Académique Documents
Professionnel Documents
Culture Documents
Management
Chapter 16
EMC Proven
Professional
The #1 Certification Program in the information
storage and management industry
2009 EMC Corporation. All rights reserved.
Cluster
Port
HBA
IP
Network
Keep Alive
HBA
SAN
Port
Storage Arrays
Accessibility
Capacity
Performance
Security
o Examples
o Number of I/Os to disks
o Application response time
o Network utilization
o Server CPU utilization
2009 EMC Corporation. All rights reserved.
o Examples
o Tracking and reporting changes made to zoning
configurations
o Physical
Monitoring
Environmental
security
throughparameters
badge readers, scanners and
cameras
Temperature, humidity, airflow, hazards (water, smoke, etc.)
Monitoring Hosts
o Accessibility
o Hardware components: HBA, NIC, graphic card, internal disk
o Status of various processes/applications
o Capacity
o File system utilization
o Database: Table space/log space utilization
o User quota
HBA
o Performance
HBA
o Security
o Login and authorization
o Physical security (Data center access)
2009 EMC Corporation. All rights reserved.
Host
o Capacity
o ISL (inter-switch link) and port utilization
o Performance
o Connectivity ports
o Link failures, loss of signal, link utilization
o Connectivity devices
o Port statistics
o Security
o Zoning and LUN Masking
o Administrative tasks and physical security
o Authorized access, strict passwords
2009 EMC Corporation. All rights reserved.
SAN
o Capacity
o Configured/un-configured capacity
o Allocated/unallocated storage
o Fan-in/fan-out ratios
o Performance
Storage
o FE (front-end) and BE (back-end) utilization/throughput
o I/O profile, response time, cache metrics
o Security
o Physical and administrative security
2009 EMC Corporation. All rights reserved.
Array
Degraded
HBA
HBA
SW1
H2
Degraded
Port
HBA
HBA
SW2
H3
Degraded
HBA
HBA
Hosts/Servers with
Applications
2009 EMC Corporation. All rights reserved.
Port
Storage Arrays
H1
HBA
HBA
SW1
H2
Port
HBA
HBA
SW2
H3
HBA
HBA
Hosts/Servers with
Applications
Port
Storage Arrays
Port
Degraded
Port
SW2
Hosts/Servers with
Applications
Storage Arrays
SW1
SW2
Can the Array provide the required
storage to the new server?
Hosts/Servers with
Applications
2009 EMC Corporation. All rights reserved.
FS Monitoring
File System
File System
Extend FS
Warning: FS is 66% Full
Critical: FS is 80% Full
HBA
H4
H1
HBA
HBA
HBA
H2
H1 + H2 + H3
HBA
HBA
H3
SW1
Port Util. %
SW2
HBA
HBA
Hosts/Servers with
Applications
Storage Arrays
Workgroup 2 (WG2)
Replication
Command
Workgroup 1 (WG1)
SW2
WG1
Alerting of Events
o Alerting is an integral part of monitoring
o Monitoring tools enables administrators to assign
different severity levels for different events
o Level of alerts based on severity
o Information alert: Provide useful information and may not
require administrator intervention
o Creation of zone or LUN
Lesson Summary
Key concepts covered in this module are:
o Storage infrastructure components that should be
monitored
o Parameters of monitoring:
o Accessibility
o Capacity
o Performance
o Security
o Monitoring examples
Additional Task
Research on key requirements of a
data center
Availability Management
o Establishing a proper guideline for all configurations
to ensure availability based on service levels.
o Example: When a server is deployed to support a
critical business function, the highest availability
standard is required. This involved deploying the
following components:
o Two or more HBAs
o Multipathing software
o Server clustering
o Two independent fibre channel switches
o RAID protection
o Backup
o Local and remove replication
2009 EMC Corporation. All rights reserved.
Capacity Management
o Ensure adequate availability of resources for all
services based on their service level requirements
o Capacity management provides:
o Capacity analysis compare allocated storage to forecasted
storage on a regular basis
o Trend analysis actual utilization of allocated storage and rate
of consumption
Performance Management
o Ensures the optimal operational efficiencies of all
components
o Performance analysis is performed on existing storage
infrastructure components
o Provides information whether a component is meeting expected
performance levels
Security Management
o Prevents unauthorized access and configuration of
storage infrastructure components
o Example: When deploying a new application or
server
o Managing user accounts and access policies
o Zoning configuration in the SAN
o LUN masking
Reporting
o Keeping track and gathering information from
various components / processes
o This information is compiled to generate reports for:
o Trend analysis and capacity planning current and historic
information about utilization of storage, file system, database
tablespace, ports
o Configuration or asset management device allocation, local
and remote replicas, fabric configuration, list of equipment with
details such as their value, purchase date, lease status and
maintenance record
o Chargeback allocation and utilization of storage infrastructure
components by various departments / user groups.
o Performance performance of various storage infrastructure
components
2009 EMC Corporation. All rights reserved.
#1 IT
company
http://education.EMC.com