Feeds

IBM uses mirrors to pretty up XIV arrays

Space reclamation improved too

Boost IT visibility and business value

IBM has improved the efficiency of its XIV arrays with instant deleted file space reclamation and added long-distance asynchronous mirroring to better protect and distribute XIV data.

IBM is providing snapshot-based asynchronous mirroring alongside the existing synch mirroring. The two asynch mirror sites can be thousands of miles apart. The mirroring can be done at intervals of 20 seconds up to 12 hours and is either automatic, based on user-set schedules, or manually-driven.

The feature comes with no charge and no need for any hardware revisions. It supports a large number of mirrors, up to 15, and a client can mirror either volumes or consistency groups so that an application or other set of data can be kept in synch together. It is also bidirectional, so hosting systems can mirror and be mirrored simultaneously, and support both synchronous and asynchronous mirroring on each system.

Clients' recovery point objectives (RPO) can be different, and independent of their mirroring schedule. IBM blogger Tony Pearson writes: "You can have up to 128 mirror pairs, and each mirror pair can have its own recovery point objective (RPO). For example, a consistency group of mission critical application data might be given an RPO of 30 seconds, but less important data might be given an RPO of 20 minutes.

"This allows the XIV to prioritise packets it sends across the network. As with XIV synchronous mirror, this new asynchronous mirror feature can send the data over either its Fibre Channel ports (via FCIP) or its Ethernet ports."

IBM has also enhanced the XIV's thin provisioning capability, in which volumes are only allocated enough physical capacity for the written data they have instead of their full logical volume allocation. There is now an instant space reclamation facility, whereby supporting applications, such as Symantec’s Veritas Storage Foundation product, can regain unused file system space in thin-provisioned XIV volumes.

Previously, XIV Thin Provisioning provided space reclamation on a non-instant basis, detecting, zeroing out and releasing unused storage back to the general storage pool on a steady, but slower basis. The new instant capability enables third party products to interlock with the XIV system, detecting unused space instantly and automatically, and immediately reassigning it to the general storage pool for reuse.

3PAR has this capability as well and it also involves Symantec.

Symantec and space reclamation

Norbert Funke, Symantec's EMEA product marketing guy, said: “The Thin Reclamation API within Storage Foundation is available for all storage hardware vendors, including 3PAR. This API ensures a ‘communication’ between the host/file system and the physical storage array to make sure that a thin array will stay thin over time.

"Without such a communication path, a thin array would never know that a file got deleted. Only the file system knows. Therefore Storage Foundation can ‘tell’ the storage array to bring back the freed up storage into the free storage pool.

"Symantec developed this API in collaboration with storage hardware partners. [We are] actively working with storage hardware vendors to make thin reclamation technology available to customers. Some storage vendors have announced thin reclamation capable arrays that support Symantec thin reclamation API. We are also actively engaged with other market leading storage hardware vendors who are undergoing thin reclamation API support qualifications testing."

SVC gets zero detection

IBM has also added zero-detection to its SAN Volume Controller (SVC) product, which virtualises block-access storage arrays and presents their logical capacity to host server applications. Version 5.1.0 of the SVC software has moved to a 64-bit base. This has enabled Zero Detection for Space-efficient Vdisks (virtual disks) using a macro.

IBM Master inventor Barry Whyte blogs: "Zero Detection is implemented in two places, first as a way to go from 'thick' to 'thin' or fully-allocated to Space-efficient using Vdisk Mirroring, and secondly to 'keep thin' once you have a Space-efficient Vdisk, by not writing zero blocks even if the using system does. The latter function is only available on the new CF8 hardware as every incoming write to a Space-efficient Vdisk is scanned by the Zero Detect macro."

SVC zero detection and reclamation facilities come with v5.1.0 of the SVC software. The XIV enhancements will be shipped with new systems from November 19, and will be available to existing XIV customers at no additional cost. ®

The essential guide to IT transformation

More from The Register

next story
The Return of BSOD: Does ANYONE trust Microsoft patches?
Sysadmins, you're either fighting fires or seen as incompetents now
Microsoft: Azure isn't ready for biz-critical apps … yet
Microsoft will move its own IT to the cloud to avoid $200m server bill
US regulators OK sale of IBM's x86 server biz to Lenovo
Now all that remains is for gov't offices to ban the boxes
Flash could be CHEAPER than SAS DISK? Come off it, NetApp
Stats analysis reckons we'll hit that point in just three years
Oracle reveals 32-core, 10 BEEELLION-transistor SPARC M7
New chip scales to 1024 cores, 8192 threads 64 TB RAM, at speeds over 3.6GHz
Object storage bods Exablox: RAID is dead, baby. RAID is dead
Bring your own disks to its object appliances
Nimble's latest mutants GORGE themselves on unlucky forerunners
Crossing Sandy Bridges without stopping for breath
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.