
Data Protection for PowerStore with PowerProtect DD Series Appliances
Download PDFTue, 09 May 2023 23:47:18 -0000
|Read Time: 0 minutes
Summary
Dell PowerStore is a revolutionary storage appliance that is designed for the data era. PowerStore is a data-centric, intelligent, and adaptable infrastructure solution that provides various ways to protect your data, locally and remotely. With PowerStore Manager, you can protect your data locally by creating snapshots (point-in-time copies) of volumes, volume groups, virtual machines, or file systems. You can also apply remote protection by replicating your data to a remote system or by mirroring the data using metro volumes for redundancy in the event of a disaster.
Native integration of Dell PowerProtect DD series appliances with PowerStore
Starting with PowerStoreOS (Operating System) version 3.5, a new remote backup solution is introduced which provides an additional method to protect your data in a PowerStore cluster. Dell PowerProtect DD series appliances can be added as a remote system to protect the resources (volumes and volume groups) on PowerStore. PowerStore can send backups directly to DD series appliances with no backup application required.
Figure 1. Remote backup – PowerStore to DD series appliances
DD series appliances enable organizations to protect, manage, and recover data at scale across their diverse environments. PowerStore supports backing up to a physical PowerProtect appliance or to PowerProtect DD Virtual Edition (DDVE). DDVE is supported either on-premise or within AWS. A single DD series appliance can be added to the same PowerStore cluster multiple times, provided that a different Storage Unit ID is used. This ability allows you to back up different resources to different locations within a single DD series appliance.
The key features are:
- Self-service remote backup with DD series appliances as the target remote system
- Backup and retrieve PowerStore block volumes and volume groups data with DD series
- Ability to Instantly access the remote snapshot residing on a DD series appliance
- Supports both physical and software-defined DD series appliances. Supports PowerProtect DD Virtual Edition with AWS cloud provider.
- PowerStore leverages DD Boost protocol to send data to DD series
- End to end data protection orchestration using PowerStore Manager
- Direct encrypted transfer from PowerStore to DD series
The key benefits are:
- Zero impact on hosts because backups run directly on PowerStore
- Incremental forever data protection strategy for PowerStore block volumes and volume groups
- Backup different resources to different locations within a single DD series appliance
- Ability to configure local and remote protection within a single protection policy with independent schedule and retention
- Replication between DD series appliances and to the cloud
Steps to protect resources on PowerStore with DD series
Figure 2 below explains the steps to protect resources (volumes and volume groups) on PowerStore with DD series appliances.
Figure 2. Steps to protect resources on PowerStore with DD series
Remote session operations
With PowerStore integration with DD series appliances, you can protect PowerStore volumes and volume groups directly to DD series appliances. With this ability you can perform remote session operations, such as backup, retrieve, and instant access. A remote session tracks each of these operations. Remote backup, retrieve, and instant access sessions go through various states that indicate the session’s progress and any possible issues.
Backup session
PowerStore utilizes backup sessions to create remote backups (snapshots) on the DD series appliances. When a protection policy containing a remote backup rule is assigned to a supported resource, a backup session is created. There is no manual way to configure a backup session without a protection policy. Only one backup rule can be added per protection policy.
A protection policy can be created to provide local and remote protection for PowerStore resources. Each protection policy for the same volume or volume group can include replication rule, remote backup rule, and snapshot rules, which are independent with schedule and retention.
When a backup is run, a snapshot of a volume or a volume group is created on the PowerProtect system. The created snapshots are crash-consistent and there is no application integration. A backup can be started manually by a user or automatically according to the schedule defined in the remote backup rule. Remote snapshots are created with an expiration time based on the remote backup rule associated with the resource.
The snapshots that are created manually by a user inherit the remote backup rule’s retention policy. Only the initial backup is full; subsequent backups are incremental. Backup session states when running a backup include ‘idle’, ‘prepare’, ‘in-progress’, ‘paused’, ‘cancelling’, and ‘failed’. Figure 3 depicts the high-level backup workflow.
Figure 3. Backup session – High-level workflow
When performing incremental backups, only the unique data is traversed through the network to create a remote snapshot on the DD series appliances. The PowerStore snapshot differential feature, and DD series virtual synthetic operations, enable the implementation of an incremental forever data protection strategy. Only the changed blocks are sent to DD series and aggregated into the full consistent remote snapshot. The snapshot can be retrieved either incrementally or fully to the same PowerStore cluster or different cluster. When the backup is complete, users can view the list of all resources that have been backed up from the Resources page in the PowerStore Manager UI.
Retrieve session
When remote snapshots are created on the DD series appliances, backups can be retrieved to an existing or new PowerStore cluster. The retrieve option is used to copy a remote snapshot for a volume or volume group and save it as a local snapshot in the PowerStore cluster. This local snapshot will be set to no automatic deletion, where the user can update the expiration time or change it to a secure snapshot. Based on the use case, a differential or a full data copy is required. Figure 4 shows the high-level retrieve workflow.
Figure 4. Retrieve session - High-level workflow
You may want to retrieve a remote snapshot for restoring the source resource or for creating a thin clone.
Retrieve a remote snapshot to the same PowerStore cluster:
- If the source volume or volume group of the retrieved backup still exists in the system, a local snapshot is created on the PowerStore cluster under the source resource. If possible, the retrieval is incremental - only the changes from the source volume are retrieved, which makes the retrieval process efficient.
- If the source volume or volume group of the retrieved backup no longer exists in the system, both a new resource and a local snapshot are created, and the new resource is restored with the snapshot data.
Retrieve a remote snapshot to a different PowerStore cluster:
- Because the source volume or volume group never existed on that cluster, both a new resource and a local snapshot are created. The new resource is restored with the snapshot data, returning the resource to the same state as the original.
Instant Access session
An instant access session allows a host to access a volume or volume group remote snapshot residing on a DD series appliance. From PowerStore Manager, you can create an instant access session to view the remote snapshot contents without having to retrieve them on the PowerStore cluster. Instant Access enables users to instantly access deleted, corrupted, or modified data within the remote snapshot. Only one instant access session is allowed per remote snapshot. When an instant access session is running, the PowerStore appliance does not perform backup and retrieve operations, and local resources are not protected until the instant access sessions are ended. Figure 5 shows the high-level instant access session workflow.
Figure 5. Instant Access session - High-level workflow
When enabling Instant Access for a volume snapshot, you can configure host access before enabling the session. For an instant access session on a volume group snapshot, the user must add the host access to the remote snapshot volumes after the session is created.
Note: Instant Access is supported for all block resources except VMware VMFS datastores. If access to data within a remote snapshot of a VMFS datastore is required, customers can still perform a retrieve operation on the remote snapshot and create and mount a thin clone.
Data protection is a mission-critical priority for any modernized technology, as organizations increasingly rely on innovative storage technology appliances such as PowerStore. This unique data protection solution, which integrates PowerStore with DD series appliances, ensures continuous availability of data in PowerStore to help organizations meet their SLAs.
References
Dell PowerStore:
- Dell PowerStore – Product website
- Dell PowerStore: Snapshots and Thin Clones
- Dell PowerStore: Info Hub
Dell PowerProtect DD series appliances:
- PowerProtect DD Series Appliances – Product website
- PowerProtect DD Series Appliances - Data Sheet
- PowerProtect DD Series Appliances - Spec Sheet
- Dell PowerProtect DD Series Appliances - Info Hub
Related Documents

Dell Technologies Data Protection for VMware Telco Cloud Platform
Fri, 28 Apr 2023 19:38:15 -0000
|Read Time: 0 minutes
Summary
Any modernized infrastructure undoubtedly requires a data protection strategy to avoid downtime, prevent data loss, and recover quickly in case of a disaster. Dell Technologies provides effective data protection solutions to help organizations solve a number of significant challenges. Dell PowerProtect Data Manager is one of the effective data protection solutions to protect VMware Telco Cloud Platform management/workload cluster components and application workloads.
Protecting VMware Telco Cloud Platform with Dell PowerProtect Data Manager
VMware Telco Cloud Platform is a modernization solution that deploys cloud-native and virtual network functions consistently, at web-scale speed, and without disruption. VMware Telco Cloud Platform is a cloud-native platform that empowers communication service providers (CSPs) to manage virtual network functions (VNFs) and Containerized Network Functions (CNFs) across the core, far edge radio access network (RAN), enterprise edge, and cloud with efficiency, scalability, and agility. Telco Cloud Platform provides the framework to deploy and manage VNFs and CNFs quickly and efficiently across distributed 5G networks. You can run VNFs and CNFs from dozens of vendors, on any cloud, with holistic visibility, orchestration, and operational consistency.
Telco Cloud Platform is powered by field-proven compute and networking coupled with VMware Telco Cloud Automation and a telco-grade Kubernetes distribution. VMware Telco Cloud Platform empowers CSPs to modernize their 5G networks so they can rapidly deploy and efficiently operate multi-vendor CNFs and VNFs. The compute and networking, which are supplied by VMware vSphere and VMware NSX-T Data Center, enable CSPs to run both CNFs and VNFs on consistent horizontal infrastructure. The Kubernetes distribution—VMware Tanzu Kubernetes Grid—is designed to support telecommunications use cases.
The essentials include:
- Software-defined data protection: Provides flexible data protection and compliance across applications and cloud-native IT environments
- Unique protection: Ensures availability of all your Telco Cloud Platform components and workloads without business disruption
- Autonomous operations: Automated discovery and protection of databases, virtual machines, file systems and Kubernetes containers
- Efficient protection: Protects data directly to Dell PowerProtect DD series appliances with optional replication to secure Cyber Recovery vault
- Self-service backup and restore: Enables data owners from their native interfaces
- PowerProtect Data Manager Appliance: Integrated data protection platform that combines Data Manager software in a single appliance
- OTEL Assurance: Validated by Dell’s Open Telco Ecosystem Lab
The key capabilities are:
- Protection for the entire VMware Telco Cloud Platform stack including your mission critical applications
- VM image and file-level protection for the management/workload clusters components or instances
- Namespace level/PVC protection for TKG cluster workloads
- VMware virtual machines in a reliable and efficient manner using the Transparent Snapshot Data Mover (TSDM) mechanism.
Dell PowerProtect Data Manager
PowerProtect Data Manager software is an enterprise solution that provides software-defined data protection, deduplication, operational agility, self-service, and IT governance. Data Manager gives you valuable insight into protected on-premises and in-cloud workloads, applications, file systems, and virtual machines (VMs). Plus, complete oversight and governance to ensure compliance.
Designed with operational simplicity and agility in mind, Data Manager enables the protection of traditional workloads including Oracle, Exchange, SQL, SAP HANA and file systems as well as Kubernetes containers and virtual environments. Restore data on-premises or in the cloud. Governance control ensures IT compliance, making even the strictest service level objectives obtainable.
PowerProtect Data Manager key features include the following:
- Software-defined data protection with integrated deduplication, replication, and reuse
- Data backup and recovery self-service operations from native applications that are combined with central IT governance
- Multicloud optimization with integrated Cloud Tiering
- SaaS-based monitoring and reporting
- Modern services-based architecture for ease of deployment, scaling, and updating
PowerProtect Data Manager for VMware Telco Cloud Platform
The PowerProtect Data Manager is a virtual appliance that can be deployed on or outside of VMware Telco Cloud Platform environment to protect the management and workload components and application workload data.
Figure 1. PowerProtect Data Manager protecting VMware Telco Cloud Platform
PowerProtect Data Manager is integrated with PowerProtect DD series appliances as the protection target where the backups are stored. A PowerProtect DD series appliance can be a physical or virtual appliance.
In addition to being deployable stand-alone, PowerProtect Data Manager is available as an integrated appliance, the Dell PowerProtect Data Manager appliance. The Data Manager Appliance offers an integrated data protection platform that combines protection storage with PowerProtect Data Manager software and cloud readiness – all in a single appliance. The Data Manager Appliance provides a unified user experience and automates discovery and protection of databases, VMs, file systems, and Kubernetes containers.
Optionally, data can be replicated from a production DD series appliance to another DD series appliance or to a DD series appliance in Cyber Recovery vault using the Dell PowerProtect Cyber Recovery solution. PowerProtect Cyber Recovery provides proven, modern, and intelligent protection to isolate critical data, identify suspicious activity, and accelerate data recovery, allowing you to resume normal business operations quickly.
PowerProtect Cyber Recovery key features include the following:
- Operational air gap with data isolation and immutability
- CyberSense analytics and Machine Learning monitor data integrity
- Accelerate cyber and ransomware attack data recovery
Data Protection methods for VMware Telco Cloud Platform infrastructure components and application workloads
For VMware Telco Cloud Platform management domain (Management workload cluster), the following table shows the core components and the backup methods used.
TCP component | Backup/Restore method |
Management vCenter server | File level |
NSX-T Manager nodes | File level |
vRealize Log Insight | VM Image level |
vRealize Operations Manager | VM Image level |
vRealize Orchestrator | VM Image level |
Telco Cloud Automation Manager | File level |
Telco Cloud Automation Control plane | File level |
Tanzu Kubernetes Grid Management cluster | VM Image level |
For VMware Telco Cloud Platform workload domain (Management workload cluster), the following table shows the core components and the backup/restore methods used.
TCP component | Backup/Restore method |
Workload vCenter server | File level |
NSX-T Manager nodes | File level |
vRealize Log Insight | VM Image level |
vRealize Orchestrator | VM Image level |
Telco Cloud Automation Control plane | File level |
For VMware Telco Cloud Platform general purpose VMs (Management workload cluster), the following table shows the core components and the backup/restore methods used.
Other component (examples) | Backup/Restore method |
DNS, NTP, DHCP, Web servers, database, filesystem | VM Image level /File level/database |
Harbor registry, other registry | VM Image level or File level |
Customized applications on VM’s/Tanzu Kubernetes Grid | Namespace/PVC or Image level |
For the VMware Telco Cloud Platform compute workload domain (Workload cluster), the following table shows the core components and the backup/restore methods used.
TCP component | Backup/Restore method |
Virtual Network Functions (VNFs) | VM level (TSDM) or File level or File/DB level |
Tanzu Kubernetes Grid Workload cluster (CNFs) | Namespace and PVC level with application consistency |
The following table shows the backup system components protection.
Backup component | Backup/Restore method |
Backup Staging VM | File level |
Backup Server (PowerProtect Data Manager) | PowerProtect Data Manager disaster recovery process |
PowerProtect DD series appliances | Replication to another DD series appliance or DD series appliance in Cyber Recovery vault |
Protecting management/workload cluster components and VNFs using image-level or file system backup
The management and workload cluster vCenter servers are integrated with Data Manager and discovered as an asset source after being registered with PowerProtect Data Manager. PowerProtect Data Manager discovers the management workload domain components and application workload (VNFs) as virtual-machine assets for protection. Data Manager can protect VMware virtual machines in a reliable and efficient manner using the Transparent Snapshot Data Mover (TSDM) mechanism. Transparent Snapshots simplifies VM image backups for near-zero impact to your VMs or VM resources – and it works with any VMware supported storage. For more details about TSDM, see the technical white paper PowerProtect Data Manager: VMware Virtual Machine Protection Using Transparent Snapshots.
Protecting TKG cluster workloads (CNFs)
With PowerProtect Data Manager, the Tanzu Kubernetes Grid cluster workloads, such as namespaces and Persistent Volume Claims (PVCs) on Telco Cloud Platform, are protected efficiently using the Velero component and cProxy pod (data mover). When the Tanzu Kubernetes Grid cluster is added as an asset source in PowerProtect Data Manager and discovery is complete, the associated namespaces are available as assets for protection. The PowerProtect Data Manager supports agentless, application-consistent backups of database applications that reside in Kubernetes pods. The PowerProtect Data Manager provides a standardized way to quiesce a supported database, back up the data from that database, and then return the database to operation.
Protecting the SFTP server (Staging VM)
For file level-based backup of VMware Telco Cloud Platform components, the respective VMware Telco Cloud Platform management and compute workload component dump is created and sent to an SFTP target (staging VM). Later, the SFTP target (staging VM) is protected using a file system agent-based backup method with PowerProtect Data Manager.
Dell Technologies enables you to simplify the experience of adopting modern data protection. PowerProtect Data Manager enables users to protect, manage, and recover data in on-premises, virtualized, and cloud deployments. This platform provides centralized governance that helps mitigate risk and assures compliance of SLAs and SLOs through simple protection workflows. PowerProtect Data Manager is one of the effective solutions to protect VMware vSphere components and application workload data on VMware Telco Cloud Platform.
Note: This document focuses on protecting the CNFs and VNFs on VMware Telco Cloud Platform infrastructure, however it can also be used to protect other VNFs and CNFs as well as VMware components outside of the VMware Telco Cloud Platform infrastructure.
Assurance provided by OTEL
The Open Telecom Ecosystem Lab (OTEL) accelerates and simplifies the creation of an open, modern telecom ecosystem. By validating complex technical solutions through our virtual and physical OTEL labs, we’re helping partners reduce the costs and risk of deployment while opening new 5G and cloud native opportunities.
OTEL offerings driving the open 5G opportunity:
- Partner/Industry Certification -- Self-Certification that enables independent software vendors to de-risk deployments and make the ecosystem consumable. Also, Joint-Certification improves outcomes and business value by verifying ecosystem partner compatibility.
- Solution Validation -- End-to-end CSP and telecom partner solution validation, life-cycle management, and enhanced service support.
- Proof of Concept -- Work with partners and CSPs to develop early evaluation and sand box development to drive ecosystem adoption.
- Demonstration and Training -- Showcase new capabilities and support technical training activities.
To learn more about our Open Telecommunication Ecosystem Lab please see additional resources at: OTEL (Open Telecom Ecosystem Labs).
Technical References
The following Dell Technologies resources provide additional information about PowerProtect Data Manager:
The following VMware resources provide additional information about VMware Telco Cloud Platform:
The following Dell Technologies resources provide additional information about OTEL and VMware Telco Cloud Platform:

Dell PowerStore: Persistent Data Availability
Tue, 09 May 2023 23:21:16 -0000
|Read Time: 0 minutes
Summary
At Dell Technologies, storage solutions are architected for reliability, availability, and serviceability (RAS) as part of their design. Dell storage products also include redundant hardware components and intelligent software architected to deliver extreme performance and availability—simultaneously. This combination results in unparalleled operational durability, while also leveraging components in new ways that decrease the total cost of ownership of each system.
Data availability
Today’s business-critical application environments demand solutions which offer availability that is expressed in more than a simple number-of-nines of availability. While Dell PowerStore is designed for 99.9999% availability[1], there is more to availability than only the probability that a system will be operational during a defined period. There are also required features and automated processes that must be considered which enable non-disruptive operations so that the environment is persistent. These considerations provide the best opportunity for high availability and zero downtime.
All Dell storage solutions can incorporate onboard and interoperable data protection functionality such as remote replication and snapshots of data, used to deliver nonstop business continuity. Solutions can also include intelligent software which automates the processes which are needed to seamlessly operate an always-on environment.
Dell Technologies combines storage solutions architected for RAS, comprehensive remote replication technologies, local snapshot technologies, and intelligent software which helps automate data center operations. This combination results in solutions which go beyond just a bunch of nines to an always-on, persistent-data-availability environment.
Persistent solutions require that there be no single point of failure in the entire environment. This requirement spans the entire application infrastructure—from the hosts to the switches, to the storage, and to the data center itself. This means there must be complete redundancy end to end, and automation to detect and handle various fault conditions. For example, all the application components in a data center could be designed for the highest levels of availability. However, if a power-loss event occurs within the building or within the local region, the application could become unavailable unless redundancy is included at the data-center level.
High availability hardware resiliency
PowerStore appliances support clustering which allows for multi-appliance configurations, and each appliance has its own independent fault tolerance. Also, a single PowerStore appliance is a fully unified block and file environment packaged into a single 2U enclosure. Each PowerStore within the cluster consists of two nodes that make up a high availability (HA) pair. PowerStore appliances feature both fully redundant hardware and highly available software features. These features keep the system online if there are component failures, environmental failures, and even simultaneous failures of multiple components such as an internal fan and a disk drive. You can replace hardware using the redundant node architecture, keeping the system and data online and available.
PowerStore has a dual-node architecture where each node is identical, giving the ability to serve I/O in an active/active manner. Active/active capabilities increase hardware efficiency since there is no requirement for idle-standby hardware. In this way, PowerStore efficiently makes full use of all available resources through a highly redundant architecture. If SAN or IP network port connectivity is lost, the system uses redundant port connections, allowing hosts and clients to maintain access to the data. Also, dual-ported hard drives ensure that each node has seamless connectivity to the data.
PowerStore protects data writes using redundant shared write cache that is used by both nodes simultaneously. For PowerStore 1000 to 9200 appliances, any incoming I/O that is determined to be a write is stored in DRAM memory. Then, it is copied to the NVMe NVRAM drives so that each node in the appliance can access the data. In PowerStore 500 appliances, since NVRAM drives are not supported, write I/Os are mirrored to DRAM memory in each node. This ability enables the write cache to be preserved through hardware and software faults, and node reboots.
Also, if there is a power outage or temperature alarm on both nodes, the integrated battery backup unit (BBU) provides temporary power to the system, allowing the cache to be de-staged.
High availability software features
Dynamic Resiliency Engine (DRE) is a 100% software-based approach to redundancy that is more distributed, automated, and efficient than traditional RAID. It meets RAID 6 and RAID 5 parity requirements with superior resiliency and at a lower cost. This feature ensures enterprise-class availability by achieving faster drive-rebuild times with distributed sparing. DRE rebuilds smaller chunks of the drive simultaneously to multiple drives in the appliance. Intelligent allocation of unused user space is designed to replenish spare space for handling multiple drive failures automatically. Rebuild speeds are calculated intelligently when there is incoming I/O to ensure performance and availability during rebuild. DRE allows for flexible configurations that can lower TCO by expanding storage with a single drive at a time or by adding different drive sizes based on storage needs. Introduced with PowerStoreOS 2.0, the benefit of double-drive-failure tolerance further increased the number of concurrent failed drives that the system could withstand.
Active/active architecture allows for configuring paths across nodes for both iSCSI Ethernet and FC configurations using SCSI and NVMe protocols. For multipathing, you can use software such as Dell PowerPath on your hosts to use the full multipathing capabilities of PowerStore. Active/active architecture ensures host I/O requests use the active optimized path for best performance. In the rare event that the host loses the active optimized path, the host will switch over to the active non-optimized path where the I/O request will be processed locally by the PowerStore node.
Snapshots are supported on block and file resources (volumes, volume groups, virtual machines, file systems, and thin clones). Snapshots ensure the availability of critical data with near-immediate reverts to a previous, known-good recovery point, if there is an accidental deletion or malware outbreak. You can configure snapshot rules to support a wide range of recovery point objectives. Starting in PowerStoreOS 3.5, the secure snapshot setting can be enabled for snapshots on volumes and volume groups. Snapshot Rules can also be configured to create secure snapshots automatically. With secure snapshots enabled, the snapshots and parent resource are protected from accidental or malicious deletion and serve as a cost-effective line of defense against ransom attacks. If an unauthorized user gains access to a system, the attacker cannot delete secure snapshots and cause data loss.
Native replication is supported for file servers, block resources (volumes, volume groups, and thin clones), and VMs based on VMware vSphere Virtual Volumes (vVols). Native replication uses a TCP-based protocol to transfer data between two PowerStore clusters over Ethernet. You can apply replication rules on a policy basis to provide various recovery point objectives for your storage resources. For file and block resources, you can set up the policy in PowerStore Manager. vVol-based VMs are protected through VMware Storage Policies and VMware SRM (Site Recovery Manager).
Metro Volume is a replication feature that allows synchronously replicated active/active block volumes spanning across two PowerStore clusters. Bi-directional I/O synchronization provides active concurrent host I/O on participating systems. Integrated self-healing reprotects the Metro Volume after a failure scenario. PowerStore supports uniform and non-uniform host access in a vSphere Metro Storage Cluster configuration.
Native PowerProtect DD backup integration, available since PowerStoreOS 3.5, provides a simplified native backup solution for volumes and volume groups. By configuring remote backup sessions from PowerStore Manager, users can quickly backup resources, retrieve remote snapshots, and initiate instant access sessions. Instant access allows the host to view the contents of a remote snapshot without retrieving the data back to the PowerStore system -- instantly accessing deleted, corrupted, or modified data within the snapshot and copying it back to the host for quick recovery. Users can also discover and retrieve snapshot backups created on a different PowerStore cluster.
File-Level Retention (FLR) protects file data from deletion or modification until a specified retention date. PowerStore supports FLR-Enterprise (FLR-E) and FLR-Compliance (FLR-C). FLR-C has other restrictions and is designed for companies that need to comply with federal regulations (SEC rule 17a-4(f)).
Fail-Safe Networking (FSN), introduced in PowerStoreOS 3.5, provides a switch agnostic high availability solution for NAS interfaces. With FSN, users can eliminate single points of failure (ports, cables, switch, and so on) by linking ports together in an active/passive configuration. FSN is flexible because it can work alone or with user-defined Link Aggregations (LA).
Common Event Publishing Agent (CEPA) delivers SMB and NFS file and directory event notifications to a server, enabling third-party applications parse and control them. You can employ this ability for use cases such as detecting ransomware, managing user access, configuring quotas, and providing storage analytics. The event-notification solution consists of a combination of the PowerStore, Common Event Enabler (CEE) CEPA software, and a third-party application.
Clustering provides the ability to scale up and scale out appliances independent of one another while being managed from a single management interface. This flexible deployment model enables PowerStore to start small with a single appliance configuration, and grow into a larger cluster by simply adding appliances online. As part of clustering, we also support non-disruptive migrations of volumes within the cluster.
VMware integration is deep and rich with PowerStore. When administrators are using virtual machines on the PowerStore system, native VMware features such as vSphere High Availability (HA) are automatically enabled to ensure virtual machines remain available if there is an outage. Administrators can enable other features, such as VMware Fault Tolerance (FT), to guarantee the highest levels of availability. PowerStoreOS 3.0 introduces support for a VMware File System on PowerStore, optimized for VMware environments as NFS shared datastores.
Performance metrics in historical and real-time views enable monitoring for anomalies and troubleshooting performance issues. This allows administrators to monitor their environment and be proactive in preventing potential outages. Performance metrics are fully integrated into the PowerStore environment allowing for ease of use and customization.
Performance policies can be applied to block-level resources (volumes, volume groups, vVols, and thin clones) based on a high, medium, or low setting. Applying these policies to the storage objects help prioritize I/O requests to different hosts and applications. For example, a storage administrator may apply a high setting for a volume that is used by a database application such as Microsoft SQL Server. However, for other applications such as a test/dev vVol, the administrator may choose a low setting.
Non-disruptive upgrades to target PowerStoreOS software ensure the best possible resilience when it comes to PowerStore software and feature functionality. This is accomplished by upgrading one node at a time and ensuring all resources are running on the node not undergoing the upgrade. PowerStore also comes with anytime upgrade options which protect the customer’s investment if they want to upgrade their hardware model.
CloudIQ and SupportAssist configurations enable proactive awareness of system health and performance and provide a holistic view of multiple storage systems regardless of if they are on the same network. SupportAssist allows for direct connection to support with automated service requests for hardware and software faults, and remote connection to the array for faster troubleshooting and resolution.
Configuring a high availability environment
A best practice for a highly available storage environment is to define, implement, and regularly test a business-continuity, data-availability, and disaster-recovery plan. Be sure to fully understand the implications of global settings and their impact on system operation, and always record the original settings before making any configuration changes.
Besides resilient LAN and WAN infrastructures and a redundant environment (power and cooling), having out-of-band access to and remote power control of all nodes and switches is invaluable when administering clustered systems. In a worst-case scenario, if a cluster loses power, the write cache is battery protected and destaged to preserve any in-flight uncommitted writes to maintain write consistency.
Block guidance: Use redundant network switches at both edge and core connections to maximize path availability. Use native asynchronous block replication whenever there is a requirement for disaster recovery. Include snapshot rules in the protection policy for point in time recovery.
File guidance: For PowerStore T model appliances, file services can run on the first two ports of the 4-port card known as the system bond, or any other link aggregation configured in PowerStore Manager. To ensure these ports have optimal performance and fault tolerance, we recommend configuring multi-chassis link aggregation group (MC-LAG) on the network switches. For example, on Dell switches, an administrator should configure Virtual Link Trunking (VLT). Include snapshot rules in the protection policy for point in time recovery. Enable native asynchronous file replication which should be used whenever there is a requirement for disaster recovery. To meet compliance criteria for certain files, enable file-level retention which will protect files from modification and deletion during the retention period. To protect your data against ransomware attacks, configure CEPA for inline data protection.
Resiliency products: Using products such as PowerStore metro node or Dell VPLEX in front of PowerStore hardware enables the highest possible uptime for all block configurations. PowerStore metro node or Dell VPLEX as a storage-virtualization layer, replicates data across two PowerStore appliances in the same data center or across metro distance data centers to increase data availability. This extra layer of separation provides extra fault tolerance.
With VPLEX, PowerStore volumes are mirrored, always mounted read/write, and synchronized through VPLEX local/metro, providing continuous availability to hosts in the event one of the PowerStore systems becoming unavailable.
Measuring availability
To determine your storage system’s lifetime data availability, we measure the percentage of time the storage system is operational—or servicing user read/write operations. The data we collect is modeled using product redundancy features, parts replacement rates, mean time to restore a hardware failure, and defined service support levels. Because of the redundancy and concurrent maintenance philosophy built into every Dell storage product, most of the system issues and subsequent repairs and replacements will not affect your overall system availability.
In other words, we view data availability along with system durability from a total quality engineering perspective across all aspects of the array with your data environment. In doing so, Dell Technologies continuously brings you closer to 100% data availability.
By configuring your environment to maintain the highest availability, we also measure our ability to deliver on that promise. Through ongoing monitoring by Dell Technologies using SupportAssist and CloudIQ features, we can determine field reliability and availability which is an integral part of the total customer experience. Throughout this monitoring process, all unplanned-outage events are analyzed by engineering and service personnel to identify root-causes, and the findings are used towards continuous improvement of product, process, and personnel.
Dell Technologies can deliver on our promise of delivering you persistent data availability.
Other resources
See the following resources on the Dell Technologies Info Hub:
- Dell PowerStore: Introduction to the Platform
- Dell PowerStore: Clustering and High Availability
- Dell PowerStore: Virtualization Integration
- Dell PowerStore: File Capabilities
- Dell PowerStore: Replication Technologies
- Dell PowerStore: Metro Volume
- Dell PowerStore: Technical Primer
- Dell VPLEX Overview and General Best Practices
- Dell PowerStore: Snapshots and Thin Clones
[1] Based on the Dell Technologies specification for Dell PowerStore, April 2020. Actual system availability may vary.