Last updated on 10 August 2023
IBM Form #: SG24-8542-00
Authors: Andrew Greenfield, Byron M Grossnickle, Carsten Larsen, Christian Schroeder, Corne Lottering, Denis Olshanskiy, Guillaume Legmar, Hartmut Lonzer, John Nycz, Jon Herd, Mert Korcum, Nezih Boyacioglu, Sergey Kubin, Tiago Moreira Candelaria Bastos, Uwe Schreiber, Uygar Sahin, Vasfi Gucer and Youssef Largou
IBM® Storage FlashSystem® and IBM SAN Volume Controller solutions incorporate some of the top IBM technologies that are typically found only in enterprise-class storage systems, which raise the standard for storage efficiency in midrange disk systems. These cutting-edge storage systems extend the comprehensive storage portfolio from IBM and can help change the way organizations address the ongoing information explosion.
This IBM Redbooks® publication introduces the features and functions of an IBM Storage Virtualize V8.6 storage system through several examples. This book is aimed at pre-sales and post-sales technical support and marketing and storage administrators. It helps you understand the architecture, how to implement it, and how to take advantage of its industry-leading functions and features.
Demonstration videos: In addition to the written content, you will find the links for several demonstration videos throughout the book. Most of these videos were created by the authors of this IBM Redbooks publication as part of the project. We hope that these videos will help reinforce key concepts highlighted in this book. A full list of these videos can be found at https://www.redbooks.ibm.com/feature/storagevideos.
Chapter 1. Introduction and system overview
Chapter 2. Installation and configuration planning
Chapter 3. Initial configuration
Chapter 4. IBM Storage Virtualize GUI
Chapter 5. Using storage pools
Chapter 6. Volumes
Chapter 7. Hosts
Chapter 8. Storage migration
Chapter 9. Advanced features for storage efficiency
Chapter 10. Advanced Copy Services
Chapter 11. Reliability, availability, and serviceability; monitoring and logging; and troubleshooting
Chapter 12. Security and encryption
Chapter 13. Automation and scripting
Appendix A. List of demonstration videos
Appendix B. Command-line interface setup
Appendix C. Terminology
The material included in this document is in DRAFT form and is provided 'as is' without warranty of any kind. IBM is not responsible for the accuracy or completeness of the material, and may update the document at any time. The final, published document may not include any, or all, of the material included herein. Client assumes all risks associated with Client's use of this document.