{"id":494,"date":"2018-08-31T00:22:33","date_gmt":"2018-08-30T21:22:33","guid":{"rendered":"https:\/\/blog.arcak.net\/?p=470"},"modified":"2018-09-01T23:14:57","modified_gmt":"2018-09-01T20:14:57","slug":"vsan-spbm-cheat-sheet-2","status":"publish","type":"post","link":"https:\/\/blog.arcak.net\/index.php\/2018\/08\/31\/vsan-spbm-cheat-sheet-2\/","title":{"rendered":"vSan SPBM Cheat Sheet (Stretched Cluster)"},"content":{"rendered":"<p class=\"p1\"><span class=\"s1\">Before accepting this page as a reference, I strongly suggest you to review the article I wrote about SPBM again. You can\u00a0 find the page <a href=\"https:\/\/blog.arcak.net\/index.php\/en\/2018\/08\/30\/vmware-vsan-storage-policy-based-management-spbm\/\"><strong>here<\/strong><\/a>.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-481 aligncenter\" src=\"https:\/\/blog.arcak.net\/wp-content\/uploads\/2018\/08\/vsan-create-300x187.png\" alt=\"\" width=\"300\" height=\"187\" srcset=\"https:\/\/blog.arcak.net\/wp-content\/uploads\/2018\/08\/vsan-create-300x187.png 300w, https:\/\/blog.arcak.net\/wp-content\/uploads\/2018\/08\/vsan-create.png 597w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><!--more--><\/p>\n<ul style=\"list-style-type: circle;\">\n<li class=\"p1\"><span class=\"s1\"><b>Stretched Cluster \u2013 In Site RAID1<\/b><\/span><\/li>\n<li class=\"p1\"><span class=\"s1\"><b>The data is also written to both sites, and the site is also maintained in RAID1, (3 servers per site)<\/b><\/span><\/li>\n<\/ul>\n<ul style=\"list-style-type: square;\">\n<li>Storage Type -&gt; VSAN<\/li>\n<li>Primary level of failures to tolerate -&gt; 1<\/li>\n<li>Secondary level of failures to tolerate -&gt; 1<\/li>\n<li>Failure tolerance Method -&gt; RAID-1 (Mirroring<span class=\"s1\"> \u2013 <\/span>Performance)<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/blog.arcak.net\/wp-content\/uploads\/2018\/08\/RAID-1-SFTT-300x207.png\" width=\"300\" height=\"207\" \/><\/p>\n<ul style=\"list-style-type: circle;\">\n<li class=\"p1\"><span class=\"s1\"><b>Stretched Cluster \u2013 In Site RAID5<\/b><\/span><\/li>\n<li class=\"p1\"><span class=\"s1\"><b>The data is also written to both sites, and the site is also maintained in the RAID5. (4 servers per site)<\/b><\/span><\/li>\n<\/ul>\n<ul>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Storage Ty<span class=\"Apple-converted-space\">pe\u00a0<\/span>-&gt; VSAN<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Primary level of failures to tolera<span class=\"Apple-converted-space\">te\u00a0<\/span>-&gt; 1<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Secondary level of failures to tolera<span class=\"Apple-converted-space\">te\u00a0<\/span>-&gt; 1<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Failure tolerance Metho<span class=\"Apple-converted-space\">d &#8211;<\/span>&gt; RAID-5\/6 (Erasure Coding) \u2013 Capacity<\/span><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/blog.arcak.net\/wp-content\/uploads\/2018\/08\/RAID-5-SFTT-300x202.png\" width=\"300\" height=\"202\" \/><\/p>\n<ul style=\"list-style-type: circle;\">\n<li class=\"p1\"><span class=\"s1\"><b>Stretched Cluster \u2013 In Site RAID6<\/b><\/span><\/li>\n<li class=\"p1\"><span class=\"s1\"><b>The data is written to both sites, and the site is also maintained in the RAID6. (6 servers per site)<\/b><\/span><\/li>\n<\/ul>\n<ul>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Storage Ty<span class=\"Apple-converted-space\">pe\u00a0<\/span>-&gt; VSAN<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Primary level of failures to tolera<span class=\"Apple-converted-space\">te\u00a0<\/span>-&gt; 1<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Secondary level of failures to tolera<span class=\"Apple-converted-space\">te\u00a0<\/span>-&gt; 2<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Failure tolerance Metho<span class=\"Apple-converted-space\">d &#8211;<\/span>&gt; RAID-5\/6 (Erasure Coding) \u2013 Capacity<\/span><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/blog.arcak.net\/wp-content\/uploads\/2018\/08\/RAID-6-SFTT-300x215.png\" width=\"300\" height=\"215\" \/><\/p>\n<ul style=\"list-style-type: circle;\">\n<li class=\"p1\"><span class=\"s1\"><b>Data Locality Preferred \u2013 RAID1<\/b><\/span><\/li>\n<li class=\"p1\"><span class=\"s1\"><b>Data is held on the Preferred site and is maintained as RAID1, and no data is retained on the other site.<\/b><\/span><\/li>\n<\/ul>\n<ul>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Storage Ty<span class=\"Apple-converted-space\">pe\u00a0<\/span>-&gt; VSAN<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Primary level of failures to tolera<span class=\"Apple-converted-space\">te\u00a0<\/span>-&gt; 0<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Secondary level of failures to tolera<span class=\"Apple-converted-space\">te\u00a0<\/span>-&gt; 1<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Data localit<span class=\"Apple-converted-space\">y &#8211;<\/span>&gt; Preferred Fault Domain (Stretched)<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Failure tolerance Method -&gt; RAID-1 (Mirroring \u2013 Performance)<\/span><\/li>\n<\/ul>\n<ul style=\"list-style-type: circle;\">\n<li class=\"p1\"><span class=\"s1\"><b>Data Locality Preferred \u2013 RAID5<\/b><\/span><\/li>\n<li class=\"p1\"><span class=\"s1\"><b>Data is held on the Preferred site and is maintained as RAID5, no data is retained on the other site.<\/b><\/span><\/li>\n<\/ul>\n<ul>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Storage Ty<span class=\"Apple-converted-space\">pe\u00a0<\/span>-&gt; VSAN<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Primary level of failures to tolera<span class=\"Apple-converted-space\">te\u00a0<\/span>-&gt; 0<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Secondary level of failures to tolera<span class=\"Apple-converted-space\">te\u00a0<\/span>-&gt; 1<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Data localit<span class=\"Apple-converted-space\">y &#8211;<\/span>&gt; Preferred Fault Domain (Stretched)<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Failure tolerance Metho<span class=\"Apple-converted-space\">d &#8211;<\/span>&gt; RAID-5\/6 (Erasure Coding) \u2013 Capacity<\/span><\/li>\n<\/ul>\n<ul style=\"list-style-type: circle;\">\n<li class=\"p1\"><span class=\"s1\"><b>Data Locality Preferred \u2013 RAID6<\/b><\/span><\/li>\n<li class=\"p1\"><span class=\"s1\"><b>Data is kept on the Preferred site and is maintained as RAID6, no data is retained on the other site.<\/b><\/span><\/li>\n<\/ul>\n<ul>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Storage Ty<span class=\"Apple-converted-space\">pe<\/span>-&gt; VSAN<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Primary level of failures to tolera<span class=\"Apple-converted-space\">te\u00a0<\/span>-&gt; 0<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Secondary level of failures to tolera<span class=\"Apple-converted-space\">te\u00a0<\/span>-&gt; 2<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Data localit<span class=\"Apple-converted-space\">y &#8211;<\/span>&gt; Preferred Fault Domain (Stretched)<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Failure tolerance Metho<span class=\"Apple-converted-space\">d &#8211;<\/span>&gt; RAID-5\/6 (Erasure Coding) \u2013 Capacity<\/span><\/li>\n<\/ul>\n<ul style=\"list-style-type: circle;\">\n<li class=\"p1\"><span class=\"s1\"><b>Data Locality Secondary \u2013 RAID1<\/b><\/span><\/li>\n<li class=\"p1\"><span class=\"s1\"><b>Data is held on the Secondary site and is maintained as RAID1, and no data is retained on the other site.<\/b><\/span><\/li>\n<\/ul>\n<ul>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Storage Ty<span class=\"Apple-converted-space\">pe\u00a0<\/span>-&gt; VSAN<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Primary level of failures to tolera<span class=\"Apple-converted-space\">te\u00a0<\/span>-&gt; 0<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Secondary level of failures to tolera<span class=\"Apple-converted-space\">te\u00a0<\/span>-&gt; 1<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Data localit<span class=\"Apple-converted-space\">y &#8211;<\/span>&gt; Secondary Fault Domain<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Failure tolerance Method -&gt; RAID-1 (Mirroring \u2013 Performance)<\/span><\/li>\n<\/ul>\n<ul style=\"list-style-type: circle;\">\n<li class=\"p1\"><span class=\"s1\"><b>Data Locality Secondary \u2013 RAID5<\/b><\/span><\/li>\n<li class=\"p1\"><span class=\"s1\"><b>Data is held on the Secondary site and is maintained as RAID5, and no data is retained on the other site.<\/b><\/span><\/li>\n<\/ul>\n<ul>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Storage Ty<span class=\"Apple-converted-space\">pe\u00a0<\/span>-&gt; VSAN<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Primary level of failures to tolera<span class=\"Apple-converted-space\">te\u00a0<\/span>-&gt; 0<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Secondary level of failures to tolera<span class=\"Apple-converted-space\">te\u00a0<\/span>-&gt; 1<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Data localit<span class=\"Apple-converted-space\">y &#8211;<\/span>&gt; Secondary Fault Domain<\/span><\/li>\n<li class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Failure tolerance Metho<span class=\"Apple-converted-space\">d &#8211;<\/span>&gt; RAID-5\/6 (Erasure Coding) \u2013 Capacity<\/span><\/li>\n<\/ul>\n<ul style=\"list-style-type: circle;\">\n<li class=\"p1\"><span class=\"s1\"><b>Data Locality Secondary \u2013 RAID 6<\/b><\/span><\/li>\n<li class=\"p1\"><span class=\"s1\"><b>Data is held on the Secondary site and is maintained as RAID6, and no data is retained on the other site.<\/b><\/span><\/li>\n<\/ul>\n<ul>\n<li class=\"p1\"><span class=\"s1\">Storage Ty<span class=\"Apple-converted-space\">pe\u00a0<\/span>-&gt; VSAN<\/span><\/li>\n<li class=\"p1\"><span class=\"s1\">Primary level of failures to tolera<span class=\"Apple-converted-space\">te\u00a0<\/span>-&gt; 0<\/span><\/li>\n<li class=\"p1\"><span class=\"s1\">Secondary level of failures to tolera<span class=\"Apple-converted-space\">te\u00a0<\/span>-&gt; 2<\/span><\/li>\n<li class=\"p1\"><span class=\"s1\">Data localit<span class=\"Apple-converted-space\">y &#8211;<\/span>&gt; Secondary Fault Domain<\/span><\/li>\n<li class=\"p1\"><span class=\"s1\">Failure tolerance Metho<span class=\"Apple-converted-space\">d &#8211;<\/span>&gt; RAID-5\/6 (Erasure Coding) \u2013 Capacity<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Before accepting this page as a reference, I strongly suggest you to review the article I wrote about SPBM again. You can\u00a0 find the page here.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[193,165,167],"tags":[127],"class_list":["post-494","post","type-post","status-publish","format-standard","hentry","category-hyperconverged-infrastructure","category-virtualization","category-vmware","tag-hyperconverged-infrastructure"],"_links":{"self":[{"href":"https:\/\/blog.arcak.net\/index.php\/wp-json\/wp\/v2\/posts\/494"}],"collection":[{"href":"https:\/\/blog.arcak.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.arcak.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.arcak.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.arcak.net\/index.php\/wp-json\/wp\/v2\/comments?post=494"}],"version-history":[{"count":8,"href":"https:\/\/blog.arcak.net\/index.php\/wp-json\/wp\/v2\/posts\/494\/revisions"}],"predecessor-version":[{"id":535,"href":"https:\/\/blog.arcak.net\/index.php\/wp-json\/wp\/v2\/posts\/494\/revisions\/535"}],"wp:attachment":[{"href":"https:\/\/blog.arcak.net\/index.php\/wp-json\/wp\/v2\/media?parent=494"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.arcak.net\/index.php\/wp-json\/wp\/v2\/categories?post=494"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.arcak.net\/index.php\/wp-json\/wp\/v2\/tags?post=494"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}