HCIP-Storage V5.0 Training Material
HCIP-Storage V5.0 Training Material
Foreword
Huawei OceanStor all-flash storage systems are designed to carry mission-critical services
for enterprises. The systems adopt the unique SmartMatrix architecture for global
interconnection and cluster-level resource sharing and scheduling to achieve symmetric
active-active service processing. The native-flash-dedicated FlashLink® technology ensures
consistent low latency, large throughput, reliable data storage, and stable performance
throughout the lifecycle.
The storage systems meet the requirements of enterprise applications such as databases,
virtual desktop infrastructure (VDI), virtual server infrastructure (VSI), and file sharing. They
can help the financial, manufacturing, and carrier industries smoothly transition to all-flash
storage and build virtualized, cloud-ready, and intelligent IT systems.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
4. Application Scenarios
3 Huawei Confidential
OceanStor Storage Portfolio
Solution
controller
Data
Huawei Huawei
Huawei OceanStor OceanStor
Huawei OceanStor Huawei OceanStor Huawei OceanStor
OceanStor Dorado 100D 9000
Dorado 18000 V6 6800 V5/F V5 18500/18800 V5/F V5
8000 V6
Note: Huawei storage products in 2020 H1 are listed as an example.
4 Huawei Confidential
Product Positioning
5 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
4. Application Scenarios
6 Huawei Confidential
Controller Enclosure Front View
Icon Description
Enclosure ID indicator
Note: Some product models of Huawei OceanStor all-flash series are used Power indicator/Power button
as an example.
7 Huawei Confidential
Controller Enclosure Rear View
Interface Power
module module
Note: Some product models of Huawei OceanStor all-flash series are used as an example.
8 Huawei Confidential
Connection Between Controller and Disk Enclosures
Controller enclosure with 25 x 2.5-inch SAS SSDs Controller enclosure with 36 x NVMe SSDs
Controller
enclosure
Disk enclosure with 25 x Disk enclosure with 25 x Disk enclosure with 36 x NVMe SSDs
2.5-inch SAS SSDs 2.5-inch SAS SSDs
Note: Some product models of Huawei OceanStor all-flash series are used as an example.
9 Huawei Confidential
Disk Enclosure
10 Huawei Confidential
3D Interactive Display Multimedia
11 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
4. Application Scenarios
12 Huawei Confidential
Software Architecture
SmartKit Maintenance Application
OceanStor BCManager
terminal server
eService software UltraPath software
Management host OS layer SAN host OS layer
Management network
port and serial port Storage system software iSCSI/Fibre Channel
Pool
SmartQoS SmartThin SmartMigration SmartVirtualization Three-copy
SCSI
Storage OS
13 Huawei Confidential
SmartMatrix Full-Mesh Architecture
Host I/O
Network Network
adapter adapter
Fully-shared front-end
interconnect I/O
FIM FIM FIM FIM modules (FIMs)
192 192
cores cores Full interconnection
among controllers
BIM BIM BIM BIM 192 192
cores cores
Disk interconnection
across controller
enclosures with back-
Note: Huawei OceanStor Dorado 8000 and 18000 V6 are used as an
end interconnect I/O
example. OceanStor Dorado 3000, 5000, and 6000 V6 use dual- modules (BIMs)
controller architecture, which is not full-mesh interconnection.
14 Huawei Confidential
Active-Active Architecture with Full Load Balancing
1 Huawei UltraPath
Evenly distributes I/Os to all front-end ports.
Access load balancing
A B C D A B C D
3 Global cache
All controllers participate in service processing,
and LUNs are not owned by any controller.
Controller load balancing
BIM BIM
RAID 2.0+
4
Evenly distributes data to all SSDs.
SSD load balancing
15 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
High Performance
High Reliability
High Security
4. Application Scenarios
16 Huawei Confidential
I/O Acceleration
Host
25G/100G DTOE
Smart disk enclosure Smart disk enclosure Smart disk enclosure Smart disk enclosure
17 Huawei Confidential
Protocol Offload with DTOE
PHY
PHY PHY
MAC
MAC
MAC NIC TOE NIC IP DTOE NIC
IP TCP
TCP Buffer
Buffer Buffer
IP Kernel space Kernel space
TCP Driver
Driver
OS OS
Driver User space
User
OS
User File system
Protocol File system Protocol File system Protocol
space space
18 Huawei Confidential
Intelligent Multi-level Cache
SCM Cache
PCIe
LSM Tree Table
Plog
19 Huawei Confidential
SmartCache
The algorithm identifies hotspots according
to the read sequence and their I/O patterns.
Host read request Read I/O sequence A A C C E E E E B B C C E E AI-Based Per-LBA
1 2 1 3 1 2 3 4 1 2 2 4 5 6 Prediction Pattern
LUN
A A C E E
Data evicted by the B B C E E
Memory 1 2 1 C 1 2
memory is written 1 2 3 C 3 4 E E
2 5 6
to the SCM. 4
LBA[X1,X2]
LBA[0,X1] Pattern: LBA[X2,X3] Pattern:
SCM Pattern: Cold
Sequential degree: 2 Sequential degree: 6
Random Access
Enters the SCM. Does not enter the SCM.
SSD
Only hot data from random and short sequential I/Os enters the SCM.
20 Huawei Confidential
Round Robin Scheduling Algorithm for Metadata
MDS Table
21 Huawei Confidential
File System Distribution
Directory
File
/
/a /b
/c
/a/b /b/a
/c/a
/c/c /b/a/c
FSP FSP FSP FSP FSP FSP FSP FSP FSP FSP FSP FSP
... ...
Node (controller) Node (controller) Node (controller)
22 Huawei Confidential
Affinity Mode for File System Access
Host
NFS/CIFS NFS/CIFS NFS/CIFS NFS/CIFS
Client 0 Client 1 Client 2 Client 3
/A /C /E /G
Controller A Controller B
23 Huawei Confidential
Load Balancing Mode for File System Access
NFS/CIFS
Client Host
NFS/CIFS
/A/B
/A
/A/B/C
/A/B/C/D
vNode 0 vNode 1 vNode 2 vNode 3
CPU CPU CPU CPU
Controller A Controller B
24 Huawei Confidential
FlashLink – Multi-core Technology
(LUN, LBA), Data
Core Core Core Core Core Core Core Core Read/write I/Os are deployed in different
groups from other types of I/Os to avoid
mutual interference.
Core Core Core Core Core Core Core Core
25 Huawei Confidential
FlashLink – Sequential Writes of Large Blocks
ROW Full-Stripe Write (Sequential Writes of Large Blocks) Amplification in a Traditional Write Process
Controllers detect data layouts in Huawei-developed SSDs. Using RAID 6 as an example: When D0 is changed, the system
Multiple discrete data blocks are aggregated into a large sequential must first read D0, P, and Q, and then write new nD0, nP, and
block in the controller memory. nQ. Therefore, both the read and write amplifications are 3.
The large data blocks are written into SSDs in sequence. A greater number of RAID member disks means a higher RAID
Sequential writes of large blocks fully utilize SAS bandwidth and reduce utilization.
garbage collection.
26 Huawei Confidential
FlashLink – Hot and Cold Data Separation
27 Huawei Confidential
FlashLink – I/O Priority Adjustment
28 Huawei Confidential
FlashLink – Smart Disk Enclosure
Controller enclosure
Smart disk enclosure + Kunpeng CPU Smart disk enclosure + Kunpeng CPU
29 Huawei Confidential
FlashLink – AI
Using the built-in intelligent cache algorithm and machine learning, the AI chip proactively analyzes and
masters the I/O rules of various application models to improve the read cache hit ratio and increase
system performance over time.
30 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
High Performance
High Reliability
High Security
4. Application Scenarios
31 Huawei Confidential
Highly Reliable Architecture
Tolerating simultaneous Tolerating failure of a Tolerating successive failure
failure of 2 controllers controller enclosure of 7 out of 8 controllers
Shared front end Shared front end Shared front end Shared front end Shared front end Shared front end
Shared back end Shared back end Shared back end Shared back end Shared back end Shared back end
32 Huawei Confidential
No Service Interruption Upon a Controller Failure
Server Server
IP switch IP switch
MAC address: 2100xxxxabcd MAC address: 2100xxxxabcd
33 Huawei Confidential
Non-Disruptive Upgrade with a Single Link
I/O process upgrade time < 1.5s
Host reconnection time < 3.5s; service
Host suspension time < 5s
TCP connection
Services are not interrupted during online
upgrade with a single link.
34 Huawei Confidential
SMB Advanced Features
SMB 2.0 and SMB 3.0 support failover.
35 Huawei Confidential
Failover Group
Failover Failover
Failover
LIF LIF LIF LIF User-defined
failover group
Bond 4 Port 8
Current bond
36 Huawei Confidential
Data Reliability Solution
37 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
High Performance
High Reliability
High Security
4. Application Scenarios
38 Huawei Confidential
Trusted and Secure Boot of Hardware
OS
Huawei signature Certificate revocation list Software verification and loading
3
4 process for secure boot:
1. Verify the signed public key of
Huawei
Grub
signature Grub Grub.
Huawei signature Signed public key
2. Verify and load Grub.
1 3. Verify the status of the
2
Grub
software signature certificate.
RSA engine
Hash of signed public key
4. Verify and load the OS.
BootROM eFuse
SoC
39 Huawei Confidential
Role-based Permission Management
Default
User 1 Permission 1
Role
User-defined
User 2 Permission 2
role A
User-defined
User 3 Permission 3
role B
40 Huawei Confidential
Security Log Audit
vStore 1
Audit-Dtree Audit-Dtree
/Bin /Bin
/vNode1 /vNode1
/$Time$Audit1.bin /$Time$Audit1.bin
/$Time$Audit2.bin /$Time$Audit2.bin
/vNodeN /vNodeN
Audit-Log-FS
/FS0 /FS1
/2020-01-03.Audit1.XML /2020-01-03.Audit1.XML
/2020-01-04.Audit2.XML /2020-01-04.Audit2.XML
/2020-01-05.Audit3.XML /2020-01-05.Audit3.XML
/2020-01-06.Audit4.XML /2020-01-06.Audit4.XML
/2020-01-07.Audit5.XML /2020-01-07.Audit5.XML
/2020-01-08.Audit6.XML /2020-01-08.Audit6.XML
41 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
4. Application Scenarios
42 Huawei Confidential
Storage Virtualization
...
Unix pool Linux pool Windows pool Virtual pool Backup pool
43 Huawei Confidential
Multi-Protocol Access
SMB1/SMB2/SMB3 NFSv3/NFSv4
SMB-NFS
DNS/AD (IDMU) server Multi-Protocol LDAP/NIS server
Access
DNS Query
AD Authentication
NIS/LDAP Query
44 Huawei Confidential
Quiz
1. (Multiple-answer question) What are the application scenarios of Huawei OceanStor all-flash series?
A. Storage of critical services
C. Virtual desktops
B. 2
C. 3
3. (True or false) Huawei OceanStor All-Flash Storage uses ROW full-stripe write, which writes all new
data to new blocks instead of overwriting existing blocks. This greatly reduces the overhead on
controller CPUs and read/write loads on SSDs in a write process.
45 Huawei Confidential
Summary
Product positioning
Product form
High performance
High security
Application scenarios
46 Huawei Confidential
More Information
Scan and subscribe for the
latest documentation
https://support.huawei.com/enterprise/en/newsletter
47 Huawei Confidential
Recommendations
Huawei provides engineers with a wide range of product learning materials, including multimedia
information and online courses.
Social Media:
support.huawei.com/e Data Storage Academy Huawei IT Products
& Solutions
https://www.linkedin.com/s
howcase/huaweiitproducts
https://www.youtube.com/c/
HuaweiITProductsSolutions
48 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
Huawei OceanStor hybrid flash storage systems are the optimal storage platforms for
brand-new data centers, and feature virtualization, hybrid cloud, thin IT, and low carbon
footprint. With powerful hardware specifications and flexible scalability, these storage
systems adopt industry-leading technologies, such as dynamic storage tiering (DST), service
quality management (SQM), cache partitioning, disk load balancing, heterogeneous storage
virtualization, and multi-level data protection.
With outstanding reliability, efficiency, and scalability, Huawei OceanStor hybrid flash
storage systems provide mission-critical storage services for the finance, government,
energy, manufacturing, transport, education, and telecom sectors.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
4. Application Scenarios
3 Huawei Confidential
Product Positioning
4 Huawei Confidential
Product Models
Huawei OceanStor
All Flash Arrays Huawei OceanStor 18810F V5
18510F V5
Hybrid Flash Arrays
Huawei OceanStor
6810F V5
Huawei OceanStor
Performance,
5610F/5810F V5
Huawei OceanStor
Huawei OceanStor
18800F V5
IOPS
5 Huawei Confidential
Product Overview
Huawei OceanStor hybrid flash series
6 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
4. Application Scenarios
7 Huawei Confidential
Controller Enclosure Front View
Icon Description
Enclosure ID indicator
Note: Some product models of Huawei OceanStor hybrid flash series are used as an example.
8 Huawei Confidential
Controller Enclosure Rear View
Interface module
Two slots for hot-swappable interface
modules, with at most one back-end
SAS interface module
Port types: 8 Gbit/s FC, 16 Gbit/s FC,
2 U controller GE, 10GE (electrical), 10 Gbit/s FCoE,
enclosure 10GE (optical), and 12 Gbit/s SAS
Power-fan module
1+1 redundancy SAS expansion port
AC, –48 V DC, or 240
Two onboard SAS
V HVDC expansion ports per
controller
Onboard port
OceanStor 5300 V5: four
GE ports per controller
3 U controller enclosure
Note: Some product models of Huawei OceanStor hybrid flash series are used as an example.
9 Huawei Confidential
Disk Enclosure
Note: Some product models of Huawei OceanStor hybrid flash series are used as an example.
10 Huawei Confidential
3D Interactive Display Multimedia
11 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
4. Application Scenarios
12 Huawei Confidential
Software Architecture
NAS SAN
Or
SAN NAS
NAS SAN
File Service Block Service
(CIFS/NFS) (FC/iSCSI)
Storage Pool
13 Huawei Confidential
SmartMatrix 3.0 for Full Load Balancing
C1 D1' D1 C1'
C1 D1' D1 C1' C2 A1' D2 B2'
C2 A2' D2 B2' C3 B3' D3 A2'
C3 B3' D3 A3' A2 B1' A3 C2'
14 Huawei Confidential
Fully Shared Architecture
SmartMatrix 3.0
15 Huawei Confidential
Controller Fault Transparent to Hosts
Server
FC switch
With the intelligent WWN: 2100xxxxabcd
interconnect I/O modules,
controller faults are
transparent to hosts.
• Zero impact on hosts: FC
links retain normal,
services keep running
properly, and no alarm or
event is reported.
• Quick internal takeover:
Involved I/Os are Backplane
redirected by the front-end X
chip to other controllers.
16 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
4. Application Scenarios
17 Huawei Confidential
Convergence of SAN and NAS
Energy &
SAN-NAS Parallel Architecture electricity
Parallel architecture
The system provides optimal paths for concurrent access Transportation
to SAN and NAS to maximize performance.
18 Huawei Confidential
Intelligent Tiering for SAN and NAS
Data migration
Tier 0: SSD Tier 1: SAS Tier 2: NL-SAS
Root
File system Dir Dir
File policy
File migration
19 Huawei Confidential
RAID 2.0+
Tiered
Not tiered
20 Huawei Confidential
Huawei-Developed Chips
Intelligent multi-
protocol interface chip
32 Gbit/s FC and 100GE ports
Kunpeng 920 controller chip
21 Huawei Confidential
RDMA Scale-out
Eight controllers are directly connected over a full-mesh network for redundancy. Each controller
enclosure shares 400 Gbit/s bandwidth.
The four idle ports are reserved for expansion to 16 controllers.
The SmartIO interface modules provide internal RDMA connections with 100 Gbit/s port bandwidth.
VLANs are created on SmartIO ports to separate data and heartbeat networks.
22 Huawei Confidential
Self-Encrypting Drive (SED)
KMIP+TLS KMIP+TLS
KMA
KMIP+TLS
Storage Internal KM
TPM Switch
AK W/R Data
SED
23 Huawei Confidential
Block Service Features
SmartThin
Thin provisioning
24 Huawei Confidential
File Service Features
25 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
4. Application Scenarios
26 Huawei Confidential
Multi-site Disaster Recovery
Cascading architecture Solution Overview
Production Intra-city DR Remote DR
HyperReplication interoperability among high-
center center center
end, mid-range, and entry-level storage systems
HyperMetro/
The unified storage OS platform ensures
A HyperReplication HyperReplication HyperReplication interoperability among high-end, mid-
(A/S*) /A (active) range, and entry-level storage systems.
You can flexibly select storage systems for the remote DR
A"
HyperReplication/A Configuration of DR Star* can be done at a single site for
(active) simplified management.
Note: NAS does not support synchronous remote replication (HyperReplication/S).
27 Huawei Confidential
Application Scenarios for Storage Tiering
Hot Warm Tier DB Cold Frozen
Service
applications Billing CRM BI ERP Database Backup Archive
Hot (30%):
1000-5500 40-125
1000-5500 200-750 10-30
Performance IOPS/TB IOPS/TB
IOPS/TB IOPS/TB ≤ 1.2 ms IOPS/TB
≤ 1.2 ms ≤ 4 ms Cold (70%):
≤ 15 ms ≤ 100 ms
40-125
IOPS/TB
Reliability 99.999% 99.999%
≤ 15 ms 99.999% 99.999%
99.999%
Huawei
solution
Huawei OceanStor Huawei OceanStor Huawei OceanStor
Distributed storage all-flash storage hybrid flash storage
28 Huawei Confidential
Quiz
29 Huawei Confidential
Summary
Product positioning
Product form
RDMA scale-out
Application scenarios
30 Huawei Confidential
More Information
Scan and subscribe for the
latest documentation
https://support.huawei.com/enterprise/en/newsletter
31 Huawei Confidential
Recommendations
Huawei provides engineers with a wide range of product learning materials, including multimedia
information and online courses.
Social Media:
support.huawei.com/e Data Storage Academy Huawei IT Products
& Solutions
https://www.linkedin.com/s
howcase/huaweiitproducts
https://www.youtube.com/c/
HuaweiITProductsSolutions
32 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
Huawei OceanStor 100D distributed storage provides block, file, HDFS, and object services, achieving
cost-effective mass data storage, higher usage efficiency, and easier management of the data lifecycle.
Huawei OceanStor 9000 V5 distributed file storage is specially optimized for file system applications. It
features large capacity, high performance, and flexible scalability. It also provides various value-added
features.
1 Huawei Confidential
Objectives
Upon completion of this course, you will understand the following aspects
of distributed storage:
Product positioning
Hardware and software architectures
Key features and technical advantages
Typical application scenarios
2 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
4. Application Scenarios
3 Huawei Confidential
Product Positioning
Intelligent distributed storage More stable bearing for complex services: End-to-end
data integrity checks and automatic recovery,
comprehensive sub-health detection and automatic recovery
for disks, nodes, and networks, and I/O-level, device-level,
system-level, and data center-level end-to-end reliability
assurance
4 Huawei Confidential
Product Positioning
Scale-Out NAS
Huawei Scale-Out NAS adopts a fully symmetric
distributed architecture to provide users with shared
storage resources for unstructured data. It is a scale-out
NAS oriented to massive unstructured data storage
applications.
5 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
4. Application Scenarios
6 Huawei Confidential
Block Storage Data Nodes
12 slots
7 Huawei Confidential
Scale-Out NAS
P25E
C36A P12E
P36A P36E
Node
P12A type P25X
S12A P12X
S25X P36X
8 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
4. Application Scenarios
9 Huawei Confidential
Software Architecture
Protocol
OAM
NFS Virtual SCSI Controller (VSC) iSCSI S3/Swift HDFS
10 Huawei Confidential
I/O Stack Processing (Block Service)
VBS
1. After receiving the read and write requests, VBS uses the
hash algorithm to find the EDS-B node based on the LUN
ID and offset.
(1) EDS-B 2. The block service of the EDS-B node writes data to the
cache. The read request is hit in the cache preferentially.
block If data is not found, data is read from the index.
3. For write operations, the cache writes data to the Plog
(2) Server in small EC mode for fast data retrieval.
cache 4. After EC encoding, the cache data is written to the Plog
(5) Server. The foreground write operation is complete.
5. When the cache watermark reaches a threshold, dirty
index data is written to the index.
6. Data is written to the Plog Server based on the user-
(3) determined EC ratio, and then metadata is recorded to
(6) the index.
Plog Client
7. After EC encoding, the data is written to the Plog Server.
(4)
(7) Foreground I/O
Background I/O
Plog Server Plog Server Plog Server
11 Huawei Confidential
I/O Stack Processing (Object Service)
S3/Swift Client
1
Load Balancer DNS 1. The client sends the S3/Swift request to the load
7
balancing device (optional, such as LVS and
2 Nginx).
2. The request is sent to the OSC module.
POE Location
OSC 3. OSC requests the POE module to authenticate
3 Service the user.
Plog Client Index Client
4. After authentication, OSC invokes the Plog Client
to perform an EC calculation on the data and
5
concurrently writes the data to the Plog Server
4 for persistent storage.
Index 5. After the data is written, OSC invokes the index
Server client to write the object metadata.
Plog Client 6. After receiving the metadata, the Index Server
processes the metadata and invokes the Plog
6 Client interface to write the metadata to the
Plog Server for persistent storage.
Plog Plog 7. OSC sends a response to the client.
Plog Plog
Server Server Server Server
12 Huawei Confidential
I/O Stack Processing (HDFS Service)
13 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
4. Application Scenarios
14 Huawei Confidential
DHT Technology
I/O
Partition ID
Persistence Partition ID
layer D D D D P P
D1 D2 D3 D4 P1 P2
1 2 3 4 1 2
Node-1 Node-2 Node-3 Node-4 Node-5 Node-6 Node-7
15 Huawei Confidential
Range Segmentation and WAL Aggregation
A, AA, AB, ABA, ABB, ...ZZZ A, AA, AB, ABA, ABB, ...ZZZ
...
...
Node 1 Node 2 Node 3 Node n Range 0 Range 1 Range 2 Range n
Range Partition
16 Huawei Confidential
Multi-NameNode Concurrency
Hadoop Hadoop
Hbase/Hive/Spark compute node Hbase/Hive/Spark compute node
HA
based on NFS or
Quorum Journal
17 Huawei Confidential
Append Only Plog Technology
Disks and new media have great performance differences in different I/O patterns.
Write
data Write data into new
PlogID + offset
plogs.
Physical address space Plog1 Plog2 Plog3 ...
18 Huawei Confidential
EC Intelligent Aggregation Technology
Traditional cross-node EC Intelligent aggregation EC based on append writes
LUN1 LUN2 LUN1 LUN2
19 Huawei Confidential
Multi-level Cache Technology
Step 1 Step 2
Step 1
Memory Write Cache Memory Read Cache Memory Write Cache Memory Read Cache
EDS
Step 2 Step 3 Step 4
Step 3
OSD SSD WAL Cache SSD Write Cache SSD Read Cache SSD WAL Cache SSD Write Cache SSD Read Cache
Step 4 Step 5
HDD HDD
20 Huawei Confidential
Distributed Metadata Access
①
MDS1
/user /home
CA /src
② /file
③ MDS2 /lib
/test /file
/kernal
④ /file1
MDS3 /file1
/file1 /bin
⑤ /file1
/file1
MDS4 /mnt
/file1
/file1
DS DS DS DS DS /file1 /file1
/file1
Directory tree
21 Huawei Confidential
Intelligent Load Balancing Technology
1
2
3
OceanStor DFS
Scale-Out NAS
22 Huawei Confidential
Single File System
23 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
4. Application Scenarios
24 Huawei Confidential
Application Scenarios of the Block Service
BSS MSS OSS VAS Hosting
Application MSS
Billing CRM BI Report CDR OA Cloud Signaling Logs NPO S/MMS RBT WAP Hosting
Traditional
Storage high-end
storage
Intelligent distributed storage
25 Huawei Confidential
Application Scenarios of the Object Service
...
24/7 Household Family Pet
uninterrupted security tie feeding
uploading
Transmits
video stream
Elastic Cloud Server (ECS) to the
Elastic Cloud Server (ECS) Elastic Cloud Server (ECS)
analysis
platform.
(2) Saves original videos (3) Saves compressed videos (4) Queries videos.
to the object service. to the object service.
Object service
26 Huawei Confidential
Quiz
1. (Multiple) Which two deployment modes are supported by Huawei distributed storage?
A. Block service
B. File service
C. Object service
D. HDFS service
E. HTTP
27 Huawei Confidential
Summary
28 Huawei Confidential
More Information
Scan and subscribe for the
latest documentation
https://support.huawei.com/enterprise/en/newsletter
29 Huawei Confidential
Recommendations
Huawei provides engineers with a wide range of product learning materials, including multimedia
information and online courses.
Social Media:
support.huawei.com/e Data Storage Academy Huawei IT Products
& Solutions
https://www.linkedin.com/s
howcase/huaweiitproducts
https://www.youtube.com/c/
HuaweiITProductsSolutions
30 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
4. Application Scenarios
3 Huawei Confidential
Architecture Evolution Roadmap
Traditional
information-based Ultra-large web-scale Hyper-converged
architecture architecture architecture
Server Server
Compute
virtualization Server Server Server
VM VM VM VM
VM VM VM VM VM VM
VM VM VM VM Server Server Server
Device-agnostic
Fibre Fibre 10GE network
Distributed Distributed storage engine
Channel/IP Channel/IP storage
network network
Innovative
distributed Evolution Agile Agile Agile
architecture in the Local server storage management management management
to all
SAN or NAS SAN or NAS Internet industry industries
Complex
Shared resource Software-defined,
Siloed compute and management pool simplified management
storage resources
4 Huawei Confidential
Introduction to HCI
Upper-layer Upper-layer Upper-layer
applications applications applications
vCloud vCloud
Virtualization management + Virtualization management +
cloud management cloud management
Virtualization Physical Virtualization
machine
General-purpose server FusionCube
HCI
Enterprise storage
5 Huawei Confidential
Product Positioning
6 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
4. Application Scenarios
7 Huawei Confidential
Hardware
8 Huawei Confidential
Blade Servers
Front view Rear view
Single half-
Switch
width slot
module
Single full-
width slot
Power
Dual full- module
width slots
Fan
Management module
module
Server
Note: The above example shows a Huawei FusionServer E9000 blade server.
9 Huawei Confidential
High-Density Servers
4 x redundant PSUs: 750 W/1200 8 x HHHL rear Chassis management
4U4 or 4U8 server node W AC Platinum (94%) PCIe 3.0 x8 slots module (HMM)
Note: The above example shows a Huawei FusionServer X6800/X6000 high-density server. Node management port
10 Huawei Confidential
Rack Servers
Hard disk
VGA port
VGA port
11 Huawei Confidential
3D Interactive Display Multimedia
12 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
4. Application Scenarios
13 Huawei Confidential
Hyper-Converged Architecture
Service
Database
software
Linux OS OS
Backup
Unified FusionStorage distributed block storage software
management One-click Erasure
Active- Asynchronous
capacity coding QoS
active replication
expansion (EC)
Multiple
Thin Linked Distributed
Snapshot resource
provisioning clone cache
pools
14 Huawei Confidential
Distributed Storage Architecture
Cache Cache
Storage Controller Storage
10GE or 8 Gbit/s Controller
Fibre Channel
SAN controller 1 Controller Controller
Cache
2 Computing Computing
Controller Controller
Storage Storage
Cache Cache
HDD HDD HDD
15 Huawei Confidential
Distributed Storage Logical Architecture
VM VM ... Oracle
MDC
State view
MDC
16 Huawei Confidential
Virtualization Platform Architecture
Huawei Open API Cloud storage API SNMP NBI
FusionManager
17 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
4. Application Scenarios
18 Huawei Confidential
Distributed Hash Table (DHT) Algorithm
Industry solution: metadata FusionStorage: DHT
Obtain the target Query the
Obtain the
NameNode by querying the Client Client metadata in the
target through
centralized memory.
internal
metadata node. Key Key
calculation. P1 OSD1
Client Client Client Client Hash Hash
Mapping OSD Mapping OSD P2 OSD2
3. Maps PGs to OSDs. 3. Writes data to the filestore. 2. Maps the partition to
2. Writes cache.
OSD.
2 6 steps from end to end, long I/O path 4 steps from end to end, short I/O path
19 Huawei Confidential
Adaptive Global Deduplication and Compression
Opportunity The opportunity
table table filters out
Block 1 unnecessary
Enters data block Hash A data.
2
fingerprints into Block 2
the opportunity
table.
Block 3 Hash B
Node 1 Node 2 Node 3 PCIe SSD cache: Efficient data reads and writes are
provided. Data is not lost in the event of a power
failure.
21 Huawei Confidential
Rapid Parallel Data Reconstruction
Server 1 Server 2 Server 3
Disk 1 Disk 2 Disk 3
P1 P2'
P2 P3 P4'
P4 P5 P6'
P6 P7 P8'
P8 P9 P10 P11 P12
P5' P9
P9' P17' P21
P21' P1' P10
P10' P13' P22
P22' P2' P6' P14' P18'
P7' P11
P11' P19' P23
P23' P3' P15' P24
P24' P4' P8' P16' P20'
P12'
P12
22 Huawei Confidential
Dynamic EC
User data 1
D1 D2 D3 D4 P1 P2
User data 1 is divided into N data
D1 Disk Disk Disk P1 Disk fragments, and M parity
Disk D2 D3 D4 Disk P2 fragments are calculated. Data is
... ... ... ... ... ...
Disk Disk Disk Disk Disk Disk written onto disks as shown in the
Node1 Node2 Node3 Node4 Node5 Node6 figure on the left (N = 4, M = 2).
User data 2
D1 D2 P1 P2
When Node3 is faulty, user data 2
is divided into N/2 data fragments,
D1 Disk Disk Disk P1 Disk and M parity fragments are
Disk D2 D3 D4 Disk P2
... ... ... ... ... ... calculated. Data is written onto
Disk Disk Disk Disk Disk Disk disks as shown in the figure on the
Node1 Node2 Node3 Node4 Node5 Node6 left (N/2 = 2, M = 2).
23 Huawei Confidential
Cabinet-Level Reliability
Hyper-converged storage
Cabinet N
Cabinet 1 Cabinet 2 Storage Cabinet 1 Cabinet 2 Cabinet N
A fault interrupts services and requires A fault does not interrupt services and the
manual recovery. system can recover automatically.
24 Huawei Confidential
Contents
1. Product Positioning
3. Key Technologies
4. Application Scenarios
25 Huawei Confidential
Private Cloud Scenario
ManageOne
Global
Department 1 Department 2 resource Service
Administrator
manageme operation
nt
Quota management
VDC 1 VDC 2
Tenant management Unified Unified
Process Process performanc service
Self O&M by Self O&M by Metering management
review and review and e view catalog
organizations organizations Service catalog
approval approval
and users and users
VDC metering VDC metering
Multi- Multi-
Cloud services dimensional dimensional
unified topology
alarming view
Compute services Storage services Network services
Unified service catalog and rich cloud service
experience
FusionSphere FusionSphere Self-help service provisioning, enabling users to
quickly obtain required resources
Unified display of the management information
(such as alarms, topology, performance, and
report) from multiple cloud service resource
FusionCube FusionCube pools
Unified management of physical and virtual
Data center 1 Data center 2 resources, and of heterogeneous virtual resources
26 Huawei Confidential
Cloud Infrastructure Scenario
Application/
Service system Private cloud
Public cloud Industry cloud
• Compatible with
existing services • Capable of critical applications Customer • Resource pooling • Distributed architecture
• Compatible with • Self-management and maintenance Requirements • Auto scaling • Centralized management
existing hardware
27 Huawei Confidential
Asynchronous Replication Scenario
UltraVR/BCManager UltraVR/BCManager
FusionCube A FusionCube B
Node 1 Getdelta Node 1
Node 2 Getdelta Asynchronous Node 2
replication
Node 3 Getdelta Node 3
Node 4 Node 4
Getdelta
28 Huawei Confidential
Quiz
1. (Multiple) Which of the following key components are included for FusionCube in
the virtualization scenario?
A. Server
C. Virtualization software
29 Huawei Confidential
Summary
Product positioning
Components: hardware, software, and
virtualization
Software and
hardware architectures
Logical architecture of distributed
storage
30 Huawei Confidential
More Information
Scan and subscribe for the
latest documentation
https://support.huawei.com/enterprise/en/newsletter
31 Huawei Confidential
Recommendations
Huawei provides engineers with a wide range of product learning materials, including multimedia
information and online courses.
Social Media:
support.huawei.com/e Data Storage Academy Huawei IT Products
& Solutions
https://www.linkedin.com/s
howcase/huaweiitproducts
https://www.youtube.com/c/
HuaweiITProductsSolutions
32 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
After completing this course, you should understand the following aspects
of the Hyper series technologies:
Concepts and application scenarios
Working principles
Configuration methods
2 Huawei Confidential
Contents
1. HyperSnap
2. HyperReplication
3. HyperMetro
4. HyperCDP
3 Huawei Confidential
Overview
4 Huawei Confidential
Technical Highlights of HyperSnap for Block
Technical highlights:
Quick generation: A storage system can generate a snapshot within several seconds to obtain a consistent
copy of the source data.
Minimal storage space consumption: A snapshot is not a full physical data copy, so does not occupy a
large amount of storage space. A snapshot of a large data source requires only a small amount of storage
space.
a d g a d g
j b e j b e
8:00 AM
h k c h k c
f i l f i l
a d g a d g
j m e j b e
9:00 PM
h k n h k c
f i l f i l
5 Huawei Confidential
Working Principles of HyperSnap for Block
Write to the source LUN Data requested to be written to L2 of the
(L2->P5)
Write to the source LUN source LUN is written to a new space P5.
again (L2->P7) Write to snapshot 1 (L0->P6) Write to snapshot 2 (L2->P8)
The original space P2 is referenced by the
snapshot.
LUN mapping table Snapshot mapping table Snapshot mapping table
Data requested to be written to L0 of
snapshot 1 is written to a new space P6,
requiring no additional read and write
overhead.
6 Huawei Confidential
HyperSnap for File
By generating a consistent image of the source file system at a certain point in time, the file system snapshot function
enables users to quickly obtain a data duplicate identical to the source file system. This process does not interrupt the services
of the source file system.
A snapshot is available immediately after being generated. Data read, write, and modification on the source file system do
not affect the snapshot data. Likewise, data read on the snapshot does not affect the data in the source file system.
7 Huawei Confidential
Concepts
Term Description
Source file system A file system for which a snapshot is created.
Block pointer, which indicates the metadata used to record a data block's
BP
storage location in a file system.
8 Huawei Confidential
Implementation Principles
Application server
9 Huawei Confidential
Read/Write Process
Creating a snapshot Data backup result ① The application server sends a
snapshot read request.
② The storage system reads data from
the storage pool based on the pointer
Source file system File system snapshot
Data in the of the file system snapshot and returns
FileA storage pool FileA the data to the application server.
bp1 A bp1 Reading the snapshot
Writing data to the source file system
bp2 B bp2
bp3 C bp3 Source file File system
system snapshot
FileB FileB E
FileA FileA
bp4 D bp4
bp1’ A bp1
bp2 B bp2
Data in the bp3 C bp3
Source file system storage pool
File system snapshot FileB FileB
E
FileA FileA bp4 D bp4
bp1’ A bp1
bp2 B bp2 1 2
bp3 C bp3
FileB FileB
bp4 D bp4
Data read/write status
10 Huawei Confidential
Snapshot Deletion
Snapshot 1 Snapshot 2 Snapshot 3 fs
×
P1
L1
P2 P2'
L2 Deleting a snapshot releases the data exclusively
occupied by the snapshot, without affecting the
file system data and the data of other snapshots.
P3 P3' P3''
L3 × Only the space exclusively occupied by the
snapshot is reclaimed. No shared data is deleted.
11 Huawei Confidential
Snapshot Rollback
Keywords: rollback within seconds,
Source FS Snapshot 0
Creating a snapshot
Data1 Data1 background rollback, not deleting
Data2 Data2
Data3 Data3
snapshots created after the target
Data1 is
changed snapshot
to Data4. Snapshot 0
Source FS Data1
Creating a snapshot
Data2 Snapshot 1 The rollback is completed as a
Data4
Data2 Data3 Data4
Data3 Data2 background copy. Specifically, the
Data3
Data3 is differential data between the current
changed
to Data5. file system snapshot and the target
Source FS
snapshot is copied to the location for
Data4
Data2
Data5 the current time point of the file system.
When the file system is rolled back
12 Huawei Confidential
Configuration Process
Start
Create a snapshot.
End
Mandatory Optional
13 Huawei Confidential
Emulation Test
Source file system File system snapshot
Experiment
Access
NFS protocol
Linux client
Windows client
Snapshot directory
14 Huawei Confidential
Contents
1. HyperSnap
2. HyperReplication
3. HyperMetro
4. HyperCDP
15 Huawei Confidential
Overview
Remote replication is the core technology used for remote data backup and
disaster recovery.
16 Huawei Confidential
Principle of Asynchronous Remote Replication
DCL RM: remote replication management module
3 DCL: data change log
6
1
RM
2
HOST 1 2
5
Primary Secondary
Cache Cache
Primary 5 Secondary
LUN LUN
4 4
7 WAN 7
Snapshot Snapshot
DCL
Primary Secondary
storage system storage system
17 Huawei Confidential
Writing Process in Synchronous Remote Replication Mode
Primary Secondary
Primary Primary Secondary Secondary
Host RM LUN LUN
Cache LUN Cache LUN
snapshot Snapshot
18 Huawei Confidential
Remote Replication Without Using a Consistency Group
Primary Secondary Primary Secondary Primary Secondary
LUN01 LUN01 LUN01 LUN01 LUN01 LUN01
Remote Remote Remote
replication pair 01 replication pair 01 replication pair 01
Primary Secondary Primary Secondary Primary Secondary
LUN02 Remote LUN02 LUN02 Remote LUN02 LUN02 Remote LUN02
replication pair 02 replication pair 02 replication pair 02
Primary Secondary Primary Secondary Primary Secondary
LUN03 Remote LUN03 LUN03 Remote LUN03 LUN03 Remote LUN03
replication pair 03 replication pair 03 replication pair 03
• Data, log and change tracking • During synchronization, • After the remote replication
information of a database are remote replication pair 02 pair failure, the secondary
respectively stored on primary fails due to a fault. storage system recovers data
LUN01, primary LUN02 and in the primary storage system,
• Remote replication pairs 01
primary LUN03. but data in the primary
and 03 succeed.
system is still unusable
• No consistency group is • As a result, data in the because the three primary
created on the primary primary storage system LUNs store data at different
storage system. becomes inconsistent with points in time.
that in the secondary storage
system.
19 Huawei Confidential
Remote Replication Using a Consistency Group
Primary CG 01 Secondary Primary CG 01 Secondary Primary CG 01 Secondary
LUN01 LUN01 LUN01 LUN01 LUN01 LUN01
Remote Remote Remote
replication pair 01 replication pair 01 replication pair 01
Primary Secondary Primary Secondary Primary Secondary
LUN02 Remote LUN02 LUN02 Remote LUN02 LUN02 Remote LUN02
replication pair 02 replication pair 02 replication pair 02
Primary Secondary Primary Secondary Primary Secondary
LUN03 Remote LUN03 LUN03 Remote LUN03 LUN03 Remote LUN03
replication pair 03 replication pair 03 replication pair 03
• Data, log and change tracking • During synchronization, • In the event of a disaster, the
information of a database are remote replication pair 02 secondary storage system
respectively stored on primary fails due to a fault. recovers data on the primary
LUN01, primary LUN02 and storage system.
• The consistency group stops
primary LUN03. remote replication pairs 01 • Data in the primary storage
• Create consistency group 01 and 03 immediately. system is available
in the primary storage system immediately after the
• After the fault is rectified, the
and add the three remote recovery.
consistency group resumes
replication pairs to the synchronization.
consistency group.
20 Huawei Confidential
Running Status of a Remote Replication Pair
By viewing the running status of a pair, you can determine whether the pair requires synchronization,
splitting, and primary/secondary switchover operations. After performing an operation, you can view the
running status of the pair to check whether the operation has succeeded.
Running
Description
Status
The Normal running status of a remote replication pair indicates that data synchronization between the primary and secondary
Normal
LUNs in the pair is complete.
Data replication between the primary and secondary LUNs in a remote replication pair is suspended. The running status of a pair
Split
changes to Split after the primary and secondary LUNs are manually split.
The running status of a remote replication pair changes to Interrupted after the pair relationship between the primary and
Interrupted
secondary LUNs is interrupted. This occurs when the links used by a remote replication task are down or either LUN fails.
If a remote replication pair requires restoration using a manual policy after the fault that caused a pair interruption is rectified, the
To be recovered pair running status changes to To be recovered. This status reminds users of manual data synchronization between the primary
and the secondary LUNs to restore the pair relationship between them.
If the properties of a remote replication pair are changed at the primary or secondary site after the pair is interrupted (for
Invalid example, a pair is deleted at the primary or secondary side when the HyperReplication link fails), the running status of the pair
becomes Invalid because the configurations of the pair between the primary and secondary sites are inconsistent.
The running status of a remote replication pair is Synchronizing when data is being synchronized from the primary LUN to the
Synchronizing secondary LUN. In this state, data on the secondary LUN is unavailable and cannot be used for service recovery if a disaster occurs.
The secondary LUN can only be used for service recovery when in the consistent state.
21 Huawei Confidential
Multi-Point-In-Time Caching Technology for
Asynchronous Remote Replication
Up to one consistency point every 3 seconds
22 Huawei Confidential
Writable Secondary LUN for Remote Replication
Definition Writable secondary LUN
The secondary LUN can receive data from hosts. After Production DR
configuring the HyperReplication feature, the secondary LUN is center center
read-only by default. If the primary LUN is faulty, the
administrator can cancel secondary LUN write protection to set
the secondary LUN to be writable. Then the secondary storage
system can take over host services to ensure service continuity.
Application Scenarios
Users want to use data on the secondary LUN for data Synchronous/
analysis and mining without affecting services on the Asynchronous
WAN
primary LUN. replication
The production storage system at the primary site is faulty SAN SAN
but the secondary site fails to take over services due to a
primary/secondary switchover failure. WAN
Advantage
Storage Storage
The writable secondary LUN function speeds up service
recovery. In addition, after the secondary LUN is read and
written, an incremental synchronization can be performed, A disaster The host at the
enabling services to be switched back rapidly after disaster occurs at the secondary site reads
recovery. primary site. and writes DR data.
23 Huawei Confidential
Multi-Link Redundancy Technology
Short-distance Long-distance
deployment deployment
24 Huawei Confidential
Supported Features
25 Huawei Confidential
Configuration Process
Start
Create an authentication
user. Before adding a remote storage device, create a user to be
the remote device administrator for that device so it can
Add a remote storage be authenticated.
device.
26 Huawei Confidential
Central Backup for Disaster Recovery
In a central backup for disaster recovery scenario, service data at multiple service sites is centrally
backed up to and managed at the central backup site. If a disaster occurs, the central backup site
can take over services from the service site and recover data.
HyperReplication
Primary LUN 02 pair 02 Secondary LUN 02
WAN
Service site 02
Host
27 Huawei Confidential
Contents
1. HyperSnap
2. HyperReplication
3. HyperMetro
4. HyperCDP
28 Huawei Confidential
Overview
HyperMetro is also called the active-active feature.
It enables two data centers to establish a mutual backup relationship. Both data
centers should be in the running status.
If a device fault occurs in one data center or the entire data center fails, services are
automatically switched to the other one.
29 Huawei Confidential
HyperMetro Networking
WAN
Service network
Application Application
Server Server
10GE 10GE
switch Active-active switch
private
network
IP management network
Quorum server IP service network
30 Huawei Confidential
Write I/O Process
Host
Write I/O
Storage Storage
system A system B
2 HyperMetro LUN
4
4 3 3
31 Huawei Confidential
Read I/O Process
Application server
1 5
HyperMetro management
module
2
3 4 4
Local Remote
LUN LUN
32 Huawei Confidential
Quick Initialization/Incremental Data Synchronization
Full copy of non-zero data blocks Zero copy of zero-page data blocks
33 Huawei Confidential
Cross-Site Bad Block Repair
Disks may have bad blocks due to abnormalities, such as power failure. If
repairable bad blocks are not repaired on the local end, HyperMetro
automatically obtains data from the remote end to repair them, further
enhancing system reliability.
34 Huawei Confidential
FastWrite
Transmission protocol optimization
Traditional write process Write process of Huawei (A-A) solution (write FastWrtie)
100KM 100KM
8G FC/10GE 8G FC/10GE
① Write Command ① Command
RTT-2
⑧ Status Good
35 Huawei Confidential
States of a HyperMetro Pair
Normal
Pause (operation) Fault (event)
Synchronization
completion (event)
Synchronize (operation) Synchronize (operation)
Synchronize
(operation)
Force start Force start
(operation) (operation)
Force Start
36 Huawei Confidential
Why Is Arbitration Necessary?
X
X
Storage Storage Storage Storage
system A system B system A system B
37 Huawei Confidential
Two Arbitration Modes
X X
Storage Storage Storage Storage
system A system B system A system B
X X
Quorum Quorum
server server
38 Huawei Confidential
HyperMetro Arbitration Mechanism
Arbitration deployment
1. Quorum Server Mode
• If heartbeat communication between two storage systems
fails, the storage system in each data center sends an
arbitration request to the quorum server. The storage
Storage resource pool system that wins the arbitration continues providing services
while the storage system that fails in the arbitration stops
providing services. The preferred site takes the precedence
in arbitration.
X
Arbitration of the
Storage preferred site Storage
system A 2 system B
2. Static Priority Mode
X
• If heartbeat communication between two storage systems
1 fails, the storage system that is preset with arbitration
precedence continues providing services.
Quorum
server
39 Huawei Confidential
Configuration Process
Start
Create a
HyperMetro domain.
Check the
HyperMetro license. Configure HyperMetro
Configure HyperMetro for a LUN. for a LUN group.
Create a LUN
Create a LUN.
Add an group.
authentication user.
Create a
*Create a logical Create a
HyperMetro pair.
port. HyperMetro
consistency group.
40 Huawei Confidential
Local DC Deployment
Local DC
IP network IP network
Quorum server
41 Huawei Confidential
Contents
1. HyperSnap
2. HyperReplication
3. HyperMetro
4. HyperCDP
42 Huawei Confidential
Overview
With an ever-increasing amount of data, traditional data backup solutions are facing the
following challenges:
Large amount of backup data and rapid data growth
Small backup window
Requirement for zero impact on production system performance
Ever higher requirements on the recovery point objective (RPO) and recovery time objective (RTO)
Currently, Huawei OceanStor Dorado V6 storage systems provide writable snapshots. A single
LUN supports up to 1,000 snapshots, but this does not meet the requirements of mission-critical
applications for continuous data protection.
To address these requirements, Huawei provides HyperCDP, which creates high-density snapshots
on a storage system to provide continuous data protection.
43 Huawei Confidential
Functions and Working Principles
HyperCDP creates high-density snapshots on Huawei OceanStor Dorado V6 to provide continuous
data protection.
HyperCDP has the following advantages:
HyperCDP provides intensive and persistent data protection. A single LUN supports 60,000 HyperCDP
objects. The minimum interval is 3 seconds.
HyperCDP provides data protection at an interval of seconds, with zero impact on performance and while
occupying little space.
Scheduled tasks are supported. You can specify HyperCDP schedules by day, week, month, or a specific
interval.
HyperCDP consistency groups are supported.
A HyperCDP object cannot be directly mapped to a host for read and write. You can create a duplicate,
convert it into a writable snapshot, and map it to the host.
44 Huawei Confidential
Read and Write Principles
HyperCDP objects cannot be directly mapped to hosts for read and write. They must be converted
to writable snapshots and then mapped to hosts.
Source CDP0 CDP1
LUN
Creating a
snapshot
First mapping duplicate
Mapping
Host SNAP0
Reactivating
Second mapping the snapshot
Mapping
Host SNAP0
45 Huawei Confidential
HyperCDP Rollback Without Data Modification
Rollback using a HyperCDP object is a process of copying the data in the HyperCDP object to the
source LUN. After the rollback is started, the source LUN can be used immediately (data on the
source LUN is the HyperCDP data).
Source LUN
1
L0
T1 1. The host reads L1.
L1 B' 3
2. The data request is redirected
to CDP1 (T0) if L1 has not
2 been rolled back and is not
written by the host after the
CDP1 rollback starts.
3. B is returned to the host.
T0 L0 A
L1 B
46 Huawei Confidential
HyperCDP Rollback with Data Modification
Source LUN Source LUN
1. The host
T1 L0 A' L0 A'
writes C to L1. T1
L1 B' L1 C
2. L0 is rolled back.
CDP1 CDP1
T0 L0 A T0 L0 A
L1 B L1 B
3. L1 rollback is
CDP1 CDP1 canceled because L1
has been written by
T0 L0 A T0 L0 A the host.
L1 B L1 B
47 Huawei Confidential
HyperCDP Consistency Group
The data, logs and modification information of large and medium-sized databases are stored on
different LUNs. If data on one of these LUNs is unavailable, data on the other LUNs is also invalid.
The HyperCDP consistency group ensures the consistency of application data during restoration.
Like individual HyperCDP objects, you can create, delete, roll back, or stop rolling back a
HyperCDP consistency group as required. You can also create or rebuild duplicates for HyperCDP
consistency groups.
CDP1
CDP2
LUN1 LUN1 Snapshot 1
CDP2-1
48 Huawei Confidential
HyperCDP Schedule
You can specify HyperCDP schedules by day,
week, month, or a specific interval. These
schedule policies can retain different numbers of
HyperCDP objects, and multiple policies can be
used together in a schedule.
A HyperCDP schedule supports multiple LUNs
and LUN consistency groups, while a LUN or
LUN consistency group can be added to only
one HyperCDP schedule.
The minimum interval for a HyperCDP schedule
is 3 seconds, and the maximum number of
retained objects for each member is 60,000.
49 Huawei Confidential
Capacity Threshold of a Storage Pool
Because HyperCDP supports a minimum interval of 3 seconds, a large amount of data
protection capacity may be required if new data is writing to the source LUN constantly.
As a result, the storage pool space may be used up, adversely affecting host services.
Functions:
The system supports thresholds for the used capacity and protection capacity of a storage
pool. You can set these thresholds as required.
The capacity thresholds are disabled by default. You are advised to enable them when
configuring HyperCDP.
Only the HyperCDP objects created by HyperCDP schedules will be deleted when the
thresholds are reached. The objects created manually will not be deleted.
50 Huawei Confidential
Configuration Process
Start
End
Mandatory Optional
51 Huawei Confidential
Data Mining and Testing
Snapshot duplicates can be created for HyperCDP objects and used for data mining and testing, which will not affect service
data. The following example shows how HyperCDP can be used for data testing.
A HyperCDP object is generated for the data to be tested at 11:00 a.m.
A snapshot duplicate is created for the HyperCDP object and is read and written by the test server. During the test, the source data and
services that access the source data are not affected.
One hour later, the source data and duplicate data are changed based on the data at 11:00 a.m.
After the test, users can create another duplicate for the HyperCDP object to obtain the data at 11:00 a.m. and use the duplicate for another
test. Applications Data 11:00 AM Data 12:00 AM
server
Applications
I/Os
Create snap’s
duplicate
Test I/Os
Test server Snap 11:00 AM Tested data 12:00 AM An other snap 11:00 AM
11 12 Time
52 Huawei Confidential
Contents
1. HyperSnap
2. HyperReplication
3. HyperMetro
4. HyperCDP
53 Huawei Confidential
HyperMirror
HyperMirror is a data backup technology. It creates multiple physical mirror copies for a LUN to
achieve continuous LUN backup and protection. This significantly improves the reliability and
availability of the LUN.
Host
Mirror LUN
Volume Volume
54 Huawei Confidential
HyperLock
HyperLock is the Write Once Read Many (WORM) feature developed by Huawei to protect the
integrity, confidentiality, and accessibility of data to meet data storage security requirements.
Extend the protection period.
Manually set the file to the locked state or the file
automatically enters the locked state upon expiration. Reset the protection period.
55 Huawei Confidential
HyperVault
HyperVault uses backup technology based on file system snapshots in storage
systems to carry out local and remote backup and recovery.
IP/Fibre
NAS Channel NAS
network
Local Remote
backup backup
OceanStor OceanStor
storage system storage system
56 Huawei Confidential
Quiz
1. (True or False) BCManager eReplication must be deployed for the HyperMetro feature of
Huawei OceanStor Dorado storage systems.
2. (True or False) Arbitration software can be deployed on a virtualization platform for the
HyperMetro feature of Huawei OceanStor Dorado storage systems.
B. FCoE
C. IP
D. IB
57 Huawei Confidential
Summary
HyperSnap
HyperReplication
58 Huawei Confidential
More Information
Scan and subscribe for the
latest documentation
https://support.huawei.com/enterprise/en/newsletter
59 Huawei Confidential
Recommendations
Huawei provides engineers with a wide range of product learning materials, including multimedia
information and online courses.
Social Media:
support.huawei.com/e Data Storage Academy Huawei IT Products
& Solutions
https://www.linkedin.com/s
howcase/huaweiitproducts
https://www.youtube.com/c/
HuaweiITProductsSolutions
60 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. SmartPartition
2. SmartQuota
3. SmartVirtualization
3 Huawei Confidential
Overview
SmartPartition partitions major resources, such as read and write caches, for
different service LUNs and file systems to isolate services. The resources to
which SmartPartition is applied are independent of each other.
SmartPartition helps strike an ideal balance between services and performance
for LUNs and file systems.
SmartPartition helps maintain excellent performance of mission-critical
applications by minimizing the impact of other services.
4 Huawei Confidential
Working Principles
SmartPartition creates Application Application
……
Application
server 1 server 2 server n
5 Huawei Confidential
Configuration Process
Parameter Description Value
Engine where a
newly created [Example]
Engine
SmartPartition StorageEngine000
Start partition resides.
[Value range]
• The value cannot exceed the available
read partition size. Optional units are
1. Check whether Read cache size
Check the SmartPartition of a newly
MB and GB. The value of read
the SmartPartition Read partition partition size must be at least 256 MB
license file. created
feature is available. size and an integral multiple of 128 MB.
SmartPartition
When the entered value is not an
partition
integral multiple, the system
automatically changes the value to
Create
one that meets requirements.
2. Create SmartPartition SmartPartition
partitions. partitions. [Value range]
• The value cannot exceed the available
write partition size. Optional units are
Write partition
MB and GB. The value of write
size of a newly
Write partition partition size must be at least 256 MB
End created
size and an integral multiple of 128 MB.
SmartPartition
When the entered value is not an
partition
integral multiple, the system
automatically changes the value to
one that meets requirements.
6 Huawei Confidential
Multi-Service Application Scenario
Ensuring the performance of core services in a multi-service system
As the performance and capacity of a storage system grow, multiple applications are typically deployed in the same storage system to
simplify the storage architecture and reduce configuration and management costs. However, storage resources may be allocated among these
applications in an inappropriate manner, hampering service performance.
Based on service characteristics, SmartPartition can allocate different cache partitions to different services so that mission-critical services
remain running properly.
Appropriate read and write cache sizes are set based on the read and write I/O frequencies of a production and a test system,
improving the read and write I/O performance of the production system while maintaining proper operation of the test
system.
SmartPartition 1 is created for the production system. (For example, the read cache size is 20 GB and the write cache size is 10 GB.) The read
and write cache sizes are sufficient for the frequent read and write I/Os in the production system.
SmartPartition 2 is created for the test system. (For example, the read cache size is 15 GB and the write cache size is 8 GB.) The read and
write cache sizes can maintain the proper operation of the test system while having no impact on the performance of the production system.
The production system and the test system run on the same storage system. The service characteristics are as follows:
System/Service Type Service Characteristic
Production system Frequent data reads and writes
7 Huawei Confidential
Contents
1. SmartPartition
2. SmartQuota
3. SmartVirtualization
8 Huawei Confidential
Overview
SmartQuota provides a resource management and control method.
Host
Limits the resource usage of each directory,
user, or user group.
I/O Prevents users from excessively using files and
capacity space.
9 Huawei Confidential
SmartQuota Glossary
Acronym or
Full Spelling Definition or Description
Abbreviation
A dtree is a unique directory in a file system. Quotas
Dtree Directory tree can be set on dtrees only to limit the use of capacity
and files.
10 Huawei Confidential
Resource Management and Control on Dtrees
11 Huawei Confidential
Dtree Resource Usage
File
Dtree 1 Space
Quantity
Dtree 1 Directory 8 MB 4
| ---- confFile.conf (2MB, usr 3, grp 5) User
12 Huawei Confidential
Quota Types
File System
Other Dtrees
(Dtree 0)
Directory quota O
Default directory
O
quota
User quota O O
Default user quota O O
User group quota O O
Default user group
O O
quota
13 Huawei Confidential
Configuration of Quotas on Dtrees
Configuration items: space soft quota, space hard quota, file quantity soft quota,
and file quantity hard quota
The soft quota must not exceed the hard quota. At least one quota must be
configured.
14 Huawei Confidential
Quota Check During I/O Operations
SmartQuota checks the space and file
Protocol server quantity requested in each write I/O against
the hard quota.
If the new resources required plus the used
resources exceed the hard quota, the system
File system rejects this write I/O, reports an event of
exceeding the hard quota, and returns an
I/O
error of insufficient space.
No If the sum of resources is within the hard
Used + Delta quota, the new resources required are added
< Hard quota to the amount of used resources.
In addition, if the sum of resources exceeds
Quota check Yes the soft quota, the system reports an alarm.
After data or files are successfully deleted,
Cache the alarm will be cleared if the amount of
used resources decreases to lower than 90%
of the soft quota.
15 Huawei Confidential
Quota Creation and Management Process
Create a directory quota. Create a host user or a
Delete or modify a directory user group.
quota. Modify, query, or delete a
Generate a report or reports in host user or user group.
a batch.
Step 2
Directory Stepor3user
User Step 4
Step
Dtree1 Share
Produc
quota Produc
group quota Produc
management
Product 1
management
management management
t2 t3 t4
16 Huawei Confidential
Directory Quota Scenario
Directory of user A
(dtree 1)
NAS
Manager A
Directory of project
team A (dtree 2)
Engineer A
Share Engineer B
Directory of the sales …
department (dtree 3)
Sales staff A
Sales staff B
…
17 Huawei Confidential
Contents
1. SmartPartition
2. SmartQuota
3. SmartVirtualization
18 Huawei Confidential
Overview
SmartVirtualization is a heterogeneous virtualization feature. When a local storage system (for example, a
Huawei OceanStor Dorado V6 series storage system) is connected to a heterogeneous storage system (for
example, a different class of Huawei storage system or a third-party storage system), this feature enables the
local storage system to use and manage the storage resources of the heterogeneous storage system as local
storage resources even if it runs different software and hardware architectures.
With SmartVirtualization, a local storage system can take over the storage
resources of heterogeneous storage systems, and the user can manage and allocate
Integrated device space and
the same resources from the local storage system. This simplifies space allocation
simplified space allocation
operations between different storage systems and integrates storage resources of
these storage systems.
19 Huawei Confidential
Highlights
Highlight Description
Full physical data mirroring is not performed when the local storage system uses the
Reduced consumption of storage space provided by the LUNs in a heterogeneous storage system (external
storage space LUNs). This minimizes consumption of the storage space on the local storage
system.
Excellent function The local storage system can also use the SmartMigration feature with external
extension LUNs to improve security and the reliability of service data.
20 Huawei Confidential
Relationship Between an eDevLUN and an External LUN
An eDevLUN consists of data and metadata. A mapping relationship is established between data
and metadata.
Mapping relationship 1
eDevLUN 1
Mapping relationship n
Application server
eDevLUN n
21 Huawei Confidential
Data Read Process
After the local storage system takes over the external LUNs on a heterogeneous storage system using
SmartVirtualization, and when an application server delivers a request to read data from the external LUNs,
the eDevLUNs on the local storage system will receive a request and then read data from the external LUNs.
Application server
22 Huawei Confidential
Data Write Process
When the local storage system takes over a heterogeneous storage system using
SmartVirtualization, the data write process is as follows:
Application on server
①
into the heterogeneous storage system.
④
③ The heterogeneous storage system sends
③ External LUN
the write success message to the local
②
eDevLUN storage system.
④ The local storage system sends the write
success message to the application server.
Local Heterogeneous
storage system storage system
23 Huawei Confidential
Offline Takeover and Online Takeover
eDevLUNs eDevLUNs
without LUN masquerading properties with LUN masquerading properties
Step 2:Disconnect the Step 3:Connect the Step 3:Disconnect the Step 2:Connect the application
application server from application server to the local application server from server to the local storage
the heterogeneous storage system and enable the heterogeneous system and then the application
storage system to stop the local storage system to storage system. Data server can identify the
data transfer and services. take over services. transfer interruption does masqueraded eDevLUNs.
not affect services.
24 Huawei Confidential
Selecting a Takeover Mode
SmartVirtualization allows a local storage system to take over a heterogeneous storage system in online or
offline mode. The online takeover mode includes basic masquerading, extended masquerading, and third-
party takeover. The takeover mode depends on the vendors and versions of the heterogeneous storage
systems and multipathing software.
25 Huawei Confidential
Configuration Process
Start
4. Create an eDevLUN to
centrally manage the
heterogeneous storage
system. Configure and use Create an eDevLUN.
an eDevLUN.
26 Huawei Confidential
Migrating Service Data to a New Storage System
As services grow, larger spaces are required to store the increasing amount of data. If their existing storage systems cannot provide satisfactory
data storage capacity and performance, customers need to acquire storage systems that provide larger capacity and better performance to
upgrade or replace their existing storage systems. As the two storage systems use different software and hardware components, data migration
may interrupt services and even cause data loss. SmartVirtualization helps resolve the differences between the two storage systems by mapping
the external LUNs in the source storage system to the eDevLUNs in the new storage system. The SmartVirtualization and SmartMigration features
then work together to migrate service data from the source storage system to the new storage system while maintaining data integrity and
reliability without interrupting services.
LUN (cold data)
Data migration
(SmartMigration)
External
eDevLUNs LUNs
27 Huawei Confidential
Contents
1. SmartPartition
2. SmartQuota
3. SmartVirtualization
28 Huawei Confidential
SmartCache
Database OLTP
Web servers File servers
servers applications
29 Huawei Confidential
SmartMulti-Tenant
The SmartMulti-Tenant feature helps provide customized services for tenants at different levels
under the same system and service based on the service type of each tenant. SmartQoS and
SmartPartition policies can be created per tenant requirements to properly allocate storage
resources and maintain smooth operations to meet the quality requirements stipulated by high-
end tenants.
Customized Customized
Customized
SmartQoS and SmartQoS and Customized SmartPartition
SmartPartition None
SmartPartition SmartPartition policies
policies
policies policies
30 Huawei Confidential
SmartQoS
Storage Concept
administrator
SmartQoS specifies performance objectives for different
vStore QoS Control services to guarantee normal running of mission-critical
Isolation of mission-critical services services. It applies to scenarios with multiple vStores and
QoS: 800 MB/s QoS: 2 GB/s
services.
QoS: 200 MB/s
vStore A vStore B vStore C vStore QoS policy
Create a QoS policy for a vStore to set IOPS and bandwidth
FS 1 FS 1 1 GB/s objectives of the vStore.
FS 1
200 800 Add the file systems of the vStore to the QoS policy for
FS 2 MB/s FS 2 MB/s FS 2 700 MB/s
QoS control.
FS 3 FS 3 FS 3 300 MB/s File system QoS policy
Create a QoS policy for a file system to set IOPS and
The performance of non- Triggers traffic bandwidth objectives of the file system.
critical services rises, which in control. Add a file system to the QoS policy for QoS control.
turn affects the performance
of mission-critical services. Limits the The vStore and file system QoS policies can coexist. File
performance of system performance will be controlled when it reaches the
non-critical services
objective specified by either the file system or vStore QoS
to prevent
interference with policy.
other services.
31 Huawei Confidential
SmartDedupe and SmartCompression
Write data.
1
Identify the pattern.
Local hot FP FP table
2 table
Calculate the FP and SFP.
5 Opportunity
table
Check the local FP table.
Is the FP No 6
found in the New data Perform post-process
FP table? fixed-length or
Yes similarity-based
3 4 deduplication.
Perform inline Perform data
deduplication and return compression and
the FP reference count. compaction.
32 Huawei Confidential
Byte-Level Post-Process Variable-Length Deduplication
Inline and post-process, fixed-length and variable-length adaptive deduplication
Supports fixed-length + variable-length deduplication for the optimal data reduction ratio.
33 Huawei Confidential
Inline Data Compression
Byte-level data compaction
Original data
organization
1 KB 3 KB 5 KB 7 KB 9 KB 10 KB
Wasted spaces
B1 B2 B3 B4 B5 Metadata offset
Optimized
data
organization
1 KB 3 KB 5 KB 6 KB
34 Huawei Confidential
Quiz
1. (True or False) SmartPartition creates partitions in the unit of LUNs or file systems, and
each partition can only be accessed by the LUN or file system in the partition.
2. (Multiple) Which of the following statements are true about the file system QoS policy?
A. When creating a file system QoS policy, you must set performance objectives, such as IOPS and
bandwidth.
C. The vStore and file system QoS policies can coexist for dual-level QoS control.
D. File system performance will be controlled when it reaches the objective specified by either the file
system or vStore QoS policy.
35 Huawei Confidential
Summary
SmartPartition
SmartQuota
Smart series technology and
application
SmartVirtualization
36 Huawei Confidential
More Information
Scan and subscribe for the
latest documentation
https://support.huawei.com/enterprise/en/newsletter
37 Huawei Confidential
Recommendations
Huawei provides engineers with a wide range of product learning materials, including multimedia
information and online courses.
Social Media:
support.huawei.com/e Data Storage Academy Huawei IT Products
& Solutions
https://www.linkedin.com/s
howcase/huaweiitproducts
https://www.youtube.com/c/
HuaweiITProductsSolutions
38 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
Deduplication and Compression
Data with low
deduplication
Opportunity
ratios is filtered Queue to be
table
Block 1 out using the compressed
2 Data block HASH-A
opportunity
fingerprints table.
enter the Block 2
opportunity
table.
Compression engine
Block 3 HASH-B
Low compression High compression
rate and high speed rate and low speed
Promote the
1 Write data blocks. 3
opportunity table to
a fingerprint table.
Block 1 Fingerprint
table
Block 2
Block 4 Block A HASH-A The fingerprint
Block 5 table occupies little Data after
4 Direct data in memory, which compression
Block 6 the fingerprint supports
table after deduplication of
deduplication. large-capacity
systems.
4 Huawei Confidential
QoS
Application Application
server 1 server 2
Host 0 Host 1
I/O I/O
Token Token request request
bucket 0 bucket 1
Storage
system
Token
I/O queue of bucket 1
volume 1
......
I/O queue of Token
IOPS upper bucket n
limit 1000 volume N Disk
5 Huawei Confidential
Consistency Snapshot
Working Principles
1. A snapshot saves the complete data at a
specific point in time.
2. The newly written data is stored at the latest
point in time in LUNs.
3. Data is read from the latest point in time.
4. If a snapshot is deleted and the data is updated
to that of a new point in time, the
corresponding storage space will be reclaimed.
LUN E F G T3
Snapshot 2 D T2
Snapshot 0 A B T0
Storage space 0 1 2 3 4 5 6 7
6 Huawei Confidential
Clone
Working Principles
Source
Clone 1 Clone 2
snapshot
data.
3. After the clones are split, data in the clones is
copied to independent physical spaces.
Source
Clone
snapshot
A B C D A B C E
7 Huawei Confidential
Asynchronous Replication
Replication cluster A Replication cluster B
Async replication
Node 1
deltaData Node 1
Node 2
deltaData Node 2
Node 3
deltaData Node 3
Node 4
Node 4
deltaData
8 Huawei Confidential
HyperMetro
HyperMetro volume
6. After processing
I/O 1, the system
HyperMetro processes I/O 2. HyperMetro
member volume member volume
9 Huawei Confidential
Application Scenarios for the Block Service and
Kubernetes Integration Solution
Kubernetes Master
driver-registrar
① ②
CSI plugin
external-provisioner
Kubernetes Node
Huawei
Distributed
driver-registrar Container SCSI/iSCSI
Storage
/mnt
external-attacher
Kubernetes Node
CSI plugin
driver-registrar external-attacher
Mgmt. plane
CSI plugin Data plane
10 Huawei Confidential
Contents
11 Huawei Confidential
Online Aggregation of Small Objects
...
512 KB
Object data aggregation EC scheme 4+2 is used as an example.
Cache Cache
... ...
Node Node
12 Huawei Confidential
Quota and Resource Statistics
10 TB
2 TB 10 TB 8 TB 5 TB
Employee a Employee b Employee c Employee d
Bucket 1 Bucket 2 Bucket 3 Bucket 4
13 Huawei Confidential
Access Permission Control
14 Huawei Confidential
Multi-Tenancy
SMBs
Data center
15 Huawei Confidential
QoS
Object Storage
QoS policy:
100 MB/s QoS policy:
1000 TPS
QoS policy:
QoS policy:
1 MB/s
10 TPS
Bucket 1 Bucket 2
VIP1 Common
user
16 Huawei Confidential
Object-Level Deduplication
17 Huawei Confidential
WORM
18 Huawei Confidential
Remote Replication
Principle:
Use a unified domain
name to access S3 1. Data storage mode: The same object is stored in
multiple DCs without client duplicate mode between DCs, and is stored in EC mode
domain name and IP within a DC.
address changes.
2. QoS control: supports bucket-or tenant-based
bandwidth and TPS.
DC1 (active) DC2 (standby) 3. Visualization: The multi-DC topology, replication task,
progress, and network status can be displayed on the
Asynchronous management page.
replication Bucket 2 25/10GE
Bucket 1
WAN The names of the active and standby
buckets are the same. If a fault occurs, the
...
active/standby switchover does not affect
...
applications.
Cluster B
Supports replication performance-based QoS
Cluster A
object storage object storage control to ensure the performance of high-
priority applications
19 Huawei Confidential
Protocol-Interworking
S3 Client NFS Client
Function description: In
Object File 1. Standard Complete
protocol interworking
NFS interface functions
File scenarios, the primary storage
NFS Protocol-
service provides comprehensive
Interworking functions, and the secondary
Simplified storage service is used to meet
functions
3. Standard Object (active) ⇌ File basic read/write access
S3 interface requirements in specific
Object Service Layer
scenarios.
5. Object
4. Object data metadata
Object Index Layer Object (active) ⇌
Electronic check image
Coexistence of old and new service systems
NFS file and gradual object-based reconstruction
Persistence Layer
HDFS (active) ⇌
Autonomous driving
NFS file training
(v 8.0.3) Mass data import, training, and analytics
Object (active) ⇌ File with zero migration
20 Huawei Confidential
Application Scenarios for the Object Service Video
Surveillance Cloud Solution
1 MB data generated on each camera per 15s, 24/7
......
Household Family Pet 12 PB 180,000 online subscriber, rolling deletion is
24/7 tie feeding performed every 3, 7, and 15 days. 10% of the total
uninterrupted
security Capacity
videos are played back.
uploading
Transmits videos to 42 Gbps traffic for each camera
① the stream media
platform.
②
Streaming Video compression Web Server
media server Transmits
server
video stream
to the
analysis
ECS ECS ECS Concurrent bandwidth: 2.67 Gbps/10000
platform.
② Saves original videos ③ Saves the ④ Queries online users
videos.
48.06 Gbps
to the object storage compressed video
to the object
Bandwidth
Object storage The storage IOPS of 9000 users reaches
storage 600 million 30 million per day.
times per
day
⑤ Deletes videos based on time. IOPS Write/delete latency < 500 ms, read latency < 200 ms
21 Huawei Confidential
Contents
22 Huawei Confidential
Decoupled Storage-Compute HDFS Solution
23 Huawei Confidential
Tiered Storage
Compute
layer
Tiering based on
Cluster for Cluster for nearline query Cluster for historical
applications
interactive query and offline analysis data query Data in different directories can be
written into different resource pools.
One storage pool supports multiple
big data applications.
Lifecycle
management Data lifecycle management (data tiering, data migration, and layout query)
layer
Automatic data
migration
Users can customize migration
Hot Warm Cold policies to automatically migrate
Automatic cold and hot data.
Automatic
migration migration
Resource pool
management Unified namespace
layer Data migration is transparent to the
SSD high- HDD large- HDD high- computing side and can be directly
performance pool capacity pool density pool accessed based on the actual data
location.
24 Huawei Confidential
Quota and Resource Statistics
HDFS storage
100 TB
2 TB 10 TB 8 TB 5 TB
25 Huawei Confidential
Application Scenarios for the HDFS Service Solution
Real-time
retrieval
Operation
analysis
Data
visualization
Data
mining
...... Unified
portal
HDFS applications
HDFS components
Hadoop compute cluster
CPU CPU CPU CPU
......
Memory Memory Memory Memory
Management Compute Compute Compute Compute
node node node node node
......
26 Huawei Confidential
Contents
27 Huawei Confidential
InfoEqualizer
Distributed Distributed
Windows, Linux, storage Windows, Linux, storage
Unix... Unix...
①
Node 1
Depart1.9000.com Zone 1
② Node 2
DFS
③ Node 3
Depart2.9000.com Zone 2
Node 4
28 Huawei Confidential
InfoTier
Hot
data
SSD InfoTier enables files
to be stored on
different tiers based
SSD SAS on file properties. A
tier consists of one or
more node pools. A
node pool consists of
SAS SAS
multiple nodes. A
SATA node pool is divided
into multiple
Cold
SATA SATA SATA
Cold DiskPools. A partition
data data
is created for each
DiskPool.
Stores cold and hot data on Storage tiering
different tiers
29 Huawei Confidential
InfoAllocator
Storage
100 TB
10 TB
2 TB 10 TB 8 TB 5 TB
30 Huawei Confidential
InfoLocker
Expired
4. Extend
the protection
3. The
period.
protection
period expires.
2. Modify
Unprotected Protected the protection
1. Submit for period.
protection.
5. The data is 6. Submit
appended. for protection
again.
Appended
31 Huawei Confidential
InfoStamper
/
A snapshot is created
for directory data, and
Data then file 3 is deleted.
32 Huawei Confidential
InfoScanner
Antivirus function
Service server
NFS/CIFS
......
Send the path of the file to be scanned to the antivirus proxy server in polling mode.
Supports antivirus software such as Rising, Symantec, and Trend Micro ServerProtect.
33 Huawei Confidential
InfoReplicator
Primary Secondary
① directory: LAN/WAN directory:
/d/h/j /a/b/c ③
②
Snapshot
Snapshot
34 Huawei Confidential
InfoRevive
With InfoRevive > ABCD00 Strip
A B C D
A B C D
35 Huawei Confidential
InfoTurbo
Algorithm of active
cache detection Optimized protocol
Client
Current read
quick.
Next read
frame loss or
Next read
......
location
location
location
location
artifacts
occur. One client, multiple
One client, one link, links, and multiple
and one server servers break the
File File bottleneck created by
having network links
with a single server.
Legend:
Read data
Pre-fetched data
36 Huawei Confidential
Application Scenarios of the File Service Media Assets
NLE Media asset
management Requirement
Collection
Special Cataloging Search
Edit effects Composition The ingesting system needs reliable storage to
Solution
Playout Industry's highest data reliability from N+1 to
service
N+4
Elastic scalability, up to 100 PB storage
capacity, and linear expansion capability.
Processes Transcoding Web
Automatic non-hotspot data migration,
Playout maximizing ROI
Media asset
storage library
A single file system that satisfies all data
sharing requirements
37 Huawei Confidential
Quiz
1. (Multiple) Which features are supported by the distributed storage block service?
A. Snapshot
B. Clone
C. Remote replication
D. WORM
B. False
38 Huawei Confidential
Summary
Distributed Storage
Technology and Application
39 Huawei Confidential
More Information
Scan and subscribe for the
latest documentation
https://support.huawei.com/enterprise/en/newsletter
40 Huawei Confidential
Recommendations
Huawei provides engineers with a wide range of product learning materials, including multimedia
information and online courses.
Social Media:
support.huawei.com/e Data Storage Academy Huawei IT Products
& Solutions
https://www.linkedin.com/s
howcase/huaweiitproducts
https://www.youtube.com/c/
HuaweiITProductsSolutions
41 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
Concepts
4 Huawei Confidential
Basic Phases
Survey: Fully understand technology and
Survey service requirements.
Conceptual design
Conceptual design: Output the conceptual
High level design topology based on requirements,
restrictions, assumptions, and risks.
5 Huawei Confidential
Content
Industry Finance Government Video Media Desktop ...
surveillance asset
Requirement
Customer requirements
and scenario Extensive in the Refined in the Changed 3-to-5-year
early stage later stage requirements service planning
Deployment and
Planning and design Project acceptance
implementation
Service Information collection and Basic environment check and Solution acceptance criteria and
content analysis confirmation content
(Optional) Site survey Hardware installation and Acceptance process
Compatibility check acceptance Acceptance plan, human resource
LLD planning and design Implementation guide output allocation, and responsibility division
Value-added feature planning and Storage network configuration Acceptance cases
design guide
Software installation
Configuration and commissioning
Product
component Product components and hardware
Server Network device Storage device
6 Huawei Confidential
Process
Note: Only common items in the storage planning and design process are listed. These items
may vary case by case.
7 Huawei Confidential
Contents
8 Huawei Confidential
Information Collection
Live network
•Live network device
•Network topology
•Service information
•...
Project
information
Customer requirements
Schedule
•Pain points
•Project delivery time
•Service growth requirements
•Key time points
•System expansion requirements
•...
•...
9 Huawei Confidential
Requirement Analysis Principles
Cost Availability
Security Manageability
Recoverability Performance
10 Huawei Confidential
Contents
11 Huawei Confidential
Storage Selection
12 Huawei Confidential
Disk Type
Mapping between disk types and storage tiers:
Storage Medium
Tier Response Speed Cost Per Gigabyte
Type
High-performance
SSD Fast High
tier
Note: Tiered storage applies only to Huawei hybrid flash storage products.
13 Huawei Confidential
Disk Performance – Bandwidth
Bandwidth is used as a performance indicator only for large sequential I/Os. The
following table lists bandwidth of common disks.
14 Huawei Confidential
Disk Performance – IOPS
The following table lists the estimated IOPS of a single disk when the latency
requirement is met. The data is for reference only.
Minimum IOPS
Disk Type Estimated IOPS Range (Recommended for Device
Selection)
10K SAS HDD 280 to 350 150
15K SAS HDD 400 to 450 200
7.2K SATA/NL SAS HDD 170 to 200 70
SATA SSD Tens of thousands 2,500
SAS SSD Hundreds of thousands 3,500
NVMe 400,000 to 700,000 5,000
15 Huawei Confidential
RAID Level
RAID levels are classified by protection measures.
16 Huawei Confidential
I/O Characteristics
According to the working principles of RAID technology, write operations are most
abundant in terms of performance.
Based on a Login VSI benchmark test, the following tables describe the percentages of
I/O writes and reads in a steady state, as well as the percentages of I/O writes and
reads delivered to disks.
Percentages of I/O writes and reads in a steady state
17 Huawei Confidential
Compatibility Check
Storage system
O&M
management Server
software
Heterogeneous
HBA
virtualization
Multipathing
software
18 Huawei Confidential
Contents
19 Huawei Confidential
Flash Storage Networking
Direct-connection Single-switch Dual-switch
networking networking networking
Application
Application server Application server
server
20 Huawei Confidential
Distributed Storage Networking
Management Management
Private node Standard node
FSM FSM
client protocol
access access
Storage node Compute node Storage node Compute node
VBS/HDFS
EDS EDS
-SVR
OSD OSD
Management plane:
Third-place Third-place Storage plane:
DR site quorum DR site quorum Replication plane:
server server Arbitration plane:
Service plane:
21 Huawei Confidential
Network Port and VLAN Planning
22 Huawei Confidential
Switch Port Planning for Storage Networks
The following describes switch port planning when six nodes are deployed on a 10GE network
and the service, storage, and management switches are deployed independently.
Port Description
Storage node port Six 10GE ports from each switch are connected to storage nodes in sequence.
M-LAG port Each switch provides two 100GE ports to form an M-LAG.
Each switch provides four aggregation ports. Ports 3 and 4 are connected to one aggregation
switch, and ports 5 and 6 are connected to another aggregation switch.
Aggregation port
If the number of nodes is less than or equal to 40, aggregation switches are not required and the
aggregation ports are reserved for future use.
To avoid adversely impacting other ports, run the shutdown command to disable all reserved
Reserved port
ports. For details about the shutdown command, refer to the relevant switch documentation.
Note: The table shows switch port planning for when CE6881 switches are used as service and
storage switches.
23 Huawei Confidential
Switch Port Planning for Management Networks
ETH
Reserved management Aggregation BMC switch
NIC ports ports ports ports
24 Huawei Confidential
Contents
25 Huawei Confidential
Basic Service Planning Process (Block Service)
User behavior phase
Plan applications.
Purchasing
resources Plan capacity.
Plan the
read/write policy for LUNs.
Managing and
maintaining the Plan users. Mandatory Optional
system
26 Huawei Confidential
Basic Service Planning Process (File Service)
User behavior phase
Plan applications.
Purchasing
resources Plan capacity.
Authenticating
Plan user authentication.
users
Planning the
Plan the network.
network
27 Huawei Confidential
More Information
28 Huawei Confidential
Contents
29 Huawei Confidential
eService LLDesigner
LLD
documents
Wizard-based Visualization
Provides guidance for networking and Web-based hardware configuration,
service planning. device networking, and resource
allocation are visualized.
Standardization Automation
Unifies the LLD document style, simplifies Quickly generates LLD documents
project parameter settings, and shortens the and offline configuration files for
project planning and design duration. basic service configuration.
30 Huawei Confidential
Functions
Wizard-based
storage resource
planning
Automatic
Configuration recommendation
file exporting for device layout
in a cabinet
Visualized
networking
BOQ importing
31 Huawei Confidential
Obtaining and Using eService
How to obtain
• Visit
http://support.eservice.huawei.com/.
In the Deployment & Delivery area,
click LLDesigner. User guide
• Use Google Chrome.
• Go to the help center to watch the guide
video.
32 Huawei Confidential
Contents
33 Huawei Confidential
Networking Assistant
Networking Network
Diagram
Assistant Configuration
Product Product
Type Model
Note: Log in to the Huawei Data Storage Infocenter, and in the Tools area, click Networking Assistant.
34 Huawei Confidential
Power Consumption Calculator
Power Power
Consumption Components Consumption
Calculator and Weight
Product Product
Series Model
Note: Log in to the Huawei Data Storage Infocenter, and in the Tools area, click Power Consumption Calculator.
35 Huawei Confidential
More Information
36 Huawei Confidential
Quiz
1. (Multiple Choices) What are the indicators of project requirement analysis?
A. Security
B. Cost
C. Manageability
D. Recoverability
E. Performance
2. (Multiple Choices) Which are typical networking solutions for storage systems?
A. Dual-link direct-connection network
37 Huawei Confidential
Summary
Project Information
Planning and Design
Process
Hardware Planning
Planning and Design
Content
Network Planning
Storage Planning
and Design
Service Planning
eService LLDesigner
Planning and Design
Tools
Other Tools
38 Huawei Confidential
More Information
Scan and subscribe for the
latest documentation
https://support.huawei.com/enterprise/en/newsletter
39 Huawei Confidential
Recommendations
Huawei provides engineers with a wide range of product learning materials, including multimedia
information and online courses.
Social Media:
support.huawei.com/e Data Storage Academy Huawei IT Products
& Solutions
https://www.linkedin.com/s
howcase/huaweiitproducts
https://www.youtube.com/c/
HuaweiITProductsSolutions
40 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
This course introduces the process for installing and deploying Huawei
storage, including storage system installation, system initialization, and
service deployment.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
Installation Process
Connecting cables
Installing devices
4 Huawei Confidential
Preparing for Installation
5 Huawei Confidential
Installing Storage Devices
Installing a controller Installing a disk Installing optional
enclosure enclosure devices
Installing a storage
Installing a cable tray Installing a disk
node
...
6 Huawei Confidential
Connecting Cables
External power supply External power supply
Disk
enclosure 2 Controller
enclosure
Controller
enclosure
Smart disk
enclosure
Disk
enclosure 0
Disk
enclosure 1
SASDisk
enclo
sure
Connecting cables between the Connecting power cables between the
controller enclosure and disk enclosures controller enclosure and disk enclosures
Note: The above example shows Huawei OceanStor Dorado all-flash storage.
7 Huawei Confidential
Power-on Sequence
Power supply of
External power Switch power Server power
the controller
supply supply supply
enclosure
8 Huawei Confidential
Initializing a Storage Device
Navigate to the
Change the
Log in to initial
Start management IP
DeviceManager. configuration
address.
wizard.
9 Huawei Confidential
Initial Configuration Wizard
Device
information
Start
Device time
Configure basic
information.
License
management
Create a storage pool.
Alarm settings
Allocate resources.
End
Note: This example is relevant for all Huawei all-flash storage products. GUIs may vary by product version and model.
10 Huawei Confidential
Configuring Security Policies
Account policies
Login policies
Authorized IP addresses
11 Huawei Confidential
Configuring Alarm and Event Handling Policies
Email notification
SMS notification
Syslog notification
Note: For details, see section "Configuring Alarm and Event Handling Policies" in the product
documentation of the desired version.
12 Huawei Confidential
More Tools
This presentation lists only some of the main installation steps. For
more information, you can log in to Huawei Data Storage Infocenter
(http://support-it.huawei.com/storage/#/home) and search for the
storage installation video in Multimedia Center. You can also search
for the product documentation in OceanStor Dorado V6 Infocenter.
13 Huawei Confidential
Contents
14 Huawei Confidential
Basic Service Configuration Process (for Block)
Start
Disk domain creation > Storage pool creation > LUN creation > LUN group creation
Creating
storage space
Host creation > Host group creation
End
Note: The example above is for Huawei hybrid storage products. GUIs may vary by product version and model.
15 Huawei Confidential
Basic Service Configuration Process (for File)
Start
Disk domain creation > Storage pool creation > File system creation
Creating a file
system
Quota tree creation > Quota creation
Note: The example above is for Huawei hybrid storage products. GUIs may vary by product version and model.
16 Huawei Confidential
Contents
17 Huawei Confidential
Installation Process
Installing and deploying Performing the post-
Preparing for installation
software installation check
Prepare hardware. Verify the software package. Check the cluster status.
18 Huawei Confidential
Configuring a Storage Switch
Node port
Reserved port
• Run the shutdown command to disable the ports if they are not in use.
M-LAG port
• You are advised to use two 100GE ports for interconnection between switches.
Aggregation port
• You are advised to use four 100GE ports to connect to the aggregation switch.
19 Huawei Confidential
Configuring a Management Switch
MGMT port
Reserved port
• Run the shutdown command to disable the ports if they are not in use.
NIC port
Aggregation port
• You are advised to use two GE ports to connect to the management network.
20 Huawei Confidential
Cable Connection in Converged Deployment (for Block)
21 Huawei Confidential
Cable Connection in Separated Deployment (for Block)
Note: This example shows a P100 node. To bond management network ports, use NIC1-1 and NIC1-2.
22 Huawei Confidential
Object Service Node Connection
Note: This example shows a P100 node. To bond management network ports, use NIC1-1 and NIC1-2.
23 Huawei Confidential
HDFS Service Node Connection
25 Huawei Confidential
Contents
26 Huawei Confidential
Deployment Process of Distributed Storage Services
27 Huawei Confidential
Block Storage Configuration Process (SCSI)
Associate the
Create a
VBS with the
volume.
volume.
End
28 Huawei Confidential
Block Storage Configuration Process (iSCSI)
Add an Create a
initiator. volume.
Associate the
End host with the
volume.
29 Huawei Confidential
HDFS Service Configuration Process
Import the Create an HDFS
Common HDFS service service storage
configurations license. pool.
Create a
Associate the
NameNode
file system.
zone.
30 Huawei Confidential
Object Storage Configuration Process
Service
configurations Configure the
Configure the Configure a
object service
DNS service. region.
network.
Create an Create a
End
account. bucket.
31 Huawei Confidential
More Tools
This presentation lists only some of the main installation steps. For
more information, you can log in to Huawei Data Storage Infocenter
(http://support-it.huawei.com/storage/#/home) and search for the
storage installation video in Multimedia Center. You can also search
for the product documentation in OceanStor 100D Infocenter.
32 Huawei Confidential
Quiz
1. (True or False) With the help of the storage system's initialization wizard, we can configure the management IP
address of devices. ( )
2. (True or False) You should power on the cabinet first and then devices in the cabinet. ( )
3. (Multiple-Answer Question) Which of the following alarm handling policies are supported by the storage system?
( )
A. Email notification B. Syslog notification C. SMS notification D. Trap notification
4. (Multiple-Answer Question) Which of the following are true about the hardware requirements for installing the
distributed storage device? ( )
A. The number of host nodes must be greater than or equal to three.
33 Huawei Confidential
Summary
Storage system
installation
Service deployment
Storage installation
and deployment
Storage system
installation
Distributed storage
installation and System initialization
deployment
Service deployment
34 Huawei Confidential
More Information
Scan and subscribe for the
latest documentation
https://support.huawei.com/enterprise/en/newsletter
35 Huawei Confidential
Recommendations
Huawei provides engineers with a wide range of product learning materials, including multimedia
information and online courses.
Social Media:
support.huawei.com/e Data Storage Academy Huawei IT Products
& Solutions
https://www.linkedin.com/s
howcase/huaweiitproducts
https://www.youtube.com/c/
HuaweiITProductsSolutions
36 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. Storage O&M
O&M Overview
Information Collection
O&M Operations
2. Troubleshooting
3 Huawei Confidential
What Is O&M?
Operation and maintenance (O&M) refers to the activities necessary to operate and maintain
equipment, networks, servers, and services throughout their life cycles, aiming to achieve optimal
cost, stability, and efficiency.
Standard
4 Huawei Confidential
How to Perform O&M
Technical layer: Streamlines the O&M life cycle of each product and identifies the key measures of
each task.
Process layer (ITIL process management framework): change, event, and problem management.
Operations
Operation guidelines for device management
go-online and deployment
Capacity management and expansion
Configuration
Performance and experience optimization management
Emergency and DR drill Release
Cost and efficiency optimization management
...
PRR management (performance, reliability, and recoverability)
5 Huawei Confidential
Components of Enterprise Storage O&M System
Command center
eService
Storage DeviceManager DeviceManager DeviceManage
r
Remote maintenance
O&M administrator
Fault monitoring Fault backhaul
Authentication system
6 Huawei Confidential
Introduction to DME Storage Products
Data management engine (DME) Storage is Huawei proprietary software that provides centralized management and O&M
for storage devices in your data center. It covers the four phases of the device management life cycle (planning, provisioning,
maintenance, and optimization).
Browser 3rd System
DMEEcoPlugin
DME Storage
External routing API gateway (RESTful/SNMP)
Internal routing
Service governance
7 Huawei Confidential
DME Storage Functions
ITSM
Northbound API
Gold Silver
Gold Silver Bronze
Southbound API
Huawei AFA Huawei hybrid Huawei SDS FC switches Third-party Cloud (optional)
8 Huawei Confidential
DME Storage E2E O&M
Third-party
alarm
management
Customer administrator
Notification Filtering Demarcation Associated
Automatic SR and locating information
creation DME alarm
Report Notification E2E topology
management
eService E2E root
Masking Solution cause
Automatic analysis
acknowledgment/clearance/change/marking
9 Huawei Confidential
Proactive O&M of DME Storage
eService Training on cloud
Huawei
service
AI & Policy
Performance check and prediction
Automatic
engine - Storage resources/Hosts/Switches
SR creation Event - Service levels
management AI model
Customer Availability check
administrator Configuration check and prediction
Decision - Attribute, version, - Disk health
-making Analysis and warranty status/service
Automation AI & Policy
Dataset - Change and life
engine engine
associated - Hardware and
resources resource status
Configuration Data - Compatibility and - Abnormal
Historical
library cleansing workload
library data protection
detection
Execution
Access and collection Capacity check Optimization check
and prediction - Best practice
- Usage and free configuration
capacity - Unbalanced loads
Host/vCenter - Remaining use and recyclable
FC switch duration resources
Storage system
Storage infrastructure
10 Huawei Confidential
How to obtain O&M Documentation
Only some O&M methods are listed in the training materials. For
more information, log in to Huawei Data Storage Infocenter
(http://support-it.huawei.com/storage/#/home) and search for O&M
to view more O&M tools and cases.
11 Huawei Confidential
Contents
1. Storage O&M
O&M Overview
Information Collection
O&M Operations
2. Troubleshooting
12 Huawei Confidential
What Is Information Collection?
In the event of a fault, collecting information helps maintenance engineers
quickly locate and rectify the fault. This includes information related to faults,
storage systems, networks, and application servers, as well as basic information.
You must obtain the customer's consent before collecting information.
13 Huawei Confidential
Information Collection Methods
14 Huawei Confidential
How to Collect Live Network Information
Step
Step 2 Step 3
Storage Application
Step
Basic1 Fault 4
Networking
Produ Produ
device server
Product
information1 information
information Produ
information
information
ct 2 ct 3
ct 4
15 Huawei Confidential
Procedure for Collecting Fault Information
Export system data
Download logs
Host
File system
HBA
16 Huawei Confidential
How to Obtain More Documents
Our training materials focus on the process and methods. For more
information, log in to Huawei Data Storage Infocenter
(http://support-it.huawei.com/storage/#/home) and search for
Information Collection to view more information such as
information collection tools and commands.
17 Huawei Confidential
Contents
1. Storage O&M
O&M Overview
Information Collection
O&M Operations
2. Troubleshooting
18 Huawei Confidential
Quick Maintenance Procedure
Start
Check the indicator status Storage device indicators (front and rear panels) specify the device running status and
and handle related exceptions. help you discover and rectify common hardware faults.
Check the service status By checking the system information and service status, you can learn about the basic
and handle related exceptions. information, alarms, capacity trend, and performance of the storage system, as well as
the status of storage resource allocation and value-added features.
End
19 Huawei Confidential
Procedure for Checking the Storage Device
Stepthe
Check the Step 2 Stepthe
Check 3 Check
Step 1 Check device 4
service
storage running Produ Produ
Product
status. 1
indicators. running Produ
running
ct 2 ct 3
status. status.
ct 4
20 Huawei Confidential
Contents
1. Storage O&M
2. Troubleshooting
Troubleshooting Overview
Troubleshooting Methods
Troubleshooting Practices
21 Huawei Confidential
Fault Definition
Fault
A fault indicates a state in which a product cannot perform a specified function.
Preventive maintenance, other planned activities, or lack of external resources are
not faults. A fault is usually the state after the failure of a product, but it may also
exist before the product fails.
A fault is defined as an abnormal condition or defect at the component, equipment,
or sub-system level which may lead to a failure. (ISO/CD 10303-226)
22 Huawei Confidential
Fault Analysis
Fault analysis, also called fault diagnosis, refers to the process of collecting and
analyzing data to determine the cause of a fault and how to prevent the fault
from occurring again.
Fault analysis is an important subject in many branches of the manufacturing
industry. For example, in the electronics industry, fault analysis is an important
means of developing new products and improving existing products.
During fault analysis, you need to use various methods to collect fault data and
information for subsequent analysis of one or more fault causes. (source:
Wikipedia)
23 Huawei Confidential
MTBF and MTTR
up time (after repair) down time (unplanned)
Up
24 Huawei Confidential
Common Fault Types
25 Huawei Confidential
Contents
1. Storage O&M
2. Troubleshooting
Troubleshooting Overview
Troubleshooting Methods
Troubleshooting Practices
26 Huawei Confidential
Basic Principles for Troubleshooting Storage Faults
External factor failures include failures in optical fibers, optical cables, power supplies,
and customer's devices.
Analyze external factors Internal factor failures include failures in disks, controllers, and interface modules.
first and then internal
factors.
Analyze high-severity alarms and then low-severity alarms. The alarm severity sequence
from high to low is critical alarms, major alarms, and warnings.
Critical: Indicates an event that causes a service interruption or device failure.
Recovery measures must be taken immediately.
Major: Indicates an event that affects system performance. Recovery measures
Analyze alarms of higher must be taken to prevent greater impacts on the storage system or system
severities and then those performance. All alarms caused by hardware faults are major alarms.
of lower severities. Warning: Indicates an event that imposes no impact on the storage system
currently. However, the event may affect the services running in the system in the
future if left unresolved.
27 Huawei Confidential
Overview of Troubleshooting Storage Faults
1 Troubleshooting 2
Basic principles
procedure
Basic fault locating rules help
Troubleshoot faults by following users quickly exclude useless
the troubleshooting procedure. information and locate faults.
3 4
Alarm analysis Replacement
28 Huawei Confidential
Storage Troubleshooting Procedure
Start
Yes
End
29 Huawei Confidential
Contents
1. Storage O&M
2. Troubleshooting
Troubleshooting Overview
Troubleshooting Methods
Troubleshooting Practices
30 Huawei Confidential
Alarm Analysis
Overview
Typically, when a system is faulty, many alarms are generated. By viewing alarm information and analyzing performance
data, the type and location of the fault can be determined.
Application scenario
If alarm information can be collected, the alarm analysis method can be used to diagnose any fault.
Application example
A video service is once running properly but suddenly its performance deteriorates and picture display becomes unstable.
Check that the client status and network status are normal, and the fault indicator of the storage array is on. Log in to
the management page and find the critical alarm that is generated. On the alarm management page, check that a RAID
group degrade alarm is generated and locate the faulty disk. Replace the faulty disk and check that the fault is rectified.
31 Huawei Confidential
Replacement
Overview
A fault can be located and rectified by replacing components suspected to be faulty. The components can be network
cables, controllers, or expansion modules.
Application scenario
This replacement method requires hardware troubleshooting from engineers to quickly locate faulty components.
However, you must prepare spare parts in advance, which can be time-consuming.
It is recommended that you use this method in scenarios with minimum service volumes or impact on services.
Application example
During the preventive maintenance of devices in a library, a maintenance engineer fails to log in to a storage device using
DeviceManager and fails to ping through any storage devices on the host. After removing and reinserting or replacing
network cables, the maintenance engineer discovers that the problem is caused by a loose or damaged cable.
32 Huawei Confidential
BBU Troubleshooting Case
33 Huawei Confidential
Quiz
4. Fault information
2. (True or false) If a fault alarm is generated in the storage system, you are
advised to use the replacement method.
34 Huawei Confidential
Summary
O&M overview
Information
Storage O&M
collection
O&M operations
Storage O&M and
troubleshooting
Fault overview
Troubleshooting
Troubleshooting
methods
Troubleshooting
practices
35 Huawei Confidential
More Information
Scan and subscribe for the
latest documentation
https://support.huawei.com/enterprise/en/newsletter
36 Huawei Confidential
Recommendations
Huawei provides engineers with a wide range of product learning materials, including multimedia
information and online courses.
Social Media:
support.huawei.com/e Data Storage Academy Huawei IT Products
& Solutions
https://www.linkedin.com/s
howcase/huaweiitproducts
https://www.youtube.com/c/
HuaweiITProductsSolutions
37 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.