The XtremIO Sessions At DellEMC World 2017

Yes, its this time of the year where we are getting very close to DellEMC World 2017, this year will be special in so many ways that I can’t really wait!

Below you can see the XtremIO sessions, their abstracts and timing so you can plan accordingly, Do NOT miss them, as always, the timing, content may chance so ensure to check the url below for the most up to date information.


Session Name Abstract Scheduling Options
XtremIO: Next Generation XtremIO Deep Dive – Architecture, Features & Innovations Monday, May 8, 4:30 PM – 5:30 PM

Wednesday, May 10, 1:30 PM – 2:30 PM

Top 10 Tips & Tricks To Rock Your XtremIO World Learn the top 10 things to get the most out of your XtremIO system. Our panel of technical experts will share best practices of configuration, operation and management, and will  provide insights into your specific questions during a live ‘Ask-The-Expert’ session Tuesday, May 9, 1:30 PM – 2:30 PM
XtremIO: Virtualization Best Practices With XtremIO XtremIO provides extreme performance and efficiency for virtualized environments and pioneered integrated Copy Data Management (iCDM). Join us as we detail what the new capabilities of next generation XtremIO will mean for virtualized enterprise solutions hosted on this platform. Various deployment models will be examined and best practices for both VMware vSphere and Microsoft Hyper-V environments will be discussed. In addition, integration options for enhanced monitoring, orchestration & automation when using management platforms such as VMware vRealize and Microsoft System Center with XtremIO will be highlighted. This is a complete overview for those looking to better understand what XtremIO can do for their business, or alternatively for those interested in learning how customers are leveraging XtremIO today to efficiently run their virtualized workloads with stringent SLAs
Tuesday, May 9, 12:00 PM – 1:00 PM

Wednesday, May 10, 3:00 PM – 4:00 PM
XtremIO: Empowering MS SQL & Oracle DBAs With XtremIO Microsoft SQL and Oracle DBAs can benefit greatly from the unique Integrated Copy Data Management (iCDM) capabilities of XtremIO. Use cases will be explored in a series of demos, highlighting XtremIO’s application integrations and workflows. Learn how to enable your DBAs to deploy multiple terabyte AlwaysOn databases replicas in <5 minutes without massive network traffic. Enable self-service for rapid and nearly limitless copies of databases. Watch how a PowerShell script can take XtremIO Virtual Copies, remove sensitive data and make the database available for repurposing in a test/dev environment. Empower your DBAs today with an updated look at best practices for SQL and Oracle on XtremIO.
Tuesday, May 9, 12:00 PM – 1:00 PM

Thursday, May 11, 11:30 AM – 12:30 PM
XtremIO: A Deep Dive In Integrated Copy Data Management XtremIO’s unique integrated copy data management offering combines performance & scalability with reduced operational risk through automation and self-services. Maximize the value of your XtremIO deployment by simplifying application workflows and reducing development timelines. In this session, we will discuss how application admins and DBAs can repurpose different copies of Oracle, SAP and SQL Server DBs instantaneously and become more agile.
Tuesday, May 9, 3:00 PM – 4:00 PM

Wednesday, May 10, 8:30 AM – 9:30 AM
Introduction To Next Generation XtremIO All Flash Array (Hands-on Lab) Welcome to the next generation XtremIO platform! In this lab, you can explore the new HTML.5 based GUI. You will also be able to explore the workflows of the XtremIO data services being released.
XtremIO: Advanced Data Replication With Next Generation XtremIO Platform Come and learn about Dell EMC’s replication innovations for XtremIO! In this session, we will first provide an overview of replication options currently available with XtremIO. Then we will introduce the industry unique metadata-aware, highly efficient native replication for the next generation XtremIO platform. Details of the replication architecture — built on inline data reduction and XtremIO in-memory snapshots to reduce data transfers between primary and secondary sites — will be presented. We will also discuss different key features required to manage DR requirements for business critical applications in a customer-centric model.
Wednesday, May 10, 12:00 PM – 1:00 PM

Thursday, May 11, 8:30 AM – 9:30 AM
XtremIO: Simplicity & Extensibility Of The XtremIO Management System – A Guided Tour A simplistic management model is one of the corners stones of XtremIO’s differentiation. The next generation XtremIO redefines storage management and the user experience. In this session, we will go over the 1-2-3 provisioning model built with new HTML5 web UI. In addition, we will discuss the simple user guided wizards, new auto-balanced architecture, single click real-time reports, new data savings tracking, data protection, and scalability.
Tuesday, May 9, 12:00 PM – 1:00 PM

Wednesday, May 10, 1:30 PM – 2:30 PM
XtremIO: End-User Computing – Updates & Best Practices Hundreds of customers are running millions of virtual desktops in production today with XtremIO. The XtremIO platform offers opportunities to start even smaller than ever before, scale more granularly. In this session, we will present a holistic overview of an XtremIO enabled VMware End-User Computing (EUC) environment. You will also learn about XtremIO sizing and best practices for VMware EUC. An end-to-end EUC datacenter solution leveraging Dell EMC servers, networking, and storage will be presented and examined in detail.
Wednesday, May 10, 1:30 PM – 2:30 PM

Thursday, May 11, 11:30 AM – 12:30 PM
XtremIO: Introducing The Next Generation XtremIO Platform Come and learn about the next generation XtremIO All-Flash array! This session will review our learnings from the largest All-Flash customer base and provide an update on the latest XtremIO capabilities and how they wil help transform many workloads to deliver even greater agility, tremendous TCO, and business benefits. We will discuss the use cases and benefits for workloads focusing on VDI and business apps leveraging integrated Copy Data Management.
Monday, May 8, 12:00 PM – 1:00 PM

Wednesday, May 10, 3:00 PM – 4:00 PM
Transforming Healthcare IT With Dell EMC All-Flash Storage In this session, learn about practical IT solutions from Dell EMC that are accelerating insights and transforming patient care shaping the future of health. We will discuss consolidation and simplification of your Electronic Health Records (EHR) infrastructure with integrated Copy Data Management (iCDM), transformative VDI solutions, highest level of data protection and availability, and performance at cloud scale leveraging VMAX All-Flash and XtremIO. Customer perspectives of their healthcare IT journey with All-Flash solutions will be another cornerstone of this session. Monday, May 8, 1:30 PM – 2:30 PM
World Wide Technology: The Evolution Of Flash Key decision points between the various flash arrays, based on our flash lab findings and customer use cases for Unity, XtremIO, All-Flash VMAX Monday, May 8, 1:30 PM – 2:30 PM
Enterprise Copy Data Management: Primary & Protection Copy Management Best Practices See how eCDM discovers data copies on VMAX, XtremIO, and Data Domain. Learn how to create Protection Plans within eCDM to monitor service levels with storage groups, consistency groups, snapshots, and ProtectPoint copies. This session demonstrates how eCDM helps manage and monitor the creation and deletion of copies to ensure compliance of SLOs. A customer will speak to their experiences. Monday, May 8, 1:30 PM – 2:30 PM
Data Migration: Cheaper, Faster, Easier…& Now At Scale! It is your most precious possession: your data. And usually one of the last and most frightening steps in modernizing your business critical systems is migrating the data. It doesn’t have to be so scary. It doesn’t have to be so hard. This session demonstrates the migration tools we’ve built into VMAX, VNX and XtremIO, and share the software, resources, and services that will make your data migrations dreamlike instead of scream like.
Tuesday, May 9, 8:30 AM – 9:30 AM

Wednesday, May 10, 3:00 PM – 4:00 PM

A Bonus Session!

RecoverPoint & RecoverPoint For Virtual Machines: What’s New For 2017 So much has happened in the past year with RecoverPoint and RecoverPoint for Virtual Machines. See how fast deployment can be done and how seamless operations are. Understand how to achieve the most efficient data protection for your VMware environment. A customer will speak to their experiences. Monday, May 8, 4:30 PM – 5:30 PM

Wednesday, May 10, 8:30 AM – 9:30 AM

My session is the virtualization best practices one, can’t wait to see you all there

AppSync IS Out



We have just released a minor update to AppSync 3.1, many bugs have been fixed in this version so I highly encourage you to upgrade, the AppSync upgrade is as easy as downloading the updated files and next ->next..

Table 1 Fixed Issues for


Fix Description

Version Fixed


Resolved an issue related to the license
validation of VNX File array that occurred
during remote protection using silver or gold
service plan.


Provides a server setting
to configure copy access state wait
time for RecoverPoint Bookmark copies.


Resolved an issue where Copy BCT file failed
while protecting Oracle databases, if AppSync
server was installed on a non C:\ drive.


Resolved an issue where mount failed for all
AppSync supported storage except VPLEX, if


Fix Description

Version Fixed

you selected Native Array Volume as the
VPLEX mount option in the Mount phase.



AppSync now supports RHEL 7 cluster.


Resolved an issue where the license status was
not being displayed in the GUI, if the license
exceeded capability.


Supports VCS 7 Cluster.


Improves handling of XtremIO connections.


Provides a server setting to enable the
selection of multiple SQL databases for non
protection plans.


Resolved an issue where Enable/Disable of a
Exchange service plan with subscription failed.


You can now select the Mount on Standalone
Server and Create RMAN Catalog entry
options when mounting the copy on demand
from the AppSync GUI.


Resolved an issue where a virtual machine
restore failed for Unity 4.1 and later.


Resolved an issue related to Oracle database
copy mount and recovery that occurred when
the files were directly under the ASM
Diskgroup directory (for example, +DATA/
dbfile123.dbf) instead of a subdirectory.


You can now perform datastore mount without
re-signature using the AppSync CLI
mount_signature=original option.


Resolved an issue related to mount and
recovery of multiple Oracle ASM databases
that occurred when the databases were
protected together.


Resolved an issue where protection failed for
applications on iSCSI connected storage LUNs
in Linux environments.


Resolved an issue where mount failed in the
case of Linux virtual machines with ISCSI
storage connectivity to the array.


Resolved an issue related to datastore restore
failure in an ESX clustered environment.


Resolved an issue related to the mounted
refresh of Oracle ASM databases.


Fix Description

Version Fixed


Resolved an issue related to Oracle database
copy on VNX File array where data file copy
snapshots were not getting removed and
expired on the array.


Resolved an issue related to unmounting a
datastore mounted as part of Granular File


Resolved an issue related to the patch version
display in the About EMC AppSync section.


to download the update just click the link below..


A new Microsoft SQL On DellEmc XtremIO Best Practices Paper


VMware have just released a new MS SQL best practices white paper.

The paper details the results shown by running multiple SQL servers on XtremIO 


The full xtremio focused paper can be downloaded from here


Want Your vSphere 6.5 UNMAP Fixed? Download This Patch



One of the biggest changes introducted In vSphere 6.5, was the ability to run an automated UNMAP at the datastore level and inside the guest os (for both windows and linux VMs that support the SCSI primitive)

Unfortunately, the GA release of vSphere 6.5, had a bug in it that prevented the in-guest UNMAP from running properly, I wrote about it here



we’ve been working with VMware on resolving this issue (it’s not a storage array specific issue) so everyone will benefit from the fix and today (15/03/2017), the fix has been released!






“Tools in guest operating system might send unmap requests that are not aligned to the VMFS unmap granularity. Such requests are not passed to the storage array for space reclamation. In result, you might not be able to free space on the storage array.”


So there you go, if you are looking for THE most compelling reason to upgrade to vSphere 6.5, this is it!

The First Dell EMC End To End VDI Reference Architecture

We have been working with heritage Dell teams for past several months to bring end-to-end solutions that are completely built off Dell Technologies stack to market.

I am happy to announce that the very first solution is now available for you to leverage. It is an end-to-end VDI solution built with Dell Wyse Thin/Zero clients for end-points, Dell  EMC PowerEdge Servers, Dell EMC Networking switches for networking, Dell EMC XtremIO & Dell EMC Unity for storage, and VMware Horizon as the VDI platform.

This end-to-end VDI solution is currently available as a Reference Architecture. It showcases different scale points in terms of desktop/user densities with XtremIO as the VM storage and Unity for the user shares. In the next phase, it will be made a validated Nodes/Bundles solution that will be an orderable pre-packaged offering simplifying procurement for customers.


VMware Horizon



Citrix XenDesktop



You gotta love the powerhouse!

RecoverPoint 5.0 SP1 Is out, here’s what’s new for both the classic and the RP4VMs version, Part #1, Physical RecoverPoint


This is part 1 of what’s new with the RecoverPoint 5.0 SP1 release, the classic (Physical) version of it.

Partial Restore for XtremIO

  • An added option to the recover production flow for XtremIO
    • Available for DD since RP 5.0
  • Allows to select which volumes to restore (previously restore of all CG volumes could of taken place)
  • During partial restore:
    • Transfer is paused to all replica copies, until the action completes
    • Only selected volumes are restored
    • At production – selected volumes would be set to NoAccess, non-selected volumes remain Accessible
    • Like current recover production behavior:
      • At replica journal – images newer than the recovery image are lost
      • After production resumes all volumes undergo short init


  • Partial Restore from an image that does not contain all the volumes (when Adding\Removing RSets) would show the suitable volumes available for restore but restore might remove RSETs which were added after the restore took place
    • Exactly the same as with full restore
  • Both production and the selected replica clusters must be running at least 5.0.1 to enable the capability

    GUI changes

    XtremIO Snapshot Expiration

  • As of previous versions, snapshot deletion and manual retention policy assignment were not possible via RecoverPoint for XtremIO
  • Snapshot deletion allows the user to manually delete a PiT which corresponds to a XtremIO snap
    • Was only possible with DataDomain
  • Retention policy allows the user to setup expiration for specific PiT

Applies only to XtremIO and DD copies

Snapshot deletion – GUI

Snapshot deletion – CLI

  • Admin CLI command delete_snapshot
  • delete_snapshot –help

DESCRIPTION: Deletes the specified snapshot.


group=<group name>

copy=<target copy name>


This command is relevant only for DataDomain and XtremIO copies and can only be run interactively

  • delete_snapshot – interactive mode

Enter the consistency group name

Enter the name of the copy at which the snapshot resides

Select the snapshot you want to delete

  • User can delete any user or system snapshot without setting retention
  • Oldest PiT cannot be deleted
  • Deleting a snapshot is only possible when there are XtremIO volumes at the remote copy
  • When there are connectivity issues to the XMS, system would keep trying to delete the snapshot. It would get deleted when there is proper connectivity
  • RecoverPoint would block any deletion of PiT which is currently used for any recovery operation
  • In order to perform snapshot deletion, both clusters must be running at least RP 5.0.1

    Snapshot Retention GUI option 1

    Snapshot retention – CLI

  • Admin CLI command set_single_snapshot_consolidation_policy
  • Can only be run interactively
  • set_single_snapshot_consolidation_policy – Interactive mode

    Enter the consistency group name

    Enter the name of the copy at which the snapshot resides

    Select the snapshot whose consolidation policy you want to set

    For the snapshot retention time, enter the number units and the unit (<num>months | <num>weeks | <num>days | <num>hours | none) for the desired time.

    Enter consistency type: (Default is current value of ‘Crash consistent’)

    * None is for remove/cancel the retention of the snapshot

  • The retention of any user or system snapshot can be changed given it’s on a XtremIO or DD array
  • Retention can be set in: hours, days, weeks and months.
    • The minimum is 1 hour
  • Changing the retention of a user bookmark will apply to to all the replica copies.
  • In case a PiT has with retention higher than the Protection Window, the PiT will last until the retention time is over and will not be deleted, it other words, it would extend the PW
  • In case a PiT has with retention lower than the Protection Window, the PiT will last until the retention time is over and then would be treated as a regular PiT which can be removed as part of the XtremIO specific snapshot consolidation policy
  • In order to configure retention, all participating clusters must be running at least RP 5.0.1

    Manual Integrity Check for Snap-Based Replication

  • In previous versions, integrity check was available only for non-SBR (Snap-Based Replication) links.
    • In RP 5.0.1, manual Integrity Check can be performed on SBR links, this currently includes:
      • XtremIO
      • DataDomain
  • This enhanced capability enables integrity check while in the transfer status is “snap-idle”
  • Manual Integrity check for SBR links – CLI
  • Integrity Check is only available via CLI
  • Interactive Mode

  • Non-Interactive Mode

  • RPO can be impacted during integrity check and should return to normal state in the next snap shipping cycle. This is general to all integrity check operations
  • Integrity Check Events remains unchanged

    This release is also supporting ScaleIO in an heterogenous environment!

RecoverPoint 5.0 SP1 Is out, here’s what’s new for both the classic and the RP4VMs version, Part 2, RP4VMs

Hi, so this is part 2 of the posts series which cover the what’s new for the RP4VMs version 5.0 SP1, if you are looking for part 1 which covers the physical RP, look here:


ok, so to the new stuff in RP4VMs!

RE-IP simplifications will apply to systems running RPVM 5.0.1 and later
Main purpose is to simplify the operation – no need for glue scripts
Configured completely in the UI/Plugin
Co-exist with previous glue script based reIP
Supports IPv4 or IPv6
Users can change IPs, Masks, Gateways, DNS servers


Supports major VM OS: MS Windows server versions 2016, 2012,
2008, Windows 8, and 10, or Red Hat Linux server versions 6.x and
7.x, SUSE 12.x, Ubuntu 15.x and CentOS 7
Implementation is different between Windows based and Linux based
VMs, but the outcome is the same
Configuration will be done with the RP VC Plugin
Requires VM Tools

To use the new re-IP method, which is the default setting, Network Configuration Method is set to Automatic
No need to fill in the “Adapter ID” with the Automatic re-IP option
Supports multiple NICs per VM
Configuration on a per-Copy basis, which allows flexibility in multi-copy replication
During recovery wizard (Test Copy, Fail-over, Recover Production), use any of the 4 Network options

Protection > Consistency Groups. Expand the relevant consistency
group, select the relevant copy, and click the Edit Copy Network
Available after a VM has been protected

Adding/removing NICs, requires reconfiguration
If performing a temporary failover (+Setting new copy as production), ensure that the network configuration of the former prod copy is configured to avoid losing its network configuration


Starting with 5.0.1 MAC replication to remote Copies is enabled by default
By default, MAC replication to Local Copies
is disabled
During the Protect VM wizard, the user will have the option to enable MAC replication for copies residing on the same vCenter
(local copies and remote copies when RPVM clusters are sharing the same vCenter)
This can create a MAC conflict if the VM is protected back within the same VC/Network
Available for different networks and/or VCs hosting the Local Copy
When enabled, The production VM network configuration is also preserved (so there’s no need to configure the Re-IP)

Enhanced power-up Boot Sequence – VM Load up indication will be obtained from the OS itself (using VM tools)
“Critical” mechanism is still supported.
Enhanced detection and configuration conflicts for Duplicate UUIDs of
ESXi nodes
In an all 5.0.1 system, RPVM will use VMWare’s MORef of the ESXi and will generate a new unique identifier to replace the BIOS UUID usage
A Generic Warning will be displayed if an ESX has been added to an ESX Cluster that is registered to RPVM, and one of the entities (either a splitter or a cluster) are not 5.0SP1, and the ESX has a duplicate BIOS UUID.
RPVM 5.0.1 will add support for vSphere 6.5 (including VSAN)
A new message was added when attempting to protect a VM in a nonregistered ESX cluster right in the Protect VM wizard
Minimal changes in Deployer to enhance user experience and simplify the deployment flow, mainly around NIC topology selection



RP4VMs as part of DellEMC Hybrid Cloud (EHC)

The First End-To-End Dell VDI Reference Architecture

What an awesome thing is to have an end to end infrastructure Reference Architecture for your VDI deployment, not just the storage part, that’s easy, just add XtremIO.

This end-to-end VDI solution is currently available as a Reference Architecture. It showcases different scale points in terms of desktop/user densities with XtremIO as the VM storage and Unity for the user shares. In the next phase, it will be made a validated Nodes/Bundles solution that will be an orderable pre-packaged offering simplifying procurement for customers.

VMware Horizon RA Link: http://en.community.dell.com/techcenter/blueprints/blueprint_for_vdi/m/mediagallery/20442049/download

Citrix XenDesktop RA Link: http://en.community.dell.com/techcenter/extras/m/mediagallery/20443457/download

An Important APD/PDL Change in the XtremIO Behavior


We have recently released a new target code for our arrays, know as XIOS 4.0.15

This release contains many fixes including a change in the APD/PDL behavior when using ESXi hosts, this is based on many customers feedback we have received that were asking to tweak the array APD/PDL behavior..

If you are new to this concept, I highly suggest you start reading about it here:


And an older article from the ESXi 5 days here, https://blogs.vmware.com/vsphere/2011/08/all-path-down-apd-handling-in-50.html

Permanent Device Loss (PDL) is a condition where all paths to a device are marked as “Dead.” Because the storage adapter cannot communicate to the device, its state is “Lost Communication.” Similarly, All Paths Down (APD) is a condition where all paths to a device are also marked as “Dead.”
However, in this case, the storage adapter displays the state of the device as “Dead” or “Error.”
The purpose of differentiating PDL and APD in ESX 5.x and higher is to inform the operating system whether the paths are permanently or temporarily down. This affects whether or not ESX attempts to re-establish connectivity to the device.

A new feature in XtremIO 4.0.15 allows the storage administrator to configure the array to not send “PDL” as a response to a planned device removal. By default, XtremIO configures all ESX initiators with the PDL setting.
In planned device removals where the cluster has stopped its services and there are no responses received by the ESX host for I/O requests, ESX Datastores will respond with PDL or APD behavior depending on the XtremIO setting.

An XMCLI command is used to enable all ESX initiators as “APD” or revert back to “PDL.” A new option is available for the modify-clusters-parameters admin-level command which modifes various cluster parameters:
device-connectivity-mode=<apd, pdl>

In any case, if you have a new or existing XtremIO cluster and you are using ESXi hosts (who doesn’t?), please set the initiators type to “ESX”

Refer to the XtremIO Storage Array User Guide (https://support.emc.com/products/31111_XtremIO/Documentation/) or
help in XMCLI for more information on its usage.

The version that will follow the 4.0.15-20 one will have APD turned on by default for newly installed arrays.