Redp 5670
Redp 5670
Redp 5670
Redpaper
Draft Document for Review May 12, 2022 3:11 pm SV3ProductGuide.fm
Data centers often contain a mix of storage systems. This situation can arise as a result of
company mergers or as a deliberate acquisition strategy. Regardless of how they arise, mixed
configurations add complexity to the data center. Different systems have different data
services making it difficult to move data from one to another without updating automation.
Different user interfaces increase the need for training and may make errors more likely.
Different approaches to hybrid cloud complicate modernization strategies. And multiple
different systems mean more silos of capacity that lead to inefficiency.
To simplify the data center and to improve flexibility and efficiency in deploying storage,
enterprises of all types and sizes turn to IBM SAN Volume Controller, which is built with IBM
Spectrum Virtualize software, which simplifies infrastructure and eliminates differences in
management, function, and even hybrid cloud support.
IBM SVC introduces a common approach to storage management, function, replication, and
hybrid cloud that is independent of storage type. It's the key to modernizing and revitalizing
your storage, but is as easy to understand as A, B, C...
IBM SVC provides a rich set of software-defined storage (SDS) features that are delivered by
IBM Spectrum Virtualize, including the following:
Data reduction and deduplication
Dynamic tiering
Thin-provisioning
Snapshots
Cloning
Replication and data copy services
Data-at-rest encryption
Cyber resilience
Transparent Cloud Tiering
IBM HyperSwap® including 3-site replication for high availability (HA)
Each Model SV3 engine has two 2.4 GHz Intel Ice Lake CPUs with 24 cores. Up to 1.5 TB of
memory can be configured, so that in a maximum sized cluster, you can leverage the
performance and efficiency of 12 terabytes of memory and up to 32 petabytes of storage. IBM
SAN Volume Controller Model SV3 supports host attachment by using 16/32 Gbps Fibre
Channel, and 10/25 Gbps and 100 Gbps Ethernet with iSCSI and NVMe Remote Direct
Memory Access (RDMA) options.
Agile integration
The IBM SVC system has the following agile characteristics:
Fully integrated system management.
Application-aware data services.
Advanced Encryption Standard (AES) data-at-rest encryption.
Tiering or mirroring to existing and/or Public Cloud storage.
Mixed workload consolidation.
Non-disruptive data migrations.
Concurrent code load.
By accelerating applications, both physical and virtual, the IBM SVC system can help
organizations reduce costs, increase revenue, and improve customer satisfaction for all types
of applications, including the following categories:
Transactional.
Enterprise resource planning (ERP) and supply chain management.
Big data and analytics.
Server and desktop virtualization.
Cloud native.
Hybrid and multicloud
AI-empowered
IBM SVC has the following AI characteristics:
AI-based data placement for optimal data center performance and zero-downtime data
migration.
IBM Storage Insights: AI-empowered predictive analytics, storage resource management,
and a support platform delivered over the cloud.
Multicloud enabled
IBM Spectrum Virtualize on premises and IBM Spectrum Virtualize for Public Cloud together
support mirroring between on-premises and cloud data centers or between cloud data
centers. These functions can be used to:
Migrate data between on-premises and public cloud data centers or between public cloud
data centers. Enjoy consistent data management between on-premises storage and the
public cloud.
Implement disaster recovery strategies between on-premises and public cloud data
centers.
Enable cloud-based DevOps with easy replication of data from on-premises sources.
Improve cyber resilience with copies on AWS using "air gap" snapshots to S3 and IBM
Safeguarded Copy on Microsoft Azure.
Clients can create hybrid multicloud solutions for their traditional block data and workloads by
using built-in IP replication capabilities.
Deploy IBM Spectrum Virtualize for Public Cloud on AWS directly from AWS Marketplace
through a predefined Cloud Formation Template that automatically and securely installs the
software, and deploys a high availability two-node cluster on selected EC2 instances. Any
Amazon EBS block storage can be attached.
On Azure, deploy directly from the Azure Apps Marketplace through predefined Azure
Resource Manager templates that automatically and securely install the software, and deploy
a high availability two-node cluster on selected Azure VMs. Attach shared Azure Managed
Disk SSDs to the cluster for high availability.
On IBM Cloud®, automated installation scripts assist deployment of the software on bare
metal servers. IBM Performance or Endurance block storage is supported behind the cluster.
This setup enables clients to create clustered configurations like on premises while bringing
the optimization and virtualization capabilities of IBM Spectrum Virtualize to public cloud
infrastructures.
IBM Spectrum Virtualize on premises and IBM Spectrum Virtualize for Public Cloud together
enable a hybrid multicloud deployment with a single data management layer between on
premises systems and the cloud across heterogeneous storage pools that might exist in the
data center. IBM Spectrum Virtualize provides the following functions:
Storage pooling and automated allocation with thin provisioning.
Easy Tier® automated tiering.
Deduplication and compression to reduce cloud storage costs.
FlashCopy® and remote mirror for local snapshots and remote replication
IBM Safeguarded Copy for Cyber Resiliency.
Support for virtualized and containerized server environments including:
– VMware
– MicrosoftHyper-V
– IBM PowerVM®
– Red Hat OpenShift
– CRI-O
– Kubernetes
3
SV3ProductGuide.fm Draft Document for Review May 12, 2022 3:11 pm
With Safeguarded Copy, the IBM adds a line of defense against cyber threats by protecting
your valued data from cyberattacks with immutable and isolated copies that are hidden, non-
addressable and cannot be altered. In the event of an attack, these copies can be quickly
restored to support recovery. Customized to your particular application mix, IBM
FlashSystem® Cyber Vault builds on IBM Safeguarded Copy to help reduce cyber attack
recovery times.
A Cyber Vault solution runs continuously and monitors snapshots as they are created
automatically by Safeguarded Copy. Using standard database tools and automation software,
Cyber Vault checks Safeguarded Copy snapshots for corruption. If Cyber Vault finds such
changes, that is an immediate sign that an attack might be occurring.
When preparing a response, knowing the last snapshots with no evidence of an attack
speeds determining which snapshot to use. And since Safeguarded Copy snapshots are on
the same storage as operational data, recovery is very fast using the same snapshot
technology. With these advantages, Cyber Vault is designed to help reduce cyberattack
recovery time from days to just hours.
It is highly scalable, which provides an easy growth path to two-n nodes (grow in a pair of
nodes due to the cluster function).
It is SAN interface-independent. It supports Fibre Channel (FC), FC-NVMe, iWARP,
RoCE, Fibre Channel over Ethernet (FCoE), and internet Small Computer Systems
Interface (iSCSI). It also is open for future enhancements.
It is host-independent for fixed block-based Open Systems environments.
It is external storage system independent, which provides a continuous and ongoing
process to qualify more types of storage systems.
Figure 1 shows the IBM SAN Volume Controller SV3 enclosure front view.
Two IBM SAN Volume Controller SV3 enclosures are clustered together to form an I/O
group. They are sold in pairs of enclosures to ensure redundancy serving the virtualized
storage arrays that they control. Up to 4 I/O groups can be clustered together, which is a total
on 8 IBM SAN Volume Controller SV3 enclosures working together.
The IBM SAN Volume Controller SV3 enclosure consists of the following machine types and
models:
2145-SV3 - IBM SAN Volume Controller SV3 enclosure (12 months warranty).
2147-SV3 - IBM SAN Volume Controller SV3 enclosure (36 months warranty).
The 2147-SV3 is sold with Enterprise Class Support (ECS) which is an enhanced service
offering, in addition to the normal warranty level.
Note: SAN Volume Controller 2147-SV3 nodes can be clustered with SAN Volume
Controller 2145-SV3 nodes only if the additional IBM Support Terms and Conditions
service that upgrades SAN Volume Controller 2145-SV3 to the equivalent SAN Volume
Controller 2147-SV3 is purchased.
Figure 2 on page 6 shows the SAN Volume Controller SV3 detailed rear view.
5
SV3ProductGuide.fm Draft Document for Review May 12, 2022 3:11 pm
For more information about configuration and limit restrictions, see these IBM Support pages:
V8.5.0.x Configuration Limits and Restrictions for IBM System Storage SAN Volume
Controller.
Note: IBM SAN Volume Controller SV3 does not support any type of expansion encloures.
The IBM SVC Model SV3 nodes can be used to in the following scenarios:
Externally virtualizing IBM and/or non-IBM storage by using IBM Spectrum Virtualize,
which extends advanced functions (such as data reduction, encryption, and replication) to
those storage subsystems. This enables all the externally virtualized storage to be used
as:
– First tier storage repository for production data.
– Primary or target systems for Data Replication or disaster recovery.
– Multiple tiers of storage based on drive media types such as hard disk drives (HDDs),
commodity SSDs, NVMes, or SCMs.
Data migration from IBM and/or non-IBM storage with IBM Spectrum Virtualize.
Hybrid cloud storage by:
– Enabling communication between an on-premises deployment of IBM Spectrum
Virtualize and IBM Spectrum Virtualize for Public Cloud.
– Deploying the Container Storage Interface (CSI) driver for Red Hat OpenShift
Container Platform to provide persistent storage for on-premises or cloud-based
containerized applications.
– Using Transparent Cloud Tiering (TCT) to convert data into an object store for back up
to certain available cloud instances.
Support and interoperability within the IBM Spectrum Storage Software Suite including:
– IBM Spectrum Scale where the storage systems that are virtualized behind the IBM
SVC Model SV3 nodes can be used as the back-end storage repository for metadata,
primary data and/or in initial microprogram load (IML) processing.
– IBM Spectrum Protect and IBM Spectrum Protect Plus where the storage systems that
are virtualized behind the IBM SVC Model SV3 nodes can be used as cache or data
repository.
– IBM Copy Data Management where the storage systems virtualized behind the IBM
SVC Model SV3 nodes can be used as cache or as a copy services target.
Figure 3 shows a pair of IBM SVC Model SV3 nodes that are fully deployed in a hybrid
multicloud environment where they are also externally virtualizing various on-premises
storage subsystems.
The IBM SVC Model SV3 nodes can support multiple Open System hosts and interoperability
with all the software from the IBM Spectrum Suite of products.
Figure 3 Fully deployed IBM SAN Volume Controller Model SV3 single node pair in sample scenario
7
SV3ProductGuide.fm Draft Document for Review May 12, 2022 3:11 pm
– Easy access and compatibility with IBM Storage Insights, which offers advanced
performance monitoring for back-end storage that is virtualized behind an IBM SAN
Volume Controller cluster.
– Additional access security through multi-factor authentication.
9
SV3ProductGuide.fm Draft Document for Review May 12, 2022 3:11 pm
Secure Drive Erase, which is the ability to completely erase any customer data from a
NVMe, SAS SSD, or HDD before it is removed from the control and expansion enclosure.
As of Spectrum Virtualize 8.5.0, it will no longer be allowed for more than a single DRAID
array made of compressing drives in the same storage pool.
Highlights
IBM Spectrum Virtualize 8.5 delivers support for SVC Model SV3 for machine types 2145 and
2147.
This release provides all of the advanced software functionality of IBM Spectrum Virtualize
software to Spectrum Virtualize SV3 hardware, adding NVMe Remote Direct Memory Access
(RDMA) support and multifactor authentication.
While your Software Subscription and Support is in effect, IBM provides you assistance for
your routine, short duration installation and usage (how-to) questions, and code-related
questions. IBM provides assistance by telephone and, if available, electronic access, only to
your information systems (IS) technical support personnel during the normal business hours
(published prime shift hours) of your IBM support centre. (This assistance is not available to
your end users.) IBM provides Severity 1 assistance 24 hours a day, every day of the year.
Technical Account Manager will serve as the key client interface for in-scope hardware and
software, delivering partnership and consultancy, as well as direct engagement on high-
priority support cases.
11
SV3ProductGuide.fm Draft Document for Review May 12, 2022 3:11 pm
Flash media is covered for all workloads while under warranty or maintenance.
Migration:
– IBM Flash Momentum - Storage Upgrade Program:
Replace your controller and storage every three years with full flexibility.
– Cloud-like pricing:
Storage Utility pricing features monthly payments for only the storage that you use.
– No cost migration
A total of 90 days no-cost data migration from over 500 storage controllers, IBM, and
non-IBM.
For more information about the IBM FlashWatch offering, see IBM FlashWatch FAQ.
The IBM FlashWatch offering is applicable across the IBM Spectrum Virtualize family, with the
Product Matrix in the FAQ detailing the elements that are applicable against which product.
IBM strongly recommends that all customers install and use this no-charge, cloud-based IBM
application, because it provides a single dashboard that provides a clear view of all your IBM
block storage. You can make better decisions by seeing trends in performance and capacity.
With storage health information, you can focus on areas that need attention, and when IBM
support is needed, IBM Storage Insights simplifies uploading logs, speeds resolution with
online configuration data, and provides an overview of open tickets all in one place.
In addition to the no-charge version of IBM Storage Insights, IBM also offers IBM Storage
Insights Pro, which is a subscription service that provides longer historical views of data,
more reporting and optimization options, and supports IBM file and block storage with EMC
VNX and VMAX.
Customer dashboard
Figure 4 on page 13 shows a view of the IBM Storage Insights main dashboard and the
systems that it monitors.
For more information about dashboard displays, see “IBM Storage Insights: Information and
registration” on page 13.
For more information about the architecture and design overview of IBM Storage Insights, see
Implementation Guide for IBM Spectrum Virtualize Version 8.5, SG24-8520.
13
SV3ProductGuide.fm Draft Document for Review May 12, 2022 3:11 pm
IBM Spectrum Control Connect provides insight and awareness about the configuration
capabilities, storage health, and events of a storage system regarding VMware and vSphere.
With this capability, VMware administrators can independently and centrally manage their
storage resources on IBM storage systems.
The ECS offering provides the following key enhancements to the product base 3-year
warranty terms and conditions:
IBM Technical Advisor to proactively improve problem management and communication
Software and product installation
Configuration support
Onsite and remote software updates, with up to six times during the warranty period
Enhanced response times for high severity problems
During the warranty period, and with a current active software maintenance agreement, the
client is entitled to enhanced response times for Severity 1 problems. IBM also provides an
IBM Service Support Representative (IBM SSR) to perform onsite product setup and
installation. In addition, the IBM SSR or IBM Remote Support Center performs up to six
software updates during the warranty period.
IBM Technical Advisor support is provided during the warranty period. This support enhances
end-to-end support for the client’s complex IT solutions. IBM Technical Advisor uses an
integrated approach for coordinated, cross-team support to enable clients to maximize IT
availability.
IBM Technical Advisor works with clients, sales teams, and IBM Business Partners to ensure
that the Technical Delivery Assessment (TDA) checklist and site planning steps are complete.
Also, with the 3-year warranty, IBM Technical Advisor proactively plans the software updates,
which ensure that workstation, network access, user ID, and software download steps are
complete before deploying the IBM SR or IBM Remote Support Center to perform the
software update.
You can access the GUI by opening any supported web browser and entering the
management IP addresses. You can connect from any workstation that can communicate
with the IBM SVC system. The IBM SVC Control Enclosure is delivered in a two 2U 19-inch
rack-mount enclosure. The IBM SVC system features IBM engineer (SSR) installation as part
of the product offering.
Figure 6 shows the Control Enclosure window. You can open this window by selecting
Monitoring → System Hardware from the left graphical menu.
Figure 6 IBM SAN Volume Controller overview of the control enclosure: One Node
The IBM SAN Volume Controller includes a command-line interface (CLI), which is useful for
scripting, and an intuitive GUI for simple and familiar management of the product. The IBM
SVC supports SNMP email forwarding that uses Simple Mail Transfer Protocol (SMTP), and
syslog redirection for complete enterprise management access.
15
SV3ProductGuide.fm Draft Document for Review May 12, 2022 3:11 pm
By using the GUI, you can quickly deploy storage and manage it efficiently. The GUI runs on
the IBM SVC Control Enclosure; therefore, a separate console is not needed. Point your web
browser to the system IP address, and you can manage all of the Expansion Enclosures from
one place.
The IBM SVC Enclosure node canisters are configured for active-active redundancy. The
node canisters run a highly customized Linux -based operating system that coordinates and
monitors all significant functions in the system.
The node canisters provide a web interface, Secure Shell (SSH) access, and SNMP
connectivity through external Ethernet interfaces. By using the web and SSH interfaces,
administrators can monitor system performance and health metrics, configure storage, and
collect support data, among other features.
The storage configuration includes defining logical units with capacities, access policies, and
other parameters. No software must be installed on host computers to administer the
IBM SVC system beyond a web browser or a standard SSH client.
Supported platforms
The IBM SAN Volume Controller system features extensive interoperability with support for a
wide range of operating systems (including Microsoft Windows Server, Linux, and IBM AIX®
and IBM i), hardware platforms (IBM Power Systems, and x86 & x86_64 servers), host bus
adapters (HBAs), and SAN fabrics. For more information, see the V8.5.0.x Configuration
Limits and Restrictions for IBM System Storage SAN Volume Controller and IBM System
Storage Interoperation Center.
Figure 7 shows the front view of the IBM SAN Volume Controller SV3 enclosure.
The following machine warranties are offered for the IBM SAN Volume Controller SV3 system:
Machine type 2145-SV3 with a 12-month warranty
Machine type 2147-SV3 with a 36-month warranty and additional Enterprise Class
Support
The IBM SAN Volume Controller SV3 enclosure includes integrated AC power supplies
(PSU). These batteries supply power to the enclosure during a sudden power loss or failure
so that the system can correctly commit all transactions to the external virtualized storage
medium.
The IBM SAN Volume Controller SV3 enclosure includes the following features:
Two Intel Ice Lake processors running at 2.4 GHz.
512 GB memory standard, with options to increase memory up to 1.5 TB per SVC node
Hot-swappable boot drives.
Built-in hardware-assisted compression acceleration for data reduction pool compression
workloads.
Six I/O card slots with options for 32 Gb FC, and 25 Gb and 100 Gb Ethernet cards.
Two 1 Gb Ethernet ports for management, and a separate service technician port.
Two AC power supplies.
Two hot-swappable batteries.
The ability to cluster existing SVC systems with previous generation SVC Storage Engine
models.
Figure 8 shows a top view of the IBM SAN Volume Controller SV3 enclosure. Highlighted are
the various components of the enclosure and the canister.
Figure 8 Top view of the IBM SAN Volume Controller SV3 enclosure
17
SV3ProductGuide.fm Draft Document for Review May 12, 2022 3:11 pm
Note: The number of PCIe adapters is configurable at product ordering time and can be
added or removed by a sales MES.
Figure 9 shows the rear view of the IBM SAN Volume Controller SV3 enclosure. All
components are concurrently maintainable, except for the passive midplanes. All external
connections are from the rear of the system.
Figure 10 IBM SAN Volume Controller SV3 enclosure detailed rear view
Figure 10 shows the enclosure with two power supply units (PSUs), the canister with three
PCIe G4 interface cages, the two batteries, two boot drives and the technician, USB and
management Ethernet ports.
The PCIe adapters plug into the adapter cages and any unused PCIe adapter slots will have
a blanking plate assembly in place to ensure, and maintain the correct air flow for cooling,
through the canister. There is also a dedicated compression QAT card in the canister.
Note: IBM SAN Volume Controller SV3 does not support any type of expansion encloures.
Scaling capacity and performance is done by expanding the SVC cluster with additional I/O
groups. Up to four I/O groups can form a single SVC cluster. Expanding a SVC cluster
through adding additional nodes and I/O groups is independent of the configured topology.
The capacity expansion is possible through attaching Fibre Channel (FC) and internet Small
Computer Systems Interface (iSCSI) storage systems to virtualize the provided capacity. The
architectural limit is 32 PB in virtualized capacity.
A single I/O group of SV3 nodes is capable of about 7 Million IOPS and >70 GB/s throughput.
Be aware, that all performance that is provided through the SAN Volume Controller is limited
by the actual capabilities of the virtualized backend systems.
Advanced functions
The IBM SAN Volume Controller SV3 system provides several advanced functions:
HyperSwap for IBM SAN Volume Controller SV3
Safeguarded Copy
IBM FlashSystem Cyber Vault
Increased security features
NVMe over Fabrics
Portsets
IP quorum base support
Data reduction tools
N-Port ID virtualization support
VMware integration
External virtualization
Important: Because remote mirroring is used to support the HyperSwap capability, remote
mirroring licensing is a requirement for the use of HyperSwap. For more information, see
“Software and licensing” on page 35.
IBM Spectrum Virtualize software V8.5.0 or higher includes remote mirroring of volumes. IBM
Spectrum Virtualize is used to provide functions for externally virtualized storage.
19
SV3ProductGuide.fm Draft Document for Review May 12, 2022 3:11 pm
The HyperSwap function uses a HyperSwap topology to spread the nodes of the system
across two sites, with storage at a third site that acts as a tie-breaking quorum device.
Consider the following points:
The HyperSwap topology locates both nodes of an I/O group in the same site. Therefore,
to get a volume that is resiliently stored on both sites, at least two I/O groups are required.
The HyperSwap topology uses extra system resources to support a fully independent
cache on each site. This configuration provides full performance, even if one site is lost. In
some environments, a HyperSwap topology provides better performance than a stretched
topology.
The HyperSwap function can now be configured through a new CLI that greatly simplifies
the setup process to a handful of commands. The HyperSwap function also adds the
ability to configure and manage local HyperSwap through the GUI for simpler
configuration and operation.
Hosts and IBM SAN Volume Controller SV3 nodes are in one of two failure domains or
sites.
Volumes are visible as a single object across both sites (I/O groups).
Each primary volume (P) has a secondary volume (S) on the opposite I/O group. The
secondary volumes are not mapped to the hosts. The dual-write to the secondary volumes is
handled by the IBM SAN Volume Controller SV3 HyperSwap function, and is transparent to
the hosts.
The HyperSwap function for IBM SAN Volume Controller SV3 is available with two or more
I/O groups.
You can design a multiple-step CLI-based configuration on a single system by performing
simple object creation through the GUI and CLI.
Data is stored on two sites in parallel.
The maximum distance between sites is 300 km (186.4 miles).
Two independent copies of data are maintained (four if you use extra volume mirroring to
two pools in each site).
HyperSwap uses a standard host multipathing driver.
Cache data is retained if only one site is online.
Automatically synchronizes and resynchronizes copies.
Automatic host-to-storage-system path optimization, based on the host site (requires
Asymmetric Logical Unit Access (ALUA) and Target Port Groups Support (TPGS) support
from the multipathing driver).
Consistent state data is retained during resynchronization for DR.
The maximum number of highly available volumes is 2000.
Requires a remote mirroring license for volumes. Exact license requirements can vary
by product.
Safeguarded Copy
IBM Safeguarded Copy regularly creates isolated (separated from servers) immutable
(unable to be changed) snapshots of data to help protect against cyberattacks, malware, acts
of disgruntled employees, and other data corruption. And since Safeguarded Copy snapshots
are on the same FlashSystem storage as operational data, recovery is designed to be faster
than restoring from copies stored separately.
The system integrates with IBM Copy Services Manager to provide automated backup copies
and data recovery.
High Availability (HA) configurations mitigate against physical component failure and provide
small Recovery Point Objective (RPO) and Recover Time Objective (RTO). Continuous
protection and operation occur in the event of a component failure. Spectrum Virtualize HA
configurations such as HyperSwap and Stretch Cluster provide such protection.
Disaster Recovery (DR) is designed to have a slightly higher RPO and RTO. Therefore, DR is
in a position to provide an airgap to protect against corruption to the data that would be
replicated immediately in a Spectrum Virtualize HA configuration like HyperSwap or Stretch
Cluster. However, since DR solutions at the storage layer are only replicating data, any logical
corruption would eventually get replicated to the DR site as well.
One way to provide adequate protection against logical data corruption is to take periodic
snapshots of the data and to have that data stored in a non-modifiable state that is
inaccessible to administrators, servers, and applications. These Safeguarded copies can then
serve as recovery points from which the data could be restored to a pre-corruption state,
whether that corruption occurred as a result of an errant batch job, a disgruntled employee, or
a ransomware attack.
21
SV3ProductGuide.fm Draft Document for Review May 12, 2022 3:11 pm
The IBM FlashSystem Cyber Vault solution is a blueprint that is implemented by IBM Lab
Services or IBM Business Partners that is designed to help speed cyberattack detection and
recovery.
For more information of IBM FlashSystem Cyber Vault contact your IBM representative or
IBM Business Partner.
Multifactor authentication requires users to provide multiple pieces of information when they
log in to the system to prove their identity. Multifactor authentication uses any combination of
two or more methods, called factors, to authenticate users to your resources and protect
those resources from unauthorized access. The system integrates with IBM Security Verify to
provide multifactor authentication for system users.
Also, available with IBM SAN Volume Controller SV3 is Single-Sign On (SSO). With single
sign-on, users need to provide their credentials only once when they sign in to more systems,
rather than repeatedly providing the credentials for every individual system. The system
supports Microsoft Active Directory Federation Services (AD FS) to provide single sign-on.
Check out the Security Feature Checklist for IBM Spectrum Virtualize, IBM FlashSystem, and
IBM SAN Volume Controller REDP-5678.
This section describes the NVMe protocol and interface as it relates particularly to
flash-based architectures.
The NVMe protocol is an interface specification for communicating with storage devices and it
is functionally the same as other protocols, such as SATA and SAS. However, the NVMe
interface was designed from the ground up for fast storage media, such as flash-based
solid-state drives (SSDs) and low-latency non-volatile storage technologies.
NVMe storage devices are typically directly attached to a host system over a PCI Express
(PCIe) bus and the NVMe controller is contained in the storage device, which alleviates the
need for another I/O controller between the CPU and the storage device. This architecture
results in lower latency, throughput scalability, and simpler system designs.
NVMe over Fabrics (NVMe-oF) overcomes the limitations of the SCSI protocol and the limited
number of concurrent queues by extending the benefits of low latency and high efficiency of
the NVMe technology across network fabrics. This feature supports sharing of NVMe storage
at a large scale (100s or 1000s of devices) and over distance.
Figure 12 on page 23 shows that the NVMe architecture supports many different network
fabric technologies.
The NVMe transport layer can be mapped to different network fabric technologies.
Currently, the NVMe transport layer supports the NVMe over Fabrics by using Fibre Channel
(referred to as FC-NVMe of NVMeFC) main fabric transport.
FC-NVMe uses Fibre Channel Protocol (FCP) as its transport mechanism, which places the
data transfer in control of the target and transfers data direct from host memory, which is
similar to RDMA. In addition, FC-NVMe allows for a host to send commands and data
together (first burst), which eliminates the first data “read” by the target and provides better
performance at distances.
23
SV3ProductGuide.fm Draft Document for Review May 12, 2022 3:11 pm
The NVMe over Fabrics interface uses the same model of submission and completion queues
as PCIe NVMe. As such, it maintains the same asynchronous submission and completion
model and achieves similar benefits in terms of latency, efficiency, and scalability as the
NVMe technology because of the shortened code paths and lockless concurrency in
multi-core environments.
IBM SAN Volume Controller SV3 supports NVMe protocols by way of the various PCIe
adapters that can be ordered and installed in the control enclosure. For more information
about these options, see “Host I/O connectivity and Expansion Enclosure adapters” on
page 31.
For more information about NVMeoF protocols and architecture, see IBM Storage and the
NVM Express Revolution, REDP-5437.
Portsets
IBM SAN Volume Controller SV3 is prepared for multi tenancy where multiple clients can
share the same storage resources. In multi tenancy environments it may be a requirement
that clients use storage ports that are connected to different networks to isolate traffic from
other clients.
Portsets are groupings of logical addresses that are associated with the specific traffic types.
The system supports IP portsets for host attachment, backend storage connectivity, and IP
replication traffic. In addition, Fibre Channel portsets can be configured for host attachment.
After you create portsets and assign IP addresses, you can assign hosts, host clusters, and
IP partnerships to the portset for those traffic types.
A quorum device is also used to store a backup copy of important system configuration data.
Just over 256 MB is reserved for this purpose on each quorum device.
A system can have only one active quorum device that is used for a tie-break situation.
However, the system uses up to three quorum devices to record a backup of system
configuration data to be used if a disaster occurs. The system automatically selects one
quorum device to be the active quorum device.
For more information about configuring quorums disks within two or three sites, see
Configuring quorum.
Note: Fibre Channel over IP (FCIP) connectivity is not supported between nodes when a
HyperSwap system is configured without the use of inter-switch links (ISLs).
IBM SAN Volume Controller SV3 is supported by the IBM Comprestimator (which is available
as a stand-alone tool and also found in the SAN Volume Controller GUI) and also the
stand-alone Data Reduction Estimator Tool (DRET). This DRET tool is a host-based
application that the user uses to estimate the amount of compression and de-duplication on
the IBM SAN Volume Controller SV3 system for specific workloads.
Choose your data reduction approach and use the tools to estimate the amount of usable
storage that is required by reviewing the following tools.
Figure 13 shows how to start the Estimate Compression Saving option from the GUI.
From the main menu, click Volumes → Volumes and select one volume. Then, right-click the
mouse to get the pop-up menu. From this menu, select Capacity Savings → Estimate
Compression Saving.
25
SV3ProductGuide.fm Draft Document for Review May 12, 2022 3:11 pm
For more information about data reduction pool compression and setup, see Introduction and
Implementation of Data Reduction Pools and Deduplication, SG24-8430.
Important: The IBM SAN Volume Controller SV3 system has NPIV enabled by default;
therefore, if the customer does not want to use it, they must turn it off before configuring FC
ports for host communications.
VMware integration
IBM Spectrum Virtualize software V8.5.0 and higher includes the following features, which
enable tight integration with VMware:
vCenter plug-in: Enables monitoring and self-service provisioning of the system from
within VMware vCenter.
vStorage APIs for Array Integration (VAAI) support: This function supports
hardware-accelerated virtual machine (VM) copy/migration and hardware-accelerated VM
initiation, and accelerates VMware Virtual Machine File System (VMFS).
Microsoft Windows System Resource Manager (SRM) for VMware Site Recovery
Manager: Supports automated storage and host failover, failover testing, and failback.
VVOL integration for better usability: The migration of space-efficient volumes between
storage containers maintains the space efficiency of volumes. Cloning a VM achieves a
full independent set of VVOLs. Resiliency also is improved for VMs if volumes start
running out of space.
The VMDK file was placed in a file system that is called VMFS, which is hosted by a standard
volume (LUN). For example, it can be implemented on an external storage system, such as
the IBM SAN Volume Controller SV3 system. With the availability of the VVOL technology,
each VM disk can now be mapped to an external storage volume (for example, an IBM SAN
Volume Controller volume).
With VVOL, the IBM SAN Volume Controller SV3 solution recognizes individual VMDK files.
Therefore, data operations, such as snapshot and replication, can be performed directly by
the IBM SAN Volume Controller system at the VMDK level rather than the entire VMFS data
store.
Note: The integration of VVOL with the IBM SAN Volume Controller SV3 system is based
on the VMware APIs for Storage Awareness (VASA). IBM support for VASA is delivered as
part of IBM Spectrum Connect. VASA V2 is required to use the VVOL capability.
For more information of WMware integration, see IBM FlashSystem and VMware
Implementation and Best Practices Guide.
External virtualization
The IBM SAN Volume Controller SV3 system offers external virtualization technology that
helps you manage other IBM or third-party storage arrays with thin-provisioning,
space-efficient copies, and DR tools, such as Data Replication. External virtualization also
makes the migration of data from one storage device to another easier.
You can use the IBM SAN Volume Controller SV3 system to manage the capacity of other
disk systems with external storage virtualization. When the IBM SAN Volume Controller
system virtualizes a storage system, its capacity becomes part of the IBM SAN Volume
Controller system and is managed in the same manner as the capacity on internal flash
modules within the IBM SAN Volume Controller SV3 system. Capacity in external storage
systems inherits all the rich functions and ease of use of the IBM SAN Volume Controller
system.
You can use IBM SAN Volume Controller SV3 to preserve your investments in storage,
centralize management, and make storage migrations easier with storage virtualization and
Easy Tier. IBM SAN Volume Controller SV3 system provides nondisruptive operations
because of storage virtualization. Virtualization helps insulate applications from changes that
are made to the physical storage infrastructure. When you add storage capacity or a new tier
of storage, for example, the changes are transparent to applications, so you have minimal
downtime.
Any externally virtualized storage needs extra licenses to be purchased and are charged on a
capacity basis of the storage added.
27
SV3ProductGuide.fm Draft Document for Review May 12, 2022 3:11 pm
Secure Remote Access (SRA) provides secure connection for IBM Remote Support,
which can perform remote troubleshooting and code load, and obtain diagnostic logs.
Email and SNMP alerts are part of the standard alerting options.
Syslog redirect to send system log messages to another host.
Combined password and SSH key authentication now supported as a first factor for local
users.
Restrict methods of access to the system at a user group level. GUI, CLI, and REST API
access can now be restricted. (Role Based Access Control)
Login grace time and session timeout duration can now be configured according to client’s
policies.
Multi-Factor Authentication (MFA). The SVC-SV3 can use two options of MFA:
– Cloud based IBM Security Verify Integration. This feature supports a wide range of
secondary authentication factors as it uses an industry standard protocol OpenID
Connect. It also aligns with other products that support this solution like for instance
Spectrum Scale.
– Single sign-on support by using Microsofts Active Directory Federation Services
(on-premises). Advantage of this technology is that it will support access cards and
dark sites and various other things in the future.
For the SVC-SV3 features were added to enable a hardware root of trust in order to
protect against physical access attacks, and to prevent running foreign code. Therefore,
trying to modify the code on the boot drive is not possible. When an attacker would replace
the boot drive with their own, the UEFI secure boot will detect that, reject the boot drive
and will not boot. From this, a client can have confidence that if code is running on a
SVC-SV3, the code running is running from an encrypted disk, and has been signed by
IBM.
Cyber Vault. IBM Cyber Vault is a combination of hardware and software to provide a
comprehensive approach to Cyber Resiliency. The following pillars are used to do this.
– Immutable copies of data, which is created by IBM Safeguarded copies.
– Pro-active monitoring. Using IBM Storage Insights, a recommended service from IBM,
early warnings of a possible attack are sent out. Integration with IBM QRadar® is also
recommended.
– Rapid Recovery. The monitoring of the Cyber Vault snapshots that are created by
Safeguarded copies is a continuous process. Monitoring is done by using standard
database tools and other software, this way Cyber Vault checks Safeguarded Copy
snapshots for corruption. In the event of any found corruption, it is considered a sign of
a possible attack.
– Data Copy Test and Validation. Data copies are in an isolated environment to check
whether they are corruption free and recovery procedures are in place. Also, are there
Forensics and Diagnostics Services available to check the validity of the data copies.
– All these can be implemented by IBM Lab services or an IBM Business Partner using
the IBM Frameworks for IT Cyber Resiliency. However, additional software (IBM
QRadar, IBM Security Guardium® Data Protection, and so on) may have been
required.
An interactive management GUI with excellent management and monitoring features.
Native scheduler for snapshots. For creation and management of crash-consistent copies
of data, external software is no longer required. For Application consistent copies, an
external (third party) orchestrator with application awareness is still needed.
Encryption
IBM SVC-SV3 data encryption like its predecessors, based on the industry standard
AES-XTS 256 encryption, as defined in the IEEE 1619-2007 standard and NIST Special
Publication 800-38E as XTS-AES-256. The data encryption key is protected by a 256-bit AES
key wrap of a key that is derived from the access key that is stored on the USB flash drive.
The wrapped key is stored in the system in non-volatile form.
Encryption on the IBM SVC-SV3 system requires the following feature codes:
Encryption Enablement (#ACE5)
This feature enables the encryption function. A single instance of this feature enables the
function on externally virtualized storage subsystems.
USB flash drives (#ACEB), IBM Security Guardium Key Lifecycle Manager or Gemalto
Safenet Keysecure are required for encryption key management.
Encryption USB Flash Drives (Four Pack) Optional (#ACEB)
This feature provides four USB flash drives for storing the encryption master access key.
Unless IBM Security Guardium Key Lifecycle Manager or Gemalto Safenet Keysecure is
used for encryption keys management, a total of three USB flash drives are required per
IBM SVC-SV3 cluster when encryption is enabled in the cluster, regardless of the number
of systems in the cluster. If encryption is used in a cluster, this feature should be ordered
on one IBM SVC-SV3 system, which results in a shipment of four USB flash drives.
Encryption can be applied to virtualized storage arrays, even if the virtualized array does not
have encryption capabilities. In this scenario, the encryption is done by using IBM Spectrum
Virtualize software. Encrypted volumes are transparent to applications, which eases
implementation and operation. In addition, the IBM SVC-SV3 system has the following
functions:
Encryption Activation: Adding an encryption license to a system is not concurrent and
must be done at array initialization time.
Encryption Deactivation: Removing encryption is also non-concurrent and destroys any
data on the array.
Encryption Rekey: Changing the encryption key on a previously initialized system is
concurrent and can be done while array is in use.
These operations require that you purchase Encryption Enablement Pack (#ACE5).
With TCT, administrators can move older data to cloud storage to free up capacity on the
system. Point-in-time snapshots of data can be created on the system and then copied and
stored on cloud storage.
An external cloud service provider manages the cloud storage, which reduces storage costs
for the system. At the time of this writing, IBM supports the OpenStack Swift and Amazon S3
cloud service providers.
29
SV3ProductGuide.fm Draft Document for Review May 12, 2022 3:11 pm
When a cloud account is created, it must continue to use the same encryption type
throughout the life of the data in that cloud account. Even if the cloud account object is
removed and remade on the system, the encryption type for that cloud account might not
be changed while backup data for that system exists in the cloud provider.
When performing rekeying operations on a system that has an encryption-enabled cloud
account, perform the commit operation immediately after the prepare operation. Retain
the previous system master key (on a USB or in the keyserver) because this key might be
needed to retrieve your cloud backup data when performing a T4 recovery or an import.
The restore_uid option should not be used when the backup is imported to a new cluster.
Importing TCT data is supported only from systems whose backup data was created at
V7.8.0.1 or later.
TCT uses Sig V2 when connecting to Amazon regions, and does not currently support
regions that require Sig V4.
Memory options
Table 2 lists the following memory options by feature code:
Table 2 IBM SAN Volume Controller SV3 memory options per SVC node
Base Memory (GB) #ACHA Plant or Field #ACHC Plant or Field Total Memory (GB)
Upgrade (GB) Upgrade (GB)
Ethernet cards (AH1F, AH1G, and AH1H) are not supplied with any optics. Supported optics
(ACHN, ACHR, and ACHZ) and RJ45 adapters (ACJ1) can be purchased with the control
enclosure, or the client may supply their own cables (MPO FC cables, AOC, DAC, and
splitters) providing they are listed as supported in the product documentation.
31
SV3ProductGuide.fm Draft Document for Review May 12, 2022 3:11 pm
All Ethernet cards can be used with the iSCSI protocol. 25 Gb iWARP Ethernet cards can
also be used for clustering. 25 Gb and 100 Gb RoCE Ethernet cards can be used for NVMe
RDMA.
Two 1 Gb Ethernet ports for management, and a separate service technician port.
Figure 14 shows the connectivity options for the different adapters at time of writing this book.
For more information about the limits and rules for adapter placement to ensure correct best
practices, see IBM Spectrum Virtualize FAQ: IBM Spectrum Virtualize with the IBM
FlashSystemfamily and IBM SAN Volume Controller.
Table 3 lists the maximum host port count per building block configuration (1, 2, 3, or 4
Control Enclosures).
Table 3 Maximum host port count per IBM SAN Volume Controller
Table lists the current features for host and connectivity for the IBM SAN Volume Controller
32 Gb FC 4 Port Adapter #AH1E This feature provides one I/O adapter Each adapter has four 32 Gb FC
Pair card with four 32 Gb Fibre Channel ports and shortwave SFP
ports and shortwave SFP transceivers.
transceivers. It is used to add 32 Gb
FC connectivity to the SVC Storage
Engine. This card also supports
longwave transceivers that can be
intermixed on the card with
shortwave transceivers in any
combination. Longwave transceivers
are ordered by using feature ACHV.
25 GbE (RoCE) 2 port #AH1F This feature provides one I/O adapter Each adapter has two 25 Gb
Adapter card with two 25 Gb Ethernet ports, Ethernet ports. No transceivers.
with no transceivers. It is used to add
25 Gb Ethernet connectivity to the
SVC Storage Engine and is designed
to support iSCSI and NVMe RDMA.
Note: This adapter does not support
FCoE connectivity.
25 GbE (iWARP) 2 port #AH1G This feature provides one I/O adapter Each adapter has two 25 Gb
Adapter card with two 25 Gb Ethernet ports, Ethernet ports. No transceivers.
with no transceivers. It is used to add
25 Gb Ethernet connectivity to the
SVC Storage Engine and is designed
to support iSCSI and RDMA with
iWARP for clustering.
Note: This adapter does not support
FCoE connectivity.
100 GbE Card (RoCEv2) #AH1H This feature provides one I/O adapter Each adapter has two 100 Gb
2 port Adapter card with two 100 Gb Ethernet ports, Ethernet ports. No transceivers.
with no transceivers. It is used to add
100 Gb Ethernet connectivity to the
SVC Storage Engine and is designed
to support iSCSI and NVMe RDMA.
Note: This adapter does not support
FCoE connectivity.
33
SV3ProductGuide.fm Draft Document for Review May 12, 2022 3:11 pm
Cables
The following cable feature codes are available:
(#ACSQ): 1 m OM3 Fiber Cable (LC)
(#ACSR): 5 m OM3 Fiber Cable (LC)
(#ACSS): 10 m OM3 Fiber Cable (LC)
(#ACST): 25 m OM3 Fiber Cable (LC)
Note: The IBM SAN Volume Controller SV3 does not support external expansion
enclosures.
Note: All noise emission levels that are stated are the declared (upper limit) sound power
level (in bels) for a random sample of machines. All measurements are made in
accordance with ISO 7779 and reported in conformance with ISO 9296.
Note: Be aware that the IBM SAN Volume Controller SV3 will NOT support expansions.
Note: Be aware that the IBM SAN Volume Controller SV3 will NOT support expansions.
All features are inclusive except for encryption and external virtualization. Any connected
storage requires the External Virtualization license per storage capacity unit (SCU) that is
based on the tier of storage that is available on the external storage system. In addition, if you
use FlashCopy and Remote Mirroring on an external storage system, you must purchase a
per-tebibyte license for the external storage systems to use these functions.
To set these licenses, use the Licensed Function page in the System Setup wizard. If you are
adding these licenses to a system, select Settings → System → Licensed Function in the
management GUI. You can also use the chlicense CLI command to update current license
settings on the system.
For more information about IBM Spectrum Virtualize licensing, see the Licensed functions for
SVC.
35
SV3ProductGuide.fm Draft Document for Review May 12, 2022 3:11 pm
With other functions, such as remote mirroring and FlashCopy, the license grants a specific
number of tebibytes of capacity for that function.
The SCU is defined in terms of the category of the storage capacity, as listed in Table 4.
SCM Storage Class Memory (SCM) SCU equates to 1.00 TB usable of Category 1
devices storage
Flash All flash devices, other than SCU equates to 1.18 TB usable of Category 1
SCM drives storage
Nearline Nearline Serial ATA (SATA) 1 SCU equates to 4.00 TB usable of Category
drives 3 storage
Any storage use case that is not listed in Table 4 is classified as Category 1.
Table shows an example of calculating SCUs. The example is a customer who virtualizes
external disk arrays with 5 TB SCM devices, 30 TB SSD flash drives, 400 TB Enterprise
drives, and 800 TB Nearline capacity.
Category 1 SCM 5 /1 5
A total of 431 SCUs are required for the example that is shown in Table . When you calculate
the number of SCUs per category, fractions must be rounded up to the next higher integer
number.
For more information about IBM Spectrum Virtualize Differential Licensing, see IBM
Documentation.
Offerings (for small, medium, and large enterprise customer segments), rates, terms, and
availability can vary by country. For more information, contact your local IBM Global Financing
organization or see the IBM Global Financing website.
Ordering information
For more information about ordering hardware features, see “Options and feature codes” on
page 31.
For more information about ordering software licenses, see “Software and licensing” on
page 35.
Related information
For more information, see the following documents:
Implementation Guide for IBM Spectrum Virtualize Version 8.5, SG24-8520:
http://www.redbooks.ibm.com/abstracts/sg248520.html
Introduction and Implementation of Data Reduction Pools and Deduplication, SG24-8430:
http://www.redbooks.ibm.com/abstracts/sg248430.html
IBM Documentation - IBM SAN Volume Controller:
https://www.ibm.com/docs/en/sanvolumecontroller/8.5.x
IBM SAN Volume Controller product page:
https://www.ibm.com/products/san-volume-controller
IBM Offering Information page (announcement letters and sales manuals):
http://www.ibm.com/common/ssi/index.wss?request_locale=en
IBM Spectrum Virtualize FAQ
Details about the IBM Spectrum Virtualize products, covering IBM FlashSystem family and
SAN Volume Controller:
https://www.ibm.com/downloads/cas/2DWAMWRB
IBM FlashSystem Family Overview FAQ
Overview of the IBM FlashSystem family with guidance on how to select the product that is
right for you:
37
SV3ProductGuide.fm Draft Document for Review May 12, 2022 3:11 pm
https://www.ibm.com/downloads/cas/9OGKVW2R
IBM FlashWatch FAQ
Guidance about the IBM FlashWatch programs:
https://www.ibm.com/downloads/cas/YVMYPED
Sales Accelerator Tools Portal for IBM Storage (IBMers only):
https://w3.ibm.com/w3publisher/ibm-systems-storage-sales-accelerator-tools-portal
Authors
Carsten Larsen is an IBM Certified Senior IT Specialist working for the Technical Services
Support organization at IBM Denmark, where he delivers consultancy services to IBM clients
within the storage arena. Carsten joined IBM in 2007 when he left HP, where he worked with
storage arrays and UNIX for 10 years. While working for IBM, Carsten obtained several
Brocade and NetApp certifications. Carsten is the author of several IBM Redbooks®
publications.
Corne Lottering is a Storage Client Technical Specialist in the US, focusing on technical
sales in Texas and Louisiana within the Public Sector industry. He has been with IBM for more
than 20 years, and has experience in a wide variety of storage technologies, including the
IBM System Storage DS5000, IBM DS8000, IBM Storwize®, XIV®, FlashSystems, IBM SAN
switches, IBM Tape Systems, and Software Defined Storage software. Since joining IBM, he
has fulfilled roles in support, implementation, and pre-sales support across various African
and Middle Eastern countries. Corne is the author of several IBM Redbooks publications
related to the midrange IBM System Storage DS Storage Manager range of products, as well
as FlashSystem products.
Douwe van Terwisga is an IBM Technical Advisor for Storage in the ESCC Project Office
based in Frankfurt, Germany. Before that he held different positions at IBM as well as an IBM
Business Partner as Technical Pre-sales for IBM Power Systems. Currently, his main focus is
on Enterprise class storage systems as IBM DS8000, IBM Flash (9000 series) and SVC. He
started his career in the 90's as a systems manager for AIX in a large Dutch oil company. His
hobbies are riding his motorbikes and deep sea diving.
Hartmut Lonzer is the IBM Storwize Territory Account Manager for DACH. In addition, he
covers the SAN portfolio as Offering Manager DACH. Before this position, he was OEM
Alliance Manager for Lenovo in IBM Germany. His working location is at the IBM German
headquarter in Ehningen. His main focus belongs to the IBM FlashSystem Family and the
IBM SAN Volume Controller. His experience with the IBM SAN Volume Controller and IBM
FlashSystem products goes back to the beginning of these products. Hartmut has been with
IBM in various technical and sales roles now for 44 years.
Jon Herd is an IBM Executive Technical Advocate working for the European Storage
Competency Center (ESCC), Germany. He covers the United Kingdom, Ireland, and Europe,
advising customers on a portfolio of IBM storage products, including IBM FlashSystem
products. He also leads special projects for senior and executive management and is the
SME lead for new product introduction in the ESCC. Jon has been with IBM for more than 47
years, and has held various technical roles, including Europe, Middle East, and Africa
(EMEA) level support on mainframe servers and technical education development. He has
written many IBM Redbooks publications on IBM FlashSystem products and is an IBM
Redbooks Platinum level author. He holds IBM certifications in Product Services at a Thought
Leader L3 level, and Technical Specialist at an experienced L1 level. He is also a certified
Chartered Member of the British Computer Society (MBCS - CITP), a Certified Member of the
Institution of Engineering and Technology (MIET) and a Certified Technical Specialist of the
Open Group (TOG).
Kendall Williams is a SME and Project Field Engineer working with the IBM Spectrum
Virtualize Storage Support Family. He holds a Bachelor of Science degree in Information
Technology, with a concentration in DB Management Systems and Architecture from Florida
State University. His areas of expertise include complex client performance analysis and copy
services support for production environments. Kendall joined IBM in 2012, and has since
become an advocate for some premier IBM clients.
Konrad Trojok is responsible for the technical team lead for the IBM Storage team at SVA
since 2011. The role includes an active part in the daily IBM storage business - design,
implementation, and care of storage solutions. Also, it includes strategic advisory in regard of
storage solutions. The very beginning of his IT career included IBM Power solutions around
SP systems and SSA storage. Konrad switched his technical focus with the emerging of SAN
and SAN storage.
Vasfi Gucer is works as the Storage Team Leader on the IBM Redbooks Team. He has more
than 30 years of experience in the areas of systems management, networking hardware, and
software. He writes extensively and teaches IBM classes worldwide about IBM products. His
focus has been primarily on storage, cloud computing and cloud storage technologies for the
last 8 years. Vasfi is also an IBM Certified Senior IT Specialist, Project Management
Professional (PMP), IT Infrastructure Library (ITIL) V2 Manager, and ITIL V3 Expert.
Find out more about the residency program, browse the residency index, and apply online at:
ibm.com/redbooks/residencies.html
39
SV3ProductGuide.fm Draft Document for Review May 12, 2022 3:11 pm
Notices
This information was developed for products and services offered in the US. This material might be available
from IBM in other languages. However, you may be required to own a copy of the product or product version in
that language in order to access it.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area. Any
reference to an IBM product, program, or service is not intended to state or imply that only that IBM product,
program, or service may be used. Any functionally equivalent product, program, or service that does not
infringe any IBM intellectual property right may be used instead. However, it is the user’s responsibility to
evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The
furnishing of this document does not grant you any license to these patents. You can send license inquiries, in
writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive, MD-NC119, Armonk, NY 10504-1785, US
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may make
improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time
without notice.
Any references in this information to non-IBM websites are provided for convenience only and do not in any
manner serve as an endorsement of those websites. The materials at those websites are not part of the
materials for this IBM product and use of those websites is at your own risk.
IBM may use or distribute any of the information you provide in any way it believes appropriate without
incurring any obligation to you.
The performance data and client examples cited are presented for illustrative purposes only. Actual
performance results may vary depending on specific configurations and operating conditions.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of those products.
Statements regarding IBM’s future direction or intent are subject to change or withdrawal without notice, and
represent goals and objectives only.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to actual people or business enterprises is entirely
coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the sample
programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore,
cannot guarantee or imply reliability, serviceability, or function of these programs. The sample programs are
provided “AS IS”, without warranty of any kind. IBM shall not be liable for any damages arising out of your use
of the sample programs.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines
Corporation, registered in many jurisdictions worldwide. Other product and service names might be
trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright
and trademark information” at http://www.ibm.com/legal/copytrade.shtml
The following terms are trademarks or registered trademarks of International Business Machines Corporation,
and might also be trademarks or registered trademarks in other countries.
AIX® IBM® PowerVM®
DS8000® IBM Cloud® QRadar®
Easy Tier® IBM FlashSystem® Redbooks®
FlashCopy® IBM Security™ Redbooks (logo) ®
Guardium® IBM Spectrum® Storwize®
HyperSwap® Passport Advantage® XIV®
Intel, Intel logo, Intel Inside logo, and Intel Centrino logo are trademarks or registered trademarks of Intel
Corporation or its subsidiaries in the United States and other countries.
The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive
licensee of Linus Torvalds, owner of the mark on a worldwide basis.
Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States,
other countries, or both.
OpenShift, Red Hat, are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the United
States and other countries.
UNIX is a registered trademark of The Open Group in the United States and other countries.
VMware, VMware vSphere, and the VMware logo are registered trademarks or trademarks of VMware, Inc. or
its subsidiaries in the United States and/or other jurisdictions.
Other company, product, or service names may be trademarks or service marks of others.
REDP-5670-00
ISBN DocISBN
Printed in U.S.A.
®
ibm.com/redbooks