+ All Categories
Home > Documents > Broadcast Zones

Broadcast Zones

Date post: 03-Apr-2018
Category:
Upload: raghurampola
View: 220 times
Download: 0 times
Share this document with a friend

of 55

Transcript
  • 7/29/2019 Broadcast Zones

    1/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    Broadcast zonesA broadcast zone behaves similarly to a VLAN that is created usinga protocol suchas the AppleTalk VLAN discussed previously. Since

    Fibre Channel can carry bothSCSI and IP traffic, you can create a

    zone that consists only of those HBAs that sup-port (or wish tocarry) IP traffic. However, unlike protocol-based VLANs thatcanautomatically add a server to a VLAN if its using a particular

    protocol, a broadcastzone is merely a functional classification.

    Current zoning technology doesnt sup-port automatically adding amember to a zone based on its protocol. A broadcastzone is merely asoft zone that contains the HBAs that communicate with a particu-lar

    protocol.

    Naming your zones

    Just as creating aliases for the ports on your switches and arrayshelps you identifythe m, usi ng an app rop riat e n ami ng

    conven tion for your zones can help too. You should pick a namethat reflects how the zones are being used. Two common nam-ingconventions are called

    server-centricand

  • 7/29/2019 Broadcast Zones

    2/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    storage-centric.

    Server-centricIf youve got a SAN that consists of many storage arrays connected to one

    server,the zone should be named after the server. This is referred toas a server-centriczone-naming convention.

    Storage-centricIf youve got one storage cabinet attached to many servers, name thezone afterthe storage cabine t . This is refe rred to as a s torage -centric zone -naming con -vention.

    LUN MaskingAlthough logical unit number (LUN) masking isnt technically atype of zoning, itdoes perform a similar function. It keeps differentservers from seeing or using eachothers storage on the SAN. However,

    before explaining how LUN masking and zon-ing are different, we mustdefine LUN masking. And before we do that, we must firstdefine a LUN.ALUN is a logical representation of a physical unit of storage and mayrepresent anyof the following: Physical disk Physical tape drive

  • 7/29/2019 Broadcast Zones

    3/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    Robotic control device Logical disk consisting of many physical disksstriped together Logical disk consisting of two mirrored stripes This is the Title of the Book, eMatter EditionCopyright 2011 OReilly & Associates, Inc. All rights reserved.

    52|C h apte r 3 : Manag i ng a S A N

    Each Fibre Channel storage array or tape library may have multiple ports that

    can beconnected to the SAN, each with its own WWN. The array will also beconfigured torepresent its storage as LUNs attached to these WWNs.Therefore, each array wil la pp ea r to t h e ho st s o n th e SA N a son e o r mo r e L U N s a t t a c hed t o o ne o r mor e WWNs.LUNmasking hides, or

    masks, LUNs s o that each s erver se es onl y the LUNs you want i t tosee. LUN masking is actually performed at a level just above

    zoning. Azone grants or restricts access only to a given

    porton a storage array, but LUN mask-in g can ta ke that port and grantone ser ver acc ess to som e of its LUNs and gra nt another server

    access to the rest of its LUNs.Su pp os e yo u hav e a si ng le -p ort edstorag e ar ray w ith a nu mber o f di sks, some of which you wantto use on one host and some you want to use on a second host.

    Inorder for this to work, you need to create a zone that gives both servers

  • 7/29/2019 Broadcast Zones

    4/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    access to thesto rage arr ay. Howe ver , not hin g prev ent s the firs tserver f rom using the second servers disks, which is what LUNmasking is for. LUN masking allows you to selec-tively present half the

    LUNs to the first server and half to the second server.Depending on which

    vendors you use, LUN masking can be performed on one of threelevels:

    Storage arrayA storage array can be configured to present certain LUNs to certain hosts.

    Oneway this is done is through offsets. Suppose a storage array has atotal of 100LUNs. Connected to that storage array via a switch are five

    hosts, and you wanteach host to see 20 of the 100 LUNs. Youconfigure the array so that LUNs 1through 20 are displayed to the first

    server, LUNs 21 through 40 are displayed tothe second server, and so on.

    The first server then sees LUNs 1 through 20 anddoesnt see LUNs 21through 100; they have been masked from its view.

    Intelligent bridges and routersIf you use a storage array that doesnt support LUN masking,

    another way toaccomplish it is to place an intelligent bridge orrouter between the servers andthe storage. Then follow steps similar tothe ones just described.

  • 7/29/2019 Broadcast Zones

    5/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    HBA driversLUN masking performed on the HBA level places the responsibility formaskingthe undesirable LUNs on the HBA driver itself. Although the HBAcan see all theLU Ns avai lab le on the SAN , y ou conf igur e the

    driver to mask the LUNs you dont want it to see. Once this hasbeen done, the driver presents to the operat-ing system only the LUNsyou want it to see.

    Designing Your SAN for

    AvailabilityOne issue with traditional parallel SCSI that can be solved by SANs is that ofhavinga single point of failure. Everyone knows that the failure of a single

    SCSI card, cable,This is the Title of the Book, eMatter EditionCopyright 2011 OReilly & Associates, Inc. All rights reserved.

    Access to Storage Resources|53

    or terminator can render your parallel-based SCSI devices useless.With SANs, youcan use multiple paths to ensure that no single

    device can do this. However, manypeople design their SANs just asthey design their parallel based SCSI systemsonepath to each

  • 7/29/2019 Broadcast Zones

    6/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    device. Consider the SAN depicted inFigure 3-3.In the figure, each serverhas only one path to each storage array and tape library.Each path hasat least 11 single points of failure, as shown by the numbered arrows:1.

    The servers HBA2.The Fibre Channel conductor from the server to the first switch3.

    The incoming GBIC on the first switch4.

    The first switch5.

    The outgoing GBIC on the first switch6.

    The Fibre Channel conductor from the first switch to the second switch7.The second switch8.

    The incoming GBIC on the second switch9.

    The outgoing GBIC on the second switch10.

    The Fibre Channel conductor from the second switch to the storage array11.

  • 7/29/2019 Broadcast Zones

    7/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    The controller on the storage arrayFigure3-3.Single points of fai lure in a s ingle fabric1234568791011

    This is the Title of the Book, eMatter EditionCopyright 2011 OReilly & Associates, Inc. All rights reserved.

    54|C h apte r 3 : Manag i ng a S A N

    Besides having 11 single points of failure, there are several pieces

    of equipment thatneed preventative maintenance at various times,such as firmware upgrades, driverupdates, and hardwarereplacement. The only way to do any of these things is totake down at

    least one systems storage. If the piece of equipment that needs mainte-nance is one of the switches, then several systems will be withoutstorage during theupgrade.You can create a SAN that has no

    single point s o f fa i lure and can be maintain ed without a serviceinterruption by designing a SAN that looks more like the one

    inFigure 3-4. You can see that every server has two completely

    separate paths to eachstorage resource, as depicted by Path A andPath B for the server on the left side of the drawing. If any piece of

    equipment along Path A fails or needs preventative main-tenance, Path Bwill take over immediately until that piece of equipment is

    returnedto full functionality.

    Multipathing

  • 7/29/2019 Broadcast Zones

    8/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    Once youve designed a SAN with multiple paths, you need sometype of softwarethat understands you have multiple paths and knowshow to use them. The reasonfor thi s is tha t dee p ins ide eve ry

    SAN is the SCSI protocol, and SCSI was neverdesigned with

    multiple paths in mind. This means you need a piece of software tositbetween the SAN and the operating system and present only one path tothe operat-ing system at any one time. This is the job of multipathingsoftware, and there areF i g u r e 3 - 4 . A m u l t i p a t h S A NPathAPathB

    This is the Title of the Book, eMatterEditionCopyright 2011 OReilly & Associates, Inc. All rights reserved.

    Access to Storage Resources|55

    dozens of such products now on the market. Here are a fewexamples in alphabeti-cal vendor order:Compaqs Secure Path

    EMCs Power Path Solaris 8 has native multipathing support

    Veritas Volume Manager has multipathing support Vicoms StorageVirtualization EngineMultipathing software actually performs two

    functions: automatic failover and loadbalancing.

    Automatic failoverPerhaps the most important job for multipathing software is toautomatically redis-tribute I/O to another channel in the case offabric failure. This should be done insuch a way that the operating

  • 7/29/2019 Broadcast Zones

    9/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    system never realizes there was an interruption in ser-vice. This, ofcourse, needs to be done within the limits of a SCSI timeout.

    Load balancingThe second important job multipathing software performs is

    dynamic load balanc-ing. Many administrators perform this taskmanually using

    staticload balancing.That is, they take an inventory of the various paths a

    particular server has to its SAN-at tached disks and then use thedif fere nt nam es of t he dis ks to bal anc e th e l oad between the

    various paths. Dynamic load balancing, however, can be done onlywithmultipathing software, because such software sends a given stream of

    data down theleast-used path. This allows you to fully utilize all paths when

    the SAN is completelyfunctional. Then, of course, if a given pathbecomes nonfunctional, there is simplyone less path for the load

    balancing software to use.

    Preventing thrashingWhat happens when a given path goes up and down multiple times?

    Without sometype of antithrashing setup, multipathing software might justgo a little crazy. Thereare a few different ways to keep the system from

  • 7/29/2019 Broadcast Zones

    10/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    thrashing in this manner. The first isto configure the software toreenable a previously fai led l ink only after a certainamount oftime. If the link goes back down while the software is waiting to

    reenableit, the clock starts over again. Another common method is to set up

    the SAN in sucha way that a failed link must be reenabled by anadministrator after she is convincedthat link is healthy again.This is the Title of the Book, eMatter EditionCopyright 2011 OReilly & Associates, Inc. All rights reserved.

    56|C h apte r 3 : Manag i ng a S A N

    Persistent BindingOnce zones and LUN masking have been set up , each server

    should see i ts s tor-ageand only its storage. Once this has beendone, one initial setup task remains.I t s al ready been ment ioned

    that on e of the i ssues wi th SANs is that serv ers can sometimeschange the SCSI address of a particular unit of SAN-based storage.

    Thisis particularly true if the configuration of the SAN changesbetween reboots. Again,this is caused by the assumptions the SCSIdrivers make about targets they see.The upper levels of all devicedrivers used in a SAN environment are designed forSCSI. The SCSII/O model assumes a small number of targets on a single bus and

  • 7/29/2019 Broadcast Zones

    11/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    asmall number of LUNs on each target. In order for SCSI addresses toremain perma-nent, they need to be bound to an address that doesntchange.As discussed inChapter 2, when a device logs into a fabric, its also

    assigned a sourceID (S_ ID) by the fab ric sw itc h. Whe n a devi ce

    connects to an arbitrated loop, itselects an arbitrated loop physicaladdress (AL_PA) during the initialization process.The S_ID and AL_PAare similar to IP addresses in a DHCP environment. Theyaredynamic, and so therefore shouldnt be used to generate SCSI

    addresses.The unchanging target address of a SAN-based storagedevice is the 64-bit WWN.Similar to the MAC address with Ethernetdevices, the WWN is a permanent num-ber as si gned to each po rt

    on a s torage array or an HBA on a server . However ,asmentioned previously, a SAN-connected RAID array may have

    hundreds of disksthat need to be individually addressed by servers.Therefore, the RAID controller cre-ates LUNs for each device. Each LUN

    has a corresponding WWN assigned, which isa subset of the masterWWN assigned to the RAID controller. These LUNs are usedb y th eoperat ing system as a SCSI address and mask the unde rlying

    use of RAIDtechnology.Binding is the process of associating theoperating systems controller, target, andLUN value to the WWN of

  • 7/29/2019 Broadcast Zones

    12/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    the LUN created on the RAID array controller. Bindingtakes place onthe device driver level; the unique WWN value is

    boundto an operat-ing-system controller-target value. When this bind i s

    persistent from boot to bootand across hardware changes and failures inthe SAN, its called a

    persis tentbind. Toestablish a persistent bind, the driver must save this association innonvolatile mem-ory or a configuration file.

    Ongoing

    MaintenanceOnce the SAN is installed, configured, and doing what you designed

    it to do, thingsget much better. Even so, theres still plenty of work to be

  • 7/29/2019 Broadcast Zones

    13/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    done. The rest of the workinvolves managing, monitoring, and maintainingthe storage.This is the Title of the Book, eMatter EditionCopyright 2011 OReilly & Associates, Inc. All rights reserved.

    Ongoing Maintenance|57

    Managing (StorageResource Management)Few SANs live on using their initial design. Even the one shown inFigure 3-4can beoutgrown with time. At some point, someone will want to change theSAN in order to:

    Increase or decrease the number of servers

    If a SAN is successful, it becomes popular. Everybody wants to put theirstorageon the SAN. This results in more HBAs, more ports, and moreswitches. Anothercommon occurrence in SANs is no different than parallel

    based SCSI: somebodygets the bright idea of consolidating servers.This, of course, changes the designof the SAN.

    Increase or decrease the number of storage arraysWhether youre adding more servers to the SAN or not, the need foraddi tionalstorage capacity will inevitably drive you to purchase more

  • 7/29/2019 Broadcast Zones

    14/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    storage. Will you buyadditional storage arrays of the size you areusing, or will you look at larger,more centralized storage arrays?Even if you dont grow your storage dramati -cal ly, what ab out

    central izing al l your s torage into one or more large

    s to ra ge arrays anyway? What affect will these changes have on thenumber of ports andswitches required for your SAN?

    Increase or decrease the number of switches, hubs, or routersThis change, of course, i s dr iven by the previous two

    ch an ge s. Whet he r yo u increase or decrease the number of serversor storage arrays, it will change thenumber of ports that you need.

    Will you buy additional switches and use inter-switch links, orISLs? As you gain experience with your SAN, you will probablyalso

    want to increase its level of availability. What about purchasing a

    directorclass switch? What does the SAN look like now that youve changedit?You will find yourself asking such questions as you spend more time with

    your SAN.The process of asking and answering these questions isnow referred to as

    storageresourcemanagement

  • 7/29/2019 Broadcast Zones

    15/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    (SRM), and there are a number of SRM products now on themark et .Due to the volat i l i ty of this market , I dont l i s t the vendo rshe re , bu t an updated list of SRM products is available at

    http://www.storagemountain.com

    . How-ever, heres a list of features that are beginning to be typical withSRM products:

    Automatic discoveryInstead of having to enter the hundreds of devices that reside on your SAN,theseproducts can automatically query what devices exist on yourSAN. This is anincredible time saver!

    Graphical and command line interfacesAlthough being able to view the SAN graphically is one of the best

    features ofSRM products, its also helpful to be able to administer things

    via the commandline. Many of the products allow you to use all their featuresvia a command lineor graphical interface.This is the Title of the Book, eMatter EditionCopyright 2011 OReilly & Associates, Inc. All rights reserved.

    58|C h apte r 3 : Manag i ng a S A N

    Status reportingAs will be mentioned in the next section, your SAN must be

    monitored. MostSRM products incorporate in-band monitoring into their

  • 7/29/2019 Broadcast Zones

    16/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    products, allowing youto monitor the status of the devices on your SAN aswell as configure them.

    SAN visualizationOnce the SRM product has discovered all the devices on your SAN and

    checkedtheir status, it can show you a network map of all thedevices, with each devicetype having an icon of a different color andshape. These drawings resemble thenetwork diagrams networkadministrators have grown used to in LAN-basedproducts.

    Storage allocationMany of these products can create and modify zones and

    create and modi fy LUN masking properties, allowing you to administerthese attributes from a sin-gle source. Often they allow you to do this even on

    heterogeneous hardware.

    Storage array configuration (virtualization)Some products have worked with the various storage array vendors, and theyareable to create RAID volumes of various levels on the storagearrays in the SANfrom a central point.Relatively speaking, the storage

    resource management industry is in its infancy. Asmentionedpreviously, there are a lot of vendors vying for this open market.

  • 7/29/2019 Broadcast Zones

    17/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    How-ever, SANs will have fully arrived only when these products aremature.

    MonitoringIncluding redundant paths and using multiple levels of RAID keepsa single compo-nent failure from causing you any severe grief, but ifyou dont monitor your SAN,youll never know the componentfailed and wont be able to replace it before thenext component

    fails.This attribute of ongoing maintenance has already beenmentioned in the previoussection, and the easiest way tomonito r a SAN is to p urchas e an d in stal l an SRM product. What

    if you dont have the budget yet? The easiest answer is to build

    yourown out-of-band management system using SNMP.Almost al lswitches and storage arrays include an Ethernet port you can plugintoyour LAN or into a dedicated LAN for reporting purposes. Youcan then monitorthem passively or actively. A passive monitoring system

    waits for the switch or arrayto noti fy you of a fai lure via an SNMP trap.An active monitoring system involvescreating your own monitoringapplication that issues SNMP queries against yourswitches and

  • 7/29/2019 Broadcast Zones

    18/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    arrays.LAN administrators and enterprise management applicationscan come in handyhere . Th ey are use d to thi s ki nd ofmon ito rin g a nd can a ssis t y ou in ent eri ng the SNMP world,

    especially if you arent that familiar with it.You're ReadingaFree PreviewPages 75 to 164 are not shownin this preview.

    This is the Title of the Book, eMatter EditionCopyright 2011 OReilly & Associates, Inc. All rights reserved.

    Configuring a Filer|149

    Some implementations let you configure NIS cache behavior, if

    applicable.

    passwdand

    groupNIS tables are used quite often for UID/GID -to-username matching

    andfile-access authent icat ion. Caching the most accessed k eys

    is therefore a way toimprove NFS/CIFS file-attribute operationsresponse time.

    MicrosoftMicrosoft has supported the sharing of computer resources over the

    network for along time, starting with peer-to-peer networking, followed bythe concept of a work-group, then domain, and final ly, complete

    http://www.scribd.com/doc/15490613/Using-SANs-and-NAS-Help-for-Storage-Administrators
  • 7/29/2019 Broadcast Zones

    19/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    directory services. Here are some of theis sues yo u wil l fac e whenusing Microsoft s var ious authent icat ion and directory schemes:

    Workgroup modeSmall sites may not need the functionality of domains and ACLs and can

    config-ure CIFS for workgroup membership. Shares can be accessedusing share pass-wo rd s an d / or us e r au th en t i ca t i on , bu tA C L s c a n t b e s e t o n f i l e s . S o m e implementations allow only

    plaintext password authentication in workgroup mode. Implementations

    based on Samba can also be configured to use encryptedpasswords inworkgroup mode using the

    smbpasswdfile.

    NT4 domain mode

    Configuring NAS into an NT4 domain requires a working domainwith at leastone live primary domain controller (PDC). If the NAS

    box and PDC arent onthe same subnet, the Windows InternetNaming Service (WINS) is needed tohelp the fi ler find the domain

    controller. Usually, the filer serves as a memberserver in thedomain. Domain emulators such as Samba and HP-UXAdvancedServer/9000 might have different configuration

  • 7/29/2019 Broadcast Zones

    20/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    requirements. (One notable dif-ference is the ability of the filer itself toserve as a domain controller).

    Windows 2000 Active Directory (AD)While many vendors claim to have full compatibility with Windows 2000

    andActive Directory (AD), some can serve only as NT4 memberservers, and thus

    Plaintext PasswordsWindows clients can send their passwords in either plaintext or encrypted format.With the

    introduction of Windows NT4 Service Pack 3, Microsoft changed the defaultbehavior of all its client operating

    systems to disable the use of plaintext passwords. If your CIFS implementation requires you to use plaintext

    passwords (usually requiredfor workgroup mode), you can merge Sambas PlainPassword registry files into

    yourPCs registry. PlainPassword files can be found in the Samba source tree, in the docs

    directory

    .This is the Title of the Book, eMatter EditionCopyright 2011 OReilly & Associates, Inc. All rights reserved.

    150|Ch apte r6 : Man agi ng NAS

    AD cant be changed from mixed-mode to native-mode. AD offers

    many newfeatures that are beyond the scope of this chapter, but forfirst-time configura-tions, the most obvious change is the use ofDNS as a service locator instead of WINS. This requires entering correct

  • 7/29/2019 Broadcast Zones

    21/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    DNS entries for the domain controllers andthe filer prior to the NASinstallation.

    User mappingFilers configured to support multiprotocol users need some

    mechanism to translatebetween the different security architectures of CIFSand NFS. NFS inherited the Unixpermission scheme, with its UID/GID and

    permissions octets for owner, group, andworld. CIFS behaves muchdifferently, with access control entries (ACE) granting ordenying specific

    permissions to specific users or groups, each described by asecurityidentifier (SID). Thus a mechanism is needed to translate theUnix UID/GID to anappropriate CIFS SID and vice versa.The common

    method for achieving this involves using the only common fieldtheusername. A mechanism that runs on the filer itself (for example, a

    daemon or script)can map between the different usernames and theirunderlying UID/GID and SIDs.An organization that has a consistent

    naming convention for usernames across allplatforms will enjoy asmoother and simpler operation.

  • 7/29/2019 Broadcast Zones

    22/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    ApplicationsThe following section describes some applications your new NAS serverwould workwell with.

    Home DirectoriesHome directory configurations depend on the number of users needed. Youcan havemultiple volumes and multiple exports and shares for users. Your

    aim is to give usersa simple way to access their home directories fromeverywhere in the network. NASfilers have a way of simplifying this for

    both NFS and CIFS.NFS automounterNFS automounter can be used to map an export path on the fi ler tosomethingother than the actual mount path. For example, a directoryon the filer called

    nas:/home/curtiscan be mapped in automounter maps to

  • 7/29/2019 Broadcast Zones

    23/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    /u/curtisor

    /users/cur-tis. Even if in the future the account called

    curtisis moved to directory called

    nas: /home2/curtis2, the change needs only to be done in the automounter map.Thechange is transparent and doesnt affect the users scripts or any other

    referenceto his home directory;

    /u/curtisis still accessible.This is the Title of the Book, eMatter EditionCopyright 2011 OReilly & Associates, Inc. All rights reserved.

    Data Migration|151

    CIFS special sharing featuresSome filers have special features for this need. The system can automaticallyfor-ward your mapping to

    \\server\usernameto any parent directory that contains adirectory named

    username

  • 7/29/2019 Broadcast Zones

    24/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    . When the user tries to map a drive to his home direc-tory, he isautomatically routed to the correct place. An enhancement to this fea-ture

    provides the abi l i ty to combine i t wi th user mapping , so that

    i t routescorrectly even if the username isnt the same between Unix and

    Windows.

    EmailSome vendors supply configuration documents describing how to

    configure theirdevices so they can store data from specificapplications, such as email. If you wishto do this, consider the followingfactors:

    Average file size

    Some email applications, such as Netscape Mail, keep each mailmessage in aseparate file. Some, such as

    sendmail, keep all of a single users messages in a sin-gle file. Still others, such asMicrosoft Exchange, keep all mail in one database file. How your emailapplication stores email affects the average file size. This, inturn, affects

    performance, filesystem configuration, and the backup strategy.

  • 7/29/2019 Broadcast Zones

    25/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    Heavy read environmentMost email applications create a lot of read activity because data isread mostlyfrom the server. Most filesystems record the access time(called, in Unix,

    atime)of files. Doing that in a heavy read system can be costly, as theupdate of accesstime requires a write. This can affect performance-

    tuning efforts, because somefilesystems give you the option not to updateaccess time.

    Caching issuesAs descr ibed previously, there are many implementat ions of emai l sof tware.Caching of mai l f i les , especially cl ient -s ide

    caching, might be a good perfor-mance practiceor a data

    corruption disaster. Consult with your vendor when configuring yourNAS caching with email software.

    DatabasesConfiguring NAS for a database requires delicate planning and a closer lookat smalldetails. Care must be taken with the location of database files

  • 7/29/2019 Broadcast Zones

    26/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    and transaction logs,as well as the setup and testing of your backupand recovery system. You must alsoensure that your database vendorsupports NAS-based datafiles.

    Data MigrationNow that your fi le r is configured, youre ready to start copying datainto it . If yourdata is currently stored elsewhere, you need to migrate it tothe filer.This is the Title of the Book, eMatter EditionCopyright 2011 OReilly & Associates, Inc. All rights reserved.

    152|Ch apte r6 : Man agi ng NAS

    Migration fromDistributed Local

    Storage to NAS

  • 7/29/2019 Broadcast Zones

    27/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    Consolidation of local disks distributed on different hosts and, optionally, ondiffer-ent platforms (and thus different filesystemsUFS, VxFS, JFS, and

    NTFS, to name af e w ) i s a c o m m o n g o a l f o r N A S

    i mp l em en t e r s . T he r e a r e a nu mbe r o f w a ys t o migrate data

    to filers, and a few caveats to keep in mind while migrating thedata,such as permissions and soft links.

    Migration methods and toolsHere are some tools and techniques that can help with migrating

    from local storageto NAS:

    Using a local tapeYou can back up the data using a local tape drive and a backupapplication thatis ava ilable on both the sourc e a nd the fi ler .

    Th e big gest pro ble m wi th this method is finding a common backup

    and recovery application.Migration to remote tape deviceUsing the remote tape

    (rmt)facility Unix-based NAS vendors provide, you canactually use aremote tape for the migration. Since theres extra work that needsto be doneto encode the data stream and send it to the remote host handling

  • 7/29/2019 Broadcast Zones

    28/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    rmt, this process is usually slower than using a local tape device.

    rmtalso doesntsupport Windows clients.

    Copying data using the networkSince a large data set migration can cause network overload andinterrupt regu-lar network traffic, you might prefer do the migration during

    offline hours or ona different network, assigned only for the migration.

    Piped dump and restoreIf you migrate data from Unix, you can eliminate the tape driveduring datamigration by directing the output of

    dumpto

    restore, as shown here:rshsource

    "dump 0f - /vol/vol0" | rshdestination

    "restore rf -"

    tartar(for tape archive) is a common copying tool. Since the native

    tar

  • 7/29/2019 Broadcast Zones

    29/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    utilitythat comes with modern Unix versions often doesnt handlesoft links, useGNU

    tar(

    gtar) instead. GNU

    taris also available for Windows platforms.A typical migration command linewith

    taris:tar cf - . | ( cd /target; tar xf - )

    cp and xcopy

    Some of the easiest methods to use are Unixs cpor Windows

    xcopy. Sincethe NAS filer appears as a network drive, you can simply copy thedata overto it. Remember to do this at an appropriate time.This is the Title of the Book, eMatter EditionCopyright 2011 OReilly & Associates, Inc. All rights reserved.

    Data Migration|153When using the

  • 7/29/2019 Broadcast Zones

    30/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    cpcommand, make sure you issue thedoption alongwith theroption. Thed

    option tellscp

    not to follow symbolic linkswhen copying. Theroption causes a recursive copy.

    Migration issuesWhen migrating data to NAS, you must make sure to preserve

    permissions and soft links and take full advantage of the fi lers

    performance, (that is , as much as you can within the limits of yournetwork).

    Migrating permissionsCare must be taken when migrating permissions; not all tools can

    transfer thiskind of information (also calledmetadata, o r d ata tha t d esc ribe s d ata ). Make sure the method you use to

    transfer the data preserves permissions, including any access controllists.

    Migrating soft links (symbolic links)

  • 7/29/2019 Broadcast Zones

    31/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    Soft links also arent trivial to migrate. CIFS doesnt translatesymbolic links, socopyin g Un ix d ata that con tain s sy mbo liclin ks to a CIF S vol ume cau ses the symbolic links to be copied as

    regular text files. Some Unix tools follow sym-bolic links, and thus

    copy the target of the links instead of the links themselves.Somebackup applications have options for following symbolic links orbackingthem up as soft links. Soft links also raise another issue.What if a users homedirectory contains a soft l ink to a file that is

    now migrated to NAS? It might bethat the path to the new locationis different than it was, and this soft link willbecome stale after themigration. In any case, you should verify that the migrateddata is accessible

    as expected, just like the source.

    Performance

    Since migration consists of copying data, it would probably help to migratedatain para llel and use inc remental copie s. Paralle l ism rai ses

    the total migrat ion throughput, and copying incrementally saves downtime.

  • 7/29/2019 Broadcast Zones

    32/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    Migration Between

    FilersIn the current environment of acquisitions and reorganizations, redistributionof databetween direct ories, volume s an d p hysica l d evices is a

    co mmo n req ui rem en t fo rmany companies. In addition to the toolsmentioned earlier, there are additional,proprietary tools just for doingmigration of data between filers:*

    NDMPcopyNDMPcopy is an extension of the NDMP specification. NDMPcopy

    uses theNDMP protoco l for t ransfe rring da ta bet ween t woNDMP data servers . The* This list of tools is far from comprehensive,andit isnt meant as an endorsement of NetworkAppliance orEMC.

    This is the Title of the Book, eMatter EditionCopyright 2011 OReilly & Associates, Inc. All rights reserved.

    154|Ch apte r6 : Man agi ng NAS

    servers can be on the same physical host as well as on separate hosts. Theadvan-tage of this approach is that the data flows between the two servers

    using a dedi-cated network connection. Apart from full copies, this alsosupports incrementalcopies up to level 2. The smallest unit of transfer

  • 7/29/2019 Broadcast Zones

    33/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    is a directory. NDMPcopy issupported on Network Appliance filersfor local and interfiler copying and onAuspex filers (called TurboCopy),for internode copying only.Figure 6-1shows NDMPcopys data flow.

    Network Appliance SnapMirror

    SnapMirror is a mirroring technology that can also be used for datamigrationbetween filers. Recent versions make it possible to migratethe NFS filehandlesthat are used on the source export to the targetand thus maintain the transpar-enc y o f t he mig ra tio n. Rec en t

    versions also offer better granularity, allowingmigration of top-level directories in addition to volumes.

    EMC Celerra data movers: unmount/mount volumesMoving volumes between data movers that sit on the same Celerra

    box can bed one s imply by unmount ing them on one data

    mover , then mount ing themagain on another . I f pre-setup wasdo ne so that ev er y vo lu me ha s it s ow n IP address, migration can

    occur transparently for the NFS user.

    EMC Celerra TimeFinder/FSTimeFinder, EMCs mirroring product, was extended for NAS usagewith thename of TimeFinder/FS. TimeFinder/FS migrates completevolumes from oneSymmetrix storag e syste m to anothe r. Celerra

  • 7/29/2019 Broadcast Zones

    34/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    vo lumes can be mi rro red to a remote Symmetrix storage system;the mirror can then be split, and the secondvolume mounted and sharedusing the remote Celerra system.

    MaintenanceThis section describes some tasks and issues a filer administrator faces in theday-to-day management of a filer. They include the following:Figure6-1.NDMPcopy data f lowPrimary networkSourcefilerNDMPcommandandcontrol hostDestinationfi lerCommanddialogandfile his tor y Commanddialogandfile histo ry

    Dedicatednetwo rkd u mp r es t or e

    This is the Title of the Book, eMatter EditionCopyright 2011 OReilly & Associates, Inc. All rights reserved.

    Maintenance|155

    System failures Performance monitoring and analysis Network

    and storage management Performance tuning User support

    Hardware FailureAll hardware is prone to failure. Be prepared with a plan of actionfor each specificpart, whether its a disk, fan, power supply, CPU, or

    motherboard. Most vendorssupply field replaceable units (FRUs) for

  • 7/29/2019 Broadcast Zones

    35/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    parts that are likely to break in the field.Here are parts most prone tofailure:

    DiskWhether your system is configured to use RAID 1, 1+0, 4, 5 or any other

    specialcombination, single-disk failures are usually repaired byregenerating the con-tent of the failed disk onto a hot spare disk.This can take a few hours, so makesure to include hot spares in yoursystem and replace any failed disks within areasonable amount of time.

    Power supplySome systems have different power supplies for the filer head and

    the storageshelves. If redundant power cabling is in use, a power supplyfailure wont causethe whole system to go down.

    Fan

    There are many different kinds of fans in a filer: CPU fans, systemhead fans,storage s helf fans, a nd ch assis fans. Not al l fanfai lu re s are cri ti cal , but some might be. Check with your vendor as tohow fan failures are handled by the sys-tem.

    MemoryWhether its main (RAM), cache (also called L2 cache) or NV-

    RAM, memoryconsists of memory module s, su ch a s SIMMs or

  • 7/29/2019 Broadcast Zones

    36/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    DIMMs that are smal l inte-grated ci rcui t boards with m emorychips on them. In some designs, memorycomes on proprietary

    boards.

    Motherboard/chassis

    These parts are mentioned together because few systems aredesigned to allowyou to replace one without the other. This can becritical, as replacing a chassismight take a long time. Also, in somedesigns, a chassis failure may cause a com-plete system malfunction.

    CPUIf your system doesnt offer more than one CPU, a CPU failure

    results in a sys-tem failure. Care must be taken with CPU replacementsand, in general, its bestThis is the Title of the Book, eMatter EditionCopyright 2011 OReilly & Associates, Inc. All rights reserved.

    156|Ch apte r6 : Man agi ng NAS

    to let an experienced hardware technician do this. If your system supportsmorethan one CPU, consult your vendor as to how to handle thefailure of a singleCPU.

    CardsSCSI cards, Fibre Channel HBAs, and NICs all fall under this

    category. Somedesigns allow for card redundancy, such as usingEtherChannel to avoid havinga single NIC failure take down a network

  • 7/29/2019 Broadcast Zones

    37/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    link, and using multiple channels fromadapters to storage systems toprotect against a single link failure. Other cardscant be redundant bynature, e.g., parallel SCSI cards.

    Hardware UpgradesSome systems al low you to upgrade s ingle components , suchas di sk dr iv es an dCPUs, while others require you to upgrade theentire machine at once. Check withyour vendor about which parts

    are upgradeable and which arent. (Disk shelves forexample, canusually hold newer drives but only up to a certain size).

    Onsite SparesSome vendors sell you lower-priced parts to use as quick onsitespares. Some of themore common parts for this purpose are sparedisks, which are usual ly kept inside the system itself as hot spares.Companies with strict mean time to recovery (MTTR)requirements require

    complete spare systems onsite (which are sometimes also usedaspart of a test envi ronment as well ) . Such spare systems

  • 7/29/2019 Broadcast Zones

    38/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    should be thoroughly tested so that they can be put into productionquickly when required.

    Software FailureThere are a few different reasons your software may fail. Here are the mostcommon:System bugs

    NAS is designed and programmed by humans, which means it s

    prone to bugs.A bug can cause unexpected results for operations,generic unexpected behav-iors (or under certain conditions or loads), andfeature malfunction. Fixes mightbe supplied by software upgrades as

    well as

    patches, which are small pieces of software that need to be applied to the originalsoftware.

    System panicsIf the NAS operating system code encounters an illegal condition (e.g., a Cfunc-tion for reading a disk block is called with an illegal disk block

  • 7/29/2019 Broadcast Zones

    39/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    number), it delib-erately causes itself to crash and reboot. In most systemsthis step also dumps allmemory contents into a file, often called a

    corefile, which can then be sent to thevendors support center for further analysis.You're ReadingaFree PreviewPages 173 to 197 are not shownin this preview.

    This is the Title of the Book, eMatter EditionCopyright 2011 OReilly & Associates, Inc. All rights reserved.

    182|Chapter7: NAS Backup and Recover y

    configure the new NDMP tape servers into your backup application

    software, andyou are ready to back up.New tape drives can be used inNDMP libraries irrespective of whether servers back-ing up to it havelocal tape device driver support. This occurs because NDMP back-

    ups write to a trusted network end point that happens to be theNDMP tape server.However , to work correctly, the NDMP tape

    server needs to have local tape devicedriver support for all its devices.

    In fact servers with absolutely no tape device driversupport can use NDMPtape libraries.In general, the performance of these libraries isequivalent per data stream to thatobserved on Fibre Channel SANs.That is, backups are often limited by tape band-width, not network

    bandwidth. However, the CPU usage per MB transferred is cur-rently higherthan equivalent SAN deployments.The final issue with suchl ibrar ies is the reason they a re included in this sect ion. Since

    NDMP implementations vary in quality, you cant simply purchase

    http://www.scribd.com/doc/15490613/Using-SANs-and-NAS-Help-for-Storage-Administratorshttp://www.scribd.com/doc/15490613/Using-SANs-and-NAS-Help-for-Storage-Administrators
  • 7/29/2019 Broadcast Zones

    40/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    an NDMPagent and automatically assume that you can back up andrecover to and from anyNDMP-capable device. Backup softwarevendors therefore certify whether or not aparticular NDMP

    implementation is supported or not. If an NDMP library soundslike it

    might fit your needs, make sure your backup software supports it.Filer to server support

    Not everyone wants to back up their f i lers v ia a f i le r orNDMP-compat ible tape library. Some would like to simpli fy

    matters by simply backing up all their filers totheir Unix or NTbackup server. This would be known as a fi ler to serverbackup.Unfortunately, some backup software products dont support such

    backups.

    Direct access restore support

    If you have large filers, you may find this feature important. Inorder to understandwhat direct access restore is, you must first

    understand how NDMP restores workwithout it. Have you everrecovered a single file from a

    tararchive via the commandline? You do so with the following command:$ tar xvfdevice-name filename-to-be-recovered

    What happens if the file is at the end of the

  • 7/29/2019 Broadcast Zones

    41/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    tararchive?

    tarreads blindly through thearchive, looking for

    filename-to-be-recovered. What you see is a long pause, followedby the display of thefilename. What happens if the file is at the beginning of the

    tararchive?

    taragain reads blindly through the archive, looking for the file. Itdisplaysthe filename as soon as it finds it, but it continues looking through

    the archive until itreaches the end. You see the filename displayed, followedby a long pause. Only afterthe long pause is your command-line prompt

    returned. Although youve probablynever noticed, unless you hitCtrl-C after you see the filename displayed, the recov-ery time is

    unaffected by the position of the file within the archive. Whetherits atThis is the Title of the Book, eMatter EditionCopyright 2011 OReilly & Associates, Inc . All rights reserved.

    What About LAN-Free, Client-Free, and Server-Free Backup?|183

    the beginning or the end of the file,

  • 7/29/2019 Broadcast Zones

    42/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    taralways reads through the entire archive look-ing for the pattern youselected.NDMP without direct access support works the same way. Ifyou have a terabyte-sized volume, and you need one file from that volume,

    your backup software blindlyreads through the entire terabyte of data forevery single restore. Direct access restoremitigates this problem byallowing the DMA to load only the tape the file is on andto movedirectly to the location of the file on that tape. The difference this

    makeswith large restores cant be overstated. If you have largebackups and need to selec -t ively recover individual fi les, you will

    definitely want a DMA that supports directaccess restore. However,keep in mind that additional backup information referredto as file

    history must be passed from the data server to the DMA to enable

    DAR.Enabling file history results in additional DMA processing andnetwork traffic.

  • 7/29/2019 Broadcast Zones

    43/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    What About

    LAN-Free,

    Client-Free,and

    Server-FreeBackup?

  • 7/29/2019 Broadcast Zones

    44/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    Earlier in this book, we discussed three kinds of backup that can beperformed withSANS: LAN- f ree Client-free Server-freeWhetheror not NAS systems can perform the above types of backups depends

    onwhether or not you look at the NAS system as storage or as

    additional clients of thebackup and recovery system.One way to thinkof NAS filers is to consider them no different than anenterprisearray sharing disk to its clients. Filers provide storage totheir clients, and the onlydifference between a filer and a disk array

    is the protocol the filer uses to share itsstorage with its clients.Another way to think of NAS filers is to acknowledge thatthey areactually serversmerely specialized servers. They arent just disk

    arrays;they are clients of the backup and recovery system.LAN-freebackup occurs when mult iple backup cl ients share a tape library and

    arebacking up their data locally via Fibre Channel. If you think ofthe NAS systems asstorage, LAN-free backup doesnt really apply,

    because they are merely disk drives. If you think of them as backup systemclients, however, LAN-free backups do apply, asdiscussed previously in thischapter and illustrated inFigure 7-10.Client-free backups occur when the data

    is viewed via another source and then trans-ferred to tape using thatsource, instead of sending the data through the backup cli-ent.

  • 7/29/2019 Broadcast Zones

    45/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    Therefore, client-free backup can occur with NAS only if youconsider them asstorage. First, you create a snapshot, if its possibleto do so. Then you back up thatThis is the Title of the Book, eMatter EditionCopyright 2011 OReilly & Associates, Inc. All rights reserved.

    184|Chapter7: NAS Backup and Recover y

    data to tape without ever going through the client that is using the data. Youdo thisby creating an NFS or CIFS mount to the backup server and backingthat up. This isthe equivalent of mounting a split mirror on a SAN.If youthink of the NAS as clients of the backup and recovery system, then client-freebackups are rare. In order for this to happen, the NAS vendor

    needs to allow you toaccess the disks behind their filer (oftenreferred to as a

    f i l e r h e a d). You then estab-lish and split an additional mirror of the disks

    behind the fi ler head, and mount thismirror to a backup server viathe SAN. Usually the only NAS vendors to allow thisare those thatstarted as SAN vendors and have put a NAS head in front of their stor-age

    array. Since the storage array can create additional mirrors, they can performcli-ent-free backups. Also, by employing server-to-server mirroring of atargeted volume(or snapshot) as shown back inFigure 7-2, you can move the

    backup-to-tape burdenfrom the source filer and perform a LAN-free backup

  • 7/29/2019 Broadcast Zones

    46/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    on the destination filer, overallproviding the same benefits as client-freebackups on a SAN.Server-free backups occur when the data moves directlyfrom online storage (disk) tooffline storage (tape) without going

    through any servers CPU. In order for this tohappen with NAS, you

    can consider them only as storage. Then, when you are per -formingNDMP backups that move the data directly from their storage to tape with-o u t g o i n g t h r o u g h a n y o n e e l s e s C P U , i t s l i k e t h e y r e

    p e r f o r m i n g s e r v e r - f r e e backups.However, if you consider a NAS

    filer as just another client of the backup and recov-ery system,server-free backups are even more rare than client-free backups.Again,the backup and recovery system needs access to their SAN-

    attached disks and usesthe extended copy command to move datadirectly from their disks to tape withoutgoing through any CPU. As

    with client-free backups, usually the only NAS vendorsthat allowthis are those that started as SAN vendors and have put a NAS head

    infront of their storage array. Since the storage array can use extended copy,it can per-form client-free backups.Therefore, LAN-free, client-free, andserver-free backups of filers are all in the eye of the beholder.

  • 7/29/2019 Broadcast Zones

    47/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    Database

    Backup and

    RecoveryPrior to the advent of NAS or SAN, al l enterpr ise- class

    databases, and even mo st workgroup-class databases were backed upthe same way. The database vendor cre-ated a backup and recovery API

    (e.g., Oracles RMAN), and any backup and recov -ery softwarevendors that wanted to back up their database simply wrote to that

    API.When the backup and recovery software wanted to back up adatabase, it called the

  • 7/29/2019 Broadcast Zones

    48/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

  • 7/29/2019 Broadcast Zones

    49/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    This is the Title of the Book, eMatter EditionCopyright 2011 OReilly & Associates, Inc. All rights reserved.

    Database Backup and Recovery|185

    API, the database sent it one or more streams of data, and thesestreams were writ-ten to tape.*

    This method is illustrated in the following eight steps are also shown

    inFigure 7-12.

    1.

    Backup software (e.g., NetWorker, NetBackup) asks its backup agent to backupa database2.

    Backup softwares agent (e.g., NetWorker Module for Oracle,NetBackup forOracle) tells database backup API it needs to back updatabase.3.

    Database backup agent (e.g., Oracles RMAN) tells the database itsgoing to bebacked up.4.

    Database (Oracle) requests data to be backed up from storage.5.

    Storage passes data to be backed up to database.6.

    Database passes data to be backed up to API.7.

  • 7/29/2019 Broadcast Zones

    50/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    API passes data to be backed up to backup agent.8.

    Backup agent passes data to be backed up to backup software, which backs it

    upto tape or disk.The only problem with this method is that it uses a

    completely different data paththan most backup and recoveryoptions discussed in this chapter. The data paths of the various options

    discussed in this chapter are shown inFigure 7-13.Unfortunately, almostall database backup APIs assume that the data will be passedthroughthe database, which retrieves it from storage just as it does du ringnormaloperations. As you can see fromFigure 7-13, th e on ly dat a

    path that involves thedatabase server in any way is the NFS/CIFS

    option. This means that, in most cases,you will be forced to use NFSor CIFS as your backup method, because its the only way to pass the

    data through the database. This is true even if the filer uses a general-purpose operat ing system and s tandard push -agent software .As you can see inFigure 7-13, the path for push-agent software doesnt

    go through the database server,* This sectionuses Legato NetWorker andVeritas NetBackup.There are dozens of other products that per-formsimilar backups of databases.NetWorker andNetBackupwere chosenonlybecause manypeople arefamiliar withthem.This isnt anendorsement of these products.

    Figure7-12.Standard database backup methodNetbackupornetworker

    Backup server

    1Networkerornetbackup forOracle

    Database serverR M A N O r a c l e

    234Filer

    5678NFS/CIFSmount

  • 7/29/2019 Broadcast Zones

    51/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

  • 7/29/2019 Broadcast Zones

    52/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    This is the Title of the Book, eMatter EditionCopyright 2011 OReilly & Associates, Inc. All rights reserved.

    186|Chapter7: NAS Backup and Recover y

    and the database server is where the database and database backupAPI softwareresides. Therefore, a filer based on a general-purposeoperating system will be of nohelp in this situation.If you want to back

    up your filer via snapshots, native backup utilities, NDMP,oranything other than the NFS/CIFS method, you cant (in mostcases) use standarddatabase backup API software. In some cases, such asOracle, this means you need towrite your own script to shut down thedatabase or put it in backup mode prior toperforming your NAS backup.

    In other cases, such as SQL Server, you cant performpoint-in-time recoveryof your database if you dont use the database backup API. Ina few cases,such as Network Appliances backup agent for Exchange, you can

    usethe database backup API but will need to buy a customized

    backup solution fromyour NAS vendor.I dont want to seem like Imbeing hard on NAS. The issues discussed here are nodifferent thanthose discussed inChapter 4with client- and server-free

    backups.Because backups that use NDMP, a filer-based push agent, or

    snapshots behave likethe client- and server-free backups discussedinChapter 4, your database must sup-port third-party backup in order for

    you to back up filer-based data files using thesemethods. And, if you want

  • 7/29/2019 Broadcast Zones

    53/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

    to perform client- or server-free backups of these datafiles on yourfilers, youre probably going to need a custom solution, and theresagood chance youll need to write it yourself.

    BenefitsSummaryTable 7-1summarizes the benefits of the various backup and recoveryoptions forNAS filers.Figure7-13.NAS backup option data pathsBackupsoftwareBackup serverNFS/CIFS backupFilerDatabase

    Database serverOther filer Tapelibrary

    NDMP filer to serverN a t i v e u t i l i t i e s N D M Pf i l e r t o f i l e r P u s ha g e n t N D M P filer to self NFS/CIFS mount

  • 7/29/2019 Broadcast Zones

    54/55

    Storage-centricIf youve got

    one storagecabinet attached

    to many

  • 7/29/2019 Broadcast Zones

    55/55

    Storage-centricIf youve got

    one storagecabinet attached

    This is the Title of the Book, eMatter EditionCopyright 2011 OReilly & Associates, Inc. All rights reserved.

    Benefits Summary|187Table7-1.NAS backup and recovery options summary

    Nativeu t i l i t i e s N F S / C I F S ClientsoftwareNDMP:filerto self NDMP:filertofilerNDMP:filerTo NDMPlibraryNDMP:filertobackupserverI m p a c t o n fi l e servingM e d i u m H i g h M e d i

    u m L o w C r e a t e s mediuml o a d o n t w o filers

    M e d i u m M e d i u m

    Load onbackup serverV e r yl o w H i g h M e d i u m V e r y

    l o w V e r y l o w V e r y

    l o w M e d i u m

    Speed of restoreNo directaccessQuick; nodifferentthan astandardrestore,except forNFS/CIFSloadon LAN andfilerQuick; nodifferentthan astandardrestoreQuick(withDAR)Qu ick (wi th DAR)Quick(withDAR)Quick(withDAR)

    CostTimerequired tocreatescriptsNoadditionalcostAdditionalinstance of clientversion of backupsoftwareMustpurchaseNDMPagentMustpurchaseNDMPagentMustpurchaseNDMPagentandlibraryMustpurchaseNDMPagent

    AvailabilityM o s t f i l e r s A n y f i l e r F i l e r m u s t use fulloperatingsystemFilerandDMAmustsupportNDMPFiler andDMAmustsupportNDMPFiler andDMAmustsupportNDMPFiler andDMAmustsupportNDMP

    Portability of backupsPortable toany clientthat canread nativeutilityPortable toany client of backup andrecoverysystemPortable toany clientof

    backupandrecoverysystemL i m i t e d L i m i t e d L i m i t e d L i

    m i t e d

    Can usedatabasebackup APIsN o Y e s No R a r e l

    y (somecustomsolutionsavailable)Rarely(somecustomsolutionsavailable)Rarely(somecustomsolutionsavailable)Rarely(somecustomsolutionsavailable)


Recommended