0%

Continuing its commitment to developing and delivering industry-leading storage technologies, IBM® introduces the IBM FlashSystem® solution that is powered by IBM Spectrum® Virtualize V8.4. This innovative storage offering delivers essential storage efficiency technologies and exceptional ease of use and performance, all integrated into a compact, modular design that is offered at a competitive, midrange price.

The solution incorporates some of the top IBM technologies that are typically found only in enterprise-class storage systems, which raises the standard for storage efficiency in midrange disk systems. This cutting-edge storage system extends the comprehensive storage portfolio from IBM and can help change the way organizations address the ongoing information explosion.

This IBM Redbooks® publication introduces the features and functions of an IBM Spectrum Virtualize V8.4 system through several examples. This book is aimed at pre-sales and post-sales technical support and marketing and storage administrators. It helps you understand the architecture, how to implement it, and how to take advantage of its industry-leading functions and features.

Table of Contents

  1. Front cover
  2. Preface
    1. Authors
    2. Now you can become a published author, too!
    3. Comments welcome
    4. Stay connected to IBM Redbooks
  3. Chapter 1. Introduction and system overview
    1. 1.1 Storage virtualization terminology
    2. 1.2 Latest changes and enhancements
    3. 1.3 IBM SAN Volume Controller architecture
    4. 1.3.1 IBM SAN Volume Controller architectural overview
    5. 1.3.2 IBM Spectrum Virtualize
    6. 1.3.3 IBM SAN Volume Controller topology
    7. 1.4 IBM SAN Volume Controller models
    8. 1.4.1 IBM SAN Volume Controller SV2 and SA2
    9. 1.4.2 IBM SAN Volume Controller SV1
    10. 1.4.3 IBM SAN Volume Controller model comparisons
    11. 1.5 IBM SAN Volume Controller components
    12. 1.5.1 Nodes
    13. 1.5.2 I/O groups
    14. 1.5.3 System
    15. 1.5.4 Expansion enclosures
    16. 1.5.5 Flash drives
    17. 1.5.6 MDisks
    18. 1.5.7 Cache
    19. 1.5.8 Quorum disk
    20. 1.5.9 Storage pool
    21. 1.5.10 Volumes
    22. 1.5.11 Easy Tier
    23. 1.5.12 Hosts
    24. 1.5.13 Array
    25. 1.5.14 Encryption
    26. 1.5.15 iSCSI and iSCSI Extensions over RDMA
    27. 1.5.16 IBM Real-time Compression
    28. 1.5.17 Data Reduction Pools
    29. 1.5.18 IP replication
    30. 1.5.19 IBM Spectrum Virtualize copy services
    31. 1.5.20 Synchronous or asynchronous Remote Copy
    32. 1.5.21 FlashCopy and Transparent Cloud Tiering
    33. 1.6 Business continuity
    34. 1.6.1 Business continuity with Stretched Clusters
    35. 1.6.2 Business continuity with Enhanced Stretched Cluster
    36. 1.6.3 Business continuity with HyperSwap
    37. 1.6.4 Business continuity with three-site replication
    38. 1.6.5 Automatic hot spare nodes
    39. 1.7 Management and support tools
    40. 1.7.1 IBM Assist On-site and Remote Support Assistance
    41. 1.7.2 Event notifications
    42. 1.8 Useful IBM SAN Volume Controller web links
  4. Chapter 2. Planning
    1. 2.1 General planning rules
    2. 2.2 Planning for availability
    3. 2.3 Physical installation planning
    4. 2.4 Planning for system management
    5. 2.4.1 User password creation options
    6. 2.5 Connectivity planning
    7. 2.6 Fibre Channel SAN configuration planning
    8. 2.6.1 Physical topology
    9. 2.6.2 Zoning
    10. 2.6.3 N_Port ID Virtualization
    11. 2.6.4 Inter-node zone
    12. 2.6.5 Back-end storage zones
    13. 2.6.6 Host zones
    14. 2.6.7 Zoning considerations for Metro Mirror and Global Mirror
    15. 2.6.8 Port designation recommendations
    16. 2.7 IP SAN configuration planning
    17. 2.7.1 iSCSI and iSER protocols
    18. 2.7.2 Priority flow control
    19. 2.7.3 RDMA clustering
    20. 2.7.4 iSCSI back-end storage attachment
    21. 2.7.5 IP network host attachment
    22. 2.7.6 Native IP replication
    23. 2.7.7 Firewall planning
    24. 2.8 Planning topology
    25. 2.8.1 High availability
    26. 2.8.2 Three-Site replication
    27. 2.9 Back-end storage configuration
    28. 2.10 Internal storage configuration
    29. 2.11 Storage pool configuration
    30. 2.11.1 Child pools
    31. 2.11.2 Storage pool and cache relationship
    32. 2.12 Volume configuration
    33. 2.12.1 Planning for image mode volumes
    34. 2.12.2 Planning for fully allocated volumes
    35. 2.12.3 Planning for thin-provisioned volumes
    36. 2.12.4 Planning for compressed volumes
    37. 2.12.5 Planning for deduplicated volumes
    38. 2.13 Host attachment planning
    39. 2.13.1 Queue depth
    40. 2.13.2 Microsoft Offloaded Data Transfer
    41. 2.13.3 SAN boot support
    42. 2.13.4 Planning for large deployments
    43. 2.13.5 Planning for SCSI Unmap
    44. 2.14 Planning copy services
    45. 2.14.1 FlashCopy guidelines
    46. 2.14.2 Planning for Metro Mirror and Global Mirror
    47. 2.15 Data migration
    48. 2.16 Performance monitoring with IBM Storage Insights
    49. 2.17 Configuration backup procedure
  5. Chapter 3. Initial configuration
    1. 3.1 Prerequisites
    2. 3.2 System initialization
    3. 3.2.1 System initialization process
    4. 3.3 System setup
    5. 3.3.1 System setup wizard
    6. 3.4 Base configuration
    7. 3.4.1 Configuring Remote Direct Memory Access clustering
    8. 3.4.2 Adding a node or hot spare node
    9. 3.4.3 Changing the system topology
    10. 3.4.4 Configuring quorum disks or applications
    11. 3.4.5 Configuring the local Fibre Channel port masking
    12. 3.5 Configuring management access
    13. 3.5.1 Configuring secure communications
    14. 3.5.2 Configuring password policies
    15. 3.5.3 Configuring user authentication
  6. Chapter 4. IBM Spectrum Virtualize GUI
    1. 4.1 Normal operations by using the GUI
    2. 4.1.1 Accessing the GUI
    3. 4.2 Introduction to the GUI
    4. 4.2.1 Task menu
    5. 4.2.2 Suggested tasks
    6. 4.2.3 Notification icons and help
    7. 4.3 System Hardware - Overview window
    8. 4.3.1 Content-based organization
    9. 4.4 Monitoring menu
    10. 4.4.1 System Hardware overview
    11. 4.4.2 IBM Easy Tier Reports
    12. 4.4.3 Events
    13. 4.4.4 Performance
    14. 4.4.5 Background Tasks
    15. 4.5 Pools
    16. 4.6 Volumes
    17. 4.7 Hosts
    18. 4.8 Copy Services
    19. 4.9 Access
    20. 4.9.1 Ownership groups
    21. 4.9.2 Users by groups
    22. 4.9.3 Audit log
    23. 4.10 Settings
    24. 4.10.1 Notifications menu
    25. 4.10.2 Network
    26. 4.10.3 Using the management GUI
    27. 4.10.4 Security menu
    28. 4.10.5 System menus
    29. 4.10.6 Support menu
    30. 4.10.7 GUI Preferences menu
    31. 4.11 Other frequent tasks in the GUI
    32. 4.11.1 Renaming components
    33. 4.11.2 Changing the system topology
    34. 4.11.3 Restarting the GUI service
  7. Chapter 5. Using storage pools
    1. 5.1 Working with storage pools
    2. 5.1.1 Creating storage pools
    3. 5.1.2 Managed disks in a storage pool
    4. 5.1.3 Actions on storage pools
    5. 5.1.4 Child pools
    6. 5.1.5 Encrypted storage pools
    7. 5.2 Working with external controllers and MDisks
    8. 5.2.1 External storage controllers
    9. 5.2.2 Actions on external storage controllers
    10. 5.2.3 Working with external MDisks
    11. 5.2.4 Actions for external MDisks
    12. 5.3 Working with internal drives and arrays
    13. 5.3.1 Working with drives
    14. 5.3.2 RAID and distributed RAID
    15. 5.3.3 Creating arrays
    16. 5.3.4 Actions on arrays
  8. Chapter 6. Creating and provisioning volumes
    1. 6.1 Introduction to volumes
    2. 6.2 Volume characteristics
    3. 6.2.1 Volume type
    4. 6.2.2 Managed mode and image mode
    5. 6.2.3 VSize
    6. 6.2.4 Performance
    7. 6.2.5 Volume copies
    8. 6.2.6 I/O operations data flow
    9. 6.2.7 Storage efficiency
    10. 6.2.8 Encryption
    11. 6.2.9 Cache mode
    12. 6.2.10 I/O throttling
    13. 6.2.11 Volume protection
    14. 6.2.12 Secure data deletion
    15. 6.3 Virtual volumes
    16. 6.4 Volumes in multi-site topologies
    17. 6.4.1 HyperSwap topology
    18. 6.4.2 Stretched topology
    19. 6.5 Operations on volumes
    20. 6.5.1 Creating volumes
    21. 6.5.2 Creating custom volumes
    22. 6.5.3 Creating volumes in multi-site topologies
    23. 6.5.4 I/O throttling
    24. 6.5.5 Volume protection
    25. 6.5.6 Modifying a volume
    26. 6.5.7 Deleting a volume
    27. 6.5.8 Mapping a volume to a host
    28. 6.5.9 Modify I/O Group or Non-disruptive Volume Move (NDVM)
    29. 6.5.10 Migrating a volume to another storage pool
    30. 6.6 Volume operations by using the CLI
    31. 6.6.1 Displaying volume information
    32. 6.6.2 Creating a volume
    33. 6.6.3 Creating a thin-provisioned volume
    34. 6.6.4 Creating a volume in image mode
    35. 6.6.5 Adding a volume copy
    36. 6.6.6 Splitting a mirrored volume
    37. 6.6.7 Modifying a volume
    38. 6.6.8 Deleting a volume
    39. 6.6.9 Volume protection
    40. 6.6.10 Expanding a volume
    41. 6.6.11 HyperSwap volume modification with CLI
    42. 6.6.12 Mapping a volume to a host
    43. 6.6.13 Listing volumes that are mapped to the host
    44. 6.6.14 Listing hosts that are mapped to the volume
    45. 6.6.15 Deleting a volume to host mapping
    46. 6.6.16 Migrating a volume
    47. 6.6.17 Migrating a fully managed volume to an image mode volume
    48. 6.6.18 Shrinking a volume
    49. 6.6.19 Listing volumes that use MDisks
    50. 6.6.20 Listing MDisks that are used by the volume
    51. 6.6.21 Listing volumes that are defined in the storage pool
    52. 6.6.22 Listing storage pools in which a volume has its extents
    53. 6.6.23 Tracing a volume from a host back to its physical disks
  9. Chapter 7. Attaching hosts to the storage systems
    1. 7.1 Host attachment overview
    2. 7.2 Host objects overview
    3. 7.3 NVMe over Fibre Channel
    4. 7.4 N_Port ID Virtualization support
    5. 7.4.1 NPIV prerequisites
    6. 7.4.2 Enabling NPIV on a new system installation
    7. 7.4.3 Enabling NPIV on a system
    8. 7.5 Hosts operations by using the GUI
    9. 7.5.1 Creating hosts
    10. 7.5.2 Host clusters
    11. 7.5.3 Actions on hosts
    12. 7.5.4 Actions on host clusters
    13. 7.5.5 Host management views
    14. 7.6 Performing hosts operations by using CLI
    15. 7.6.1 Creating a host by using the CLI
    16. 7.6.2 Host administration by using the CLI
    17. 7.6.3 Adding and deleting a host port by using the CLI
    18. 7.6.4 Host cluster operations
    19. 7.6.5 Adding a host or host cluster to an ownership group
    20. 7.7 Host attachment practical examples
    21. 7.7.1 Pre-requisites
    22. 7.7.2 Fibre Channel host connectivity and capacity allocation
    23. 7.7.3 iSCSI host connectivity and capacity allocation
    24. 7.7.4 NVMe over Fabric host connectivity example
  10. Chapter 8. Storage migration
    1. 8.1 Storage migration overview
    2. 8.1.1 Interoperability and compatibility
    3. 8.1.2 Prerequisites
    4. 8.2 Storage migration wizard
  11. Chapter 9. Advanced features for storage efficiency
    1. 9.1 IBM Easy Tier
    2. 9.1.1 Easy Tier concepts
    3. 9.1.2 Implementing and tuning Easy Tier
    4. 9.1.3 Monitoring Easy Tier activity
    5. 9.2 Thin-provisioned volumes
    6. 9.2.1 Concepts
    7. 9.2.2 Implementation
    8. 9.3 Unmap
    9. 9.3.1 SCSI unmap command
    10. 9.3.2 Back-end SCSI unmap
    11. 9.3.3 Host SCSI unmap
    12. 9.3.4 Offload IO throttle
    13. 9.4 Data Reduction Pools
    14. 9.4.1 Introduction to DRP
    15. 9.4.2 DRP benefits
    16. 9.4.3 Planning for DRPs
    17. 9.4.4 Implementing DRP with compression and deduplication
    18. 9.5 Compression with standard pools
    19. 9.5.1 Real-time Compression concepts
    20. 9.5.2 Implementing RtC
    21. 9.6 Saving estimation for compression and deduplication
    22. 9.6.1 Evaluate compression savings by using IBM Comprestimator
    23. 9.6.2 Evaluating compression and deduplication
    24. 9.7 Overprovisioning and data reduction on external storage
  12. Chapter 10. Advanced Copy Services
    1. 10.1 IBM FlashCopy
    2. 10.1.1 Business requirements for FlashCopy
    3. 10.1.2 FlashCopy principles and terminology
    4. 10.1.3 FlashCopy mapping
    5. 10.1.4 Consistency groups
    6. 10.1.5 Crash consistent copy and hosts considerations
    7. 10.1.6 Grains and bitmap: I/O indirection
    8. 10.1.7 Interaction with cache
    9. 10.1.8 Background Copy Rate
    10. 10.1.9 Incremental FlashCopy
    11. 10.1.10 Starting FlashCopy mappings and consistency groups
    12. 10.1.11 Multiple target FlashCopy
    13. 10.1.12 Reverse FlashCopy
    14. 10.1.13 FlashCopy and image mode Volumes
    15. 10.1.14 FlashCopy mapping events
    16. 10.1.15 Thin-provisioned FlashCopy
    17. 10.1.16 Serialization of I/O by FlashCopy
    18. 10.1.17 Event handling
    19. 10.1.18 Asynchronous notifications
    20. 10.1.19 Interoperation with Metro Mirror and Global Mirror
    21. 10.1.20 FlashCopy attributes and limitations
    22. 10.2 Managing FlashCopy by using the GUI
    23. 10.2.1 FlashCopy presets
    24. 10.2.2 FlashCopy window
    25. 10.2.3 Creating a FlashCopy mapping
    26. 10.2.4 Single-click snapshot
    27. 10.2.5 Single-click clone
    28. 10.2.6 Single-click backup
    29. 10.2.7 Creating a FlashCopy consistency group
    30. 10.2.8 Creating FlashCopy mappings in a Consistency Group
    31. 10.2.9 Showing related Volumes
    32. 10.2.10 Moving FlashCopy mappings across Consistency Groups
    33. 10.2.11 Removing FlashCopy mappings from Consistency Groups
    34. 10.2.12 Modifying a FlashCopy mapping
    35. 10.2.13 Renaming FlashCopy mappings
    36. 10.2.14 Deleting FlashCopy mappings
    37. 10.2.15 Deleting a FlashCopy consistency group
    38. 10.2.16 Starting FlashCopy mappings
    39. 10.2.17 Stopping FlashCopy mappings
    40. 10.2.18 Memory allocation for FlashCopy
    41. 10.3 Transparent Cloud Tiering
    42. 10.3.1 Considerations for using Transparent Cloud Tiering
    43. 10.3.2 Transparent Cloud Tiering as backup solution and data migration
    44. 10.3.3 Restoring data by using Transparent Cloud Tiering
    45. 10.3.4 Transparent Cloud Tiering restrictions
    46. 10.4 Implementing Transparent Cloud Tiering
    47. 10.4.1 Domain Name System configuration
    48. 10.4.2 Enabling Transparent Cloud Tiering
    49. 10.4.3 Creating cloud snapshots
    50. 10.4.4 Managing cloud snapshots
    51. 10.4.5 Restoring cloud snapshots
    52. 10.5 Volume mirroring and migration options
    53. 10.6 Remote Copy
    54. 10.6.1 IBM SAN Volume Controller and IBM FlashSystems system layers
    55. 10.6.2 Multiple IBM Spectrum Virtualize systems replication
    56. 10.6.3 Importance of write ordering
    57. 10.6.4 Remote Copy intercluster communication
    58. 10.6.5 Metro Mirror overview
    59. 10.6.6 Synchronous Remote Copy
    60. 10.6.7 Metro Mirror features
    61. 10.6.8 Metro Mirror attributes
    62. 10.6.9 Practical use of Metro Mirror
    63. 10.6.10 Global Mirror overview
    64. 10.6.11 Asynchronous Remote Copy
    65. 10.6.12 Global Mirror features
    66. 10.6.13 Using Global Mirror with change volumes
    67. 10.6.14 Distribution of work among nodes
    68. 10.6.15 Background copy performance
    69. 10.6.16 Thin-provisioned background copy
    70. 10.6.17 Methods of synchronization
    71. 10.6.18 Practical use of Global Mirror
    72. 10.6.19 IBM Spectrum Virtualize HyperSwap topology
    73. 10.6.20 Consistency Protection for Global Mirror and Metro Mirror
    74. 10.6.21 Valid combinations of FlashCopy, Metro Mirror, and Global Mirror
    75. 10.6.22 Remote Copy configuration limits
    76. 10.6.23 Remote Copy states and events
    77. 10.7 Remote Copy commands
    78. 10.7.1 Remote Copy process
    79. 10.7.2 Listing available system partners
    80. 10.7.3 Changing the system parameters
    81. 10.7.4 System partnership
    82. 10.7.5 Creating a Metro Mirror/Global Mirror consistency group
    83. 10.7.6 Creating a Metro Mirror/Global Mirror relationship
    84. 10.7.7 Changing Metro Mirror/Global Mirror relationship
    85. 10.7.8 Changing Metro Mirror/Global Mirror consistency group
    86. 10.7.9 Starting Metro Mirror/Global Mirror relationship
    87. 10.7.10 Stopping Metro Mirror/Global Mirror relationship
    88. 10.7.11 Starting Metro Mirror/Global Mirror consistency group
    89. 10.7.12 Stopping Metro Mirror/Global Mirror consistency group
    90. 10.7.13 Deleting Metro Mirror/Global Mirror relationship
    91. 10.7.14 Deleting Metro Mirror/Global Mirror consistency group
    92. 10.7.15 Reversing Metro Mirror/Global Mirror relationship
    93. 10.7.16 Reversing Metro Mirror/Global Mirror consistency group
    94. 10.8 Native IP replication
    95. 10.8.1 Native IP replication technology
    96. 10.8.2 IP partnership limitations
    97. 10.8.3 IP Partnership and data compression
    98. 10.8.4 VLAN support
    99. 10.8.5 IP partnership and terminology
    100. 10.8.6 States of IP partnership
    101. 10.8.7 Remote Copy groups
    102. 10.8.8 Supported configurations
    103. 10.9 Managing Remote Copy by using the GUI
    104. 10.9.1 Creating Fibre Channel partnership
    105. 10.9.2 Creating Remote Copy relationships
    106. 10.9.3 Creating a consistency group
    107. 10.9.4 Renaming Remote Copy relationships
    108. 10.9.5 Renaming a Remote Copy consistency group
    109. 10.9.6 Moving standalone Remote Copy relationships to consistency group
    110. 10.9.7 Removing Remote Copy relationships from consistency group
    111. 10.9.8 Starting Remote Copy relationships
    112. 10.9.9 Starting a Remote Copy consistency group
    113. 10.9.10 Switching a relationship copy direction
    114. 10.9.11 Switching a consistency group direction
    115. 10.9.12 Stopping Remote Copy relationships
    116. 10.9.13 Stopping a consistency group
    117. 10.9.14 Deleting Remote Copy relationships
    118. 10.9.15 Deleting a consistency group
    119. 10.10 Remote Copy memory allocation
    120. 10.11 Troubleshooting Remote Copy
    121. 10.11.1 1920 error
    122. 10.11.2 1720 error
  13. Chapter 11. Ownership groups
    1. 11.1 Ownership groups principles of operations
    2. 11.2 Implementing ownership groups on a new system
    3. 11.2.1 Creating an ownership group
    4. 11.2.2 Assigning users to an ownership group
    5. 11.2.3 Creating ownership group resources
    6. 11.2.4 Listing ownership group resources
    7. 11.2.5 Actions on ownership groups
    8. 11.3 Migrating objects to ownership groups
  14. Chapter 12. Encryption
    1. 12.1 General types of encryption across IBM Spectrum Virtualize
    2. 12.1.1 Externally virtualized storage
    3. 12.1.2 Serial-attached SCSI internal storage
    4. 12.1.3 Non-Volatile Memory Express internal storage
    5. 12.2 Planning for encryption
    6. 12.3 Defining encryption of data at-rest
    7. 12.3.1 Encryption methods
    8. 12.3.2 Encrypted data
    9. 12.3.3 Encryption keys
    10. 12.3.4 Encryption licenses
    11. 12.4 Activating encryption
    12. 12.4.1 Obtaining an encryption license
    13. 12.4.2 Starting the activation process during initial system setup
    14. 12.4.3 Starting the activation process on a running system
    15. 12.4.4 Activating the license automatically
    16. 12.4.5 Manual license activation
    17. 12.5 Enabling encryption
    18. 12.5.1 Starting the Enable Encryption wizard
    19. 12.5.2 Enabling encryption by using USB flash drives
    20. 12.5.3 Enabling encryption by using key servers
    21. 12.5.4 Enabling encryption by using both providers
    22. 12.6 Configuring more providers
    23. 12.6.1 Adding key servers as a second provider
    24. 12.6.2 Adding USB flash drives as a second provider
    25. 12.7 Migrating between providers
    26. 12.7.1 Changing from USB flash drive provider to encryption key server
    27. 12.7.2 Changing from encryption key server to USB flash drive provider
    28. 12.7.3 Migrating between different key server types
    29. 12.8 Recovering from a provider loss
    30. 12.9 Using encryption
    31. 12.9.1 Encrypted pools
    32. 12.9.2 Encrypted child pools
    33. 12.9.3 Encrypted arrays
    34. 12.9.4 Encrypted MDisks
    35. 12.9.5 Encrypted volumes
    36. 12.9.6 Restrictions
    37. 12.10 Rekeying an encryption-enabled system
    38. 12.10.1 Rekeying by using a key server
    39. 12.10.2 Rekeying by using USB flash drives
    40. 12.11 Disabling encryption
  15. Chapter 13. Reliability, availability, and serviceability, and monitoring and troubleshooting
    1. 13.1 Reliability, availability, and serviceability
    2. 13.1.1 IBM SAN Volume Controller nodes
    3. 13.1.2 Power
    4. 13.2 Shutting down an IBM SAN Volume Controller cluster
    5. 13.3 Removing or adding a node to or from the system
    6. 13.4 Configuration backup
    7. 13.4.1 Backing up by using the CLI
    8. 13.4.2 Saving the backup by using the GUI
    9. 13.5 Software update
    10. 13.5.1 Precautions before the update
    11. 13.5.2 IBM Spectrum Virtualize upgrade test utility
    12. 13.5.3 Updating IBM Spectrum Virtualize V8.4
    13. 13.5.4 Updating IBM Spectrum Virtualize with a hot spare node
    14. 13.5.5 Updating the IBM SAN Volume Controller system manually
    15. 13.6 Health checker feature
    16. 13.7 Troubleshooting and fix procedures
    17. 13.7.1 Managing event log
    18. 13.7.2 Running a fix procedure
    19. 13.7.3 Resolving alerts in a timely manner
    20. 13.7.4 Event log details
    21. 13.8 Monitoring
    22. 13.8.1 Call Home function and email notification
    23. 13.8.2 Disabling and enabling notifications
    24. 13.8.3 Remote Support Assistance
    25. 13.8.4 SNMP configuration
    26. 13.8.5 Syslog notifications
    27. 13.9 Audit log
    28. 13.10 Collecting support information by using the GUI, CLI, and USB
    29. 13.10.1 Collecting information by using the GUI
    30. 13.10.2 Collecting logs by using the CLI
    31. 13.10.3 Collecting logs by using USB
    32. 13.10.4 Uploading files to the Support Center
    33. 13.11 Service Assistant Tool
    34. 13.12 IBM Storage Insights Monitoring
    35. 13.12.1 Capacity Monitoring
    36. 13.12.2 Performance monitoring
    37. 13.12.3 Logging Support Tickets by using IBM Storage Insights
    38. 13.12.4 Managing support tickets by using IBM Storage Insights and uploading logs
  16. Appendix A. Performance data and statistics gathering
    1. IBM SAN Volume Controller performance overview
    2. Performance monitoring
  17. Appendix B. Terminology
    1. Commonly used terms
  18. Appendix C. Command-line interface setup
    1. CLI setup
  19. Notices
    1. Trademarks
  20. Back cover
18.118.148.178