SANtricity 11 Manuals (CA08872-010)
Requirements for using mirroring
If you plan to configure mirroring, keep the following requirements in mind.
Unified Manager
-
The Web Services Proxy service must be running.
-
Unified Manager must be running on your local host through an HTTPS connection.
-
Unified Manager must be showing valid SSL certificates for the storage system. You can accept a self-signed certificate or install your own security certificate using Unified Manager and navigating to Certificate > Certificate Management.
Storage systems
Synchronous is not available on the HB1000 series, AB6100 or AB3100 storage system. |
-
You must have two storage systems.
-
Each storage system must have two controllers.
-
The two storage systems must be discovered in Unified Manager.
-
Each controller in both the primary array and secondary array must have an Ethernet management port configured and must be connected to your network.
-
The storage systems have a minimum firmware version of 8.60. (They can each run different OS versions.)
-
You must know the password for the local and remote storage systems.
-
You must have enough free capacity on the remote storage system to create a secondary volume equal to or greater than the primary volume that you want to mirror.
-
Asynchronous mirroring is supported on controllers with Fibre Channel (FC) or iSCSI host ports, while synchronous mirroring is supported only on controllers with FC host ports.
Connectivity requirements
Mirroring through an FC interface (asynchronous or synchronous) requires the following:
-
Each controller of the storage system dedicates its highest numbered FC host port to mirroring operations.
-
If the controller has both base FC ports and host interface card (HIC) FC ports, the highest numbered port is on a HIC. Any host logged on to the dedicated port is logged out, and no host login requests are accepted. I/O requests on this port are accepted only from controllers that are participating in mirroring operations.
-
The dedicated mirroring ports must be attached to an FC fabric environment that supports the directory service and name service interfaces. In particular, FC-AL and point-to-point are not supported as connectivity options between the controllers that are participating in mirror relationships.
Mirroring through an iSCSI interface (asynchronous only) requires the following:
-
Unlike FC, iSCSI does not require a dedicated port. When asynchronous mirroring is used in iSCSI environments, it is not necessary to dedicate any of the storage system’s front-end iSCSI ports for use with asynchronous mirroring; those ports are shared for both asynchronous mirror traffic and host-to-array I/O connections.
-
The controller maintains a list of remote storage systems with which the iSCSI initiator attempts to establish a session. The first port that successfully establishes an iSCSI connection is used for all subsequent communication with that remote storage system. If communication fails, a new session is attempted using all available ports.
-
iSCSI ports are configured at the array level on a port-by-port basis. Intercontroller communication for configuration messaging and data transfer uses the global settings, including settings for:
-
VLAN: Both local and remote systems must have the same VLAN setting to communicate
-
iSCSI listening port
-
Jumbo frames
-
Ethernet priority
-
The iSCSI intercontroller communication must use a host connect port and not the management Ethernet port. |
Mirrored volume candidates
-
RAID level, caching parameters, and segment size can be different on the primary and secondary volumes of a mirrored pair.
For AB6100 and AB3100 controllers, the primary and secondary volumes of an asynchronous mirrored pair must match the same protocol, tray level, segment size, security type, and RAID level. Non-eligible asynchronous mirrored pairs will not appear in the list of available volumes. -
The secondary volume must be at least as large as the primary volume.
-
A volume can participate in only one mirror relationship.
-
For a synchronous mirrored pair, the primary and secondary volumes must be standard volumes. They cannot be thin volumes or snapshot volumes.
-
For synchronous mirroring, there are limits to the number of volumes that are supported on a given storage system. Make sure that the number of configured volumes on your storage system is less than the supported limit. When synchronous mirroring is active, the two reserved capacity volumes that are created count against the volume limit.
-
For asynchronous mirroring, the primary volume and the secondary volume must have the same Drive Security capabilities.
-
If the primary volume is FIPS capable, the secondary volume must be FIPS capable.
-
If the primary volume is FDE capable, the secondary volume must be FDE capable.
-
If the primary volume is not using Drive Security, the secondary volume must not be using Drive Security.
-
Reserved capacity
Asynchronous mirroring:
-
A reserved capacity volume is required for a primary volume and for a secondary volume in a mirrored pair for logging write information to recover from controller resets and other temporary interruptions.
-
Because both the primary volume and the secondary volume in a mirrored pair require additional reserved capacity, you must ensure that you have free capacity available on both storage systems in the mirror relationship.
Synchronous mirroring:
-
Reserved capacity is required for a primary volume and for a secondary volume for logging write information to recover from controller resets and other temporary interruptions.
-
The reserved capacity volumes are created automatically when synchronous mirroring is activated. Because both the primary volume and the secondary volume in a mirrored pair require reserved capacity, you must ensure that you have enough free capacity available on both storage systems that are participating in the synchronous mirror relationship.
Drive Security feature
-
If you are using secure-capable drives, the primary volume and the secondary volume must have compatible security settings. This restriction is not enforced; therefore, you must verify it yourself.
-
If you are using secure-capable drives, the primary volume and the secondary volume should use the same drive type. This restriction is not enforced; therefore, you must verify it yourself.
-
If you are using Data Assurance (DA), the primary volume and the secondary volume must have the same DA settings.