74. Connecting and Configuring the SSM Reporting - Log Files If technical support requests that you send a copy of a log file, use the Log Files tab to save the log file as a text file.
75.
76.
77.
78.
79.
80.
81.
82.
83.
84.
85.
86.
87.
88.
89.
90.
91.
92.
93.
94.
95.
96.
97.
98.
99.
100.
101.
102.
103.
104.
105.
106.
107.
108.
109.
110.
111.
112.
113.
114.
115.
116. Using Volumes How Replication Works The order in which SSMs are added to the cluster determines the order in which copies of data are written to the volume. Dynamic Pool Dynamic Pool Dynamic Pool Pool Member 1 RAID 0 Pool Member 2 RAID 0 Pool Member 3 RAID 0 Pool Member 4 RAID 0 B1 B2 B3 B4 B4 4 Blocks of Data Replication = 1 4 Blocks of Data Replication = 2 4 Blocks of Data Replication = 3 B4 B1 B1 B2 B2 B3 B3 B4 B4 B1 B1 B2 B2 B3 B3 B1 B2 B3 B4
132. iSCSI Ecosystem Microsoft and HP are single OS only. Cisco and IBM support multiple OS. Microsoft Cisco HP IBM Software Initiators Protocol conversion gateways for bridging FC SANs over IP and providing IP connectivity to FC SANs SANRAD Cisco McData Routers or Gateways Protocol conversion blades on FC switches for IP connectivity to FC SAN McData Cisco Switches with iSCSI blades TCP/IP & iSCSI protocol on a chip. Required for 10 Gig-E. Adaptec Alacritech Intel Siliquent QLogic Silverback iSCSI Chips Used for connecting servers with iSCSI to FC or SCSI disk arrays Stonefly Intransa iSCSI concentrator Competitive storage arrays in the market LeftHand Networks EMC Network Appliance EqualLogic iSCSI-attached Storage Arrays Most of these HBAs are new and only support Windows and Linux. QLogic supports Solaris too. Adaptec QLogic Emulex Intel Hardware/Firmware Adaptors (NICs, HBAs, TOEs) Comments Vendors Product
133. iSCSI Architecture Application Servers with software or hardware iSCSI initiators iSCSI Initiators iSCSI Initiators send data to any SSM running iSCSI target software Target SSM writes data to all SSMs in the Cluster iSCSI Target Data Map
153. User_Data User_Data_ss1 New volume is created to hold any changed blocks Previous volume becomes Snapshot volume and is read only Using Snapshots How a Snapshot Works All Operations Transparent to the Operating System and the User Community User_Data Volume composed of Disk Blocks: A, B, C User_Data Volume composed of MODIFIED Disk Blocks User_Data Mounted as Drive U
154. User_Data New volume is created to hold any changed blocks User_Data Volume composed of MODIFIED Disk Blocks: A’, D, E Snapshot volume becomes read only User_Data_ss2 NEW User_Data Volume composed of MODIFIED Disk Blocks: Using Snapshots How a Snapshot Works (cont.) All Operations Transparent to the Operating System and the User Community User_Data_ss1 Snapshot volume is read only User_Data Volume composed of Disk Blocks: A, B, C User_Data Mounted as Drive U
155. Using Snapshots Using a Snapshot User_Data User_Data_ss1 User_Data Volume composed of MODIFIED Disk Blocks: A’, D, E User_Data_ss2 NEW User_Data Volume composed of MODIFIED Disk Blocks: An Executive come to the IT department and says they accidentally deleted a file. The file from yesterday is the one they need. With a snapshot you can mount the snapshot on to a server and allow the exec to access a previous version of the file. User_Data Volume composed of Disk Blocks: A, B, C User_Data Mounted as Drive U User_Data-ss2 Mounted as Drive Z