Data migration may be a regular chore, but that doesn't mean it's easy to do. Disk (and tape) drives are linked...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
to applications and business processes through servers, routers, switches, and storage and data networks, not to mention access control policies and other layers of security. The more complex your environment, and the more data you're managing, the less likely you'll be able to use simple copy functions built into operating systems or arrays to pull off your required migrations.
More on SMB storage management and strategy
When migrating data among arrays from various vendors, permissions and security settings can be left behind, making the data vulnerable to theft, corruption or misuse. Even moving data among file systems -- for example, from NTFS to NFS -- can result in a loss of permission and security settings, said Ashish Nadkarni, GlassHouse Technologies' principal consultant. "If you're moving ... from Windows to Unix or Unix to Windows, you have to be very, very cautious because more often than not the user permissions are completely destroyed," he said.
The easiest way to avoid security issues is to do a block-level rather than a file-level migration. That way, the migration is performed at "a level below the file system, so the host doesn't even see the difference" in the data, said Nadkarni.
Nadkarni also noted that it's possible to maintain security settings in a file-based migration if the source and target systems lie within the same authentication or authorization domain in a service such as Microsoft's Active Directory. Some file-based migration tools also have the intelligence required to maintain such security settings, he noted.
Digging into the details of how a file copy utility works is important, said Greg Schulz, founder and senior analyst at the StorageIO Group. "What does it copy? How does it copy? Does it simply copy the file, or copy the file as well as all other attributes, meta data and associated information? Those could be the real gotchas if you haven't brought along all of the extra permissions and access information. Dig into the documentation, talk to the vendor or service provider, and understand what type of data is being moved, and how it is to be moved."
Storage virtualization and data migration
Host-based storage virtualization, which is available from a number of vendors, is a fairly reliable way to accomplish such cross-vendor migration. Jalil Falsafi, director of IT at electronic components distributor Future Electronics, said the host-based virtualization provided by the FalconStor software makes the actual migration painless. "We zoned the XP with a Fibre Channel switch so [it] came up as another set of hard disks to the IPStor. We created a mirrored LUN on the HP StorageWorks XP24000 array and did synchronization. Once the primary array and the backup LUNs were synchronized ... all we did was flip the switch from the primary to the backup, and the backup became the primary," he said.
But not all data storage virtualization is created alike. Some virtualization appliances can add to the work administrators have to do, or cause application outages while administrators update drivers or the volume managers used to manage the storage, said Nadkarni. For example, he said that a data storage virtualization appliance can cause problems by changing the SCSI Inquiry String used to identify a specific array. If the appliance changes the inquiry string, the volume manager used to manage the storage must be reconfigured to recognize the new string, or applications that depend on that volume may not run properly. Storage administrators should ask virtualization vendors whether their products are "completely transparent," said Nadkarni, or whether their installation will require changes to servers or other components that could cause application outages.
Nadkarni also suggests staying away from virtualization appliances that require an array or entire storage network to be taken out of service to virtualize (or unvirtualize) storage resources. Some appliances "may require you to take an outage to reconfigure your network or to take an outage on the entire storage array, to insert the appliance," said Nadkarni. They can also require the administrator "to change things on the host" such as drivers, multi-pathing software or volume managers.
This article originally appeared in Storage magazine.
About this author: Robert L. Scheier is a frequent contributor to Storage magazine.