Implementing the IBM System Storage SAN Volume Controller with IBM Spectrum Virtualize Version 8.4

Book description

Continuing its commitment to developing and delivering industry-leading storage technologies, IBM® introduces the IBM FlashSystem® solution that is powered by IBM Spectrum® Virtualize V8.4. This innovative storage offering delivers essential storage efficiency technologies and exceptional ease of use and performance, all integrated into a compact, modular design that is offered at a competitive, midrange price.

The solution incorporates some of the top IBM technologies that are typically found only in enterprise-class storage systems, which raises the standard for storage efficiency in midrange disk systems. This cutting-edge storage system extends the comprehensive storage portfolio from IBM and can help change the way organizations address the ongoing information explosion.

This IBM Redbooks® publication introduces the features and functions of an IBM Spectrum Virtualize V8.4 system through several examples. This book is aimed at pre-sales and post-sales technical support and marketing and storage administrators. It helps you understand the architecture, how to implement it, and how to take advantage of its industry-leading functions and features.

Table of contents

  1. Front cover
  2. Preface
    1. Authors
    2. Now you can become a published author, too!
    3. Comments welcome
    4. Stay connected to IBM Redbooks
  3. Chapter 1. Introduction and system overview
    1. 1.1 Storage virtualization terminology
    2. 1.2 Latest changes and enhancements
    3. 1.3 IBM SAN Volume Controller architecture
      1. 1.3.1 IBM SAN Volume Controller architectural overview
      2. 1.3.2 IBM Spectrum Virtualize
      3. 1.3.3 IBM SAN Volume Controller topology
    4. 1.4 IBM SAN Volume Controller models
      1. 1.4.1 IBM SAN Volume Controller SV2 and SA2
      2. 1.4.2 IBM SAN Volume Controller SV1
      3. 1.4.3 IBM SAN Volume Controller model comparisons
    5. 1.5 IBM SAN Volume Controller components
      1. 1.5.1 Nodes
      2. 1.5.2 I/O groups
      3. 1.5.3 System
      4. 1.5.4 Expansion enclosures
      5. 1.5.5 Flash drives
      6. 1.5.6 MDisks
      7. 1.5.7 Cache
      8. 1.5.8 Quorum disk
      9. 1.5.9 Storage pool
      10. 1.5.10 Volumes
      11. 1.5.11 Easy Tier
      12. 1.5.12 Hosts
      13. 1.5.13 Array
      14. 1.5.14 Encryption
      15. 1.5.15 iSCSI and iSCSI Extensions over RDMA
      16. 1.5.16 IBM Real-time Compression
      17. 1.5.17 Data Reduction Pools
      18. 1.5.18 IP replication
      19. 1.5.19 IBM Spectrum Virtualize copy services
      20. 1.5.20 Synchronous or asynchronous Remote Copy
      21. 1.5.21 FlashCopy and Transparent Cloud Tiering
    6. 1.6 Business continuity
      1. 1.6.1 Business continuity with Stretched Clusters
      2. 1.6.2 Business continuity with Enhanced Stretched Cluster
      3. 1.6.3 Business continuity with HyperSwap
      4. 1.6.4 Business continuity with three-site replication
      5. 1.6.5 Automatic hot spare nodes
    7. 1.7 Management and support tools
      1. 1.7.1 IBM Assist On-site and Remote Support Assistance
      2. 1.7.2 Event notifications
    8. 1.8 Useful IBM SAN Volume Controller web links
  4. Chapter 2. Planning
    1. 2.1 General planning rules
    2. 2.2 Planning for availability
    3. 2.3 Physical installation planning
    4. 2.4 Planning for system management
      1. 2.4.1 User password creation options
    5. 2.5 Connectivity planning
    6. 2.6 Fibre Channel SAN configuration planning
      1. 2.6.1 Physical topology
      2. 2.6.2 Zoning
      3. 2.6.3 N_Port ID Virtualization
      4. 2.6.4 Inter-node zone
      5. 2.6.5 Back-end storage zones
      6. 2.6.6 Host zones
      7. 2.6.7 Zoning considerations for Metro Mirror and Global Mirror
      8. 2.6.8 Port designation recommendations
    7. 2.7 IP SAN configuration planning
      1. 2.7.1 iSCSI and iSER protocols
      2. 2.7.2 Priority flow control
      3. 2.7.3 RDMA clustering
      4. 2.7.4 iSCSI back-end storage attachment
      5. 2.7.5 IP network host attachment
      6. 2.7.6 Native IP replication
      7. 2.7.7 Firewall planning
    8. 2.8 Planning topology
      1. 2.8.1 High availability
      2. 2.8.2 Three-Site replication
    9. 2.9 Back-end storage configuration
    10. 2.10 Internal storage configuration
    11. 2.11 Storage pool configuration
      1. 2.11.1 Child pools
      2. 2.11.2 Storage pool and cache relationship
    12. 2.12 Volume configuration
      1. 2.12.1 Planning for image mode volumes
      2. 2.12.2 Planning for fully allocated volumes
      3. 2.12.3 Planning for thin-provisioned volumes
      4. 2.12.4 Planning for compressed volumes
      5. 2.12.5 Planning for deduplicated volumes
    13. 2.13 Host attachment planning
      1. 2.13.1 Queue depth
      2. 2.13.2 Microsoft Offloaded Data Transfer
      3. 2.13.3 SAN boot support
      4. 2.13.4 Planning for large deployments
      5. 2.13.5 Planning for SCSI Unmap
    14. 2.14 Planning copy services
      1. 2.14.1 FlashCopy guidelines
      2. 2.14.2 Planning for Metro Mirror and Global Mirror
    15. 2.15 Data migration
    16. 2.16 Performance monitoring with IBM Storage Insights
    17. 2.17 Configuration backup procedure
  5. Chapter 3. Initial configuration
    1. 3.1 Prerequisites
    2. 3.2 System initialization
      1. 3.2.1 System initialization process
    3. 3.3 System setup
      1. 3.3.1 System setup wizard
    4. 3.4 Base configuration
      1. 3.4.1 Configuring Remote Direct Memory Access clustering
      2. 3.4.2 Adding a node or hot spare node
      3. 3.4.3 Changing the system topology
      4. 3.4.4 Configuring quorum disks or applications
      5. 3.4.5 Configuring the local Fibre Channel port masking
    5. 3.5 Configuring management access
      1. 3.5.1 Configuring secure communications
      2. 3.5.2 Configuring password policies
      3. 3.5.3 Configuring user authentication
  6. Chapter 4. IBM Spectrum Virtualize GUI
    1. 4.1 Normal operations by using the GUI
      1. 4.1.1 Accessing the GUI
    2. 4.2 Introduction to the GUI
      1. 4.2.1 Task menu
      2. 4.2.2 Suggested tasks
      3. 4.2.3 Notification icons and help
    3. 4.3 System Hardware - Overview window
      1. 4.3.1 Content-based organization
    4. 4.4 Monitoring menu
      1. 4.4.1 System Hardware overview
      2. 4.4.2 IBM Easy Tier Reports
      3. 4.4.3 Events
      4. 4.4.4 Performance
      5. 4.4.5 Background Tasks
    5. 4.5 Pools
    6. 4.6 Volumes
    7. 4.7 Hosts
    8. 4.8 Copy Services
    9. 4.9 Access
      1. 4.9.1 Ownership groups
      2. 4.9.2 Users by groups
      3. 4.9.3 Audit log
    10. 4.10 Settings
      1. 4.10.1 Notifications menu
      2. 4.10.2 Network
      3. 4.10.3 Using the management GUI
      4. 4.10.4 Security menu
      5. 4.10.5 System menus
      6. 4.10.6 Support menu
      7. 4.10.7 GUI Preferences menu
    11. 4.11 Other frequent tasks in the GUI
      1. 4.11.1 Renaming components
      2. 4.11.2 Changing the system topology
      3. 4.11.3 Restarting the GUI service
  7. Chapter 5. Using storage pools
    1. 5.1 Working with storage pools
      1. 5.1.1 Creating storage pools
      2. 5.1.2 Managed disks in a storage pool
      3. 5.1.3 Actions on storage pools
      4. 5.1.4 Child pools
      5. 5.1.5 Encrypted storage pools
    2. 5.2 Working with external controllers and MDisks
      1. 5.2.1 External storage controllers
      2. 5.2.2 Actions on external storage controllers
      3. 5.2.3 Working with external MDisks
      4. 5.2.4 Actions for external MDisks
    3. 5.3 Working with internal drives and arrays
      1. 5.3.1 Working with drives
      2. 5.3.2 RAID and distributed RAID
      3. 5.3.3 Creating arrays
      4. 5.3.4 Actions on arrays
  8. Chapter 6. Creating and provisioning volumes
    1. 6.1 Introduction to volumes
    2. 6.2 Volume characteristics
      1. 6.2.1 Volume type
      2. 6.2.2 Managed mode and image mode
      3. 6.2.3 VSize
      4. 6.2.4 Performance
      5. 6.2.5 Volume copies
      6. 6.2.6 I/O operations data flow
      7. 6.2.7 Storage efficiency
      8. 6.2.8 Encryption
      9. 6.2.9 Cache mode
      10. 6.2.10 I/O throttling
      11. 6.2.11 Volume protection
      12. 6.2.12 Secure data deletion
    3. 6.3 Virtual volumes
    4. 6.4 Volumes in multi-site topologies
      1. 6.4.1 HyperSwap topology
      2. 6.4.2 Stretched topology
    5. 6.5 Operations on volumes
      1. 6.5.1 Creating volumes
      2. 6.5.2 Creating custom volumes
      3. 6.5.3 Creating volumes in multi-site topologies
      4. 6.5.4 I/O throttling
      5. 6.5.5 Volume protection
      6. 6.5.6 Modifying a volume
      7. 6.5.7 Deleting a volume
      8. 6.5.8 Mapping a volume to a host
      9. 6.5.9 Modify I/O Group or Non-disruptive Volume Move (NDVM)
      10. 6.5.10 Migrating a volume to another storage pool
    6. 6.6 Volume operations by using the CLI
      1. 6.6.1 Displaying volume information
      2. 6.6.2 Creating a volume
      3. 6.6.3 Creating a thin-provisioned volume
      4. 6.6.4 Creating a volume in image mode
      5. 6.6.5 Adding a volume copy
      6. 6.6.6 Splitting a mirrored volume
      7. 6.6.7 Modifying a volume
      8. 6.6.8 Deleting a volume
      9. 6.6.9 Volume protection
      10. 6.6.10 Expanding a volume
      11. 6.6.11 HyperSwap volume modification with CLI
      12. 6.6.12 Mapping a volume to a host
      13. 6.6.13 Listing volumes that are mapped to the host
      14. 6.6.14 Listing hosts that are mapped to the volume
      15. 6.6.15 Deleting a volume to host mapping
      16. 6.6.16 Migrating a volume
      17. 6.6.17 Migrating a fully managed volume to an image mode volume
      18. 6.6.18 Shrinking a volume
      19. 6.6.19 Listing volumes that use MDisks
      20. 6.6.20 Listing MDisks that are used by the volume
      21. 6.6.21 Listing volumes that are defined in the storage pool
      22. 6.6.22 Listing storage pools in which a volume has its extents
      23. 6.6.23 Tracing a volume from a host back to its physical disks
  9. Chapter 7. Attaching hosts to the storage systems
    1. 7.1 Host attachment overview
    2. 7.2 Host objects overview
    3. 7.3 NVMe over Fibre Channel
    4. 7.4 N_Port ID Virtualization support
      1. 7.4.1 NPIV prerequisites
      2. 7.4.2 Enabling NPIV on a new system installation
      3. 7.4.3 Enabling NPIV on a system
    5. 7.5 Hosts operations by using the GUI
      1. 7.5.1 Creating hosts
      2. 7.5.2 Host clusters
      3. 7.5.3 Actions on hosts
      4. 7.5.4 Actions on host clusters
      5. 7.5.5 Host management views
    6. 7.6 Performing hosts operations by using CLI
      1. 7.6.1 Creating a host by using the CLI
      2. 7.6.2 Host administration by using the CLI
      3. 7.6.3 Adding and deleting a host port by using the CLI
      4. 7.6.4 Host cluster operations
      5. 7.6.5 Adding a host or host cluster to an ownership group
    7. 7.7 Host attachment practical examples
      1. 7.7.1 Pre-requisites
      2. 7.7.2 Fibre Channel host connectivity and capacity allocation
      3. 7.7.3 iSCSI host connectivity and capacity allocation
      4. 7.7.4 NVMe over Fabric host connectivity example
  10. Chapter 8. Storage migration
    1. 8.1 Storage migration overview
      1. 8.1.1 Interoperability and compatibility
      2. 8.1.2 Prerequisites
    2. 8.2 Storage migration wizard
  11. Chapter 9. Advanced features for storage efficiency
    1. 9.1 IBM Easy Tier
      1. 9.1.1 Easy Tier concepts
      2. 9.1.2 Implementing and tuning Easy Tier
      3. 9.1.3 Monitoring Easy Tier activity
    2. 9.2 Thin-provisioned volumes
      1. 9.2.1 Concepts
      2. 9.2.2 Implementation
    3. 9.3 Unmap
      1. 9.3.1 SCSI unmap command
      2. 9.3.2 Back-end SCSI unmap
      3. 9.3.3 Host SCSI unmap
      4. 9.3.4 Offload IO throttle
    4. 9.4 Data Reduction Pools
      1. 9.4.1 Introduction to DRP
      2. 9.4.2 DRP benefits
      3. 9.4.3 Planning for DRPs
      4. 9.4.4 Implementing DRP with compression and deduplication
    5. 9.5 Compression with standard pools
      1. 9.5.1 Real-time Compression concepts
      2. 9.5.2 Implementing RtC
    6. 9.6 Saving estimation for compression and deduplication
      1. 9.6.1 Evaluate compression savings by using IBM Comprestimator
      2. 9.6.2 Evaluating compression and deduplication
    7. 9.7 Overprovisioning and data reduction on external storage
  12. Chapter 10. Advanced Copy Services
    1. 10.1 IBM FlashCopy
      1. 10.1.1 Business requirements for FlashCopy
      2. 10.1.2 FlashCopy principles and terminology
      3. 10.1.3 FlashCopy mapping
      4. 10.1.4 Consistency groups
      5. 10.1.5 Crash consistent copy and hosts considerations
      6. 10.1.6 Grains and bitmap: I/O indirection
      7. 10.1.7 Interaction with cache
      8. 10.1.8 Background Copy Rate
      9. 10.1.9 Incremental FlashCopy
      10. 10.1.10 Starting FlashCopy mappings and consistency groups
      11. 10.1.11 Multiple target FlashCopy
      12. 10.1.12 Reverse FlashCopy
      13. 10.1.13 FlashCopy and image mode Volumes
      14. 10.1.14 FlashCopy mapping events
      15. 10.1.15 Thin-provisioned FlashCopy
      16. 10.1.16 Serialization of I/O by FlashCopy
      17. 10.1.17 Event handling
      18. 10.1.18 Asynchronous notifications
      19. 10.1.19 Interoperation with Metro Mirror and Global Mirror
      20. 10.1.20 FlashCopy attributes and limitations
    2. 10.2 Managing FlashCopy by using the GUI
      1. 10.2.1 FlashCopy presets
      2. 10.2.2 FlashCopy window
      3. 10.2.3 Creating a FlashCopy mapping
      4. 10.2.4 Single-click snapshot
      5. 10.2.5 Single-click clone
      6. 10.2.6 Single-click backup
      7. 10.2.7 Creating a FlashCopy consistency group
      8. 10.2.8 Creating FlashCopy mappings in a Consistency Group
      9. 10.2.9 Showing related Volumes
      10. 10.2.10 Moving FlashCopy mappings across Consistency Groups
      11. 10.2.11 Removing FlashCopy mappings from Consistency Groups
      12. 10.2.12 Modifying a FlashCopy mapping
      13. 10.2.13 Renaming FlashCopy mappings
      14. 10.2.14 Deleting FlashCopy mappings
      15. 10.2.15 Deleting a FlashCopy consistency group
      16. 10.2.16 Starting FlashCopy mappings
      17. 10.2.17 Stopping FlashCopy mappings
      18. 10.2.18 Memory allocation for FlashCopy
    3. 10.3 Transparent Cloud Tiering
      1. 10.3.1 Considerations for using Transparent Cloud Tiering
      2. 10.3.2 Transparent Cloud Tiering as backup solution and data migration
      3. 10.3.3 Restoring data by using Transparent Cloud Tiering
      4. 10.3.4 Transparent Cloud Tiering restrictions
    4. 10.4 Implementing Transparent Cloud Tiering
      1. 10.4.1 Domain Name System configuration
      2. 10.4.2 Enabling Transparent Cloud Tiering
      3. 10.4.3 Creating cloud snapshots
      4. 10.4.4 Managing cloud snapshots
      5. 10.4.5 Restoring cloud snapshots
    5. 10.5 Volume mirroring and migration options
    6. 10.6 Remote Copy
      1. 10.6.1 IBM SAN Volume Controller and IBM FlashSystems system layers
      2. 10.6.2 Multiple IBM Spectrum Virtualize systems replication
      3. 10.6.3 Importance of write ordering
      4. 10.6.4 Remote Copy intercluster communication
      5. 10.6.5 Metro Mirror overview
      6. 10.6.6 Synchronous Remote Copy
      7. 10.6.7 Metro Mirror features
      8. 10.6.8 Metro Mirror attributes
      9. 10.6.9 Practical use of Metro Mirror
      10. 10.6.10 Global Mirror overview
      11. 10.6.11 Asynchronous Remote Copy
      12. 10.6.12 Global Mirror features
      13. 10.6.13 Using Global Mirror with change volumes
      14. 10.6.14 Distribution of work among nodes
      15. 10.6.15 Background copy performance
      16. 10.6.16 Thin-provisioned background copy
      17. 10.6.17 Methods of synchronization
      18. 10.6.18 Practical use of Global Mirror
      19. 10.6.19 IBM Spectrum Virtualize HyperSwap topology
      20. 10.6.20 Consistency Protection for Global Mirror and Metro Mirror
      21. 10.6.21 Valid combinations of FlashCopy, Metro Mirror, and Global Mirror
      22. 10.6.22 Remote Copy configuration limits
      23. 10.6.23 Remote Copy states and events
    7. 10.7 Remote Copy commands
      1. 10.7.1 Remote Copy process
      2. 10.7.2 Listing available system partners
      3. 10.7.3 Changing the system parameters
      4. 10.7.4 System partnership
      5. 10.7.5 Creating a Metro Mirror/Global Mirror consistency group
      6. 10.7.6 Creating a Metro Mirror/Global Mirror relationship
      7. 10.7.7 Changing Metro Mirror/Global Mirror relationship
      8. 10.7.8 Changing Metro Mirror/Global Mirror consistency group
      9. 10.7.9 Starting Metro Mirror/Global Mirror relationship
      10. 10.7.10 Stopping Metro Mirror/Global Mirror relationship
      11. 10.7.11 Starting Metro Mirror/Global Mirror consistency group
      12. 10.7.12 Stopping Metro Mirror/Global Mirror consistency group
      13. 10.7.13 Deleting Metro Mirror/Global Mirror relationship
      14. 10.7.14 Deleting Metro Mirror/Global Mirror consistency group
      15. 10.7.15 Reversing Metro Mirror/Global Mirror relationship
      16. 10.7.16 Reversing Metro Mirror/Global Mirror consistency group
    8. 10.8 Native IP replication
      1. 10.8.1 Native IP replication technology
      2. 10.8.2 IP partnership limitations
      3. 10.8.3 IP Partnership and data compression
      4. 10.8.4 VLAN support
      5. 10.8.5 IP partnership and terminology
      6. 10.8.6 States of IP partnership
      7. 10.8.7 Remote Copy groups
      8. 10.8.8 Supported configurations
    9. 10.9 Managing Remote Copy by using the GUI
      1. 10.9.1 Creating Fibre Channel partnership
      2. 10.9.2 Creating Remote Copy relationships
      3. 10.9.3 Creating a consistency group
      4. 10.9.4 Renaming Remote Copy relationships
      5. 10.9.5 Renaming a Remote Copy consistency group
      6. 10.9.6 Moving standalone Remote Copy relationships to consistency group
      7. 10.9.7 Removing Remote Copy relationships from consistency group
      8. 10.9.8 Starting Remote Copy relationships
      9. 10.9.9 Starting a Remote Copy consistency group
      10. 10.9.10 Switching a relationship copy direction
      11. 10.9.11 Switching a consistency group direction
      12. 10.9.12 Stopping Remote Copy relationships
      13. 10.9.13 Stopping a consistency group
      14. 10.9.14 Deleting Remote Copy relationships
      15. 10.9.15 Deleting a consistency group
    10. 10.10 Remote Copy memory allocation
    11. 10.11 Troubleshooting Remote Copy
      1. 10.11.1 1920 error
      2. 10.11.2 1720 error
  13. Chapter 11. Ownership groups
    1. 11.1 Ownership groups principles of operations
    2. 11.2 Implementing ownership groups on a new system
      1. 11.2.1 Creating an ownership group
      2. 11.2.2 Assigning users to an ownership group
      3. 11.2.3 Creating ownership group resources
      4. 11.2.4 Listing ownership group resources
      5. 11.2.5 Actions on ownership groups
    3. 11.3 Migrating objects to ownership groups
  14. Chapter 12. Encryption
    1. 12.1 General types of encryption across IBM Spectrum Virtualize
      1. 12.1.1 Externally virtualized storage
      2. 12.1.2 Serial-attached SCSI internal storage
      3. 12.1.3 Non-Volatile Memory Express internal storage
    2. 12.2 Planning for encryption
    3. 12.3 Defining encryption of data at-rest
      1. 12.3.1 Encryption methods
      2. 12.3.2 Encrypted data
      3. 12.3.3 Encryption keys
      4. 12.3.4 Encryption licenses
    4. 12.4 Activating encryption
      1. 12.4.1 Obtaining an encryption license
      2. 12.4.2 Starting the activation process during initial system setup
      3. 12.4.3 Starting the activation process on a running system
      4. 12.4.4 Activating the license automatically
      5. 12.4.5 Manual license activation
    5. 12.5 Enabling encryption
      1. 12.5.1 Starting the Enable Encryption wizard
      2. 12.5.2 Enabling encryption by using USB flash drives
      3. 12.5.3 Enabling encryption by using key servers
      4. 12.5.4 Enabling encryption by using both providers
    6. 12.6 Configuring more providers
      1. 12.6.1 Adding key servers as a second provider
      2. 12.6.2 Adding USB flash drives as a second provider
    7. 12.7 Migrating between providers
      1. 12.7.1 Changing from USB flash drive provider to encryption key server
      2. 12.7.2 Changing from encryption key server to USB flash drive provider
      3. 12.7.3 Migrating between different key server types
    8. 12.8 Recovering from a provider loss
    9. 12.9 Using encryption
      1. 12.9.1 Encrypted pools
      2. 12.9.2 Encrypted child pools
      3. 12.9.3 Encrypted arrays
      4. 12.9.4 Encrypted MDisks
      5. 12.9.5 Encrypted volumes
      6. 12.9.6 Restrictions
    10. 12.10 Rekeying an encryption-enabled system
      1. 12.10.1 Rekeying by using a key server
      2. 12.10.2 Rekeying by using USB flash drives
    11. 12.11 Disabling encryption
  15. Chapter 13. Reliability, availability, and serviceability, and monitoring and troubleshooting
    1. 13.1 Reliability, availability, and serviceability
      1. 13.1.1 IBM SAN Volume Controller nodes
      2. 13.1.2 Power
    2. 13.2 Shutting down an IBM SAN Volume Controller cluster
    3. 13.3 Removing or adding a node to or from the system
    4. 13.4 Configuration backup
      1. 13.4.1 Backing up by using the CLI
      2. 13.4.2 Saving the backup by using the GUI
    5. 13.5 Software update
      1. 13.5.1 Precautions before the update
      2. 13.5.2 IBM Spectrum Virtualize upgrade test utility
      3. 13.5.3 Updating IBM Spectrum Virtualize V8.4
      4. 13.5.4 Updating IBM Spectrum Virtualize with a hot spare node
      5. 13.5.5 Updating the IBM SAN Volume Controller system manually
    6. 13.6 Health checker feature
    7. 13.7 Troubleshooting and fix procedures
      1. 13.7.1 Managing event log
      2. 13.7.2 Running a fix procedure
      3. 13.7.3 Resolving alerts in a timely manner
      4. 13.7.4 Event log details
    8. 13.8 Monitoring
      1. 13.8.1 Call Home function and email notification
      2. 13.8.2 Disabling and enabling notifications
      3. 13.8.3 Remote Support Assistance
      4. 13.8.4 SNMP configuration
      5. 13.8.5 Syslog notifications
    9. 13.9 Audit log
    10. 13.10 Collecting support information by using the GUI, CLI, and USB
      1. 13.10.1 Collecting information by using the GUI
      2. 13.10.2 Collecting logs by using the CLI
      3. 13.10.3 Collecting logs by using USB
      4. 13.10.4 Uploading files to the Support Center
    11. 13.11 Service Assistant Tool
    12. 13.12 IBM Storage Insights Monitoring
      1. 13.12.1 Capacity Monitoring
      2. 13.12.2 Performance monitoring
      3. 13.12.3 Logging Support Tickets by using IBM Storage Insights
      4. 13.12.4 Managing support tickets by using IBM Storage Insights and uploading logs
  16. Appendix A. Performance data and statistics gathering
    1. IBM SAN Volume Controller performance overview
    2. Performance monitoring
  17. Appendix B. Terminology
    1. Commonly used terms
  18. Appendix C. Command-line interface setup
    1. CLI setup
  19. Notices
    1. Trademarks
  20. Back cover

Product information

  • Title: Implementing the IBM System Storage SAN Volume Controller with IBM Spectrum Virtualize Version 8.4
  • Author(s): Corne Lottering, Denis Olshanskiy, Jackson Shea, Jordan Fincher, Hartmut Lonzer, Ibrahim Alade Rufai, Katja Kratt, Konrad Trojok, Leandro Torolho, Pawel Brodacki, Rodrigo Jungi Suzuki, Sergey Kubin, Sidney Varoni Junior, Tiago Bastos, Vasfi Gucer
  • Release date: August 2021
  • Publisher(s): IBM Redbooks
  • ISBN: 9780738459370