HP StorageWorks X1600 G2 12TB review

HP’s latest StorageWorks appliances aim to take the strain out of network storage provisioning and management for SMBs. In this exclusive review Dave Mitchell puts the X1600 G2 on his lab bench and sees if it’s as easy to use as HP claims.

The main focus of the X1000 products is application serving where they provide iSCSI targets for storage and automated data migration for Exchange and SQL Server systems.

Our WebMonitor database was in the list so we selected its primary data and log transaction files. ASM asks for the workload type which will determine the type of RAID array it will use. We selected transaction processing and were offered RAID10 striped mirrored arrays for the data and log files. If required we could change the array type instead of accepting the default with RAID5 or 6 as available options.

Volume snapshots come next and are preconfigured for a daily schedule. If you have a backup device attached you can also have your data backed up to it at regular intervals. After reviewing the process we left ASM to get on with the migration.

The process was seamless and on completion our WebMonitor database and log file had been shifted across to HP's IP SAN. A quick check in the SQL Server Management Studio showed that the file locations for this database had been changed to the virtual volumes and WebMonitor continued to send its log data to the new location without any complaints.

Provisioning extra storage space for the database was a swift process. From the ASM interface, we selected the virtual volume for the primary data store, chose the Allocate Space option and entered the new size for the volume.

Migrating data for other applications isn't so easy. The wizard helps create virtual volumes and log the host system onto them but you'll need to manually configure the new file locations into your application and copy any existing data across to them.

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
Google blocked record-breaking 2.5Tbps DDoS attack in 2017
Security

Google blocked record-breaking 2.5Tbps DDoS attack in 2017

19 Oct 2020
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

5 Oct 2020