Dell MD3200i manuel d'utilisation
- Voir en ligne ou télécharger le manuel d’utilisation
- 268 pages
- 6.78 mb
Aller à la page of
Les manuels d’utilisation similaires
-
Computer Drive
Dell G225N
52 pages 3.92 mb -
Computer Drive
Dell M1330
43 pages 1.29 mb -
Computer Drive
Dell PowerVault X5MJV
16 pages 1.1 mb -
Computer Drive
Dell GK270
52 pages 5.69 mb -
Computer Drive
Dell POWERVAULT MD1000
11 pages 0.42 mb -
Computer Drive
Dell H476M
54 pages 3.86 mb -
Computer Drive
Dell 3260i
62 pages 4.02 mb -
Computer Drive
Dell IDRAC6 3.5
292 pages 2.04 mb
Un bon manuel d’utilisation
Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Dell MD3200i. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Dell MD3200i ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.
Qu'est ce que le manuel d’utilisation?
Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Dell MD3200i décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.
Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.
Donc, ce qui devrait contenir le manuel parfait?
Tout d'abord, le manuel d’utilisation Dell MD3200i devrait contenir:
- informations sur les caractéristiques techniques du dispositif Dell MD3200i
- nom du fabricant et année de fabrication Dell MD3200i
- instructions d'utilisation, de réglage et d’entretien de l'équipement Dell MD3200i
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes
Pourquoi nous ne lisons pas les manuels d’utilisation?
Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Dell MD3200i ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Dell MD3200i et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Dell en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Dell MD3200i, comme c’est le cas pour la version papier.
Pourquoi lire le manuel d’utilisation?
Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Dell MD3200i, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.
Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Dell MD3200i. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.
Table des matières du manuel d’utilisation
-
Page 1
Dell™ PowerV ault™ MD3200i and MD3220i Storage Array s Owner’ s Manual Regulatory Model: E03J Series and E04J Series Regulatory T ype: E03J0 01 and E04J001 book.book Page 1 Wednesday, May 26, 2010 2:14 PM[...]
-
Page 2
Notes, Cautions, and W arnings NOTE: A NOTE indicates important information that helps you make better use of your computer . CAUTION: A CAUTION indicates potential dama ge to hardware or loss of data if instructions are not followed. WAR N IN G: A WARNING indicates a potential for property damage, personal injury , or death. ______________ ______ [...]
-
Page 3
Contents 3 Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . 19 About This Document . . . . . . . . . . . . . . . . . . 19 Inside the box of the De ll PowerV ault MD3200i Series Storage Array . . . . . . . . . . . . . . . . . . . 19 Dell PowerV ault MD3200i Series Storage Array . . . . . . . . . . . . . . . . 20 Dell PowerV ault[...]
-
Page 4
4 Contents 3 Planning: RAID Controller Modules . . . . 31 RAID Controller Modules . . . . . . . . . . . . . . . . 31 RAID Controller Module Connectors and Features . . . 32 RAID Controller Modul e—Addition al Features . . . . . 34 Battery Backup Unit . . . . . . . . . . . . . . . . 34 Storage Array Thermal Shutdown . . . . . . . . . 34 Sy stem Pa[...]
-
Page 5
Contents 5 Consistency Check . . . . . . . . . . . . . . . . . 43 Media V erification . . . . . . . . . . . . . . . . . 44 Cycle T ime . . . . . . . . . . . . . . . . . . . . . 44 Virtual Disk Operations Limit . . . . . . . . . . . . 44 Disk Group Operations . . . . . . . . . . . . . . . . . . 45 RAID Level Migration . . . . . . . . . . . . . . . .[...]
-
Page 6
6 Contents 5 Configuration: Overview . . . . . . . . . . . . 59 User Interface . . . . . . . . . . . . . . . . . . . . . . 59 Enterprise Management Window . . . . . . . . . 60 Array Management Window . . . . . . . . . . . . 61 6 Configuration: About Y our Storage Array . . . . . . . . . . . . . . . . . . . . . 63 Out-of-Band and In-Band Management [...]
-
Page 7
Contents 7 Setting the Storage Array RAID Controller Module Clocks . . . . . . . . . . . . . . 79 7 Configuration: Using iSCSI . . . . . . . . . . . 81 Changing the iSCSI T arget Authentication . . . . . . . 81 Entering Mutual Aut hentica tion Permissions . . . . . . 82 Creating CHAP Secrets . . . . . . . . . . . . . . . . . 82 Initiator CHAP Secre[...]
-
Page 8
8 Contents 9 Configuration: About Y our Host . . . . . . . 93 Configuring Host Access . . . . . . . . . . . . . . . . . 93 Using the Mappings T ab . . . . . . . . . . . . . . . . . 94 Defining a Host . . . . . . . . . . . . . . . . . . . 94 Removing Host Access . . . . . . . . . . . . . . . . . . 96 Managing Host Groups . . . . . . . . . . . . . . [...]
-
Page 9
Contents 9 Creating a Security Key . . . . . . . . . . . . . . . 116 Changing a Security Key . . . . . . . . . . . . . . 117 Saving a Security Key . . . . . . . . . . . . . . . 119 Unlocking Secure Phy sical Disks . . . . . . . . . . 120 Erasing Secure Phy sical Disks . . . . . . . . . . . 120 Configuring Hot Spare Phy sical Disks . . . . . . . . .[...]
-
Page 10
10 Contents Using Unconfigured Capacity . . . . . . . . . . . 138 Disk Group Migration . . . . . . . . . . . . . . . . . 13 9 Export Disk Group . . . . . . . . . . . . . . . . . 139 Exporting a Disk Group . . . . . . . . . . . . . . 140 Import Disk Group . . . . . . . . . . . . . . . . . . . 140 Importing a Disk Group . . . . . . . . . . . . . . 14[...]
-
Page 11
Contents 11 Disabling a Snapshot V irtual Disk . . . . . . . . . . . . 15 9 Preparing Host Servers to Re-create a Snapshot Virtual Disk . . . . . . . . . . . . . . . 160 Re-creating a Snapshot Virtual Disk . . . . . . . . . . 161 12 Configuration: Premium Feature— Virtual Disk Copy . . . . . . . . . . . . . . . . . . 163 Creating a Virtual Disk C[...]
-
Page 12
12 Contents Preparing Host Servers to Recopy a Virtua l Disk . . . . . . . . . . . . . . . 172 Recopying the V irtual Disk . . . . . . . . . . . . 173 Removing Copy Pairs . . . . . . . . . . . . . . . . . . 174 13 Configuration: Pr emium Feature—Upgrading to High-Performance-T ier . . . . . . . . . . . 175 14 Configuration: Device Mapper Multipat[...]
-
Page 13
Contents 13 Downloading MD1200 Series E xpansion Module EMM Firmware . . . . . . . . . . . . . . . . . 194 Self-Monitoring Analy sis and Reporting T echnology (SMART) . . . . . . . . . . . . . 196 Media Errors and Unreadable Sectors . . . . . . . . . 196 16 Management: Installing Array Components . . . . . . . . . . . . . . . . 197 Recommended T oo[...]
-
Page 14
14 Contents Removing the RAID Controller Module Backup Battery Unit . . . . . . . . . . . 210 Installing the RAID Controller Module Backup Battery Unit . . . . . . . . . . . 211 Power Supply/Cooling Fan Module . . . . . . . . . . 211 Removing a Power Supply/Cooling Fan Module . . . . . . . . . . . . . . . . . . . . 211 Installing a Power Supply/Coo[...]
-
Page 15
Contents 15 Device Health Conditions . . . . . . . . . . . . . . . . 225 Storage Array Support Data . . . . . . . . . . . . . . . 229 Automatically Collect the Support Bundle Data . . . . 229 Collecting the Phy sical Disk Data . . . . . . . . . . . . 230 Event Log . . . . . . . . . . . . . . . . . . . . . . . . . 231 Recovery Guru . . . . . . . . .[...]
-
Page 16
16 Contents 20 T roubleshooting: Y our Array . . . . . . . . . 249 Safety First—For you and Y our Array . . . . . . . . . 249 T roubleshooting Storage Array Startup Failure . . . . 249 T roubleshooting Loss of Communication . . . . . . . 249 T roubleshooting External Connections . . . . . . . . 249 T roubleshooting Power Supply/Cooling Fan Module[...]
-
Page 17
Contents 17 21 Getting Help . . . . . . . . . . . . . . . . . . . . . . 259 Contacting Dell . . . . . . . . . . . . . . . . . . . . . 259 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 book.book Page 17 Wednesday , May 26, 2010 2:14 PM[...]
-
Page 18
18 Contents book.book Page 18 Wednesday , May 26, 2010 2:14 PM[...]
-
Page 19
Introduction 19 1 Introduction See the Safety , Environmental, and Re gulatory Information document for important safety information before foll owing any procedur es listed in this document. About This Document This guide familiarizes you with the f unctions of the MD3200i Series storage array . The guide is or ganized acco rding to t he tasks tha[...]
-
Page 20
20 Introduction • Mounting rails (2) (optional) • Dell P owerV ault MD3200i Series resource media • The Rack Inst allation Instruc tions included with your rack sol ution describes how to in stall your enc losure into a rack. • Getting Started W ith Y our System provides an overview of enclosur e features, setting up your enclosure, and tec[...]
-
Page 21
Introduction 21 • Deployment Guid e provides installation and co nfiguration instructions for bo t h s of t wa re an d h a rdw a re. • Storage Manag er CLI Guide provides informatio n about using the command line interface (CLI). • Resource media contains all system management tools. • Systems Support Matrix provides information on supporte[...]
-
Page 22
22 Introduction book.book Page 22 Wednesday , May 26, 2010 2:14 PM[...]
-
Page 23
Planning: About Y our Storage Array 23 2 Planning: About Y our Storage Array Overview The MD3200i Se ries storage array is desi gned for high availa bility , offe ring redundant access to data st orage. It fe atures support for both single and dual R AID controller configuration. The Dell™ P owerV ault™ MD320 0i storage array provides 1.0-Gbps [...]
-
Page 24
24 Planning: About Y our Storage Array Hardware Features Front-Panel Features and Indicators Figure 2-1. Front-Panel Features and I ndicators—Dell™ PowerV ault™ MD3200i Figure 2-2. Front-Panel Features and Indicators—Dell PowerV ault MD3220i 1 2 3 5 4 6 1 2 3 4 6 5 book.book Page 24 Wednesday , May 26, 2010 2:14 PM[...]
-
Page 25
Planning: About Y our Storage Array 25 Figure 2-3. Front-Bezel Features and Indicators Item Indicator , Button, or Connector Icon Description 1 Enclosure sta tus LED The encl osure status L ED lights when the enclosure power is on. Lights blue during normal operation. Blinks blue when a h ost server is identifying the enclosur e or when the system [...]
-
Page 26
26 Planning: About Y our Storage Array 3 Split mode LED This LED should be unlit as the split mode function is not supported by the MD3200i Series Storage Arrays. 4 System identification button The system identification button on the front control panel can be used to locate a particular enclosure with in a rack. When the button is pushed, the syst[...]
-
Page 27
Planning: About Y our Storage Array 27 Back Panel Feature s and Indicators Figure 2-4. Back-Panel Features and Indi cators—Dell PowerV ault MD3200i Series 1 600W Power supply/cooling fan module 2 RAID Controller Modu le 0 3 RAID Controller Module 1 4 600W Power supply/cooling fan module 1 2 3 4 book.book Page 27 Wednesday , May 26, 2010 2:14 PM[...]
-
Page 28
28 Planning: About Y our Storage Array Hard-Drive Indicator Patterns Figure 2-5. Hard Drive Indicators 1 hard-drive activity indicator (gr een) 2 hard-drive status indicator (green and amber) 1 2 book.book Page 28 Wednesday , May 26, 2010 2:14 PM[...]
-
Page 29
Planning: About Y our Storage Array 29 Power Supply and Cooling Fan Features The MD3200i Series storage array incl udes two integrat ed, hot-swappable power supply/cooling fan modules. Both modules must be in stalled to ensure proper cooling. Each module contains two se parate cooling fans. The syste m r equires at le ast one of the cooling fa ns t[...]
-
Page 30
30 Planning: About Y our Storage Array Power Indicator Codes Figure 2-6. Power Indicator Codes Item LED T ype Icon Description 1 DC power The LED lights green whe n the DC output voltage is within the limit. If this LED is off, it indicates that the DC output voltage ar e not within the limit. 2 P ower supply/cooling fan fault The LED lights amber [...]
-
Page 31
Planning: RAID Controller Modules 31 3 Planning: RAID Controller Modules RAID Controller Modules The R AID controller modules provide high-performance, advanced virtual disk co nfigurat ion, and fault-tole ra nt disk subsystem management. Each R AID controller module contains 2 GB of cache that is mirror ed with the other controller's cache fo[...]
-
Page 32
32 Planning: RAID Controller Modules RAID Controller Module Connectors and Features Figure 3-1. MD3200i Series i SCSI RAID Controller Module Item Component Function 1 SAS OUT port P rovides SAS connec tion for cabling to an e xpansion enclosu re. 2 iSCSI IN port 0 Provides host-to-controller iSCSI 1Gbps Ethernet connection. 3 iSCSI IN port 1 Provid[...]
-
Page 33
Planning: RAID Controller Modules 33 8S A S O U T p o r t link/fault LE D Lights gr een when all four links are connected. Lights amber when one to three links ar e disconnected. Off when all li nks in the port ar e disconnected or cable is disconnec ted. 9i S C S I I N p o r t l i n k LED Lights gr een when ethernet connection at 1Gbps established[...]
-
Page 34
34 Planning: RAID Controller Modules RAID Controller Modu le—Additional Features Battery Backup Unit Each R AID controller contains a two- cell lithium ion nanopolymer battery backup unit (BBU). It provides power to the R AID controller module in the event of a power outage. F or informat ion on re moving and installing the BBU, see "R AID C[...]
-
Page 35
Planning: RAID Controller Modules 35 Sy stem Password Rese t The storage array system password can be reset if it is for gotten. T o reset the password, push and hold down the pa sswor d r eset switch for at least 5 seconds. The password is deleted. See F igure 3-1 to locate the password r eset switch. The R AID controller module allows yo u to cha[...]
-
Page 36
36 Planning: RAID Controller Modules mirrored to the cache of the second co ntroller before completion status is issued to the host initiator . W rite-Back Cache is enabled by default unless cache mirroring is disabled. Write-Throug h Cache In write-through cache, data is written to the physical disk befor e completion status is r eturned to t he h[...]
-
Page 37
Planning: MD3200i Series Storage Array T erms and Concepts 37 4 Planning: MD3200i Series Storage Array T erms and Concepts This chapter e xplains terms and co ncepts used for configuration and operation of MD3200i Se ries storage arrays. Phy sical Disks, V irtual Disks, and Disk Groups Physical disks in your storage array provide the physical stora[...]
-
Page 38
38 Planning: MD3200i Series St orage Array T erms and Concepts NOTE: The MD3200i storage enclosure must contai n at least two phy sical disks for proper operation. This is necessary because the phy sical disks are used to store configuration information. Phy sical Disk States The storage array recognizes the physica l disk states. Mode and status o[...]
-
Page 39
Planning: MD3200i Series Storage Array T erms and Concepts 39 If a disk drive rebuild fails because of a source drive failur e or because the drive is too small, the MDSM r eports a failure of the phys ical disk even though the LED state on the drive in di cates the rebuild was aborted (green for 3 seconds, amber for 3 seco nds, then off for 3 seco[...]
-
Page 40
40 Planning: MD3200i Series St orage Array T erms and Concepts Disk groups are always created in the un configured capacity of a storage arra y . Unconfigured capacity is the availa ble physical disk space not already assigned i n the storage array . Virtual disk s ar e cr eated within the free ca pacity of a disk group. F r ee capacity is the spac[...]
-
Page 41
Planning: MD3200i Series Storage Array T erms and Concepts 41 Each R AID level provides dif ferent pe rformance and protection. Y ou should select a R AID level based on the type of application, access, fault toler ance, and data you are storing. The storage array supports RAID levels 0, 1, 5, 6, and 10. The m aximum number of physical disks that c[...]
-
Page 42
42 Planning: MD3200i Series St orage Array T erms and Concepts RAID 1 is r ecommended for small datab ase s or other applications that do not req u ire la rg e c a pa c it y fo r exa m pl e accounting, payroll, or financial applications. RAID 1 provides full data r edundancy . RAID 5 RAID 5 uses parity and s triping data across all physical disks ([...]
-
Page 43
Planning: MD3200i Series Storage Array T erms and Concepts 43 The segment size or stripe element s ize specifies the size of data in a stripe written to a single disk. The storage ar ray supports stripe element sizes of 8, 16, 32, 64, 128, 256, and 512 KB. The de fault stripe element size is 128 KB. Stripe width, or depth, re fers to the number of [...]
-
Page 44
44 Planning: MD3200i Series St orage Array T erms and Concepts A consistency check is simila r to a background initialization. The difference is that background initialization cannot be started or stopped manually , while consistency check can. NOTE: Dell recommends that you run data consistency checks on a redundant array at least once a month. Th[...]
-
Page 45
Planning: MD3200i Series Storage Array T erms and Concepts 45 • F oreground initialization • Consistency check •R e b u i l d •C o p y b a c k . If a redundant RAID controller modul e fails with existing vi rtual disk processes, the proc esses on the failed controller are transferr ed to the peer controller . A transferred process is placed[...]
-
Page 46
46 Planning: MD3200i Series St orage Array T erms and Concepts • If I/O activity stretches beyond the segment size, you can increase it to reduce the number of disks required for a single I/O . Using a single physical disk for a single request fr ees disks to service other requests, especially when you have multiple use rs accessing a datab ase o[...]
-
Page 47
Planning: MD3200i Series Storage Array T erms and Concepts 47 • Virtual disk R AID level migration • Segment size migration • Virtual disk capacity expansion • Disk group expansion • Disk group defragmentation. If a redundant RAID controller modul e fails with an e xisting disk group process, the proces s on the faile d co ntroller is tra[...]
-
Page 48
48 Planning: MD3200i Series St orage Array T erms and Concepts NOTE: Setting a high priority level impact s storage array performance. It is not advisable to set priority levels at t he maximum level. Priority should also be assessed in terms of impact to host server access and time to complete an operation. For example, the longer a rebui ld of a [...]
-
Page 49
Planning: MD3200i Series Storage Array T erms and Concepts 49 Use either of the following methods to move disk groups and virtual disks: • Hot virtual disk migration—Dis k migration with the destination s torage array power turned on. • Cold virtual disk migration—Disk migration with the destination storage array power turned off. NOTE: T o[...]
-
Page 50
50 Planning: MD3200i Series St orage Array T erms and Concepts • Enabling premium features before migration—Before migrating disk groups and virtual disks, enable th e r equir ed premium features on the destination storage array . If a disk group is migrated from a MD3200i storage array that has a premium featur e enabled and the destination ar[...]
-
Page 51
Planning: MD3200i Series Storage Array T erms and Concepts 51 • Host server -to-virtual disk mappings ar e shared between R AID controller modules in the storage array . • A unique LUN must be used by a host group or host server to access a virtual disk. • Not every operating system has the same number of L UNs available for use. Host T ypes [...]
-
Page 52
52 Planning: MD3200i Series St orage Array T erms and Concepts Snapshot Repository Virtual Disk When you create a snapshot virtual disk, it automatically creates a snapshot repository virtual disk. A sn apshot repository is a vi rt ual disk created in the storage array as a resource for a s napsh ot virtual disk. A snapshot repository virtual disk [...]
-
Page 53
Planning: MD3200i Series Storage Array T erms and Concepts 53 Source Virtual Disk When you create a virtual di sk copy , a cop y pair consis ting of a source virtual disk and a targ et virtual disk is crea ted on t he same sto rage array . When a virtual disk copy is started, data fr om the source virtual disk is copied completely to the target vir[...]
-
Page 54
54 Planning: MD3200i Series St orage Array T erms and Concepts Y ou can copy data from a virt ual disk in one of two ways: • By taking a point-in-time snapshot of the data • By copying the data to another virtual disk using a virtual disk copy Y ou can select a snapshot virtual disk as the source virtual disk for a virtual disk copy . This conf[...]
-
Page 55
Planning: MD3200i Series Storage Array T erms and Concepts 55 • Physically removed • Updating firmware • Involved in an event that caused failover to the alternate controller P aths used by the preferr ed RAID contro ller module to access either the disks or the host server are called the preferr ed paths; r edundant paths are called the alte[...]
-
Page 56
56 Planning: MD3200i Series St orage Array T erms and Concepts paths to the R AID controller module th at owns the virtual disk equally for I/O activity . P aths to the secondary RAID controller module are ignor ed until ownership changes. Th e basic assumption for the round -robin policy is that the data paths ar e equal. W ith mixed host support,[...]
-
Page 57
Planning: MD3200i Series Storage Array T erms and Concepts 57 • If the storage array you ar e monitoring begins in or transitions to an unresponsive state, an informational dialog appears. The dialog informs you that the P erformance Monitor ca nnot poll the storage array for performance data. T o monitor the performance of the arrays: 1 Open MDS[...]
-
Page 58
58 Planning: MD3200i Series St orage Array T erms and Concepts 10 T yp e a file name in the Fi l e n a m e text box. NOTE: The .perf extension is the default. 11 Select a file type from the F iles of type list. • Use the Report format (ASCII text) file type if you want to s ave the data to a report form for viewing or printing. • Use the Comma [...]
-
Page 59
Configuration: Overview 59 5 Configuration: Overview Dell™ P owerV ault™ Modular Disk Stor age Manager (MDSM) online help contains information on the how to use the MDSM application to perform the configuration and management task s described in this documen t. Y o u can access online help by clicking Help loca ted at the top right corner of MD[...]
-
Page 60
60 Configuration: Overview Enterprise Mana gement Window The EMW provides high-level manageme nt of storage arrays. When you start MDSM, the EMW opens. The EMW has thes e tabs: • Devices tab—P rovides information about the storage arrays. • Setup tab—P resents the initial setup ta sks that guide you through adding storage arrays and configu[...]
-
Page 61
Configuration: Overview 61 Inheriting the Sy stem Settings Use the Inherit Syst em Settings option to import the operating system theme settings into the MDSM. Im porting system theme settings affe cts such features as font type, font size, color , and contrast in the MDSM. 1 Open the Inherit System Settings window in one of these ways: • Select [...]
-
Page 62
62 Configuration: Overview • Logical tab—Y o u can view the or ganiza tion of the storage array by virtual disks, disk grou ps, fr ee capacity no des, and an y unconfigur ed capacity for the storage array . • Physical tab—Y ou can view the organization of the storage array by RAID controller modules, physica l disks, and other hardwar e com[...]
-
Page 63
Configuration: About Y our Storage Array 63 6 Configuration: About Y our Storage Array Out-of-Band and In-Band Management Y ou can manage a storage array in two ways: • Out-of -band management • In-band management Out-of-Band Management Using the out-of-band management method, data is separate from commands and events. Data travels thro ugh the[...]
-
Page 64
64 Configuration: About Y our Storage Array In-Band Management Using in-band-management, commands, ev ents, and data travel through the host-to-controller interface. Unlike out-of -band management, commands and events are mix ed with data. NOTE: For detailed info rmation on settin g up in-band and out-of-band management see the Deployment Guide . W[...]
-
Page 65
Configuration: About Y our Storage Array 65 NOTE: For Linux, set the default gateway so that broadcast packets are sent to 255.255.255.0. For R ed Hat® Enterprise Li nux®, if no g ateway exists on the network, set the default gateway to the IP address of the NIC. NOTE: MDSM uses TCP/UDP por t 2463 for communication to the MD Storage Array . Autom[...]
-
Page 66
66 Configuration: About Y our Storage Array NOTE: When adding a storage array using in-band management with iSCSI, a session must first be established between the initiator on the host server and the storage array . For more information, see "Configuration: Using iSCSI" on page 81. NOTE: The host age nt must be restarted before in-band ma[...]
-
Page 67
Configuration: About Y our Storage Array 67 • Configure the storage array—Cr eate disk groups, virtual disks, and hot spare physical disks by using the A u tomatic configuration method or the Manual configuration method. F or more information, see the Po w e r Va u l t Modular Disk Storage Manager online help topics. • Map virtual disks —Ma[...]
-
Page 68
68 Configuration: About Y our Storage Array • In the AMW , select Storage Array Blink Storage Array . The LEDs blink on the physical disks in the storage ar ray . 2 After locating the storage array , click OK . The LEDs stop blinking. 3 If the LEDs do not stop blink ing, select Storage Array Blink Stop All Indications . A[...]
-
Page 69
Configuration: About Y our Storage Array 69 5 Click Ye s . The new storage array name appears in the Se lect storage array table. 6 Repeat step 2 through step 4 to name or rename additional storage arrays. NOTE: A void arbitrary names or names that might lose meaning in the future. Setting a Password Y ou can configure each storage array with a pas[...]
-
Page 70
70 Configuration: About Y our Storage Array 6 Click OK . NOTE: Y ou are not prompted for a password when you attempt to change the storage array configuration in the current management session. Password Guidelines F o llow these guidelines when you create a password: • Use secure passwords for your storage array . A password should be easy for yo[...]
-
Page 71
Configuration: About Y our Storage Array 71 Adding/Editing a Comment to an Existin g Storage Array A descriptive comment, with an applic able storage array name, is a helpful identification tool. Y ou can add or edit a comment for a storage array in the EMW only . T o add or edit a comment: 1 In the EMW , select the Devices tab and select the relev[...]
-
Page 72
72 Configuration: About Y our Storage Array Enabling Premium Features Y ou can enable premium features on the storage array . T o enable the premium fe atur es, you must ob tain a featur e k ey file specifi c to the pr emium feature that you want to enable from your storage supplier . T o enable premium features: 1 F rom the toolbar in AMW , select[...]
-
Page 73
Configuration: About Y our Storage Array 73 2 Select or enter the percentage of unwr itten data in the cache to trigger a cache flush in Start flushing . 3 Select or enter the percentage of un written data in the cache to stop a cache flush in progress in Stop flushing . 4 Select the appropriate Cache block size . A smaller cache size is a good cho[...]
-
Page 74
74 Configuration: About Y our Storage Array 3 Click OK . 4 If you have set a p assword for the selected storage array , the Enter Pa s s w o r d dialog appears. T ype the current password for the storage array . 5 Click OK . Configuring Alert Notifications MDSM can send an alert for any conditio n on the storage array that r equir es your attention[...]
-
Page 75
Configuration: About Y our Storage Array 75 • In the T ree view or the T able view on the Devices tab in the EMW , select a node, and then select Edit Configure Alerts . Go to step 3. • I n the Setup tab in the EMW , sele ct Configure Alerts. Go to step 2 . 2 Select one of the following radio buttons to specify an alert level: • All stora[...]
-
Page 76
76 Configuration: About Y our Storage Array • Replacing an e-mail address—In the Configured email addresses area, select the e-mail address to be re placed, type the r eplacement e-mail address in Email address , and click Rep la ce . • Deleting an e-mail addr ess—In the Configured email addresses area , select the e-mail address, and cli c[...]
-
Page 77
Configuration: About Y our Storage Array 77 • Y ou must use fully qualified e- mail addresses, for example, name@mycompany .com. • Y ou can configure multiple e-mail ad dresses before you click OK . Configuring SNMP Alerts T o add a management console to the list of addresses configured to r eceive SNMP a lerts: 1 Open the Configure Alerts dial[...]
-
Page 78
78 Configuration: About Y our Storage Array • Replacing an SNMP address—Select the SNMP addr ess in the Configured SNMP addresses area, type the r eplacement community name in Community name and the trap destination in Tr a p destination , and click Rep la ce . • Deleting an SNMP addr ess—Sele ct the SNMP address in the Configured SNMP addr[...]
-
Page 79
Configuration: About Y our Storage Array 79 A learn cycle starts automatically wh en you install a new battery module. Learn cycles for batteries in both RAID controller modules in a duple x system occur simultaneously . Learn cycles ar e scheduled to st art automatically at r egular intervals, at the same time and on the same day of the week. The [...]
-
Page 80
80 Configuration: About Y our Storage Array 1 In the AMW , select Storage Array Synchronize RA ID Controller Module Clocks . 2 If a password is set, in the Enter P assword dialog, type the current password for the storage array , and click Synchronize . The R AID controller module clocks ar e synchronized with the storage management station. bo[...]
-
Page 81
Configuration: Using iSCSI 81 7 Configuration: Using iSCSI Changing the iSCSI T arget Authentication T o change the iSCSI ta rget authentication: 1 In the AMW , select the Setup tab. 2 Select Manage iSCSI Setti ngs . The Manage iSCSI Settings window is displa yed and by def ault, the T arget A uthentication tab is selected. T o ch ange the authenti[...]
-
Page 82
82 Configuration: Using iSCSI Entering Mutual Authentication Permissions Mutual authentication or two-way authen t ication is a way for a client or a user to verify themselves to a host serv er , and for the host server to validate itself to the user . This validation is accomplished in such a way that both parties are sur e of the ot her ’s iden[...]
-
Page 83
Configuration: Using iSCSI 83 Initiator CHAP Secret The initiator CHAP se cret is set on the host using the iSCSI initiator configuration program provided with th e host operatin g system. If you are using the mutual authentication meth od, you must define the initiator CHAP secret when you set up the host. This must be the same CHAP secret that is[...]
-
Page 84
84 Configuration: Using iSCSI Changing the iSCSI T arget Identification Y ou cannot change the iSCSI tar get name, but you can associate an alias with the targ et for simpler identification. Aliases are useful because the iSCSI targe t names ar e not intuitive. Y ou should provide an iSCSI tar get alias that is meaningful and easy to r emember . T [...]
-
Page 85
Configuration: Using iSCSI 85 • Select Specify Configuration , and type the IPv4 address to activate the target discovery . • T ype the iSNS server IP address in the IPv6 settings area to activate the target discovery . After you manually enter an IP addr ess, you can also click Advanced to configure the customized T CP listening ports. If you [...]
-
Page 86
86 Configuration: Using iSCSI 4 T o use the IPv4 settings for the iSCSI host port, select Enable IP v4 and select the IPv4 Settings tab. 5 T o use the IPv6 settings for the iSCSI host port, select Enable IP v6 and select the IPv6 Settings tab. 6 T o configure the IPv4 and IPv6 settin gs: • T o automatically configur e the settings, select Obtain [...]
-
Page 87
Configuration: Using iSCSI 87 Advanced iSCSI Host Ports Settings NOTE: Configuring the advanced iSCSI hos t ports settings is optional. Use the advanced settings for the indivi dual iSCSI host ports to specify the TCP frame size, the virtual LA N, and the network priority . NOTE: Changing any of these settings resets the iSCSI port. I/O is interrup[...]
-
Page 88
88 Configuration: Using iSCSI Vi ewing or Ending an iSCSI Session Y ou might want to end an iSCSI session for the follo wing rea sons: • Unauthorized access—If an initiator is logged on whom you consider to not have access, you can end the iSCSI session. Ending the iSCSI session forces the initiator to log off the stor age array . The initiator[...]
-
Page 89
Configuration: Using iSCSI 89 V iewing iSCSI Statistics and Setting Baseline Statistics T o view iSCSI statistics an d set baseline statistics: 1 In the AMW toolbar , select Storage Array iSCSI Statistics . The Vi e w i S C S I S t a t i s t i c s window is displayed. 2 Select the iSCSI statistic type you want to view in the iSCSI Stat isti[...]
-
Page 90
90 Configuration: Using iSCSI Edit, Remove, or Rename Host T opology If you give access to the wrong host or the wrong host group, you can r emove or edit the host topology . T o correct the host topology : F o r more informatio n about Host, H ost Groups, and Host T opology , refer to "Configuration : About Y our Host" on page 93. T able[...]
-
Page 91
Configuration: Event Monitor 91 8 Configuration: Event Monitor An event monitor is provided with De ll™ P owerV ault™ Modular Disk Storage Manager (MDSM). The event monitor runs continuous ly in the background and monitors activity on the managed storage arrays. If the event monitor detects any crit ical problems, it can notify a host or r emot[...]
-
Page 92
92 Configuration: Event Monitor NOTE: It is recommended that you configure the event monitor to start by default on a management station that runs 24 hours a day . Windows T o enable or disable the eve nt monitor: 1 Click Start Settings Control P anel Administrative T ools Services . or Click Start Administrative T ools Serv[...]
-
Page 93
Configuration: About Y our Host 93 9 Configuration: About Y our Host Configuring Host Access Modular Disk Storage Manager (MDSM) software is comprised of mu ltiple modules. One of these modules is the Host Conte xt Agent. The host conte xt agent is installed as part of the MDSM installation and runs continuously in the background. If the host conte[...]
-
Page 94
94 Configuration: About Y our Host • Create a host and assign an alias or user label. • Add or associate a ne w host port identifier to a particular host. • Change the host p ort identifier alias or user label. • Move or associate a host port identifier to a differ ent host. • Replace a host port id entifier with a new hos t port identifi[...]
-
Page 95
Configuration: About Y our Host 95 • Select the Mappings tab. Right-click the root node (storage array name), Default Group node, or Host Group node in the To p o l o g y pane to which you want to ad d the host, and se lect Define Host from the pop-up menu. The Specify Host Name window is displa yed. 3 In Host name , enter an up to 30 charact[...]
-
Page 96
96 Configuration: About Y our Host The Pr e v i e w window is displa yed. 11 Click Fi n i s h . Removing Host Access T o remove host access: 1 In the AMW , select the Mappings tab, select the host node in the To p o l o g y pane. 2 P erform one of these actions: • Select Mappings Rem ov e . • Right-click the host node, and select Rem ov e f[...]
-
Page 97
Configuration: About Y our Host 97 • Right-click the storage array or the Default Group, and select Define Host Group from the pop-up menu. 4 T ype the name of the new host group in Enter new host group name . 5 Select the appropriate hosts in the Select hosts to add are a. 6 Click Add . NOTE: T o remove hosts, select the hosts in the Hosts i[...]
-
Page 98
98 Configuration: About Y our Host 4 Click Ye s . The host is moved to the selected ho st group with the following mappings: • The host retains the specific virt ual disk mappin gs assigned to it. • The host inherits the virtual disk mappings assigned to the host group to which it is moved. • The host loses the virtual disk mappings assigned [...]
-
Page 99
Configuration: About Y our Host 99 • Changing a host type MDSM automatically detect s these changes for any host running the host agent software. Starting or St opping the Host Conte xt Agent The host context agent discovers the ho st topology . The host context agent starts and stops with the host. The topo logy discover ed by the host conte xt [...]
-
Page 100
100 Configuration: About Y our Host 4 Click Action Start . I/O Data Path Protection Y ou can have multiple host -to- array connections for a host. Ensure that you select all the connections to the array when configuring ho st access to the storage array . NOTE: See the Deployment Guide for more information on cabling configurations. NOTE: For m[...]
-
Page 101
Configuration: About Y our Host 101 Managing Host Port Identifiers Y ou can manage the host port identifiers that are added to the stor age array . Y ou can: • Add—Add or associate a new host port identifier to a particular host. • Edit—Change the host port identifier alias or user l abel. Y ou can move (associate) the host port ide ntifier[...]
-
Page 102
102 Configuration: About Y our Host • Add by creating a new host port identifier —In New host port identifier , enter the name of the new host port identifier . 6 In User label , enter up to 30 character alphanumeric name. 7 In Associated with host , select the appropriate host or host group. 8 Select the host port identif ier that you would li[...]
-
Page 103
Configuration: Disk Groups and Virtual Disks 103 10 Configuration: Disk Groups and V irtual Disks Creating Disk Groups and Virtual Disks Disk groups ar e cr eated in the unconfig ur ed capacity of a storage array , and virtual disks ar e created in the fr ee ca pacity of a disk group. The maximum number of physical disks supported in a disk group i[...]
-
Page 104
104 Configuration: Disk Groups and V irtual Disks A disk group should be organized according to its related tasks and subtasks. F o r example, if you cr eate a disk gr oup for the Accounting Department, you can create virtual disks that matc h the differ ent types of accounting performed in the department: Accounts Receivable (AR), Accounts P ayabl[...]
-
Page 105
Configuration: Disk Gr oups and V irtual Disks 105 3 T ype up to 30-character name of the di sk group in Disk group name . 4 Select the appropriate Physical Disk selection choices , you can select: • Automati c , see step 6 • Manual , see step 9 5 Click Next . 6 F or Automatic configuration, The RA I D L e v e l a n d C a p a c i t y window is [...]
-
Page 106
106 Configuration: Disk Groups and V irtual Disks Locating a Disk Group Y ou can physically locate and identify al l of the physical disks that comprise a selected dis k group. An LED bl inks on each physical disk in the disk group. T o locate a disk group: 1 In the AMW , select the Log i ca l tab. 2 Select the appropriate disk grou p and from the [...]
-
Page 107
Configuration: Disk Gr oups and V irtual Disks 107 T o creat e virtual disks: 1 Choose one of these methods to start the Create Virtual Disk W izard: • T o cr eate a virtual disk from unconfigured capacity in the storage array—On the Log i c al tab, select an Unconfigured Capacity node, and select Vi r t u a l D i s k Create . Alternatively[...]
-
Page 108
108 Configuration: Disk Groups and V irtual Disks • Customize settings . 6 Click Next . 7 In the Customize Advanced V irtual Disk P arameters window , select the appropriate Virtual Disk I/O characteristics type. Y ou can select: • F ile system (typical) • Database •M u l t i m e d i a •C u s t o m NOTE: If you select Custom , you must se[...]
-
Page 109
Configuration: Disk Gr oups and V irtual Disks 109 3 In the toolbar , select Vi r t u a l D i s k Change Modification P riority . The Change Modificati on P riorit y window is di splayed. 4 Select one or more virtual disks. T o select nonadjacent virtual d isks, press <Ctrl> click. T o select adjacent virtual disks, press <Shift>[...]
-
Page 110
110 Configuration: Disk Groups and V irtual Disks The Change Cache Settings window is displa yed. 3 Select one or more virtual disks. T o select nonadjacent virtual disks, press <Ctrl> click. T o select adjacent virtual disks, press <Shift> click. T o select all of th e available virtual disks, click Select All . 4 In the Select cache p[...]
-
Page 111
Configuration: Disk Gr oups and V irtual Disks 111 Changing the Se gment Size of a V irtual Disk Y ou can change the segment size on a selected virtual disk. During this operation, I/O performance is affect ed, but your da ta remains available . Guidelines to procee d with changing the segment siz e: • Y ou cannot cancel this operation af ter it [...]
-
Page 112
112 Configuration: Disk Groups and V irtual Disks The segment size modification ope ration begins. The virtual disk icon in the Lo gical pane shows an Operation in Progress status while the operation is taking place. NOTE: T o view the progress or change the prio rity of the modification operation, select a virtual disk in the disk group, and selec[...]
-
Page 113
Configuration: Disk Gr oups and V irtual Disks 113 NOTE: If you selected the Custom option, select your preferred dynamic cache read prefetch setting (enabled/disabled) and segment size (8KB to 512KB). 2 Click OK . Choosing an Appropriate Phy sical Disk T ype Y ou can cr eate disk groups and virtual disks in the storage array . Y ou must select the[...]
-
Page 114
114 Configuration: Disk Groups and V irtual Disks Whenever the power is turned off and turned on again, al l of the security- enabled physica l disks change to a security locked stat e. In this s tate, the dat a is inaccessible until the correct security key is provided by a R AID controller module. Y ou can view the self encryp ting disk status of[...]
-
Page 115
Configuration: Disk Gr oups and V irtual Disks 115 NOTE: If you have not created a security key for the storage array , the Create Security Key option is active. If you ha ve created a security key for the storage array , the Create Security Key option is in active with a check mark to the left. The Change Security Key option, t he Sa ve Security K[...]
-
Page 116
116 Configuration: Disk Groups and V irtual Disks Creating a Security Key When you create a security key , it is generated by and secur ely stored by the array . Y ou cannot read or view the security ke y . A copy of the security k ey must be kept on some other storage medium for backup in case of system failur e or for transfer to another storage [...]
-
Page 117
Configuration: Disk Gr oups and V irtual Disks 117 The pass phrase that you enter is masked. NOTE: Create Key is active only if the pass phrase meets the above mentioned criterion. 5 In Confirm pass phrase , re-enter the e xact string that you entered in Pa s s phrase . Ma ke a re c o rd o f t he p as s ph r as e th at you entered and the security [...]
-
Page 118
118 Configuration: Disk Groups and V irtual Disks T o change the security key : 1 In the AMW toolbar , select Storage Array Physical Disk Secur ity Change Security K ey . The Confirm Change Security K ey window is disp layed. 2 Ty p e yes in the text field, and click OK . The Change Security K ey window is displayed. 3 In Secure key iden[...]
-
Page 119
Configuration: Disk Gr oups and V irtual Disks 119 Saving a Security Key Y ou save an externally storable copy of the security key when the security key is first created and each time it is changed. Y ou can create additional storable copies at any time . T o save a new copy of the security key , you must provide a pass phrase. The pass phrase you [...]
-
Page 120
120 Configuration: Disk Groups and V irtual Disks Unlocking Secure Phy sical Disks Y ou can export a security-enabled disk group to move the associated physical disks to a different storage array . Afte r you install those physical disks in the new storage array , you must unlock the ph ysical disks before data can be read from or written to the ph[...]
-
Page 121
Configuration: Disk Gr oups and V irtual Disks 121 Configuring Hot Spare Phy sical Disks Guidelines to config ure host spare physical disks: • Y ou can use only unas signed physical d isks with Optimal status as hot spare physical disks. • Y ou can unassign on ly hot spare physical disks with Optimal, or Standby status. Y ou cannot unassign a h[...]
-
Page 122
122 Configuration: Disk Groups and V irtual Disks • Right-click the physical disk and select Hot Spare Coverage from the pop-up menu. The Hot Spare Physical Disk Options window is displayed. 4 Select the appropriate option, you can select: • V iew/change curr ent hot spare cove rage—to review hot spar e coverage and to assign or unassign hot [...]
-
Page 123
Configuration: Disk Gr oups and V irtual Disks 123 Hot Spares and Rebuild A valuable strategy to protect data is to assign available physical disks in the storage array as hot spares. A hot spar e a dds another level of fault tolerance to the storage array . A hot spar e is an i dle, power ed-on, stand-by physic al disk r eady for im mediate use in[...]
-
Page 124
124 Configuration: Disk Groups and V irtual Disks the failed physical disk to the hot spar e physical disk. When you have physically replaced the failed physical disk, a copyback operation occurs from the hot spare physical disk to the replaced physical disk. If there ar e secure disk groups and secu rity capable disk gr oups in the storage array ,[...]
-
Page 125
Configuration: Disk Gr oups and V irtual Disks 125 Enclosur e loss protectio n is achieved when you crea te a disk gro up where a ll of the physical disks that comprise th e disk group ar e loca ted in diffe re nt expansion enclosur es. This distinction depends on the R AID level. If you choose to create a disk group by us ing the Automatic method,[...]
-
Page 126
126 Configuration: Disk Groups and V irtual Disks Host-to-V irtual Disk Mapping After you create virtual disks, you must map them to the host(s) connected to the array . Guidelines to configur e ho st-to-virtual disk mapping: • Each virtual disk in the storage array can be mapped to only one host or host group. • Host-to-virtual disk mappings a[...]
-
Page 127
Configuration: Disk Gr oups and V irtual Disks 127 1 In the AMW , select the Mappings tab. 2 In the To p o l o g y pane, select: • Default Group • Undefined mappings node • Individual defined mapping • Host group • Host 3 In the toolbar , select Mappings Define Additional Mapping . The Define Additional Mapping window is displayed[...]
-
Page 128
128 Configuration: Disk Groups and V irtual Disks Modifying and Removing Host-to-Virtual Disk Mapping Y ou can modify or remove a host-to-virtual disk mapping for several r easons, such as an incorrect mapping or r econfiguration of the storage array . Modifying or r emoving a hos t-to-virtual disk mapping applies to both hosts and host groups. T o[...]
-
Page 129
Configuration: Disk Gr oups and V irtual Disks 129 8 Restart the host applications. Changing Controlle r Ownership of the V irtual Disk If the host has a single data-path to the MD storage array , the virtual disk must be owned by the controller to wh ich the host is connected. Y o u must configure this storage array befor e yo u start I/O operatio[...]
-
Page 130
130 Configuration: Disk Groups and V irtual Disks 3 P erform one of these actions: • Select Mappings Rem ov e . • Right-click the virtual disk, and select Rem ov e M a pp in g from the pop-up menu. 4 Click Ye s to remove the mapping. Changing the RAI D Controller Modul e Ownership of a Disk Gr oup Y ou can change the R AID controller mo dul[...]
-
Page 131
Configuration: Disk Gr oups and V irtual Disks 131 The ownership of the disk group is changed. I/O to the disk group is now directed through this I/O path. Y ou are finished with this procedur e. NOTE: The disk group might not use the new I/O path until the multi-path driver reconfigures and recognizes the new path. This action usually takes less t[...]
-
Page 132
132 Configuration: Disk Groups and V irtual Disks Restricted Mappings Many hosts are able to map up to 256 lo gical unit numbers (L UNs) (0 to 255) per storage partition. However , the maximum number of mappings differs because of operating syste m variables, failover driver issues, and potential data problems. The hosts li st ed in the table have [...]
-
Page 133
Configuration: Disk Gr oups and V irtual Disks 133 • Y ou cannot move a host with a restricted host type into a storage partition that already has L UNs mapped that are gr eater than what is allowed by the restricted host type. F or example, if you have a restricted host type that allows only L UNs up to 31, you cannot move that r estricted host [...]
-
Page 134
134 Configuration: Disk Groups and V irtual Disks 1 Do you want to change the RAID controller module ownership of a virtu al disk or a disk group? • Change the R AID controller module owners hip of a virtual disk – Go to step 2. • Change the R AID controller module owners hip of a disk group – Go to step 3. 2 T o change the R AID contro lle[...]
-
Page 135
Configuration: Disk Gr oups and V irtual Disks 135 CAUTION: Possible loss of data access– C hanging ownership at the disk group level causes every virtual disk in that disk group to transfer to the other RAID controller module and use the new I/O path. If you do not want to set every virtual disk to the new path, change ownership at the virtual d[...]
-
Page 136
136 Configuration: Disk Groups and V irtual Disks Storage Partitioning A storage partition is a logical enti ty co nsisting of one or more virtual disks that can be accessed by a si ngle host or shared among hosts that ar e part of a host group. The first time you map a virtu al disk to a specific host or host group, a storage partition is created.[...]
-
Page 137
Configuration: Disk Gr oups and V irtual Disks 137 NOTE: Y ou can include a secondary virtual di sk in a storag e partition. However , any hosts that are mapped to the secondary virtual disk has read-only access until the virtual disk is promoted to a primary virtual disk, or the mirror relationship is removed. Storage partitioning topology is the [...]
-
Page 138
138 Configuration: Disk Groups and V irtual Disks 5 Click Add . A message prompts you to confirm your selection. 6 T o add the capacity to the disk group, click Ye s . Y ou can also use the Command Line Interface (CLI) on both W indows and Linux hosts to add free capacity to a disk group. Se e the CLI Guide for mor e information. After the capacity[...]
-
Page 139
Configuration: Disk Gr oups and V irtual Disks 139 F or more information, see the P owerV ault Modular Disk Storage Manager online help topics. Disk Group Migration Disk group migration allows to you export a disk grou p so that you can import the disk group to a different storage arra y . Y ou can also export a disk group so that you can sto re th[...]
-
Page 140
140 Configuration: Disk Groups and V irtual Disks 2 Stop all I/O , and unmount or disconnect the file systems on the virtual disks in the di sk group. 3 Back up the data on the virt ual disks in the disk group. 4 Locate the disk group, and label the physical disks. 5 Place the disk group offline. 6 Obtain blank ph ysical disk modu les or new physic[...]
-
Page 141
Configuration: Disk Gr oups and V irtual Disks 141 NOTE: Some settings cannot be import ed during the import disk group procedure. The following settings are remove d/cleared during the procedur e: • P ersistent reservations • Host-to-virtual disk mappings • Virtual disk copy pairs • Snapshot virtual disks and snapshot repository virtual di[...]
-
Page 142
142 Configuration: Disk Groups and V irtual Disks • Recovered media error—Data could not be re a d b y t h e p h y s i c a l d is k o n t he first attempt but was successfully re ad on a subsequent attempt. Data is rewritten to the physical disk and veri fied and the error is reported to the event lo g. • Redundancy mismatches error—The fi [...]
-
Page 143
Configuration: Disk Gr oups and V irtual Disks 143 8 Click OK . Suspending the Media Scan Y ou cannot perform a media scan whil e performing another long-running operation on the disk drive such as reconstruction, copy-back, reconfig uration, virtual disk initialization, or i mmediate availability formatting. If you want to perform anoth er long -r[...]
-
Page 144
144 Configuration: Disk Groups and V irtual Disks book.book Page 144 Wedn esday, May 26, 2010 2:14 PM[...]
-
Page 145
Configuration: Premium Featur e—Snapshot V irtual Disks 145 11 Configuration: Premium Feature— Snapshot V irtual Disks NOTE: If you ordered this featur e, you recei ved a Premium Feature Activation card shipped in the same box as your Dell PowerVault MD storage array . Follow the directions on the card to obtain a key file and to enable the fea[...]
-
Page 146
146 Configuration: Premium F eature—Snapshot V irtual Disks repository uses less disk space than a full physical copy , because the only data blocks that ar e stor ed in the snapshot r epository virtua l disk are those that have changed since th e time of the snapshot. When you create a snapshot virtual di sk, you specify its location, capacity ,[...]
-
Page 147
Configuration: Premium Featur e—Snapshot V irtual Disks 147 • Snapshot Repository Virtual Disk Name—A user -specified name that helps you associate the s napshot repository virtual disk to its corresponding snapshot virtual disk and source virtual di sk. • Snapshot Repository Virtual Disk Capacity—T he snapshot repository virtual disk cap[...]
-
Page 148
148 Configuration: Premium F eature—Snapshot V irtual Disks • Snapshot r epository virtual disks • Snapshot virtual disks • T arget virtual disks that are participating in a virtual di sk copy . NOTE: V irtual Disk Copy is an Advanced (Premium) feature. • Y ou cannot create a snapshot of a virtual disk that contains unreadable sectors. ?[...]
-
Page 149
Configuration: Premium Featur e—Snapshot V irtual Disks 149 6 Enter the snapshot repository virtual di sks capacity as a percentage of the source virtual disks capacity and click Next . The Pr e v i e w window containing the summary of the snapshot virtual disk is displayed. 7 Click Fi n i s h . The Completed window is displ ayed. 8 Click OK . Af[...]
-
Page 150
150 Configuration: Premium F eature—Snapshot V irtual Disks • Snapshot Virtual Disk Name—A user -specified name that helps you associate the snapshot virtual disk to its corresponding snapshot repository virtual disk and so urce virtual disk. • Snapshot Repository Virtual Disk Name—A user -specified name that helps you associate the snaps[...]
-
Page 151
Configuration: Premium Featur e—Snapshot V irtual Disks 151 Preparing Host Se rvers to Create the Snapshot Using the Advanced Path NOTE: Before using the Snapshot V irtual Disks Premium Feature in a Microsoft® Windows® clustered configuration, you must first map the sn apshot virtual disk to the cluster node that owns the source virt ual disk. [...]
-
Page 152
152 Configuration: Premium F eature—Snapshot V irtual Disks • Y ou must satisfy the requirements of your host operating system for creating snapshot virtual disks. F ailure to meet the requir ements of your host operating system r esults in an inaccurate snapshot of the source virtual disk or the ta rget virtual disk in a virtual dis k copy . N[...]
-
Page 153
Configuration: Premium Featur e—Snapshot V irtual Disks 153 If you want to use a snapshot regularly , such as for backups, use the Disable Snapshot and Re-create Snapshot options to reuse the snapshot. Disabling and re-cr eating snapshots preserves the exi st in g v ir tu al di sk-to-host mappings to the snapshot vi rtual disk. Creating the Snaps[...]
-
Page 154
154 Configuration: Premium F eature—Snapshot V irtual Disks 8 In the Snapshot virtual di sk parameters area, select the r elevant mapping option, you can select: • Automatic • Map later with Storage P artition 9 In the Snapshot repository v irtual disk parameters area, enter the system behavior when: • The snapshot repository virtual disk i[...]
-
Page 155
Configuration: Premium Featur e—Snapshot V irtual Disks 155 The default name for the associated snap shot r epository virtual disk that is shown in the Snapsho t repository virtual disk field is: <source-virtual disk-name>—R<sequence-number> F or example, if you ar e cr eating the fi rst snapshot virtual disk for a source virtual di[...]
-
Page 156
156 Configuration: Premium F eature—Snapshot V irtual Disks Snapshot Repository Capacity If you r eceive a warning that the ca pacity for the snapshot r epository virtual disk is approaching its threshold, you ca n increase the capacity of a snapshot repository virtual disk by usin g one of the following methods : • Use the free capacity availa[...]
-
Page 157
Configuration: Premium Featur e—Snapshot V irtual Disks 157 capacity is availabl e, the maximum f ree space appears in the Increase capacity by . If fr ee capacity does not exist on the di sk group, the free space that appears in the Increase capacity by spinner box is 0. Y ou must add physical disks to create free capacity on the disk group. 4 T[...]
-
Page 158
158 Configuration: Premium F eature—Snapshot V irtual Disks NOTE: The phy sical disks that appear has a capacity that is either the same size or larger than the capacity of t he phy sical disks already being used by the disk group. 9 Select either a single p hysical disk to add or two physical disks to add. 10 Click Add . The Add Physical Disks w[...]
-
Page 159
Configuration: Premium Featur e—Snapshot V irtual Disks 159 Re-creating Snapshot Vi rtual Disks Y ou can re-create a snapshot virtual disk that you have previously disabled. CAUTION: Possible loss of data redundancy – If the snapshot virtual disk is in Optimal stat us, it is first disabled prior to being re-cr eated. This action invalidates the[...]
-
Page 160
160 Configuration: Premium F eature—Snapshot V irtual Disks NOTE: If you do not intend to re-create the s napshot virtual disk at a later time, in the Logical pane, select the snap shot virtual disk, and select Virtual Disk Delete to remove it. The associated snapshot reposit ory virtual disk is also removed. Refer to the PowerV ault Modul[...]
-
Page 161
Configuration: Premium Featur e—Snapshot V irtual Disks 161 3 Click the Summary tab, then click Disk Groups & V irtual Disks to ensure that the snapshot virtual disk is in Optimal or Disabled status . 4 Remove the drive letter(s) of the sour ce and (if mounted) snapshot virtual disk in W indows or unmount the virtual drive(s) in Lin ux to hel[...]
-
Page 162
162 Configuration: Premium F eature—Snapshot V irtual Disks book.book Page 162 Wedn esday, May 26, 2010 2:14 PM[...]
-
Page 163
Configuration: Premium Feature—V irtual Disk Copy 163 12 Configuration: Premium Feature— V irtual Disk Copy NOTE: A virtual disk cop y overwrit es data on the target virtual disk. Before starting a virtual disk copy , ensure that you no longer need the data or back up the data on the target virtual disk. NOTE: If you ordered this featur e, you [...]
-
Page 164
164 Configuration: Premium F eature—V irtual Disk Copy • Copying data for improved access—As your storage requirements for a virtual disk change, you can use a virtual disk copy to copy data to a virtual disk in a disk group that uses drives with larger capacity within the same storage array . Copying data for larger access capacity enables y[...]
-
Page 165
Configuration: Premium Feature—V irtual Disk Copy 165 V irtual Disk Read/Write Permissions After the virtual disk copy is complete , the tar get virtual disk automatically be co m es rea d- o nl y t o t he h os ts . Th e t arg e t v ir tu al d is k re je c ts rea d a nd w ri te requests whil e the virtual disk copy op eration has a status of P en[...]
-
Page 166
166 Configuration: Premium F eature—V irtual Disk Copy • A virtual disk can be selected as a target virtual disk for only one virtual disk copy at a time. • A virtual disk copy for any virtual disk cannot be mounted on the same host as the source virtua l disk. • W indows does not allow a drive letter to be assigned to a virtual disk copy .[...]
-
Page 167
Configuration: Premium Feature—V irtual Disk Copy 167 •T h e Create Copy Wizard , which assist s in creating a virtual disk copy •T h e Copy Manager , which monitors virtual disk copies after they have been created Before you Begin A virtual disk copy fails all snapshot virtual disk s that ar e associ ated with the target virtual disk, if any[...]
-
Page 168
168 Configuration: Premium F eature—V irtual Disk Copy Failed Virtual Disk Copy A virtual disk copy can fail due to these condit ions: • A read error from the source virtual disk • A write error to the target virtual disk • A failure in the storage array that aff ects the source virtual disk or the target virtual disk. When the virtual disk[...]
-
Page 169
Configuration: Premium Feature—V irtual Disk Copy 169 Copy Manager After you create a virtual disk copy by using the Create Copy W izard, you can monitor the virtual disk copy through the Copy Manager . F rom the Copy Manager , a virtual disk copy may be re -copied, stopped, or r emoved. Y ou can also modify the attributes, such as the co py prio[...]
-
Page 170
170 Configuration: Premium F eature—V irtual Disk Copy 5 In the Select source virtual disk are, select the appropriate virtual disk and click Ne xt. The Select T arget V irtual Disk and Copy P riori ty window is displayed. 6 In the Select target virtual disk area, select the appropriate virtual disk 7 In the Select copy priority area , select the[...]
-
Page 171
Configuration: Premium Feature—V irtual Disk Copy 171 • Before the virtual disk copy begins • While the virtual disk copy h as a status of In P rogress • When you re-cr eate a virtual disk copy T o set copy priority: 1 In the AMW , select Vi r t u a l D i s k Copy Copy Manager . The Copy Manager window is d isplayed. 2 In the table,[...]
-
Page 172
172 Configuration: Premium F eature—V irtual Disk Copy Recopying a Vi rtual Disk Y ou can recopy a virtual disk when you have stopped a virtu al disk copy and you want to start it a gain or when a virtual disk copy has failed. The Recopy option o verwrites existing data on the target virtual disk and makes the tar get virtual disk read-only to ho[...]
-
Page 173
Configuration: Premium Feature—V irtual Disk Copy 173 5 F ollow any additional instructions for your operating system. F ailur e to follow these additional instructions ca n create unusable virtual disk copies. NOTE: If your operating sy stem requires additional instructions, you can find those instructions in your operating sy stem documentation[...]
-
Page 174
174 Configuration: Premium F eature—V irtual Disk Copy NOTE: There are five copy priority rates avai lable: lowest, low , medium, high, and highest. If the copy priority is set at the lowest r ate, I/O activity is prioritized, and the virtual disk copy takes longer . If the copy prio rity is set to the highest prior ity rate, the virtual disk cop[...]
-
Page 175
Configuration: Premium Feature—U pgrading to High-Performance-T ier 175 13 Configuration: Premium Feature— Upgrading to High-Performance- Ti e r The High P erfo rmance Tier pr emium feature on an MD3200i Series array increases the performance of the system beyond that of a M D3200i Series array operating at the standard performance level. If th[...]
-
Page 176
176 Configuration: Premium Feature—Upgrading to High-Performance-T ier book.book Page 176 Wedn esday, May 26, 2010 2:14 PM[...]
-
Page 177
Configuration: Device M apper Multipath for Linux 177 14 Configuration: Device Mapper Multipath for Linux Overview The MD3200i Series s torage array uses a Linux operating system softwar e framework, k nown as Device Mappe r (DM), to en able multipath capa bilities on Linux Host Servers. The DM multip ath functionality is provided by a combination [...]
-
Page 178
178 Configuration: Device Mapper Multipath for Linux Using DM Multipathing Devices NOTE: Using or modifyin g any nodes other than the multipathi ng device nodes can result in array or file sy stem problems, including loss of communication with the array and corruption of the file sy ste m. Avoid accessing any device other than the multipathing devi[...]
-
Page 179
Configuration: Device M apper Multipath for Linux 179 NOTE: Any array s configured with MDCU automa tically adds to the list of Devices in the PowerV ault Modular Disk Sto rage Manager Enterprise Management Window (EMW). Device Mapper Configur ation Steps T o com plete the DM multipathing conf iguration and make storage available to the Linux host [...]
-
Page 180
180 Configuration: Device Mapper Multipath for Linux Display the multipath device topology using the multipath command The multipath command adds newly sca nned and mapped virtual disks to the Device Mapper tables an d creates entries for them in the /dev/mapper dire ctory on the host server . These devices ar e the same as any other block devices [...]
-
Page 181
Configuration: Device M apper Multipath for Linux 181 _ round-robin 0 [prio=1][enabled] _ 6:0:0:22 sdcl 69:144 [active][ghost] where: mpathb is the name of the virtual device created by device mapper . It is located in the /dev/mapper directory . DELL is the vendor of the device MD3200i is the model of the device Sdx is the physical path to the o[...]
-
Page 182
182 Configuration: Device Mapper Multipath for Linux # ls Below are some examples of the general mapping formats: On RHEL hosts a partition node has the format /dev/mapper/mpath<x>p<y>, where <x> is the alphabetic number for the multipathing device, <y> is the partition number for this device. On SLES 1 1.x hosts a pa rt iti[...]
-
Page 183
Configuration: Device M apper Multipath for Linux 183 NOTE: T o ensure data integrity protection, reboot a Linux host server attached to an MD3200i Series storage arra y using the procedu re given below . Linux Host Server Reboot Best Practices Its is recommended that you follow the proced ures shown below when rebooting your Linux host server usin[...]
-
Page 184
184 Configuration: Device Mapper Multipath for Linux Only multipathing device nodes an d partition nodes created using the directions provided above should be mounted or in any way accessed by the host system or its users. Limitations and Known Issues • In certain error conditions with the no_path_retry or the queue_if_no_path feature is set, app[...]
-
Page 185
Configuration: Device M apper Multipath for Linux 185 • I/O may hang wh en a Device Mappe r device is deleted before the volume is unmounted. • If the scsi_dh_rdac module is not included in initrd, slower device discovery may be seen and the syslog may become populated with buffer I/O error messages. • I/O may hang if the host server or stora[...]
-
Page 186
186 Configuration: Device Mapper Multipath for Linux Why does the multipath –ll command output not show any devices? F irst verify if the devices ar e discovered or not. The command #cat /proc/scsi/scsi displays all the devices tha t are alr eady discovered. T hen verify the multipath.co nf to ensure that it is been updated with proper settings. [...]
-
Page 187
Management: Firmware Downloads 187 15 Management: Firmware Downloads Downloading RAID Controller and NVSRAM Packages A version number exists for each firm wa re file. The ver s ion number indicates whether the firmware is a major ver sio n or a minor version. Y ou can use the Enterprise Management W indow (EMW) to download and ac tivate both the ma[...]
-
Page 188
188 Management: Firmware Downloads Downloading Both RAID Controller and NVSRAM Firmware NOTE: I/O to the array can continue while y ou are upgrading RAID controller and NVSRAM firmware. NOTE: Dell recommends that the firmware and NVSRAM be upgraded during a maintenance period when the array is not being used for I/O. NOTE: The RAID enclosure must c[...]
-
Page 189
Management: Firmware Downloads 189 7 Click Tr a n s f e r . Keep these guidelines in mind: –I f t h e Tr a n s f e r button is inactive, ensure that you either sele ct an NVSR AM file or cleared the T ransfer NVSRAM file with RAID controller module firmware . – If the file selected is not valid or is not compatible with the current storage arra[...]
-
Page 190
190 Management: Firmware Downloads The Select F ile dialog appears. 13 Select the file to download. 14 Click OK . 15 If you want to download the NVSR AM file with the R AID control ler module firmware, select Download NVSR AM file with firmware in the Select files are a. An y a tt ri bu te s o f t he fi rm wa re fi le ap pe ar in th e Firm wa re f [...]
-
Page 191
Management: Firmware Downloads 191 2 Select Advanced Maintenance Download RAI D C o nt r o ll e r Module NVSRAM or Select the Support tab, and click Download F irmware . In Select download task , select Download R AID controller module NVSR AM and click OK . An error message appears. Click OK to close it, and select a compatible file. 3[...]
-
Page 192
192 Management: Firmware Downloads NOTE: The Details pane shows the details of only one storage array at a time. If you select more than one storage array in the Storage array pane, th e details of the storage array s ar e not shown in the Details pane. 9 Click NVSRAM in the Download are a. NOTE: If you select a storage array that cannot be upgrade[...]
-
Page 193
Management: Firmware Downloads 193 disk called DA Cstor e. D ACstor e and the physical disk firmware enable easier reco nfiguration and migrati on of the physical disks. The physical disk firmware perf orms these functions: • T h e p h ys i ca l di sk f ir m wa re re co rd s t h e l o ca t io n of t he p hy s ic a l d i sk i n a n expansion enclo[...]
-
Page 194
194 Management: Firmware Downloads 3 In the Selected P ackages area , click Add . Navigate to the location of the packages and click OK . The selected package is added to the P ackages to be transferred area. 4 Click Next . The Download Physical Disk F irmware - Select Physical Disks window is displayed. 5 In the Compatible Physical Disks tab, sele[...]
-
Page 195
Management: Firmware Downloads 195 CAUTION: Risk of making expansion enclosure EMM unusable – Do not make any configuration changes to the stor age array while downloading expansion enclosure EMM firmware. Doing so could cause the firmware download to fail and make the selected expan sion enclosure unusa ble. 1 P erform one of these actions: •I[...]
-
Page 196
196 Management: Firmware Downloads • The download succeeded—The statuses of all the expansion enclosures show Comple te. Y ou can close the Download environmental (EMM) Card F irmware dialog by clicking Close . The expansion enclosure EMM cards ar e now operating with the new firmwa re . • The download failed—The status of one expansion enc[...]
-
Page 197
Management: Installing Array Components 197 16 Management: Installing Array Components Recommended T ools Y ou may need the f ollowing items to pe rform the procedur es in this section: • Key to the system k eylock •# 2 P h i l l i p s s c r e w d r i v e r •W rist grounding stra p book.book Page 197 Wedn esday, May 26, 2010 2:14 PM[...]
-
Page 198
198 Management: Installing Array Components Front Bezel (Optional) Removing the Front Bezel 1 Using the system key , unlock the front bezel (if locked). 2 Lift up the release latch next to the k eylock. 3 Rotate the left end of the be zel away from the front panel. 4 Unhook the right end of the bezel and pull the bezel away from the system. Figure [...]
-
Page 199
Management: Installing Array Components 199 Hard Drives SAFETY : Models AMT , E03J, and E04J Models AMT , E03J, and E04J ar e intended for installation only in restricted access locations as defined in cl 1.2.7.3 of IEC 60950-1:2005. Depending on your configur ation, your array either supports up to 24 2.5-inch SAS hard drives or up to 12 3.5-inch [...]
-
Page 200
200 Management: Installing Array Components Figure 16-3. Removing and Installi ng a 2.5-Inch Hard-Drive Blank Installing a Drive Bl ank 1 If installed, remove the front bezel . See "Removing the F ront Bezel" on page 198. 2 Insert the drive blank into the drive bay until the blank is fully seated . 3 Close the handle to lock the blank in [...]
-
Page 201
Management: Installing Array Components 201 2 F rom the Modular Disk Storage Manager (MDSM) software, pr epare the drive for r emoval. W ait until the hard-drive indicators on the drive carrier signal that the drive can be removed safely . F or more information, see your controller documentation fo r information about hot-swap drive removal. If the[...]
-
Page 202
202 Management: Installing Array Components Installing a Hard Drive CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou should only perform troubleshooting and simple repairs as authorized in your product documentation, or as dir ected by the online or telephone service and support team. Damage due to servicing that is n[...]
-
Page 203
Management: Installing Array Components 203 Figure 16-5. Removing and Installing a Hard Drive Into a 3.5-Inc h Drive Carrier 1 screws (4) 2 drive carrier 3 SAS screw hole 4 hard drive 4 2 1 3 book.book Page 203 Wedn esday, May 26, 2010 2:14 PM[...]
-
Page 204
204 Management: Installing Array Components Figure 16-6. Removing and Installing a Ha rd Drive Into a 2.5-Inch Drive Carrier 1 screws (4) 2 drive carrier 3 SAS screw hole 4 hard drive 2 1 3 4 book.book Page 204 Wedn esday, May 26, 2010 2:14 PM[...]
-
Page 205
Management: Installing Array Components 205 Installing a Hard Drive Into a Drive Carrier 1 Insert the hard drive into the hard -d rive carrier with the connector end of the drive at the back. See F igur e 16-5. 2 Align the screw holes on the hard drive with th e back set of holes on the hard-drive carrier . When aligned correctly , the back of the [...]
-
Page 206
206 Management: Installing Array Components 5 Connect all the power cables to the array . 6 T ur n on the array and the host server . Figure 16-7. Removing and Instal ling a RAID controller module Blank Installing a RAID Controller Module Blank T o install a R AID controller module blank, align the blank with the R AID controller module bay and ins[...]
-
Page 207
Management: Installing Array Components 207 Removing a RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. Y ou should only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team. Damage due to servicing [...]
-
Page 208
208 Management: Installing Array Components Installing a RAID Controller Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou should only perform troubleshooting and si mple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servici[...]
-
Page 209
Management: Installing Array Components 209 Figure 16-9. Opening and Closing the RAID Controller Module Closing the RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. Y ou should only perform troublesho oting and simple re pairs as authorized in your product documentation, or as directed by the on line [...]
-
Page 210
210 Management: Installing Array Components RAID Controller Module Backup Battery Unit Removing the RAID Controller Module Backup Battery Uni t CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou should only perform troubleshooting and si mple repairs as authorized in your product documentation, or as directed by the onl[...]
-
Page 211
Management: Installing Array Components 211 Installing the RAID Controller Module Backup Batt ery Unit CAUTION: Many repairs may only be done by a certified service technician. Y ou should only perform troublesho oting and simple re pairs as authorized in your product documentation, or as directed by the on line or telephone service and support tea[...]
-
Page 212
212 Management: Installing Array Components support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty . Read and follow the safe ty instructions t hat came with the product. NOTE: If you remove a fully func tioning pow er supply/cooling fan module, the fan speed in the remaining module incr eases significa[...]
-
Page 213
Management: Installing Array Components 213 Figure 16-11. Removing and Installing a Power Supply/Cooling Fan Module 1 release tab 2 power supply 3 power supply handle 1 3 2 book.book Page 213 Wedn esday, May 26, 2010 2:14 PM[...]
-
Page 214
214 Management: Installing Array Components Installing a Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou should only perform troubleshooting and si mple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due t[...]
-
Page 215
Management: Installing Array Components 215 Control Panel Removing the Control Panel 1 T urn of f the array and host server . 2 Disconnect all the power cables connected to the array . 3 Remove the hard drives from: – slots 0 to 2 in P owerV ault MD3200i – slots 0 to 5 in P owerV ault MD3220i See "Removing a Hard Drive" on page 200. N[...]
-
Page 216
216 Management: Installing Array Components Figure 16-14. Removing and Installing t he Control Panel—PowerV ault MD3220i Installing the Contro l Panel 1 Align the control panel with the slot on the array . 2 Slide the control panel into the array until: – T he release tab clicks into place in P owerV ault MD3200i . See F igure 16-13. – T he r[...]
-
Page 217
Management: Installing Array Components 217 Backplane WAR N IN G: Whenever you need to lift the array , get others to assist you. T o avoid injury , do not attempt to lift the array by yourself. CAUTION: Many repairs may only be done by a certified service technician. Y ou should only perform troubleshooting and simple repairs as authorized in your[...]
-
Page 218
218 Management: Installing Array Components Figure 16-15. Removing and Installing the RAID controller module /Power Supply Cage 1 RAID controller module /power supply cage 2 screws (6) 1 2 book.book Page 218 Wedn esday, May 26, 2010 2:14 PM[...]
-
Page 219
Management: Installing Array Components 219 Figure 16-16. Removing and Installing the Backplane—Power V ault MD3200i Figure 16-17. Removing and Installing the Backplane—Power V ault MD3220i 1 screws (5) 2 backplane 3 captive screw 1 screws (4) 2 backplane 3 captive screw 2 1 3 2 1 3 book.book Page 219 Wedn esday, May 26, 2010 2:14 PM[...]
-
Page 220
220 Management: Installing Array Components Installing the Back plane 1 Align the holes on the backpla n e with the holes on the array . 2 Tighten the captive scr ew to secure the backplane to the chassis. See F igur e 16-16 for P owerV ault MD3200i or F igure 16-17 for P owerV ault MD3220i. 3 Replace the screws that secur e the backplane to the ch[...]
-
Page 221
Management: Firmware Inventory 221 17 Management: Firmware Inventory A storage array is made up of many components, which might include R AID controller modules, physical disks, and enclosur e management modules (EMMs). Each of these components co ntains firmware. Some versions of firmware ar e dependent on other v e rsions of firmware. T o capture[...]
-
Page 222
222 Management: Firmware Inventory book.book Page 222 Wedn esday, May 26, 2010 2:14 PM[...]
-
Page 223
Management: Sy stem Interfaces 223 18 Management: Sy stem Interfaces Microsoft Services Virtual Di sk Service The Microsoft ® Virtual Disk Service (VDS) is a component of the W indows ® operating system. The VD S component ut ilizes third-part vendor specif ic software modules, known as providers, to access and configure thir d-party storage reso[...]
-
Page 224
224 Management: Sy stem Interfaces VSS attaches to the service and uses it to coor dinate the cr eation of snapshot virtual disks on the storag e array . VSS-initiated snap shot virtual disks can be triggered through backup to ols, known as requestors. The VSS P rovider Configuration T ool makes available the following configuratio n options: • S[...]
-
Page 225
T roubleshooting: Y our Storage Array Software 225 19 T roubleshooting: Y our Storage Array Software Start-Up Routine Look and listen during the array’s start-up routine fo r the indications described in T able 19-1. F o r a descri ption of the front- and back-panel indicators, see "Planning: About Y o ur Storage Array" on page 23. NOTE[...]
-
Page 226
226 T roubleshooting: Y our Storage Array Software •O n t h e Devices tab, in either the T ree view or the T able view , double-click a storage array . Alternatively , you can right-click a storage array and select Manage Storage Array from the pop-up menu. •O n t h e Setup tab, select Manage a Storage Array . After the AMW opens , select the P[...]
-
Page 227
T roubleshooting: Y our Storage Array Software 227 Hardwar e status can be Optimal, Needs Attent ion, or F ixing . If, however , all of the network management connecti ons from the storage manageme nt station to the storage array shown in the T ree view are Unr esponsive, the storage array status is r epr esented as Unr esponsi ve. In the EMW Statu[...]
-
Page 228
228 T roubleshooting: Y our Storage Array Software T able 19-3. Additional Status Icons Status Icon Description Unsupported Alerts with a Needs Upgrade Status Setting an alert on a s storage array with a Needs Upgrade status is not supported. In this case, the storage array shows both a Needs Upgrade status and an Unsupported Alerts icon in the T r[...]
-
Page 229
T roubleshooting: Y our Storage Array Software 229 NOTE: MDSM may take a few minutes to update a status change to Unresponsive or from Unresponsive. A status change from or to Unresponsive depends on the network link to the storage array . All other status change updates faster . Storage Array Support Data Y ou can gather various types of inventor [...]
-
Page 230
230 T roubleshooting: Y our Storage Array Software WAR N IN G: Use this option only under the guidance of your T echnical Support representative. T o automatically collect the support bundle data: 1 In the AMW , select Advanced T roubleshooting Support Data Automatic Settings . 2 Select Automati cally collect support data for critical e[...]
-
Page 231
T roubleshooting: Y our Storage Array Software 231 The physical disk data collection is completed and saved at the location that you entered. 4 Click OK . Event Log Y ou can use the Event Log V iewer to view a detailed list of events that occur in a storage array . The event log is stored on r eserved areas on the storage array disks. It r ecor ds [...]
-
Page 232
232 T roubleshooting: Y our Storage Array Software Recovery Guru The Recovery Guru is a component of MD SM that diag noses critical even ts on the storage array and recommends step-by-step recovery procedures for problem re solution. In the AMW , to display the Recovery Guru, perf orm one of these actions: •C l i c k Rec ov er y G u ru . •I n t[...]
-
Page 233
T roubleshooting: Y our Storage Array Software 233 • V iew detailed information – Go to step 3. • Search the storage array profile – Go to step 4. • Save the storage array profile – Go to step 5. • Close the storage array profile – Go to step 6. 3 Select one of the tabs, and use the ho rizontal scroll bar and the vertical scroll bar[...]
-
Page 234
234 T roubleshooting: Y our Storage Array Software F o r more informatio n, see the P o werV ault Modular Disk Storage Manager online help topics. Vi ewing the Logical Associations Y ou can use the Associated Logical Elements option to view the logical associations among di fferent virtual disks in a storage array . T o view the associations for so[...]
-
Page 235
T roubleshooting: Y our Storage Array Software 235 The V iew Associated Physical Components dialog appears with blue dots next to the physical components that ar e associated with the selected node. 3 To c l o s e t h e V iew Associated Physical Components dialog, click Close . Finding Nodes Y ou can use th e F ind option to search fo r a particula[...]
-
Page 236
236 T roubleshooting: Y our Storage Array Software 6 T o search for all nodes based on their virtual disk capacity , perform these steps: a Select F ind all virtual disks with capacity . b T ype the capacity in the GB box. c Specify that the capacity to be ma tched is less than, equal to, or greater than the capacity enter ed in the GB box. d Go to[...]
-
Page 237
T roubleshooting: Y our Storage Array Software 237 1 On the Log ic al tab of the AMW , select one of these virtual disks, and go to the indicated step: • Snapshot virtual disk—Go to step 2. • Snapshot r epository virtual disk—Go to step 3. • Source virtual disk—Go to step 4. • T arget virtual disk—Go to step 5. 2 Select Vi e w G[...]
-
Page 238
238 T roubleshooting: Y our Storage Array Software 2 If any storage arrays are unr espon sive, check the storage management station network conne ction to make sure that it can reach the network. 3 Ensure that the R AID controller modu les are installed and that there is power to the storage array . 4 If there a problem with the storage array , cor[...]
-
Page 239
T roubleshooting: Y our Storage Array Software 239 14 Remove the host with the Un responsive status from the EMW , and sel ect Add Storage Array to add the host again. 15 If the host does not return to Optimal status, go to step 16. 16 Ensure that the host is turned on and operational an d that the host adapters have been installed. 17 Check all ex[...]
-
Page 240
240 T roubleshooting: Y our Storage Array Software (TCP/IP) connections that can be made to the RAID controller module before it stops responding to subseque nt connection attempts. The type of management operations being perfor med and the number of management sessions taking place together determine the number of TCP/IP connections made to a R AI[...]
-
Page 241
T roubleshooting: Y our Storage Array Software 241 Locating an Expansion Enclosure Y ou can use the Blink option to physica lly lo cate and ident ify an expansion enclosure in the storage array . The LED activation varies according t o the type of expansion enclosur e that you have. • If you have an expansion enclosure with a white LED, the Blink[...]
-
Page 242
242 T roubleshooting: Y our Storage Array Software Capturing the State Information Use the T roubleshootin g Capture State Inform ation option to captur e information about the current state of your storage array and save the captured information to a te xt file . Y ou can then send the captured information to your T e chnical Suppo rt represen[...]
-
Page 243
T roubleshooting: Y our Storage Array Software 243 SMrepassist Utility SMrepassist (replication assistance) is a host-based utility for W indows platforms. This utilit y is installed with MDS M. Use this utilit y before and after you create a virtual disk copy on a W indows op erating system to ensure that all the m emory-residen t data for file sy[...]
-
Page 244
244 T roubleshooting: Y our Storage Array Software Unidentified Devices An unidentified node or device occu rs when MDSM cannot access a new storage array . Causes for this error include network connection problems, the storage array is turned off, or the storage array does not e xist. NOTE: Before beginnin g any recovery procedure, make sure that [...]
-
Page 245
T roubleshooting: Y our Storage Array Software 245 ping <host-name-or-IP-address-of-the-host> . If the network can access the host, co ntinue to step c. If th e network cannot access the host, skip to step d. c Remove the host with the unr espon sive status from th e MDSM, and add that host again. If the host returns to optimal status, you ha[...]
-
Page 246
246 T roubleshooting: Y our Storage Array Software 5 Make sur e that the controller firmware is compatible with MDSM on your management station. If the controller firmware was upgraded, the MDSM might not have access to the storage array . A new version of MDSM might be needed to manage the storage array with the new version of the controller firmw[...]
-
Page 247
T roubleshooting: Y our Storage Array Software 247 or Click Start Administrative T ools Serv ices . 2 In the Services dialog, select Modular Disk Storage Manager Agent . 3 If the modular disk storage ma nager agent is running, click Action Stop , then wait approximately 5 seconds. 4 Click Action Start . Linux T o start or restart th[...]
-
Page 248
248 T roubleshooting: Y our Storage Array Software book.book Page 248 Wedn esday, May 26, 2010 2:14 PM[...]
-
Page 249
T roubleshooting: Y our Array 249 20 T roubleshooting: Y our Array Safety First—For you and Y our Array CAUTION: Many repairs may only be done by a certified service technician. Y ou should only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support te[...]
-
Page 250
250 T roubleshooting: Y our Array T roubleshooting Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou should only perform troubleshooting and simple repairs as authorized in your product documentation, or as dir ected by the online or telephone service and support team. Damage due to serv[...]
-
Page 251
T roubleshooting: Y our Array 251 T roubleshooting Array Cooling Problems CAUTION: Many repairs may only be done by a certified service technician. Y ou should only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team. Damage due to servicing that[...]
-
Page 252
252 T roubleshooting: Y our Array c Reseat the EMM module and wait for 30 secon ds. See Removing an EMM in the MD1200 and MD1220 St orage Enclosur es Hardwar e Owner's Manual. d T ur n on the server . e Check the EMM status LED. f If the LED does not turn Gr een, r eplace the EMM. If the problem is not r esolved, see "Getting Help" o[...]
-
Page 253
T roubleshooting: Y our Array 253 T roubleshooting RAID Controller Modules CAUTION: Many repairs may only be done by a certified service technician. Y ou should only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team. Damage due to servicing tha[...]
-
Page 254
254 T roubleshooting: Y our Array e Check the link status LED. If the link status LED is not gr een, replace the cables. If the problem is not r esolved, see "Getting Help" on page 259. T roubleshooting Hard Drives CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou should only perform troubleshooting and simpl[...]
-
Page 255
T roubleshooting: Y our Array 255 T roubleshooting Array and Expansion Enclosure Connections 1 V erify that the RAID controller module port li nk status LED and the R AID controller module status LE D are solid gr een for each port that i s connected to a cable. If the LEDs are not solid green, see "Planning: R AID Controller Mod ules" on[...]
-
Page 256
256 T roubleshooting: Y our Array •H a r d d r i v e s • R AID controller modules • P ower supply/cooling fan modules • Control panel •B a c k p l a n e 3 Let the system dry thoroughly for at least 24 hours. 4 Reinstall the components you removed in step 2. 5 Connect all the cables and turn on the array . If the array does not start prope[...]
-
Page 257
T roubleshooting: Y our Array 257 T roubleshooting RAID Controller Modules Conditions Certain events can cause a R AID controll er module to fail and/or shut down. Unrecoverable ECC memory or PCI errors , or critical physical conditions can cause lockdown. If your R AID storage ar ray is configured for re dundant access and cache mirroring, the sur[...]
-
Page 258
258 T roubleshooting: Y our Array PCI Errors The storage array firmware can detect an d only recover from PC I errors whe n the R AID controller modules are configur ed for redundancy . If a vi rtual disk uses cache mirroring, it fails ov er to its peer R AID controller module, which initiates a flush of the dirty cache. Critical Conditions The sto[...]
-
Page 259
Getting Help 259 21 Getting Help Contacting Dell F or cust omers in the United States, call 800- WWW -DELL (800-999-3355). NOTE: If you do not have an active Inte rnet connection, you can find contact information on your purchase invoice, packing slip, bill, or Dell product catalog. Dell provides several online and telepho ne-based support and serv[...]
-
Page 260
260 Getting Help book.book Page 260 Wedn esday, May 26, 2010 2:14 PM[...]
-
Page 261
Index 261 Index A Access Virtual Disk, 64 Advanced F eature Using Snapshot and Disk Copy To g e t h e r , 5 3 Advanced F eatures, 50 Snapshot Repository Virtual Disk, 5 2 Snapshot Virtual Disks, 5 1 Advanced iSCSI Host P orts Settings, 87 Advanced P ath, 149 Array Management T ypes In-Band Management, 6 4 Out-of -Band Management , 6 3 B backplane i[...]
-
Page 262
Index 262 contacting Dell, 259 control panel installing, 2 1 6 re mo v i ng , 2 1 5 Copy Manager , 169 D Defining a Host, 94 Dell contacting, 2 5 9 Disk Group Creating, 1 0 4 Expansion, 1 3 7 Export, 1 3 9 E x p o r t i n g , 140 Import, 1 4 0 L o c a t i n g , 106 Migration, 1 3 9 Disk Group and Virtual Disk Expansion, 137 Disk Group Operations, 4[...]
-
Page 263
Index 263 F r ee Capacity , 138 front bezel installing, 1 9 8 re mo v i ng , 1 9 8 H hard drive drive carrier , 2 0 2 installing, 2 0 2 re mo v i ng , 2 0 0 Hard-Drive Indi cator Pa t t e r n s , 2 8 Ha rd wa re F ea t ur es Back panel features, 2 7 F r ont panel feat ur es, 2 4 Hard drive indicator patterns, 2 8 P ower indicator codes, 3 0 P ower [...]
-
Page 264
Index 264 MDSM, 20 Media Errors and Unreadable Sectors, 196 Media S can Changing settings , 1 4 2 Suspending, 1 4 3 Microsoft Virtual Disk Servic e, 2 2 3 V olume Shadow-Copy Service, 2 2 3 Microsoft Services Vir t ua l Di s k C o py , 5 2 Monitoring P erformance, 56 Multi-P ath P r eferred and Al ternate Controllers and P a ths, 5 4 Multi-P ath So[...]
-
Page 265
Index 265 EMM blank, 2 0 5 front bezel, 1 9 8 hard drive, 2 0 0 hard drive from a drive carrier , 2 0 2 power supply/cooling fan module, 2 1 1 Removing Copy P airs, 174 Removing Host Access, 9 6 Restricted Mappings, 132 S Safety , 19 safety , 2 49 Security Key C h a n g i n g , 117 Creating, 1 1 6 Saving, 1 1 9 Segment Size, 42 Setting a P assword,[...]
-
Page 266
Index 266 Recovering from an Unr espons ive Storage Array Condition, 2 3 7 Recovery Guru, 2 3 2 Starting or Restarting the Host-Agent Software, 2 4 6 Start-Up Routine, 2 2 5 Storage Array P rofile, 2 3 2 Storage Array Support Data, 2 2 9 Unidentified Devi ces, 2 4 4 Vie w in g th e L o gi c al A s s o c i a t i o n s , 234 Viewing the Physical A s [...]
-
Page 267
Index 267 Vir t u a l D i sk O p e ra t io n s Limit, 44 Virtual Disk Ownership, 55 Vir t u a l D i sk S t at e s , 40 Vir t u a l D i sk C o p y Ta r g e t , 5 3 Virtual Disks a nd Disk Groups, 39 book.book Page 267 Wedn esday, May 26, 2010 2:14 PM[...]
-
Page 268
268 Index book.book Page 268 Wedn esday, May 26, 2010 2:14 PM[...]