Release Notes

3 Dell Virtual Storage Manager: Installation Considerations and Local Data Protection | 2079-BP-V-VSM
Table of contents
Revisions ............................................................................................................................................................................................... 2
Executive summary .............................................................................................................................................................................. 6
1 Introduction .................................................................................................................................................................................. 7
1.1 Introduction to Virtual Volumes ......................................................................................................................................... 8
1.1.1 Benefits of Virtual Volumes ................................................................................................................................................ 8
1.1.2 Understanding how Virtual Volumes changes storage ...................................................................................................... 8
2 Installation considerations .......................................................................................................................................................... 10
2.1 vCenter Server managed IP requirement ......................................................................................................................... 10
2.1.1 To verify or set the vCenter Server managed IP ............................................................................................................... 11
2.2 Protecting the VSM appliance .......................................................................................................................................... 11
2.3 Connecting to the storage network .................................................................................................................................. 12
2.4 Post-install configuration ................................................................................................................................................. 13
2.4.1 Configuring the VASA Provider ......................................................................................................................................... 13
2.4.2 Changing the root account password ............................................................................................................................... 14
2.4.3 Adding a second NIC to VSM ............................................................................................................................................ 14
2.5 Attaching PS Series storage .............................................................................................................................................. 15
2.5.1 Connecting PS Series storage ........................................................................................................................................... 15
2.5.2 Access control for VMFS datastores ................................................................................................................................. 16
2.5.3 Access controls for Virtual Volumes datastores ............................................................................................................... 17
3 VSM datastore management ...................................................................................................................................................... 19
3.1 Dell Storage view .............................................................................................................................................................. 19
3.2 VSM Inventory Datastores view ....................................................................................................................................... 21
3.3 Datastore management .................................................................................................................................................... 21
3.3.1 Creating a VMFS datastore ............................................................................................................................................... 21
3.3.2 Creating a vVol datastore ................................................................................................................................................. 22
3.3.3 Resizing a datastore.......................................................................................................................................................... 23
3.3.4 Deleting a datastore ......................................................................................................................................................... 23
3.3.5 VMFS datastore access policy .......................................................................................................................................... 24
4 Role-based access controls ......................................................................................................................................................... 26
5 VASA Provider ............................................................................................................................................................................. 27
6 Local data protection strategies with VMFS datastores ............................................................................................................. 29