Dell EqualLogic PS6000XV SAN storage appliance review

Dell’s new EqualLogic PS6000XV IP SAN appliance delivers great value, capacity and features – could it also be the fastest?

The Group Manager console is very intuitive and provides easy access to functions such as group, storage pool and volume creation. For the latter you choose a storage pool, decide on a volume size and add access restrictions, where you can limit host access by CHAP authentication, IP address or initiator name.

Thin provisioning can be configured during volume creation and you decide how much physical space to start with. The appliance uses three watermarks where the minimum size is 10 per cent of the virtual volume. When the volume is 95 per cent full the system starts throttling back I/O performance to enable administrators time to increase the volume size. Once you reach the critical watermark the volume is placed offline.

Snapshots are set up during volume creation where you decide how much space should be set aside for them and at any time you can promote snapshots as new volumes. A thin provisioned volume will have its snapshots and replicas thinly provisioned and you can also swap on the fly between classic and thin provisioned volumes as well.

For replication, snapshots of selected volumes are stored in other groups called replication partners. During setup you can choose one-way replication to another group, bi-directional replication between groups or designate one group as a central location to which multiple groups can be replicated. If a volume gets lost or damaged you just clone a copy of the replicated volume and promote it as a new volume.

Dell's new SAN HeadQuarters is designed to manage multiple appliances from a central console. You add your groups, which all appear in the left pane along with a choice selection of statistics and graphs for each one. You can view detailed reports on capacity, which show the total space for the group and how it's split up into volumes and snapshots.

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
The enemy of security is complexity
Sponsored

The enemy of security is complexity

9 Oct 2020
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

5 Oct 2020