Search
Languages
<
2 min read

How to Avoid System Outages & Most Common Severity Level 1 Issues: Part 2

Availability Matters in Today’s On Demand World

In How to Avoid System Outages & Most Common Severity Level 1 Issues: Part 1, we explored how a Severity 1 issue can cause more than down time, it can also drag your organization’s reputation down. But Severity 2 is no joke either. DataCore takes outages very seriously and our teams work hard to continually update our documentation and products to help you avoid outages at every level. Let’s take a look at what those are and how you can avoid them.

Defining Severity 2 Issues

The second most common site outage is because the disk pools on both sides of mirrored virtual disks become full at the same time. This can be avoided by adding tasks that alert the administrators, and of course monitoring the disk pools, or by configuring the pools to have different amounts of storage space allocated to the pool. When pools have the same storage space allocation, they will fill at the same time due to the way writes are mirrored to those pools.

When Your Partner Fails, You Fail

When a disk pool’s storage capacity is completely used up, it will be marked as ‘Full’ and all virtual disks that have storage sources from that disk pool will be marked as ‘failed’. No more writes can be accepted for storage sources from this disk pool. If the virtual disks are mirrored and the mirror partner’s disk pool is not yet full, then all IO will be redirected via the DataCore server’s mirror paths to the mirror partner. The virtual disk will be marked as ‘Failed Redundancy’. If the virtual disks are mirrored and the mirror partner’s disk pool is also full then the storage sources will be in ‘double failure’.

Stay Alert to Low Space

By configuring alerts to inform the storage administrators that the pools are running low on space, they can take the corrective action to avoid the pools from completely filling. Adding more storage to a disk pool can be nondisruptive allowing for continuous access.


Get More Information

For detailed information on how to avoid this condition, and perform the monitoring and actions necessary, please refer to these FAQs and Online Help links regarding this topic:

Maximize the Potential
of Your Data

Looking for higher availability, greater performance, stronger security, and flexible infrastructure options?

Contact Us Now

Related Posts
 
Information Security and The Cost of Non-Compliance
Vinod Mohan
Information Security and The Cost of Non-Compliance
 
Key Technologies Shaping Modern Data Architecture
Vinod Mohan
Key Technologies Shaping Modern Data Architecture
 
Cyber Resiliency Rating
Vinod Mohan
Cyber Resiliency Rating