
26
Sizing the SAN ISL
The location of the remote site often determines the ISL technologies that meet your distance and
performance requirements. The following factors affect the necessary bandwidth:
Distance—The transmission distance supported by specific link technologies
Recovery point objective—The acceptable difference between local and remote copies of data
Bandwidth capacity and peak loads—The effect of application peak loads on bandwidth
For the later, determining the peak load of each protected applications is a rather complex and lengthy
process in large environments. Standard performance monitoring tools, such as Microsoft Perfmon, VMware
ESXTop or HP EVAPerf, can be used to perform these assessments. The principle is to collect hosts, disk
arrays, and applications performance metrics over a period of time. The collected metrics must then be
consolidated and computed to grasp the average and near peak values for the total applications disk write
throughput and finally derive the adequate bandwidth for the ISLs.
To simplify and automate remote replication link bandwidth sizing, you can use HP StorageWorks
Essentials Data Replication Designer (DRD). DRD is a free GUI-based tool that simplifies collection of
application profile data from customer application servers and automatically calculates the size of the link
required for remote replication to meet business requirements. This tool is available for approved HP
partners. For more information about Data Replication Designer, consult your HP representative or Storage
Architect.
Testing
The testing is aimed at validating the configuration of a disaster tolerant solution, using bidirectional data
replication for a mix of applications and workloads that include the following:
Microsoft Exchange Server 2007 in a Windows Server 2008 environment
Microsoft SQL server 2008 in a Windows server 2008 environment
Microsoft Internet Information Service (IIS)
File server in a Windows server 2003/Windows server 2008 environment
My SQL *Plus Web front end in a Red Hat Linux 5 environment
Site Recovery Manager is configured with four protection groups protecting 13 virtual machines. Replicated
storage was a mix of Raw Mapped LUNs and VMFS datastores.
Protection Group 1
Exchange 2007 (1500 mailboxes)
Three Protected Virtual Machines: Mailbox Server, Client Access, and Hub Transport
Data replication from Site A to Site B
OS files and application binaries
Exchange Storage Groups 1-7
Exchange Storage Groups 8-14
Comentarios a estos manuales