Published on 06 May 2024, updated 09 May 2024
ISBN-10: 0738426113
ISBN-13: 9780738426112
IBM Form #: SG24-8542-00
Authors: Candelaria Moreira Tiago Bastos, Nezih Boyacioglu, Andrew Greenfield, Byron M Grossnickle, Vasfi Gucer, Jon Herd, Mert Korcum, Sergey Kubin, Youssef Largou, Carsten Larsen, Guillaume Legmar, Hartmut Lonzer, Corne Lottering, John Nycz, Denis Olshanskiy, Uygar Sahin, Uwe Schreiber and Christian Schroeder
IBM® Storage FlashSystem® and IBM SAN Volume Controller solutions incorporate some of the top IBM technologies that are typically found only in enterprise-class storage systems, which raise the standard for storage efficiency in midrange disk systems. These cutting-edge storage systems extend the comprehensive storage portfolio from IBM and can help change the way organizations address the ongoing information explosion.
This IBM Redbooks® publication introduces the features and functions of an IBM Storage Virtualize V8.6 storage system through several examples. This book is aimed at pre-sales and post-sales technical support and marketing and storage administrators. It helps you understand the architecture, how to implement it, and how to take advantage of its industry-leading functions and features.
Demonstration videos: In addition to the written content, you will find the links for several demonstration videos throughout the book. Most of these videos were created by the authors of this IBM Redbooks publication as part of the project. We hope that these videos will help reinforce key concepts highlighted in this book. A full list of these videos can be found at https://www.redbooks.ibm.com/feature/storagevideos.
Chapter 1. Introduction and system overview
Chapter 2. Installation and configuration planning
Chapter 3. Initial configuration
Chapter 4. IBM Storage Virtualize GUI
Chapter 5. Using storage pools
Chapter 6. Volumes
Chapter 7. Hosts
Chapter 8. Storage migration
Chapter 9. Advanced features for storage efficiency
Chapter 10. Advanced Copy Services
Chapter 11. Reliability, availability, and serviceability; monitoring and logging; and troubleshooting
Chapter 12. Security and encryption
Chapter 13. Automation and scripting
Appendix A. Command-line interface setup
Appendix B. Terminology
Appendix C. List of demonstration videos