11.4 Managing Storage: A Plan of Attack


Storage professionals need to harness and shape their IT departments with a coordinated plan of attack. The Data Mobility Group , led by John Webster and Perry Harris, has created just such a plan. This section presents their research.

The race to recapture time and storage resources, such as unused capacity, led to the creation of dozens of storage management products. Primarily software-driven, these products range from point solutions for specific tasks such as volume allocation to broader management oversight of large enterprise storage deployments.

For a storage professional looking to deploy a storage management solution, the product landscape can be overwhelming. Organizationally, the scope of functions that fall under the storage management domain can span several individuals. The first steps to achieving management simplicity require a framework to address broader issues of managing storage domain.

What should a storage management group within the larger enterprise IT department look like? What skill sets should be represented within this group? How should the group be structured? What disciplines should be practiced? These are just a few of the questions that need to be answered .

While it would be a gross oversimplification to say that storage was once a simple matter of plugging an array into a SCSI port, compared to the array of alternatives available today, the past was clearly a lot simpler. The days of one-size-fits-all SCSI are long gone.

Storage as an enterprise core competency is becoming exceedingly complex as this brief, but by no means exhaustive, list of technologies involved with the new world of networked storage illustrates:

  • Fibre Channel fabric architectures

  • Ethernet and IP networking

  • Server clustering

  • Data backup and restoration

  • Wide- and metropolitan-area networking protocols

  • Bridging, routing, and switching

  • Host bus adapters and drivers

  • Object modeling

  • Data traffic management

  • Diagnostic and recovery technologies

  • Enterprise management applications

  • Database and file system architectures

  • Security

Given this complexity, it is becoming increasingly common to find storage management groups within enterprise IT departments. Once a decision is made to form such a group, the next challenge is how to break management into manageable pieces and determine which disciplines each group member should represent.

11.4.1 Practice Disciplines

Think of enterprise storage management as a practice composed of a number of definable discipline areas. Each area can be further broken down into specific disciplines or tasks. Both management tasks and software-based management applications can be grouped under each discipline area.

For the purposes of this outline, we consider three discipline areas: managing the storage environment as a business entity, managing data from the standpoint of the storage environment, and using the storage environment to manage and mitigate corporate risk.

There are no hard boundaries between discipline areas. In fact, management practices and products that fall under one area could also overlap with the other two. For example, copy functions that have been placed under the data management heading are also a critical component of business continuance (under risk management) and are becoming critical enablers of content distribution services (under business management). The discipline areas and overlap are shown in Figure 11-5.

Figure 11-5. Practice disciplines for managing the storage domain. (Source: The Data Mobility Group)

graphics/11fig05.jpg

Dividing storage management first into discipline areas provides a method for identifying and assigning specific disciplines to each group member. Depending on the specifics of the organization, it may also be useful to add or further subdivide practice areas.

11.4.2 Business Management

The business management discipline area includes management of the storage domain as a business entity, complete with customer service levels (both internal and external) and a method for tracking usage and applying charge-back. The basic functions of this grouping are outlined in Figure 11-6.

Figure 11-6. Business management practice objectives and implementation examples.

graphics/11fig06.jpg

A quick look back in storage history to storage service providers (SSPs) helps clarify this discipline. In spite of their hyperbolic track records, SSPs were successful in understanding at least one key component of storage ”that storage provisioning is a business. By implementing sophisticated systems to administer and track usage across multiple customers, the SSP model evolved into a storage utility, analogous to an electric or other utility-based service. Today, many IT managers are looking to reproduce such storage utility models within their own enterprises .

In the case of an enterprise-based storage utility, customers are users represented by departments or applications and can be managed the same way that SSPs managed their outsourcing customers ”via service level agreements (SLAs).

Many of the provisions covered in SLAs fall under this discipline area, including on-demand capacity provisioning, quality of service (QoS), continuous availability, and performance monitoring and management. Since the storage utility is run as a business, amortizing the cost across the entire user base provides a lower cost to each user than does operating independent environments. A comprehensive overview of storage service provider models was covered in Chapter 7, "Options for Operational Agility."

The business management practice also includes hardware and software selection. Balancing the double-edged sword of choice, this group must decide between fewer vendors favoring a simplified support model with less price flexibility and a multivendor solution favoring a potentially more complex support model but with greater price flexibility. Since the business management practice understands the ultimate needs of the customers (departments, specific applications, service levels), this group should lead product selection. However, for practical implementation reasons, all discipline areas should be involved in choosing new products.

11.4.3 Risk Management

Risk management includes the use of the storage domain to mitigate corporate risk through the use of well-established backup and recovery procedures, business continuance, disaster recovery, and most recently, security functions. The storage domain is also a good place to focus attention when implementing compliance with regulatory requirements. Examples in the United States include the Securities and Exchange Commission (SEC) for public companies and the Health Insurance Privacy and Accountability Act (HIPAA) for health-care organizations.

A tightly integrated combination of storage hardware, software, and networking services can be used to secure and protect data from unforeseen catastrophic events, human error, or malicious intent. Consequently, storage platforms can now be thought of as places to manage and mitigate enterprise risk. With the increasing dependence on corporate data, concentrating risk management into a discipline area ensures proper oversight and organizational management of this function. The primary areas of risk management are outlined in Figure 11-7.

Figure 11-7. Risk management practice objectives and implementation examples. (Source: The Data Mobility Group)

graphics/11fig07.jpg

Four major IT disciplines relating to risk management can be applied to the storage environment:

Disaster recovery and business continuity . Storage can be used to replicate data inside and outside the data center, effectively mitigating the risk of data loss from a variety of systems outage . Good business continuance and disaster recovery plans use technologies like mirroring and remote copy to protect data against these types of outages. As such, this discipline is codependent with the data management discipline area.

Backup and restore . Backup and restoration technologies mitigate enterprise risk by enabling users to restore backed -up data to its last uncorrupted state. Simply copying data to secondary storage devices, however, does not ensure complete data protection, since copy functions can propagate corrupted data along with good data. Close, knowledgeable, managerial attention must be brought to bear when restoring corrupted data to ensure that data has been recovered successfully.

Security . There is a growing realization that masking and zoning techniques do not go far enough in protecting networked storage-based data. Networked storage security will become more robust over time, but an understanding of storage-based security techniques is essential even now.

Regulatory compliance . Every major industry segment has some set of regulatory requirements ”be they imposed by governmental agencies such as the SEC or industry-specific organizations such as JHACO ”that require ongoing compliance. Failure to comply with these requirements can often expose the enterprise to significant risk. Compliance often involves the long- term storage (seven years or more) of digitized records and images, and presents IT managers with significant challenges relating to extreme scalability of the supporting storage infrastructure and migration of data through time and across media, application, and operating system changes.

11.4.4 Data Management

The data management practice includes the effective presentation of data contained within the storage domain through storage-based file systems and copy functions. It also includes effective storage infrastructure design for maximum performance. The primary objective and implementation examples are shown in Figure 11-8.

Figure 11-8. Data management practice objectives and implementation examples. (Source: The Data Mobility Group)

graphics/11fig08.jpg

This discipline area serves as a foundation for business management and risk management with basic functions acting as building blocks for other areas. Data management will become more important over time as more file management capabilities move into the storage domain. Storage-based file management systems can protect shared data ”accessed by multiple applications, servers, or users ”from loss or corruption while maintaining a high degree of data availability for all authorized applications or users.

Copy functions fall into the data management practice. These functions are essential to the storage domain's risk management capabilities for functions such as backup and replication. Copy functions also enable new Web- facing applications by presenting data in multiple forms for specific use. Additionally, copy functions can enhance performance by distributing content to multiple locations, simplifying access across geographic areas.

A subset of policy-based automation also falls under the data management practice. As mentioned earlier in this chapter, few, if any, industries are immune to regulatory oversight, and many require long-term retention of digitized records. The automation of corporate policies covering records retention can be programmed such that user productivity is enhanced and storage management is greatly simplified. An example would be an email management application that sorts through an email user's in-box and offloads certain documents to a centralized records retention facility, relieving users of this burden and freeing up disk space on email servers.

11.4.5 Shaping Storage Domain Management

The storage management plan outlined through the business, risk, and data management practices can be implemented within an existing enterprise IT department with minimal disruption. This plan can also be used to structure the operational and organizational management of a new team formed to absorb the larger responsibilities of a growing IT storage domain.

IT skills related to backup and recovery, performance, security, and networking have existed for years in the data center. Implementing this organizational plan gives these traditional skills a networked storage focus. It further leaves room to incorporate additional skills to align an enterprise storage management group with present and future business needs.

Implementation of the plan mandates attention to specific management policies for the storage domain. The following section presents a sampling of such policies. It is by no means an all-inclusive list, but rather intended to assist in the creation of company- and department-specific storage domain management.



IP Storage Networking Straight to the Core
IP Storage Networking: Straight to the Core
ISBN: 0321159608
EAN: 2147483647
Year: 2003
Pages: 108

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net