Target field. Chapter Two : Managing the StorTrends Storage Appliance...
Page 110
Step Description Select the Target that you want to log on to. Notice that the Status of the Target is Inactive. Left click the Log On button. Note: If the Target does not appear in the list, try the following: •...
Page 111
If you are using a different initiator (list of supported initiators is available from AMI), then the procedure will differ according to that particular software/hardware’s specifications. The procedure to log on will also differ if you are using selective access to the LUN, for example, CHAP or persistent targets option.
Open Disk Management from the Computer Management utility in your Microsoft Windows operating system hosting your initiator software. The Target is listed as one of the local disks and can be initialized and formatted as if it were a local hard disk drive.
For example, if the storage device has an actual physical size of 500 GB, the user can assign a virtual size of up to 256 TB. Based on the consumption of the storage device’s physical capacity, more physical drive capacity can then be added later.
63 characters in length. Type a description of the NAS Share in the Description field. This step is optional. In the Folder Path field, type in the path you want to share. You can also Browse to the desired Volume or Folder.
This is typically accomplished by splitting a mirrored set of disks or creating a copy of a disk block when it is written, preserving the original. At restore time, the original is made available immediately, resulting in almost instantaneous restores.
Physical Capacity This field displays the physical size of the Storage Pool in GB. Add Logical Disk Click on this button if you wish to expand your container by adding one or more existing Logical Disks to it. Logical Disks Name This field displays the name of the Storage Pool.
Storage : SAN Volume Management This page appears if you click on any existing Pool and then on an existing SAN Volume. This page displays SAN Volume information and Target information. It also allows you to Delete or Expand Volumes, schedule snapshots and disable/enable advanced caching.
The Snapshot Timescape window will appear. Here you can cycle through the available Snapshot. Click the Review link to display the Target Information of the Snapshot so that you can configure your initiator and review its contents. Once you click the Review link, the Snapshot Target Information will display in the lower left corner of the window.
Storage : SAN Snapshot Management This page appears if you click on any existing Pool and then on an existing SAN Volume and Snapshot Node. This page displays a list of all the snapshots of the selected Volume. Field/Button Description Snapshot Name This field displays the name of the Snapshot.
Time Addressable Storage (TAS) as well as Event Addressable Storage (EAS). So all volumes / volume groups that have been enabled for Journaling will be available for CDP. Besides, the CDP UI provides a way to consistently review and recover volumes of a Consistency group.
Note: The list of CGs / Volumes pertains only to the currently selected container. If you want to perform a CDP on a different CG / Volume, you need to go back and select the corresponding container. Chapter Two : Managing the StorTrends Storage Appliance 107...
For example, if the user chooses a journal file and data is not available in the selected time zone but snapshots are present, then it will take the user to Retrospect.
& rollback process. The user can choose a point or event in time, review the data and rollback if satisfied. It also allows the user to control the review at the IO level. Apart from time, the Flashback interface also has an alternate view called the Event View.
The Main Control Panel displays the snapshot (1), event (2) and time (3) controls. The Time control increments the time by a default value of 1 sec. This time step can be changed from the Time Step Control Panel. The number of IO’s to be performed can also be specified in this panel.
Storage : Continuous Data Protection (CDP) : Snapshot based sliding This screen shows an example of using the Snapshot Control. Pressing the left and right button moves the slider from one snapshot to another. Storage : Continuous Data Protection (CDP) : Time based sliding This screen shows sliding using Time Control.
Another view for this window is the Event View, which is revealed by clicking on Event View on the left corner of the Flashback window. The CDP utility makes a note of three different types of events taking place in the system: (a) Snapshots (b) Application events and (c) Windows events.
Storage : Continuous Data Protection (CDP) : Event Description This view enables the user to choose an event to review and rollback. We can switch between the Log and Event Views by clicking on the appropriate button on the left-hand corner of the window.
Storage : Continuous Data Protection (CDP) : Completion of Review When a review is successfully completed, a writeable image of the volume at the given time instant is provided for review. If a CG is being reviewed, a single target with all consistent volumes as LUN is created.
Each flying window represents a consistent snap group taken across all the volumes of the CG. For a SAN CG, this is achieved using the VSS Scheduler and for a NAS CG, the NAS scheduler does the job. The scroll buttons can be used to access any snapshot.
Storage : Continuous Data Protection (CDP) : Reviewing Snapshots Once the review process is completed, a writeable image of the volume is created and appears on the bottom left corner of the window and the status changes to ‘Ready for Review’.
Note: You can also set default storage allocations for all new users by placing a check in the box next to “Set default quota for new users” and entering the size of the storage quota in MBs. Chapter Two : Managing the StorTrends Storage Appliance 117...
This section allows you to modify the share access for the different types of clients. Folder/Volume Simply place a check next to the clients that you want this folder to be shared for. Click on Apply Storage : NAS Share Management : Security Settings This page allows you to control the permissions for individual users accessing the share.
Storage : Target Management To view a list of all targets for this iTX device, click on the Targets header in the navigation tree, under Storage. This page displays a list of targets that are available on this StorTrends storage appliance, along with their connection and status information.
The term, replication, is used in this document to describe the process of maintaining a redundant storage area network (SAN) volume. Replication Feature Table This is a table that lists the options and limitations of each of the available Replication Types. Replication Type...
Synchronous Local SAN Volume Replication This illustration shows replication taking place on the same box. Chapter Two : Managing the StorTrends Storage Appliance 121...
Synchronous SAN Volume Replication using a Remote Box This illustration shows volume replication using two separate boxes. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
Navigate to the Replication link in the tree menu. The Create Replication Wizard opens. Select the IP Address of the Primary box. The Primary box is the system where the Volume that you want to replicate is located. Chapter Two : Managing the StorTrends Storage Appliance 123...
Page 138
If you have selected the Remote Replication option, you must enter the access information for the remote box. You can type the IP Address into the Enter Remote Server Address field or select it from the drop down menu next to the ‘or select remote server’ option.
Remote Host (such as the case when using DHCP), you can update the new IP Address by typing it into this field. In the case of a local replication pair (involving two volumes in the same local box, this column will show “local”.
Page 140
Button Description Join Joining allows you to join a split replication pair. Meaning that if you split a replication pair, this allows you to reestablish the connection between the local and remote StorTrends storage appliances. Split Splitting allows you to temporarily disconnect a replication pair. Splitting basically means that you are breaking the connection between the remote and local StorTrends storage appliances.
This section describes how to create a new Snap Assisted Replication (SAR) Pair using the Create Replication Wizard. Note: You must have Snapshots scheduled for the Volumes that are involved in the SAR pair before Snap Assisted Replication can function properly. Step Action Navigate to the Replication link in the tree menu.
Page 142
Select the Secondary Volume location from the drop down menu associated with the Volume that you have selected. If no Volume is configured on the Secondary box, you will have the option to have the wizard create a new Volume automatically. The wizard requires a couple of extra steps to create a new Volume.
Page 143
Skip this step if you are not configuring a SAN Volume replication onto a new Volume. This step is the same for configuring both a SAN Volume and NAS Volume, except that no Target Name is required for NAS Volumes and is therefore not displayed as an option.
Local Volume, Remote Volume, Remote Host, Role, Link Status and Pairs Table Synchronization Percent. Consistency Group This is the name of the group containing the 1 or more volumes that are part of replication name pairs that replicate at the same time. Local/Remote Pool This field displays the pair’s Local and Remote Storage Pools respectively.
Page 145
Button Description Join Joining allows you to join a split replication pair. Meaning that if you split a replication pair, this allows you to reestablish the connection between the local and remote StorTrends storage appliances. Split Splitting allows you to temporarily disconnect a replication pair. Splitting basically means that you are breaking the connection between the remote and local StorTrends storage appliances.
In the event of Node failure, the Failover action is automatic and seamless. When the Failed node comes up, it is detected by the stack and is synchronized quickly to bring back redundancy to the setup. Synchronization is very efficient and ensures that only out-of-sync data is resynced.
Page 147
Navigate to the Replication link in the tree menu. The Create Replication Wizard opens. Select the IP Address of the Primary box. The Primary box is the where the Volume that you want to replicate is located. Chapter Two : Managing the StorTrends Storage Appliance 133...
High Availability the remote server must be a separate box and must have the exact same specifications of the primary box. You must type the IP Address into the Enter Remote Server Address field or select it from the drop down menu next to the ‘or select remote server’ option.
Page 149
Button Description Join Joining allows you to join a split replication pair. Meaning that if you split a replication pair, this allows you to reestablish the connection between the local and remote StorTrends storage appliances. Split Splitting allows you to temporarily disconnect a replication pair. Splitting basically means that you are breaking the connection between the remote and local StorTrends storage appliances.
Remote Host (such as the case when using DHCP), you can update the new IP Address by typing it into this field. In the case of a local replication pair (involving two volumes in the same local box, this column will show “local”.
Enter credentials for the remote StorTrends storage appliance and click on Next. Once logged in, all suitable SAN Volumes on the remote StorTrends storage appliance will be shown if available. If none, you have the option to create a new volume in an existing or new storage pool.
This makes it very easy to extend SRM to cover a bigger and wider range of attributes without having to redesign it from scratch. The key kernel component is the data collection agent that interfaces with other modules to collect instantaneous data about all monitored resources.
StorTrends iTX, with its Thin-provisioning architecture, takes this headache out. Once the initial hurdle is crossed, the next big and persistent problem a storage administrator faces is to take an inventory of what is present today and predicting how much of growth is anticipated over the next few months, year or even beyond.
In-depth analysis of the instantaneous read and writes performance values. It gives the user information about the contributions of different I/O sizes towards the total I/O activity going on at the moment. The I/O sizes chosen are 512 byte, 4K, 8K and 64K reads or writes.
StorTrends, with Tiered Storage and three-level space mapping, ensures that snapshots are maintained in the most capacity-optimized manner. The next is to ensure that the so- called Recovery Images are indeed consistent and good.
According to research conducted by the TheInfoPro Group (TIP), the interest in ILM over the last 18 months has heated up. The TIP heat index for ILM, which was four (in order of priority) in Spring 2005, has moved to one by Spring of 2006.
A group of logical drives belonging to the same container but have the same costs. The cost is calculated based on the RAID level, type of drives and so on. A container may contain multiple tiers, and a tier may contain multiple LDs. The following diagram gives a pictorial description about the relationship between a Logical Drive, a Container and a Tier.
Page 158
Information Retention Regulations) to retain emails for an extended period will result in messages and data to be scattered all over the space with various degrees of importance. The relevance of emails and corresponding references to them sharply tapers off with the passage of time.
Texas Public Information Act How StorTrends Tiered Storage and ILM Works At the core of StorTrends iTX stack is a data collection and trending module that collects and categorizes both instantaneous and historical access patterns that can span years. Storage blocks are also cataloged with respect to their RAID levels, class of disk drives (SAS, SATA and so on) and rotational speed (15K RPM, 10K RPM, 7200 RPM and so on).
Page 160
Having chosen the right block to move out and the appropriate time to do so, the StorTrends iTX stack utilizes a very efficient algorithm to perform the migration. The Data Mover technology (that works by advertisement of blocks) ensures that data blocks are migrated without corruption in the fastest possible time.
This will result in multiple Logical Drives (LDs) in the same tier and data has to be striped across them. There can also be restrictions given by the RAID card in the number of disk that can be added to one LD (maximum expansion support per LD). Some RAID cards may have restrictions on creating arrays across enclosures.
When should the data When the I/O load on the system is low. The reason for this is to not affect the bandwidth be re-striped? of the applications running above it. The method of predicting the I/O load on the system at given point in time is done by the workflow analysis.
SAN volume so the bottom line lies on the x-axis). The user can use the sliding window in the top chart to get a more detailed view in the bottom chart of how the space was consumed over a period of time. The size of the sliding window is also adjustable by the user.
The green colored line in the chart indicates the read performance and the blue colored line in the chart indicated the write performance. This chart has a sliding window that can be dragged and adjusted for viewing detailed information for a particular period of time.
The IO Performance chart displays the IO performance of the volume selected. In the chart above, the volume is undergoing more 64 K read and writes compared to other segments. For instantaneous performance readings, the values are polled in five-second interval.
I/Os indicate a potentially failing drive. There is a tool tip at the end of the line defining the LD and when the last sampling of data occurred. In the event that two or more drives have the same values, their tool tips will overlap.
System Performance System performance is tracked in the form of instantaneous CPU and Memory Utilization. These values are also polled on a 5-second interval. Above is the graph showing the CPU and Memory Utilization as a percentage Chapter Two : Managing the StorTrends Storage Appliance 153...
Information Lifecycle Management The chart above show the access patterns of the data and how they are spread across the tiers. The chart above shows the Random Access patterns of data. The ideal situation would be for the most frequently accessed data (red) be present in the high cost tier (yellow background) and least accessed data (blue) present in the low cost tier (white background).
Container Space Management The above charts show how a container was before expansion and below, how it is after expansion and re-striping. The x-axis represents the Logical Drives and the y-axis represents the Storage space used in each logical drive.
I/O is expedited because several hard disk drives can be accessed simultaneously. RAID systems improve data storage reliability and fault tolerance compared to single hard disk drive systems. Data loss due to a hard disk drive failure can be prevented by regenerating missing data from the remaining data and parity information stored on other hard disk drives in the volume.
8 KB to 512 KB. For example, in a four hard disk drive system using only disk striping (as in RAID level 0), segment one is written to hard disk drive one, segment two is written to hard disk drive two, and so on.
Not all RAID levels mentioned in this document are supported by your StorTrends 2200. See the Intel (made by LSI Logic) RAID Software User’s Guide that shipped with your StorTrends 2200 for more information on what hardware RAID levels are supported.
RAID level. RAID 0 breaks up data into smaller blocks and then writes a block to each hard disk drive in the volume. The size of each block is determined by the stripe size parameter, set during the creation of the RAID set.
Use RAID 6 for data that requires a high-level of protection from loss. In the case of a failure of one drive or two drives in a virtual disk, the RAID controller uses the parity blocks to recreate the missing information. If two drives in a RAID 6 virtual disk fail, two drive rebuilds are required, one for each drive.
10 breaks up data into smaller blocks, and then stripes the blocks of data to each RAID 1 raid set. Each RAID 1 raid set then duplicates its data to its other drive. The size of each block is determined by the stripe size parameter, which is set during the creation of the RAID set.
Use RAID 60 for data that requires a very high-level of protection from loss. In the case of a failure of one drive or two drives in a RAID set in a virtual disk, the RAID controller uses the parity blocks to recreate all the missing information. If two drives in a RAID 6 set in a RAID 60 virtual disk fail, two drive rebuilds are required, one for each drive.
Page 180
StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
Configure at least one local user (make sure password is 12 characters long min.) and a Volume with iSCSI support. Create a LUN and assign to a Target. Enable that Target. In Security page for the iSCSI LUN, give that User permission to the Share by selecting that User and clicking on Apply.
Configure at least one local user (minimum of 12 characters in password) and a Volume with iSCSI support. Create a LUN and assign to a target. Enable that. Register your iSCSI Initiator with the iSNS server. To do so, enter the IP address of the server into the iSNS Servers tab of the MS Initiator applet.
THIS GUIDE DOES NOT DESCRIBE HOW TO INSTALL CPU, MEMORY, HARD DISK DRIVES OR OTHER HARDWARE COMPONENTS. SEE THE STORTRENDS® 2200 USER’S GUIDE FOR MORE INFORMATION. YOU MUST HAVE AT LEAST ONE NOTEBOOK HARD DISK DRIVE INSTALLED IN YOUR STORTRENDS® 2200. STORTRENDS ITX WILL ATTEMPT TO INSTALL ITSELF ONTO THE INTERNAL NOTEBOOK HARD DISK DRIVE(S) IN YOUR STORTRENDS®...
APPLIANCE WILL BE ERASED. THIS INCLUDES ALL USER RIGHTS, TARGET INFORMATION, NAS SHARES AND SO ON. Use the steps outlined in this manual to re-install the StorTrends iTX 2.7 software into your StorTrends storage appliance. This process is fast and should take less than 30 minutes.
Attach a keyboard, monitor and external USB CD-ROM drive to your StorTrends 2200 (See the StorTrends 2200 Set Up Guide folded sheet for more information). Power on your StorTrends 2200 and insert the StorTrends iTX Installation CD into the external USB CD-ROM drive.
Once you have attached a keyboard, monitor and external USB CD-ROM Drive, power on your StorTrends 2200. You need to enter the Aptio Setup Utility (AMIBIOS) to boot off the StorTrends iTX Installation CD. Your StorTrends 2200 takes approximately one and a half minutes to get to the screen that prompts you to enter SETUP.
Page 187
Step Description If performed successfully, you should see the Aptio Setup Utility screen. If not, you have to reset the power on your StorTrends 2200 and start over. Aptio Setup Utility - Copyright (C) 2005-2007 American Megatrends, Inc. Main Advanced...
Page 188
Step Description If performed successfully, you should see the Welcome to AMI StorTrends ITX screen. If not, you have to reset the power on your StorTrends 2200 and start over. Press the <ENTER> to continue. American Megatrends Inc ---------------------------------- Welcome to AMI Stortrends ITX.
Page 189
The StorTrends iTX installation begins, but before it proceeds, it will prompt you with a message depending on how many notebook hard disk drives you have installed. Your StorTrends 2200 has a dedicated bay for up to two notebook hard disk drives used to hold the operating system.
Page 190
The StorTrends iTX installation takes approximately 30 minutes. You will see various screens throughout the installation. At times there will be a long period where you will see a blank screen. However, do not try to do anything. Leave the system alone until the StorTrends iTX Installation CD ejects and you see the screen where it tells you that the installation is complete.
Appendix D Upgrade Procedure STOP! Currently, Upgrading from all versions of StorTrends other than StorTrends 2.7.XXXX is not supported. StorTrends iTX X.X Upgrade Current StorTrends ITX Version is X.X.XXXX. No need to upgrade. Enter OK to exit. < OK >...
Logout of all your iSCSI connections and disconnect all NAS shares. The upgrade process reboots your system. Copy the upgrade file(s) that you have received into an FTP folder. If you do not have an FTP server handy, please refer to the section, Using StorTrends as an FTP Server. If the upgrade file is compressed, you must uncompress it first.
CD, follow the instructions outlined in this section. The following instructions are provided as an example to such an installation procedure. It also requires that you be in front of the actual StorTrends storage appliance that you are attempting to upgrade.
Insert the StorTrends iTX Installation CD (with the build you want to upgrade to) Insert the StorTrends iTX Installation CD into the CD-ROM drive when you see the AMI StorTrends Console Interface. AMI StorTrends Console Interface System Info : Host Name...
Page 195
Kernel X.X.X-X.XXXXXX on an XXXX XXXXXXXXXXXXXXX login: _ Log in as root. Type root as your user name and press the <ENTER> key. Next, type in your password and press the <ENTER> key. The default password is password. If you changed your admin password, use the admin password.
Page 196
At the prompt type the following command followed by the <ENTER> key: mkdir /mnt/source AMI XXX (StorTrends) Kernel X.X.X-X.XXXXXX on an XXXX XXXXXXXXXXXXXXX login: root Password: [root@ITXXXXXXXXXXXXX ~]# mkdir /mnt/source [root@ITXXXXXXXXXXXXX ~]# _ StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
Page 197
Step Description Type the following command followed by the <ENTER> key: mount /dev/scd0 /mnt/source AMI XXX (StorTrends) Kernel X.X.X-X.XXXXXX on an XXXX XXXXXXXXXXXXXXX login: root Password: [root@ITXXXXXXXXXXXXX ~]# mkdir /mnt/source [root@ITXXXXXXXXXXXXX ~]# mount /dev/scd0 /mnt/source mount: block device /dev/scd0 is write-protected, mounting read-only...
Page 198
[root@ITXXXXXXXXXXXXX ~]# sh /mnt/source/upgrade/upgrade.sh Note: In this example, the path on the CD is UPGRADE. The file name is UPGRADE.SH, which is located in the UPGRADE directory. The StorTrends Upgrade console interface will appear. Press the <ENTER> key to proceed.
Page 199
Step Description A warning message will appear stating that you should back up before proceeding. Press the <ENTER> key to proceed or escape out to backup first. StorTrends iTX X.X Upgrade As a precautionary measure, please backup the data before upgrade.
Page 200
Step Description Once it is finished, press the <ENTER> key. The CD will eject automatically. If it does not, eject the CD. StorTrends iTX X.X Upgrade Upgrade Complete Upgrade to X.X is successful. Reboot the machine. < OK> At the prompt type the following commands followed by the <ENTER> key:...
Check whether you have space to create a 5GB NAS volume. If you already have a NAS volume, you can use that instead. If you do not have enough space or do not have a pre- existing NAS volume, you need to use an external FTP server.
Page 202
StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
The Solution: Remote Replication High Availability with Synchronous Replication Various factors have to be considered while architecting a DR solution. Service Level Agreements (SLA) along with tolerable Recovery Point Objective (RPO) and Recovery Time Objective (RTO) are the key factors influencing the planning.
Remote Replication essentially comes in two flavors. Synchronous Replication Here the recovery site moves lockstep with the production site and offers best RPO. But it is very costly to implement. Distance is a challenge for Synchronous Replication. Beyond tens of miles, the delays and latencies incurred renders the solution impractical.
StorTrends offers the ultimate in flexibility and performance when it comes to disaster recovery and business continuance. Remote Synchronous Replication is implemented on the target stack. This imposes no burden on the application servers and is transparent to the SAN initiators. Setting up a complete mirror-recovery site requires just a few clicks of the mouse and in seconds the entire production server storage configuration is duplicated on the recovery site storage server.
StorTrends servers offer a very innovative and feature-rich periodic replication suite called Snap-Assisted-Replication (SAR). This form of replication is used where Service Level Agreement (SLA) permits the administrator to have a relaxation in Recovery Point Objective (RPO) and Business economics does not permit synchronous replication.
The snapshots in the secondary are essential to provide recovery points. In the event of a failover, the active volume in the secondary cannot be used as it may have some snapshot data that is NOT fully consistent. On a failover to secondary system, the StorTrends iTX will automatically rollback to the latest available snapshot in the secondary.
This temporary share configuration will be merged with the original configuration during a Failover. The User database is handled in a different way. If ADS / NIS users are used in the primary system, then administrator is requested to configure the secondary system also with the same ADS / NIS configurations.
An Overview of Journal Assisted Replication (JAR) JAR uses Journaling method by staging the data in a rolling log and is thereby is more tolerant to link speed disparities or communication outages. Every I/O has to be replicated out in the same sequence it arrives at the Production site in order to ensure application consistency.
Once JAR is enabled and is in action, it faithfully replicates every incoming I/O to the recovery site allowing a continuous spectrum of recovery points. However, if there is a big disparity between the incoming and outgoing rates, then the Journal size increases and eventually a situation may arrive when the journal will overflow and the replication cannot proceed.
Step Action The first step involves logging in to the primary node’s ManageTrends and going to the replication tab. It is assumed here that the primary volume and targets have already been created; also the primary portal must have been activated. Select “Remote Replication” as the replication type Specify the secondary nodes IP address, user name and the password in this screen and click next.
Page 212
(or) a new volume can be created as shown below. In order to proceed to the next step based on the options selected, click next.
Page 213
Step Action If a new volume creation option has been selected, the new container and new volume have to be configured. Creation of Remote Container Creation of Remote Volume and Target Appendix E : Replication Overview 199...
Finally the summary screen is shown. Upon clicking the finish button the replication pairs are created one by one. Please allow a few seconds for the replication pairs to be created and the screen to refresh itself with the replication pairs.
Synchronous Replication and High Availability Pair Details Synchronous Replication Details High Availability Pair Details Appendix E : Replication Overview 201...
Synchronous Replication and High Availability pair deletion The deletion of replication pair is done by clicking on the delete button in the primary node. This button is disabled by default in the secondary node. In case the replication pair has become disconnected and there is a need to delete the replication, CLI delete command must be used with the force flag enabled.
ManageTrends on CLI command. The following screenshot shows the result of a split operation. The connection mode “Manual” refers to a split replication pair. It can also be seen that the capacity out-of-sync is non-zero now, as compared to the previous screenshot.
Join Operation and Resync Progress Join operation is clicking on the join button in the primary node of a split replication pair. Once this is done the replication resumes and the out-of-sync percentage starts going down till it becomes fully in-sync and out-of-sync percentage becomes zero.
Failover Operation Failover operation is done by clicking on the failover button in the original secondary node. Once the failover completes the replication role in the original secondary becomes primary. Synchronous Replication Failover – Before Failover in Original Secondary Synchronous Replication Failover – After Failover in Original Secondary...
Success. Failback Operation Failback operation is done by clicking on the failback button in the original primary node. Once the failback completes the replication role in the original primary node becomes primary from secondary. Synchronous Replication Failback – Before Failback in Original Primary...
Synchronous Replication Failback – After Failback in Original Primary CLI Command for Failback Operations of Synchronous Replication Pairs A sample CLI command for failback operation of Synchronous replication pair is shown below: [root@ITX0030488657ee ~]# cli perform -t failback -l Storage1_SecReplSANVolume1 syncreplica Success.
The first step involves logging in to the ManageTrends of the primary node and going to the replication tab in the tree view. It is assumed here that the primary volume and targets have already been created, and the primary portal has been activated. Now specify the secondary node IP address, user name and the password in this screen and click next.
Page 225
Step Action The next step gives the user an option to either select the existing Storage Pool or creates a new Storage Pool for the replication. Click next to proceed further. The next step involves creation of the volumes and volume targets on the secondary side. The user also has the option to specify the provision type i.e.
Page 226
Enable encryption or compression based on user requirement. For compression, select the compression level (1- 9). This page shows the summary of the replication pairs and its parameters for the user to confirm before actual creation of the replication pair. Click finish to create the replication pair.
Action To configure the schedule for replication, click on the “Edit” button shown in the following figure. Continue to set the schedule either for a specific time and day. The default schedule is [All the time – Everyday]. After selecting the required parameters, Click on “Add Schedule” to persist it.
SAR – Deleting the Schedule Step Action To remove an existing schedule, select the schedule from the schedule information box. Click on “Remove Schedule”. Appendix E : Replication Overview 215...
Failover Operation Go to the SAR page in the secondary box and click on the “Failover” button. After this, the Role in the Secondary changes to Primary. Note: Failover should be always done only in the original secondary box. Before Failover Operation in Secondary Box...
Failback Join Operation Go to the SAR page in the acting primary (original secondary) box and click on the “Failback Join” button. After this the Role in the original Primary box changes to secondary. Note: Failback Join operation can be done only in the acting primary (original secondary) box.
After Failback Join Operation in Primary (Original Secondary) Box. After Failback Join Operation in Secondary (Original Primary) Box. After Failback Join operation both the boxes again becomes ready for replication. Now the replication happens from the original secondary to the original primary.
Failback Operation Go to the SAR page in the secondary (Original Primary) box and click on the “Failback” button. Note: Failback should be always done only in the original primary box. Before Failback Operation in Secondary (Original Primary) Box. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
After Failback Operation in Primary (Original Secondary) Box. Deleting the SAR pair The user can delete the SAR pair by clicking the “Delete” button. Deletion of SAR pair StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
CLI: A Journal can be created using ITX 2.7 CLI interface. For example: cli create -t journal -j journal0 -l /dev/sdc journal Where –j option is the Journal name and –l option is for LD name. –l option can be repeated for as many LDs for a Journal.
Page 238
In Create Journal Page, one or more LDs have to be selected. Enter a name for Journal and proceed to creation. Once a Journal is created, a separate node will be created under ‘Storage/Journal’. Select this node to manage this Journal. Used space and Available space can be seen here.
Creating a Journal File Journal File is always associated with a Consistency Group. It means, Journal File is associated with one or more volumes for which Journaling will be perform on this Journal File. Appendix E : Replication Overview 225...
Page 240
For example: cli create -t journal –f journalfile0 –c StoragePool1 –v privol0 –v privol1 –z 10 -j journal0 journal Where, –f option is for Journal File name, -c option is for container name, -v option is for volume name and –j option is for Journal name. –v option can be repeated for as many volumes for a Journal File.
Primary volume by a time last snapshot is created in Primary Volume. In JAR, since replication happened by the same order at which IOs happened to Primary volume, even the last IO replicated to Secondary is valid. JAR does not need a closing snapshot in secondary in order to access Secondary volume.
Page 242
In next page, A) select replication type as ‘Journal Assisted’. B) Select Journal File from the list C) Select all volumes associated with the Journal File. Note that JAR does not replicate NAS volume. It can replicate only a SAN volume.
Page 243
Remote Storage Pool and volume can be either already existing or can be created now freshly. Note the Journal File in remote is not required. Edit default parameters for remote volume as shown below and continue. Appendix E : Replication Overview 229...
Page 244
‘Maximum Snapshot per volume’. Give a name for this JAR in ‘Consistency group name’ field. Review the desired configuration in the last page and select ‘Finish’ to proceed to JAR creation as shown below. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
Page 245
Once the affected region is replicated through DVM snapshot, it will try to fallback on Journal File. When a CG rollback happens, all IOs in journal may be invalidated. In such cases, it will rely on snapshot.
Page 246
When JAR is in ‘Snapshot mode’, it will check journal file upon completion of each snapshot based replication to see whether it can fall back to Journal based replication. Journal based replication can be done only when a snapshot event is exists (in Journal File) for a completed snapshot.
Make sure it is plugged into the back of the chassis. Also make sure that it is a good cable. Check to make sure that your switch is properly configured (if it is a manageable switch).
Console Interface The main menu is the first screen that you see when you log into the Console Interface of your StorTrends iTX StorTrends storage appliance. Navigate to the section you want to view or configure. Keyboard Key Function <ARROW UP>...
NIC-1 NetworkInterface-1 NIC-2 NetworkInterface-2 < Cancel > < OK > This screen allows you to configure TCP/IP automatically via DHCP server or by specifying the addresses statically for the following: • IP address (Server) • Subnet Mask • Default Gateway •...
Configure NIC-x: DHCP ( X ) STATIC < Cancel > < OK > Highlight the DHCP option by navigating to it and press the <SPACE> bar to select it. TCP/IP Configuration Port NIC-x Configuration Mode STATIC IP Address 192.168.0.3 Subnet Mask 255.255.255.0...
“The license is unavailable/expired for both the SAN and NAS features. You need to upgrade to a valid license for at least one of the features in order to continue managing this server.”...
After your changes have been processed by an AMI Support Representative, you’ll receive a new license key in the form of a text document. After you save the new key to a location on your hard drive, use the Browse button to navigate to the location of that file, and then simply select the Update License button to complete the process.
Page 255
After your license has been processed by an AMI Support Representative, you will receive a License key in the form of a text document. After you save the new key to a location on your hard drive, use the Browse button to navigate to the location of that file, and then simply select the Update License button to complete the process.
Page 256
StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
The data in the write-back cache being not persistent, any power failure in the storage system will result in the loss of valuable data. In order to circumvent this problem the administrator must use a UPS to protect the system from abrupt power failures.
StorTrends box can be run on UPS. If either one of the condition is met the StorTrends boxes will execute a graceful shutdown, thereby preventing any potential data loss for the applications.
Configuring Slave Boxes The status of the UPS can also be monitored using the CLI. The following examples show how to use the CLI to find the type of UPS connected and monitor the status of it. Monitoring UPS through CLI...
Whenever the A/C power fails, the UPS takes over and the StorTrends boxes start running on the UPS. Depending on the type of the UPS and the load on it, it will start discharging and the amount of time and charge left in the UPS can be monitored using the ManageTrends.
The ManageTrends event log is also updated with this information the A/C power was turned off. The status of the UPS, whether it is running on A/C or battery and the amount of charge and time remaining in the UPS can be monitored using the ManageTrends or the CLI, as mentioned before.
2 04:16:57 2007): Executing automatic power-fail shutdown Broadcast message from root (Wed May 2 04:17:02 2007): The system is going down for system halt NOW! ManageTrends Event Log StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
Statistics show that data growth is almost doubling every year, yet the Recovery Time Objective (RTO) has remained the same, if not tighter. From the anatomy of data re-usage, it is clear that in overwhelming situations most recent data is recalled.
Today there are various implementations of CDP. A vast majority of vendors implement it on the Host that is serving as the File or Application Server. In Host based CDP, there is a filter driver or “Data-Tap” residing in the Host Operating Systems that replicates every I/O on the Production Server to the CDP Server.
Page 265
In a typical environment where an average of 10GB production data is changed or generated per hour, a journal file of 1TB can hold four days worth of continuous chronological data. In addition, with eight levels of scheduled snapshots and up to 2000 snapshots per volume StorTrends can deliver any historic data across a very wide time spectrum.
In contemporary CDP appliances, the write I/Os are replicated outside the appliance using some sort of data-tapping agents. This mirrored I/O is then (1) staged in a buffer in the appliance. The old data is (2) read from the recovery volume, time-stamped and (3) journaled out into a “undo”...
I/O latency. During a Review or Rollback operation, initially a rollback to a previous writable snapshot is done and then the redo Journal is played on top of it to the selected point in time. Under the hood: StorTrends iTX Installation CDT The Advanced Caching Module of iTX stack serves as the central repository of in-flight data.
StorTrends Continuous Data Protection architecture StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
(RTT) it incurs plays a very dominant role. A second major factor that adds additional challenges is the issue of packet loss. At such significant transport distances, packets can be dropped due to congestion or bit errors.
For example, using a single T1 connection, the maximum achievable rate is 1.55 mbps; for T3 it is 45 mbps; with OC3 it increases to 155 mbps, and with Gigabit Ethernet (GigE) links this maximum reaches the impressive order of Gigabits per second.
Figure 2: StorTrends Transfer Profile vs. TCP Transfer Profile Based on the data above, it is clear that for short distances, where latencies are in the sub- ms range (for example, in LAN environments), the throughput is dictated entirely by the link bandwidth.
As noted earlier, although the performance of the TCP stack can be tweaked, it is a fairly accurate generalization that TCP is more suitable for the LAN environment than it is in long-haul networks.
StorTrends iTX for WAN replication. Like many of its competitors, StorTrends employs delta-snapshot technology to transfer only the data that has changed between passes in order to reduce the amount of data transported. In addition to this, StorTrends also employs an intelligent data-dedupe algorithm to filter out some of the previously transmitted data from earlier passes.
I/Os make up the majority. For example, SQL servers generate random I/Os of 8K blocks, and Exchange servers generate random I/Os of 4K blocks, making it easy to see that even when chunk sized I/Os are replicated, they may carry multiple packets of duplicated data.
Additional WAN Assists in Asynchronous Replication with StorTrends In addition to the optimizations described above, StorTrends supports the compression and encryption of data before it is released on the WAN, which reduces the net size of data transferred over these more expensive links. StorTrends supports various compression depths, including an adaptive compression mode where the depth of compression is determined by an analysis of the current and statistical load on the system.
Page 276
I/Os and for synchronous replication operations, to greatly improve and increase data transfer speed, approaching the theoretical maximum of the connection speed. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
Access Control List. An ACL is a table that tells the system’s operating system the access rights each user has to a directory or file. The directory or file has a security attribute that identifies its access control list. The list has an entry for each system user with access privileges, such as read and write.
Archive The StorTrends iTX software uses this word to describe the process of backing up data stored on it to a safe place. Asynchronous Replication Asynchronous replication can minimize the performance impact and bandwidth requirements of synchronous replication by forgoing the need to write to the primary and secondary simultaneously.
No snapshot taken at a later time T1 will be replicated, until the prior snapshot taken at time T0 on all volumes are replicated and snapshots for time T0 on all volumes are replicated in the secondary. Similarly, on a failover to secondary, all volumes in the consistency group are rolled back to the same snap group there by maintaining application consistency across all the volumes.
Page 280
• If no matching snap groups present that is safe (out of disaster), then there is no way the replication can continue with given parameters. In such scenarios, the PASSIVE volume data will be wiped out and replication will start from the beginning.
Copy-On Write. In a Copy-On-Write (COW) implementation, snapshots protect the old data by copying it to a separate snapshot space when there is a new write that needs to overwrite it. After the old data has been copied to the new location, the data in the old location is overwritten with the new data.
In the event of a failover, the active volume in the secondary cannot be used as it may have some snapshot data that is not fully consistent. On a failover to secondary system, the StorTrends iTX will automatically rollback to the latest available snapshot in the secondary.
(LAN). Ethernet 802.2 Packet format that defines the standard for the data link layer. It is made up of two smaller layers called the logical link control (LLC) layer and the media access control (MAC) layer.
> < 38-1492 > Failover Failover is a process by which a PASSIVE system (B) is made as ACTIVE in the event of a irrecoverable failure of the ACTIVE system (A). During a Failover operation, the PASSIVE system (B) will rollback to the latest available snapshot – snap group across all volumes.
Fibre Channel over TCP/IP. FCIP is a TCP/IP-based tunneling protocol for connecting geographically distributed Fibre Channel SANs transparently to both Fibre Channel and Firewall A set of related programs, located at a network gateway server that protects the resources of a private network from users from other networks. Frame A frame is a single data packet that is transmitted across a network.
Group A group is a number of users that are bunched together. Having a group makes it easier to assign a set of rules that are common to a set of users. Common groups can be Accounting, Sales, Marketing, and so on.
The iSCSI protocol increases the capabilities and performance of storage data transmissions. Because of the wide use of IP networks, iSCSI can be used to transmit data over LANs, WANs, or the Internet and can enable location-independent data storage and retrieval.
(initiates) the transfer of information to and from an iSCSI target. iSCSI Name An iSCSI Name is used by the Initiator and Target for locating storage resource and storage resource allocation. The iSCSI Name also is used to identify which initiator has access to which target resource.
2.1 version release. Mirroring the StorTrends iTX OS is the ability to install the StorTrends iTX software on two hard disk drives. Basically, if one of the two boot hard disk drives fails, you still maintain the ability to boot to the StorTrends iTX operating system from the alternate hard disk drive.
Using NIS, each host, client or server in the system has knowledge about the entire system. A user at any host can get access to files or applications on any host in the network with a single user identification and password. It is intended for use on local area networks.
If the quota is set to zero, it means the user has unlimited storage access. If the quota is set to a particular size it means the user has only that much amount of storage at his/her access in that volume.
RAID level. RAID 0 breaks up data into smaller blocks and then writes a block to each hard disk drive in the volume. The size of each block is determined by the stripe size parameter, set during the creation of the RAID set.
A 6-drive array provides two striped three drive RAID 5 sets. Generally, RAID 50 is useful in very large arrays, arrays with 10 or more disks. Like the RAID 1n and RAID 10n array types, RAID 50 can handle multiple disk failures.
RAID 60 uses distributed parity, with two independent parity blocks per stripe in each RAID set, and disk striping. A RAID 60 virtual disk can survive the loss of two disks in each of the RAID 6 sets without losing data. It works best with data that requires high reliability, high request rates, high data transfers, and medium-to-large capacity.
As with Copy-on-Write snapshots, systems that implement Redirect-On-Write snapshots also need to maintain tables that contain a map of where old data and new data are stored. However, this mapping needs to be updated and referred to for volume reads in Redirect- on-Write, as opposed to merely for snapshot reads in Copy-on-Write.
Snap Assisted Replication is built on top of the advanced snapshot mechanism provided by the StorTrends iTX 2.1 / 2.5 stacks. In a Snap Assisted Replication environment a primary volume snapshot will be replicated to a volume in a secondary system. Since the snapshot is a frozen image and the snapshot data is sequentially replicated to the remote volume, the remote volume will not be consistent until the entire image is replicated.
SMB can be used over the Internet on top of its TCP/IP protocol or on top of other network protocols such as Internet Packet Exchange (IPX) and NetBEUI.
A part of the host address is reserved to identify the particular subnet. Switch A network device that selects a path or circuit for sending a unit of data to its next destination. Glossary 285...
In short, when an I/O is recorded, it is written simultaneously to both the primary and the secondary to ensure parity. The writing of the I/O to the primary is in essence blocked until the secondary is updated. In this way, volumes are protected from failure at the granularity of an I/O, since the primary and secondary sites are always perfectly synchronized with each other, as the name suggests.
It all depends on how you set up your Volumes. The controller treats one or more hard disk drives or unused space on a hard disk drive as a single array. A Volume provides the ability to concatenate storage from various hard disk drives regardless of the size of the space on those hard disk drives.
Page 303
TCP/IP Settings Page, 47 Control Panel Control Panel Themes Network Settings Olive Green, 39 TCP/IP Settings Page Control Panel DHCP or Static IP Address, 47 Themes, 40 Control Panel Control Panel Network Settings, 50 Themes Control Panel Blue, 40 Network Settings...
Page 304
Session Management Page, 75 Control Panel Control Panel Network Settings iSCSI, 76 File Protocols Settings Page Control Panel Set Apple File Protocol Page, 58 iSCSI Control Panel StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
Page 305
Delta snaps, 193 Figure 6 Delta Snaps, 268 Deduplication and WAN Transfer Acceleration Management in DHCP, 47, 48, 49, 125, 130, 134, 136, 235, 237, 238, StorTrends iTX, 260 Figure 7 Disable Windows File Server Protocol ManageTrends Replication (CIFS), 56...
Page 311
WDS in StorTrends iTX X Compression and Data Deduplication for WAN Asynchronous Replication, XFS, 287 What is iSCSI?, 90 Z WINS, 55, 287 Workflow Management, 141 Zoning, 91, 96 WWN, 287 Index 297...