Lesson 1 Part 1 - Storage

Video Activity

Lesson 1, part 1. Storage This lesson discusses storage concepts, including storage protocols: Fiber channel Fiber Channel over Ethernet (FCoE) ISCSI NFS Direct Attached Storage (DAS) All of these options have good capabilities and require shared storage. Each host can attach to multiple storage types at one time so they are very flexible.

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
14 hours 13 minutes
Difficulty
Intermediate
Video Description

Lesson 1, part 1. Storage This lesson discusses storage concepts, including storage protocols:

  • Fiber channel

  • Fiber Channel over Ethernet (FCoE)

  • ISCSI

  • NFS

  • Direct Attached Storage (DAS)

All of these options have good capabilities and require shared storage. Each host can attach to multiple storage types at one time so they are very flexible.

Video Transcription
00:04
Hello, I'm Gene Pompey. Leo. Welcome to Cyber Eri.
00:08
We're now in module six. It will be covering lesson one. We talk about all of our different storage concepts. We'll start with describing our storage technology and how data stores work.
00:19
We'll move on to
00:20
describing our storage devices
00:23
and the different naming conventions
00:26
and following up with storage maps.
00:30
So first of all, if we think about our different storage protocols, have a lot of choices. Here
00:36
we have five or channels I mentioned previously runs over fiber. The ability to do multi path connections is supported.
00:45
We also have fibre channel or Ethernet,
00:48
so we can use fibre channel commands
00:51
for your stores device. But you're actually going over your either at network instead of fiber,
00:57
so this gives you a lot of advantages or reduced cost.
01:02
Since you're using the existing Ethernet network infrastructure
01:07
and depending on how your network has built,
01:08
you have some multi path options built in because you have redundancy within your network infrastructure.
01:17
Our other option is I scuzzy,
01:19
which again
01:21
is using the Ethernet network. But this time we're sending scuzzy commands
01:25
that would normally go straight to the drive. Now we're going over the network and stuff.
01:29
Then we have NFS
01:30
and finally desk or direct attach storage.
01:36
So if we can see from our different capabilities here
01:38
ah fibre Channel fibre channel over Ethernet and I suppose you could all boot from the sand device. That is a really handy,
01:47
um,
01:49
feature tohave because now you're
01:52
you're reducing the amount of reliance on local disc for booting,
01:56
and you can keep one master boot image on your sand device, which all of your hosts can utilize
02:04
for of emotion support. All these technologies will support the motion,
02:08
which means I'm moving
02:10
a virtual machine from one host to another. As far as where is registered where you can access it.
02:16
We have a chay support, which is high availability. That's something we'll see later in the class.
02:22
Hi Vale Building lets me designate a
02:27
fail over host when I've got a cluster, for instance,
02:31
so one of'em can if it's burning on host one. If that host goes down and automatically gets moved to host number two
02:38
as long as it's properly configured for that,
02:40
then we have DRS, which is distributed resource scheduler,
02:46
and this is a low bouncing
02:49
mechanism, tech or technology that works at the BM level.
02:53
So if I've got a cluster,
02:54
GRS can allow me to
02:58
load balance. The PM's running on each note in that cluster so that the average load remains even or as even as possible.
03:05
And then we have raw device mapping.
03:07
And this is a way, as I mentioned earlier, to interface directly with a London that's on a sand without having to go through a virtual ization layer
03:17
of the V. M. F s file system.
03:22
So you can see from this matrix
03:23
we have some good capabilities
03:25
NFS and direct attacks stores do not
03:29
support booted from san. That makes sense.
03:32
And then we can't do high availability for direct attached storage or DRS.
03:38
We do have to have shared storage for all of the distributed service is that we see here.
03:45
Okay, so, looking at our
03:46
overview of storage, we have r V EMS
03:51
going through the virtual ization layer, or V Colonel
03:53
on the host.
03:55
Each host can connect to multiple different storage types at the same time,
04:00
I could be connected to direct attach disc, which is inside the host itself,
04:04
or some partitions could be connected through fibre channel fibre channel over Ethernet or ice cosy. And I can still support connections to NFS all simultaneously.
04:15
And this is, Ah, very flexible way to do things because, for instance, your direct attach disc is probably going to give you the best performance. Overall,
04:23
the host is connected to advise just the cable. It's all internal. You're not going over the network, so you don't have any latent see issues that you might experience with some of the network based options.
04:34
But direct attached disc is limited. As we saw here, I can't do. My distributed service is like the motion and DRS.
04:43
So this is best suited for things like I so images or templates
04:47
or other files that you need
04:49
for bulk storage requirements. But you're not going to put your VM is there for the most part
04:57
if you want to take advantage of it. Distributed service is,
05:00
however, the Fibre Channel fibre channel. Everything that ice cosy in as could be used for any of those purposes I SOS
05:05
BM files and templates
05:09
and with support for distributed service is that gives you a lot of flexibility
05:14
for how to configure your hosts storage requirements.
05:16
You just have to really understand
05:18
what what the organization is trying to do with their applications and what kind of fail over tech technology you need to employ.
05:28
That being said a little bit here on
05:30
when you get a
05:32
ah ice cosy Lund or a fibre channel Lund allocated to you your storage administrator?
05:40
Well, generally you asked them. I said I had two gigabyte lung
05:44
and they will provide that to you. And then you can re scan your adaptors to see if the store's shows up.
05:51
But before you do that, you might want to consider some of these different factors. How big of a lunch size can you request?
05:59
What kind of band with will it support from an i o perspective.
06:02
How many ill requests per second will the device support
06:08
what kind of dis cashing is available?
06:10
This cash could very widely in size,
06:13
and therefore you get different kinds of performance characteristics, depending on what kind of this cashing is available in your environment.
06:21
Zoning and masking is a reference to some of the ways that
06:27
ones could be presented or hidden from different hosts
06:30
that way, you can prevent
06:31
host that you don't want to attach to storage from doing so by masking them
06:36
and then you create zones. Tiu allow those hosts. Which do you want
06:43
to attach to storage, to be able to see the story when they scan their adapters.
06:47
When you got identical Lund's being presented to a host. You need to understand how that works in a shared storage context,
06:56
and then whether or not the storage is or the act of love itself is active or passively connected.
07:01
That's a conversation you have with your storage administrator when the time comes.
Up Next