Implementing the IBM System Storage SAN Volume Controller with IBM Spectrum Virtualize V8.2.1

Book description

This IBM® Redbooks® publication is a detailed technical guide to the IBM System Storage® SAN Volume Controller (SVC), which is powered by IBM Spectrum™ Virtualize V8.2.1.

IBM SAN Volume Controller is a virtualization appliance solution that maps virtualized volumes that are visible to hosts and applications to physical volumes on storage devices. Each server within the storage area network (SAN) has its own set of virtual storage addresses that are mapped to physical addresses. If the physical addresses change, the server continues running by using the same virtual addresses that it had before. Therefore, volumes or storage can be added or moved while the server is still running.

The IBM virtualization technology improves the management of information at the block level in a network, which enables applications and servers to share storage devices on a network.

Table of contents

  1. Front cover
  2. Notices
    1. Trademarks
  3. Preface
    1. Authors
    2. Now you can become a published author, too
    3. Comments welcome
    4. Stay connected to IBM Redbooks
  4. Summary of changes
    1. June 2019, Eighth Edition
  5. Chapter 1. Introduction to storage virtualization
    1. 1.1 Storage virtualization terminology
    2. 1.2 Benefits of using IBM Spectrum Virtualize
    3. 1.3 Latest changes and enhancements
    4. 1.4 Summary
  6. Chapter 2. System overview
    1. 2.1 Brief history of IBM SAN Volume Controller
      1. 2.1.1 IBM SAN Volume Controller architectural overview
      2. 2.1.2 IBM Spectrum Virtualize
      3. 2.1.3 IBM SAN Volume Controller topology
      4. 2.1.4 IBM SAN Volume Controller models
    2. 2.2 IBM SAN Volume Controller components
      1. 2.2.1 Nodes
      2. 2.2.2 I/O Groups
      3. 2.2.3 System
      4. 2.2.4 Dense expansion drawers
      5. 2.2.5 Flash drives
      6. 2.2.6 MDisks
      7. 2.2.7 Cache
      8. 2.2.8 Quorum disk
      9. 2.2.9 Disk tier
      10. 2.2.10 Storage pool
      11. 2.2.11 Volumes
      12. 2.2.12 IBM Easy Tier
      13. 2.2.13 Hosts
      14. 2.2.14 Host cluster
      15. 2.2.15 RAID
      16. 2.2.16 Encryption
      17. 2.2.17 iSCSI
      18. 2.2.18 IBM Real-time Compression
      19. 2.2.19 Data Reduction Pools
      20. 2.2.20 Deduplication
      21. 2.2.21 IP replication
      22. 2.2.22 IBM Spectrum Virtualize copy services
      23. 2.2.23 Synchronous or asynchronous remote copy
      24. 2.2.24 FlashCopy and Transparent Cloud Tiering
    3. 2.3 Business continuity
      1. 2.3.1 Business continuity with Stretched Cluster
      2. 2.3.2 Business continuity with Enhanced Stretched Cluster
      3. 2.3.3 Business Continuity with HyperSwap
      4. 2.3.4 Automatic Hot Spare nodes
    4. 2.4 Management and support tools
      1. 2.4.1 IBM Assist On-site and Remote Support Assistance
      2. 2.4.2 Event notifications
    5. 2.5 Useful IBM SAN Volume Controller web links
  7. Chapter 3. Planning
    1. 3.1 General planning rules
      1. 3.1.1 Basic planning flow
    2. 3.2 Planning for availability
    3. 3.3 Connectivity planning
    4. 3.4 Physical planning
      1. 3.4.1 Planning for power outages
      2. 3.4.2 Cabling
    5. 3.5 Planning IP connectivity
      1. 3.5.1 Firewall planning
    6. 3.6 SAN configuration planning
      1. 3.6.1 Physical topology
      2. 3.6.2 Zoning
      3. 3.6.3 SVC cluster system zone
      4. 3.6.4 Back-end storage zones
      5. 3.6.5 Host zones
      6. 3.6.6 Zoning considerations for Metro Mirror and Global Mirror
      7. 3.6.7 Port designation recommendations
      8. 3.6.8 Port masking
    7. 3.7 iSCSI configuration planning
      1. 3.7.1 iSCSI protocol
      2. 3.7.2 Topology and IP addressing
      3. 3.7.3 General preferences
      4. 3.7.4 iSCSI Extensions for RDMA (iSER)
      5. 3.7.5 iSCSI back-end storage attachment
    8. 3.8 Back-end storage subsystem configuration
    9. 3.9 Storage pool configuration
      1. 3.9.1 The storage pool and SAN Volume Controller cache relationship
      2. 3.9.2 Planning Data Reduction Pool and Deduplication
    10. 3.10 Volume configuration
      1. 3.10.1 Planning for image mode volumes
      2. 3.10.2 Planning for thin-provisioned volumes
    11. 3.11 Host attachment planning
      1. 3.11.1 Queue depth
      2. 3.11.2 Offloaded data transfer
    12. 3.12 Host mapping and LUN masking
      1. 3.12.1 Planning for large deployments
    13. 3.13 NPIV planning
    14. 3.14 Advanced Copy Services
      1. 3.14.1 FlashCopy guidelines
      2. 3.14.2 Combining FlashCopy and Metro Mirror or Global Mirror
      3. 3.14.3 Planning for Metro Mirror and Global Mirror
    15. 3.15 SAN boot support
    16. 3.16 Data migration from a non-virtualized storage subsystem
    17. 3.17 SAN Volume Controller configuration backup procedure
    18. 3.18 IBM Spectrum Virtualize Port Configurator
    19. 3.19 Performance considerations
      1. 3.19.1 SAN
      2. 3.19.2 Back-end storage subsystems
      3. 3.19.3 SAN Volume Controller
      4. 3.19.4 IBM Real-time Compression
      5. 3.19.5 Performance monitoring
    20. 3.20 IBM Storage Insights
      1. 3.20.1 Architecture, security, and data collection
      2. 3.20.2 Customer dashboard and resources
  8. Chapter 4. Initial configuration
    1. 4.1 Prerequisites
    2. 4.2 System initialization
      1. 4.2.1 System initialization wizard
    3. 4.3 System setup
      1. 4.3.1 System setup wizard
      2. 4.3.2 Adding nodes
      3. 4.3.3 Adding spare nodes
      4. 4.3.4 Adding expansion enclosures
    4. 4.4 Configuring user authentication
      1. 4.4.1 Default superuser account
      2. 4.4.2 Local authentication
      3. 4.4.3 Remote authentication
      4. 4.4.4 User groups and roles
    5. 4.5 Configuring secure communications
      1. 4.5.1 Configuring a signed certificate
      2. 4.5.2 Generating a self-signed certificate
    6. 4.6 Configuring local Fibre Channel port masking
      1. 4.6.1 Planning for local port masking
      2. 4.6.2 Setting the local port mask
      3. 4.6.3 Viewing the local port mask
    7. 4.7 Other administrative procedures
      1. 4.7.1 Removing a node from a clustered system
      2. 4.7.2 Shutting down the system
      3. 4.7.3 Changing the system topology to HyperSwap
      4. 4.7.4 Changing system topology to a stretched topology
  9. Chapter 5. Graphical user interface
    1. 5.1 Normal operations using GUI
      1. 5.1.1 Access to GUI
    2. 5.2 Introduction to the GUI
      1. 5.2.1 Task menu
      2. 5.2.2 Suggested tasks
      3. 5.2.3 Notification icons and help
    3. 5.3 System View Window
      1. 5.3.1 Content-based organization
    4. 5.4 Monitoring menu
      1. 5.4.1 System overview
      2. 5.4.2 Events
      3. 5.4.3 Performance
      4. 5.4.4 Background tasks
    5. 5.5 Pools
    6. 5.6 Volumes
    7. 5.7 Hosts
    8. 5.8 Copy Services
    9. 5.9 Access
      1. 5.9.1 Users
      2. 5.9.2 Audit log
    10. 5.10 Settings
      1. 5.10.1 Notifications menu
      2. 5.10.2 Network
      3. 5.10.3 Security menu
      4. 5.10.4 System menus
      5. 5.10.5 Support menu
      6. 5.10.6 GUI preferences
    11. 5.11 Additional frequent tasks in GUI
      1. 5.11.1 Renaming components
      2. 5.11.2 Changing system topology
      3. 5.11.3 Restarting the GUI Service
  10. Chapter 6. Storage pools
    1. 6.1 Working with storage pools
      1. 6.1.1 Creating storage pools
      2. 6.1.2 Managed disks in a storage pool
      3. 6.1.3 Actions on storage pools
      4. 6.1.4 Child storage pools
      5. 6.1.5 Encrypted storage pools
    2. 6.2 Working with external controllers and MDisks
      1. 6.2.1 External storage controllers
      2. 6.2.2 Actions on external storage controllers
      3. 6.2.3 Working with external MDisks
      4. 6.2.4 Actions on external MDisks
    3. 6.3 Working with internal drives and arrays
      1. 6.3.1 Working with drives
      2. 6.3.2 RAID and DRAID
      3. 6.3.3 Creating arrays
      4. 6.3.4 Actions on arrays
  11. Chapter 7. Volumes
    1. 7.1 An introduction to volumes
      1. 7.1.1 Operations on volumes
      2. 7.1.2 Volume characteristics
      3. 7.1.3 I/O operations data flow
      4. 7.1.4 Managed mode and image-mode volumes
      5. 7.1.5 Striped and sequential volumes
      6. 7.1.6 Mirrored volumes
      7. 7.1.7 Volume cache mode
      8. 7.1.8 Fully allocated and thin-provisioned volumes
      9. 7.1.9 Compressed volumes
      10. 7.1.10 Deduplicated volumes
      11. 7.1.11 Capacity reclamation
      12. 7.1.12 Virtual Volumes
      13. 7.1.13 Volumes in multi-site topologies
    2. 7.2 Creating volumes
      1. 7.2.1 Creating basic volumes
      2. 7.2.2 Creating mirrored volumes
      3. 7.2.3 Capacity savings option
    3. 7.3 Creating custom volumes
      1. 7.3.1 Volume Location pane
      2. 7.3.2 Volume Details pane
      3. 7.3.3 General Pane
    4. 7.4 Stretched volumes
    5. 7.5 HyperSwap volumes
    6. 7.6 I/O throttling
      1. 7.6.1 Defining a volume throttle
      2. 7.6.2 Listing volume throttles
      3. 7.6.3 Modifying or removing a volume throttle
    7. 7.7 Mapping a volume to a host
    8. 7.8 Migrating a volume to another storage pool
      1. 7.8.1 Volume migration using the migration feature
      2. 7.8.2 Volume migration by adding a volume copy
    9. 7.9 Volume operations in the CLI
      1. 7.9.1 Displaying volume information
      2. 7.9.2 Creating a volume
      3. 7.9.3 Creating a thin-provisioned volume
      4. 7.9.4 Creating a volume in image mode
      5. 7.9.5 Adding a volume copy
      6. 7.9.6 Splitting a mirrored volume
      7. 7.9.7 Modifying a volume
      8. 7.9.8 Deleting a volume
      9. 7.9.9 Volume delete protection
      10. 7.9.10 Expanding a volume
      11. 7.9.11 HyperSwap volume modification with CLI
      12. 7.9.12 Mapping a volume to a host
      13. 7.9.13 Listing volumes mapped to the host
      14. 7.9.14 Listing hosts mapped to the volume
      15. 7.9.15 Deleting a volume to host mapping
      16. 7.9.16 Migrating a volume
      17. 7.9.17 Migrating a fully managed volume to an image-mode volume
      18. 7.9.18 Shrinking a volume
      19. 7.9.19 Listing volumes that are using a specific MDisk
      20. 7.9.20 Listing MDisks that are used by a specific volume
      21. 7.9.21 Listing volumes defined in the storage pool
      22. 7.9.22 Listing storage pools in which a volume has its extents
      23. 7.9.23 Tracing a volume from a host back to its physical disks
  12. Chapter 8. Hosts
    1. 8.1 Host attachment overview
    2. 8.2 Host clusters
    3. 8.3 N-Port Virtualization ID support
      1. 8.3.1 NPIV prerequisites
      2. 8.3.2 Enabling NPIV on a new system
      3. 8.3.3 Enabling NPIV on an existing system
    4. 8.4 Hosts operations by using the GUI
      1. 8.4.1 Creating hosts
      2. 8.4.2 Host clusters
      3. 8.4.3 Advanced host administration
      4. 8.4.4 Adding and deleting host ports
      5. 8.4.5 Host mappings overview
    5. 8.5 Performing hosts operations by using the command-line interface
      1. 8.5.1 Creating a host by using the CLI
      2. 8.5.2 Performing advanced host administration by using the CLI
      3. 8.5.3 Adding and deleting a host port by using the CLI
      4. 8.5.4 Host cluster operations
  13. Chapter 9. Storage migration
    1. 9.1 Storage migration overview
      1. 9.1.1 Interoperability and compatibility
      2. 9.1.2 Prerequisites
    2. 9.2 Storage migration wizard
  14. Chapter 10. Advanced features for storage efficiency
    1. 10.1 Easy Tier
      1. 10.1.1 EasyTier concepts
      2. 10.1.2 Implementing and tuning Easy Tier
      3. 10.1.3 Monitoring Easy Tier activity
    2. 10.2 Thin-provisioned volumes
      1. 10.2.1 Concepts
      2. 10.2.2 Implementation
    3. 10.3 Unmap
      1. 10.3.1 SCSI unmap command
      2. 10.3.2 Back-end SCSI Unmap
      3. 10.3.3 Host SCSI Unmap
      4. 10.3.4 Offload IO throttle
    4. 10.4 DRPs
      1. 10.4.1 Introduction to DRP
      2. 10.4.2 DRP benefits
      3. 10.4.3 Implementing DRP with Compression and Deduplication
    5. 10.5 Compression with standard pools
      1. 10.5.1 Real-time Compression concepts
      2. 10.5.2 Implementing RtC
    6. 10.6 Saving estimation for compression and deduplication
      1. 10.6.1 Evaluate compression savings by using IBM Comprestimator
      2. 10.6.2 Evaluating compression and deduplication
    7. 10.7 Data deduplication and compression on external storage
  15. Chapter 11. Advanced Copy Services
    1. 11.1 IBM FlashCopy
      1. 11.1.1 Business requirements for FlashCopy
      2. 11.1.2 FlashCopy principles and terminology
      3. 11.1.3 FlashCopy mapping
      4. 11.1.4 Consistency Groups
      5. 11.1.5 Crash consistent copy and hosts considerations
      6. 11.1.6 Grains and bitmap: I/O indirection
      7. 11.1.7 Interaction with cache
      8. 11.1.8 Background Copy Rate
      9. 11.1.9 Incremental FlashCopy
      10. 11.1.10 Starting FlashCopy mappings and Consistency Groups
      11. 11.1.11 Multiple target FlashCopy
      12. 11.1.12 Reverse FlashCopy
      13. 11.1.13 FlashCopy and image mode Volumes
      14. 11.1.14 FlashCopy mapping events
      15. 11.1.15 Thin-provisioned FlashCopy
      16. 11.1.16 Serialization of I/O by FlashCopy
      17. 11.1.17 Event handling
      18. 11.1.18 Asynchronous notifications
      19. 11.1.19 Interoperation with Metro Mirror and Global Mirror
      20. 11.1.20 FlashCopy attributes and limitations
    2. 11.2 Managing FlashCopy by using the GUI
      1. 11.2.1 FlashCopy presets
      2. 11.2.2 FlashCopy window
      3. 11.2.3 Creating a FlashCopy mapping
      4. 11.2.4 Single-click snapshot
      5. 11.2.5 Single-click clone
      6. 11.2.6 Single-click backup
      7. 11.2.7 Creating a FlashCopy Consistency Group
      8. 11.2.8 Creating FlashCopy mappings in a Consistency Group
      9. 11.2.9 Showing related Volumes
      10. 11.2.10 Moving FlashCopy mappings across Consistency Groups
      11. 11.2.11 Removing FlashCopy mappings from Consistency Groups
      12. 11.2.12 Modifying a FlashCopy mapping
      13. 11.2.13 Renaming FlashCopy mappings
      14. 11.2.14 Deleting FlashCopy mappings
      15. 11.2.15 Deleting a FlashCopy Consistency Group
      16. 11.2.16 Starting FlashCopy mappings
      17. 11.2.17 Stopping FlashCopy mappings
      18. 11.2.18 Memory allocation for FlashCopy
    3. 11.3 Transparent Cloud Tiering
      1. 11.3.1 Considerations for using Transparent Cloud Tiering
      2. 11.3.2 Transparent Cloud Tiering as backup solution and data migration
      3. 11.3.3 Restore by using Transparent Cloud Tiering
      4. 11.3.4 Transparent Cloud Tiering restrictions
    4. 11.4 Implementing Transparent Cloud Tiering
      1. 11.4.1 DNS Configuration
      2. 11.4.2 Enabling Transparent Cloud Tiering
      3. 11.4.3 Creating cloud snapshots
      4. 11.4.4 Managing cloud snapshots
      5. 11.4.5 Restoring cloud snapshots
    5. 11.5 Volume mirroring and migration options
    6. 11.6 Remote Copy
      1. 11.6.1 IBM SAN Volume Controller and Storwize system layers
      2. 11.6.2 Multiple IBM Spectrum Virtualize systems replication
      3. 11.6.3 Importance of write ordering
      4. 11.6.4 Remote copy intercluster communication
      5. 11.6.5 Metro Mirror overview
      6. 11.6.6 Synchronous remote copy
      7. 11.6.7 Metro Mirror features
      8. 11.6.8 Metro Mirror attributes
      9. 11.6.9 Practical use of Metro Mirror
      10. 11.6.10 Global Mirror overview
      11. 11.6.11 Asynchronous remote copy
      12. 11.6.12 Global Mirror features
      13. 11.6.13 Using Change Volumes with Global Mirror
      14. 11.6.14 Distribution of work among nodes
      15. 11.6.15 Background copy performance
      16. 11.6.16 Thin-provisioned background copy
      17. 11.6.17 Methods of synchronization
      18. 11.6.18 Practical use of Global Mirror
      19. 11.6.19 IBM Spectrum Virtualize HyperSwap topology
      20. 11.6.20 Consistency Protection for Global Mirror and Metro Mirror
      21. 11.6.21 Valid combinations of FlashCopy, Metro Mirror, and Global Mirror
      22. 11.6.22 Remote Copy configuration limits
      23. 11.6.23 Remote Copy states and events
    7. 11.7 Remote Copy commands
      1. 11.7.1 Remote Copy process
      2. 11.7.2 Listing available system partners
      3. 11.7.3 Changing the system parameters
      4. 11.7.4 System partnership
      5. 11.7.5 Creating a Metro Mirror/Global Mirror consistency group
      6. 11.7.6 Creating a Metro Mirror/Global Mirror relationship
      7. 11.7.7 Changing Metro Mirror/Global Mirror relationship
      8. 11.7.8 Changing Metro Mirror/Global Mirror consistency group
      9. 11.7.9 Starting Metro Mirror/Global Mirror relationship
      10. 11.7.10 Stopping Metro Mirror/Global Mirror relationship
      11. 11.7.11 Starting Metro Mirror/Global Mirror consistency group
      12. 11.7.12 Stopping Metro Mirror/Global Mirror consistency group
      13. 11.7.13 Deleting Metro Mirror/Global Mirror relationship
      14. 11.7.14 Deleting Metro Mirror/Global Mirror consistency group
      15. 11.7.15 Reversing Metro Mirror/Global Mirror relationship
      16. 11.7.16 Reversing Metro Mirror/Global Mirror consistency group
    8. 11.8 Native IP replication
      1. 11.8.1 Native IP replication technology
      2. 11.8.2 IP partnership limitations
      3. 11.8.3 IP Partnership and data compression
      4. 11.8.4 VLAN support
      5. 11.8.5 IP partnership and terminology
      6. 11.8.6 States of IP partnership
      7. 11.8.7 Remote copy groups
      8. 11.8.8 Supported configurations
    9. 11.9 Managing Remote Copy by using the GUI
      1. 11.9.1 Creating Fibre Channel partnership
      2. 11.9.2 Creating remote copy relationships
      3. 11.9.3 Creating Consistency Group
      4. 11.9.4 Renaming remote copy relationships
      5. 11.9.5 Renaming a remote copy consistency group
      6. 11.9.6 Moving stand-alone remote copy relationships to Consistency Group
      7. 11.9.7 Removing remote copy relationships from Consistency Group
      8. 11.9.8 Starting remote copy relationships
      9. 11.9.9 Starting a remote copy Consistency Group
      10. 11.9.10 Switching a relationship copy direction
      11. 11.9.11 Switching a Consistency Group direction
      12. 11.9.12 Stopping remote copy relationships
      13. 11.9.13 Stopping a Consistency Group
      14. 11.9.14 Deleting remote copy relationships
      15. 11.9.15 Deleting a Consistency Group
    10. 11.10 Remote Copy memory allocation
    11. 11.11 Troubleshooting Remote Copy
      1. 11.11.1 1920 error
      2. 11.11.2 1720 error
  16. Chapter 12. Encryption
    1. 12.1 Planning for encryption
    2. 12.2 Defining encryption of data-at-rest
      1. 12.2.1 Encryption methods
      2. 12.2.2 Encrypted data
      3. 12.2.3 Encryption keys
      4. 12.2.4 Encryption licenses
    3. 12.3 Activating encryption
      1. 12.3.1 Obtaining an encryption license
      2. 12.3.2 Starting the activation process during the initial system setup
      3. 12.3.3 Starting the activation process on a running system
      4. 12.3.4 Activating the license automatically
      5. 12.3.5 Activating the license manually
    4. 12.4 Enabling encryption
      1. 12.4.1 Starting the Enable Encryption wizard
      2. 12.4.2 Enabling encryption by using USB flash drives
      3. 12.4.3 Enabling encryption by using key servers
      4. 12.4.4 Enabling encryption by using both providers
    5. 12.5 Configuring more providers
      1. 12.5.1 Adding key servers as a second provider
      2. 12.5.2 Adding USB flash drives as a second provider
    6. 12.6 Migrating between providers
      1. 12.6.1 Migrating from a USB flash drive provider to an encryption key server
      2. 12.6.2 Migrating from an encryption key server to a USB flash drive provider
      3. 12.6.3 Migrating between different key server types
    7. 12.7 Recovering from a provider loss
    8. 12.8 Using encryption
      1. 12.8.1 Encrypted pools
      2. 12.8.2 Encrypted child pools
      3. 12.8.3 Encrypted arrays
      4. 12.8.4 Encrypted MDisks
      5. 12.8.5 Encrypted volumes
      6. 12.8.6 Restrictions
    9. 12.9 Rekeying an encryption-enabled system
      1. 12.9.1 Rekeying by using a key server
      2. 12.9.2 Rekeying by using USB flash drives
    10. 12.10 Disabling encryption
  17. Chapter 13. Reliability, availability, and serviceability, and monitoring and troubleshooting
    1. 13.1 Reliability, availability, and serviceability
      1. 13.1.1 IBM SAN Volume Controller nodes
      2. 13.1.2 Dense Drawer Enclosures LED
      3. 13.1.3 Power
    2. 13.2 Shutting down a SAN Volume Controller cluster
    3. 13.3 Configuration backup
      1. 13.3.1 Backing up by using the CLI
      2. 13.3.2 Saving the backup by using the GUI
    4. 13.4 Software update
      1. 13.4.1 Precautions before the update
      2. 13.4.2 IBM Spectrum Virtualize upgrade test utility
      3. 13.4.3 Updating IBM Spectrum Virtualize V8.2.1
      4. 13.4.4 Updating IBM Spectrum Virtualize with a hot spare node
      5. 13.4.5 Updating the IBM SAN Volume Controller system manually
    5. 13.5 Health checker feature
    6. 13.6 Troubleshooting and fix procedures
      1. 13.6.1 Managing event log
      2. 13.6.2 Running a fix procedure
      3. 13.6.3 Resolving alerts in a timely manner
      4. 13.6.4 Event log details
    7. 13.7 Monitoring
      1. 13.7.1 The Call Home function and email notification
      2. 13.7.2 Disabling and enabling notifications
      3. 13.7.3 Remote Support Assistance
      4. 13.7.4 SNMP configuration
      5. 13.7.5 Syslog notifications
    8. 13.8 Audit log
    9. 13.9 Collecting support information by using the GUI and the CLI
      1. 13.9.1 Collecting information by using the GUI
      2. 13.9.2 Collecting logs by using the CLI
      3. 13.9.3 Uploading files to the Support Center
    10. 13.10 Service Assistant Tool
  18. Appendix A. Performance data and statistics gathering
    1. SAN Volume Controller performance overview
    2. Performance monitoring
  19. Appendix B. CLI setup
    1. CLI setup
  20. Appendix C. Terminology
    1. Commonly encountered terms
  21. Related publications
    1. IBM Redbooks
    2. Other resources
    3. Referenced websites
    4. Help from IBM
  22. Back cover

Product information

  • Title: Implementing the IBM System Storage SAN Volume Controller with IBM Spectrum Virtualize V8.2.1
  • Author(s): Jon Tate, Jack Armstrong, Tiago Bastos, Pawel Brodacki, Frank Enders, Sergey Kubin, Danilo Miyasiro, Rodrigo Suzuki
  • Release date: July 2019
  • Publisher(s): IBM Redbooks
  • ISBN: 9780738457758