Chapter 8. Planning data migration
Use these data migration considerations to formulate your data migration plan.
There are three levels of considerations to keep in mind when selecting the best
method for your environment. At the first level, you consider broad questions
about your environment to create a generic profile of your needs. At the second
level, you compare which migration methods fit into your generic profile. The
third level is to review a set of hints and other guidelines that apply to specific
environments or that can help you take advantage of a migration to optimize your
environment.
Consider creating any new fixed block (FB) volumes with T10 DIF protection. This
protection can be used on volumes to which data is migrated, even if the current
host server volumes are not T10-protected. T10 DIF protection can be used even if
the host server does not currently support T10 DIF.
The following are some key questions to use to define your generic migration
environment:
v
Why is the data migrating?
v
How much data is migrating?
v
How quickly must the migration be performed?
v
What duration of service outage can be tolerated?
v
Is the data migration to/from the same type storage?
v
What resources are available for the migration?
Allow more time or resources to perform any of the following tasks:
v
Creating new logical volumes or file systems
v
Modifying configuration files
v
Receiving integrity checks
After determining general answers to the considerations listed above, a better
understanding of some of the migration options along with their advantages and
disadvantages will help frame your generic profile into a subset of acceptable
migration options. Table 66 compares the data migration options.
Table 66. Comparison of data migration options
Type
Example
Advantages
Disadvantages
OS / LVM
Mirroring
Logical Volume
Managers, (LVM) Veritas
Volume Manager
(VxVM), Windows Disk
Administrator
Little or no
application service
disruption
Potential application
delays
UNIX or
Windows
Commands
cpio, cplv, dd, tar, backup
restore; copy, scopy,
xcopy, drag and drop
Common, easy to
use, tested
Length of service
interruption varies;
scripting prone to
errors and additional
testing
© Copyright IBM Corp. 2004, 2012
181
|
|
|
|
Summary of Contents for DS8700
Page 2: ......
Page 8: ...vi Introduction and Planning Guide...
Page 10: ...viii Introduction and Planning Guide...
Page 20: ...xviii Introduction and Planning Guide...
Page 22: ...xx Introduction and Planning Guide...
Page 44: ...22 Introduction and Planning Guide...
Page 142: ...120 Introduction and Planning Guide...
Page 160: ...138 Introduction and Planning Guide...
Page 212: ...190 Introduction and Planning Guide...
Page 218: ...196 Introduction and Planning Guide...
Page 224: ...202 Introduction and Planning Guide...
Page 242: ...220 Introduction and Planning Guide...
Page 254: ...232 Introduction and Planning Guide...
Page 255: ......
Page 256: ...Printed in USA GC27 2297 09...