0% found this document useful (0 votes)
1K views414 pages

HCIP-Storage V5.0 Training Material

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views414 pages

HCIP-Storage V5.0 Training Material

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 414

Introduction to All-Flash Storage

Foreword

 Huawei OceanStor all-flash storage systems are designed to carry mission-critical services
for enterprises. The systems adopt the unique SmartMatrix architecture for global
interconnection and cluster-level resource sharing and scheduling to achieve symmetric
active-active service processing. The native-flash-dedicated FlashLink® technology ensures
consistent low latency, large throughput, reliable data storage, and stable performance
throughout the lifecycle.
 The storage systems meet the requirements of enterprise applications such as databases,
virtual desktop infrastructure (VDI), virtual server infrastructure (VSI), and file sharing. They
can help the financial, manufacturing, and carrier industries smoothly transition to all-flash
storage and build virtualized, cloud-ready, and intelligent IT systems.

1 Huawei Confidential
Objectives

 Upon completion of this course, you should understand the following


aspects of OceanStor all-flash storage systems:
 Product positioning
 Software and hardware architectures
 Key features and technical advantages
 Typical application scenarios

2 Huawei Confidential
Contents

1. Product Positioning

2. Software and Hardware Architectures

3. Key Technologies

4. Application Scenarios

3 Huawei Confidential
OceanStor Storage Portfolio
Solution

Storage as a Video surveillance Mission-critical Active-active


Media cloud HPC Data backup
service (STaaS) cloud enterprise service storage
Service-driven storage
Device management Centralized management Intelligent O&M
management

controller
Data

DeviceManager eSight OceanStor DJ eService

All-flash storage Hybrid-flash storage Distributed storage


Product portfolio

Huawei Huawei Huawei Huawei Huawei Huawei


OceanStor OceanStor OceanStor OceanStor OceanStor OceanStor
Dorado 3000 V6 Dorado 5000 V6 Dorado 6000 V6 2800/2810 V5 5300/5500 5600/5800
V5/F V5 V5/F V5

Huawei Huawei
Huawei OceanStor OceanStor
Huawei OceanStor Huawei OceanStor Huawei OceanStor
OceanStor Dorado 100D 9000
Dorado 18000 V6 6800 V5/F V5 18500/18800 V5/F V5
8000 V6
Note: Huawei storage products in 2020 H1 are listed as an example.

4 Huawei Confidential
Product Positioning

Huawei OceanStor all-flash series


 Chip-powered architecture: Provides intelligent chips,
end-to-end NVMe design, FlashLink® algorithm, and
powerful scalability up to 32 controllers.
 SmartMatrix: Builds a reliable end-to-end architecture at
the component, architecture, system, solution, and cloud
levels to support cloud-based convergence and guarantee
high service availability.
 Edge-cloud AI synergy: Enables full-lifecycle intelligent
management with AI chips and algorithms, and avoids
service cutover and interruption in data migration to provide
seamless user experience and improve operating efficiency.

5 Huawei Confidential
Contents

1. Product Positioning

2. Software and Hardware Architectures


 Hardware Architecture
 Software Architecture

3. Key Technologies

4. Application Scenarios

6 Huawei Confidential
Controller Enclosure Front View

Icon Description

Enclosure ID indicator

Enclosure location indicator


2 U controller enclosure with disks
1. Blinking blue: The controller enclosure
is being located.
2. Off: The controller enclosure is not
located.

Enclosure alarm indicator


1. Steady amber: An alarm is reported
by the controller enclosure.
2. Off: The controller enclosure is
4 U controller enclosure without disks working properly.

Note: Some product models of Huawei OceanStor all-flash series are used Power indicator/Power button
as an example.

7 Huawei Confidential
Controller Enclosure Rear View

Interface Power
module module

Management Maintenance Serial Interface Power-BBU module


port port port module  1+1 redundancy

SAS expansion port


 Each controller provides two SAS (for
the SAS edition) or 100 Gbit/s RDMA Management Serial Management Maintenance
(for the NVMe edition) expansion ports. port port module port

2 U controller enclosure 4 U controller enclosure

Note: Some product models of Huawei OceanStor all-flash series are used as an example.

8 Huawei Confidential
Connection Between Controller and Disk Enclosures
Controller enclosure with 25 x 2.5-inch SAS SSDs Controller enclosure with 36 x NVMe SSDs

Controller
enclosure

SAS interface 100 Gbit/s 100 Gbit/s Fully autonomous


module RDMA RDMA and controllable

Disk enclosure with 25 x Disk enclosure with 25 x Disk enclosure with 36 x NVMe SSDs
2.5-inch SAS SSDs 2.5-inch SAS SSDs

SAS disk enclosure Smart disk enclosure

Note: Some product models of Huawei OceanStor all-flash series are used as an example.

9 Huawei Confidential
Disk Enclosure

Onboard expansion ports Onboard management port Power module


Each expansion module Each expansion module • 1+1 redundancy and AC
provides up to four 100GE provides onboard management power supported
expansion ports. and serial ports. • 240 V high-voltage DC Expansion module
• Two expansion modules
• 12 Gbit/s SAS uplinks/downlinks

Serial port ID display 600 W power module


• 1+1 redundancy
Mini SAS HD expansion port • Integrated fan
• AC power supported
Note: Some product models of Huawei OceanStor all-flash series are used as an example.

10 Huawei Confidential
3D Interactive Display Multimedia

There are too many product


models. It would be good if I
could see the actual devices.

Don't worry, professor. The 3D interactive multimedia


presents Huawei storage just like real objects. You can
have an exploded view of each product and move any
component with your mouse to see its internal
structure. You can find it in the Huawei Data Storage
Infocenter.

11 Huawei Confidential
Contents

1. Product Positioning

2. Software and Hardware Architectures


 Hardware Architecture
 Software Architecture

3. Key Technologies

4. Application Scenarios

12 Huawei Confidential
Software Architecture
SmartKit Maintenance Application
OceanStor BCManager
terminal server
eService software UltraPath software
Management host OS layer SAN host OS layer

Management network
port and serial port Storage system software iSCSI/Fibre Channel

DeviceManager SNMP CLI Syslog Management software

Cache HyperSnap HyperReplication HyperClone HyperMetro HyperCDP

Pool
SmartQoS SmartThin SmartMigration SmartVirtualization Three-copy
SCSI

RAID SmartDedupe and SmartCompression

Storage OS

13 Huawei Confidential
SmartMatrix Full-Mesh Architecture
Host I/O
Network Network
adapter adapter

Fully-shared front-end
interconnect I/O
FIM FIM FIM FIM modules (FIMs)

192 192
cores cores Full interconnection
among controllers
BIM BIM BIM BIM 192 192
cores cores

Disk interconnection
across controller
enclosures with back-
Note: Huawei OceanStor Dorado 8000 and 18000 V6 are used as an
end interconnect I/O
example. OceanStor Dorado 3000, 5000, and 6000 V6 use dual- modules (BIMs)
controller architecture, which is not full-mesh interconnection.

14 Huawei Confidential
Active-Active Architecture with Full Load Balancing
1 Huawei UltraPath
Evenly distributes I/Os to all front-end ports.
Access load balancing

FIM FIM Front-end interconnect I/O module


2
Evenly distributes I/Os to all controllers.
Front-end load balancing

A B C D A B C D

3 Global cache
All controllers participate in service processing,
and LUNs are not owned by any controller.
Controller load balancing
BIM BIM

RAID 2.0+
4
Evenly distributes data to all SSDs.
SSD load balancing

15 Huawei Confidential
Contents

1. Product Positioning

2. Software and Hardware Architectures

3. Key Technologies
 High Performance
 High Reliability
 High Security

4. Application Scenarios

16 Huawei Confidential
I/O Acceleration
Host

25G/100G DTOE

FIM FIM FIM FIM

Storage Controller Controller Controller Controller


engine

BIM BIM BIM BIM

100 Gbit/s RoCE

Smart disk enclosure Smart disk enclosure Smart disk enclosure Smart disk enclosure

17 Huawei Confidential
Protocol Offload with DTOE

Traditional NIC TOE DTOE


TCP offload Full protocol stack offload
I/O I/O I/O

PHY
PHY PHY
MAC
MAC
MAC NIC TOE NIC IP DTOE NIC
IP TCP
TCP Buffer

Buffer Buffer
IP Kernel space Kernel space
TCP Driver
Driver
OS OS
Driver User space
User
OS
User File system
Protocol File system Protocol File system Protocol
space space

18 Huawei Confidential
Intelligent Multi-level Cache

LUN Meta Cache FS Meta Cache Data Cache


DIMM Dentry Table
LUN Mapping
Table Write Log
Inode Table Cache
CPU
DDR Pool Meta Data
Read Only
SCM card Data IQ FP Table SPF Table
Cache
Intelligent
or drive cache flow MDS Table
algorithm
PCIe

SCM Cache
PCIe
LSM Tree Table

Plog

19 Huawei Confidential
SmartCache
The algorithm identifies hotspots according
to the read sequence and their I/O patterns.
Host read request Read I/O sequence A A C C E E E E B B C C E E AI-Based Per-LBA
1 2 1 3 1 2 3 4 1 2 2 4 5 6 Prediction Pattern

LUN

Data read from disks is


cached in the memory. Short Sequential LUN-0
Random Long Sequential

A A C E E
Data evicted by the B B C E E
Memory 1 2 1 C 1 2
memory is written 1 2 3 C 3 4 E E
2 5 6
to the SCM. 4

LBA[X1,X2]
LBA[0,X1] Pattern: LBA[X2,X3] Pattern:
SCM Pattern: Cold
Sequential degree: 2 Sequential degree: 6
Random Access
Enters the SCM. Does not enter the SCM.
SSD
Only hot data from random and short sequential I/Os enters the SCM.

20 Huawei Confidential
Round Robin Scheduling Algorithm for Metadata

Protocol Cache Round robin LUN Mapping Cache


scheduling for
Dentry item LUN Mapping
metadata
Table
Inode item swept

File System Cache Fingerprint Cache

Dentry Table FP Table

Inode Table SFP Table


Pool Cache

MDS Table

21 Huawei Confidential
File System Distribution
Directory

File

/

/a  /b
/c
/a/b /b/a
/c/a
/c/c  /b/a/c

FSP FSP FSP FSP FSP FSP FSP FSP FSP FSP FSP FSP

... ... ...


Shard Shard Shard Shard Shard Shard Shard Shard Shard Shard Shard Shard

... ... ...


vNode vNode vNode vNode vNode vNode

... ...
Node (controller) Node (controller) Node (controller)

22 Huawei Confidential
Affinity Mode for File System Access
Host
NFS/CIFS NFS/CIFS NFS/CIFS NFS/CIFS
Client 0 Client 1 Client 2 Client 3

Creates the Creates the Creates the Creates the


/A/B directory. /C/D directory. /E/F directory. /G/H directory.
0 1 2 3

NFS/CIFS NFS/CIFS NFS/CIFS NFS/CIFS

/A /C /E /G

/A/B /C/D /E/F /G/H

vNode 0 vNode 1 vNode 2 vNode 3


CPU CPU CPU CPU

Controller A Controller B

23 Huawei Confidential
Load Balancing Mode for File System Access

NFS/CIFS
Client Host

Creates the /A/B/C/D directory.

NFS/CIFS

/A/B
/A

/A/B/C

/A/B/C/D
vNode 0 vNode 1 vNode 2 vNode 3
CPU CPU CPU CPU

Controller A Controller B
24 Huawei Confidential
FlashLink – Multi-core Technology
(LUN, LBA), Data

... N1 CPU Partitioning on a Controller


vNode vNode vNode
N7 N2
DHT  vNodes are bound to CPUs to reduce the
ring CPU CPU CPU overheads for scheduling and
N6 N3 transmission across CPUs.
N5 N4 Protocol Data
Data exchange
Read/Write channel parsing flushing
Grouping by CPU Cores

Core Core Core Core Core Core Core Core  Read/write I/Os are deployed in different
groups from other types of I/Os to avoid
mutual interference.
Core Core Core Core Core Core Core Core

Dedicated Dedicated Shared


I/O Binding to CPU Cores
Read I/O 1 Read I/O 2 Write I/O 1 Write I/O 2
 A request is processed by one core until its
completion. Cores are lock-free to avoid
frequent switchovers among the cores.
Core Core Core Core

25 Huawei Confidential
FlashLink – Sequential Writes of Large Blocks

Huawei OceanStor All-flash Storage

ROW Full-Stripe Write (Sequential Writes of Large Blocks) Amplification in a Traditional Write Process
 Controllers detect data layouts in Huawei-developed SSDs. Using RAID 6 as an example: When D0 is changed, the system
 Multiple discrete data blocks are aggregated into a large sequential must first read D0, P, and Q, and then write new nD0, nP, and
block in the controller memory. nQ. Therefore, both the read and write amplifications are 3.
 The large data blocks are written into SSDs in sequence. A greater number of RAID member disks means a higher RAID
 Sequential writes of large blocks fully utilize SAS bandwidth and reduce utilization.
garbage collection.

26 Huawei Confidential
FlashLink – Hot and Cold Data Separation

 Controllers automatically detect data layouts in SSDs.


 Data of different types is separated simultaneously in the
controllers and SSDs into independent partitions.
 Metadata and user data are stored in separate partitions.
 Garbage collection in SSDs is reduced.

Controllers automatically detect data layouts in SSDs.


Combined storage of Separate storage of
metadata and user data metadata and user data
Metadata Data Reduced garbage collection

27 Huawei Confidential
FlashLink – I/O Priority Adjustment

Read/Write Top 1 Read/Write Top 1

Advanced feature Top 1 Advanced feature Top 2


I/O priority
Cache flush Top 1 Cache flush Top 3
adjustment
Disk reconstruction Top 1 Disk reconstruction Top 4

Garbage collection Top 1 Garbage collection Top 5

Controllers automatically detect data


Data read and write I/Os always have the highest
layouts in SSDs.
priority to ensure the lowest latency. Other I/Os
All types of I/Os are responded to
are processed later.
chronologically, with the same priority.

28 Huawei Confidential
FlashLink – Smart Disk Enclosure
Controller enclosure

Front-end interface Front-end interface Front-end interface Front-end interface


module module module module
Data Data
reconstruction reconstruction
Controller Controller Controller Controller

Back-end interface Back-end interface Back-end interface Back-end interface


module module module module

Smart disk enclosure + Kunpeng CPU Smart disk enclosure + Kunpeng CPU

29 Huawei Confidential
FlashLink – AI

AI chip + machine learning with intelligent algorithms

Using the built-in intelligent cache algorithm and machine learning, the AI chip proactively analyzes and
masters the I/O rules of various application models to improve the read cache hit ratio and increase
system performance over time.

Real-time collection Online learning Feedback and optimization


Real-time collection of Quick online learning with Based on online learning results
service workloads the AI chip Real-time judgment of the algorithm effect
Optimization of cache expectation for customers

30 Huawei Confidential
Contents

1. Product Positioning

2. Software and Hardware Architectures

3. Key Technologies
 High Performance
 High Reliability
 High Security

4. Application Scenarios

31 Huawei Confidential
Highly Reliable Architecture
Tolerating simultaneous Tolerating failure of a Tolerating successive failure
failure of 2 controllers controller enclosure of 7 out of 8 controllers

Shared front end Shared front end Shared front end Shared front end Shared front end Shared front end

Shared back end Shared back end Shared back end Shared back end Shared back end Shared back end

Smart disk enclosure Smart disk enclosure Smart disk enclosure

32 Huawei Confidential
No Service Interruption Upon a Controller Failure
Server Server
IP switch IP switch
MAC address: 2100xxxxabcd MAC address: 2100xxxxabcd

X Logical Logical Logical


Logical Logical Logical Logical Logical port 1 port 2 port 3
port 0 port 1 port 2 port 3 port 0
Logical
port 0
Controller 0 Controller 1 Controller 2 Controller 3 Controller 0 Controller 1 Controller 2 Controller 3

33 Huawei Confidential
Non-Disruptive Upgrade with a Single Link

I/O process upgrade time < 1.5s

Host reconnection time < 3.5s; service
Host suspension time < 5s
TCP connection 
Services are not interrupted during online
upgrade with a single link.

1. The I/O process upgrade starts.


Physical port 0 Physical port 1 Physical port 2 Physical port 3
2. The user-mode processes are upgraded.
The system does not reset.

TCP TCP TCP TCP


connection connection connection connection 3. The interface module is online, but the
logical port connecting to the host is down
and the protocol link is down.
PCIe 3.0 x 4 PCIe 3.0 x 4 PCIe 3.0 x 4 PCIe 3.0 x 4
4. The I/O process upgrade is complete.
Logical Logical Logical Logical
port 0 port 1 port 2 port 3
5. The logical port is up, and the protocol re-
IP address 0 IP address 1 IP address 2 IP address 3 establishes a connection with the host.

Controller 0 Controller 1 Controller 2 Controller 3 6. Host I/Os recover.

34 Huawei Confidential
SMB Advanced Features
SMB 2.0 and SMB 3.0 support failover.

NAS service NAS service

Back end Back end

Smart disk enclosure

 Service data: Continuous mirroring + 3 copies for high reliability


 Protocol handle: Continuous mirroring + 3 copies for high reliability

35 Huawei Confidential
Failover Group
Failover Failover

LIF LIF LIF LIF LIF LIF


Default failover group VLAN failover group
Port 1 Bond 1 VLAN VLAN VLAN VLAN

Current port Port 2 Bond 2 Current port VLAN VLAN

Failover
LIF LIF LIF LIF User-defined
failover group

VLAN VLAN Port 1 Bond 2

Bond 4 Port 8
Current bond

36 Huawei Confidential
Data Reliability Solution

Dual mappings for Dual mappings for


directory metadata directory metadata
Logical service data Logical service data
redundancy redundancy
HyperMetro, remote
replication, and backup
Data redundancy
Local snapshot across sites Local snapshot
Service data redundancy Service data redundancy

RAID 2.0+ RAID 2.0+


Multiple copies of data in Multiple copies of data in
battery-protected memory battery-protected memory
Local physical data Local physical data
redundancy redundancy

37 Huawei Confidential
Contents

1. Product Positioning

2. Software and Hardware Architectures

3. Key Technologies
 High Performance
 High Reliability
 High Security

4. Application Scenarios

38 Huawei Confidential
Trusted and Secure Boot of Hardware

OS
Huawei signature Certificate revocation list Software verification and loading
3
4 process for secure boot:
1. Verify the signed public key of
Huawei
Grub
signature Grub Grub.
Huawei signature Signed public key
2. Verify and load Grub.
1 3. Verify the status of the
2
Grub
software signature certificate.
RSA engine
Hash of signed public key
4. Verify and load the OS.
BootROM eFuse
SoC

39 Huawei Confidential
Role-based Permission Management

User Role Permission

Default
User 1 Permission 1
Role

User-defined
User 2 Permission 2
role A

User-defined
User 3 Permission 3
role B

Permission = Function 1: Object 1, Object 2; Function 2: Object 3, Object 4;...


(One or more groups of mappings between functions and objects)

40 Huawei Confidential
Security Log Audit
vStore 1

File System 0 File System 1

Audit-Dtree Audit-Dtree
/Bin /Bin
/vNode1 /vNode1
/$Time$Audit1.bin /$Time$Audit1.bin
/$Time$Audit2.bin /$Time$Audit2.bin
/vNodeN /vNodeN

Audit-Log-FS

/FS0 /FS1
/2020-01-03.Audit1.XML /2020-01-03.Audit1.XML
/2020-01-04.Audit2.XML /2020-01-04.Audit2.XML
/2020-01-05.Audit3.XML /2020-01-05.Audit3.XML
/2020-01-06.Audit4.XML /2020-01-06.Audit4.XML
/2020-01-07.Audit5.XML /2020-01-07.Audit5.XML
/2020-01-08.Audit6.XML /2020-01-08.Audit6.XML

41 Huawei Confidential
Contents

1. Product Positioning

2. Software and Hardware Architectures

3. Key Technologies

4. Application Scenarios

42 Huawei Confidential
Storage Virtualization

Block DR Bare metal VM Private cloud


Automation Provisioning & Orchestration
OceanStor DJ Class A Class B Class C
 2 IOPS/GB  1 IOPS/GB  0.5 IOPS/GB
 ≤ 1 ms  ≤ 3 ms  ≤ 8 ms
 A-A or A-P  A-A or A-P  A-A or A-P

A-A-P A-P A-A Backup

Pool Pool Pool Pool Pool Pool Pool Pool Pool

PD MV IVZ1 IVZ2 EQUINIX INNOVATIS L1 K1


Huawei
OceanStor All- Site 1 Site 2 Site 3 Site 4
Flash Storage

...
Unix pool Linux pool Windows pool Virtual pool Backup pool

43 Huawei Confidential
Multi-Protocol Access

SMB client NFS client

AD Authentication Unix Security

SMB1/SMB2/SMB3 NFSv3/NFSv4

SMB-NFS
DNS/AD (IDMU) server Multi-Protocol LDAP/NIS server
Access

DNS Query
AD Authentication
NIS/LDAP Query

Storage System (NAS)

44 Huawei Confidential
Quiz
1. (Multiple-answer question) What are the application scenarios of Huawei OceanStor all-flash series?
A. Storage of critical services

B. Storage for virtual environments

C. Virtual desktops

2. (Single-answer question) How many disk failures can be tolerated by RAID-TP?


A. 1

B. 2

C. 3

3. (True or false) Huawei OceanStor All-Flash Storage uses ROW full-stripe write, which writes all new
data to new blocks instead of overwriting existing blocks. This greatly reduces the overhead on
controller CPUs and read/write loads on SSDs in a write process.

45 Huawei Confidential
Summary

Product positioning
Product form

Software and hardware SmartMatrix full-mesh


architectures architecture
Active-active architecture
with full load balancing
All-flash storage

High performance

Key technologies High reliability

High security
Application scenarios

46 Huawei Confidential
More Information
Scan and subscribe for the
latest documentation

https://support.huawei.com/enterprise/en/newsletter

47 Huawei Confidential
Recommendations
Huawei provides engineers with a wide range of product learning materials, including multimedia
information and online courses.
Social Media:
support.huawei.com/e Data Storage Academy Huawei IT Products
& Solutions

https://www.linkedin.com/s
howcase/huaweiitproducts

https://www.youtube.com/c/
HuaweiITProductsSolutions

48 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright©2020 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
Introduction to Hybrid Flash Storage
Foreword

 Huawei OceanStor hybrid flash storage systems are the optimal storage platforms for
brand-new data centers, and feature virtualization, hybrid cloud, thin IT, and low carbon
footprint. With powerful hardware specifications and flexible scalability, these storage
systems adopt industry-leading technologies, such as dynamic storage tiering (DST), service
quality management (SQM), cache partitioning, disk load balancing, heterogeneous storage
virtualization, and multi-level data protection.
 With outstanding reliability, efficiency, and scalability, Huawei OceanStor hybrid flash
storage systems provide mission-critical storage services for the finance, government,
energy, manufacturing, transport, education, and telecom sectors.

1 Huawei Confidential
Objectives

 Upon completion of this course, you should understand the following


aspects of OceanStor hybrid flash storage systems:
 Product positioning
 Software and hardware architectures
 Key features and technical advantages
 Typical application scenarios

2 Huawei Confidential
Contents

1. Product Positioning

2. Software and Hardware Architectures

3. Key Technologies

4. Application Scenarios

3 Huawei Confidential
Product Positioning

OceanStor converged features Huawei proprietary design

4 Huawei Confidential
Product Models
Huawei OceanStor
All Flash Arrays Huawei OceanStor 18810F V5
18510F V5
Hybrid Flash Arrays
Huawei OceanStor
6810F V5

Huawei OceanStor
Performance,

5610F/5810F V5
Huawei OceanStor
Huawei OceanStor
18800F V5
IOPS

5310F/5510F V5 Huawei OceanStor


18500F V5
Huawei OceanStor Huawei OceanStor
5110F/5210F V5 6800F V5
Huawei OceanStor Huawei OceanStor
5600F/5800F V5 Huawei OceanStor 18810 V5
Huawei OceanStor 18510 V5
5300F/5500F V5 Huawei OceanStor
6810 V5
Huawei OceanStor
Huawei OceanStor 5610/5810 V5
Huawei OceanStor 5310/5510 V5
5110/5210 V5
Huawei OceanStor
Huawei OceanStor Huawei OceanStor Huawei OceanStor 18800 V5
Huawei OceanStor 5600/5800 V5 6800 V5 18500 V5
5300/5500 V5
Scalability, PB Usable
Note: This is not an exhaustive list of OceanStor models. Refer to Huawei's official website for a complete product portfolio.

5 Huawei Confidential
Product Overview
Huawei OceanStor hybrid flash series

Centralized High-density Tiered


Data DR
storage virtualization storage
Convergence Wide channels Intelligent cloud Virtualization, intelligence, High reliability and scalability
Converges SAN and NAS, Supports IP scale-out, migration and efficiency Supports dual-redundancy
and supports network 32 Gbit/s FC, 100 Gbit/s The eService provides Supports block-level, design, active-active working
protocols such as iSCSI, RDMA, PCIe 3.0, and 24/7 proactive monitoring heterogeneous, and compute mode, and RAID 2.0+ underlying
FC, NFS, CIFS, HTTP, and 100GE. and automatically reports virtualization, and provides virtualization. Provides large
FTP. faults and creates trouble intelligent and efficient capacity and cache and a great
tickets. performance control. number of interfaces.

6 Huawei Confidential
Contents

1. Product Positioning

2. Software and Hardware Architectures


 Hardware Architecture
 Software Architecture

3. Key Technologies

4. Application Scenarios

7 Huawei Confidential
Controller Enclosure Front View
Icon Description

Enclosure ID indicator

2 U controller enclosure Enclosure location indicator


1. Blinking blue: The controller enclosure is
being located.
2. Off: The controller enclosure is not located.
Enclosure alarm indicator
1. Steady amber: An alarm is reported by the
controller enclosure.
3 U controller enclosure
2. Off: The controller enclosure is working
properly.
Power indicator/Power button
1. Steady green: The controller enclosure is
6 U controller on.
enclosure 2. Off: The controller enclosure is off or
powered by the BBUs.

Coffer disk label

Note: Some product models of Huawei OceanStor hybrid flash series are used as an example.

8 Huawei Confidential
Controller Enclosure Rear View

Interface module
 Two slots for hot-swappable interface
modules, with at most one back-end
SAS interface module
 Port types: 8 Gbit/s FC, 16 Gbit/s FC,
2 U controller GE, 10GE (electrical), 10 Gbit/s FCoE,
enclosure 10GE (optical), and 12 Gbit/s SAS
Power-fan module
 1+1 redundancy SAS expansion port
 AC, –48 V DC, or 240
 Two onboard SAS
V HVDC expansion ports per
controller

Onboard port
 OceanStor 5300 V5: four
GE ports per controller

3 U controller enclosure

Note: Some product models of Huawei OceanStor hybrid flash series are used as an example.

9 Huawei Confidential
Disk Enclosure

Onboard uplink Power module


port: 100 Gbit/s  1+1 redundancy
 AC and 240 V HVDC

2 U 36-slot NVMe enclosure

2 U 12-slot 3.5-inch enclosure

Onboard management port


 Each expansion module
Onboard downlink provides onboard
port: 100 Gbit/s management and serial
2 U 25-slot 2.5-inch enclosure
ports.

Note: Some product models of Huawei OceanStor hybrid flash series are used as an example.

10 Huawei Confidential
3D Interactive Display Multimedia

There are too many product


models. It would be good if I
could see the actual devices.

Don't worry, professor. The 3D interactive multimedia


presents Huawei storage just like real objects. You can
have an exploded view of each product and move any
component with your mouse to see its internal
structure. You can find it in the Huawei Data Storage
Infocenter.

11 Huawei Confidential
Contents

1. Product Positioning

2. Software and Hardware Architectures


 Hardware Architecture
 Software Architecture

3. Key Technologies

4. Application Scenarios

12 Huawei Confidential
Software Architecture

NAS SAN
Or
SAN NAS

NAS SAN
File Service Block Service
(CIFS/NFS) (FC/iSCSI)

File Semantics LUN Semantics


System
Cache
Control
Object Volume

Storage Pool

13 Huawei Confidential
SmartMatrix 3.0 for Full Load Balancing

Controller A Controller B Controller A Controller B


A1 B1' B1 A1' B1 A3'
A2 C2' B2 D2' B2 D2'
A3 D3' B3 C3' B3 C3'
A1 D3'

C1 D1' D1 C1'
C1 D1' D1 C1' C2 A1' D2 B2'
C2 A2' D2 B2' C3 B3' D3 A2'
C3 B3' D3 A3' A2 B1' A3 C2'

Controller C Controller D Controller C Controller D

Work Cache Mirror Cache Work Cache Mirror Cache

14 Huawei Confidential
Fully Shared Architecture

Shared front-end Shared front-end

SmartMatrix 3.0

Controller A Controller B Controller C Controller D

Shared back-end Shared back-end

15 Huawei Confidential
Controller Fault Transparent to Hosts
Server

FC switch
With the intelligent WWN: 2100xxxxabcd
interconnect I/O modules,
controller faults are
transparent to hosts.
• Zero impact on hosts: FC
links retain normal,
services keep running
properly, and no alarm or
event is reported.
• Quick internal takeover:
Involved I/Os are Backplane
redirected by the front-end X
chip to other controllers.

Controller A Controller B Controller C Controller D

16 Huawei Confidential
Contents

1. Product Positioning

2. Software and Hardware Architectures

3. Key Technologies

4. Application Scenarios

17 Huawei Confidential
Convergence of SAN and NAS
Energy &
SAN-NAS Parallel Architecture electricity

iSCSI/FC/FCoE NFS/CIFS/FTP/HTTP Large


enterprises

Block Service File Service Carrier


Database
Bill image
RAID 2.0+
Video surveillance VDI
SSD Pool Backup & DR

VM apps Image archiving

Gateway-free Mobile Internet


Government &
Integration of block and file storage eliminates the need public utilities
for NAS gateways and reduces procurement costs. Finance

Parallel architecture
The system provides optimal paths for concurrent access Transportation
to SAN and NAS to maximize performance.

18 Huawei Confidential
Intelligent Tiering for SAN and NAS

LUN I/O monitoring


Extent
Data distribution analysis

Data migration
Tier 0: SSD Tier 1: SAS Tier 2: NL-SAS

Root
File system Dir Dir
File policy

File distribution analysis


File

File migration

Tier 0: SSD Tier 1: SAS and NL-SAS

19 Huawei Confidential
RAID 2.0+

Storage pool of Chunk Chunk group Extent Volume LUNs detected by


physical disks (CKG) the host

Tiered

Not tiered

CKGs are further Not tiered


Multiple types of Disk space is divided Chunks from divided into
disks are added to a into fine-grained different disks smaller granules Several extents LUNs can be created quickly.
storage pool. chunks. form CKGs. called extents. form a volume.

20 Huawei Confidential
Huawei-Developed Chips
Intelligent multi-
protocol interface chip
32 Gbit/s FC and 100GE ports
Kunpeng 920 controller chip

 Offloads protocols to  Arm CPU with the industry-leading


accelerate front-end access.
performance
 Spec Int value up to 930, 25% higher
than the industry average

Intelligent management chip


 Refined device monitoring and failover
 Built-in encryption engine for secure access SSD controller chip
 Support for multiple types of interfaces
and media
 50% lower latency than the industry
average and first for reliability

21 Huawei Confidential
RDMA Scale-out

 Eight controllers are directly connected over a full-mesh network for redundancy. Each controller
enclosure shares 400 Gbit/s bandwidth.
 The four idle ports are reserved for expansion to 16 controllers.
 The SmartIO interface modules provide internal RDMA connections with 100 Gbit/s port bandwidth.
 VLANs are created on SmartIO ports to separate data and heartbeat networks.

22 Huawei Confidential
Self-Encrypting Drive (SED)

Maintenance Other servers Key management server


terminal

KMIP+TLS KMIP+TLS
KMA
KMIP+TLS
Storage Internal KM
TPM Switch
AK W/R Data

SED

23 Huawei Confidential
Block Service Features

SmartVirtualization SmartMotion SmartQoS


Data flow across systems Horizontal data flow Intelligent service quality control Efficiency
improvement software

SmartThin
Thin provisioning

SmartTier Data protection


Vertical data flow SmartDedupe and software
SmartCompression
SmartPartition Intelligent data deduplication
Intelligent cache partitioning and compression

Partition 1 HyperSnap: increment-based local data


protection
APP APP APP
Partition 2 Partition 3 HyperClone: full copy-based local data
protection
Partition PartitionPartition HyperCopy: data protection between devices
4 5 N
HyperReplication: DR between data centers
SmartCache SmartErase SmartMigration SmartMulti-tenant HyperMetro: active-active data centers
Intelligent SSD cache Data destruction LUN migration Multi-tenancy

24 Huawei Confidential
File Service Features

CIFS NFS NDMP


Common Internet File System Network File System Network Data
Management Protocol

SmartThin SmartQoS SmartPartition SmartCache


Thin provisioning Intelligent service quality Intelligent cache Intelligent SSD cache
control partitioning
SmartDedupe SmartCompression SmartQuota SmartTier
Intelligent deduplication Intelligent compression Quota management Intelligent tiering

HyperSnap HyperReplication HyperLock HyperVault


Snapshot Remote replication File system WORM Integrated backup

25 Huawei Confidential
Contents

1. Product Positioning

2. Software and Hardware Architectures

3. Key Technologies

4. Application Scenarios

26 Huawei Confidential
Multi-site Disaster Recovery
Cascading architecture Solution Overview
Production Intra-city DR Remote DR
HyperReplication interoperability among high-
center center center
end, mid-range, and entry-level storage systems
HyperMetro/
 The unified storage OS platform ensures
A HyperReplication HyperReplication HyperReplication interoperability among high-end, mid-
(A/S*) /A (active) range, and entry-level storage systems.
 You can flexibly select storage systems for the remote DR

A A' A" center, remarkably increasing return on investment


(ROI).
Second-level RPO and minute-level RTO for
HyperReplication/A (standby)
asynchronous replication (HyperReplication/A)
Parallel architecture  HyperReplication/A uses multi-timestamp cache
technology to support a 3s replication interval.
Production Intra-city DR  BCManager provides one-click DR testing and switchover
center center to recover services on the DR databases in several
minutes.
A HyperMetro/
HyperReplication Remote DR DR Star
HyperReplication/A
(A/S*) center  If the DR center fails, the remaining sites automatically
(standby)
establish the replication relationship for continuous data

A A' protection. After the standby replication relationship is


activated, incremental data is replicated without
changing the RTO.

A"
HyperReplication/A  Configuration of DR Star* can be done at a single site for
(active) simplified management.
Note: NAS does not support synchronous remote replication (HyperReplication/S).

27 Huawei Confidential
Application Scenarios for Storage Tiering
Hot Warm Tier DB Cold Frozen
Service
applications Billing CRM BI ERP Database Backup Archive

Hot (30%):
1000-5500 40-125
1000-5500 200-750 10-30
Performance IOPS/TB IOPS/TB
IOPS/TB IOPS/TB ≤ 1.2 ms IOPS/TB
≤ 1.2 ms ≤ 4 ms Cold (70%):
≤ 15 ms ≤ 100 ms
40-125
IOPS/TB
Reliability 99.999% 99.999%
≤ 15 ms 99.999% 99.999%
99.999%

Huawei
solution
Huawei OceanStor Huawei OceanStor Huawei OceanStor
Distributed storage all-flash storage hybrid flash storage

28 Huawei Confidential
Quiz

1. (True or false) Huawei OceanStor hybrid flash storage systems support


convergence of NAS and SAN, but only one of them can be used at a time.

29 Huawei Confidential
Summary

Product positioning
Product form

Software and hardware System architecture of controller


architectures and disk enclosures
SmartMatrix 3.0 for full load
balancing
Hybrid-flash storage

Convergence of SAN and NAS

Key technologies Intelligent tiering for SAN and NAS

RDMA scale-out
Application scenarios

30 Huawei Confidential
More Information
Scan and subscribe for the
latest documentation

https://support.huawei.com/enterprise/en/newsletter

31 Huawei Confidential
Recommendations
Huawei provides engineers with a wide range of product learning materials, including multimedia
information and online courses.
Social Media:
support.huawei.com/e Data Storage Academy Huawei IT Products
& Solutions

https://www.linkedin.com/s
howcase/huaweiitproducts

https://www.youtube.com/c/
HuaweiITProductsSolutions

32 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright©2020 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
Introduction to Distributed Storage
Foreword
 The use of data has increased explosively with the rise in cloud and artificial intelligence (AI)
technologies. Newly emerging applications, such as high-speed 5G communication, high definition
(HD) 4K/8K video, autonomous driving, and big data analytics, are raising data storage demands.
Enterprises are eager to expand their business boundaries, integrate storage resources in cloud
scenarios, and reduce the total cost of ownership (TCO) while increasing the flexibility and elasticity of
deployment to address the rapid growth of unstructured data. In this context, distributed storage has
become the optimal solution.

 Huawei OceanStor 100D distributed storage provides block, file, HDFS, and object services, achieving
cost-effective mass data storage, higher usage efficiency, and easier management of the data lifecycle.
 Huawei OceanStor 9000 V5 distributed file storage is specially optimized for file system applications. It
features large capacity, high performance, and flexible scalability. It also provides various value-added
features.
1 Huawei Confidential
Objectives

 Upon completion of this course, you will understand the following aspects
of distributed storage:
 Product positioning
 Hardware and software architectures
 Key features and technical advantages
 Typical application scenarios

2 Huawei Confidential
Contents

1. Product Positioning

2. Hardware and Software Architectures

3. Key Technologies

4. Application Scenarios

3 Huawei Confidential
Product Positioning

Intelligent distributed storage  More stable bearing for complex services: End-to-end
data integrity checks and automatic recovery,
comprehensive sub-health detection and automatic recovery
for disks, nodes, and networks, and I/O-level, device-level,
system-level, and data center-level end-to-end reliability
assurance

 More efficient use of diversified data: FlashLink


performance acceleration, AI Fabric lossless network, and
other technologies; converged management of multiple
storage services, such as block, HDFS, object, and file
services, and efficient data usage; coexistence of next-
generation and old-generation hardware and multi-platform
hardware, providing intelligent management of the entire
system lifecycle

 Cost-effective mass data storage: On-demand expansion


of nodes, linear increase of performance and capacity, and
optimized investment in the current period; elastic erasure
coding (EC) data redundancy protection; and dynamic
deduplication and compression, achieving high availability
and efficiency

4 Huawei Confidential
Product Positioning

Scale-Out NAS
Huawei Scale-Out NAS adopts a fully symmetric
distributed architecture to provide users with shared
storage resources for unstructured data. It is a scale-out
NAS oriented to massive unstructured data storage
applications.

 High performance: High-performance read/write


access.

 Elastic space: Smooth scale-out of multiple nodes


eliminates data silos caused by multiple namespaces.

 Easy to use: A unified namespace is used to manage


all software and hardware resources in a unified
manner, minimizing system management and
maintenance complexity.

5 Huawei Confidential
Contents

1. Product Positioning

2. Hardware and Software Architectures


 Hardware Architecture
 Software Architecture

3. Key Technologies

4. Application Scenarios

6 Huawei Confidential
Block Storage Data Nodes

12 slots

1 I/O module 1 2 I/O module 2


3 I/O module 3 4 Power module indicator
5 Power module 2 6 Power module 1
7 UID indicator 8 USB 3.0 port
9 VGA port 10 Serial port

25 slots Connection status indicator for the


11 12 Management port
management port
Connection status
Data transmission status indicator
13 14 indicator for the GE
for the management port
Note: The above examples show the Huawei electrical port
OceanStor distributed storage P100 node. Data transmission status indicator
15 16 Flexible NIC
for the GE electrical port

7 Huawei Confidential
Scale-Out NAS

P25E
C36A P12E

P36A P36E

Node
P12A type P25X

S12A P12X

S25X P36X

8 Huawei Confidential
Contents

1. Product Positioning

2. Hardware and Software Architectures


 Hardware Architecture
 Software Architecture

3. Key Technologies

4. Application Scenarios

9 Huawei Confidential
Software Architecture
Protocol
OAM
NFS Virtual SCSI Controller (VSC) iSCSI S3/Swift HDFS

Data Virtual Block EDS-B EDS-F OBS Service


Protection Service (VBS)
DeviceManager DNS/LB/BLS
(DP) Block NameNode
OSC
Replication SCSI TGT Cache DataNode POE
DeployManager
CRR (Replication)
Splitter Index Layer
Upgrade/Capacity eBackup
LUN Deduplication
expansion Mapping /Compression
OBS Index Layer

Alarm/ Persistence Layer


Monitoring KV Client Plog Client
MDC
OSD Plog Server
Inspection/
Data collection
Infrastructure
IOD/LWT LiteTask ZK CCDB CM CMM

Note: The above example shows a Huawei OceanStor 100D.

10 Huawei Confidential
I/O Stack Processing (Block Service)
VBS
1. After receiving the read and write requests, VBS uses the
hash algorithm to find the EDS-B node based on the LUN
ID and offset.
(1) EDS-B 2. The block service of the EDS-B node writes data to the
cache. The read request is hit in the cache preferentially.
block If data is not found, data is read from the index.
3. For write operations, the cache writes data to the Plog
(2) Server in small EC mode for fast data retrieval.
cache 4. After EC encoding, the cache data is written to the Plog
(5) Server. The foreground write operation is complete.
5. When the cache watermark reaches a threshold, dirty
index data is written to the index.
6. Data is written to the Plog Server based on the user-
(3) determined EC ratio, and then metadata is recorded to
(6) the index.
Plog Client
7. After EC encoding, the data is written to the Plog Server.

(4)
(7) Foreground I/O
Background I/O
Plog Server Plog Server Plog Server

11 Huawei Confidential
I/O Stack Processing (Object Service)
S3/Swift Client

1
Load Balancer DNS 1. The client sends the S3/Swift request to the load
7
balancing device (optional, such as LVS and
2 Nginx).
2. The request is sent to the OSC module.
POE Location
OSC 3. OSC requests the POE module to authenticate
3 Service the user.
Plog Client Index Client
4. After authentication, OSC invokes the Plog Client
to perform an EC calculation on the data and
5
concurrently writes the data to the Plog Server
4 for persistent storage.
Index 5. After the data is written, OSC invokes the index
Server client to write the object metadata.
Plog Client 6. After receiving the metadata, the Index Server
processes the metadata and invokes the Plog
6 Client interface to write the metadata to the
Plog Server for persistent storage.
Plog Plog 7. OSC sends a response to the client.
Plog Plog
Server Server Server Server

12 Huawei Confidential
I/O Stack Processing (HDFS Service)

Kerberos/LDAP 1. A compute component sends a


HDFS client
request to the NameNode
module through hdfs_client.
NameNode returns the file
1 3 metadata information.
7
2 2. NameNode authenticates the
DNS user on the Kerberos or LDAP
NameNode/ server.
DataNode 3. The compute component sends
Plog Client a request to the DataNode
module through hdfs_client for
5
data processing.
4 4. The Plog Client concurrently
Index
performs an EC calculation on
Server
the data and writes the data to
Plog Client the Plog Server.
5. After the data is written, the
6 HDFS metadata is written to
the index.
6. The metadata is written to the
Plog Plog Plog Plog Plog Server for persistent
Server Server storage.
Server Server
7. A response is sent to the client.

13 Huawei Confidential
Contents

1. Product Positioning

2. Hardware and Software Architectures

3. Key Technologies

4. Application Scenarios

14 Huawei Confidential
DHT Technology
I/O

DHT Algorithm Mapping between LBAs and


... grains of LUNs
Distribution LUN1-LBA1 Grain1
Service layer
granularity LUN1-LBA2 Grain2
4 Mbit/s
LUN1-LBA3 Grain3
Node-1 Node-2 Node-3 Node-4 Node-5 Node-6 Node-7
LUN2-LBA4 Grain4
Grain (e.g., 8 KB)
Mapping between LBAs and
Logical space of Logical space of grains of LUNs
LUN1 LBA LUN2 LBA Grain1 An EC stripe
Index layer Grain2 containing
four grains is
Grain3 stored in a
Grain4 partition.

Partition ID

Persistence Partition ID
layer D D D D P P
D1 D2 D3 D4 P1 P2
1 2 3 4 1 2
Node-1 Node-2 Node-3 Node-4 Node-5 Node-6 Node-7

15 Huawei Confidential
Range Segmentation and WAL Aggregation

Range segmentation WAL aggregation

A, AA, AB, ABA, ABB, ...ZZZ A, AA, AB, ABA, ABB, ...ZZZ

...
...
Node 1 Node 2 Node 3 Node n Range 0 Range 1 Range 2 Range n

Range Partition

16 Huawei Confidential
Multi-NameNode Concurrency

Traditional HDFS Huawei HDFS multi-NameNode


NameNode model concurrency model

Hadoop Hadoop
Hbase/Hive/Spark compute node Hbase/Hive/Spark compute node

Active Active Active


Active Standby Standby NameNode NameNode NameNode
NameNode NameNode NameNode
DataNode DataNode DataNode

HA
based on NFS or
Quorum Journal

17 Huawei Confidential
Append Only Plog Technology
Disks and new media have great performance differences in different I/O patterns.

Random write (8 KB) Sequential write (8 KB aggregation->Large size)


Disk Type Performance GC Write Disk Type Performance GC Write
HDD 150 IOPS / 1.2 MB/s / HDD 5120 IOPS / 40 MB/s /
SSD 40 KB IOPS / 312 MB/s Bad SSD 153 KB IOPS / 1200 MB/s Good

The Append Only Plog technology provides the optimal disk


flushing performance model for media.
... ... ...
A B A' B'
Logical address
overwrites

Cache linear space A B C D A' E F B' ...

Write
data Write data into new
PlogID + offset
plogs.
Physical address space Plog1 Plog2 Plog3 ...

18 Huawei Confidential
EC Intelligent Aggregation Technology
Traditional cross-node EC Intelligent aggregation EC based on append writes
LUN1 LUN2 LUN1 LUN2

A1 A2 A3 A4 ... B1 B2 B3 B4 ... ... ... ...


A1 A2 A3 A4 ... B1 B2 B3 B4
In-place modification of Implement efficient I/O
the write mechanism aggregation using the
cannot implement append write mechanism.
efficient I/O aggregation. Intelligent
aggregation
A1 B1 A3 B6 B9 A5 B5 A8 ...
... cache A1 B1 A3 B6 B9 A5 B5 A8
Small-block write
Stripe1 / P Q Read and write data performance
A1 / A3 improved New
in A2 and A4. B1 A3 B6 P Q Irrelevant to the write
Read and write data Stripe1 A1
Stripe2 B1 / / / P Q address. Any data written
in B2, B3, and B4. at any time can be
New
A5 B5 A8 P Q aggregated into full stripes
Stripe2 B9
Stripe3 B6 / / B9 P Q Fixed address mapping cannot wait until data
in the same stripe is written to the full stripe without extra
... at the same time. As a result, 2-to-3-time ... amplification.
read/write amplification occurs.
Full stripe New full stripe
A1 A2 A3 A4 P Q A1 B1 A3 B6 P Q
B1 B2 B3 B4 P Q B9 A5 B5 A8 P Q
... ... ... ... ... ... ... ... ... ... ... ...
Node 1 Node 2 Node 3 Node 4 Node 5 Node 6 Node 1 Node 2 Node 3 Node 4 Node 5 Node 6

19 Huawei Confidential
Multi-level Cache Technology

I/O Write cache I/O Read cache

Step 1 Step 2
Step 1

Memory Write Cache Memory Read Cache Memory Write Cache Memory Read Cache
EDS
Step 2 Step 3 Step 4
Step 3

OSD SSD WAL Cache SSD Write Cache SSD Read Cache SSD WAL Cache SSD Write Cache SSD Read Cache

Step 4 Step 5

HDD HDD

20 Huawei Confidential
Distributed Metadata Access


MDS1
/user /home
CA /src
② /file
③ MDS2 /lib
/test /file
/kernal
④ /file1
MDS3 /file1
/file1 /bin
⑤ /file1
/file1
MDS4 /mnt
/file1

/file1

DS DS DS DS DS /file1 /file1
/file1
Directory tree

21 Huawei Confidential
Intelligent Load Balancing Technology

NFS, CIFS, and FTP clients

1
2
3

OceanStor DFS

Node Node Node Node Node Node


Zone 1: based on CPU usage Zone 2: based on the number of network
Level-2 sub-domain name: fx.tx.com connections
Level-2 sub-domain name: td.tx.com

Scale-Out NAS

NFS, CIFS, and FTP clients

22 Huawei Confidential
Single File System

Multiple independent file systems


Domain

File system File system

Dir Dir Dir File

File File File

Single file system


File system

Dir Dir Dir File

File File File

23 Huawei Confidential
Contents

1. Product Positioning

2. Hardware and Software Architectures

3. Key Technologies

4. Application Scenarios

24 Huawei Confidential
Application Scenarios of the Block Service
BSS MSS OSS VAS Hosting

Application MSS
Billing CRM BI Report CDR OA Cloud Signaling Logs NPO S/MMS RBT WAP Hosting

Date -- 2016 2016 2015 2014 2014


Log
Capacity 400 TB 2111 TB 1260 TB 1882 TB 1024 TB 1024 TB

Traditional
Storage high-end
storage
Intelligent distributed storage

25 Huawei Confidential
Application Scenarios of the Object Service

...
24/7 Household Family Pet
uninterrupted security tie feeding
uploading

(1) Transmits videos to


the streaming platform.

Streaming media server (2) Video compression server Web Server

Transmits
video stream
Elastic Cloud Server (ECS) to the
Elastic Cloud Server (ECS) Elastic Cloud Server (ECS)
analysis
platform.
(2) Saves original videos (3) Saves compressed videos (4) Queries videos.
to the object service. to the object service.
Object service

(5) Deletes videos based on time.

26 Huawei Confidential
Quiz
1. (Multiple) Which two deployment modes are supported by Huawei distributed storage?

A. Compute-storage separation deployment

B. Compute-storage converged deployment

C. Separate compute deployment

D. Separate storage deployment


2. (Multiple) Which four of the following storage services are supported by Huawei distributed storage?

A. Block service

B. File service

C. Object service

D. HDFS service

E. HTTP

27 Huawei Confidential
Summary

Product Positioning Distributed block storage and file


service
Hardware and Software Software architecture of OceanStor
Architectures 100D

Service I/O flow


Distributed Storage

Data and metadata distribution

Append Only Plog technology and


Key Technologies EC intelligent aggregation
Intelligent load balancing and
Application Scenarios single file system

28 Huawei Confidential
More Information
Scan and subscribe for the
latest documentation

https://support.huawei.com/enterprise/en/newsletter

29 Huawei Confidential
Recommendations
Huawei provides engineers with a wide range of product learning materials, including multimedia
information and online courses.
Social Media:
support.huawei.com/e Data Storage Academy Huawei IT Products
& Solutions

https://www.linkedin.com/s
howcase/huaweiitproducts

https://www.youtube.com/c/
HuaweiITProductsSolutions

30 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright©2020 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
Introduction to Hyper-Converged Storage
Foreword

 Hyper-converged infrastructure (HCI) provides a cloud infrastructure


platform for large and medium-sized enterprises to integrate information
and improve the efficiency of their core business operations.
 HCI represents the pinnacle of IT industry development by employing
virtualization to vertically integrate compute, storage, and network
resources. It offers simple O&M with rapid deployment and expansion to
adapt to the rapidly evolving business needs.

1 Huawei Confidential
Objectives

 Upon completion of this course, you will be able to understand the


following aspects about hyper-converged storage:
 Product positioning
 Software and hardware architectures
 Key features and technical advantages
 Typical application scenarios

2 Huawei Confidential
Contents

1. Product Positioning

2. Software and Hardware Architectures

3. Key Technologies

4. Application Scenarios

3 Huawei Confidential
Architecture Evolution Roadmap
Traditional
information-based Ultra-large web-scale Hyper-converged
architecture architecture architecture
Server Server
Compute

virtualization Server Server Server

VM VM VM VM
VM VM VM VM VM VM
VM VM VM VM Server Server Server

Device-agnostic
Fibre Fibre 10GE network

Distributed Distributed storage engine
Channel/IP Channel/IP storage
network network

Innovative
distributed Evolution Agile Agile Agile
architecture in the Local server storage management management management
to all
SAN or NAS SAN or NAS Internet industry industries
Complex
Shared resource Software-defined,
Siloed compute and management pool simplified management
storage resources

Computing-centric scale-up Data-centric scale-out Service-centric scale-out


architecture architecture architecture

4 Huawei Confidential
Introduction to HCI
Upper-layer Upper-layer Upper-layer
applications applications applications
vCloud vCloud
Virtualization management + Virtualization management +
cloud management cloud management
Virtualization Physical Virtualization
machine
General-purpose server FusionCube
HCI
Enterprise storage

Switching network Switching network

Traditional architecture Compute and storage Full convergence of compute, storage,


convergence network, virtualization, VDI, physical
machine, management, and cloud

5 Huawei Confidential
Product Positioning

The Huawei hyper-converged infrastructure (HCI) is an IT platform


Huawei Hyper-Converged Infrastructure based on a hyper-converged architecture. It converges compute and
storage resources, and pre-integrates a distributed storage engine,
virtualization platform, and cloud management software. It supports
on-demand resource scheduling and linear expansion. It is mainly used
in hybrid load scenarios, such as databases, desktop clouds, containers,
and virtualization.
 Simplified management: supports factory pre-integration, unified
management of hardware, software, and resources, and one-click
O&M for improved efficiency.
 Optimal efficiency: supports deduplication, compression, and
erasure coding (EC) for high storage utilization.
 Ultra-high performance: delivers high performance for each
individual node and efficient data reconstruction.
 Superb reliability: supports active-active solutions for zero service
interruption, asynchronous replication, and short RPO, and is
compatible with mainstream backup software.

6 Huawei Confidential
Contents

1. Product Positioning

2. Software and Hardware Architectures


 Hardware Architecture
 Software Architecture

3. Key Technologies

4. Application Scenarios

7 Huawei Confidential
Hardware

Blade servers High-density servers Rack servers

12 U with 8 or 16 nodes 4U4 or 2U4 node 2 U single-node


32 CPUs, 12 TB memory, and 307 TB 8 CPUs, 2 TB memory, 288 TB or 76 2 CPUs, 768 GB memory, and 72 TB
storage TB storage storage

2.4 million 64 GB/s Standard edition Advanced edition


≥ 3 nodes ≤ 256 nodes
IOPS throughput 60 VMs 140 VMs

8 Huawei Confidential
Blade Servers
Front view Rear view
Single half-
Switch
width slot
module
Single full-
width slot
Power
Dual full- module
width slots
Fan
Management module
module

CH121 V5 CH221 V5 CH225 V5 CH242 V5

Server

CX310 CX320 CX611/CX620


Switch
module

Note: The above example shows a Huawei FusionServer E9000 blade server.

9 Huawei Confidential
High-Density Servers
4 x redundant PSUs: 750 W/1200 8 x HHHL rear Chassis management
4U4 or 4U8 server node W AC Platinum (94%) PCIe 3.0 x8 slots module (HMM)

5 x counter-rotating fan modules (N+1 redundancy,


tolerating single-fan failure) with 3000 W heat dissipation

2 x PCIe 2 x 1500 W platinum AC PSUs


(hot-swappable, 1+1 redundancy)

Unified management Universal


network port 24 x NVMe SSDs or SAS/SATA HDDs connector port LOM service port

Note: The above example shows a Huawei FusionServer X6800/X6000 high-density server. Node management port

10 Huawei Confidential
Rack Servers
Hard disk

USB 3.0 port

VGA port
VGA port

Management Serial Power


FlexIO cards VGA port
port port modules

Note: The above example shows a Huawei TaiShan server.

11 Huawei Confidential
3D Interactive Display Multimedia

There are too many product


models. It would be good if I
could see the actual devices.

Don't worry, professor. The 3D interactive multimedia


provides a lifelike product view. You have an exploded view
of each product and can move any component with your
mouse to see its internal structure. To access this tool, you
can go to the Huawei Data Storage Infocenter, and choose
Tools > 3D Experience Center.

12 Huawei Confidential
Contents

1. Product Positioning

2. Software and Hardware Architectures


 Hardware Architecture
 Software Architecture

3. Key Technologies

4. Application Scenarios

13 Huawei Confidential
Hyper-Converged Architecture

Office application VDI BI CRM and ERP Email Web application

Service
Database
software

Linux OS OS
Backup
Unified FusionStorage distributed block storage software
management One-click Erasure
Active- Asynchronous
capacity coding QoS
active replication
expansion (EC)
Multiple
Thin Linked Distributed
Snapshot resource
provisioning clone cache
pools

Huawei server hardware platform DR


Unified
installation

14 Huawei Confidential
Distributed Storage Architecture

Midrange/x86 server + external SAN HCI with a distributed storage architecture

Server 1 Server 2 Server 3


Distributed storage controllers PCIe SSDs

Cache Cache
Storage Controller Storage
10GE or 8 Gbit/s Controller
Fibre Channel
SAN controller 1 Controller Controller
Cache
2 Computing Computing
Controller Controller
Storage Storage
Cache Cache
HDD HDD HDD

1. Centralized storage controllers Distributed storage controllers


2. Traditional SAS/SATA hard disks and SSDs PCIe SSDs

15 Huawei Confidential
Distributed Storage Logical Architecture
VM VM ... Oracle

VBS: Virtual Block Storage


State view
SCSI iSCSI… MDC: Metadata Controller

Client Client Client Client OSD: Object Storage Device


Stateless interface layer VBS
Partition: Hash partition
MDC
Data flow

MDC
State view
MDC

P1 P2' P3' P1' P2 P3'' P1'' P2'' P3


OSD1 node OSD2 node OSD3 node

Data layer OSD

16 Huawei Confidential
Virtualization Platform Architecture
Huawei Open API Cloud storage API SNMP NBI

FusionManager

Resource Cloud storage


Configuration API adapter Tools SNMP
management management

Third-party virtualization Huawei virtualization Backup and DR


infrastructure infrastructure RBAC
UltraVR

VMware Fusion Fusion Fusion


XenServer HyperDP VIS Portal
vSphere Compute Storage Network

Heterogeneous physical infrastructure Alarm

Server Storage Network and security


Log

Note: Huawei FusionSphere is used as an example.

17 Huawei Confidential
Contents

1. Product Positioning

2. Software and Hardware Architectures

3. Key Technologies

4. Application Scenarios

18 Huawei Confidential
Distributed Hash Table (DHT) Algorithm
Industry solution: metadata FusionStorage: DHT
Obtain the target Query the
Obtain the
NameNode by querying the Client Client metadata in the
target through
centralized memory.
internal
metadata node. Key Key
calculation. P1 OSD1
Client Client Client Client Hash Hash
Mapping OSD Mapping OSD P2 OSD2

DataNode DataNode DataNode DataNode


DataNode DataNode
The metadata node creates a performance
1 bottleneck because of limited scalability. A combination of the hash algorithm and metadata in the local memory
eliminates the performance bottleneck in horizontal scalability.
Client Server
Client Server
1 Maps files to objects. 1. Distributes messages.
1. Calculates the partition 1. Maps the location
2. Maps objects to PGs. 2. Writes journals. using the hash algorithm. on the disk.

3. Maps PGs to OSDs. 3. Writes data to the filestore. 2. Maps the partition to
2. Writes cache.
OSD.

2 6 steps from end to end, long I/O path 4 steps from end to end, short I/O path

19 Huawei Confidential
Adaptive Global Deduplication and Compression
Opportunity The opportunity
table table filters out
Block 1 unnecessary
Enters data block Hash A data.
2
fingerprints into Block 2
the opportunity
table.
Block 3 Hash B

1 Writes data blocks. 3 Moves from


opportunity table to
fingerprint table.
Block 1 Fingerprint
table
Block 2
Block 4 Block A Hash A
The fingerprint table
Block 5 Matches the data occupies a little memory,
4 in the fingerprint which supports deduplication
Block 6 of large-capacity systems.
table after
deduplication.
20 Huawei Confidential
Multiple Data Security Mechanisms

Ethernet/InfiniBand EC: Different N+M ratios are supported.

Multi-copy: Two or three data copies can be


configured with security requirements.

Node 1 Node 2 Node 3 PCIe SSD cache: Efficient data reads and writes are
provided. Data is not lost in the event of a power
failure.

High-consistency replication protocol: Successful


Cache Cache Cache data writes into a copy trigger automatic
synchronization for identical copies.

Storage DR: Active-active storage and asynchronous


replication provide cross-site redundancy.

21 Huawei Confidential
Rapid Parallel Data Reconstruction
Server 1 Server 2 Server 3
Disk 1 Disk 2 Disk 3

P1 P2'
P2 P3 P4'
P4 P5 P6'
P6 P7 P8'
P8 P9 P10 P11 P12

P5' P9
P9' P17' P21
P21' P1' P10
P10' P13' P22
P22' P2' P6' P14' P18'

Disk 4 Disk 5 Disk 6


P13 P14
P14' P15 P16'
P16 P17 P18'
P18 P19 P20'
P20 P21 P22 P23 P24

P7' P11
P11' P19' P23
P23' P3' P15' P24
P24' P4' P8' P16' P20'
P12'
P12

22 Huawei Confidential
Dynamic EC
User data 1

D1 D2 D3 D4 P1 P2
User data 1 is divided into N data
D1 Disk Disk Disk P1 Disk fragments, and M parity
Disk D2 D3 D4 Disk P2 fragments are calculated. Data is
... ... ... ... ... ...
Disk Disk Disk Disk Disk Disk written onto disks as shown in the

Node1 Node2 Node3 Node4 Node5 Node6 figure on the left (N = 4, M = 2).

User data 2

D1 D2 P1 P2
When Node3 is faulty, user data 2
is divided into N/2 data fragments,
D1 Disk Disk Disk P1 Disk and M parity fragments are
Disk D2 D3 D4 Disk P2
... ... ... ... ... ... calculated. Data is written onto
Disk Disk Disk Disk Disk Disk disks as shown in the figure on the
Node1 Node2 Node3 Node4 Node5 Node6 left (N/2 = 2, M = 2).

23 Huawei Confidential
Cabinet-Level Reliability
Hyper-converged storage

Traditional SAN App 1 App 2 App N

Cabinet N
Cabinet 1 Cabinet 2 Storage Cabinet 1 Cabinet 2 Cabinet N

App 2 App N pool Server 1 Server 1 Server N


Primary
SAN 1 Server 1 Server 3 copy
Primary
Secondary
copy
copy
Secondary
copy ... ... ... ...
... Server 2 ... Server N
Server 1 Server 2 Server 3
Primary
Primary copy
copy
Secondary
Secondary
copy
copy

 A fault interrupts services and requires  A fault does not interrupt services and the
manual recovery. system can recover automatically.

24 Huawei Confidential
Contents

1. Product Positioning

2. Software and Hardware Architectures

3. Key Technologies

4. Application Scenarios

25 Huawei Confidential
Private Cloud Scenario
ManageOne
Global
Department 1 Department 2 resource Service
Administrator
manageme operation
nt
Quota management
VDC 1 VDC 2
Tenant management Unified Unified
Process Process performanc service
Self O&M by Self O&M by Metering management
review and review and e view catalog
organizations organizations Service catalog
approval approval
and users and users
VDC metering VDC metering
Multi- Multi-
Cloud services dimensional dimensional
unified topology
alarming view
Compute services Storage services Network services
 Unified service catalog and rich cloud service
experience
FusionSphere FusionSphere  Self-help service provisioning, enabling users to
quickly obtain required resources
 Unified display of the management information
(such as alarms, topology, performance, and
report) from multiple cloud service resource
FusionCube FusionCube pools
 Unified management of physical and virtual
Data center 1 Data center 2 resources, and of heterogeneous virtual resources

26 Huawei Confidential
Cloud Infrastructure Scenario

Application/
Service system Private cloud
Public cloud Industry cloud

Converged resource pool Cloud data center


FusionSphere OpenStack

Huawei Physical machine


Huawei VMware Hyper-V
VMware Hyper-V virtualization resources
virtualization
Unified management of both heterogeneous virtual and
physical resources
Server Storage
HCI

• Compatible with
existing services • Capable of critical applications Customer • Resource pooling • Distributed architecture
• Compatible with • Self-management and maintenance Requirements • Auto scaling • Centralized management
existing hardware

27 Huawei Confidential
Asynchronous Replication Scenario

Production center DR center

UltraVR/BCManager UltraVR/BCManager

VMs Storage VMs


App App App App App App App replication App App App App App App App
OS OS OS OS OS OS OS OS OS OS OS OS OS OS

FusionCube A FusionCube B
Node 1 Getdelta Node 1
Node 2 Getdelta Asynchronous Node 2
replication
Node 3 Getdelta Node 3
Node 4 Node 4
Getdelta

28 Huawei Confidential
Quiz

1. (Multiple) Which of the following key components are included for FusionCube in
the virtualization scenario?
A. Server

B. Storage service software

C. Virtualization software

29 Huawei Confidential
Summary

Product positioning
Components: hardware, software, and
virtualization
Software and
hardware architectures
Logical architecture of distributed
storage

Hyper-converged storage Distributed hash algorithm with no


performance bottleneck

Adaptive global deduplication and


Key technologies compression

Application scenarios Multiple data security mechanisms

30 Huawei Confidential
More Information
Scan and subscribe for the
latest documentation

https://support.huawei.com/enterprise/en/newsletter

31 Huawei Confidential
Recommendations
Huawei provides engineers with a wide range of product learning materials, including multimedia
information and online courses.
Social Media:
support.huawei.com/e Data Storage Academy Huawei IT Products
& Solutions

https://www.linkedin.com/s
howcase/huaweiitproducts

https://www.youtube.com/c/
HuaweiITProductsSolutions

32 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright©2020 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
Hyper Series Technology and Application
Foreword

 Huawei storage is equipped with the Hyper series technologies, a collection


of advanced features that provide various data protection technologies to
improve data reliability. The Hyper features include HyperSnap,
HyperReplication, HyperMetro, HyperCDP, and HyperMirror, with each
delivering solutions for different data protection scenarios.

1 Huawei Confidential
Objectives

 After completing this course, you should understand the following aspects
of the Hyper series technologies:
 Concepts and application scenarios
 Working principles
 Configuration methods

2 Huawei Confidential
Contents

1. HyperSnap

2. HyperReplication

3. HyperMetro

4. HyperCDP

5. Other Hyper Series Technologies

3 Huawei Confidential
Overview

 According to the Storage Networking Industry Association (SNIA),


a snapshot is defined as follows:
A snapshot is an available copy of a specified data set. The copy contains
the image for the relevant data at a time point when the copy operation
starts.

A snapshot can be a duplicate or replicate of the source data.

4 Huawei Confidential
Technical Highlights of HyperSnap for Block
 Technical highlights:
 Quick generation: A storage system can generate a snapshot within several seconds to obtain a consistent
copy of the source data.
 Minimal storage space consumption: A snapshot is not a full physical data copy, so does not occupy a
large amount of storage space. A snapshot of a large data source requires only a small amount of storage
space.

a d g a d g
j b e j b e
8:00 AM
h k c h k c
f i l f i l
a d g a d g
j m e j b e
9:00 PM
h k n h k c
f i l f i l

5 Huawei Confidential
Working Principles of HyperSnap for Block
Write to the source LUN  Data requested to be written to L2 of the
(L2->P5)
Write to the source LUN source LUN is written to a new space P5.
again (L2->P7) Write to snapshot 1 (L0->P6) Write to snapshot 2 (L2->P8)
The original space P2 is referenced by the
snapshot.
LUN mapping table Snapshot mapping table Snapshot mapping table
 Data requested to be written to L0 of
snapshot 1 is written to a new space P6,
requiring no additional read and write
overhead.

 When data is written to L2 of the source


LUN again, the requested data is written to
L3->P3 L4->P4 L2->P5 L2->P7 L2->P8
L0->P6 L0->P0 L1->P1 L2->P2 a new space P7. The original space P5 is
released because it is not referenced by a
A B C D E F G H I snapshot.

P0 P1 P2 P3 P4 P5 P6 P7 P8  A new snapshot 2 is created and activated.


SSD storage space

6 Huawei Confidential
HyperSnap for File
 By generating a consistent image of the source file system at a certain point in time, the file system snapshot function
enables users to quickly obtain a data duplicate identical to the source file system. This process does not interrupt the services
of the source file system.

 A snapshot is available immediately after being generated. Data read, write, and modification on the source file system do
not affect the snapshot data. Likewise, data read on the snapshot does not affect the data in the source file system.

File system Snapshot (T1)


Generating
File File a snapshot File File
1 2 1 2
File File
3 3
The snapshot
Modifying
data remains
files
unchanged.
File system Snapshot (T1)

File File File


2 1 2
File File
File
3 4
3

7 Huawei Confidential
Concepts

Term Description
Source file system A file system for which a snapshot is created.

A data copy of a file system at a specific point in time.


Read-only file system
The snapshot's data matches that of the source file system. Application
snapshot
servers can read the data copy through NFS sharing.

Block pointer, which indicates the metadata used to record a data block's
BP
storage location in a file system.

Redirect-on-write, a core technology used to create snapshots.


When the source storage system receives a write request to modify
ROW
existing data, it writes the new data to a new location and directs the
pointer of the modified data block to the new location.

8 Huawei Confidential
Implementation Principles
Application server

① The application server sends


a write request to change data
A in bp1 to data E.
1 ② The storage system writes
new data to a new location in
Source file system
3
2
the storage pool.
E
FileA
A
③ The storage system changes
bp1
bp2 B the related pointer in the file
bp3 C
system to point to the location
FileB where the new data E is stored.
bp4 D

9 Huawei Confidential
Read/Write Process
Creating a snapshot Data backup result ① The application server sends a
snapshot read request.
② The storage system reads data from
the storage pool based on the pointer
Source file system File system snapshot
Data in the of the file system snapshot and returns
FileA storage pool FileA the data to the application server.
bp1 A bp1 Reading the snapshot
Writing data to the source file system

bp2 B bp2
bp3 C bp3 Source file File system
system snapshot
FileB FileB E
FileA FileA
bp4 D bp4
bp1’ A bp1
bp2 B bp2
Data in the bp3 C bp3
Source file system storage pool
File system snapshot FileB FileB
E
FileA FileA bp4 D bp4
bp1’ A bp1
bp2 B bp2 1 2
bp3 C bp3

FileB FileB
bp4 D bp4
Data read/write status

10 Huawei Confidential
Snapshot Deletion
Snapshot 1 Snapshot 2 Snapshot 3 fs
×
P1
L1

Keyword: background asynchronous reclamation

P2 P2'
L2 Deleting a snapshot releases the data exclusively
occupied by the snapshot, without affecting the
file system data and the data of other snapshots.
P3 P3' P3''
L3 × Only the space exclusively occupied by the
snapshot is reclaimed. No shared data is deleted.

P4 P4' P4'' P4'''


L4 ×

11 Huawei Confidential
Snapshot Rollback
Keywords: rollback within seconds,
Source FS Snapshot 0
Creating a snapshot
Data1 Data1 background rollback, not deleting
Data2 Data2
Data3 Data3
snapshots created after the target
Data1 is
changed snapshot
to Data4. Snapshot 0
Source FS Data1
Creating a snapshot
Data2 Snapshot 1 The rollback is completed as a
Data4
Data2 Data3 Data4
Data3 Data2 background copy. Specifically, the
Data3
Data3 is differential data between the current
changed
to Data5. file system snapshot and the target
Source FS
snapshot is copied to the location for
Data4
Data2
Data5 the current time point of the file system.
When the file system is rolled back

Source FS Source FS using Snapshot 0, Snapshot 1 is not


Data1 Data4
Data2 Data2 deleted. You can roll back the file
Data3 Data3
NOTE: FS = File System
system to Snapshot 1 later.

12 Huawei Confidential
Configuration Process
Start

Check the HyperSnap


license.

Create a file system.

Create a snapshot.

End

Mandatory Optional

13 Huawei Confidential
Emulation Test
Source file system File system snapshot
Experiment

Access
NFS protocol

Linux client

The source file system is modified. Snapshot directory

Source file system File system snapshot Data


analysis
Access
CIFS protocol

Windows client
Snapshot directory
14 Huawei Confidential
Contents

1. HyperSnap

2. HyperReplication

3. HyperMetro

4. HyperCDP

5. Other Hyper Series Technologies

15 Huawei Confidential
Overview
 Remote replication is the core technology used for remote data backup and
disaster recovery.

Function Purpose Benefit


To recover service data using This function prevents damage
backup data in the remote storage caused by data loss in the event
Remote backup and recovery
system after the service data that data at the primary site
becomes unusable. becomes unusable.

To quickly switch service data from


This function prevents damage
the primary site to the secondary
Continuous service support caused by a service interruption
site to protect service continuity
upon a failure at the primary site.
when a disaster occurs.

This function prevents the damage


To recover data at the primary site
caused by service data loss or a
Disaster recovery using backup data at the secondary
long recovery duration if a disaster
site in the event of a disaster.
occurs.

16 Huawei Confidential
Principle of Asynchronous Remote Replication
DCL RM: remote replication management module
3 DCL: data change log
6
1
RM
2
HOST 1 2
5
Primary Secondary
Cache Cache

Primary 5 Secondary
LUN LUN
4 4

Snapshot Remote replication link Snapshot

7 WAN 7

Snapshot Snapshot

DCL
Primary Secondary
storage system storage system

17 Huawei Confidential
Writing Process in Synchronous Remote Replication Mode
Primary Secondary
Primary Primary Secondary Secondary
Host RM LUN LUN
Cache LUN Cache LUN
snapshot Snapshot

1 Data block N 1 Data block N

2 Write I/O 2 Write I/O


result result Data block N
The primary The secondary
LUN snapshot LUN snapshot
3 Record the difference in the DCL is created. is created.
4 4
Data is replicated from the primary cache
5 and LUN to the secondary cache.

Incremental data is synchronized


5
Eliminates the to the secondary cache.
difference
in the DCL. Data block N
6

The primary The secondary


LUN snapshot LUN snapshot
is stopped. is stopped.
7 7

18 Huawei Confidential
Remote Replication Without Using a Consistency Group
Primary Secondary Primary Secondary Primary Secondary
LUN01 LUN01 LUN01 LUN01 LUN01 LUN01
Remote Remote Remote
replication pair 01 replication pair 01 replication pair 01
Primary Secondary Primary Secondary Primary Secondary
LUN02 Remote LUN02 LUN02 Remote LUN02 LUN02 Remote LUN02
replication pair 02 replication pair 02 replication pair 02
Primary Secondary Primary Secondary Primary Secondary
LUN03 Remote LUN03 LUN03 Remote LUN03 LUN03 Remote LUN03
replication pair 03 replication pair 03 replication pair 03

1 Before data replication 2 Data replication 3 Data recovery

• Data, log and change tracking • During synchronization, • After the remote replication
information of a database are remote replication pair 02 pair failure, the secondary
respectively stored on primary fails due to a fault. storage system recovers data
LUN01, primary LUN02 and in the primary storage system,
• Remote replication pairs 01
primary LUN03. but data in the primary
and 03 succeed.
system is still unusable
• No consistency group is • As a result, data in the because the three primary
created on the primary primary storage system LUNs store data at different
storage system. becomes inconsistent with points in time.
that in the secondary storage
system.

19 Huawei Confidential
Remote Replication Using a Consistency Group
Primary CG 01 Secondary Primary CG 01 Secondary Primary CG 01 Secondary
LUN01 LUN01 LUN01 LUN01 LUN01 LUN01
Remote Remote Remote
replication pair 01 replication pair 01 replication pair 01
Primary Secondary Primary Secondary Primary Secondary
LUN02 Remote LUN02 LUN02 Remote LUN02 LUN02 Remote LUN02
replication pair 02 replication pair 02 replication pair 02
Primary Secondary Primary Secondary Primary Secondary
LUN03 Remote LUN03 LUN03 Remote LUN03 LUN03 Remote LUN03
replication pair 03 replication pair 03 replication pair 03

1 Before data replication 2 Data replication 3 Data recovery

• Data, log and change tracking • During synchronization, • In the event of a disaster, the
information of a database are remote replication pair 02 secondary storage system
respectively stored on primary fails due to a fault. recovers data on the primary
LUN01, primary LUN02 and storage system.
• The consistency group stops
primary LUN03. remote replication pairs 01 • Data in the primary storage
• Create consistency group 01 and 03 immediately. system is available
in the primary storage system immediately after the
• After the fault is rectified, the
and add the three remote recovery.
consistency group resumes
replication pairs to the synchronization.
consistency group.

CG: consistency group

20 Huawei Confidential
Running Status of a Remote Replication Pair
 By viewing the running status of a pair, you can determine whether the pair requires synchronization,
splitting, and primary/secondary switchover operations. After performing an operation, you can view the
running status of the pair to check whether the operation has succeeded.
Running
Description
Status
The Normal running status of a remote replication pair indicates that data synchronization between the primary and secondary
Normal
LUNs in the pair is complete.
Data replication between the primary and secondary LUNs in a remote replication pair is suspended. The running status of a pair
Split
changes to Split after the primary and secondary LUNs are manually split.
The running status of a remote replication pair changes to Interrupted after the pair relationship between the primary and
Interrupted
secondary LUNs is interrupted. This occurs when the links used by a remote replication task are down or either LUN fails.
If a remote replication pair requires restoration using a manual policy after the fault that caused a pair interruption is rectified, the
To be recovered pair running status changes to To be recovered. This status reminds users of manual data synchronization between the primary
and the secondary LUNs to restore the pair relationship between them.
If the properties of a remote replication pair are changed at the primary or secondary site after the pair is interrupted (for
Invalid example, a pair is deleted at the primary or secondary side when the HyperReplication link fails), the running status of the pair
becomes Invalid because the configurations of the pair between the primary and secondary sites are inconsistent.
The running status of a remote replication pair is Synchronizing when data is being synchronized from the primary LUN to the
Synchronizing secondary LUN. In this state, data on the secondary LUN is unavailable and cannot be used for service recovery if a disaster occurs.
The secondary LUN can only be used for service recovery when in the consistent state.

21 Huawei Confidential
Multi-Point-In-Time Caching Technology for
Asynchronous Remote Replication
Up to one consistency point every 3 seconds

1 When a replication period starts, new time slices


(T2 and P2) are respectively generated in the
3 2 caches of the primary and secondary LUNs.

2 New data from the host is written to time slice T2


in the cache of the primary LUN.
Time slice Time slice
3 The host receives a write success response.
T2 P2
4
Time slice Time slice 4 Data in time slice T1 is replicated to time slice P2.
T1 P1
5 The primary and secondary LUNs flush their data
Cache 1 Cache 1 to disks.

5 Asynchronous 5  Data is directly read from the cache for


remote replication replication to reduce the latency.
 Snapshots do not require real-time data
updates. The synchronization has minor
Primary LUN Secondary LUN impact on performance. The synchronization
period is shortened to 3 seconds.
Production DR center
center

22 Huawei Confidential
Writable Secondary LUN for Remote Replication
Definition Writable secondary LUN
The secondary LUN can receive data from hosts. After Production DR
configuring the HyperReplication feature, the secondary LUN is center center
read-only by default. If the primary LUN is faulty, the
administrator can cancel secondary LUN write protection to set
the secondary LUN to be writable. Then the secondary storage
system can take over host services to ensure service continuity.

Application Scenarios
 Users want to use data on the secondary LUN for data Synchronous/
analysis and mining without affecting services on the Asynchronous
WAN
primary LUN. replication
 The production storage system at the primary site is faulty SAN SAN
but the secondary site fails to take over services due to a
primary/secondary switchover failure. WAN

Advantage
Storage Storage
The writable secondary LUN function speeds up service
recovery. In addition, after the secondary LUN is read and
written, an incremental synchronization can be performed, A disaster The host at the
enabling services to be switched back rapidly after disaster occurs at the secondary site reads
recovery. primary site. and writes DR data.

23 Huawei Confidential
Multi-Link Redundancy Technology

Local HA Site A Site B

HyperMetro LUN HyperMetro LUN

Short-distance Long-distance
deployment deployment

Load balancing mode Local preferred mode

24 Huawei Confidential
Supported Features

Load balancing Fibre Channel/IP link

Data compression FAN-IN/OUT

Quick response Supported Interoperability between


entry-level and high-end
features storage

Failover Consistency group

25 Huawei Confidential
Configuration Process
Start

Prepare for configuration.


Obtain the HyperReplication license and identify the type of
ports used to connect the primary and secondary storage
Check the devices.
HyperReplication license

When the replication link is an IP link, you need to create logical


Create logical ports. ports on both local and remote devices where the logical port IP
addresses on each device must be in the same network segment. If
such IP addresses are in different network segments, a route must
Manage routes. be configured.

Create an authentication
user. Before adding a remote storage device, create a user to be
the remote device administrator for that device so it can
Add a remote storage be authenticated.
device.

Add the primary LUN you want to add to a consistency group


Create a protection group. to a protection group and create a HyperReplication
Create a consistency group for the protection group. The primary LUN
HyperReplication pair. that already resides in a HyperReplication pair can
Create a HyperReplication
automatically identify the secondary LUN. A secondary LUN
consistency group. will automatically be allocated to the primary LUN that does
not reside in a HyperReplication pair.

End Mandatory Optional

26 Huawei Confidential
Central Backup for Disaster Recovery
 In a central backup for disaster recovery scenario, service data at multiple service sites is centrally
backed up to and managed at the central backup site. If a disaster occurs, the central backup site
can take over services from the service site and recover data.

HyperReplication
Primary LUN 02 pair 02 Secondary LUN 02

WAN

Service site 02
Host

Primary LUN n HyperReplication Secondary LUN n


pair n
WAN

Service site n Asynchronous


Central backup site

27 Huawei Confidential
Contents

1. HyperSnap

2. HyperReplication

3. HyperMetro

4. HyperCDP

5. Other Hyper Series Technologies

28 Huawei Confidential
Overview
 HyperMetro is also called the active-active feature.
 It enables two data centers to establish a mutual backup relationship. Both data
centers should be in the running status.
 If a device fault occurs in one data center or the entire data center fails, services are
automatically switched to the other one.

Data center A Data center B

29 Huawei Confidential
HyperMetro Networking

Production center A Production center B

WAN
Service network
Application Application
Server Server

10GE 10GE
switch Active-active switch
private
network

Huawei OceanStor Huawei OceanStor


storage storage

IP management network
Quorum server IP service network

30 Huawei Confidential
Write I/O Process

Host

Write I/O

1 5 Cross-site active-active cluster

Storage Storage
system A system B
2 HyperMetro LUN
4
4 3 3

HyperMetro LUN HyperMetro LUN

31 Huawei Confidential
Read I/O Process

Application server

1 5

HyperMetro management
module

2
3 4 4

Local Remote
LUN LUN

Data center A Data center B

32 Huawei Confidential
Quick Initialization/Incremental Data Synchronization

Traditional data synchronization solution Huawei thin copy solution


Storage at Storage at Storage at Storage at
site A site B site A site B
A B C D A B C D A B C D A B C D
Full copy 8 blocks Full copy 8 blocks
H G F E H G F E H G F E H G F E
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
Full copy 12 blocks Send One Command
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
I J K L Full copy 4 blocks I J K L I J K L Full copy 4 blocks I J K L

Full copy of non-zero data blocks Zero copy of zero-page data blocks

Full copy of zero-page data blocks

 Thin copy solution: When data is synchronized,


 Traditional solution: When data is all-zero data is intelligently identified. Only a
synchronized, all-zero data is not identified and specifier is transferred. Data is not transferred.
all data blocks are copied one by one.  Therefore, the initial data synchronization time is
 Initial data synchronization occupies a lot of reduced by 90%, and the occupied link
bandwidth and data transfer takes a long time. bandwidth is lowered by 90%.

33 Huawei Confidential
Cross-Site Bad Block Repair
 Disks may have bad blocks due to abnormalities, such as power failure. If
repairable bad blocks are not repaired on the local end, HyperMetro
automatically obtains data from the remote end to repair them, further
enhancing system reliability.

34 Huawei Confidential
FastWrite
 Transmission protocol optimization
Traditional write process Write process of Huawei (A-A) solution (write FastWrtie)

Host Storage Storage Host Host Storage Storage Host

100KM 100KM
8G FC/10GE 8G FC/10GE
① Write Command ① Command

② Transfer Ready ② Ready

③ Data Transfer ③ Data Transfer ④ Write Command


④ Write Command & Data Transfer
RTT-1 RTT-1

RTT-2
⑧ Status Good

Site 1 Site 2 Site 1 Site 2

35 Huawei Confidential
States of a HyperMetro Pair

Normal
Pause (operation) Fault (event)

Synchronization
completion (event)
Synchronize (operation) Synchronize (operation)

Paused Synchronizing To be synchronized

Synchronize
(operation)
Force start Force start
(operation) (operation)
Force Start

36 Huawei Confidential
Why Is Arbitration Necessary?

HyperMetro link fault Device fault

X
X
Storage Storage Storage Storage
system A system B system A system B

37 Huawei Confidential
Two Arbitration Modes

X X
Storage Storage Storage Storage
system A system B system A system B

X X
Quorum Quorum
server server

38 Huawei Confidential
HyperMetro Arbitration Mechanism

Arbitration deployment
1. Quorum Server Mode
• If heartbeat communication between two storage systems
fails, the storage system in each data center sends an
arbitration request to the quorum server. The storage
Storage resource pool system that wins the arbitration continues providing services
while the storage system that fails in the arbitration stops
providing services. The preferred site takes the precedence
in arbitration.

X
Arbitration of the
Storage preferred site Storage
system A 2 system B
2. Static Priority Mode

X
• If heartbeat communication between two storage systems
1 fails, the storage system that is preset with arbitration
precedence continues providing services.

Quorum
server

39 Huawei Confidential
Configuration Process

Start
Create a
HyperMetro domain.

Check the
HyperMetro license. Configure HyperMetro
Configure HyperMetro for a LUN. for a LUN group.
Create a LUN
Create a LUN.
Add an group.
authentication user.

Create a
*Create a logical Create a
HyperMetro pair.
port. HyperMetro
consistency group.

*Manage routes. Create a mapping.

This example shows the


Add a remote device.
End configuration process for Huawei
OceanStor Dorado V6.

40 Huawei Confidential
Local DC Deployment
Local DC

Oracle RAC cluster


Host Host VMware vSphere cluster Host Host
FusionSphere cluster

FC/IP SAN FC/IP SAN

Storage system HyperMetro replication links: Storage system


Fibre Channel/IP links

IP network IP network

Quorum server

41 Huawei Confidential
Contents

1. HyperSnap

2. HyperReplication

3. HyperMetro

4. HyperCDP

5. Other Hyper Series Technologies

42 Huawei Confidential
Overview
 With an ever-increasing amount of data, traditional data backup solutions are facing the
following challenges:
 Large amount of backup data and rapid data growth
 Small backup window
 Requirement for zero impact on production system performance
 Ever higher requirements on the recovery point objective (RPO) and recovery time objective (RTO)

 Currently, Huawei OceanStor Dorado V6 storage systems provide writable snapshots. A single
LUN supports up to 1,000 snapshots, but this does not meet the requirements of mission-critical
applications for continuous data protection.
 To address these requirements, Huawei provides HyperCDP, which creates high-density snapshots
on a storage system to provide continuous data protection.

43 Huawei Confidential
Functions and Working Principles
 HyperCDP creates high-density snapshots on Huawei OceanStor Dorado V6 to provide continuous
data protection.
 HyperCDP has the following advantages:
 HyperCDP provides intensive and persistent data protection. A single LUN supports 60,000 HyperCDP
objects. The minimum interval is 3 seconds.
 HyperCDP provides data protection at an interval of seconds, with zero impact on performance and while
occupying little space.
 Scheduled tasks are supported. You can specify HyperCDP schedules by day, week, month, or a specific
interval.
 HyperCDP consistency groups are supported.
 A HyperCDP object cannot be directly mapped to a host for read and write. You can create a duplicate,
convert it into a writable snapshot, and map it to the host.

44 Huawei Confidential
Read and Write Principles
 HyperCDP objects cannot be directly mapped to hosts for read and write. They must be converted
to writable snapshots and then mapped to hosts.
Source CDP0 CDP1
LUN
Creating a
snapshot
 First mapping duplicate
Mapping
Host SNAP0

Source CDP0 CDP1


LUN

Reactivating
 Second mapping the snapshot

Mapping
Host SNAP0

45 Huawei Confidential
HyperCDP Rollback Without Data Modification
 Rollback using a HyperCDP object is a process of copying the data in the HyperCDP object to the
source LUN. After the rollback is started, the source LUN can be used immediately (data on the
source LUN is the HyperCDP data).

Source LUN
1
L0
T1 1. The host reads L1.
L1 B' 3
2. The data request is redirected
to CDP1 (T0) if L1 has not
2 been rolled back and is not
written by the host after the
CDP1 rollback starts.
3. B is returned to the host.
T0 L0 A
L1 B

46 Huawei Confidential
HyperCDP Rollback with Data Modification
Source LUN Source LUN
1. The host
T1 L0 A' L0 A'
writes C to L1. T1
L1 B' L1 C

2. L0 is rolled back.
CDP1 CDP1

T0 L0 A T0 L0 A
L1 B L1 B

Source LUN Source LUN

T1 L0 A 4. The rollback is complete. L0 A


T1
L1 C L1 C

3. L1 rollback is
CDP1 CDP1 canceled because L1
has been written by
T0 L0 A T0 L0 A the host.
L1 B L1 B

47 Huawei Confidential
HyperCDP Consistency Group
 The data, logs and modification information of large and medium-sized databases are stored on
different LUNs. If data on one of these LUNs is unavailable, data on the other LUNs is also invalid.
The HyperCDP consistency group ensures the consistency of application data during restoration.
 Like individual HyperCDP objects, you can create, delete, roll back, or stop rolling back a
HyperCDP consistency group as required. You can also create or rebuild duplicates for HyperCDP
consistency groups.
CDP1

CDP2
LUN1 LUN1 Snapshot 1

LUN2 LUN2 Snapshot 2


CDP1-1

CDP2-1

Creating a Creating a Creating a duplicate for


protection group HyperCDP a HyperCDP
Consistency group consistency group

48 Huawei Confidential
HyperCDP Schedule
 You can specify HyperCDP schedules by day,
week, month, or a specific interval. These
schedule policies can retain different numbers of
HyperCDP objects, and multiple policies can be
used together in a schedule.
 A HyperCDP schedule supports multiple LUNs
and LUN consistency groups, while a LUN or
LUN consistency group can be added to only
one HyperCDP schedule.
 The minimum interval for a HyperCDP schedule
is 3 seconds, and the maximum number of
retained objects for each member is 60,000.

49 Huawei Confidential
Capacity Threshold of a Storage Pool
 Because HyperCDP supports a minimum interval of 3 seconds, a large amount of data
protection capacity may be required if new data is writing to the source LUN constantly.
As a result, the storage pool space may be used up, adversely affecting host services.
 Functions:
 The system supports thresholds for the used capacity and protection capacity of a storage
pool. You can set these thresholds as required.
 The capacity thresholds are disabled by default. You are advised to enable them when
configuring HyperCDP.
 Only the HyperCDP objects created by HyperCDP schedules will be deleted when the
thresholds are reached. The objects created manually will not be deleted.

50 Huawei Confidential
Configuration Process

Start

1. Check the availability of the


Check the
HyperCDP feature. HyperCDP license.

Create protection groups. Create LUNs.

2. Create HyperCDP objects Create HyperCDP


Create HyperCDP objects.
or consistency groups. consistency groups.

End

Mandatory Optional

51 Huawei Confidential
Data Mining and Testing
 Snapshot duplicates can be created for HyperCDP objects and used for data mining and testing, which will not affect service
data. The following example shows how HyperCDP can be used for data testing.
 A HyperCDP object is generated for the data to be tested at 11:00 a.m.

 A snapshot duplicate is created for the HyperCDP object and is read and written by the test server. During the test, the source data and
services that access the source data are not affected.

 One hour later, the source data and duplicate data are changed based on the data at 11:00 a.m.

 After the test, users can create another duplicate for the HyperCDP object to obtain the data at 11:00 a.m. and use the duplicate for another
test. Applications Data 11:00 AM Data 12:00 AM
server

Applications
I/Os

Create snap’s
duplicate

Test I/Os
Test server Snap 11:00 AM Tested data 12:00 AM An other snap 11:00 AM

11 12 Time

52 Huawei Confidential
Contents

1. HyperSnap

2. HyperReplication

3. HyperMetro

4. HyperCDP

5. Other Hyper Series Technologies

53 Huawei Confidential
HyperMirror
 HyperMirror is a data backup technology. It creates multiple physical mirror copies for a LUN to
achieve continuous LUN backup and protection. This significantly improves the reliability and
availability of the LUN.

Host
Mirror LUN

Mirror LUN metadata


meta Data Volume Cache

MirrorCopy 1 Dcl 2 Dcl 1 MirrorCopy 2

Volume Volume

54 Huawei Confidential
HyperLock
 HyperLock is the Write Once Read Many (WORM) feature developed by Huawei to protect the
integrity, confidentiality, and accessibility of data to meet data storage security requirements.
Extend the protection period.
Manually set the file to the locked state or the file
automatically enters the locked state upon expiration. Reset the protection period.

Initial state Locked state Expired state

The protection period expires.


Manually set the file to the appending
state (when the file size is 0). Manually set the file to the
locked state.

Manually set the file to the appending state


Appending (when the file size is 0).
state

55 Huawei Confidential
HyperVault
 HyperVault uses backup technology based on file system snapshots in storage
systems to carry out local and remote backup and recovery.

Production center Backup center

IP/Fibre
NAS Channel NAS
network

Local Remote
backup backup
OceanStor OceanStor
storage system storage system

56 Huawei Confidential
Quiz

1. (True or False) BCManager eReplication must be deployed for the HyperMetro feature of
Huawei OceanStor Dorado storage systems.

2. (True or False) Arbitration software can be deployed on a virtualization platform for the
HyperMetro feature of Huawei OceanStor Dorado storage systems.

3. (Multiple) Which of the following are HyperMetro replication link types?


A. FC

B. FCoE

C. IP

D. IB

57 Huawei Confidential
Summary

HyperSnap

HyperReplication

Hyper series technology and


HyperMetro
application
HyperCDP

Other Hyper series technologies

58 Huawei Confidential
More Information
Scan and subscribe for the
latest documentation

https://support.huawei.com/enterprise/en/newsletter

59 Huawei Confidential
Recommendations
Huawei provides engineers with a wide range of product learning materials, including multimedia
information and online courses.
Social Media:
support.huawei.com/e Data Storage Academy Huawei IT Products
& Solutions

https://www.linkedin.com/s
howcase/huaweiitproducts

https://www.youtube.com/c/
HuaweiITProductsSolutions

60 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright©2020 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
Smart Series Technology and Application
Foreword

 Huawei storage systems utilize Smart series technologies, such as


SmartVirtualization, SmartQuota, SmartPartition, and SmartCache, to meet
the performance and resource optimization requirements of different
application scenarios.

1 Huawei Confidential
Objectives

 After completing this course, you should have a complete understanding of


the following aspects of Smart series technologies:
 Concepts and application scenarios
 Working principles
 Configuration methods

2 Huawei Confidential
Contents

1. SmartPartition

2. SmartQuota

3. SmartVirtualization

4. Other Smart Series Technologies

3 Huawei Confidential
Overview
 SmartPartition partitions major resources, such as read and write caches, for
different service LUNs and file systems to isolate services. The resources to
which SmartPartition is applied are independent of each other.
 SmartPartition helps strike an ideal balance between services and performance
for LUNs and file systems.
 SmartPartition helps maintain excellent performance of mission-critical
applications by minimizing the impact of other services.

4 Huawei Confidential
Working Principles
 SmartPartition creates Application Application
……
Application
server 1 server 2 server n

partitions in the unit of


LUNs or file systems. Each ……

partition can only be


accessed by the LUN or Service 1 Service 2 Service 3
……
file system in the partition.
Cache resources

Partition 1 Partition 2 …… Default partition

5 Huawei Confidential
Configuration Process
Parameter Description Value
Engine where a
newly created [Example]
Engine
SmartPartition StorageEngine000
Start partition resides.
[Value range]
• The value cannot exceed the available
read partition size. Optional units are
1. Check whether Read cache size
Check the SmartPartition of a newly
MB and GB. The value of read
the SmartPartition Read partition partition size must be at least 256 MB
license file. created
feature is available. size and an integral multiple of 128 MB.
SmartPartition
When the entered value is not an
partition
integral multiple, the system
automatically changes the value to
Create
one that meets requirements.
2. Create SmartPartition SmartPartition
partitions. partitions. [Value range]
• The value cannot exceed the available
write partition size. Optional units are
Write partition
MB and GB. The value of write
size of a newly
Write partition partition size must be at least 256 MB
End created
size and an integral multiple of 128 MB.
SmartPartition
When the entered value is not an
partition
integral multiple, the system
automatically changes the value to
one that meets requirements.

6 Huawei Confidential
Multi-Service Application Scenario
 Ensuring the performance of core services in a multi-service system
 As the performance and capacity of a storage system grow, multiple applications are typically deployed in the same storage system to
simplify the storage architecture and reduce configuration and management costs. However, storage resources may be allocated among these
applications in an inappropriate manner, hampering service performance.
 Based on service characteristics, SmartPartition can allocate different cache partitions to different services so that mission-critical services
remain running properly.

 Appropriate read and write cache sizes are set based on the read and write I/O frequencies of a production and a test system,
improving the read and write I/O performance of the production system while maintaining proper operation of the test
system.
 SmartPartition 1 is created for the production system. (For example, the read cache size is 20 GB and the write cache size is 10 GB.) The read
and write cache sizes are sufficient for the frequent read and write I/Os in the production system.
 SmartPartition 2 is created for the test system. (For example, the read cache size is 15 GB and the write cache size is 8 GB.) The read and
write cache sizes can maintain the proper operation of the test system while having no impact on the performance of the production system.

The production system and the test system run on the same storage system. The service characteristics are as follows:
System/Service Type Service Characteristic
Production system Frequent data reads and writes

Test system Frequent data reads and moderate data writes

7 Huawei Confidential
Contents

1. SmartPartition

2. SmartQuota

3. SmartVirtualization

4. Other Smart Series Technologies

8 Huawei Confidential
Overview
 SmartQuota provides a resource management and control method.

Host
 Limits the resource usage of each directory,
user, or user group.
I/O  Prevents users from excessively using files and
capacity space.

NAS  Notifies users of resource usage information


sharing by reporting alarms and events.

9 Huawei Confidential
SmartQuota Glossary

Acronym or
Full Spelling Definition or Description
Abbreviation
A dtree is a unique directory in a file system. Quotas
Dtree Directory tree can be set on dtrees only to limit the use of capacity
and files.

An alarm is reported once the resource usage exceeds


Soft quota Soft quota the soft quota, and is cleared when the resource
usage decreases below the soft quota.

The hard quota is the maximum amount of resources


Hard quota Hard quota that a user can use. Resources used by a user cannot
exceed the hard quota.

10 Huawei Confidential
Resource Management and Control on Dtrees

Resources can be managed and


controlled on dtrees.

A dtree also records


information about resource
usage and quota metadata.

Resource usages are updated


and quotas are checked during
I/O operations.

11 Huawei Confidential
Dtree Resource Usage

File
Dtree 1 Space
Quantity
Dtree 1 Directory 8 MB 4
| ---- confFile.conf (2MB, usr 3, grp 5) User

| ---- run.dat (1MB, usr 3, grp 8)


3 3 MB 2
4 0 1
| ---- doc (0B, usr 4, grp 8)
7 5 MB 1
| | ---- study.doc (5MB, usr 7, grp 9)
User
| group
5 2 MB 1
8 1 MB 2
9 5 MB 1

12 Huawei Confidential
Quota Types

File System
Other Dtrees
(Dtree 0)
Directory quota O
Default directory
O
quota
User quota O O
Default user quota O O
User group quota O O
Default user group
O O
quota

13 Huawei Confidential
Configuration of Quotas on Dtrees

Configuration items: space soft quota, space hard quota, file quantity soft quota,
and file quantity hard quota
The soft quota must not exceed the hard quota. At least one quota must be
configured.

Space Soft Space Hard File Quantity File Quantity


Quota Object
Quota Quota Soft Quota Hard Quota
Directory
Private 6 MB 10 MB - -
User
3 4 MB 5 MB 5000 6000
4 - - 1000 2000
User group
8 1 MB - 2000 -

14 Huawei Confidential
Quota Check During I/O Operations
 SmartQuota checks the space and file
Protocol server quantity requested in each write I/O against
the hard quota.
 If the new resources required plus the used
resources exceed the hard quota, the system
File system rejects this write I/O, reports an event of
exceeding the hard quota, and returns an
I/O
error of insufficient space.
No  If the sum of resources is within the hard
Used + Delta quota, the new resources required are added
< Hard quota to the amount of used resources.
 In addition, if the sum of resources exceeds
Quota check Yes the soft quota, the system reports an alarm.
 After data or files are successfully deleted,
Cache the alarm will be cleared if the amount of
used resources decreases to lower than 90%
of the soft quota.

15 Huawei Confidential
Quota Creation and Management Process
 Create a directory quota.  Create a host user or a
 Delete or modify a directory user group.
quota.  Modify, query, or delete a
 Generate a report or reports in host user or user group.
a batch.

Step 2
Directory Stepor3user
User Step 4
Step
Dtree1 Share
Produc
quota Produc
group quota Produc
management
Product 1
management
management management
t2 t3 t4

 Create a dtree.  Create an authentication user or user group.


 Delete a dtree.  Modify, query, or delete an authentication
 Query dtrees in a batch. user or user group.
 Create a user or user group quota.
 Delete or modify a user or user group quota.
 Generate a report or reports in a batch.

16 Huawei Confidential
Directory Quota Scenario
Directory of user A
(dtree 1)
NAS
Manager A

Directory of project
team A (dtree 2)
Engineer A
Share Engineer B
Directory of the sales …
department (dtree 3)

Sales staff A
Sales staff B

Create different dtrees for different departments


Engineer A
Engineer B or individuals of an enterprise. Then configure a
… directory quota for each dtree to limit the
Sales staff A resources available for each user.
Sales staff B

Manager A

17 Huawei Confidential
Contents

1. SmartPartition

2. SmartQuota

3. SmartVirtualization

4. Other Smart Series Technologies

18 Huawei Confidential
Overview
 SmartVirtualization is a heterogeneous virtualization feature. When a local storage system (for example, a
Huawei OceanStor Dorado V6 series storage system) is connected to a heterogeneous storage system (for
example, a different class of Huawei storage system or a third-party storage system), this feature enables the
local storage system to use and manage the storage resources of the heterogeneous storage system as local
storage resources even if it runs different software and hardware architectures.

Purpose and Benefit Description

SmartVirtualization resolves incompatibility between storage systems so that users


Compatibility with heterogeneous
can manage the storage resources in a heterogeneous storage system from the
storage and simplified storage
local storage system, integrating operations and maintenance across multiple
management
storage systems and simplifying storage management.

With SmartVirtualization, a local storage system can take over the storage
resources of heterogeneous storage systems, and the user can manage and allocate
Integrated device space and
the same resources from the local storage system. This simplifies space allocation
simplified space allocation
operations between different storage systems and integrates storage resources of
these storage systems.

19 Huawei Confidential
Highlights

Highlight Description

The local storage system is widely compatible with mainstream heterogeneous


Broad compatibility storage systems, facilitating centralized planning and management of storage
resources.

Full physical data mirroring is not performed when the local storage system uses the
Reduced consumption of storage space provided by the LUNs in a heterogeneous storage system (external
storage space LUNs). This minimizes consumption of the storage space on the local storage
system.

Excellent function The local storage system can also use the SmartMigration feature with external
extension LUNs to improve security and the reliability of service data.

20 Huawei Confidential
Relationship Between an eDevLUN and an External LUN
 An eDevLUN consists of data and metadata. A mapping relationship is established between data
and metadata.
Mapping relationship 1

eDevLUN 1

Mapping relationship n

Application server
eDevLUN n

Metadata 1 Metadata n External External


LUN 1 LUN n
Space on a
Storage pool
heterogeneous
storage system

Local storage system Source storage system

21 Huawei Confidential
Data Read Process
 After the local storage system takes over the external LUNs on a heterogeneous storage system using
SmartVirtualization, and when an application server delivers a request to read data from the external LUNs,
the eDevLUNs on the local storage system will receive a request and then read data from the external LUNs.
Application server

1 An application server delivers a


1
data read request.
3
2 The local storage system receives
the data read request and reads
data from the heterogeneous
2 storage system.
eDevLUNs External LUNs
3 Data is returned to the local
storage system and then the
application server.
Local storage system Source storage system

22 Huawei Confidential
Data Write Process
 When the local storage system takes over a heterogeneous storage system using
SmartVirtualization, the data write process is as follows:

Application on server

Data write request ① The application server writes data into


Data flow
the local storage system.
Physical cable
② The local storage system writes the data


into the heterogeneous storage system.

③ The heterogeneous storage system sends
③ External LUN
the write success message to the local

eDevLUN storage system.
④ The local storage system sends the write
success message to the application server.
Local Heterogeneous
storage system storage system

23 Huawei Confidential
Offline Takeover and Online Takeover
eDevLUNs eDevLUNs
without LUN masquerading properties with LUN masquerading properties

Read and Write I/Os

Step 2:Disconnect the Step 3:Connect the Step 3:Disconnect the Step 2:Connect the application
application server from application server to the local application server from server to the local storage
the heterogeneous storage system and enable the heterogeneous system and then the application
storage system to stop the local storage system to storage system. Data server can identify the
data transfer and services. take over services. transfer interruption does masqueraded eDevLUNs.
not affect services.

Mapping relationship Mapping relationship


SmartVirtualization SmartVirtualization

Heterogeneous Local Heterogeneous Local


storage system storage system storage system storage system
Step 1:Connect the local storage system to the heterogeneous
Step 1:Connect the local storage system to storage system and enable the local storage system to take over
the heterogeneous storage system. data services from the heterogeneous storage system.

24 Huawei Confidential
Selecting a Takeover Mode
 SmartVirtualization allows a local storage system to take over a heterogeneous storage system in online or
offline mode. The online takeover mode includes basic masquerading, extended masquerading, and third-
party takeover. The takeover mode depends on the vendors and versions of the heterogeneous storage
systems and multipathing software.

Takeover Mode Masquerading Description


This takeover mode applies to all other classes of Huawei
storage systems and third-party storage systems that a local
Offline No masquerading storage system is compatible with. Services running on
application servers must be briefly stopped during an offline
takeover operation.
Basic masquerading or extended masquerading depends on
Basic masquerading the vendors and versions of multipathing software and the
Online or extended versions of other classes of Huawei storage systems. For
masquerading details, see the product documents specific to the relevant
version.

25 Huawei Confidential
Configuration Process
Start

1. Check the availability of the If the heterogeneous


Check the license file. storage system is a
SmartVirtualization feature.
Huawei storage system,
Install and deploy. skip this step.
2. Connect the local storage
system to the heterogeneous
storage system. Configure a Add a route. This step is required when
heterogeneous the heterogeneous and
storage system. local storage systems are
Add an external storage
connected through iSCSI
3. Establish a logical device.
and communicate across
connection between the
Configure a heterogeneous network segments.
heterogeneous and local
storage systems and scan storage system.
Scan for external
for LUNs. LUNs.
Scan for external LUNs.

4. Create an eDevLUN to
centrally manage the
heterogeneous storage
system. Configure and use Create an eDevLUN.
an eDevLUN.

Create the mapping


Mandatory Optional End relationship between the
eDevLUN and a host.

26 Huawei Confidential
Migrating Service Data to a New Storage System
 As services grow, larger spaces are required to store the increasing amount of data. If their existing storage systems cannot provide satisfactory
data storage capacity and performance, customers need to acquire storage systems that provide larger capacity and better performance to
upgrade or replace their existing storage systems. As the two storage systems use different software and hardware components, data migration
may interrupt services and even cause data loss. SmartVirtualization helps resolve the differences between the two storage systems by mapping
the external LUNs in the source storage system to the eDevLUNs in the new storage system. The SmartVirtualization and SmartMigration features
then work together to migrate service data from the source storage system to the new storage system while maintaining data integrity and
reliability without interrupting services.
LUN (cold data)

The source storage system


The new storage system

Data migration
(SmartMigration)

External
eDevLUNs LUNs

Mapping relationship (SmartMigration)

27 Huawei Confidential
Contents

1. SmartPartition

2. SmartQuota

3. SmartVirtualization

4. Other Smart Series Technologies

28 Huawei Confidential
SmartCache
Database OLTP
Web servers File servers
servers applications

The SmartCache feature applies to scenarios


characterized by hot data and random small I/Os,
IP network Fibre Channel
network in particular, with more frequent data reads than
writes. In such scenarios, SmartCache can
Common cache resources (RAM cache)
remarkably improve read performance.
Intelligent
cache pool
Read
Scenario Highlight Performance
Improved By
SSDs HDDs

Cache system • The I/O size is 8 KB.


Database
• Random read I/Os About 3x
Hot data Hot data flow applications
Non-hot data Non-hot data flow account for 70%.

29 Huawei Confidential
SmartMulti-Tenant
 The SmartMulti-Tenant feature helps provide customized services for tenants at different levels
under the same system and service based on the service type of each tenant. SmartQoS and
SmartPartition policies can be created per tenant requirements to properly allocate storage
resources and maintain smooth operations to meet the quality requirements stipulated by high-
end tenants.

Diamond Platinum Bronze


Gold Subscriber Silver Subscriber
Subscriber Subscriber Subscriber
Performance-critical Mainstream business Decision-making support,
Archiving, file,
applications that are Mission-critical OLTP applications that data warehousing,
and printing
highly sensitive to and ERP applications require high data messaging, and
services
latency write performance collaboration applications

Customized Customized
Customized
SmartQoS and SmartQoS and Customized SmartPartition
SmartPartition None
SmartPartition SmartPartition policies
policies
policies policies

30 Huawei Confidential
SmartQoS
Storage Concept
administrator
 SmartQoS specifies performance objectives for different
vStore QoS Control services to guarantee normal running of mission-critical
Isolation of mission-critical services services. It applies to scenarios with multiple vStores and
QoS: 800 MB/s QoS: 2 GB/s
services.
QoS: 200 MB/s
vStore A vStore B vStore C vStore QoS policy
 Create a QoS policy for a vStore to set IOPS and bandwidth
FS 1 FS 1 1 GB/s objectives of the vStore.
FS 1
200 800  Add the file systems of the vStore to the QoS policy for
FS 2 MB/s FS 2 MB/s FS 2 700 MB/s
QoS control.
FS 3 FS 3 FS 3 300 MB/s File system QoS policy
 Create a QoS policy for a file system to set IOPS and
The performance of non- Triggers traffic bandwidth objectives of the file system.
critical services rises, which in control.  Add a file system to the QoS policy for QoS control.
turn affects the performance
of mission-critical services. Limits the  The vStore and file system QoS policies can coexist. File
performance of system performance will be controlled when it reaches the
non-critical services
objective specified by either the file system or vStore QoS
to prevent
interference with policy.
other services.

31 Huawei Confidential
SmartDedupe and SmartCompression
Write data.

1
Identify the pattern.
Local hot FP FP table
2 table
Calculate the FP and SFP.

5 Opportunity
table
Check the local FP table.

Is the FP No 6
found in the New data Perform post-process
FP table? fixed-length or
Yes similarity-based
3 4 deduplication.
Perform inline Perform data
deduplication and return compression and
the FP reference count. compaction.

Update the physical


address.

32 Huawei Confidential
Byte-Level Post-Process Variable-Length Deduplication
Inline and post-process, fixed-length and variable-length adaptive deduplication

Software and Adaptive variable-


Feature data Mandatory inline Adaptive fixed-length
hardware adaptive length
reduction deduplication deduplication
compression deduplication

Fixed-length + variable-length deduplication Identical part


Deduplication
Different part
Data is identical.
Reference block: Save the
complete data content.
Part of data is identical, with an offset of 512 bytes.

Byte offset is identical.


Source data Similar blocks: Save the
differences in content.
Modification in any location
Fixed-length blocks: Save
the reference count.

Supports fixed-length + variable-length deduplication for the optimal data reduction ratio.

33 Huawei Confidential
Inline Data Compression
Byte-level data compaction

Write 8 KB data blocks.


Data input
Compression
Data
compression Pack data to 4 MB chunks.
B1 B2 B3 B4 B5

Original data
organization
1 KB 3 KB 5 KB 7 KB 9 KB 10 KB

Wasted spaces
B1 B2 B3 B4 B5 Metadata offset
Optimized
data
organization
1 KB 3 KB 5 KB 6 KB

34 Huawei Confidential
Quiz

1. (True or False) SmartPartition creates partitions in the unit of LUNs or file systems, and
each partition can only be accessed by the LUN or file system in the partition.

2. (Multiple) Which of the following statements are true about the file system QoS policy?
A. When creating a file system QoS policy, you must set performance objectives, such as IOPS and
bandwidth.

B. File systems must be added to the QoS policy for control.

C. The vStore and file system QoS policies can coexist for dual-level QoS control.

D. File system performance will be controlled when it reaches the objective specified by either the file
system or vStore QoS policy.

35 Huawei Confidential
Summary

SmartPartition

SmartQuota
Smart series technology and
application
SmartVirtualization

Other Smart series technologies

36 Huawei Confidential
More Information
Scan and subscribe for the
latest documentation

https://support.huawei.com/enterprise/en/newsletter

37 Huawei Confidential
Recommendations
Huawei provides engineers with a wide range of product learning materials, including multimedia
information and online courses.
Social Media:
support.huawei.com/e Data Storage Academy Huawei IT Products
& Solutions

https://www.linkedin.com/s
howcase/huaweiitproducts

https://www.youtube.com/c/
HuaweiITProductsSolutions

38 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright©2020 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
Distributed Storage Technology
and Application
Foreword

 Enterprises are eager to expand their business boundaries, integrate storage


resources in cloud scenarios, and reduce the total cost of ownership (TCO) while
increasing the flexibility and elasticity of deployment to address the rapid growth
of unstructured data. Huawei distributed storage provides elastic and on-demand
services based on cloud infrastructure that meets the requirements of enterprise-
class mission-critical services and emerging services.
 This course describes the functions and features of Huawei's distributed storage
products, including block service, object service, big data service, and file service.

1 Huawei Confidential
Objectives

On completion of this course, you will be able to know:


 Block Service Features
 Object Service Features
 HDFS Service Features
 File Service Features

2 Huawei Confidential
Contents

1. Block Service Features

2. Object Service Features

3. HDFS Service Features

4. File Service Features

3 Huawei Confidential
Deduplication and Compression
Data with low
deduplication
Opportunity
ratios is filtered Queue to be
table
Block 1 out using the compressed
2 Data block HASH-A
opportunity
fingerprints table.
enter the Block 2
opportunity
table.
Compression engine
Block 3 HASH-B
Low compression High compression
rate and high speed rate and low speed
Promote the
1 Write data blocks. 3
opportunity table to
a fingerprint table.
Block 1 Fingerprint
table
Block 2
Block 4 Block A HASH-A The fingerprint
Block 5 table occupies little Data after
4 Direct data in memory, which compression
Block 6 the fingerprint supports
table after deduplication of
deduplication. large-capacity
systems.

4 Huawei Confidential
QoS
Application Application
server 1 server 2
Host 0 Host 1

I/O I/O
Token Token request request
bucket 0 bucket 1
Storage
system
Token
I/O queue of bucket 1
volume 1
......
I/O queue of Token
IOPS upper bucket n
limit 1000 volume N Disk

QoS policy 0 Volume 0


Volume-based I/O traffic control
Self-adaptive adjustment algorithm management algorithm
based on negative feedback

5 Huawei Confidential
Consistency Snapshot
Working Principles
1. A snapshot saves the complete data at a
specific point in time.
2. The newly written data is stored at the latest
point in time in LUNs.
3. Data is read from the latest point in time.
4. If a snapshot is deleted and the data is updated
to that of a new point in time, the
corresponding storage space will be reclaimed.

LUN E F G T3

Snapshot 2 D T2

Snapshot 1 C T1 Huawei OceanStor Distributed Storage

Snapshot 0 A B T0

Storage space 0 1 2 3 4 5 6 7

6 Huawei Confidential
Clone
Working Principles

Source
Clone 1 Clone 2
snapshot

1. Data in the source snapshot is shared into the


created clones.
2. The clones allocate separate space for the A B C D D'

data.
3. After the clones are split, data in the clones is
copied to independent physical spaces.
Source
Clone
snapshot

A B C D A B C E

7 Huawei Confidential
Asynchronous Replication
Replication cluster A Replication cluster B

Async replication
Node 1
deltaData Node 1

Node 2
deltaData Node 2

Node 3
deltaData Node 3

Node 4
Node 4
deltaData

8 Huawei Confidential
HyperMetro

Host Application Host


cluster

3. The host Cross-site active-active


1. The host
delivers I/O 2. cluster
delivers I/O 1.

HyperMetro volume

2. The system performs


4. The system performs 5. The system dual-write for I/O 1 and
dual-write for I/O 2 but forwards I/O 2. adds a local lock for the
detects a lock conflict. space storing I/O 1 at both
sites.

6. After processing
I/O 1, the system
HyperMetro processes I/O 2. HyperMetro
member volume member volume

Data center A Data center B

9 Huawei Confidential
Application Scenarios for the Block Service and
Kubernetes Integration Solution
Kubernetes Master

driver-registrar
① ②
CSI plugin
external-provisioner

Kubernetes Node
Huawei
Distributed
driver-registrar Container SCSI/iSCSI
Storage
/mnt
external-attacher

CSI plugin Block dev


Kubernetes Node
CSI plugin
driver-registrar external-attacher
Mgmt. plane
CSI plugin Data plane

10 Huawei Confidential
Contents

1. Block Service Features

2. Object Service Features

3. HDFS Service Features

4. File Service Features

11 Huawei Confidential
Online Aggregation of Small Objects

Obj1 Obj2 Obj3 Obj4 Obj5 Obj6 Obj7

...

Strip1 Strip2 Strip3 Strip4 Parity 1 Parity 2

512 KB
Object data aggregation EC scheme 4+2 is used as an example.

Online Erasure Coding

Cache Cache

... ...

Node Node

12 Huawei Confidential
Quota and Resource Statistics

Object storage 100 TB

Tenant 1 Tenant 2 Tenant 3


General Finance dept. HR dept.
20 TB manager 40 TB 40 TB

10 TB

2 TB 10 TB 8 TB 5 TB
Employee a Employee b Employee c Employee d
Bucket 1 Bucket 2 Bucket 3 Bucket 4

13 Huawei Confidential
Access Permission Control

ACL Bucket Policy

14 Huawei Confidential
Multi-Tenancy
SMBs

Tenant A Tenant B Tenant C

Data center

15 Huawei Confidential
QoS

Object Storage

QoS policy:
100 MB/s QoS policy:
1000 TPS
QoS policy:
QoS policy:
1 MB/s
10 TPS

Bucket 1 Bucket 2
VIP1 Common
user

16 Huawei Confidential
Object-Level Deduplication

Legend: Tenant Tenant


(deduplication (deduplication Bucket
enabled) disabled)

17 Huawei Confidential
WORM

18 Huawei Confidential
Remote Replication
Principle:
Use a unified domain
name to access S3 1. Data storage mode: The same object is stored in
multiple DCs without client duplicate mode between DCs, and is stored in EC mode
domain name and IP within a DC.
address changes.
2. QoS control: supports bucket-or tenant-based
bandwidth and TPS.
DC1 (active) DC2 (standby) 3. Visualization: The multi-DC topology, replication task,
progress, and network status can be displayed on the
Asynchronous management page.
replication Bucket 2 25/10GE
Bucket 1
WAN  The names of the active and standby
buckets are the same. If a fault occurs, the
...
active/standby switchover does not affect
...
applications.
Cluster B
 Supports replication performance-based QoS
Cluster A
object storage object storage control to ensure the performance of high-
priority applications

19 Huawei Confidential
Protocol-Interworking
S3 Client NFS Client
 Function description: In
Object File 1. Standard Complete
protocol interworking
NFS interface functions
File scenarios, the primary storage
NFS Protocol-
service provides comprehensive
Interworking functions, and the secondary
Simplified storage service is used to meet
functions
3. Standard Object (active) ⇌ File basic read/write access
S3 interface requirements in specific
Object Service Layer
scenarios.
5. Object
4. Object data metadata
Object Index Layer Object (active) ⇌
Electronic check image
Coexistence of old and new service systems
NFS file and gradual object-based reconstruction

Persistence Layer
HDFS (active) ⇌
Autonomous driving
NFS file training
(v 8.0.3) Mass data import, training, and analytics
Object (active) ⇌ File with zero migration

20 Huawei Confidential
Application Scenarios for the Object Service Video
Surveillance Cloud Solution
1 MB data generated on each camera per 15s, 24/7
......
Household Family Pet 12 PB 180,000 online subscriber, rolling deletion is
24/7 tie feeding performed every 3, 7, and 15 days. 10% of the total
uninterrupted
security Capacity
videos are played back.
uploading
Transmits videos to 42 Gbps traffic for each camera
① the stream media
platform.

Streaming Video compression Web Server
media server Transmits
server
video stream
to the
analysis
ECS ECS ECS Concurrent bandwidth: 2.67 Gbps/10000
platform.
② Saves original videos ③ Saves the ④ Queries online users
videos.
48.06 Gbps
to the object storage compressed video
to the object
Bandwidth
Object storage The storage IOPS of 9000 users reaches
storage 600 million 30 million per day.
times per
day
⑤ Deletes videos based on time. IOPS Write/delete latency < 500 ms, read latency < 200 ms

21 Huawei Confidential
Contents

1. Block Service Features

2. Object Service Features

3. HDFS Service Features

4. File Service Features

22 Huawei Confidential
Decoupled Storage-Compute HDFS Solution

Converged storage- Decoupled storage-compute


compute deployment deployment

Offline Log Operation Offline Log Operation


analysis retention analysis analysis retention analysis

HDFS components HDFS components


Native
HDFS
protocol

Management Storage- Storage- Storage- Management Compute Storage Storage


node compute node compute node compute node node node node node
Hadoop compute HDFS storage
Hadoop cluster cluster cluster

23 Huawei Confidential
Tiered Storage
Compute
layer
Tiering based on
Cluster for Cluster for nearline query Cluster for historical
applications
interactive query and offline analysis data query Data in different directories can be
written into different resource pools.
One storage pool supports multiple
big data applications.
Lifecycle
management Data lifecycle management (data tiering, data migration, and layout query)
layer
Automatic data
migration
Users can customize migration
Hot Warm Cold policies to automatically migrate
Automatic cold and hot data.
Automatic
migration migration
Resource pool
management Unified namespace
layer Data migration is transparent to the
SSD high- HDD large- HDD high- computing side and can be directly
performance pool capacity pool density pool accessed based on the actual data
location.

24 Huawei Confidential
Quota and Resource Statistics

HDFS storage

100 TB

2 TB 10 TB 8 TB 5 TB

Employee a Employee b Employee c Employee d


File system-1 File system-2 File system-3 File system-4

25 Huawei Confidential
Application Scenarios for the HDFS Service Solution
Real-time
retrieval
Operation
analysis
Data
visualization
Data
mining
...... Unified
portal

HDFS applications

HDFS components
Hadoop compute cluster
CPU CPU CPU CPU
......
Memory Memory Memory Memory
Management Compute Compute Compute Compute
node node node node node

Native HDFS semantics

Distributed storage cluster

......

26 Huawei Confidential
Contents

1. Block Service Features

2. Object Service Features

3. HDFS Service Features

4. File Service Features

27 Huawei Confidential
InfoEqualizer

Distributed Distributed
Windows, Linux, storage Windows, Linux, storage
Unix... Unix...

Node 1
Depart1.9000.com Zone 1
② Node 2

DFS
③ Node 3
Depart2.9000.com Zone 2
Node 4

1. The client accesses the file system using the level-1 or a


level-2 domain name, for example, fsx.tx.com.
2. The cluster resolves the domain name and returns the
corresponding IP address based on the load balancing
policy.
3. Service access
Partition-based
Load balancing based on domain names management

28 Huawei Confidential
InfoTier
Hot
data
SSD InfoTier enables files
to be stored on
different tiers based
SSD SAS on file properties. A
tier consists of one or
more node pools. A
node pool consists of
SAS SAS
multiple nodes. A
SATA node pool is divided
into multiple
Cold
SATA SATA SATA
Cold DiskPools. A partition
data data
is created for each
DiskPool.
Stores cold and hot data on Storage tiering
different tiers

29 Huawei Confidential
InfoAllocator
Storage

100 TB

General Finance HR dept.


20 TB manager 40 TB 40 TB
dept.

10 TB

2 TB 10 TB 8 TB 5 TB

Employee a Employee b Employee c Employee d

30 Huawei Confidential
InfoLocker

Customized Read-only Administrator


WORM clock permission permissions

Expired
4. Extend
the protection
3. The
period.
protection
period expires.
2. Modify
Unprotected Protected the protection
1. Submit for period.
protection.
5. The data is 6. Submit
appended. for protection
again.
Appended

31 Huawei Confidential
InfoStamper

/
A snapshot is created
for directory data, and
Data then file 3 is deleted.

.snapshot/ File 2 File 3

File 3 can still be read in the


File 2 File 3
snapshot directory.

32 Huawei Confidential
InfoScanner
Antivirus function
Service server

NFS/CIFS

......

Distributed storage node Antivirus


server

Send the path of the file to be scanned to the antivirus proxy server in polling mode.
Supports antivirus software such as Rising, Symantec, and Trend Micro ServerProtect.

33 Huawei Confidential
InfoReplicator

Primary Secondary
① directory: LAN/WAN directory:
/d/h/j /a/b/c ③


Snapshot
Snapshot

Primary site Secondary site

34 Huawei Confidential
InfoRevive
With InfoRevive > ABCD00 Strip

A B C D

Disk 1 Disk 2 Disk 3 Disk 4 Disk 5 Disk 6

Traditional RAID -> All data is lost. Strip

A B C D

Disk 1 Disk 2 Disk 3 Disk 4 Disk 5 Disk 6

35 Huawei Confidential
InfoTurbo

Algorithm of active
cache detection Optimized protocol

Client

The cache is hit,


video editing is
The cache is continuous, and
not hit, and response is
Current read

Current read
quick.
Next read

frame loss or

Next read
......
location

location

location

location
artifacts
occur. One client, multiple
One client, one link, links, and multiple
and one server servers break the
File File bottleneck created by
having network links
with a single server.
Legend:
Read data
Pre-fetched data

36 Huawei Confidential
Application Scenarios of the File Service Media Assets
NLE Media asset
management Requirement
Collection
Special Cataloging Search
Edit effects Composition The ingesting system needs reliable storage to

save data sent back from satellites.


HD: 200 Mbit/s
 The non-linear editing (NLE) system needs
high-performance storage to achieve fast
SD: 50 Mbit/s production and editing.
 The media asset management (MAM) system
needs large-capacity and cost-effective storage
Tape to save historical information.
Distributed file  Data sharing requirements
service

Solution
Playout  Industry's highest data reliability from N+1 to
service
N+4
 Elastic scalability, up to 100 PB storage
capacity, and linear expansion capability.
Processes Transcoding Web
 Automatic non-hotspot data migration,
Playout maximizing ROI
Media asset
storage library
 A single file system that satisfies all data
sharing requirements

37 Huawei Confidential
Quiz
1. (Multiple) Which features are supported by the distributed storage block service?
A. Snapshot

B. Clone

C. Remote replication

D. WORM

2. (True or False) The minimum replication period supported by Huawei OceanStor


Distributed Storage HyperReplication is 1 minute.
A. True

B. False

38 Huawei Confidential
Summary

Block Service Features

Object Service Features

Distributed Storage
Technology and Application

HDFS Service Features

File Service Features

39 Huawei Confidential
More Information
Scan and subscribe for the
latest documentation

https://support.huawei.com/enterprise/en/newsletter

40 Huawei Confidential
Recommendations
Huawei provides engineers with a wide range of product learning materials, including multimedia
information and online courses.
Social Media:
support.huawei.com/e Data Storage Academy Huawei IT Products
& Solutions

https://www.linkedin.com/s
howcase/huaweiitproducts

https://www.youtube.com/c/
HuaweiITProductsSolutions

41 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright©2020 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
Storage Planning and Design
Foreword

 Professional and standardized planning, design, and implementation


processes help build a high-performance storage environment to meet the
demands of customers whose service data is continually expanding and
changing.
 This course describes the processes, content, and tools involved in storage
planning and design.

1 Huawei Confidential
Objectives

 After completing this course, you will:


 Have an in-depth knowledge of the storage planning and design process.
 Comprehend planning and design content.
 Understand planning and design tools.

2 Huawei Confidential
Contents

1. Planning and Design Process

2. Planning and Design Content

3. Planning and Design Tools

3 Huawei Confidential
Concepts

Planning: A phase of an integration project that usually includes


strategy and design.

Strategy: Specifies design principles, such as business objectives,


development requirements, and technology selection.

Design: Outputs the specific solution and verifies its feasibility


based on the direction, scope, and principles specified in the
strategy.

4 Huawei Confidential
Basic Phases
Survey: Fully understand technology and
 Survey service requirements.

 Conceptual design
Conceptual design: Output the conceptual
 High level design topology based on requirements,
restrictions, assumptions, and risks.

 Low level design


High level design: Output high level
design documents for major infrastructure
components.

Low level design: Output hardware and


software configuration documents.

Deployment and verification

5 Huawei Confidential
Content
Industry Finance Government Video Media Desktop ...
surveillance asset

Requirement
Customer requirements
and scenario  Extensive in the  Refined in the  Changed  3-to-5-year
early stage later stage requirements service planning
Deployment and
Planning and design Project acceptance
implementation
Service  Information collection and  Basic environment check and  Solution acceptance criteria and
content analysis confirmation content
 (Optional) Site survey  Hardware installation and  Acceptance process
 Compatibility check acceptance  Acceptance plan, human resource
 LLD planning and design  Implementation guide output allocation, and responsibility division
 Value-added feature planning and  Storage network configuration  Acceptance cases
design guide
 Software installation
 Configuration and commissioning
Product
component Product components and hardware
 Server  Network device  Storage device

6 Huawei Confidential
Process

Project Hardware Network Service


information planning planning planning

• Information • Storage • Network • Basic service


collection selection topology • Capacity
• Requirement • Switch model • IP address planning
analysis • Compatibility • Port planning • Value-added
check function

Note: Only common items in the storage planning and design process are listed. These items
may vary case by case.

7 Huawei Confidential
Contents

1. Planning and Design Process

2. Planning and Design Content


 Project Information
 Hardware Planning
 Network Planning
 Service Planning

3. Planning and Design Tools

8 Huawei Confidential
Information Collection

Live network
•Live network device
•Network topology
•Service information
•...

Project
information

Customer requirements
Schedule
•Pain points
•Project delivery time
•Service growth requirements
•Key time points
•System expansion requirements
•...
•...

9 Huawei Confidential
Requirement Analysis Principles

Cost Availability

Security Manageability

Recoverability Performance

10 Huawei Confidential
Contents

1. Planning and Design Process

2. Planning and Design Content


 Project Information
 Hardware Planning
 Network Planning
 Service Planning

3. Planning and Design Tools

11 Huawei Confidential
Storage Selection

Capacity Throughput IOPS


• RAID level • Number of disks
• Disk type
• Hot spare space • Bandwidth
• RAID level
• Coffer disk • Storage system
• I/O characteristics
• File system architecture
• ...
• ... • ...

12 Huawei Confidential
Disk Type
 Mapping between disk types and storage tiers:

Storage Medium
Tier Response Speed Cost Per Gigabyte
Type

High-performance
SSD Fast High
tier

Performance tier SAS disk Medium Medium

Capacity tier NL-SAS disk Slow Low

Note: Tiered storage applies only to Huawei hybrid flash storage products.

13 Huawei Confidential
Disk Performance – Bandwidth
 Bandwidth is used as a performance indicator only for large sequential I/Os. The
following table lists bandwidth of common disks.

Disk Type Bandwidth


10K SAS 100 MB/s to 220 MB/s
15K SAS 170 MB/s to 240 MB/s
7.2K SATA/NL SAS 100 MB/s to 240 MB/s
SATA SSD 400 MB/s to 550 MB/s
SAS SSD 500 MB/s to 1,100 MB/s
NVMe 1.5 GB/s to 3.x GB/s

14 Huawei Confidential
Disk Performance – IOPS
 The following table lists the estimated IOPS of a single disk when the latency
requirement is met. The data is for reference only.

Minimum IOPS
Disk Type Estimated IOPS Range (Recommended for Device
Selection)
10K SAS HDD 280 to 350 150
15K SAS HDD 400 to 450 200
7.2K SATA/NL SAS HDD 170 to 200 70
SATA SSD Tens of thousands 2,500
SAS SSD Hundreds of thousands 3,500
NVMe 400,000 to 700,000 5,000

15 Huawei Confidential
RAID Level
 RAID levels are classified by protection measures.

Data striping, with double


Data striping, RAID 6
RAID 0
distributed parity
no parity
Common RAID 1 is performed
RAID 10 before RAID 0
Data mirroring, RAID 1
RAID
no parity levels
RAID 50 RAID 5 is performed
Data striping, before RAID 0
RAID 3
with parity disk
RAID 5

Data striping, with


distributed parity

16 Huawei Confidential
I/O Characteristics
 According to the working principles of RAID technology, write operations are most
abundant in terms of performance.
 Based on a Login VSI benchmark test, the following tables describe the percentages of
I/O writes and reads in a steady state, as well as the percentages of I/O writes and
reads delivered to disks.
 Percentages of I/O writes and reads in a steady state

Read I/O (%) Write I/O (%)


7 93
 Percentages of I/O writes and reads delivered to disks in a steady state

Read I/O (%) Write I/O (%)


60 30

17 Huawei Confidential
Compatibility Check
Storage system

O&M
management Server
software

Backup Compatibility Operating


software check system

Heterogeneous
HBA
virtualization

Multipathing
software

18 Huawei Confidential
Contents

1. Planning and Design Process

2. Planning and Design Content


 Project Information
 Hardware Planning
 Network Planning
 Service Planning

3. Planning and Design Tools

19 Huawei Confidential
Flash Storage Networking
Direct-connection Single-switch Dual-switch
networking networking networking

Application
Application server Application server
server

Switch 1 Switch 1 Switch 2

Controller A Controller B Controller A Controller B Controller A Controller B

Storage device Storage device Storage device

20 Huawei Confidential
Distributed Storage Networking

Management Management
Private node Standard node
FSM FSM
client protocol
access access
Storage node Compute node Storage node Compute node

REP VBS Application REP Application

VBS/HDFS
EDS EDS
-SVR

OSD OSD

Management plane:
Third-place Third-place Storage plane:
DR site quorum DR site quorum Replication plane:
server server Arbitration plane:
Service plane:

21 Huawei Confidential
Network Port and VLAN Planning

Ethernet port Logical port


• Logical ports are created
• Ethernet ports are used Bond port VLAN
on physical Ethernet
for devices to connect to
• Bond multiple Ethernet • VLANs are created on ports, bond ports, or
Ethernet. Multiple
ports and specify the physical Ethernet ports VLANs for service
Ethernet ports can be
bond port name for or bond ports. One operations. A home port
bonded as one port for
higher bandwidth and physical port can belong must be specified. If the
a higher data
better redundancy. to multiple VLANs. home port fails, services
transmission rate and
will fail over to another
bandwidth.
functioning port.

22 Huawei Confidential
Switch Port Planning for Storage Networks
 The following describes switch port planning when six nodes are deployed on a 10GE network
and the service, storage, and management switches are deployed independently.

Port Description

Storage node port Six 10GE ports from each switch are connected to storage nodes in sequence.

M-LAG port Each switch provides two 100GE ports to form an M-LAG.

Each switch provides four aggregation ports. Ports 3 and 4 are connected to one aggregation
switch, and ports 5 and 6 are connected to another aggregation switch.
Aggregation port
If the number of nodes is less than or equal to 40, aggregation switches are not required and the
aggregation ports are reserved for future use.

To avoid adversely impacting other ports, run the shutdown command to disable all reserved
Reserved port
ports. For details about the shutdown command, refer to the relevant switch documentation.

Note: The table shows switch port planning for when CE6881 switches are used as service and
storage switches.

23 Huawei Confidential
Switch Port Planning for Management Networks

Management ports Reserved ports Aggregation


ports

ETH
Reserved management Aggregation BMC switch
NIC ports ports ports ports

GE BASE-T electrical ports 10GE SFP+


optical ports

BMC switch ETH


GE BASE-T electrical ports 10GE SFP+ management
optical ports port

Management switch BMC switch

24 Huawei Confidential
Contents

1. Planning and Design Process

2. Planning and Design Content


 Project Information
 Hardware Planning
 Network Planning
 Service Planning

3. Planning and Design Tools

25 Huawei Confidential
Basic Service Planning Process (Block Service)
User behavior phase
Plan applications.
Purchasing
resources Plan capacity.

Plan disk domains.

Allocating space Plan storage pools.

Plan the
read/write policy for LUNs.

Using space Plan iSCSI CHAP.

Managing and
maintaining the Plan users. Mandatory Optional
system

26 Huawei Confidential
Basic Service Planning Process (File Service)
User behavior phase
Plan applications.
Purchasing
resources Plan capacity.

Plan disk domains.

Plan storage pools.


Allocating space
Plan file systems.

Authenticating
Plan user authentication.
users
Planning the
Plan the network.
network

Sharing space Plan resource sharing. Mandatory Optional

27 Huawei Confidential
More Information

This course describes only some common planning and


design contents. You can log in to the Huawei Data
Storage Infocenter (https://support-
it.huawei.com/storage/#/home) to search for related
product documents.

All right, professor. These documents


are also on the technical support
website (https://e.huawei.com).

28 Huawei Confidential
Contents

1. Planning and Design Process

2. Planning and Design Content

3. Planning and Design Tools


 eService LLDesigner
 Other Tools

29 Huawei Confidential
eService LLDesigner
LLD
documents

Method 1: Create the


LLD as you like. Project implementation
Method 2: Import the
BOQ to create the LLD.
Method 3: Create the Configuration
LLD based on the files
template.
LLDesigner
Device configuration

Wizard-based Visualization
Provides guidance for networking and Web-based hardware configuration,
service planning. device networking, and resource
allocation are visualized.

Standardization Automation
Unifies the LLD document style, simplifies Quickly generates LLD documents
project parameter settings, and shortens the and offline configuration files for
project planning and design duration. basic service configuration.

30 Huawei Confidential
Functions

Wizard-based
storage resource
planning

Automatic
Configuration recommendation
file exporting for device layout
in a cabinet

Visualized
networking

BOQ importing

31 Huawei Confidential
Obtaining and Using eService

How to obtain
• Visit
http://support.eservice.huawei.com/.
In the Deployment & Delivery area,
click LLDesigner. User guide
• Use Google Chrome.
• Go to the help center to watch the guide
video.

32 Huawei Confidential
Contents

1. Planning and Design Process

2. Planning and Design Content

3. Planning and Design Tools


 eService LLDesigner
 Other Tools

33 Huawei Confidential
Networking Assistant

Networking Network
Diagram
Assistant Configuration

Product Product
Type Model

Note: Log in to the Huawei Data Storage Infocenter, and in the Tools area, click Networking Assistant.

34 Huawei Confidential
Power Consumption Calculator

Power Power
Consumption Components Consumption
Calculator and Weight

Product Product
Series Model

Note: Log in to the Huawei Data Storage Infocenter, and in the Tools area, click Power Consumption Calculator.

35 Huawei Confidential
More Information

Professor, are there any other


planning and design tools?

Of course yes. This course introduces only some


common planning and design tools. You can log in to
the Huawei Data Storage Infocenter (https://support-
it.huawei.com/storage/#/home) to search for spare
parts, specification information, and EOX information.

36 Huawei Confidential
Quiz
1. (Multiple Choices) What are the indicators of project requirement analysis?
A. Security

B. Cost

C. Manageability

D. Recoverability

E. Performance

2. (Multiple Choices) Which are typical networking solutions for storage systems?
A. Dual-link direct-connection network

B. Multi-link single-switch network

C. Multi-link dual-switch network

D. Single-link direct-connection network

37 Huawei Confidential
Summary

Project Information
Planning and Design
Process
Hardware Planning
Planning and Design
Content
Network Planning
Storage Planning
and Design
Service Planning

eService LLDesigner
Planning and Design
Tools
Other Tools

38 Huawei Confidential
More Information
Scan and subscribe for the
latest documentation

https://support.huawei.com/enterprise/en/newsletter

39 Huawei Confidential
Recommendations
Huawei provides engineers with a wide range of product learning materials, including multimedia
information and online courses.
Social Media:
support.huawei.com/e Data Storage Academy Huawei IT Products
& Solutions

https://www.linkedin.com/s
howcase/huaweiitproducts

https://www.youtube.com/c/
HuaweiITProductsSolutions

40 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright©2020 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
Storage Installation and Deployment
Foreword

This course introduces the process for installing and deploying Huawei
storage, including storage system installation, system initialization, and
service deployment.

1 Huawei Confidential
Objectives

 After completing this course, you will be able to understand:


 Installation and deployment processes for flash storage
 Installation and deployment processes for distributed storage

2 Huawei Confidential
Contents

1. Flash Storage Installation and Deployment


 System Installation
 Service Deployment

2. Distributed Storage Installation and Deployment

3 Huawei Confidential
Installation Process

Connecting cables
Installing devices

Checking the hardware installation


Preparing for installation

Building a remote maintenance environment


Powering on

Initializing the storage system

4 Huawei Confidential
Preparing for Installation

Obtaining installation tools


Checking the installation environment
Installation tools
Installation meters Unpacking and checking
Temperature and humidity
Software tools
Power supply
... Device acceptance
Cabinet heat dissipation
Unpacking devices
...
Acceptance of installation
auxiliary materials
...

5 Huawei Confidential
Installing Storage Devices
Installing a controller Installing a disk Installing optional
enclosure enclosure devices

Installing a controller Installing a 2 U disk


Installing a cabinet
enclosure enclosure

Installing an Installing a 4 U disk Installing a quorum


interface module enclosure server

Installing a storage
Installing a cable tray Installing a disk
node

... ... Installing a switch

...

6 Huawei Confidential
Connecting Cables
External power supply External power supply
Disk
enclosure 2 Controller
enclosure

Controller
enclosure

Smart disk
enclosure
Disk
enclosure 0

Disk
enclosure 1

SASDisk
enclo
sure
Connecting cables between the Connecting power cables between the
controller enclosure and disk enclosures controller enclosure and disk enclosures

Note: The above example shows Huawei OceanStor Dorado all-flash storage.
7 Huawei Confidential
Power-on Sequence

Power supply of
External power Switch power Server power
the controller
supply supply supply
enclosure

8 Huawei Confidential
Initializing a Storage Device

Navigate to the
Change the
Log in to initial
Start management IP
DeviceManager. configuration
address.
wizard.

Configure alarm Configure security


End
handling. policies.

9 Huawei Confidential
Initial Configuration Wizard
Device
information
Start

Device time
Configure basic
information.
License
management
Create a storage pool.

Alarm settings

Scan UltraPath hosts.

Allocate resources.

End

Note: This example is relevant for all Huawei all-flash storage products. GUIs may vary by product version and model.

10 Huawei Confidential
Configuring Security Policies

Account policies

Login policies

Authorized IP addresses

User account auditing

11 Huawei Confidential
Configuring Alarm and Event Handling Policies
Email notification

SMS notification

Alarm and Alarm dump


notification
Trap notification

Syslog notification

Note: For details, see section "Configuring Alarm and Event Handling Policies" in the product
documentation of the desired version.

12 Huawei Confidential
More Tools

Professor, the storage installation


procedure is quite complex. Is there
an installation guide?

This presentation lists only some of the main installation steps. For
more information, you can log in to Huawei Data Storage Infocenter
(http://support-it.huawei.com/storage/#/home) and search for the
storage installation video in Multimedia Center. You can also search
for the product documentation in OceanStor Dorado V6 Infocenter.

13 Huawei Confidential
Contents

1. Flash Storage Installation and Deployment


 System Installation
 Service Deployment

2. Distributed Storage Installation and Deployment

14 Huawei Confidential
Basic Service Configuration Process (for Block)

Start

Pre-configuration check > Login to DeviceManager Preparing for


configuration

Disk domain creation > Storage pool creation > LUN creation > LUN group creation

Creating
storage space
Host creation > Host group creation

Mapping creation Mapping storage


resources to hosts

End

Note: The example above is for Huawei hybrid storage products. GUIs may vary by product version and model.

15 Huawei Confidential
Basic Service Configuration Process (for File)

Start

Pre-configuration check > Login to DeviceManager Preparing for


configuration

Disk domain creation > Storage pool creation > File system creation

Creating a file
system
Quota tree creation > Quota creation

Using an application server to access a shared file system Sharing and


accessing the file
system
End

Note: The example above is for Huawei hybrid storage products. GUIs may vary by product version and model.

16 Huawei Confidential
Contents

1. Flash Storage Installation and Deployment

2. Distributed Storage Installation and Deployment


 System Installation
 Service Deployment

17 Huawei Confidential
Installation Process
Installing and deploying Performing the post-
Preparing for installation
software installation check

Prepare hardware. Verify the software package. Check the cluster status.

Configure and check the


Prepare the OS. Check the host status.
installation environment.

Obtain required software and


Install an FSM node.
tools.

FusionStorage Manager (FSM)


Prepare data. Install an FSA node. FusionStorage Agent (FSA)

18 Huawei Confidential
Configuring a Storage Switch
Node port

• You are advised to connect node service ports in sequence.

Reserved port

• Run the shutdown command to disable the ports if they are not in use.

M-LAG port

• You are advised to use two 100GE ports for interconnection between switches.

Aggregation port

• You are advised to use four 100GE ports to connect to the aggregation switch.

ETH management port

• Used to manage switches. The ports connect to the BMC/management switch.

19 Huawei Confidential
Configuring a Management Switch
MGMT port

• The ports connect to the MGMT ports of each node.

Reserved port

• Run the shutdown command to disable the ports if they are not in use.

NIC port

• The ports connect to NIC ports of each node.

Aggregation port

• You are advised to use two GE ports to connect to the management network.

ETH management port

• The ports connect to ETH management ports of storage switches.

20 Huawei Confidential
Cable Connection in Converged Deployment (for Block)

Port Name Port Type Access Network Description


The two ports, forming a logical
SLOT5-0 and SLOT5-1 10GE/25GE optical port Storage network bond port, are connected to storage
switches.
The port connects to the
NIC1-1 GE port Management network
management switch.
The port connects to the BMC
Mgmt GE port BMC network
switch.

Note: To bond management network ports, use NIC1-1 and NIC1-2.

21 Huawei Confidential
Cable Connection in Separated Deployment (for Block)

Port Name Port Type Access Network Description


The two ports, forming a logical
SLOT5-0 and SLOT5-1 10GE/25GE optical port Storage network bond port, are connected to
storage switches.
The port connects to the
NIC1-1 GE port Management network
management switch.
The port connects to the BMC
Mgmt GE port BMC network
switch.

Note: This example shows a P100 node. To bond management network ports, use NIC1-1 and NIC1-2.

22 Huawei Confidential
Object Service Node Connection

Port Name Port Type Access Network Description


The two ports, forming a logical bond port,
SLOT5-0 and SLOT5-1 10GE optical port Storage network
are connected to storage switches.
The two ports, forming a logical bond port,
NIC1-3 and NIC1-4 GE port Service network
are connected to service switches.
NIC1-1 GE port Management network The port connects to the management switch.
Mgmt GE port BMC network The port connects to the BMC switch.

Note: This example shows a P100 node. To bond management network ports, use NIC1-1 and NIC1-2.

23 Huawei Confidential
HDFS Service Node Connection

Port Name Port Type Access Network Description


The two ports, forming a logical
SLOT5-0 and SLOT5-1 10GE optical port Storage network bond port, are connected to storage
switches.
The two ports, forming a logical
SLOT5-2 and SLOT5-3 10GE optical port Service network bond port, are connected to service
switches.
The port connects to the
NIC1-1 GE port Management network
management switch.
The port connects to the BMC
Mgmt GE port BMC network
switch.
Note: This example shows a P100 node. To bond management network ports, use NIC1-1 and NIC1-2.
24 Huawei Confidential
KVM Signal Cable Connection

25 Huawei Confidential
Contents

1. Flash Storage Installation and Deployment

2. Distributed Storage Installation and Deployment


 System Installation
 Service Deployment

26 Huawei Confidential
Deployment Process of Distributed Storage Services

Create a block Create a block Configure the


Block
storage pool. client. block service.

Create a file storage Configure the file


File Import pool. service.
the
license
files. Create an HDFS Configure the
HDFS HDFS service.
storage pool.

Create an object Perform Configure the


Object storage pool. initialization. object service.

27 Huawei Confidential
Block Storage Configuration Process (SCSI)

Preparations Import a block Create a block


service license. storage pool.

Service Add a compute


configurations Create a VBS. node.

Associate the
Create a
VBS with the
volume.
volume.

End

28 Huawei Confidential
Block Storage Configuration Process (iSCSI)

Preparations Import a block Create a block


service license. storage pool.

Service Configure the


Create a host.
configurations iSCSI service.

Add an Create a
initiator. volume.

Associate the
End host with the
volume.

29 Huawei Confidential
HDFS Service Configuration Process
Import the Create an HDFS
Common HDFS service service storage
configurations license. pool.

Service Create a file Create an


account.
configurations system.

Configure a Create a Global


subnet. zone.

Create a
Associate the
NameNode
file system.
zone.

30 Huawei Confidential
Object Storage Configuration Process

Preparations Import the Create an


Deploy the
object service object
object service.
license. storage pool.

Service
configurations Configure the
Configure the Configure a
object service
DNS service. region.
network.

Create an Create a
End
account. bucket.

31 Huawei Confidential
More Tools

Professor, the storage installation


procedure is quite complex. Is there
an installation guide?

This presentation lists only some of the main installation steps. For
more information, you can log in to Huawei Data Storage Infocenter
(http://support-it.huawei.com/storage/#/home) and search for the
storage installation video in Multimedia Center. You can also search
for the product documentation in OceanStor 100D Infocenter.

32 Huawei Confidential
Quiz
1. (True or False) With the help of the storage system's initialization wizard, we can configure the management IP
address of devices. ( )

2. (True or False) You should power on the cabinet first and then devices in the cabinet. ( )

3. (Multiple-Answer Question) Which of the following alarm handling policies are supported by the storage system?
( )
A. Email notification B. Syslog notification C. SMS notification D. Trap notification

4. (Multiple-Answer Question) Which of the following are true about the hardware requirements for installing the
distributed storage device? ( )
A. The number of host nodes must be greater than or equal to three.

B. The memory capacity of the host node is greater than 4 GB.

C. The rate of the host management NIC can be 1 Gbit/s.

D. The number of CPUs must be greater than or equal to four.

33 Huawei Confidential
Summary
Storage system
installation

Flash storage installation


System initialization
and deployment

Service deployment

Storage installation
and deployment
Storage system
installation

Distributed storage
installation and System initialization
deployment

Service deployment

34 Huawei Confidential
More Information
Scan and subscribe for the
latest documentation

https://support.huawei.com/enterprise/en/newsletter

35 Huawei Confidential
Recommendations
Huawei provides engineers with a wide range of product learning materials, including multimedia
information and online courses.
Social Media:
support.huawei.com/e Data Storage Academy Huawei IT Products
& Solutions

https://www.linkedin.com/s
howcase/huaweiitproducts

https://www.youtube.com/c/
HuaweiITProductsSolutions

36 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright©2020 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
Storage Maintenance and Troubleshooting
Foreword

 This course describes the basic concepts, processes, and troubleshooting


methods of storage O&M and troubleshooting. Storage devices are
electronic products that have a limited service life. Hardware and software
faults may occur on operating storage devices. To ensure the proper
running of the storage system and services, it is necessary to master related
O&M and troubleshooting skills.

1 Huawei Confidential
Objectives

 Upon completion of this course, you will be able to:


 Master O&M methods.
 Understand the process for troubleshooting faults.
 Master the methods of handling common faults.

2 Huawei Confidential
Contents

1. Storage O&M
 O&M Overview
 Information Collection
 O&M Operations

2. Troubleshooting

3 Huawei Confidential
What Is O&M?
 Operation and maintenance (O&M) refers to the activities necessary to operate and maintain
equipment, networks, servers, and services throughout their life cycles, aiming to achieve optimal
cost, stability, and efficiency.

• Asset management • Organization structure


• Event management • Professional skill
• Energy efficiency • Personnel allocation
management Maintenance Personnel
management organization

Management • Maintenance tool


• Device warranty Resource
Technical Platform • Knowledge library
• Device repair
assurance configuration • O&M platform
• Risk identification

Standard

Standard Service process


• ITIL system • Standard operation process
• Uptime O&M • Emergency response process
• ISO 2000 • Troubleshooting process

4 Huawei Confidential
How to Perform O&M
 Technical layer: Streamlines the O&M life cycle of each product and identifies the key measures of
each task.
 Process layer (ITIL process management framework): change, event, and problem management.

Before the device goes online O&M/Operation period Process


Management
Model O&M/
Requirement Design Implementation Go-online Go-offline
selection Operation Event
management
Requirement Configuration selection and
analysis architecture design Device go-offline
Problem
operation guidelines
Criteria for device go-online and management
transfer-to-maintenance
Change
Monitoring, security compliance assurance

Operations
Operation guidelines for device management
go-online and deployment
Capacity management and expansion
Configuration
Performance and experience optimization management
Emergency and DR drill Release
Cost and efficiency optimization management

...
PRR management (performance, reliability, and recoverability)

5 Huawei Confidential
Components of Enterprise Storage O&M System

Customer data center Huawei technical


DME support
Storage resource control
O&M administrator
Service request creation and
Server Resource pooling Service orchestration
remote troubleshooting

eService cloud system


eSight
Multi-device management
Fabric O&M administrator
Fault monitoring Performance report

Command center
eService
Storage DeviceManager DeviceManager DeviceManage
r
Remote maintenance
O&M administrator
Fault monitoring Fault backhaul
Authentication system

SmartKit Equipment archive system


DeviceManager Storage service tool
Single device management Service personnel Service request handling system
O&M administrator Delivery Upgrade Troubleshooting
Configuration & Alarming Expert system for fault analysis

6 Huawei Confidential
Introduction to DME Storage Products
 Data management engine (DME) Storage is Huawei proprietary software that provides centralized management and O&M
for storage devices in your data center. It covers the four phases of the device management life cycle (planning, provisioning,
maintenance, and optimization).
Browser 3rd System
DMEEcoPlugin

DME Storage
External routing API gateway (RESTful/SNMP)

Internal routing
Service governance

Resource Dashboard and


Data protection Data flow Faults and risks Intelligent analysis ...
provisioning report

Policy supervision engine


Datastore
RDB NoSQL: Elasticsearch
Automation engine AI engine
Kafka
Southbound access and data collection

AFA Hybrid SDS Brocade FC switches

7 Huawei Confidential
DME Storage Functions
ITSM

Automation platform Monitoring platform Report platform

Northbound API

Planning Construction O&M Optimization

SLA-based pooling and Automatic identification and Multi-dimensional analysis and


consolidation proactive prevention optimization suggestions
Flexible automation modes
Intelligent planning and Automatic analysis and One-click change and
Orchestratable scheduled tasks
automatic pooling quick locating automatic driving

Gold Silver
Gold Silver Bronze

Southbound API

Huawei AFA Huawei hybrid Huawei SDS FC switches Third-party Cloud (optional)

8 Huawei Confidential
DME Storage E2E O&M
Third-party
alarm
management
Customer administrator
Notification Filtering Demarcation Associated
Automatic SR and locating information
creation DME alarm
Report Notification E2E topology
management
eService E2E root
Masking Solution cause
Automatic analysis
acknowledgment/clearance/change/marking

Alarm Alarm Alarm Alarm


masking suppression aggregation association E2E Associated
performance event
Parsing analysis
Alarm collection
Associated
object

Host/vCenter AI & Policy


E2E
engine
FC switch bottleneck
analysis
Storage system
Automation
Storage infrastructure engine

9 Huawei Confidential
Proactive O&M of DME Storage
eService Training on cloud
Huawei
service
AI & Policy
Performance check and prediction
Automatic
engine - Storage resources/Hosts/Switches
SR creation Event - Service levels
management AI model
Customer Availability check
administrator Configuration check and prediction
Decision - Attribute, version, - Disk health
-making Analysis and warranty status/service
Automation AI & Policy
Dataset - Change and life
engine engine
associated - Hardware and
resources resource status
Configuration Data - Compatibility and - Abnormal
Historical
library cleansing workload
library data protection
detection
Execution
Access and collection Capacity check Optimization check
and prediction - Best practice
- Usage and free configuration
capacity - Unbalanced loads
Host/vCenter - Remaining use and recyclable
FC switch duration resources
Storage system
Storage infrastructure

10 Huawei Confidential
How to obtain O&M Documentation

Professor, the onsite environment of


IT devices is usually complex. A single
O&M method may not meet the
onsite O&M requirements. Are there
more guidance materials?

Only some O&M methods are listed in the training materials. For
more information, log in to Huawei Data Storage Infocenter
(http://support-it.huawei.com/storage/#/home) and search for O&M
to view more O&M tools and cases.

11 Huawei Confidential
Contents

1. Storage O&M
 O&M Overview
 Information Collection
 O&M Operations

2. Troubleshooting

12 Huawei Confidential
What Is Information Collection?
 In the event of a fault, collecting information helps maintenance engineers
quickly locate and rectify the fault. This includes information related to faults,
storage systems, networks, and application servers, as well as basic information.
 You must obtain the customer's consent before collecting information.

13 Huawei Confidential
Information Collection Methods

DeviceManager - Collects logs and


alarms.

CLI - Collects storage system


configuration data.

SmartKit - Collects system information.

14 Huawei Confidential
How to Collect Live Network Information

Step
Step 2 Step 3
Storage Application
Step
Basic1 Fault 4
Networking
Produ Produ
device server
Product
information1 information
information Produ
information
information
ct 2 ct 3
ct 4

15 Huawei Confidential
Procedure for Collecting Fault Information
Export system data

Check all events


Collect storage system fault
information Check alarm information

Download logs

Collect Ethernet switch information

Collect switch information Collect Fiber Channel switch information


Collect fault information
Check SFP information

Host

File system

Collect other information Volume management

HBA

16 Huawei Confidential
How to Obtain More Documents

Professor, the training material only


lists the method and process of
information collection. Are there any
more detailed operation guides or
commands?

Our training materials focus on the process and methods. For more
information, log in to Huawei Data Storage Infocenter
(http://support-it.huawei.com/storage/#/home) and search for
Information Collection to view more information such as
information collection tools and commands.

17 Huawei Confidential
Contents

1. Storage O&M
 O&M Overview
 Information Collection
 O&M Operations

2. Troubleshooting

18 Huawei Confidential
Quick Maintenance Procedure
Start

Check the indicator status Storage device indicators (front and rear panels) specify the device running status and
and handle related exceptions. help you discover and rectify common hardware faults.

Check the service status By checking the system information and service status, you can learn about the basic
and handle related exceptions. information, alarms, capacity trend, and performance of the storage system, as well as
the status of storage resource allocation and value-added features.

Check the system performance


You can query the real-time and historical performance statistics on DeviceManager.
and handle related exceptions.

If a fault occurs in the storage system, DeviceManager automatically determines the


Check and clear alarms.
severity of the fault and reports an alarm. Maintenance engineers should rectify the
fault in a timely manner to prevent service interruption or data loss.
Can
the preceding Yes
exceptions be
handled?
No
Collect information and report
faults.

End

19 Huawei Confidential
Procedure for Checking the Storage Device

Stepthe
Check the Step 2 Stepthe
Check 3 Check
Step 1 Check device 4
service
storage running Produ Produ
Product
status. 1
indicators. running Produ
running
ct 2 ct 3
status. status.
ct 4

20 Huawei Confidential
Contents

1. Storage O&M

2. Troubleshooting
 Troubleshooting Overview
 Troubleshooting Methods
 Troubleshooting Practices

21 Huawei Confidential
Fault Definition
 Fault
 A fault indicates a state in which a product cannot perform a specified function.
Preventive maintenance, other planned activities, or lack of external resources are
not faults. A fault is usually the state after the failure of a product, but it may also
exist before the product fails.
 A fault is defined as an abnormal condition or defect at the component, equipment,
or sub-system level which may lead to a failure. (ISO/CD 10303-226)

22 Huawei Confidential
Fault Analysis
 Fault analysis, also called fault diagnosis, refers to the process of collecting and
analyzing data to determine the cause of a fault and how to prevent the fault
from occurring again.
 Fault analysis is an important subject in many branches of the manufacturing
industry. For example, in the electronics industry, fault analysis is an important
means of developing new products and improving existing products.
 During fault analysis, you need to use various methods to collect fault data and
information for subsequent analysis of one or more fault causes. (source:
Wikipedia)

23 Huawei Confidential
MTBF and MTTR
up time (after repair) down time (unplanned)

Up

Down between failures


off one failure one failure one failure

Time Between Failures = (down time – up time )

 Mean time between failures (MTBF) refers to the average


time between failures of a product during operations or tests.
 Mean time to repair (MTTR) refers to the average time for a
product to recover from a failure.

24 Huawei Confidential
Common Fault Types

Log in failure using the serial port


DeviceManager fault

Disk enclosure fault
Expansion module fault
Management
Power module fault Hardware fault
Interface module fault software fault

Fiber Channel link exception Basic storage Multipathing software


iSCSI link exception service fault Fault type fault

Failure to load the multipathing
software after server restart
Value-added Failure to detect the mutipathing
service fault software by SUSE application server

Inconsistent replication links between storage systems
Offline storage pool, LUN fault …
Unexpected disconnection of the secondary LUN
Power-off during backup and recovery

25 Huawei Confidential
Contents

1. Storage O&M

2. Troubleshooting
 Troubleshooting Overview
 Troubleshooting Methods
 Troubleshooting Practices

26 Huawei Confidential
Basic Principles for Troubleshooting Storage Faults
 External factor failures include failures in optical fibers, optical cables, power supplies,
and customer's devices.
Analyze external factors  Internal factor failures include failures in disks, controllers, and interface modules.
first and then internal
factors.
 Analyze high-severity alarms and then low-severity alarms. The alarm severity sequence
from high to low is critical alarms, major alarms, and warnings.
 Critical: Indicates an event that causes a service interruption or device failure.
Recovery measures must be taken immediately.
 Major: Indicates an event that affects system performance. Recovery measures
Analyze alarms of higher must be taken to prevent greater impacts on the storage system or system
severities and then those performance. All alarms caused by hardware faults are major alarms.
of lower severities.  Warning: Indicates an event that imposes no impact on the storage system
currently. However, the event may affect the services running in the system in the
future if left unresolved.

 When analyzing an event, confirm it is an uncommon or common fault and then


determine its impact.
Analyze common alarms  In addition, confirm the fault occurred on one or multiple components.
and then uncommon
alarms.

27 Huawei Confidential
Overview of Troubleshooting Storage Faults

1 Troubleshooting 2
Basic principles
procedure
Basic fault locating rules help
Troubleshoot faults by following users quickly exclude useless
the troubleshooting procedure. information and locate faults.

3 4
Alarm analysis Replacement

Analyze storage alarms to Replace components of a storage


troubleshoot a fault. system to troubleshoot a fault.

28 Huawei Confidential
Storage Troubleshooting Procedure
Start

Observe fault symptoms and


collect fault information.

Is No Search the troubleshooting manual for the


event information displayed on
fault that matches the symptom.
DeviceManager?

Yes Does the fault that matches


the symptom exist in the manual?
Handle the event according to the
handling suggestions of Yes
DeviceManager or by referring to the
Rectify the fault according to the No
Event Reference.
procedure described in the manual.

Is the fault No Keep the environment intact and contact


rectified? Huawei technical support.

Yes

End

29 Huawei Confidential
Contents

1. Storage O&M

2. Troubleshooting
 Troubleshooting Overview
 Troubleshooting Methods
 Troubleshooting Practices

30 Huawei Confidential
Alarm Analysis
 Overview
 Typically, when a system is faulty, many alarms are generated. By viewing alarm information and analyzing performance
data, the type and location of the fault can be determined.

 Application scenario
 If alarm information can be collected, the alarm analysis method can be used to diagnose any fault.

 Application example
 A video service is once running properly but suddenly its performance deteriorates and picture display becomes unstable.

 Check that the client status and network status are normal, and the fault indicator of the storage array is on. Log in to
the management page and find the critical alarm that is generated. On the alarm management page, check that a RAID
group degrade alarm is generated and locate the faulty disk. Replace the faulty disk and check that the fault is rectified.

31 Huawei Confidential
Replacement
 Overview
 A fault can be located and rectified by replacing components suspected to be faulty. The components can be network
cables, controllers, or expansion modules.

 Application scenario
 This replacement method requires hardware troubleshooting from engineers to quickly locate faulty components.
However, you must prepare spare parts in advance, which can be time-consuming.

 It is recommended that you use this method in scenarios with minimum service volumes or impact on services.

 Application example
 During the preventive maintenance of devices in a library, a maintenance engineer fails to log in to a storage device using
DeviceManager and fails to ping through any storage devices on the host. After removing and reinserting or replacing
network cables, the maintenance engineer discovers that the problem is caused by a loose or damaged cable.

32 Huawei Confidential
BBU Troubleshooting Case

Symptom Analysis and Solution


diagnosis

Step 1: View the BBU alarm to locate the faulty


The BBU is faulty.
BBU. Then remove and reinsert the BBU.
Possible causes:
On Step 2: Check the BBU health status on
The BBU is not
DeviceManager, DeviceManager.
correctly
a BBU's Health Step 3: If the BBU health status becomes normal,
connected, or the
Status is Faulty. the fault has been rectified. Otherwise, replace
BBU is not
the BBU. If the problem persists, keep the
functioning
environment intact and contact Huawei technical
properly.
support.

33 Huawei Confidential
Quiz

1. (Multi-answer question) Which of the following are involved in live network


information collection?
1. Networking information

2. Storage device information

3. Application server information

4. Fault information

2. (True or false) If a fault alarm is generated in the storage system, you are
advised to use the replacement method.

34 Huawei Confidential
Summary

O&M overview

Information
Storage O&M
collection

O&M operations
Storage O&M and
troubleshooting
Fault overview

Troubleshooting
Troubleshooting
methods
Troubleshooting
practices

35 Huawei Confidential
More Information
Scan and subscribe for the
latest documentation

https://support.huawei.com/enterprise/en/newsletter

36 Huawei Confidential
Recommendations
Huawei provides engineers with a wide range of product learning materials, including multimedia
information and online courses.
Social Media:
support.huawei.com/e Data Storage Academy Huawei IT Products
& Solutions

https://www.linkedin.com/s
howcase/huaweiitproducts

https://www.youtube.com/c/
HuaweiITProductsSolutions

37 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright©2020 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.

You might also like