Dell POWERVAULT MD3620I manuel d'utilisation
- Voir en ligne ou télécharger le manuel d’utilisation
- 292 pages
- 8.85 mb
Aller à la page of
Les manuels d’utilisation similaires
-
Computer Accessories
Dell SFF 980
15 pages 1.41 mb -
Computer Accessories
Dell 34XX
402 pages 6.55 mb -
Computer Accessories
Dell 7.6
84 pages 0.45 mb -
Computer Accessories
Dell DR4000
1 pages 0.98 mb -
Computer Accessories
Dell 6200 SERIES
176 pages 2.07 mb -
Computer Accessories
Dell GX1 P
174 pages 2.18 mb -
Computer Accessories
Dell 5100
40 pages 1.48 mb -
Computer Accessories
Dell NNM SE 1.2
75 pages 1.06 mb
Un bon manuel d’utilisation
Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Dell POWERVAULT MD3620I. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Dell POWERVAULT MD3620I ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.
Qu'est ce que le manuel d’utilisation?
Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Dell POWERVAULT MD3620I décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.
Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.
Donc, ce qui devrait contenir le manuel parfait?
Tout d'abord, le manuel d’utilisation Dell POWERVAULT MD3620I devrait contenir:
- informations sur les caractéristiques techniques du dispositif Dell POWERVAULT MD3620I
- nom du fabricant et année de fabrication Dell POWERVAULT MD3620I
- instructions d'utilisation, de réglage et d’entretien de l'équipement Dell POWERVAULT MD3620I
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes
Pourquoi nous ne lisons pas les manuels d’utilisation?
Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Dell POWERVAULT MD3620I ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Dell POWERVAULT MD3620I et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Dell en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Dell POWERVAULT MD3620I, comme c’est le cas pour la version papier.
Pourquoi lire le manuel d’utilisation?
Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Dell POWERVAULT MD3620I, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.
Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Dell POWERVAULT MD3620I. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.
Table des matières du manuel d’utilisation
-
Page 1
Dell PowerV ault MD3600i and MD3620i Storage Array s Owner’ s Manual Regulatory Model: E03J Series and E04J Series Regulatory T ype: E03J001 and E04J001 book.book Page 1 Tues day, September 27, 201 1 3:13 PM[...]
-
Page 2
Notes, Cautions, and W arnings NOTE: A NOTE indicates important information that helps you make better use of your computer . CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followe d. WA RN I N G : A W ARNING indicates a potential for property damage, personal injury , or death. ___________ _______[...]
-
Page 3
Contents 3 Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . 19 About This Document . . . . . . . . . . . . . . . . . . 19 Inside the Box of the De ll PowerV ault MD3600i Series Storage Array . . . . . . . . . . . . . . . . . . . 19 MD3600i Series Storage Array . . . . . . . . . . . 20 Dell PowerV ault Modular Disk Storage Manag[...]
-
Page 4
4 Contents 3 Planning: RAID Controller Modules . . . . 31 RAID Controller Modules . . . . . . . . . . . . . . . . 31 RAID Controller Module Connectors and Features . . . . . . . . . . . . . . . . . . . . . . . 32 RAID Controller Modul e— Additional Features . . . . . 34 Battery Backup Unit . . . . . . . . . . . . . . . . 34 Storage Array Thermal [...]
-
Page 5
Contents 5 Media V erification . . . . . . . . . . . . . . . . . 44 Cycle T ime . . . . . . . . . . . . . . . . . . . . . 44 V irtual Disk Operations Limit . . . . . . . . . . . . 45 Disk Group Operations . . . . . . . . . . . . . . . . . . 45 RAID Level Migration . . . . . . . . . . . . . . . . 45 Segment Size Migration . . . . . . . . . . . . . .[...]
-
Page 6
6 Contents 5 Configuration: Overview . . . . . . . . . . . . 61 User Interface . . . . . . . . . . . . . . . . . . . . . . 61 Enterprise Management Window . . . . . . . . . 62 Array Management Window . . . . . . . . . . . . 63 6 Configuration: About Y our Storage Array . . . . . . . . . . . . . . . . . . . . . 67 Out-of-Band and In-Band Management [...]
-
Page 7
Contents 7 Setting the Storage Array RAID Controller Module Clocks . . . . . . . . . . . . . . . . . . . 84 7 Configuration: Using iSCSI . . . . . . . . . . . 87 Changing the iSCSI T arget Authentication . . . . . . . 87 Entering Mutual Aut hen tication Permissions . . . . . . 88 Creating CHAP Secrets . . . . . . . . . . . . . . . . . 88 Initiator [...]
-
Page 8
8 Contents 9 Configuration: About Y our Host . . . . . . . 99 Configuring Host Access . . . . . . . . . . . . . . . . . 99 Using the Mappings T ab . . . . . . . . . . . . . . . . 100 Defining a Host . . . . . . . . . . . . . . . . . . 101 Removing Host Access . . . . . . . . . . . . . . . . . 102 Managing Host Groups . . . . . . . . . . . . . . . .[...]
-
Page 9
Contents 9 Choosing an Appropriate Phy sical Disk T ype . . . . . . 121 Phy sical Disk S ecurity with Self Encrypting Disk . . . . . . . . . . . . . . . . . . . . . 121 Creating a Security Key . . . . . . . . . . . . . . . 124 Changing a Security Key . . . . . . . . . . . . . . 126 Saving a Security Key . . . . . . . . . . . . . . . 128 V alidate S[...]
-
Page 10
10 Contents Storage Partitioning . . . . . . . . . . . . . . . . . . 147 Disk Group and V irtual Disk Expansion . . . . . . . . 148 Disk Group Expansion . . . . . . . . . . . . . . . 148 V irtual Disk Expansion . . . . . . . . . . . . . . 149 Using Free Capacity . . . . . . . . . . . . . . . . 149 Using Unconfigured Capacity . . . . . . . . . . . 1[...]
-
Page 11
Contents 11 Creating a Snapshot V irtual Disk Using the Advanced Path . . . . . . . . . . . . . . . . . . . . 162 About the Advanced Path . . . . . . . . . . . . . 162 Preparing Host Servers to Create the Snapshot Using the Advanced Path . . . . . . . . 164 Creating the Snapshot Using the Advanced Path . 166 Specifying Snapshot V irtual Disk Names [...]
-
Page 12
12 Contents Virtual Disk Read/W rite Permissions . . . . . . . . . 182 Virtual Disk Copy Restrictions . . . . . . . . . . . . . 183 Creating a V irtual Disk Copy . . . . . . . . . . . . . . 184 Before you Be gin . . . . . . . . . . . . . . . . . 184 V irtual Disk Copy and Modification Operations . . . . . . . . . . . . . 185 Create Copy Wizard . . [...]
-
Page 13
Contents 13 13 Configuration: Premium Feature— Upgrading to High-Performance-T ier . . . . . . . . . . . . . 193 14 Configuration: Device Mapper Multipath for Linux . . . . . . . . . . . . . . . . 195 Overview . . . . . . . . . . . . . . . . . . . . . . . . . 195 Using DM Multipathing Devices . . . . . . . . . . . . 196 Prerequisites . . . . . . [...]
-
Page 14
14 Contents Media Errors and Unreadable Sectors . . . . . . . . 216 16 Management: Installing Array Components . . . . . . . . . . . . . . . . . 219 Recommended T ools . . . . . . . . . . . . . . . . . . 219 Front Bezel (Optional) . . . . . . . . . . . . . . . . . 220 Removing the Front Bezel . . . . . . . . . . . . . 220 Installing the Front Bezel[...]
-
Page 15
Contents 15 Power Supply/Cooling Fan Module . . . . . . . . . . . 234 Removing a Power Supply/Cooling Fan Module . . . . . . . . . . . . . . . . . . . . . 234 Installing a Power Supply/Cooling Fan Module . . . . . . . . . . . . . . . . . . . . . 236 Control Panel . . . . . . . . . . . . . . . . . . . . . . . 237 Removing the Control Panel . . . . .[...]
-
Page 16
16 Contents Retrieving T race Buffers . . . . . . . . . . . . . . . . 252 Collecting Phy sical Disk Data . . . . . . . . . . . . . 254 Event Log . . . . . . . . . . . . . . . . . . . . . . . . 255 Recovery Guru . . . . . . . . . . . . . . . . . . . . . 256 Storage Array Profile . . . . . . . . . . . . . . . . . . 256 V iewing the Logical Associatio[...]
-
Page 17
Contents 17 T roubleshooting Storage Array Startup Failure . . . . . 273 T roubleshooting Loss of Communication . . . . . . . . 273 T roubleshooting External Connections . . . . . . . . . 273 T roubleshooting Power Supply/Cooling Fan Module . . . . . . . . . . . . . . . . . . . . . . . . 274 T roubleshooting Array Cooling Problems . . . . . . . . 2[...]
-
Page 18
18 Contents Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 book.book Page 18 Tu esday, September 27, 2011 3 :13 PM[...]
-
Page 19
Introduction 19 1 Introduction NOTE: Unless specified, MD3600i Series represents Dell PowerV ault MD3600i and Dell PowerV ault MD3620i storage array s. WA RN I N G : See the Safety , Environmental, and Regulatory Information document for important safety information before following any procedures listed in this document. About This Document This d[...]
-
Page 20
20 Introduction • Mounting rails (2) (optional) • MD3600i Series res o u r c e m e d ia • Rack Installation Instructions • Getting Started W ith Y our System (provides information on enclosure features, the procedure to set up your enclosure, and technical specifications) MD3600i Series Storag e Array The MD3600i Series is a 2U rack-mou nte[...]
-
Page 21
Introduction 21 Other Information Y ou May Need WA RN I N G : See the safety and regulatory info rmation that shipped with your sy stem. Warranty information may be in cluded within this document or as a separate document. NOTE: All the documents, unless spe cifie d otherwise, are available at support.dell.com/manuals . •T h e Getting Started Gui[...]
-
Page 22
22 Introduction book.book Page 22 Tu esday, September 27, 2011 3 :13 PM[...]
-
Page 23
Planning: About Y our Storage Array 23 2 Planning: About Y our Storage Array Overview The Dell P o werV ault MD3600i Series stor age array is des igned for high availability , offering r edund ant access to data storage. It supports sin gle and dual R AID controller configuration. The MD3600i Series storage array provides 1 GBase- T or 10 GBase- T [...]
-
Page 24
24 Planning: About Y our Storage Array Hardware Features Front-Panel Feature s and Indica tors Figure 2-1. Front-Panel Features and Indicators—Dell PowerV ault MD3600i Figure 2-2. Front-Panel Features and Indicators—Dell PowerV ault MD3620i 1 2 3 5 4 6 1 2 3 4 6 5 book.book Page 24 Tu esday, September 27, 2011 3 :13 PM[...]
-
Page 25
Planning: About Y our Storage Array 25 Figure 2-3. Front-Bezel Features and Indicators Item Indicator , Button, or Connector Icon Descript ion 1 Enclosu re status LED The encl osure stat us LED lights when t he enclosur e power is on. Lights blue during normal operation. Blinks blue when a host server is identifying the enclosur e or when the syste[...]
-
Page 26
26 Planning: About Y our Storage Array 3 Split mode LED This LED must be unlit as the sp lit mode function is not support ed by the MD3600i Series storage arrays. 4 System identi fication button The system identification button on the front control panel can be u sed to locate a particula r enclosur e within a rack. When the button is pushed, the s[...]
-
Page 27
Planning: About Y our Storage Array 27 Back-Panel Features and Indic ators Figure 2-4. Back-Panel Features and In dicat ors—Dell PowerV aul t MD3600i Series Storage Array 1 600 W power supply/cooling fan module 2 RAID Controller Module 0 3 RAID Controller Module 1 4 600 W power supply/cooling fan module 1 2 3 4 book.book Page 27 Tu esday, Septemb[...]
-
Page 28
28 Planning: About Y our Storage Array Hard-Drive Indicator Patterns Figure 2-5. Hard Drive Indicators 1 hard-drive activity indicator (green) 2 hard-drive status indicator (green and amber) 1 2 book.book Page 28 Tu esday, September 27, 2011 3 :13 PM[...]
-
Page 29
Planning: About Y our Storage Array 29 Power Supply and Cooling Fan Features The MD3600i Series storage array incl udes two integrat ed, hot-swappable power supply/cooling fan modules. Both modules must be in stalled to ensure proper cooli ng. The syst em requi res a t least one of the cooling f ans to function to avoid overheating. A power supply/[...]
-
Page 30
30 Planning: About Y our Storage Array Power Indicator Codes and Features Figure 2-6. Power Indicator Codes and Features Item LED T y pe Icon Description 1 DC power The LED lights gr een when the DC output voltage is within the limit. If this LED is off, it indicat es that the DC output voltage is not within the limit. 2 P ower supply/cooling fan f[...]
-
Page 31
Planning: RAID Controller Modules 31 3 Planning: RAID Controller Modules RAID Controller Modules The R AID controller modules provi de high-performance, ad vanced virtual disk c onfigurat ion, an d fault-t olera nt disk subsystem managemen t. Each R AID controller module contains 2 GB of cache that is mirror ed with the other controller's cach[...]
-
Page 32
32 Planning: RAID Controller Modules RAID Controller Module Connectors and Features Figure 3-1. MD3600i Series i SCSI R AID Controller Module Item Component Function 1 SAS OUT port P rovides SAS connec tion for cabling to an e xpansion enclo sure. 2 iSCSI IN port 0 P rovides host-to-controller iSCSI 1/10 Gbps Ethernet connection. 3 iSCSI IN port 1 [...]
-
Page 33
Planning: RAID Controller Modules 33 8 Controller power LED L ights gr een when controller is turned on. Off when controller is not turned on. 9 Controller fault LED Lights amber when controller fault detected. Off when controller operating normally . 10 iSCSI IN port activity LED Lights gr een when there is no activity on connection. Blinks gr een[...]
-
Page 34
34 Planning: RAID Controller Modules RAID Controller Modu le—Additional Features Battery Backup Unit Each R AID controller contains a two- cell Lithium ion nanopolymer battery backup unit (BBU). It provides power to the R AID controller module in the event of a power outage. F or information on removing and installing the BBU, see "R AID Con[...]
-
Page 35
Planning: RAID Controller Modules 35 Sy stem Password Re set T o re set a forgotten passwor d, push and hold down the password r eset switch for at le ast 5 seconds. The passwo rd is deleted. See F igure 3-1 to locate the password r eset switch. The R AID controller module allo ws yo u to change the passwor d. F or mor e information about setting y[...]
-
Page 36
36 Planning: RAID Controller Modules Write-Thro ugh Cache In write-through ca che, data is written to the physical disk before completion status is r e turned to t he host operati ng system. W rite-thro ugh cache is considered mor e robust than write-back cache, since a power failur e is less lik ely to cause loss of data. The R AID controller auto[...]
-
Page 37
Planning: MD3600i Series Storage Array T erms and Concepts 37 4 Planning: MD3600i Series Storage Array T erms and Concepts This chapter describes the storage arra y concepts, which help in configuring and operating the Dell P owerV ault M D3600i Series storage arrays. Phy sical Disks, Virtual Disks, and Disk Groups Physical disks in your storage ar[...]
-
Page 38
38 Planning: MD3600i Series St orage Array T erms and Concepts Phy sical Disks Only Dell supported 6.0-Gbps SAS physica l disks are supporte d in the storage array . If the storage array detects un suppo rted physical disks, it marks the disk as unsupported and the physical disk be comes unavailable for all op erations. NOTE: The MD3600i Series sto[...]
-
Page 39
Planning: MD3600i Series Storage Array T erms and Concepts 39 If a disk drive rebuild fails because of a source drive failur e or because the drive is too small, the MDSM r eports a failur e of the physical disk even though the LE D state on the drive in dicates that the rebuild was aborted (green for 3 seconds, amber for 3 seconds, then off for 3 [...]
-
Page 40
40 Planning: MD3600i Series St orage Array T erms and Concepts 3 P rovide host server ac cess. 4 Cr eate mappings to associate the vi rtual di sks with the host s ervers. NOTE: Host server access must be cr eated before mapping virtual disks. Disk groups are always created in the un configured capacity of a storage array . Unconfigured capacity is [...]
-
Page 41
Planning: MD3600i Series Storage Array T erms and Concepts 41 RAID Levels R AID levels determine the way in whic h data is written to physical disks. Different R AID levels provide different le vels of accessibility , r edundancy , and capacity . Using multiple physical disks h as the follo wing advant ages over using a s ingle physical disk: • P[...]
-
Page 42
42 Planning: MD3600i Series St orage Array T erms and Concepts I/O performance is greatly improved by spreading the I/O load across many physica l disks. Althoug h it o ffers the bes t perform ance o f any RAID level , R AID 0 lacks data re dundancy . Select th is option only for non-critical data, because failure of one physical disk r esult s in [...]
-
Page 43
Planning: MD3600i Series Storage Array T erms and Concepts 43 actual storage. R AID 10 is automatically use d when a R AID level of 1 is chosen with four or mor e physical disks. RAID 10 wor ks well for medium- sized databases or any environment that requir es high performance and fault tolerance and moderate -to-medium capacity . Segment Size Disk[...]
-
Page 44
44 Planning: MD3600i Series St orage Array T erms and Concepts Foreground Initialization The storage array supports for eground in itializatio n for virtual disks. All access to the virtual disk is block ed du ring for eground init ialization. During foreground initia lization, zeros (0x 00) are written t o every se ctor of th e virtual disk. The v[...]
-
Page 45
Planning: MD3600i Series Storage Array T erms and Concepts 45 The storage array tracks the cycle for ea ch disk group independent of other disk groups on the controller and crea tes a checkpoint. I f the media verification operation on a disk gro up is pr eempted or block ed by another operation on the disk group, the s torage array resumes after t[...]
-
Page 46
46 Planning: MD3600i Series St orage Array T erms and Concepts Segment Size M igration Segment size r efers to the amount of data (in KB) that the st orage array writes on a physical disk in a virtual disk be fore writ ing data on the ne xt physical disk. V alid values for the segm ent size ar e 8 KB, 16 KB, 32 KB, 64 KB, 128 KB, 256 KB, and 512 KB[...]
-
Page 47
Planning: MD3600i Series Storage Array T erms and Concepts 47 Disk Group Defragmentation Defragmenting consol idates the fr ee ca pacity in the disk group into one contiguous area. Defragment ation does not change the way in which the data is stored on the virtual disks. Disk Group Operations Limit The maximum number of active, conc urrent disk gro[...]
-
Page 48
48 Planning: MD3600i Series St orage Array T erms and Concepts • Segment size migration • Disk group e xpansion • Disk group defragmentation The priority of each of these operations can be chan ged to address performance requirements of the environm ent in which the oper ations are to be e xecut ed. NOTE: Setting a high priority level impact [...]
-
Page 49
Planning: MD3600i Series Storage Array T erms and Concepts 49 r ecognize the migrating metadata and that data is lost. In this case, MD3600i storage array initializes the physical disks and marks them as unconfigured capacity . NOTE: Only disk groups and associated virtual disks with all mem ber phy sical disks present can be migrated from one stor[...]
-
Page 50
50 Planning: MD3600i Series St orage Array T erms and Concepts • Migrating virtual disks to a storage array with no existing physical disks— T urn off the destination storage array , when migrating disk groups or a complete set of physical disks from a stor age array to another storage array that has no existing physical dis ks. After the desti[...]
-
Page 51
Planning: MD3600i Series Storage Array T erms and Concepts 51 Host T ypes A host server is a server that accesses a storage arra y . Host servers are mapped to the virtu al disks and use one or more iSCSI initi ator ports. Host servers have the following attributes: • Host name—A name that uniquely identifie s the host server . • Host group ([...]
-
Page 52
52 Planning: MD3600i Series St orage Array T erms and Concepts Snapshots ar e used to r ecover pr evious versions of files that have changed since the sna pshot was tak en. Snapsh ots ar e implemented using a copy on write algorithm, which m ak es a backup copy of data the instant a wri te occurs to the virtual disk. Data on a virtual disk is copie[...]
-
Page 53
Planning: MD3600i Series Storage Array T erms and Concepts 53 • Restore snapshot vir tual disk data to the source virtual disk. V irtual disk copy gene rates a full copy of data from the source virtual disk to the targ et virtual disk in a storage arra y and can be performe d ei ther online or offline. Source Virtual Disk When you cr eate a virtu[...]
-
Page 54
54 Planning: MD3600i Series St orage Array T erms and Concepts Using Snapsh ot and Disk Copy T ogether Y ou can use the Snapshot Virtual Di sk and Virtual Disk Copy pr emium features together to back up data on th e same storage array , or to restor e the data on the snapshot virtual disk to its original source virtual disk. Y ou can copy d ata fro[...]
-
Page 55
Planning: MD3600i Series Storage Array T erms and Concepts 55 controller module owner of a virtual disk after it is cr eated. If a host is connected to only one R AID controller module, th e preferr ed owner must manually be assigne d to the R AID contro ller module that the host can access. Ownership of a virtual disk is moved from the pr eferred [...]
-
Page 56
56 Planning: MD3600i Series St orage Array T erms and Concepts Load Balancing A load balance policy is us ed to determine which path is used to process I/O . Multiple options for sett ing the load balance policies le t you optimize I/O performance when mixed host interfaces are configur ed. Y ou can choose one of these load balance policies to opti[...]
-
Page 57
Planning: MD3600i Series Storage Array T erms and Concepts 57 Monitoring MD3600i Seri es Sy stem Performance Y ou can use the P erformance Monitor to select virtua l disks and R AID controller modules to monitor or to change the polling interval. K eep the foll owing guidel ines in mind when using the P erformance Monitor : • The P erformance Mon[...]
-
Page 58
58 Planning: MD3600i Series St orage Array T erms and Concepts Each time the polling interval elapses, the P erformance Monitor queries the storage array again and upda tes the statistics in the table. 5 Click Start . V alues are displayed for the selected stor age arrays in the P erformance Monitor data table. The table is upda ted at the inter va[...]
-
Page 59
Planning: MD3600i Series Storage Array T erms and Concepts 59 T able 4-3. Performance Monitor T able Description F or more information, see the online help topics . Column Headings Description Devices Controller , virtual disk or storage array total T otal IOs Cumulative IO’s per second from last start time Read P ercentage P ercentage of cumulat[...]
-
Page 60
60 Planning: MD3600i Series St orage Array T erms and Concepts book.book Page 60 Tu esday, September 27, 2011 3 :13 PM[...]
-
Page 61
Configuration: Overview 61 5 Configuration: Overview Dell P owerV ault Modular Disk Stor age Manager (MDSM) online help contains information on how to use the MDSM application to perform the configuration and management tasks de scribed in this document. Y ou can access online help by clicking Help located at the top right corner of MDSM interfa ce[...]
-
Page 62
62 Configuration: Overview Enterprise M anagement Windo w The EMW provides high-level manage ment of storage arrays. When you start MDSM, the EMW is displayed. The EMW has the: • Devices tab—P rovides information about the storage arrays. • Setup tab—P r esents the initial setup ta sks that guide you through addin g storage arrays and confi[...]
-
Page 63
Configuration: Overview 63 • Obtain information about the firmware inventory including the version of the R AID controller modules, physical disks, a nd the enclosure management modules (EMMs) in the storage array . Inheriting the Sy stem Settings Use the Inherit Syst em Settings option to im port the operating system theme settings into the MDSM[...]
-
Page 64
64 Configuration: Overview • Disk groups and virtual disks • Lo gi c al tab—Y ou ca n view the organization of the storage array by virtual disks, disk groups, fr ee capacity nodes, and a ny unconfigur ed capacity for the storage array . • Physical tab—Y ou can view the organization of the storage array by R AID controller modules, phys i[...]
-
Page 65
Configuration: Overview 65 book.book Page 65 Tu esday, September 27, 2011 3 :13 PM[...]
-
Page 66
66 Configuration: Overview book.book Page 66 Tu esday, September 27, 2011 3 :13 PM[...]
-
Page 67
Configuration: About Y our Storage Array 67 6 Configuration: About Y our Storage Array Out-of-Band and In-Band Management Y ou can manage a storage array in two ways: • Out-of -b and management • In-band ma nagement Out-of-Band Management In the out-of -band management me thod , data is separate from commands and events. Data travels through th[...]
-
Page 68
68 Configuration: About Y our Storage Array In-Band Management Using in-band management, commands, events, and data travel through the host-to-controller interface. Unlik e out-of -band management, comm ands and events are mix ed with data. NOTE: For detailed information on settin g up in-band and out-of-band management see the Deployment Guide. Wh[...]
-
Page 69
Configuration: About Y our Storage Array 69 NOTE: V erify that your host or management station network configuration— including station IP address, subnet ma sk, and default gateway—is correct before adding a new storage array using the Automatic option. NOTE: For Linux, set the default gateway so that broadcast packets are sent to 255.255.25 5[...]
-
Page 70
70 Configuration: About Y our Storage Array • In-band managem ent —Enter a name or an IP address for the Host through which the storage array is attached to the network. NOTE: When adding a storage array using in-band management with iSCSI, a session must first be established between the initiator on the host server and the storage array . For [...]
-
Page 71
Configuration: About Y our Storage Array 71 • Configure iSCSI host ports—Configure network parameters for each iSCSI host port automatically or spec ify the configuration information for each iSCSI host port. • Configur e the storage array—Create disk groups, virtual disks, and hot spare physical disks by using the A u tomatic configuration[...]
-
Page 72
72 Configuration: About Y our Storage Array Locating Sto rage Array s Y ou can use the Blink option to physically locate and identify a storage array . NOTE: If the LEDs from the Blink Storage Array operation do not stop blinking, select Stop All Indications to stop the process manually . T o locate the storage array : 1 Select the relevant storage[...]
-
Page 73
Configuration: About Y our Storage Array 73 The Name/Rename Storage Arrays dialog is displ ayed. 2 Select the r elevant storage array from the Select storage array table. If you do not know the name or physical location of the storage array , click Blink . After locating the storage array , cl ick OK to turn off the LEDs. The name of the storage ar[...]
-
Page 74
74 Configuration: About Y our Storage Array • Select the Setup tab, and then click Set a Storage Array P assword . • In the AMW , select the Lo gi c al tab, right-cl ick and select Set Pa s s w o r d . The Set P assword dialog is displ ayed. 3 If you are r esetting the password, type the Current password . NOTE: If you are setting the password [...]
-
Page 75
Configuration: About Y our Storage Array 75 V iewing Storage Array Connections Y ou can use the V iew Connections option to view the expansion enclosur es connected to the R AID controller module. T o view the storage array connections: 1 F rom the toolbar in AMW , select Storage Array Vi e w Connections . The <Storage Array>:Con nect[...]
-
Page 76
76 Configuration: About Y our Storage Array Removing Storag e Array s Y ou can remove a storage array from th e list of managed arrays if you no longer want to manage it from a sp ec ific storage management station. Removing a storage array do es not affect the storage array or its data in any way . Removing a storage array simply re mo ves it from[...]
-
Page 77
Configuration: About Y our Storage Array 77 Displaying Fail over Alert Y ou can change the failover alert delay for a storage array . The failov er alert delay lets you delay the logging of a cr itical event if the multi-path driv er transfers virtual disks to the non-preferr e d controller . If the multi-path driver transfers the virtual disks bac[...]
-
Page 78
78 Configuration: About Y our Storage Array Changing Expa nsion Enclosure ID Nu mbers When an MD12 00 series ex pansion enclosur e is connected to an MD3600i Series storage array for the first time, an en c l os u re I D n u mb e r i s a s si g ne d a nd maintained by the expansion enclosur e. This enclosure ID number is also shown in the MDSM and [...]
-
Page 79
Configuration: About Y our Storage Array 79 Configuring Alert Notifications MDSM can send an alert for any conditio n on the storage array that r e quires your attention. Alerts can be sent as e-mail messages or as Simple Networ k Management P rotocol (S NMP) trap message s. Y ou can configure alert notifications either for all the storage arrays o[...]
-
Page 80
80 Configuration: About Y our Storage Array • All storage arrays —Select this option to se nd an e-mail alert about events on all storage arrays. • An individual storage array —Select this option to send an e-mail alert about events that occur on on ly a specified storage a rray . These results occur , depending on your selection: • If yo[...]
-
Page 81
Configuration: About Y our Storage Array 81 • V alidating an e-ma il address—T ype the e-mail address in Email address or select the e-mail address in the Configured email addresses area, and click Te s t . A test e-mail is sent to the sele cted e-mail address. A dialog with the results of the test and any error is displayed. 8 F o r the select[...]
-
Page 82
82 Configuration: About Y our Storage Array Configuring SNMP Alerts T o add a management console to the list of addresses configured to receive SNMP alerts: 1 Open the Configure Alerts dialog by performing one of these actions: • In the T ree view or the T able view on the Devices tab in the EMW , select a node, and select Edit Configure Aler[...]
-
Page 83
Configuration: About Y our Storage Array 83 • Replacing an SNMP addr ess—Se lect the SNMP address in the Configured SNMP addresses area, type the r eplacement community name in Community name and the trap destination in Tr a p destination , and click Rep l a ce . • Deleting an SNMP addr ess—Sele ct the SNMP address in the Configured SNMP ad[...]
-
Page 84
84 Configuration: About Y our Storage Array A learn cycle starts automatically wh en you install a new battery m odule. L earn cycles for batteries in both R AID control ler modules in a duplex s ystem occur simultaneously . L earn cycles are scheduled to start auto matically at regul ar intervals, at the same time and on the sa me day of the week.[...]
-
Page 85
Configuration: About Y our Storage Array 85 1 In the AMW , select Storage Array Synchronize R AID Controller Module Clocks . 2 If a password is set, in the Enter P assword dialog, type the current password for the storage array , and click Synchronize . The R AID controller module clocks ar e synchronized with the storage management station. bo[...]
-
Page 86
86 Configuration: About Y our Storage Array book.book Page 86 Tu esday, September 27, 2011 3 :13 PM[...]
-
Page 87
Configuration: Using iSCSI 87 7 Configuration: Using iSCSI Changing the iSCSI T arget Authentication 1 In the AMW , select the Setup tab. 2 Select Manage iSCS I Settings . The Manage iSCSI Sett ings window is dis played and b y default, the T arget Authentication tab is selected. T o ch ange the authentication settings, select: • None —If you d[...]
-
Page 88
88 Configuration: Using iSCSI Entering Mutual Authentication Permissions Mutual authentication or two-way authenti cation enables a client o r a user to verify themselves to a host server and fo r the host server to validate itself to the user . This validation is accomplished in such a way that both parties ar e sure of the other ’s ide ntity . [...]
-
Page 89
Configuration: Using iSCSI 89 Initiator CHAP Secret The initiator CH AP secret is set on the host using the iSCSI init iator configuration program provided with th e host o perating system. If you are using the mutual authentication meth od, you must def ine the initiator CHAP secret when you set up the host. This must be the same CHAP secret that [...]
-
Page 90
90 Configuration: Using iSCSI Changing the iSCSI T arget Identification Y ou cannot change the iSCSI tar get name, but you can associate an a lias with the tar get for simpler identification. Aliases ar e useful because the iSCSI targ et names are not intuitive. P rovide an iSCSI target alias that is meaningful and easy to reme mber . T o change th[...]
-
Page 91
Configuration: Using iSCSI 91 • Select Specify Configuration , and type the IPv4 address to activate the targ et discovery . • T ype the iSNS server IP address in the IPv6 settings area to activate the targ et discovery . After you manually enter an IP address, you can also click Advanced to configure the customized TCP listening ports. If you [...]
-
Page 92
92 Configuration: Using iSCSI 4 In the Configured Ethernet port speed list, select a network speed for the iSCSI host port. The network speed values in t he Configured Ethernet port speed list depend on the maximum speed that the network can support. Only the network speeds that ar e supported are displayed. All of the hos t ports on a single co nt[...]
-
Page 93
Configuration: Using iSCSI 93 Advanced iSCSI Host Ports Settings NOTE: Configuring the advanced iSCSI hos t ports settings is optional. Use the advanced settings for the indivi dual iSCSI host ports to specify the TCP frame size, the virtual LA N, and the network priority . NOTE: Changing any of these settings resets the iSCSI port. I/O is interrup[...]
-
Page 94
94 Configuration: Using iSCSI V iewing or Ending an iSCSI Session Y ou may want to end an iSCSI se ssion for the following reasons: • Unauthorized acces s—If an initiator whom you consi der to not have access is logged on , you can en d the iSCSI session. En ding the iSCSI session forces the initiator to log off the storage array . The initiato[...]
-
Page 95
Configuration: Using iSCSI 95 V iewing iSCSI Statistics and Setting Baseline Statistics T o view iSCSI statis tics an d set baseline statistics: 1 In the AMW toolbar , select Storage Array iSCSI Statistics . The Vi e w i S C S I S t a t i s t i c s window is displayed. 2 Select the iSCSI statistic type you want to view in the iSCSI St atist[...]
-
Page 96
96 Configuration: Using iSCSI Edit, Remove, or Rename Host T opology If you give access to the wro ng host or the wrong host group, you can r e move or edit the host topology . F ollow the appropriate procedures given in T able 7-3 to correct the host topol ogy : F or more inform ation about Host, Ho st Groups, and Host T o pology , see "Confi[...]
-
Page 97
Configuration: Event Monitor 97 8 Configuration: Event Monitor An event monitor is provided with De ll P owerV ault Modular Disk Sto rage Manager (MDSM). The event monitor runs continuous ly in the background and monitors activity on the managed storage arrays. If the event monitor detects any critical problems, it can notify a host or r emote syst[...]
-
Page 98
98 Configuration: Event Monitor Enabling or Disabli ng the Event Monitor Y ou can enable or disable the event monitor at any time. Disable the event monitor if you do not want the system to send alert notifications. If you ar e running the event monitor on multiple systems, disabling the event monitor on all but one system pr events t he sending of[...]
-
Page 99
Configuration: About Y our Host 99 9 Configuration: About Y our Host Configuring Host Access Dell P owerV ault Modular Disk Stor age Manage r (MDSM) software is comprised of multiple modules. One of these modules is the Host Cont ext Agent, which is installe d as part of the MDSM insta l lation and runs continuously in the background. If the Host C[...]
-
Page 100
100 Configuration: About Y our Host The host topology is re configurable. Y ou can perf orm the following tasks: • Cr eate a host and assign an alias or user label. • Add or associate a ne w host port id entifier to a particular h ost. • Change the host p ort identifier alia s or user label. • Move or associate a host port identifier to a d[...]
-
Page 101
Configuration: About Y our Host 101 Defining a Host Y ou can use the Define Host W izard in the AMW to define a host for a storage array . Either a known unass ociat ed host port identifier or a new host port identifier can be added. NOTE: A user label must be specified before the host port identifier may be added (the add button is disabled until [...]
-
Page 102
102 Configuration: About Y our Host The Specify Host T ype window is displayed. 7 In Host type, select the relevant operatin g system for the host. The Host Group Question window is d isplayed. 8 In this window , you ca n select: • Ye s —this host shares access to the same virtual d isks with other hosts. • No —this host does NOT share acce[...]
-
Page 103
Configuration: About Y our Host 103 Managing Host Groups A host gro up is a logical entity of two or mor e hosts that shar e access to specific virtual disks on th e storage array . Y ou cr eate host groups with MDSM. All hosts in a host group must have the sam e host type (opera ting system). In addition, all hosts in the host group must have spec[...]
-
Page 104
104 Configuration: About Y our Host Removing a Host From a Host Group Y ou can remove a host from the To p o l o g y pane on the Mappings tab of the Array Management Wi ndow . F o r more informatio n, see "Rem oving a Hos t Group" on page 105. Moving a Host to a Different Host Group T o move a host to a different host group: 1 In the AMW [...]
-
Page 105
Configuration: About Y our Host 105 Removing a Host Group T o r emove a host group: 1 In the AMW , select the Mappings tab, select the host node in the To p o l o g y pane. 2 P erform one of these actions: • Select Mappings Re m o v e . • Right-click the host node, a nd select Re m o v e from the pop-up menu . The Rem o v e dialog is displa[...]
-
Page 106
106 Configuration: About Y our Host Starting or Stopping the Host Con text Agent The host context agent discovers the host topology and starts and stops with the host. The topolog y discover ed by the Host Context Agent can be viewed by clic king Configure Host Access (A utomatic) in the Configure tab in the MDSM. Y ou must stop an d rest art the H[...]
-
Page 107
Configuration: About Y our Host 107 I/O Data Path Protection Y ou can have multiple host-to-array co nnections for a host. Ensu r e that you select all the connections to the arra y when configuring host access to the storage array . NOTE: See the Deployment Guide for more information on cabling configurations. NOTE: For more information on configu[...]
-
Page 108
108 Configuration: About Y our Host Managing Host Port Identifiers Y ou can m anage the host port identifiers that are added to the storage array . Y ou can: • Add—Add or ass ociate a new hos t port identifier to a p articular host. • Edit—Change the ho st port identifier ali as or us er label. Y ou can move (associate) the host port identi[...]
-
Page 109
Configuration: About Y our Host 109 5 Select the method to add a host port identifier to the host. Y ou can select: • Add by selecting a known unassociated host port identifier —Select the appropriate host port identifier from the existing list of Known unassociated host port iden tifiers. • Add by creating a new host port identifier —In Ne[...]
-
Page 110
110 Configuration: About Y our Host book.book Page 110 Tuesday, September 27, 2011 3:13 PM[...]
-
Page 111
Configuration: Disk Groups and Virtua l Disks 111 10 Configuration: Disk Groups and V irtual Disks Creating Disk Groups and V irtual Disks Disk groups ar e created in the unconfi g ured capacity of a storage array , and virtual disks ar e created in the fr ee capacity of a disk group. The maximum number of physical disks supported in a disk group i[...]
-
Page 112
112 Configuration: Disk Groups and V irtual Disks A disk group must be organized accor ding to its related tasks and subtasks. F or example, if you cr eate a disk gr oup for the Accounting Department, you can cr eate virtual disks that mat c h the different types of accounting transactions performed in the depa rtment: Accounts Receivable (AR), Acc[...]
-
Page 113
Configuration: Disk Gr oups and V irtual Disks 113 3 T ype the name of the disk group (up to 30 characters) in Disk group name . 4 Select the appropriate Physical Disk selection choices , you can select: • A utomatic , see step • Manual , see step 5 Click Next . F o r automatic co nfiguration, the RA I D L ev e l a n d C a p a c i t y window is[...]
-
Page 114
114 Configuration: Disk Groups and V irtual Disks Locating a Disk Group Y ou can physically locate and identify al l of the physical disks that comprise a selected disk group. An LED blinks on each physical disk in the disk gro up. T o locate a disk group: 1 In the AMW , select the Lo gi c al tab. 2 Select the appropriate disk grou p and from the t[...]
-
Page 115
Configuration: Disk Gr oups and V irtual Disks 115 NOTE: Ensure that you create disk gr oups before creating virtual disks. T o cr eate virtual disks: 1 Choose one of these methods to start the Create V irtual Disk W izard : • T o cr eate a virtual disk from unconfigured capacity in the storage array—On the Lo gi c a l tab, select an Unconfigur[...]
-
Page 116
116 Configuration: Disk Groups and V irtual Disks 5 In Advanced virtual disk parameters , you can select: • Use recommended settings . • Customize settings . 6 If you s elect Use recommended settings in Advanced v irtual disk parameters , click Fi n i s h . Otherwise, cli ck Next . 7 In the Customize Advanced V irtual Disk P arameters window , [...]
-
Page 117
Configuration: Disk Gr oups and V irtual Disks 117 4 Select one or more virtual disks. Move the Select modification priority slider bar to the desir ed priority . NOTE: T o select nonadjacent virtual disks, press <Ctrl> click. T o select adjacent virtu al disks, pres s <Shift> click. T o select all of the available virtual disks, click [...]
-
Page 118
118 Configuration: Disk Groups and V irtual Disks T o select nonadjacent virtual disks, press <Ctrl> click. T o s elect adjacent virtual disks, p r ess <Shi ft> click. T o select all of the availa ble virtual disks, click Select All . 4 In the Select cache properties area, you can select: • Enable read caching —to enable read cachin[...]
-
Page 119
Configuration: Disk Gr oups and V irtual Disks 119 Changing the Segment Size of a Virtual Disk Y ou can change the segme nt size on a selected virtual disk. During t his operation, I/O performance is affect ed, but you r data remains avai lable. Guidelines to pro ceed with cha nging the se gment siz e: • Y ou cannot cancel this operation after it[...]
-
Page 120
120 Configuration: Disk Groups and V irtual Disks The segment size modification operation begins. The virtual disk icon in the Lo g i ca l pane shows an Operation in P rogre ss s tatus while the operation is taking place. NOTE: T o view the progress or change the prio rity of the modification operation, select a virtual disk in the disk group, and [...]
-
Page 121
Configuration: Disk Gr oups and V irtual Disks 121 The corr esponding dynamic cache read pr efetch se tting and segment siz e values that are typically well suited for the selected virtual disk I/O characteristic type are populated in the Dynamic cache read prefetch field and the Segment size field . NOTE: If you selected the Custom option, select [...]
-
Page 122
122 Configuration: Disk Groups and V irtual Disks the physical disks and R AID controller modules in a storage array sh are the same security k ey . The shared securit y key provides r ead and write access to the physical disks , while the physical disk encryption key on each physical disk is used to encrypt the data. A security capable physical di[...]
-
Page 123
Configuration: Disk Gr oups and V irtual Disks 123 •S a v e S e c u r i t y K e y F i l e • V alidate Security K ey •U n l o c k D r i v e s NOTE: If you have not created a security key for the storage array , the Create Security Key option is active. If you have creat ed a security key for the storag e array , the Create Security Key option [...]
-
Page 124
124 Configuration: Disk Groups and V irtual Disks The storage array password protects a storage array from potentially destructive operations by unauthorized users. The stora ge array passwo r d is independent from self encrypting disk and must not be confused with the pass phrase tha t is used to protect copies o f a security k ey . It is recommen[...]
-
Page 125
Configuration: Disk Gr oups and V irtual Disks 125 4 In New password , enter a string f or the storage array password. If you are creating the storage array password for the first time, leave Current password blank. F ollow these guidelines for cryptographi c strength when you cr eate the storage array passwor d: • be between 8 and 32 characters [...]
-
Page 126
126 Configuration: Disk Groups and V irtual Disks The pass phrase that you enter is mask ed. NOTE: Create Key is active only if the pass phrase meets the above mentioned criterion. 9 In the Confirm pass phrase dialog box, re-enter the e xact string that you entered in the P ass phra se dialog box. M a ke a re c ord of t h e p a s s p h r a se t h a[...]
-
Page 127
Configuration: Disk Gr oups and V irtual Disks 127 for storage on other media. When you ch ange a security key , you also provide information to create a security k ey iden tifier . Changing the security k ey does not destroy any data. Y ou can change the secu rity key at an y time. Befor e you change the security k ey , ensure that: • All virtua[...]
-
Page 128
128 Configuration: Disk Groups and V irtual Disks 6 In Confirm pass phrase , r e-enter the exact strin g you entere d in Pa s s phrase . M a ke a re c ord of t h e p a s s p h r a se you enter ed and the security k ey identifier it is associated with. Y ou need this information for later se cure operations. 7 Click Change K ey . 8 Mak e a r ecord o[...]
-
Page 129
Configuration: Disk Gr oups and V irtual Disks 129 4 In Confirm p ass phrase , re-enter the e xact string you enter ed in Pa s s phrase . Mak e a record of the pass phrase you entered. Y ou nee d it for later secure operations. 5 Click Save . 6 Mak e a recor d of the security key identifier and the file name from the Save Security K ey Complete dia[...]
-
Page 130
130 Configuration: Disk Groups and V irtual Disks Erasing Secure Phy sical Disks In the AMW , when you select a security enabled physical disk that is not part of a disk group, the Secure Erase menu it em is enabled on t he Physical Dis k menu. Y ou can use the secure erase proc edure to r e-provision a physical disk. Y ou can use the Secure Erase [...]
-
Page 131
Configuration: Disk Gr oups and V irtual Disks 131 • The availabili ty of enclos ur e los s protection for a disk group depends on the location of the physical disks that comprise the disk group. T o make sure that enclosur e loss protection is not affected, you must replace a failed physical disk to initiate the copyback process. See "Enclo[...]
-
Page 132
132 Configuration: Disk Groups and V irtual Disks 8 Select the relevant physical disks i n the Unassigned physical disks area, as hot spar es for the selected disk and click OK . 9 T o unassi gn hot spares, in the Hot Spare Coverage window , select the physical disks in the Hot spare physical disks area. 10 Review the information about the hot spar[...]
-
Page 133
Configuration: Disk Gr oups and V irtual Disks 133 Hot Spare Op eration When a physical disk fails , the virtua l disk automatically rebuilds using an available hot spa re. When a r eplacem ent physical disk is install ed, data from the hot spare is copied back to the repl acement physical disk. This function is called copy back. By default, the RA[...]
-
Page 134
134 Configuration: Disk Groups and V irtual Disks spare physical disk. T o make sur e that enclosur e loss protection is not affected, you must re place a failed phy sical disk to initiate the copyback proce ss. The virtual disk remains online and accessible while you are r e placing the failed physical disk, beca use the hot spare physical disk is[...]
-
Page 135
Configuration: Disk Gr oups and V irtual Disks 135 Host-to-V irtual Disk Mapping After you creat e virtual di sks, you must map them to the host(s) connected to the array . Guidelines to configure ho st-to-virtual disk mapping: • Each virtual disk in the storage array can be mapped to only one host or host group. • Host-to-virtual disk mappings[...]
-
Page 136
136 Configuration: Disk Groups and V irtual Disks • Each host has i ts own L UN address space. MDSM permits t he same L UN to be used b y different hosts or host grou ps to access virtual d isks in a storage array . • Not every operating system has the same number of L UNs available. • Y ou can define the mappings on the Mappings tab in the A[...]
-
Page 137
Configuration: Disk Gr oups and V irtual Disks 137 4 In Host group or host , select the approp riate host group or hos t. All defined hosts, host groups, and the defau lt group are displayed in the list. NOTE: When configuring an iSCSI storage a rray , including the MD3600i or MD3620i, if a host or a host group is selected t hat does not have a SAS[...]
-
Page 138
138 Configuration: Disk Groups and V irtual Disks • Select a s ingle virtual disk , and select Mappings Change Mapping . • Right-click the virtual disk, and select Change Mapping from the pop-up menu. 3 In Host group or host , select the appropriate host group or host. By default, the drop-dow n list shows the curr ent host group or the[...]
-
Page 139
Configuration: Disk Gr oups and V irtual Disks 139 associated source virtual disk. Ch an ging the R AID controller module ownership of a virtual di sk changes the preferr ed R AID controller module ownership of the virtual disk. During a virtual disk copy , the same R A ID controller mo dule must own both the source virtual disk and the tar get vir[...]
-
Page 140
140 Configuration: Disk Groups and V irtual Disks Y ou can change the R AID controller modu le ownership of a standar d virtual disk or a snapshot repository virtual disk. Y ou cannot direct ly change the R AID controller module ow nership of a snapshot virtual disk because the snapshot virtual disk inherits the R AID controller modu le owner of it[...]
-
Page 141
Configuration: Disk Gr oups and V irtual Disks 141 Changing the RAID Level of a Disk Grou p Changing the R AID level of a disk group chang es the RAI D levels of every virtual disk that comprises the disk group. P erformance m ay be slightly affected during the operation. Guidelines to change t he R AID level of a disk group: • Y ou cannot cancel[...]
-
Page 142
142 Configuration: Disk Groups and V irtual Disks [size=1.6T][features=3 queue_if_no_path pg_init_retries 50][hwhandler=1 rdac] _ round-robin 0 [prio=6][active] _ 1:0:0:2 sdf 8:80 [active][ready] _ round-robin 0 [prio=1][enabled] _ 0:0:0:2 sde 8:64 [active][ghost] In this e xample, the mpath6 device contains two paths: -- /dev/sdf at Host 1, Ch[...]
-
Page 143
Configuration: Disk Gr oups and V irtual Disks 143 • If a new L UN is mapped, the new L U N is detected and given a multi- pathing device node • If you increased volume capacity , the new capacity is displayed. Restricted Mappings Many hosts ar e able to map up to 256 L U Ns (0 to 255) per storage partition. However , the maximum number of mapp[...]
-
Page 144
144 Configuration: Disk Groups and V irtual Disks • I f t h e re i s a h o s t w i th a res t ri c t ed h o st ty p e th a t i s p ar t of a sp e c if i c s t o ra g e partition, all of the hosts in that storage partition are limited to the maximum number of L UNs allowed by the re stricted host type. • Y ou ca nnot move a host with a restrict [...]
-
Page 145
Configuration: Disk Gr oups and V irtual Disks 145 disk c opy , ownership of the tar get virtual disk is al so changed. Under certain operating system environments, it may be necessar y to r econfigur e the multi- path driver befor e an I/O path can be used. 1 To c h a n g e : a The R AID controller module ownership of a virtual disk—Go to step 2[...]
-
Page 146
146 Configuration: Disk Groups and V irtual Disks CAUTION: Possible loss of data access—Changing ownership at the disk group level causes every virtual disk in that disk group to transfer to the other RAID controller module and use the new I/O path. If you do not want to set every virtual disk to the new path, c hange ownershi p at the virtual di[...]
-
Page 147
Configuration: Disk Gr oups and V irtual Disks 147 Storage Partitioning A storage partition is a logi cal entit y consisting of one or mor e virtual disks that can be accessed by a single host or shar ed among ho sts that are part of a host group. The first time you map a virtu al disk to a specific host or host group, a storage pa rtition is creat[...]
-
Page 148
148 Configuration: Disk Groups and V irtual Disks • All mappings are defined. NOTE: Y ou can include a secondary virtual disk in a storage partition. However , any hosts that are mapped to the secondary virtual disk has read- only access until the virtual disk is promot ed to a primary virtual disk, or the mirror relati onship is removed. Storage[...]
-
Page 149
Configuration: Disk Gr oups and V irtual Disks 149 NOTE: Y ou cannot mix different media types or diff erent interface types within a single disk group or virtual disk. 5 Click Add . A message promp ts you to confirm you r selection. 6 T o add the capacity to the disk group, click Ye s . Y ou can also use the Command Line In terface (CLI) on both W[...]
-
Page 150
150 Configuration: Disk Groups and V irtual Disks capacity , in the form of unassigned phys ical disks to the dis k group of the standard virtual disk or the snapshot re pository virtual disk. See "Disk Group Expansion" on page 148. F or more inform ation, see the P owerV ault Modular Disk Storage Manager online help topic s. Disk Group M[...]
-
Page 151
Configuration: Disk Gr oups and V irtual Disks 151 Exporting a Disk Grou p On the source storage array: 1 Save the storage array configuration. 2 Stop all I/O and u nmount or disconnect the fi le systems on the virtu al disks in the disk group. 3 Back up the data on the virt ual d isks in the dis k group. 4 Locate the disk group and label th e phys[...]
-
Page 152
152 Configuration: Disk Groups and V irtual Disks 2 Review the Import Report for an overview of the disk group that you ar e impo rting . 3 Check for non-importable components. 4 Confirm that you want to proceed with the import procedure. NOTE: Some settings cannot be imported during the import disk group procedure. The followin g settings are r em[...]
-
Page 153
Configuration: Disk Gr oups and V irtual Disks 153 error is reported to the event log. F or virtual disks without redundancy protection (R AID level 1, RAID level 5, and R AID level 6 virtual disks), the error is not corrected but is r eported to the event log. • Recover ed media error—Data could not be r e a d b y t h e p h y s i c a l d i s k[...]
-
Page 154
154 Configuration: Disk Groups and V irtual Disks NOTE: A consistency check scans the data bl ocks in a RAID level 5 virtual disk, or a RAID level 6 virtual disk and checks the consistency information for each block. A consistency check compares data blo cks on RAID level 1 mirrored phy sical disks. RAID level 0 virtual disks have no data consisten[...]
-
Page 155
Configuration: Premium Featur e—Sna pshot Virtual Disks 155 11 Configuration: Premium Feature— Snapshot V irtual Disks NOTE: If you order ed this feature, you recei ved a Premium Feature Activation card shipped in the same box as your Dell PowerV ault MD storage array . Follow the directions on the card to obtain a key file and to enable the fe[...]
-
Page 156
156 Configuration: Premium F eature—Snapshot V irtual Disks repository uses less disk space than a full physical copy , because the only data blocks that ar e stor ed in the snapshot r epository vi rtual disk are those th at have changed sinc e the time of the snapshot. When you create a snapshot virtual disk, specify its location, capacity , sch[...]
-
Page 157
Configuration: Premium Featur e—Sna pshot Virtual Disks 157 Scheduling a Snapshot V irtual Disk When you cr eate a snapshot virtual disk, you can choose whether the snapshot is created immediately or is cr eated according to a schedule that you determine. This schedu le can be a one-time snapsh ot cr eation or an ongoing snapshot cr eation that o[...]
-
Page 158
158 Configuration: Premium F eature—Snapshot V irtual Disks F or more informat ion on creating snap sh ot virtual disk sche dules, see the following sections on creating snapshots. Guidelines for Creatin g Snapshot Sche dules Certain guidelines ap ply when creating snapshot virtual disk schedules: • Scheduled virtual disk snapshot operations do[...]
-
Page 159
Configuration: Premium Featur e—Sna pshot Virtual Disks 159 F o r mor e information on sche duling snapshots virtual disks, see the P owerV ault Modular Disk Storage Manager online help topics and the CLI Guide . Creating a Snapshot V irt ual Disk Using the Simple Path Y ou can choose the simple path to create a snapshot virtual disk if the disk [...]
-
Page 160
160 Configuration: Premium F eature—Snapshot V irtual Disks Using the simple path, the following de faults ar e used for the other parameters of a snapshot virtual disk: • Capacity Allocation—T he snapshot repository vir tual disk is created using fr ee capacity on the same disk group wher e the source virtual disk resides. • Host-to- Virtu[...]
-
Page 161
Configuration: Premium Featur e—Sna pshot Virtual Disks 161 • Y ou cannot create a snapshot of a vir tual disk that contains unreadable sectors. • Y ou must satisfy the r equirements of your host o perating system for creating snapshot virtual disks. F ailure to meet the r equir ements of your host operating system results in an inaccurate sn[...]
-
Page 162
162 Configuration: Premium F eature—Snapshot V irtual Disks 8 Enter the snapshot repository virtual di sks capacity as a percentage of the source virtual disk s capacity and click Next . The Pr e v i e w window containin g the summary of th e snapshot vir tual disk is displ ayed. 9 Click Fi n i s h . The Completed window is dis played. 10 Click O[...]
-
Page 163
Configuration: Premium Featur e—Sna pshot Virtual Disks 163 • Snapshot Virtual Disk Name—A us er -s pecified name that hel ps you associate the snapshot virtual d isk to its corr esponding snap shot re pository virtual disk and source virtual disk. • Snapshot Repository Virtual Disk Name—A user -specifi ed name that helps you as sociate t[...]
-
Page 164
164 Configuration: Premium F eature—Snapshot V irtual Disks • Schedule—Cr eates the snapshot virt ual dis k at a specified time, or accord ing to a regularly occurring interv al. If no schedule is specified, the snapshot operation begins i mmediately . This parameter can also be used to apply a schedu le to an e xisting snapshot virtual disk.[...]
-
Page 165
Configuration: Premium Featur e—Sna pshot Virtual Disks 165 • Y ou cannot create a snapshot of a vir tual disk that contains unreadable sectors. • Y ou must satisfy the r equirements of your host o perating system for creating snapshot virtual disks. F ailure to meet the r equir ements of your host operating system results in an inaccurate sn[...]
-
Page 166
166 Configuration: Premium F eature—Snapshot V irtual Disks If you want to use a snapshot regu larly , such as for backups, use the Disable Snaps hot and Re -c r e at e S n a ps h o t options to r euse the snapshot. Di sabling a nd re - cre a t in g s n ap s h ot s p re se r v es t h e existing virtual di sk-to-host mappings to the snapshot virtu[...]
-
Page 167
Configuration: Premium Featur e—Sna pshot Virtual Disks 167 8 In the Snapshot virtual disk parameters area, select the relevant mapping option, you can select: • A utomatic • Map later 9 In the Snapshot repository virtual disk p arameters ar ea, en ter the sy stem behavior wh en: • The snapshot repository virtual disk is full to the selecte[...]
-
Page 168
168 Configuration: Premium F eature—Snapshot V irtual Disks The default name for the associated snap shot r epository virtual disk that is shown in the Snapshot reposito ry virtual disk field is: <source-virtual disk-name>—R<sequence-number> F o r e xample, if you a re cr eating the fi rst snapshot virtual disk for a source virtual [...]
-
Page 169
Configuration: Premium Featur e—Sna pshot Virtual Disks 169 Snapshot Repository Capacity If you r eceive a warning that the ca paci ty for the snapshot r epository virtual disk is approaching its threshold, you ca n increase the capacity of a snapshot r epo sitory virtua l di sk by using one of the follow ing methods: • Use the fr ee capacity a[...]
-
Page 170
170 Configuration: Premium F eature—Snapshot V irtual Disks free capacity is available, the maximum free space is displayed in the Increase capacity by field. If free capacity does not e xist on th e disk group, the fr ee space that is displayed in the Incr ease capacity by spinner box is 0. Y ou must add physical disks to cr eate free capacity o[...]
-
Page 171
Configuration: Premium Featur e—Sna pshot Virtual Disks 171 NOTE: The phy sical disks that are displayed have a capacity that is either the same size or larger than the capacity of the phy sical disks already being used by the disk group. 9 Select either a single physical disk to add or two physical disks to add. 10 Click Add . The Add Physical D[...]
-
Page 172
172 Configuration: Premium F eature—Snapshot V irtual Disks Disabling a Snapshot V irtual Disk Disable a snapshot virtual disk if on e of the following conditions exists: • Y ou do not need the snapshot now . • Y ou intend to re-cr eate the snapshot at a later time and want to retain the associated snapshot repositor y virtual disk so th at y[...]
-
Page 173
Configuration: Premium Featur e—Sna pshot Virtual Disks 173 Before r e-creating a snapshot virtual disk, both the host server and the associated virtual disk you are r e-creat ing have to be in the proper state. T o prepar e your host server and virtual disk: 1 Stop all I/O activity to the source an d snapshot vi rtual disk (if mounted). 2 Using [...]
-
Page 174
174 Configuration: Premium F eature—Snapshot V irtual Disks NOTE: Failing to follow these additional instructions could create unusable snapshot virtual disks. For more information, see the PowerV ault Modular Disk Storage Manager online help topics. • T o use this option, the snapshot virtua l disk must be either in an Optimal status or Disab [...]
-
Page 175
Configuration: Premium Featur e—Sna pshot Virtual Disks 175 • Rolling back a ba se virtual disk to a snaps hot virtual disk d oes not affect the contents of the snapshot virtual disks. • Only one snaps hot rollback ope ration can be perf ormed at a time. • While a base virtual disk that is under going a rollback, you cannot create a new sna[...]
-
Page 176
176 Configuration: Premium F eature—Snapshot V irtual Disks Protecting Against a Failed Snapshot Rollback T o protect your base virtual disk data , it is r ecommended that you cr eate a new snapshot virtual disk from the ba se virtu al disk be fore beginning a rollback operation. If the snapshot roll ba c k f a i l s , u s e t h i s new snapshot [...]
-
Page 177
Configuration: Premium Featur e—Sna pshot Virtual Disks 177 Resuming a Sn apshot Rollback If an error occurs during the snapshot rollback and the operation is paused, you can re sume the rollback using the following steps: 1 In the AMW , select the Log ic al tab. 2 Choose one: • Select the snapshot virtual disk, and select Vi r t u a l D i s k [...]
-
Page 178
178 Configuration: Premium F eature—Snapshot V irtual Disks book.book Page 178 Tuesday, September 27, 2011 3:13 PM[...]
-
Page 179
Configuration: Premium Feature—V irtual Disk Copy 179 12 Configuration: Premium Feature— V irtual Disk Copy NOTE: A virtual disk cop y overwrit es data on the target virtual disk. Before starting a virtual disk copy , ensure that you no longer need the data or back up the data on the target virtual disk. NOTE: If you order ed this feature, you [...]
-
Page 180
180 Configuration: Premium F eature—V irtual Disk Copy Reasons to use virtual disk copy include: • Copying data for improved access—As your storage requir ements for a virtual disk change, you can use a virtual disk copy to copy data to a virtual disk in a d isk group that uses drives with larger capacity within the same storage array . Copyi[...]
-
Page 181
Configuration: Premium Feature—V irtual Disk Copy 181 formatted with a journaling file system, any attempt to issue a read r e quest to the source virtual disk may be rejected by the storage array R A ID controller modules and result in an erro r message. M ake sur e that the Read-Only attribute for the target virtual disk is di sabled after the [...]
-
Page 182
182 Configuration: Premium F eature—V irtual Disk Copy Creating a V irtual Disk Copy for an MSCS Shared Disk T o cr eate a virtual disk copy for a Mi cros oft Cluster Server (MSCS) shar ed disk, create a snapshot of the virtual disk, and then use the snapshot virtual disk as the source for the virtual disk copy . NOTE: An attempt to directly crea[...]
-
Page 183
Configuration: Premium Feature—V irtual Disk Copy 183 • T o enable Read-Only permission, sel ect Change Ta r g e t V i r t u a l D i s k Pe r m i s s i o n s Enable R ead-Only . NOTE: Write requests to the target virt ual disk are rejected when the Read- Only permission is enabled on the target virtual disk. • T o disable Read-Onl y p[...]
-
Page 184
184 Configuration: Premium F eature—V irtual Disk Copy NOTE: The following host preparation sectio ns also apply when using the virtual disk copy feature through the CLI interface. Creating a V irtual Disk Copy CAUTION: Possible loss of data—Source virtual disks that are participating in a virtual disk copy are available for read I/ O activity [...]
-
Page 185
Configuration: Premium Feature—V irtual Disk Copy 185 V irtual Disk Co py and Modificati on Operations If a modifi cation operation is running on a source virtual disk or a target virtual disk, and the virtual disk copy ha s a status o f In P rogress , P ending, or F ailed, the virtual disk copy does not take place. If a modification operation is[...]
-
Page 186
186 Configuration: Premium F eature—V irtual Disk Copy Preferred RAID Contro ller Module Ownership During a virtual disk copy , the same R AID controlle r module must own both the source virtual disk and the target vi rtual disk. If both virtual disk s do not have the same pr eferred R AID controller module when the virtual disk copy starts, the [...]
-
Page 187
Configuration: Premium Feature—V irtual Disk Copy 187 A virtual di sk copy autom atically m akes the target virtual disk read-only to hosts. Y o u may want to k eep this attribut e enabled to pr eserve the data on the target virtual disk. CAUTION: If you decide not to preserve the data on the ta rget virtual disk after the virtual disk copy has c[...]
-
Page 188
188 Configuration: Premium F eature—V irtual Disk Copy 9 Ty p e yes and clic k Fi n i s h . NOTE: Operation in Progress icons are displa yed on the source virtual disk and the target virtual disk while t he virtual disk copy has a stat us of In Progress or Pending. F or more inform ation, see the P owerV ault Modular Disk Storage Manager online h[...]
-
Page 189
Configuration: Premium Feature—V irtual Disk Copy 189 2 In the table, select one or more copy pairs. 3 Select Change Copy P r iority . The Change C opy P riority window is dis played. 4 In the Copy P riority ar ea, select the appropriate copy priority , depending on your system performance needs. NOTE: There are 5 copy priority rates availabl[...]
-
Page 190
190 Configuration: Premium F eature—V irtual Disk Copy Recopying a V irtual Disk Y ou can recopy a virtual disk when you have stopped a virtu al disk copy and you want to start it a gain or when a virtual disk copy has failed. The Recopy opti on overwrites existing data on the target virtual disk and make s the target virtual disk r ead-only to h[...]
-
Page 191
Configuration: Premium Feature—V irtual Disk Copy 191 4 Remove the drive letter(s) of th e source and (if mounted ) virtual disk in W indows or un mount the virtual drive(s) in Linux to help guarantee a stable copy of the drive for the virtual d isk. If this is not done, the copy operation reports that it has completed successfully , but th e cop[...]
-
Page 192
192 Configuration: Premium F eature—V irtual Disk Copy 5 Select Copy Re - C o p y . The Re- C op y window is displayed. 6 Set the copy priority . NOTE: There are 5 copy priority rates avail able: lowe st, low , medium, high, and highest. If the copy priority is set at the lowe st rate, I/O activity is prioritized, and the virtual disk copy ta[...]
-
Page 193
Configuration: Premium Feature—U pgrading to High- Performance-T ier 193 13 Configuration: Premium Feature— Upgrading to High-Performance- Ti e r The High P erformance Tier pr emium feat ure on an MD3600i Series s torage array increases the performance of th e system beyond that of a MD3600 i Series storage array op erating at the standard perf[...]
-
Page 194
194 Configuration: Premium Feature—Upgrading to High-Performance-T ier book.book Page 194 Tuesday, September 27, 2011 3:13 PM[...]
-
Page 195
Configuration: Device M apper Multipath for Linux 195 14 Configuration: Device Mapper Multipath for Linux Overview The MD3600i Seri es storage ar ray uses a Li nux operating sy stem softwar e framework , known as Device Mapper (DM), to enable multipath capabilities on Linux Host Servers. The DM multip ath functionality is provided by a combination [...]
-
Page 196
196 Configuration: Device Mapper Multipath for Linux Using DM Multipathing Devices NOTE: Using or modifyin g any nodes other than the multipathi ng device nodes can result in array or file sy stem problems, including loss of communication with the array and corruption of the file sy ste m. Avoid accessing any device other than the multipathing devi[...]
-
Page 197
Configuration: Device M apper Multipath for Linux 197 Using the MDSM softwar e: 1 Map the host server to the MD3600i Series storage array . 2 Create the V irtual Disks. 3 Map newly created arrays to your host server . NOTE: Any array s configured with MDCU automatically get added to the list of Devices in the PowerV ault Modular Disk Storage Man ag[...]
-
Page 198
198 Configuration: Device Mapper Multipath for Linux Scan for Newly Added Virtual Disks The rescan_dm_devs command scans the hos t server system looking for existing and newly adde d virtual disks mapped to the host server . # rescan_dm_devs If an array virtual disk (VD) is mapped to the host server at a later time, the rescan_dm_devices command mu[...]
-
Page 199
Configuration: Device M apper Multipath for Linux 199 The followi ng is an e xample of SL ES output: mpathb(360080e500017b2f80000c6ca4a1d4ab8) dm-21 DELL,MD32xxi [size=1.0G][features=3 queue_if_no_path pg_init_retries 50][hwhandler=1 rdac][rw] _ round-robin 0 [prio=6][active] _ 4:0:0:22 sdx 65:112 [active][ready] _ round-robin 0 [prio=1][enabled[...]
-
Page 200
200 Configuration: Device Mapper Multipath for Linux Add a New Partition to Device Mapper The kpartx command adds the new fdisk partition to the Device Mapper list of usable partitions. See e xamples below , where mpath<x> is the device node on which the partition was cr eated. # kpartx –a /dev/mapper/mpath<x> If successful, the comma[...]
-
Page 201
Configuration: Device M apper Multipath for Linux 201 Create a File Sy stem on a Device Mapper Partition Use the standard mkfs command to cr eate the file system on the newly cr eated Device Mapper partition. Fo r e x a m p l e : # mkfs –t <filesystem type> /dev/mapper/<partition node> where <partition node> is the partition on [...]
-
Page 202
202 Configuration: Device Mapper Multipath for Linux or blacklist { device { vendor vendor_string model model_string }; NOTE: RedHat version 6.0 and 6.1 users must rebuild the initramfs root file image to include the updated configuration file by running the #dracut -force command. 3 Reboot the host. Linux Host Server Reb oot Best Practices It is r[...]
-
Page 203
Configuration: Device M apper Multipath for Linux 203 3 Flush the Device Mapper multipath maps list to remove any old or modified mappings: # multipath –F NOTE: The boot operating sy stem drive may have an entry with the Device Mapper multipathing table. Thi s is not affected by the multipath –F command. Ho wever , using #multipath –ll must n[...]
-
Page 204
204 Configuration: Device Mapper Multipath for Linux Limitations and Known Issues • In certain error conditions with the no_path_retry or the queue_if_no_path feature is set, applications may hang. T o overcome these conditions, enter the following command for each affected multipath device: dmsetup message [device] 0 "fail_if_no_path" [...]
-
Page 205
Configuration: Device M apper Multipath for Linux 205 • F ailback can be slow when the host sy stem is ex periencing heavy I/O . The problem is exacerbated if the host server is also e xperiencing very high processor utilization. • The Device Mapper Mult ipath service can be slow when the host system is e xperiencing heavy I/O . The problem is [...]
-
Page 206
206 Configuration: Device Mapper Multipath for Linux I removed a L UN. But the multipathing mapping is still available. The multipathing device is still available after you re mo v e t he LUN s . Run multipath –f <device node for the delet ed LUN> to remove the multipathing mapping. F or exa mple, if a device related with /dev/dm-1 is delet[...]
-
Page 207
Management: Firmware Downloads 207 15 Management: Firmware Downloads Downloading RAID Controller and NVSRAM Packages A version number exists for each firm ware file. Th e vers ion num ber indicates whether the firmware is a major versio n or a m inor version. Y ou can use the Enterprise Management W indow (EMW) to download and ac tivate both t he m[...]
-
Page 208
208 Management: Firmware Downloads Downloading Both RAID Controller and NVSRAM Firmware NOTE: I/O to the array can continue while y ou are upgrading RAID controller and NVSRAM firmware. NOTE: It is recommended that the firmwa re and NVSRAM be upgraded during a maintenance period when the array is not being used for I/O. NOTE: The RAID enclosure mus[...]
-
Page 209
Management: Firmware Downloads 209 7 Click Tr a n s f e r . K eep these guidelines in mind: –I f t h e Tr a n s f e r button is inactive, e nsure that you either select an N V S RA M f i l e o r c l e a r t h e T r a n s f e r N V S R A M f i l e w i t h R A I D c o n t r o l l e r module firmwar e. – If the file selected is not valid or is not[...]
-
Page 210
210 Management: Firmware Downloads The Select F ile dialog is displ ayed. 13 Select the file to download. 14 Click OK . 15 If you want to downloa d the NVSR AM file with the R AID controller module firmwar e, select Download NVSR AM file with firmware in the Select files ar ea. Attributes of the firmware file are displayed in the F irmware file inf[...]
-
Page 211
Management: Firmware Downloads 211 Downloading Only NVSRAM Firmware Use the c ommand li ne interf ace (CLI ) to download and activate NVSRAM to several storage arrays. F or mor e information, see the P owerV ault Modular Dis k Storage Manager online help topics. T o download only NVSR AM firmwar e: 1 T o download the NVSRAM firmware from: •E M W [...]
-
Page 212
212 Management: Firmware Downloads 7 P erform one of these actions: • Select T ools Upgrade R AID Controller Module F irmware . • Select the Setup tab, and click Upgrade R AID Controller Module Fi r m w a r e . The Upgrade R AID Controller Module F irmware window is displayed. The Storage array pane lists the storag e arrays. The Details pa[...]
-
Page 213
Management: Firmware Downloads 213 12 Click OK . The Confirm Download dialog is displayed. 13 Click Ye s . The download starts and a progr ess in dicator is displayed in the Status column of the Upgrade R AID Contro lle r Module F irmwa re window . Downloading Phy sical Disk Firmware CAUTION: When updating phy sical disk firmware, you must stop all[...]
-
Page 214
214 Management: Firmware Downloads • Mak e sure that the firmware that yo u downlo ad to the physical disks are compatible with the physic al disks that you select. • Do not make any configuration changes to the storage array while downloadin g the firmware. NOTE: Downloads can take several minutes to complete. During a download, the Download P[...]
-
Page 215
Management: Firmware Downloads 215 Downloading MD1200 Series Expansion Module EMM Firmware NOTE: Due to a limitation with Linux, expansion enclosure EM M firmware updates must be performed using out-of-band management only . Failure to do so may result in the host server becoming unrespons ive, and it ma y require a reboot. Y ou can transfer a down[...]
-
Page 216
216 Management: Firmware Downloads NOTE: If you click Stop while a firmware download is in progress, the download-in-progress finishes before t he operation stops. The sta tus for the remaining expansion enclosures changes to Canceled . 7 Monitor the progress and completion status of the download to the expansion enclosures. The progress and status[...]
-
Page 217
Management: Firmware Downloads 217 controller encounters an e rror while accessing a peer disk, it is unable to r ecover the data and affected sectors ar e added to the unreadable sector log maintained by the controlle r . Other conditions under which sectors are added to the unreadable se ctor log include: • A media error is encounter ed when tr[...]
-
Page 218
218 Management: Firmware Downloads book.book Page 218 Tuesday, September 27, 2011 3:13 PM[...]
-
Page 219
Management: Installing Array Compone nts 219 16 Management: Installing Array Components Recommended T ools Y ou may need the f ollowing items to pe rform the procedur es in this section: • K ey to the system keylock •# 2 P h i l l i p s s c r e w d r i v e r •W rist grounding stra p book.book Page 219 Tuesday, September 27, 2011 3:13 PM[...]
-
Page 220
220 Management: Installing Array Componen ts Front Bezel (Optional) Removing the Front Bezel 1 Using the system key , unlock the front bezel (if locked). 2 Lift up the r elease latch next to the keylock. 3 Rotate the left end of the be zel away from the front panel. 4 Unhook the right end of the bezel and pull the bezel away from the system. Figure[...]
-
Page 221
Management: Installing Array Compone nts 221 Hard Drives SAFETY : Models AMT , E03J, and E04J Models AMT , E03J, and E04J ar e intended for installation only in restricted access locations as defined in cl 1.2.7.3 of IEC 60950-1:2005. Depending on your configur ation, your array either supports up to twenty f o u r 2 . 5 " SA S h a rd d r i v [...]
-
Page 222
222 Management: Installing Array Componen ts Figure 16-3. Removing and Installing a 2. 5" Hard-Drive Blank (MD3620i Only) Installing a Hard -Drive Blank 1 If installed, r emove the front bezel . See "Removing the F ront Bezel" on page 220. 2 Insert the drive blank into the drive bay un til the blank is fully seated. 3 Close the handl[...]
-
Page 223
Management: Installing Array Compone nts 223 2 F rom the Modular Disk Storage Manager (MDSM) software, pr epare the drive for r emoval. W ait until the hard-drive indicators on the drive carrier signal that the drive can be r emoved safely . F or more information, see your controller d ocumentation fo r information about hot-swap drive removal. If [...]
-
Page 224
224 Management: Installing Array Componen ts Installing a Hard Drive CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troublesh ooting and simple repairs as authorized in your product documentation, or as dir ected by the online or telephone service and support team. Damage due to servicing that is n[...]
-
Page 225
Management: Installing Array Compone nts 225 Removing a Hard Drive From a Hard-Drive Carrier Remove the scre ws from the slide rails on the har d-drive carrier and separate the har d drive from the carrier . See F igure 16-5 for P owerV ault MD3600i and F igure 16 -6 for P owerV ault MD3620i. Figure 16-5. Removing and Installing a Hard Drive Into a[...]
-
Page 226
226 Management: Installing Array Componen ts Figure 16-6. Removing and Installing a Hard Drive Into a 2.5" Hard-Drive Carrier 1 screws (4) 2 hard-drive carrier 3 SAS screw hole 4 hard drive 4 1 3 2 book.book Page 226 Tuesday, September 27, 2011 3:13 PM[...]
-
Page 227
Management: Installing Array Compone nts 227 Installing a Hard Drive Into a Hard-Drive Carrier 1 Insert the hard dr ive into the hard -d rive carrier with the connector end of the drive at the back. See F igure 16-5. 2 Align the screw holes on the hard drive with the back set of holes on the hard-drive carrier . When aligned correctly , the back of[...]
-
Page 228
228 Management: Installing Array Componen ts 5 Connect all the power cables to the array . 6 T urn on the array and the host server . Figure 16-7. Removing and Installing a RAID Controller Module Blank Installing a RAID Controller Module Blank T o install a R AID controller module blank: 1 Align the blank with the R AID controller module bay 2 Inse[...]
-
Page 229
Management: Installing Array Compone nts 229 Removing a RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team. Damage due to servicing t[...]
-
Page 230
230 Management: Installing Array Componen ts Installing a RAID Controller Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or teleph one service and support team. Damage due to servicin[...]
-
Page 231
Management: Installing Array Compone nts 231 Figure 16-9. Opening and Closing the RAID Controller Module Closing the RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by th e online or [...]
-
Page 232
232 Management: Installing Array Componen ts RAID Controller Module Backup Battery Unit Removing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online[...]
-
Page 233
Management: Installing Array Compone nts 233 Installing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by th e online or telephone service and support team. D[...]
-
Page 234
234 Management: Installing Array Componen ts Power Supply/Cooling Fan Module NOTE: Y our storage array includes two integrated, hot-swappable power supply/cooling fan modules. The array supports two hot-swappable power supply/cooling fan modules. While the array can operate temporaril y with one module, both the modules must be present for proper s[...]
-
Page 235
Management: Installing Array Compone nts 235 Figure 16-11. Removing and Installing a Power Supply/Cooling Fan Module 1 release tab 2 power supply 3 power supply handle 1 3 2 book.book Page 235 Tuesday, September 27, 2011 3:13 PM[...]
-
Page 236
236 Management: Installing Array Componen ts Installing a Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or teleph one service and support team. Damage due to[...]
-
Page 237
Management: Installing Array Compone nts 237 Control Panel Removing the Control Panel 1 T urn off the array and host server . 2 Disconnect all the power cables connected to the array . 3 Remove the har d drives from: – slots 0 to 2 in P owerV ault MD360 0i – slots 0 to 5 in P owerV ault MD362 0i See "Removing a Hard Drive" on page 222[...]
-
Page 238
238 Management: Installing Array Componen ts Figure 16-14. Removing and Installing t he Control Panel-PowerV ault MD3620i Installing the Co ntrol Panel 1 Align the control panel with the slot on the ar ray . 2 Slide the control panel into the array until: – The release tab clicks into place in P owerV ault MD3600i . See F igure 16-13. – The rel[...]
-
Page 239
Management: Installing Array Compone nts 239 Backplane CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team. Damage due to servicing that is not authorized by[...]
-
Page 240
240 Management: Installing Array Componen ts Figure 16-15. Removing and Installing the RA ID Controller Module/Power Supply Cage 1 screws (6) 2 RAID controller module/power supply cage 2 1 book.book Page 240 Tuesday, September 27, 2011 3:13 PM[...]
-
Page 241
Management: Installing Array Compone nts 241 Figure 16-16. Removing and Installing the Backplane-PowerV ault MD3600i Figure 16-17. Removing and Installing the Backplane-PowerV ault MD3620i 1 screws (5) 2 backplane 3 captive sc rew 1 screws (4) 2 backplane 3 captive sc rew 2 1 3 2 1 3 book.book Page 241 Tuesday, September 27, 2011 3:13 PM[...]
-
Page 242
242 Management: Installing Array Componen ts Installing the Ba ckplane 1 Align the hol es on the back plan e with the holes on the array . 2 Tighten the captive scr ew to secur e the backplane to the chassis. See F igure 16-1 6 for P owerV ault MD3600i or F igur e 16-17 for P owerV ault MD3620i. 3 Replace the screws that secur e the backplane to th[...]
-
Page 243
Management: Firmware Inventory 243 17 Management: Firmware Inventory A storage array is made up of many components, which may include R AID controller modules, physical disks, and enclo sur e management modules (EMMs). Each of these components cont ains firmware. Some versions of the firmware ar e dependent on other ve rsions of firmwar e. T o capt[...]
-
Page 244
244 Management: Firmware Inventory book.book Page 244 Tuesday, September 27, 2011 3:13 PM[...]
-
Page 245
Management: Sy stem Interfaces 245 18 Management: Sy stem Interfaces Microsoft Services V irtual Disk Service The Microsoft V irtual Disk Service (VDS) is a component of the W indows operatin g system. The VDS co mponent util izes thir d-party vendor s pecific software modules, known as providers, to access and configur e third-party storage resour[...]
-
Page 246
246 Management: Sy stem Interfaces VSS attaches to the service and uses it to coor dinate the cr eation of snapshot virtual disks on the storag e array . VSS-initiated snap shot virtual disks c an be triggere d through backup to ols, known as requestors. The VSS P rovider Configuration T ool offers the following configuratio n options: • Snapshot[...]
-
Page 247
T roubleshooting: Y our Storage Array Software 247 19 T roubleshooting: Y our Storage Array Software Start-Up Routine L ook and listen during t he array ’s start-up routine fo r the indications described in T able 19-1. F or a descri ption of the front- and back-panel indicators, see "Planning: About Y o ur Storage Array" on page 23. NO[...]
-
Page 248
248 T roubleshooting: Y our Storage Array Software T o launch the AMW , perform one of these actions: •O n t h e Devices tab, in either the T ree view or the T able view , double-click a storage array . Alternatively , you can right-click a storage array and select Manage Storage Array from the pop-up men u. •O n t h e Setup tab, select Manage [...]
-
Page 249
T roubleshooting: Y our Storage Array Software 249 In the T able view , every m anaged storag e array is listed once, regardless of the number of attachment s it has in the T ree view . After the storage arr ay is contacted by MDSM, an icon representing i ts h a rdw a re s ta t u s i s di s p la y e d . Hardwar e status can be Optimal, Needs Attent[...]
-
Page 250
250 T roubleshooting: Y our Storage Array Software In the T ree vi ew , icons can ar e disp layed in a string to convey more information. F or example, the following string means that the storage array is optimal, an alert is set for the storag e array , and firmware is available for downloa d. NOTE: MDSM may take a few minutes to update a status c[...]
-
Page 251
T roubleshooting: Y our Storage Array Software 251 Storage Array Support Data Y ou can gather various types of inventor y , status, and performance data that can help troubleshoot any problem with the storage array . All the files are compressed into a single archive in a zipp ed-file format. Y o u can forward the archive file to your T echnical Su[...]
-
Page 252
252 T roubleshooting: Y our Storage Array Software WA RN I N G : Use this option only under the guidance of your T echnical Support representative. NOTE: Enable only one collect support bundle data to a single client sy stem. Setting multiple sy stems to collect data may potentially affect the storage array performance. T o automatically collect th[...]
-
Page 253
T roubleshooting: Y our Storage Array Software 253 • A time stamp. • The version number for the R A ID controller module firmware. • The version number for the management application programming interface (API). • The model ID for the R AID controller module board. • The collection status for each R AID controller module. If th e status i[...]
-
Page 254
254 T roubleshooting: Y our Storage Array Software Collecting Phy sical Disk Data Y ou can use the Collect Physical Disk Data option to collect log sense data from all the physical disks on your storage array . L og sense data consists of statistical informat ion that is mainta ined by each of the physical disks in your stor age array . Y our T ech[...]
-
Page 255
T roubleshooting: Y our Storage Array Software 255 Event Log Y ou can use the Event Log V iewer to view a detailed list of events that occur in a storage array . The event log is stored on r eserved areas on the storage array disks. I t recor ds configuration events and storage arr ay component failur es. WA RN I N G : Use this option only under th[...]
-
Page 256
256 T roubleshooting: Y our Storage Array Software Recovery Guru The Recovery Guru is a component of MDSM tha t diagnoses critical even ts on the storage array and recommends step-by-st ep re covery procedu res to res olve the problems. In the AMW , to display the Recovery Guru, perform one of these actions: •C l i c k Rec o v er y G ur u . •I [...]
-
Page 257
T roubleshooting: Y our Storage Array Software 257 2 P erform one of these actions in the Storage Array P rofile dialog: • V iew detailed information—Go to step 3. • Search the storage array profile—Go to step 4. • Save the storage array profile—Go to step 5. • Close the storage array profile—Go to step 6. 3 Select one of the tabs, [...]
-
Page 258
258 T roubleshooting: Y our Storage Array Software V iewing the Logical Associations Y ou can use the Associated L ogical Elements option to view the logical associations amo ng different virtual disks in a storage array . T o view the associations for so urce virtual disks, snapshot virtual disks, and snapshot repository virtual disks: 1 In the AM[...]
-
Page 259
T roubleshooting: Y our Storage Array Software 259 Finding Nodes Y ou can use the F ind option to sear ch for a particular node on the Log i ca l tab, the Physical tab, or the Mappings tab of the AMW . The search may be based on a particular node name, the R AID level, virtual disk capacit y , or specific free capacity nodes. The search may be base[...]
-
Page 260
260 T roubleshooting: Y our Storage Array Software 7 T o search for all F ree Capacity nodes with a parti cular capacity , perform these steps: NOTE: This option is not available when the Search by name option is selected or from the Mappings tab. Y ou must cancel the selection of the Search by name option to use this option. a Select F ind all fre[...]
-
Page 261
T roubleshooting: Y our Storage Array Software 261 2 Select Vi e w Go T o Snapshot V irtual Disk . The selection jumps to the associated sna pshot virtual disk in the Lo gi c al pane. 3 Select Vi e w Go T o Snapshot Repository V irtual Disk . The selection jumps to the associated sna pshot repository virtual disk in the Lo gi c al p[...]
-
Page 262
262 T roubleshooting: Y our Storage Array Software • Out-of -band manage d storage array—Go to step 6. • In-band managed storage array—Go to step 12. 6 F or an out-of -band managed storage array , ensure that the RAID controller modules ar e network accessible by using the ping command to mak e sur e that the R AID controller module ca n be[...]
-
Page 263
T roubleshooting: Y our Storage Array Software 263 If you started the host system before you were connected to the RAID controller module in the storage array , the Host Conte xt Agent software is not able to detect the RAID controller modules. If this is the case, mak e sure that the connections ar e secure , and re start the Host Context Agent so[...]
-
Page 264
264 T roubleshooting: Y our Storage Array Software Locating a Phy sical Disk Y ou can use the L ocate Physical Disk op tion to physically locate and identify one or more of the physical disks in an e xpansion enclosure by activating physical disk LEDs. T o locate the physical disk: 1 Select the Physical tab. 2 Select the physica l disks that you wa[...]
-
Page 265
T roubleshooting: Y our Storage Array Software 265 Locating an Expansion Enclosure Y ou can use the Blink option to physica lly locat e and id entify an expansion enclosure in the storage array . The LED activation varies accor ding to the type of e xpansion enclosure that you have. • If you have an expansion enclosure with a white LED, the Blink[...]
-
Page 266
266 T roubleshooting: Y our Storage Array Software Capturing the State Information Use the T roubleshootin g Capture State Information option to captur e information about the curr ent state of your stor age array and save the captured information to a te xt file . Y ou can then send the captured information to your T echnical Suppo rt represen[...]
-
Page 267
T roubleshooting: Y our Storage Array Software 267 SMrepassist Utility SMrepassist (r eplication ass istance) is a host-based utility for W indows platforms. This util ity is installed with MDSM. Use this uti lity befor e and after you creat e a virtual disk copy on a W indows operating system to ensure that all t he memor y-resident data for file [...]
-
Page 268
268 T roubleshooting: Y our Storage Array Software Unidentified Devices An unidentified node or device occu rs when MDSM cannot access a new storage array . Causes for this error include network connection problems, the storage array is turned off, or the storage array does not e xist. NOTE: Before beginning any recovery proce dure, make sure that [...]
-
Page 269
T roubleshooting: Y our Storage Array Software 269 b Mak e sure that the network can access the host by using the ping command in the foll owing syntax: ping <host-name-or-IP-address-of-the-host> . If the network can access the host, co ntinue to step c. If the network cannot access the hos t, go to st ep d. c Remove the host with the unr esp[...]
-
Page 270
270 T roubleshooting: Y our Storage Array Software d Make sur e that the applicable network configuration tasks ar e done (for example, the IP addr esses ar e assigned to each contr oller). 5 Mak e sure that the controller firmware is compatible with MDSM on your management station. If the controller firmware was upgraded, the MDSM may not have acc[...]
-
Page 271
T roubleshooting: Y our Storage Array Software 271 Starting or Restarting the Host Context Agent Software The Host Context Agent softwar e modu le is the software component that r esides on the server or manage ment station th at commun icates w ith the MD3600i Series storage arrays. The SMag ent software automatically starts after you reboot the h[...]
-
Page 272
272 T roubleshooting: Y our Storage Array Software book.book Page 272 Tuesday, September 27, 2011 3:13 PM[...]
-
Page 273
T roubleshooting: Y our Array 273 20 T roubleshooting: Y our Array Safety First—For you and Y our Array CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team[...]
-
Page 274
274 T roubleshooting: Y our Array T roubleshooting Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troublesh ooting and simple repairs as authorized in your product documentation, or as dir ected by the online or telephone service and support team. Damage due to servi[...]
-
Page 275
T roubleshooting: Y our Array 275 T roubleshooting Array Cooling Problems CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team. Damage due to servicing that i[...]
-
Page 276
276 T roubleshooting: Y our Array c Reseat the EMM module and wai t for 30 seconds. See "Removing an EMM" in the MD1200 and MD1220 Storage Enclosures Hardware Owner's Manual . d T urn on the server . e Check the EMM status LED. f If the LED does not turn green, replace the EMM. If the problem is not r esolved, see "Getting Help&[...]
-
Page 277
T roubleshooting: Y our Array 277 wait for up to 5 minutes to chec k if the LE D has turned blue. See "Recovery Guru" on page 256. b If following the r ecovery guru proc edures does not solve the problem, complete the following procedure to further troubleshoot the array . c T urn off the host ser ver as appropriate. d Remove the R AID co[...]
-
Page 278
278 T roubleshooting: Y our Array T roubleshooting Hard Drives CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troublesh ooting and simple repairs as authorized in your product documentation, or as dir ected by the online or telephone service and support team. Damage due to servicing t hat is not au[...]
-
Page 279
T roubleshooting: Y our Array 279 T roubleshooting Array and Expansion Enclosure Connections 1 V erify that th e R AID controller modu le port link statu s LED and the R AID controller module status LED are solid green for each port that is connected to a cable. If the LEDs are not solid gr een, see "Planning: RAID Controller Mo dules" on[...]
-
Page 280
280 T roubleshooting: Y our Array 2 Remove the following components fr om the array . See "Management: Installing Array Comp onents" on page 219. •H a r d d r i v e s • RAID controller modules • P ower supply/cooling fan modules • Control panel •B a c k p l a n e 3 L et the system dry thoroughly for at least 24 hours. 4 Reinstal[...]
-
Page 281
T roubleshooting: Y our Array 281 T roubleshooting RAID Controller Modules Conditions Certain events can cause a R AID controll er module to fail and/or shut down. Unre coverable ECC m emory or PCI errors , or critical physical conditions can cause lockdown. If your R AID storage ar ray is configured for r edundant access and cache mirroring, the s[...]
-
Page 282
282 T roubleshooting: Y our Array PCI Errors The storage array firmware can detect an d only recover from PCI erro rs when the R AID controller modules ar e configur ed for redundancy . If a virtual disk uses cache mirroring , it fails over to its peer R AID controller module, which initiates a flush of the dirty cache. Critical Conditions The stor[...]
-
Page 283
Getting Help 283 21 Getting Help Contacting Dell F o r customers in the United States , call 800- WWW -DELL (800-9 99-3355). NOTE: If you do not have an active Inte rnet connection, you can find contact information on your purchase invoice, packing slip, bill, or Dell product catalog. Dell provides several online and telepho ne-based support and se[...]
-
Page 284
284 Getting Help book.book Page 284 Tuesday, September 27, 2011 3:13 PM[...]
-
Page 285
Index 285 Index A Access Virtual Disk, 68 Advanced F eatur e Using Snaps hot and Disk Copy To g e t h e r , 5 4 Advanced F eatur es, 51 Snapshot Repository V irtual Disk, 5 2 Snapshot Virtual Disks, 5 1 Advanced iSCSI Host P orts Settings, 93 Advanced P ath, 162 Array Management T ypes In-Band Manage ment, 6 8 Out-of -Band Management, 6 7 B backpla[...]
-
Page 286
Index 286 contacting Dell, 283 control panel installing, 2 3 8 re m o v i n g , 2 3 7 Copy Manager , 186 D Defining a Host, 101 Dell contacting, 2 8 3 Disk Group Creating, 1 1 2 Expansion, 1 4 8 Export, 1 5 0 E x p o r t i n g , 151 Import, 1 5 1 L o c a t i n g , 114 Migration, 1 5 0 Disk Group and V irtual Disk Expansion, 148 Disk Group Operation[...]
-
Page 287
Index 287 F ree Capa city , 149 front bezel installing, 2 2 0 re m o v i n g , 2 2 0 H hard drive drive carrier , 2 2 5 installing, 2 2 4 re m o v i n g , 2 2 2 Har d-Drive Indicator Pa t t e r n s , 2 8 H ard w a re F e a t u re s Back panel featur es, 2 7 F ront panel featur es, 2 4 Hard dr ive indicator patterns, 2 8 P ower indicator codes, 3 0 [...]
-
Page 288
Index 288 Media Errors and Unreadable Sectors, 216 Medi a Scan Changing setti ngs, 1 5 3 Suspending, 1 5 4 Microsoft Virtual Disk Serv ice, 2 4 5 V olume Shad ow-Copy Service, 2 4 5 Microsoft Services Vi rt u a l D i s k Co p y , 5 2 Monitoring P e rformance, 57 Multi-P ath P referre d and Alternate Controllers and P aths, 5 4 Multi-P ath Software,[...]
-
Page 289
Index 289 front bezel, 2 2 0 hard drive, 2 2 2 har d drive from a drive carrier , 2 2 5 power supply/cooling fan module, 2 3 4 Removing Copy P airs, 192 Removing Host Access, 102 Restricted Mappings, 143 S Safety , 19 safety , 273 Security Key C h a n g i n g , 126 Creating, 1 2 4 Saving, 1 2 8 Segment Size, 43 Setting a P assword , 73 Setting Copy[...]
-
Page 290
Index 290 Recovery Guru, 2 5 6 Starting or Restarting the Host-Agent Softw ar e, 2 7 1 Start-Up Routine, 2 4 7 Storag e Array P rofile, 2 5 6 Storage Array Support Data, 2 5 1 Unidentified De vices, 2 6 8 Vi ew i n g t h e L og i c a l A s s o c i a t i o n s , 258 Viewing the Physical A s s o c i a t i o n s , 258 troubleshooting, 273 connections,[...]
-
Page 291
Index 291 Vi r t u a l D i s k O p e r a t i o n s Limit, 45 V irtual Disk Ownership, 55 Vi r t u a l D i s k S t a t e s , 40 Vi r t u a l D i s k C o p y Ta r g e t , 5 3 V irtual Disks and Disk Groups, 39 book.book Page 291 Tuesday, September 27, 2011 3:13 PM[...]
-
Page 292
292 Index book.book Page 292 Tuesday, September 27, 2011 3:13 PM[...]