Lesson 1 Part 2 - Data stores (continued)

Video Activity

Lesson 1, part 2. Data stores (continued) This lesson continues teaching about data stores. Data stores can have different types of file systems: - VMFS-3 - VMFS-5 - NFS These options all have different features and support different things, so professionals choose which one they want to use relative to their system's requirements and/or limitation...

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
14 hours 13 minutes
Difficulty
Intermediate
Video Description

Lesson 1, part 2. Data stores (continued) This lesson continues teaching about data stores. Data stores can have different types of file systems: - VMFS-3 - VMFS-5 - NFS These options all have different features and support different things, so professionals choose which one they want to use relative to their system's requirements and/or limitations. This lesson also discusses naming conventions for storage devices; there are different naming conventions for different storage devices. For example, if it is an iSCSI ID, it will have a unique HEX ID such as 0123ABC789F.

Video Transcription
00:04
all right. So moving on to our data stores, we see that we've got our various be ems connected to various hosts
00:12
or registered to those host. That's probably a more accurate way to say it.
00:17
And the hosts are connected to the very storage that we, as we saw here you're the host might have several V EMS. Some might be, Ah, nice cosy, stored somewhat bien NFS. Because there
00:28
you need a distributed service's ivy motion or storage. The emotion
00:34
so shared storage might be required for certain PM's.
00:37
And then you might have other be EMS that are on the direct attach disc.
00:41
Maybe if you're running your V Center server appliance,
00:44
you could run that on a direct attach storage to give the best possible performance
00:48
if you're not planning to have it motioned to another host
00:55
so the day store itself can have different types of file systems. It could be an F S B E M f s.
01:00
Basically, you're two choices
01:03
just depends on what your requirements are and what kind of technology available.
01:10
So thinking about B. M. F s follow systems, in particular via Memphis, five is the
01:15
highest performance. Newest version. There are older
01:18
VM fast versions like Version three, for instance, which you might need to support for legacy reasons.
01:23
If you do have a V a Memphis pre file system
01:26
and you want to convert it to be a Memphis five to take advantage of some of the other features, you can do that. You could just right click the file system and say, Convert to the NFS five.
01:37
However you do
01:38
not get all of the features enabled. That V. M. F S five supports when you do that,
01:44
because the underlying structure is still the NFS three as it's allocated on the physical storage,
01:49
that presents some limitations.
01:52
So if you do have that situation, the best thing to do
01:55
is to create a new V M. F S five partition and simply copy the data from via Memphis, three to the V A Memphis five
02:01
partition. Now you'll get full advantage of all these features we see here.
02:06
Soviet Memphis five lets you have concurrent access to shared storage. What we see here, two hosts
02:13
connecting to be in that place five at the same time,
02:15
it uses a one megabyte block size,
02:19
which is useful for storing large files because Europe you're basically allocating, stored one megabyte at a time.
02:27
However, within that mega boy block,
02:30
the file system supports what's known as a sub block.
02:31
So eight kilobytes is the default. You can change these parameters, of course. The block size and the sub locks eyes,
02:40
but a smaller sub locks eyes means I can store many small.
02:45
Or I can allocate many small blocks of data within the larger block to handle
02:52
smaller files. If we didn't have this kind of technology, that would mean every time I want to store anything, I would have to allocate a megabyte of storage that will be hugely wasteful.
03:02
So the sub locks give us the ability to subdivide the big block into smaller chunks.
03:08
The Memphis I'd also supports on disk block level locking.
03:13
So that means that
03:15
when a block is in use,
03:16
it's locked on the disk itself
03:19
until the file system signals that the right or the reed operation Well, we're right. Operation
03:24
has been completed, which means that the lock can be lifted from the from the block at that point, and another device or the same device can now access it again without without being locked.
03:38
So the Memphis five supported on direct attach discus. I mentioned also in Fibre Channel and I scuzzy.
03:46
And if us
03:47
lets you share your file systems at the file system level, the typical example would be an export from a UNIX or Lennox system or a Windows server.
03:57
So any time you attached to a shared drive in a window's environment that's unified. Utilizing the network file system protocol
04:05
Version three is supported currently,
04:09
and this is over your TCP epi network,
04:12
as we can see from our connection here to the manifest to are nasty.
04:17
And one of the, uh,
04:19
interesting things about be Centre is that you can use storage maps
04:26
so I could go to any OF'EM. I can go to any host or a cluster, for instance,
04:30
and go the storage maps tab
04:32
and be able to see
04:34
how my information is connected or how my storage is conducted. I might even have,
04:40
depending on what options you pick
04:46
might also show your host,
04:49
and I can see relationships between the host and its networks, the host on its storage, the host and it's,
04:56
um,
04:58
relationship to other hosts, for instance,
05:00
and when you when you see the storage maps feature, you'll, you'll notice a little area in the upper right corner that gives you a little check boxes that you can select or deselect
05:10
to decide what you want to display.
05:14
The last name we'll talk about
05:15
is the naming conventions for your devices.
05:18
If you go to
05:20
the the storage area of your configuration, you can see the stories that you've got attached.
05:28
You'll see entries for your direct disc, your fibre channel fibre channel or Ethernet I Scotty, you manifest, for instance,
05:35
and depending on what kind of stories you're looking at, it has a different Amy convention, so you can identify. For instance, if it's
05:44
a direct attached describes scuzzy
05:46
or fibre channel. It all looks like a a scuzzy device to the host,
05:50
so your scuzzy ideas some kind of unique hex number. It will be many more digits than this. That's just a example.
05:59
The other column that you'll see in that same entry for you know ice cosy, for instance, is the canonical name.
06:06
This is a name that's persistent across reboots,
06:10
so even if you reboot the system, the economical name should remain the same relative to its ah scuzzy I D.
06:18
And we have some different naming conventions here. You've got the t 10 Siri's
06:24
or teach an organization has they're naming conventions, so it starts with T 10 and then some numbers or hacks, digits
06:30
and then the other convention is the N A A,
06:33
which also
06:35
has its own stream of unique digits
06:39
again persistent across reboots
06:43
and in the last item is your runtime name.
06:46
It's called one time, because if you, for instance, reboot the system or you, you've moved your connections to your discs around
06:55
the canonical name and the and the scuzzy idea might be mapped to a different runtime name.
07:00
Because when the controller initialize is, it looks at all the connections that it sees on its
07:05
scuzzy controller
07:06
and does the map ings. So you've got your your host basic after h B. A. That's what we see here, right? PMH be a one. You may be a 34
07:18
and then it lists the controller
07:20
number, the target number and the blood so controlled. Zero target 013
07:28
And as you reboot your system, those things may change, but you can still access the storage
07:31
in the same fashion if if it was already mounted.
07:36
All right, So to recap, lesson one we've talked about
07:40
are different storage protocols and what capabilities they have.
07:45
We know what our storage device naming convention looks like.
07:49
And we also looked at
07:51
storage maps
07:54
with a little bit of information. About what V. N. F. S five and manifest supports.
07:59
All right, that concludes Lesson one. Thank you.
Up Next