Storage Manager 60-NT Introduction Guide

Configuring Storage Arrays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
20 C
ONFIGURING STORAGE ARRAYS
Configuring Storage Arrays
7KLVVHFWLRQGHVFULEHVYDULRXV6WRUDJH$UUD\FRQILJXUDWLRQRSWLRQVWKDWFDQEHXVHGWRPD[LPL]H
GDWDDYDLODELOLW\,WDOVRRXWOLQHVWKHKLJKOHYHOVWHSVWRFRQILJXUHDYDLODEOH6WRUDJH$UUD\FDSDFLW\
LQWRYROXPHV
6WUDWHJLHVIRU'DWD3URWHFWLRQ
7KH'LVN$UUD\)&LVGHVLJQHGWREHUHOLDEOHDQGIHDWXUHVUHGXQGDQWGULYHVFRQWUROOHUVSRZHU
VXSSOLHVDQGIDQV7KLVKDUGZDUHUHGXQGDQF\NHHSVWKH6WRUDJH$UUD\RSHUDWLQJLIDFRPSRQHQW
IDLOV,QDGGLWLRQWKHVWRUDJHPDQDJHPHQWVRIWZDUHIHDWXUHVVHYHUDORSWLRQVWKDW\RXFDQXVHWR
PDLQWDLQGDWDDYDLODELOLW\
7KHIROORZLQJVWUDWHJLHVFDQPD[LPL]HGDWDSURWHFWLRQDQGDYDLODELOLW\
8VHD5$,'OHYHOWKDWSURYLGHVGDWDUHGXQGDQF\
3URWHFWGDWDLQWKHFRQWUROOHUFDFKHPHPRU\
&RQILJXUHKRWVSDUHGULYHV
(QDEOHDEDFNJURXQGPHGLDVFDQ
3URWHFW,2GDWDSDWKV
&RQILJXUH6WRUDJH$UUD\SDVVZRUGSURWHFWLRQ
&RQILJXUHDOHUWGHVWLQDWLRQVIRU6WRUDJH$UUD\FULWLFDOHYHQWQRWLILFDWLRQ
7KHVHVWUDWHJLHVDUHRIYDU\LQJLPSRUWDQFHLQWKHLUFRQWULEXWLRQWRGDWDSURWHFWLRQ7KHLPSRUWDQFH
RIHDFKVWUDWHJ\LVVXPPDUL]HGLQ7DEOH
7DEOH
'DWD3URWHFWLRQ6WUDWHJLHV
Data Protection Strategy
Highly
recommended Recommended Optional
Use RAID level that provides data redundancy
á
Protect data in cache memory
á
Configure hot spare drives
á
Enable background media scan
á
Protect I/O data paths
á
Use available channel protection
á
Configure Storage Array password protection
á
Configure alert destinations
á