Dell PowerVault MD3200i manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Dell PowerVault MD3200i, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Dell PowerVault MD3200i one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Dell PowerVault MD3200i. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Dell PowerVault MD3200i should contain:
- informations concerning technical data of Dell PowerVault MD3200i
- name of the manufacturer and a year of construction of the Dell PowerVault MD3200i item
- rules of operation, control and maintenance of the Dell PowerVault MD3200i item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Dell PowerVault MD3200i alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Dell PowerVault MD3200i, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Dell service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Dell PowerVault MD3200i.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Dell PowerVault MD3200i item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    Dell PowerV ault MD3200i and MD3220i Storage Array s Owner’ s Manual Regulatory Model: E03J Series and E04J Series Regulatory T ype: E03J001 and E04J001 book.book Page 1 Saturday, Sept ember 24, 2011 9:06 AM[...]

  • Page 2

    Notes, Cautions, and W arnings NOTE: A NOTE indicates important information that helps you make better use of your computer . CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followe d. WA RN I N G : A W ARNING indicates a potential for property damage, personal injury , or death. ___________ _______[...]

  • Page 3

    Contents 3 Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . 19 About This Document . . . . . . . . . . . . . . . . . . 19 Inside the box of the Dell PowerV ault MD3200i Series Storage Array . . . . . . . . . . . . . 19 MD3200i Series Storage Array . . . . . . . . . . . 20 Dell PowerV ault Modular Disk Storage Manager . . . . . [...]

  • Page 4

    4 Contents 3 Planning: RAID Controller Modules . . . . 31 RAID Controller Modules . . . . . . . . . . . . . . . . 31 RAID Controller Module Connectors and Features . . . . . . . . . . . . . . . . . . . . . . . 32 RAID Controller Modul e— Additional Features . . . . . 34 Battery Backup Unit . . . . . . . . . . . . . . . . 34 Storage Array Thermal [...]

  • Page 5

    Contents 5 Foreground Initialization . . . . . . . . . . . . . . 43 Consistency Check . . . . . . . . . . . . . . . . . 44 Media V erification . . . . . . . . . . . . . . . . . 44 Cycle T ime . . . . . . . . . . . . . . . . . . . . . 44 V irtual Disk Operations Limit . . . . . . . . . . . . 45 Disk Group Operations . . . . . . . . . . . . . . . . .[...]

  • Page 6

    6 Contents Monitoring MD3200i Series Sy stem Performance . . . . . . . . . . . . . . . . . . . . . . . 57 5 Configuration: Overview . . . . . . . . . . . . 61 User Interface . . . . . . . . . . . . . . . . . . . . . . 61 Enterprise Management Window . . . . . . . . . 62 Array Management Window . . . . . . . . . . . . 63 6 Configuration: About Y our[...]

  • Page 7

    Contents 7 Configuring E-mail Alerts . . . . . . . . . . . . . . 76 Configuring SNMP Alerts . . . . . . . . . . . . . . 79 Battery Settings . . . . . . . . . . . . . . . . . . . . . 80 Setting the Storage Array RAID Controller Module Clocks . . . . . . . . . . . . . . . . . . . 81 7 Configuration: Using iSCSI . . . . . . . . . . . 83 Changing the i[...]

  • Page 8

    8 Contents Linux . . . . . . . . . . . . . . . . . . . . . . . . . 94 9 Configuration: About Y our Host . . . . . . . 95 Configuring Host Access . . . . . . . . . . . . . . . . . 95 Using the Mappings T ab . . . . . . . . . . . . . . . . . 96 Defining a Host . . . . . . . . . . . . . . . . . . . 96 Removing Host Access . . . . . . . . . . . . . . .[...]

  • Page 9

    Contents 9 Changing the I/O T y pe . . . . . . . . . . . . . . . 114 Choosing an Appropriate Phy sical Disk T ype . . . . . . 115 Phy sical Disk Security with Self Encrypting Disk . . . . . . . . . . . . . . . . . . . . . 115 Creating a Security Key . . . . . . . . . . . . . . . 118 Changing a Security Key . . . . . . . . . . . . . . 119 Saving a S[...]

  • Page 10

    10 Contents Changing the RAID Level of a Disk Group . . . . . . . 139 Storage Partitioning . . . . . . . . . . . . . . . . . . 140 Disk Group and V irtual Disk Expansion . . . . . . . . 141 Disk Group Expansion . . . . . . . . . . . . . . . 141 V irtual Disk Expansion . . . . . . . . . . . . . . 142 Using Free Capacity . . . . . . . . . . . . . . .[...]

  • Page 11

    Contents 11 Preparing Host Servers to Create the Snapshot Using the Simple Path . . . . . . . . . . 153 Creating a Snapshot V irtual Disk Using the Advanced Path . . . . . . . . . . . . . . . . . . . . 15 6 About the Advanced Path . . . . . . . . . . . . . 156 Preparing Host Servers to Create the Snapshot Using the Advanced Path . . . . . . . . 157[...]

  • Page 12

    12 Contents Online Copy . . . . . . . . . . . . . . . . . . . . 175 Creating a V irtual Disk Copy for an MSCS Shared Disk . . . . . . . . . . . . . . . . . . . 176 Virtual Disk Read/W rite Permissions . . . . . . . . . 176 Virtual Disk Copy Restrictions . . . . . . . . . . . . . 177 Creating a V irtual Disk Copy . . . . . . . . . . . . . . 178 Befo[...]

  • Page 13

    Contents 13 13 Configuration: Premium Feature —Upgrading to High-Performance-T ier . . . . . . . . . . . . . 187 14 Configuration: Device Mapper Multipath for Linux . . . . . . . . . . . . . . . . 189 Overview . . . . . . . . . . . . . . . . . . . . . . . . . 189 Using DM Multipathing Devices . . . . . . . . . . . . 190 Prerequisite Steps . . . .[...]

  • Page 14

    14 Contents Media Errors and Unreadable Sectors . . . . . . . . 210 16 Management: Installing Array Components . . . . . . . . . . . . . . . . . . . . . . 211 Recommended T ools . . . . . . . . . . . . . . . . . . 211 Front Bezel (Optional) . . . . . . . . . . . . . . . . . 212 Removing the Front Bezel . . . . . . . . . . . . . 212 Installing the F[...]

  • Page 15

    Contents 15 Power Supply/Cooling Fan Module . . . . . . . . . . . 225 Removing a Power Supply/Cooling Fan Module . . . . . . . . . . . . . . . . . . . . . 225 Installing a Power Supply/Cooling Fan Module . . . . . . . . . . . . . . . . . . . . . 228 Control Panel . . . . . . . . . . . . . . . . . . . . . . . 229 Removing the Control Panel . . . . .[...]

  • Page 16

    16 Contents Collecting the Phy sical Disk Data . . . . . . . . . . . 244 Event Log . . . . . . . . . . . . . . . . . . . . . . . . 244 Recovery Guru . . . . . . . . . . . . . . . . . . . . . 245 Storage Array Profile . . . . . . . . . . . . . . . . . . 246 Viewing the Logical Associations . . . . . . . . . . . 247 Viewing the Phy s ical Association[...]

  • Page 17

    Contents 17 T roubleshooting Loss of Communication . . . . . . . . 263 T roubleshooting External Connections . . . . . . . . . 263 T roubleshooting Power Supply/Cooling Fan Module . . . . . . . . . . . . . . . . . . . . . . . . 264 T roubleshooting Array Cooling Problems . . . . . . . . 265 T roubleshooting Expansion Enclosure Management Modules . [...]

  • Page 18

    18 Contents book.book Page 18 Saturday, September 24, 2011 9:06 AM[...]

  • Page 19

    Introduction 19 1 Introduction NOTE: Unless specified, MD3200i Series represents Dell PowerV ault MD3200i and Dell PowerV ault MD3220i storage array s. WA RN I N G : See the Safety , Environmental, and Regulatory Information document for important safety information before following any procedures listed in this document. About This Document This g[...]

  • Page 20

    20 Introduction • Mounting rails (2) (optional) • MD3200i Series res ou r c e me d i a • Rack Installation Instructions . • Getting Started W ith Y our System (provides an overview of enclosure features, setting up your enclosu r e, and technical specifications). MD3200i Series Storag e Array The Dell P owerV ault MD3200i Series is a 2U rac[...]

  • Page 21

    Introduction 21 •T h e Deployment Guide provides installation and configuration instructions fo r b o t h s o f t wa re a n d h a rd w a re. •T h e Storage Manager CLI Guide provides information about using the command line interface (CLI). • The Resource media con tains all system management tools. •T h e Systems Support Matrix provides in[...]

  • Page 22

    22 Introduction book.book Page 22 Saturday, September 24, 2011 9:06 AM[...]

  • Page 23

    Planning: About Y our Storage Array 23 2 Planning: About Y our Storage Array Overview The MD3200i Series storage array is designe d for high availabil ity , offe ring r edundant access to d ata st orage. It fe atures support for both single and dual R AID controller configuration. The Dell P o werV ault MD3200i storage array provides 1 .0-Gbps 1000[...]

  • Page 24

    24 Planning: About Y our Storage Array Hardware Features Front-Panel Feature s and Indica tors Figure 2-1. Front-Panel Features and Indicators—Dell PowerV ault MD3200i Figure 2-2. Front-Panel Features and Indicators—Dell PowerV ault MD3220i 1 2 3 5 4 6 1 2 3 4 6 5 book.book Page 24 Saturday, September 24, 2011 9:06 AM[...]

  • Page 25

    Planning: About Y our Storage Array 25 Figure 2-3. Front-Bezel Features and Indicators Item Indicator , Button, or Connector Icon Descript ion 1 Enclosu re status LED The encl osure stat us LED lights when the enclosur e power is on. Lights blue during normal operation. Blinks blue when a host server is identifying the enclosur e or when the system[...]

  • Page 26

    26 Planning: About Y our Storage Array 3 Split mode LED This LED must be unlit as the sp lit mode function is not support ed by the MD3200i Series Storage Arrays. 4 System identi fication button The system identification button on the front control panel can be u sed to locate a particula r enclosur e within a rack. When the button is pushed, the s[...]

  • Page 27

    Planning: About Y our Storage Array 27 Back Pane l Features and Indic ators Figure 2-4. Back-Panel Features and In di cators—Dell PowerV ault MD3200i Series 1 600 W power supply/cooling fan module 2 RAID Controller Module 0 3 RAID Controller Module 1 4 600 W power supply/cooling fan module 1 23 4 book.book Page 27 Saturday, September 24, 2011 9:0[...]

  • Page 28

    28 Planning: About Y our Storage Array Hard-Drive Indicator Patterns Figure 2-5. Hard Drive Indicators 1 hard-drive activity indicator (green) 2 hard-drive status indicator (green and amber) 1 2 book.book Page 28 Saturday, September 24, 2011 9:06 AM[...]

  • Page 29

    Planning: About Y our Storage Array 29 Power Supply and Cooling Fan Features The MD3200i Series storage array incl udes two integrat ed, hot-swappable power supply/cooling fan modules. Both modules must be in stalled to ensure proper cooli ng. The syst em requi res a t least one of the cooling f ans to function to avoid overheating. A power supply/[...]

  • Page 30

    30 Planning: About Y our Storage Array Power Indicator Codes and Features Figure 2-6. Power Indicator Codes and Features Item LED T ype Icon Description 1 DC power The LED lights gr een when the DC output voltage is within the limit. If this LED is off, it indicat es that the DC output voltage ar e not within the limit. 2 P ower supply/cooling fan [...]

  • Page 31

    Planning: RAID Controller Modules 31 3 Planning: RAID Controller Modules RAID Controller Modules The R AID controller modules provi de high-performance, ad vanced virtual disk c onfigurat ion, an d fault-t olera nt disk subsystem managemen t. Each R AID controller module contains 2 GB of cache that is mirror ed with the other controller's cach[...]

  • Page 32

    32 Planning: RAID Controller Modules RAID Controller Module Connectors and Features Figure 3-1. MD3200i Series i SCSI R AID Controller Module Item Component Function 1 SAS OUT port P rovides SAS connec tion for cabling to an e xpansion enclo sure. 2 iSCSI IN port 0 P rovides host-to-controller iSCSI 1Gbps Ethernet connection. 3 iSCSI IN port 1 P ro[...]

  • Page 33

    Planning: RAID Controller Modules 33 8S A S O U T p o r t link/fault L ED Lights gr een when all four links are connect ed. Lights amber when one to 3 links are disconnected. Off when all links in the port ar e disconnected o r cable is discon nected. 9i S C S I I N p o r t l i n k LED Lights gr een when ethernet connection at 1Gbps established. Of[...]

  • Page 34

    34 Planning: RAID Controller Modules RAID Controller Modu le—Additional Features Battery Backup Unit Each R AID controller contains a two- cell Lithium ion nanopolymer battery backup unit (BBU). It provides power to the R AID controller module in the event of a power outage. F or information on removing and installing the BBU, see "R AID Con[...]

  • Page 35

    Planning: RAID Controller Modules 35 Sy stem Password Re set The storage array system password can be r eset if it is forgotten. T o r eset the password, push and hold down the pa ssword r eset switch for at least 5 seconds. The password is deleted. See F igur e 3-1 to locate the password r eset switch. The R AID controller module allo ws yo u to c[...]

  • Page 36

    36 Planning: RAID Controller Modules mirrored to the cache of the second co ntroller befor e completion status is issued to the host initiator . W rite-Back Cache is enabled by default unless cache mirroring is disabled. Write-Thro ugh Cache In write-through cache, data is written to the physical disk before completion status is r e turned to t he [...]

  • Page 37

    Planning: MD3200i Series Storage Array T erms and Concepts 37 4 Planning: MD3200i Series Storage Array T erms and Concepts This chapter e xplains terms and co ncepts used for configuration and operation of MD3 200i Se ries storage arrays. Phy sical Disks, Virtual Disks, and Disk Groups Physical disks in your storage array provide the physical stora[...]

  • Page 38

    38 Planning: MD3200i Series St orage Array T erms and Concepts NOTE: The MD3200i Series storage enclosure must contain at least two phy sical disks for proper operation. This is neces sary because the phy sical disks are used to store configuration information. Phy sical Disk States T able 4-1 describes the various stat es of the physical disk, whi[...]

  • Page 39

    Planning: MD3200i Series Storage Array T erms and Concepts 39 If a disk drive rebuild fails because of a source drive failur e or because the drive is too small, the MDSM r eports a failur e of the physical disk even though the LE D state on the drive indi cates the rebuild was aborted (gr een for 3 seconds, amber for 3 seco nds, then off for 3 sec[...]

  • Page 40

    40 Planning: MD3200i Series St orage Array T erms and Concepts Disk groups are always created in the un configured capacity of a storage array . Unconfigured capacity is the availa ble physical disk space not already assigned in the stor age array . Virtual disks ar e cr eated within the fr ee ca pacity of a disk group. F ree capacity is the space [...]

  • Page 41

    Planning: MD3200i Series Storage Array T erms and Concepts 41 Each R AID level provide s differ ent performance and protection. Y ou must select a R AID level based on the type of application, access, fault tolerance, and data you are storing. The storage array supports RAID levels 0, 1, 5, 6, an d 10. The maximum number of physical disks that can [...]

  • Page 42

    42 Planning: MD3200i Series St orage Array T erms and Concepts is rec ommended for small databases or ot her applications that do not r equire lar ge capacity . R AID 1 provides full data redundancy . F or e xample accounting, payroll, or financial applications. RAID 5 R AID 5 uses parity and s triping data across all physical disks (distributed pa[...]

  • Page 43

    Planning: MD3200i Series Storage Array T erms and Concepts 43 The segment si ze or stripe eleme nt size specifies the size of data in a stripe written to a single disk. The storage ar ray supports stripe element sizes of 8 KB, 16 KB, 32 KB, 64 KB, 128 KB, 2 56 KB, and 512 KB. The default stripe element size is 128 KB. Stripe width, or depth, r efer[...]

  • Page 44

    44 Planning: MD3200i Series St orage Array T erms and Concepts Consistency Check A consistency check verifies the corr ectness of data in a r edundant array (R AID levels 1, 5, 6, and 10). F or e xampl e, in a system with parity , checking consistency involves computing the data on one physical disk and comparing the results to the contents of the [...]

  • Page 45

    Planning: MD3200i Series Storage Array T erms and Concepts 45 V irtual Disk Operations Limit The maximum number of active, concurre nt virtual disk processes per RAID controller module installed in the storage array is four . This limit is applied to the following virtual disk processes: • Background initialization • F oreground initialization [...]

  • Page 46

    46 Planning: MD3200i Series St orage Array T erms and Concepts When consideri ng a segment-s ize change, two scenari os illustrate di fferent approaches to the limitations: • If I/O activity stretches beyond the segment size, you can incr ease it to reduce the number of disks required for a single I/O . Using a single ph ysical disk for a single [...]

  • Page 47

    Planning: MD3200i Series Storage Array T erms and Concepts 47 Disk Group Operations Limit The maximum number of active, conc urrent disk group processes per i n s ta l l e d RA I D c o n t r o l l er m o d u l e i s o n e. T h i s l i m i t i s a p p l i e d t o t h e f o l l o w i n g disk group processes: • Virtual disk R AID level migration ?[...]

  • Page 48

    48 Planning: MD3200i Series St orage Array T erms and Concepts The priority of each of these operations can be chan ged to address performance requirements of the environm ent in which the ope rations are to be e xecut ed. NOTE: Setting a high priority level impact s storage array performance. It is not advisable to set priority levels at the max i[...]

  • Page 49

    Planning: MD3200i Series Storage Array T erms and Concepts 49 NOTE: Only disk groups and associated virtual disks with all mem ber phy sical disks present can be migrated from one storage a rray to another . It is recommended th at you only migrate disk groups that have all their associat ed member virtual disks in an optimal state. NOTE: The numbe[...]

  • Page 50

    50 Planning: MD3200i Series St orage Array T erms and Concepts that has no existing physical dis ks. After the destina tion storage array is turned on and has succ essfully r eco gnized the newly mi grated physical disks, migration operations ca n continue. NOTE: Disk groups from multiple storage array s must not be migrated at the same time to a s[...]

  • Page 51

    Planning: MD3200i Series Storage Array T erms and Concepts 51 Host Server -to-Virtual Disk Mapping The host server attached to a storag e array accesses various virtual disks on the storage array through its host ports. Specific virtual disk -to-L UN mappings to an individual host server can be defined. In addition, the host server can be part of a[...]

  • Page 52

    52 Planning: MD3200i Series St orage Array T erms and Concepts online and user -accessible. W hen the backup is completed, the snapshot virtual disk is no longer needed. Y o u can create up to four snapshots per virtual disk. Snapshots ar e used to r ecover pr evious versions of files that have changed since the sna pshot was tak en. Snapsh ots ar [...]

  • Page 53

    Planning: MD3200i Series Storage Array T erms and Concepts 53 V irtual Disk Co py V irtual disk copy is a premium feature to : •B a c k u p d a t a • Copy data from disk groups that use sm aller -capacity physical disks to di sk groups using greater capacity physical disks • Restore snapshot vir tual disk data to the source virtual disk. V ir[...]

  • Page 54

    54 Planning: MD3200i Series St orage Array T erms and Concepts Virtual Disk Recovery Y ou can use the Edit host server -to-virt u al disk mappings featur e to re cover data from the backup virtual disk. Th is functionality enables you to unmap the original source virtual disk from its host server , then map the backup virtual disk to the same host [...]

  • Page 55

    Planning: MD3200i Series Storage Array T erms and Concepts 55 The multi-path software identifies the ex istence of multiple paths to a virtual disk and establishes a pr eferred path to that disk. If any component in the preferr ed path fails, the multi-path s oftware auto matic ally re-routes I/O r equests to the alternate path so that the storage [...]

  • Page 56

    56 Planning: MD3200i Series St orage Array T erms and Concepts Ownership can later be mo dified to balance worklo ad according to actual usage. If virtual disk ownership is not manually balanced, it is possible for one controller to have the majority of the work, while t he other controller is idle. Limit the number of virtual disks in a disk group[...]

  • Page 57

    Planning: MD3200i Series Storage Array T erms and Concepts 57 • Le ast path weight with subset (W in dows operating systems only)—The least queue depth with subset policy is also known as the le ast I/Os or least requests policy . This policy routes the ne xt I/O re quest to a data path that has the least outstanding I/O requests queued. F or t[...]

  • Page 58

    58 Planning: MD3200i Series St orage Array T erms and Concepts • R AID Controller modules •V i r t u a l d i s k s • Storage array totals NOTE: By default, all items are selected. b In P olling interval , select how often you want to upd ate the performance statistics. NOTE: For an accurate elapsed time, do not use the Set RAID Controller Mod[...]

  • Page 59

    Planning: MD3200i Series Storage Array T erms and Concepts 59 The P erformance Monitor data provides information about how your storage array is performing. The data is presented in eight columns, which are described in this table. U se this data to make performanc e tuning decisions for your storage array . F or more information, see the online he[...]

  • Page 60

    60 Planning: MD3200i Series St orage Array T erms and Concepts book.book Page 60 Saturday, September 24, 2011 9:06 AM[...]

  • Page 61

    Configuration: Overview 61 5 Configuration: Overview Dell P owerV ault Modular Disk Stor age Manager (MDSM) online help contains information on how to use the MDSM application to perform the configuration and management tasks de scribed in this document. Y ou can access online help by clicking Help located at the top right corner of MDSM interfa ce[...]

  • Page 62

    62 Configuration: Overview Enterprise M anagement Windo w The EMW provides high-level manage ment of storage arrays. When you start MDSM, the EMW is displayed. The EMW has these tabs: • Devices tab—P rovides information about the storage arrays. • Setup tab—P r esents the initial setup ta sks that guide you through addin g storage arrays an[...]

  • Page 63

    Configuration: Overview 63 Inheriting the Sy stem Settings Use the Inherit Syst em Settings option to im port the operating system theme settings into the MDSM . Importing system them e settings affects features lik e font type, font size, color , and contrast in the MDSM. 1 Open the Inherit System Settings window in one of these ways: • Select T[...]

  • Page 64

    64 Configuration: Overview • Logical tab—Y ou can view the or ganiza tion of the storage array by virtual disks, disk groups, fr ee capacity nodes, and a ny unconfigur ed capacity for the storage array . • Physical tab—Y ou can view the organization of the storage a rray by R AID controller modules, phys ical disks, and other hardwar e comp[...]

  • Page 65

    Configuration: About Y our Storage Array 65 6 Configuration: About Y our Storage Array Out-of-Band and In-Band Management Y ou can manage a storage array in two ways: • Out-of -b and management • In-band ma nagement Out-of-Band Management Using the out-of -band managem ent method, data is separate from commands and events. Data travels thro ugh[...]

  • Page 66

    66 Configuration: About Y our Storage Array In-Band Management Using in-band management, commands, events, and data travel through the host-to-controller interface. Unlik e out-of -band management, comm ands and events are mix ed with data. NOTE: For detailed information on settin g up in-band and out-of-band management see the Deployment Guide. Wh[...]

  • Page 67

    Configuration: About Y our Storage Array 67 NOTE: For Linux, set the default gateway so that broadcast packets are sent to 255.255.25 5.0. For Red Hat Enterp rise Linux, if n o gateway exists on the network, set the default gateway to the IP address of the NIC. NOTE: MDSM uses TCP/UDP por t 2463 for communication to the MD Storage Array . Automatic[...]

  • Page 68

    68 Configuration: About Y our Storage Array NOTE: When adding a storage array using in-band management with iSCSI, a session must first be established between the initiator on the host server and the storage array . For more information, see "Configuration: Using iSCSI" on page 83. NOTE: The host age nt must be restarted before in-band ma[...]

  • Page 69

    Configuration: About Y our Storage Array 69 • Configur e the storage array—Create disk groups, virtual disks, and hot spare physical disks by using the A u tomatic configuration method or the Manual configuration method. F o r more information, see the Po w e r V a u l t Modular Disk Storage Manager online help topics. • Map virtual disks—M[...]

  • Page 70

    70 Configuration: About Y our Storage Array • In the AMW , select Storage Array  Blink  Storage Array . The LEDs bli nk on the physical disks in th e storage ar ray . 2 After locating the storage array , click OK . The LEDs stop b linking. 3 If the LEDs do not s top blinking, select Storage Array  Blink  Stop All Indication s[...]

  • Page 71

    Configuration: About Y our Storage Array 71 5 Click Ye s . The new storage a rray name is displa yed in the Select storage array table. 6 Repeat step 2 through step 4 to name or r ename additional storage arrays. NOTE: A void arbitrary names or names that may lose meaning in the future. Setting a Password Y ou can configure each storage array with [...]

  • Page 72

    72 Configuration: About Y our Storage Array 6 Click OK . NOTE: Y ou are not prompted for a password when you attempt to change the storage array configuration in the current management session. Password Guidelines F ollow these guidelines when you cr eate a password: • Use secure passwor ds for your storage array . A password must be easy for you[...]

  • Page 73

    Configuration: About Y our Storage Array 73 Adding/Editi ng a Comment to an E xisting Storage Array A descriptive comment, with an applic a ble storage array name, is a he lpful identification tool. Y o u can add or edit a comment for a storage array in the EMW only . T o add or edit a comment: 1 In the EMW , select the Devices tab and select the r[...]

  • Page 74

    74 Configuration: About Y our Storage Array Enabling Premium Features Y ou can enable pr emium features on the storage array . T o enable the premium features, you must obtain a feature k ey file specific to the pr emium feature that you want to enable from your storage supplier . T o enable premium features: 1 F rom the toolbar in AMW , select Sto[...]

  • Page 75

    Configuration: About Y our Storage Array 75 2 Select or enter the percentage of unwr itten data in the cache to trigger a cache fl ush in Start flushing . 3 Select or enter the percentage of un written data in the cache to stop a cache fl ush in progress in Stop flush ing . 4 Select the appropriate Cache block size . A smaller cache size is a good [...]

  • Page 76

    76 Configuration: About Y our Storage Array 3 Click OK . If you have set a password for the selected storage array , the Enter Pa s s w o r d dialog is dis played. 4 T ype the current passwor d for the storage array . 5 Click OK . Configuring Alert Notifications MDSM can send an alert for any conditio n on the storage array that r equir es your att[...]

  • Page 77

    Configuration: About Y our Storage Array 77 T o configur e e-mail alerts: 1 Open the Configure Alerts dialog by performing one of these actions: • In the T r ee view or the T able view on the Devices tab in the EMW , select a node, and then se lect Edit  Configure Alerts . Go to step 3. •I n t h e Setup tab in the EMW , select Configure Aler[...]

  • Page 78

    78 Configuration: About Y our Storage Array • Adding an e-mail address—In Email address , type the e-mail address, and c lick Add . • Replacing an e-ma il address—In the Configured email addresses area, select the e-mail address to be r e placed, type the replacement e-mail address in Email address , and cl ick Rep l a ce . • Deleting an [...]

  • Page 79

    Configuration: About Y our Storage Array 79 • The e-mail addresses that you had p reviously configur ed are displayed in the Configured e-mail addr esses ar ea. • Y ou must use fully qualified e- mail addresses, for e xample, name@mycompany .com. • Y ou can con figure multiple e-mail addresses before you click OK . Configur ing SNMP Alerts T [...]

  • Page 80

    80 Configuration: About Y our Storage Array NOTE: The community name is an American Standa rd Code for Information Interchange (ASCII) string that ide ntifi es a known set of network management stations and is set by the network administrator . The default community name is the string “public”. The trap destinat ion is the IP address or the hos[...]

  • Page 81

    Configuration: About Y our Storage Array 81 The learn cycle completes the follo wing operations: • Dischar ges the battery to a pr edetermined threshold • Char ges the battery back to full capacity A learn cycle starts automatically wh en you install a new battery module. L earn cycles for batteries in both R AID controller modules in a duplex [...]

  • Page 82

    82 Configuration: About Y our Storage Array written by the RAID controll er modu les to the Event L og match the event timestamps written to host log files. The RAID controller modules re main available during synchronization. T o synchronize the RAID controller module clocks with the storage management station: 1 In the AMW , select Storage Array [...]

  • Page 83

    Configuration: Using iSCSI 83 7 Configuration: Using iSCSI Changing the iSCSI T arget Authentication 1 In the AMW , select the Setup tab. 2 Select Manage iSCS I Settings . The Manage iSCSI Sett ings window is dis played and b y default, the T arget Authentication tab is selected. T o ch ange the authentication settings, select: • None —If you d[...]

  • Page 84

    84 Configuration: Using iSCSI Entering Mutual Authentication Permissions Mutual authentication or two-way authenti cation enables a client o r a user to verify themselves to a host server and fo r the host server to validate itself to the user . This validation is accomplishe d in such a way that both parties ar e sure of the other ’s ide ntity .[...]

  • Page 85

    Configuration: Using iSCSI 85 Initiator CHAP Secret The initiator CH AP secret is set on the host using the iSCSI ini tiator configuration program provided with th e host o perating system. If you are using the mutual authentication meth od, you must def ine the initiator CHAP secret when you set up the host. This must be the same CHAP secret that [...]

  • Page 86

    86 Configuration: Using iSCSI Changing the iSCSI T arget Identification Y ou cannot change the iSCSI tar get name, but you can associate an a lias with the tar get for simpler identification. Aliases ar e useful because the iSCSI targ et names are not intuitive. P rovide an iSCSI target alias that is meaningful and easy to reme mber . T o change th[...]

  • Page 87

    Configuration: Using iSCSI 87 • Select Specify Configuration , and type the IPv4 address to activate the targ et discovery . • T ype the iSNS server IP address in the IPv6 settings area to activate the targ et discovery . After you manually enter an IP address, you can also click Advanced to configure the customized TCP listening ports. If you [...]

  • Page 88

    88 Configuration: Using iSCSI 4 T o use the IPv4 settings for the iSCSI host port, select Enable IPv4 and select the IPv4 Settings tab. 5 T o use the IPv6 settings for the iSCSI host port, select Enable IPv6 and select the IPv6 Settings tab. 6 T o configure the IPv4 and IPv6 settings: • T o automatically configure the settings, select Obtain c on[...]

  • Page 89

    Configuration: Using iSCSI 89 Advanced iSCSI Host Ports Settings NOTE: Configuring the advanced iSCSI hos t ports settings is optional. Use the advanced settings for the indivi dual iSCSI host ports to specify the TCP frame size, the virtual LA N, and the network priority . NOTE: Changing any of these settings resets the iSCSI port. I/O is interrup[...]

  • Page 90

    90 Configuration: Using iSCSI V iewing or Ending an iSCSI Session Y ou may want to end an iSCSI se ssion for the following reasons: • Unauthorized acces s—If an initiator whom you consi der to not have access is logged on , you can en d the iSCSI session. En ding the iSCSI session forces the initiator to log off the storage array . The initiato[...]

  • Page 91

    Configuration: Using iSCSI 91 V iewing iSCSI Statistics and Setting Baseline Statistics T o view iSCSI statis tics an d set baseline statistics: 1 In the AMW toolbar , select Storage Array  iSCSI  Statistics . The Vi e w i S C S I S t a t i s t i c s window is displayed. 2 Select the iSCSI statistic type you want to view in the iSCSI St atist[...]

  • Page 92

    92 Configuration: Using iSCSI Edit, Remove, or Rename Host T opology If you give access to the wro ng host or the wrong host group, you can r e move or edit the host topology . T o correct t he host topology : F or more inform ation about Host, Ho st Groups, and Host T opology , see "Configuration : About Y o ur Host" on page 95. T able 7[...]

  • Page 93

    Configuration: Event Monitor 93 8 Configuration: Event Monitor An event monitor is provided with De ll P owerV ault Modular Disk Stor age Manager (MDSM). The event monitor runs continuous ly in the background and monitors activity on the managed storage arrays. If the event monitor detects any critical problems, it can notify a host or r emote syst[...]

  • Page 94

    94 Configuration: Event Monitor Windows T o enable or disa ble the event monitor: 1 Click Start  Administrative T ools  Ser vices . or Click Start  Settings  Control P anel  Administrative T ools  Services . 2 F rom the list of services, select Modular Disk Storage Ma nager Event Monitor . 3 Select Action  P r operties . 4 T o [...]

  • Page 95

    Configuration: About Y our Host 95 9 Configuration: About Y our Host Configuring Host Access Modular Disk Storage Manager (MDSM) software is comprised o f multiple modules. One of thes e modules is the Host Conte xt Agent. The host conte xt agent is installed as part of the MD SM installation and runs continuously in the background. If the host co [...]

  • Page 96

    96 Configuration: About Y our Host • Cr eate a host and assign an alias or user label. • Add or associate a ne w host port id entifier to a particular h ost. • Change the host p ort identifier alia s or user la bel. • Move or associate a host port identifier to a differ en t host. • Replace a host port id entifier with a new host port ide[...]

  • Page 97

    Configuration: About Y our Host 97 • Select the Mappings tab. Right-click the root node (storage array name), Default Group node, or Host Group node in the To p o l o g y pane to which you wan t to add the host, and select Define  Host from the pop-up menu. The Specify Host Name window is displayed. 3 In Host name , enter an up to 30 character[...]

  • Page 98

    98 Configuration: About Y our Host The Pr e v i e w window is displayed. 11 Click Fi n i s h . Removing Host Access T o r emove host access: 1 In the AMW , select the Mappings tab, select the host node in the To p o l o g y pane. 2 P erform one of these actions: • Select Mappings  Rem o v e . • Right-click the host node and select Rem o v e [...]

  • Page 99

    Configuration: About Y our Host 99 • Right-click the storage array or the Default Group, and sele ct Define  Host Group from the pop-up menu. 4 T ype the name of the new host group in Enter new host group name . 5 Select the appropriate hos ts in the Select hosts to add ar ea. 6 Click Add . NOTE: T o remove hosts, select the hosts in the Hosts[...]

  • Page 100

    100 Configuration: About Y our Host 4 Click Ye s . The host is moved to the selected ho st group with the following mappings: • The host r etains the specific virt ual disk mappings assi gned to it. • The hos t inherits the virtu al disk mappings assigned to the host group to which it is moved. • The host loses the virtual disk mappings assig[...]

  • Page 101

    Configuration: About Y our Host 101 • Changing a host type MDSM automatically detect s these changes for any host running the host agent software. Starting or S topping the Host Co ntext Agent The host context agent discovers the host topology and starts and stops with the host. The topology discovered by th e host context agent can be viewed by [...]

  • Page 102

    102 Configuration: About Y our Host 4 Click Action  Start . I/O Data Path Protection Y ou can have multiple host-to-array co nnections for a host. Ensur e that you select all the connections to the array when configuring ho st access to the storage array . NOTE: See the Deployment Guide for more information on cabling configurations. NOTE: For m[...]

  • Page 103

    Configuration: About Y our Host 103 Managing Host Port Identifiers Y ou can manage the h ost port identifiers tha t are added to the storag e array . Y ou can: • Add—Add or as sociate a new host p ort identifier to a particular host. • Edit—Change the host port identifier al ias or user label . Y ou can move (associate) the host p ort ident[...]

  • Page 104

    104 Configuration: About Y our Host • Add by creating a new host port identifier —In New host po rt identifier , enter the name of the new host port identifier . 6 In User label , enter up to 30 character alphanumeric name. 7 In Associated with host , select the approp riate host or host group. 8 Select the host port i dentifier that you would [...]

  • Page 105

    Configuration: Disk Groups and Virtua l Disks 105 10 Configuration: Disk Groups and V irtual Disks Creating Disk Groups and V irtual Disks Disk groups ar e created in the unconfi g ured capacity of a storage array , and virtual disks ar e created in the fr ee capacity of a disk group. The maximum number of physical disks supported in a disk group i[...]

  • Page 106

    106 Configuration: Disk Groups and V irtual Disks A disk group must be organized accor ding to its related tasks and subtasks. F or example, if you cr eate a disk gr oup for the Accounting Department, you can cr eate virtual disks that mat c h the different types of accounting transactions performed in the depa rtment: Accounts Receivable (AR), Acc[...]

  • Page 107

    Configuration: Disk Gr oups and V irtual Disks 107 3 T ype the name of the disk group (up to 30 characters) in Disk group name . 4 Select the appropriate Physical Disk selection choices , you can select: • A utomatic , see step 6 • Manual , see step 9 5 Click Next . 6 F or Automatic configuration, the RA I D L e v e l a n d C a p a c i t y wind[...]

  • Page 108

    108 Configuration: Disk Groups and V irtual Disks Locating a Disk Group Y ou can physically locate and identify al l of the physical disks that comprise a selected disk group. An LED blinks on each physical disk in the disk gro up. T o locate a disk group: 1 In the AMW , select the Lo gi c al tab. 2 Select the appropriate disk grou p and from the t[...]

  • Page 109

    Configuration: Disk Gr oups and V irtual Disks 109 NOTE: Ensure that you create disk gr oups before creating virtual disks. T o cr eate virtual disks: 1 Choose one of these methods to start the Create V irtual Disk W izard : • T o cr eate a virtual disk from unconfigured capacity in the storage array—On the Lo gi c a l tab, select an Unconfigur[...]

  • Page 110

    110 Configuration: Disk Groups and V irtual Disks • Use recommended settings . • Customize settings . 6 Click Next . 7 In the Customize Advanced V irtual Disk P arameters window , sel ect the appropriate Virtual Disk I/O characteristics type. Y ou can select: • F ile system (typical) • Database •M u l t i m e d i a •C u s t o m NOTE: If[...]

  • Page 111

    Configuration: Disk Gr oups and V irtual Disks 111 2 Select a virtual disk. 3 In the toolbar , sele ct Vi r t u a l D i s k  Change  Modification P riority . The Change Modi fication P riority window is displayed. 4 Select one or more virtual disks. T o select nonadjacent virtua l disks, press <Ctrl> click. T o select adjacent virtual d[...]

  • Page 112

    112 Configuration: Disk Groups and V irtual Disks 2 In the toolbar , select Vi r t u a l D i s k  Change  Cache Settings . The Change Cache Settings window is displayed. 3 Select one or more virtual disks. T o select nonadjacent virtual disks, press <Ctrl> click. T o select a djacent virtual disks, p ress <Shift> click. T o select[...]

  • Page 113

    Configuration: Disk Gr oups and V irtual Disks 113 7 Click OK . Changing the Segment Size of a Virtual Disk Y ou can change the segme nt size on a selected virtual disk. During this operation, I/O performance is affect ed, but you r data remains avai lable. Guidelines to pro ceed with cha nging the se gment siz e: • Y ou cannot cancel this operat[...]

  • Page 114

    114 Configuration: Disk Groups and V irtual Disks The segment size modification operation begins. The virtual disk icon in the Lo g i ca l pane shows an Operation in P rogre ss s tatus while the operation is taking place. NOTE: T o view the progress or change the prio rity of the modification operation, select a virtual disk in the disk group, and [...]

  • Page 115

    Configuration: Disk Gr oups and V irtual Disks 115 NOTE: If you selected the Custom option, select your preferred dynamic cache read prefetch se tting (enabled/disabl ed) and segment size (8 KB to 512 KB). 2 Click OK . Choosing an Appropriate Phy sical Disk T ype Y ou can cr eate disk groups and virtual disks in the storage array . Y ou must select[...]

  • Page 116

    116 Configuration: Disk Groups and V irtual Disks Whenever the power is turned off and turned on again, all of the security- enabled phys ical disks chang e to a se curity locked s tate. In t his state, the data is inaccessible until the corr ect security k ey is provided by a R AID controller module. Y ou can view the self encryp ting disk status [...]

  • Page 117

    Configuration: Disk Gr oups and V irtual Disks 117 NOTE: If you have not created a security key for the storage array , the Create Security Key option is active. If you have creat ed a security key for the storag e array , the Create Security Key option is inactive with a check mark to the left. The Change Security Key option, the Save Security Key[...]

  • Page 118

    118 Configuration: Disk Groups and V irtual Disks Creating a Security Key When you create a security key , it is generated by and secur ely stored by the array . Y ou cannot r ead or view the security k ey . A copy of the security k ey must be kept on some other storage medium for backup in case of system failur e or for transfer to another stor ag[...]

  • Page 119

    Configuration: Disk Gr oups and V irtual Disks 119 The pass phrase that you enter is mask ed. NOTE: Create Key is active only if the pass phrase meets the above mentioned criterion. 5 In Confirm p ass phrase , re-enter the e xact string that you entered in Pa s s phrase . M ake a re co rd o f t h e p a s s p h ra s e t h at you enter ed and the sec[...]

  • Page 120

    120 Configuration: Disk Groups and V irtual Disks T o change the security k ey : 1 In the AMW toolbar , select Storage Array  Physical Disk Security  Change Security K ey . The Confirm Change Security K ey window is d isplayed. 2 Ty p e yes in the text field, and click OK . The Change Security K ey window is displayed. 3 In Secure key iden[...]

  • Page 121

    Configuration: Disk Gr oups and V irtual Disks 121 Saving a Security Key Y ou save an externally storable copy of the security key when the security key is first creat ed and each time it is changed. Y ou can create additional storable copies at any ti me. T o save a new copy of the security key , you must provide a pass phrase. The pass phrase you[...]

  • Page 122

    122 Configuration: Disk Groups and V irtual Disks V alidate Security Key A file in which a security key is stor ed is validated through the Va l i d a t e Securi ty K ey dialog. T o transfer , archiv e, or back up the security k ey , the R AID controller module firmwar e encrypts (or wraps) the security key and stor es it in a file. Y ou must provi[...]

  • Page 123

    Configuration: Disk Gr oups and V irtual Disks 123 Befor e you complete this option, mak e sure that the physical disk that you have selected is the corr ect physical di sk. Y ou cannot recover any of the data that is currently on the physical disk. After you complete the secure erase proc edur e, the physical disk is availabl e for use in another [...]

  • Page 124

    124 Configuration: Disk Groups and V irtual Disks T o assign or unassi gn hot spar e physical disks: 1 In the AMW , select the Physical tab. 2 Select one or mor e physical disks. 3 P erform one of these actions: • Select Physical disk  Hot Spare Coverage . • Right-click the physical disk and select Hot Spare Coverage from the pop-up menu. Th[...]

  • Page 125

    Configuration: Disk Gr oups and V irtual Disks 125 12 Ty p e yes and click OK . Hot Spares and Rebuild A valuable strategy to protect data is to assign available physica l disks in the storage array as hot spares. A hot spar e a dds another level of fault tolerance to the storage array . A hot spar e is an idle, powe re d-on, stand-by phys ical dis[...]

  • Page 126

    126 Configuration: Disk Groups and V irtual Disks Hot Spare Drive Protection Y ou can use a hot spare physical disk fo r additional data protection from physical disk failur es that occur in a R AID level 1, or R AID level 5 disk group. If the hot spare physical disk is availabl e when a physical disk fails, the R AID controller module uses r edund[...]

  • Page 127

    Configuration: Disk Gr oups and V irtual Disks 127 CAUTION: Enclosure loss protection is not guar anteed if a phy sical disk has already failed in the disk group. In this situation, losing access to an expansion enclosure and consequently another phy sical disk in the disk group causes a double phy sical disk failure and loss of data. Enclosur e lo[...]

  • Page 128

    128 Configuration: Disk Groups and V irtual Disks Host-to-V irtual Disk Mapping After you cr eate virtual disks, you must map them to the host(s) connected to the array . Guidelines to configur e ho st-to-virtual disk mapping: • Each virtual disk in the storage array can be mapped to only one host or host group . • Host-to-virtual disk mappings[...]

  • Page 129

    Configuration: Disk Gr oups and V irtual Disks 129 • Each host has its own L UN address space. MDSM permits the same L UN to be used by dif ferent hosts or host groups to a ccess virtual disk s in a storage array . • Not every operating system has the same number of L UNs availa ble. • Y ou can def ine the mappings on the Mappings tab in the [...]

  • Page 130

    130 Configuration: Disk Groups and V irtual Disks All defined hosts, host g roups, and the d efault group is d isplayed in the list. NOTE: When configuring an iSCSI storage array , including the MD3200i or MD3220i, if a host or a host group is selected that does not have a SAS host bus adapter (SAS HBA) host port defined, a warning dialog is displa[...]

  • Page 131

    Configuration: Disk Gr oups and V irtual Disks 131 • Right-click th e virtual disk, an d select Change Mapping from the pop-up menu. 3 In Host group or host, select the appropriate host group or host. By default, the d rop-down list shows the curr ent host group or the host associated with the selected virtual disk. 4 In Lo gi c a l u n it n um b[...]

  • Page 132

    132 Configuration: Disk Groups and V irtual Disks During a virtual disk copy , the same R AID controlle r module must own both the source virtual disk and the target virtual disk. Some times both virtual disks do no t have the same preferr e d R AID controller module when the virtual disk copy starts. Ther efore, the ownership of the tar g et virtu[...]

  • Page 133

    Configuration: Disk Gr oups and V irtual Disks 133 associated source virtual disk. Ch an ging the R AID controller module ownership of a virtual di sk changes the preferr ed R AID controller module ownership of the virtual disk. During a virtual disk copy , the same R A ID controll er module must ow n both the source virtual disk and the tar get vi[...]

  • Page 134

    134 Configuration: Disk Groups and V irtual Disks • The disk group must be in Optimal status befor e you can perform this operation. • Y our data remains available during this operation. • If you do not have enough capacity in the disk group to convert to the new R AID level, an error message is displayed, and the operation does not continue.[...]

  • Page 135

    Configuration: Disk Gr oups and V irtual Disks 135 In this example, the mpath6 device contains two paths: -- /dev/sdf at Host 1, Channel 0, Target 0, LUN 2 --/dev/sde at Host 0, Channel 0, Target 0, LUN 2 3 Flush the multi-pathing device ma pping using the following command: # multipath -f /dev/mapper/mapth_x where mapth_x is the device you want to[...]

  • Page 136

    136 Configuration: Disk Groups and V irtual Disks Restricted Mappings Many hosts are able to map up to 256 lo gical unit num bers (L UNs) (0 to 255) per storage partition. However , the maximum number of mappings differs because of operatin g system variables, failov er driver issues, and potential data problems. The hosts li sted in the table have[...]

  • Page 137

    Configuration: Disk Gr oups and V irtual Disks 137 • Y ou cannot move a host with a r estricted host type into a storage partition that already has L UNs mapped that ar e greater than what is allowed by the restricted host type. F or example, if you have a restricted host type that allows only L UNs up to 31, you cannot move that r estricted host[...]

  • Page 138

    138 Configuration: Disk Groups and V irtual Disks a Change the RAID controller module ownership of a virtual disk—Go to step 2. b Change the RAID controller module ownership of a disk group—Go to step 3. 2 T o change the R AID controller module ownership of a virtual disk, perform these steps: a Select the Lo gi ca l tab. b Select the virtual d[...]

  • Page 139

    Configuration: Disk Gr oups and V irtual Disks 139 e Click Ye s . The ownership of the disk group is changed. I/O to the disk group is now directed through this I/O path. Y ou are finished with this procedur e. NOTE: The disk group may not use the new I/O path until the multi-path driver reconfigures and recognizes the new path. Th is action usuall[...]

  • Page 140

    140 Configuration: Disk Groups and V irtual Disks Storage Partitioning A storage partiti on is a logical e ntity co nsisting of one or more virtual disks that can be accessed by a si ngle host or shared among hosts that are part of a host group. The first time you map a virtu al disk to a specific host or host group, a storage partition is created.[...]

  • Page 141

    Configuration: Disk Gr oups and V irtual Disks 141 NOTE: Y ou can include a secondary virtual di sk in a storag e partition. However , any hosts that are mapped to the secondary virtual disk has read-only access until the virtual disk is promoted to a primary virtual disk, or the mirror relationship is removed. Storage partitioning topology is the [...]

  • Page 142

    142 Configuration: Disk Groups and V irtual Disks 5 Click Add . A message prompts you to confirm your se lection. 6 T o add the capacity to the disk group, click Ye s . Y ou can also use the Command Line Interface (CLI) on both W indows and Linux hosts to add free capacity to a disk group. After the capacity e xpansion is completed, additional fr e[...]

  • Page 143

    Configuration: Disk Gr oups and V irtual Disks 143 F or more information, see the P owerV ault Modular Disk Storage Manager online help topics. Disk Group Migration Disk group migration allows to you e xport a disk grou p so that you can import the disk group to a different storage arra y . Y ou can also export a disk group so that you can s tore t[...]

  • Page 144

    144 Configuration: Disk Groups and V irtual Disks 2 Stop all I/O and unmount or dis connect the fil e systems on th e virtual disks in th e disk group . 3 Back up the data on the virt ual disks in the disk group. 4 L ocate the disk group and label the physic al disks. 5 Place the disk group offline. 6 Obtain blank physica l disk modules or new phys[...]

  • Page 145

    Configuration: Disk Gr oups and V irtual Disks 145 NOTE: Some settings cannot be import ed during the import disk group procedure. The following settings are remove d/cleared during the procedure: • P ersistent reservations • Host-to-virtual disk mappings • Virtual disk copy pairs • Snapshot virtual disks and sn apshot r epository virtual d[...]

  • Page 146

    146 Configuration: Disk Groups and V irtual Disks • Recover ed media error—Data could not be re a d b y t h e p h y s i c a l d i s k o n t h e first attempt but was successfully r ead on a subsequent attempt. Data is rewritten to the physical disk and veri fied and the error is reported to the event log. • Redundancy mismatches error—The f[...]

  • Page 147

    Configuration: Disk Gr oups and V irtual Disks 147 8 Click OK . Suspendi ng the Media S can Y ou cannot perform a media scan whil e performing another long-running operation on the disk drive such as reconstruction, copy-back, r econfiguration, virtual di sk initialization, or immediate availabil ity formatting. If you want to perform an other long[...]

  • Page 148

    148 Configuration: Disk Groups and V irtual Disks book.book Page 148 Saturday, Sep tember 24, 2011 9:06 AM[...]

  • Page 149

    Configuration: Premium Featur e—Sna pshot Virtual Disks 149 11 Configuration: Premium Feature— Snapshot V irtual Disks NOTE: If you order ed this feature, you recei ved a Premium Feature Activation card shipped in the same box as your Dell PowerV ault MD storage array . Follow the directions on the card to obtain a key file and to enable the fe[...]

  • Page 150

    150 Configuration: Premium F eature—Snapshot V irtual Disks repository uses less disk space than a full physical copy , because the only data blocks that ar e stor ed in the snapshot r epository vi rtual disk are those th at have changed sinc e the time of the snapshot. When you create a snapshot virtual disk, specify its location, capacity , sch[...]

  • Page 151

    Configuration: Premium Featur e—Sna pshot Virtual Disks 151 T o implement this backup, select the fi rst virtual disk and create a back up schedule that runs once a day , Monday through F riday , at a time between the end of the work day and 11PM. Do not select an end date. Apply the same schedule to the second virtual disk, t h en map the two sn[...]

  • Page 152

    152 Configuration: Premium F eature—Snapshot V irtual Disks Enabling and D isabling Snapshot Sche dules A scheduled snapshot operation can be temporarily suspended by disabling the schedule. When a schedule is disa bled, the schedule time r continue s to run but any scheduled snapshot operation do not occur . Scheduled Snapshot Icons Scheduled sn[...]

  • Page 153

    Configuration: Premium Featur e—Sna pshot Virtual Disks 153 About the Simple Path Using the sim ple path, you can specify : • Snapshot Virtual Disk Name—A us er -s pecified name that hel ps you associate the snapshot virtual d isk to its corr esponding snap shot re pository virtual disk and source virtual disk. • Snapshot Repository Virtual[...]

  • Page 154

    154 Configuration: Premium F eature—Snapshot V irtual Disks NOTE: Mapping the sn apshot virtual disk to the node that does not own the source virtual disk before the Snaps hot enabling process is co mpleted can result in the operating sy stem mis-identifying the snapshot virtual disk. Thi s, in turn, can result in data loss on the source virtual [...]

  • Page 155

    Configuration: Premium Featur e—Sna pshot Virtual Disks 155 2 In the AMW , select the Log ic al tab and select a valid source virtual disk. 3 Select Vi r t u a l D i s k  Snapshot  Create . Alternatively , you can rig ht- click the sou rce virtual disk and select Create Snapshot Virtual Disk from the pop-up menu. The Create Snapshot V irtua[...]

  • Page 156

    156 Configuration: Premium F eature—Snapshot V irtual Disks 13 T o associate the mapping between the storage array name and th e virtual disk name, r un the host-ba sed SMdevices utility . NOTE: If your operating sy stem requires add it ional instru ctions, you can find those instructions in your ope rating sy stem documentation. Creating a Snaps[...]

  • Page 157

    Configuration: Premium Featur e—Sna pshot Virtual Disks 157 – Dell recommends placing the snapsh ot repository virtual disk within the disk group of the source virtual disk. This ensures that if drives associated with the disk group are moved to another stor age array , all the virtual disks associated with the snapsho t virtual disk r emain in[...]

  • Page 158

    158 Configuration: Premium F eature—Snapshot V irtual Disks The destination of a snapshot repository virtual disk is determined based on the fr ee capacity a vailable in the dis k gr oup. A snapshot repository virtual disk requir es a minimum 8 MB of fr ee capa city . Y o u can choose your pr eferred creation path—simple or advanced—if th e d[...]

  • Page 159

    Configuration: Premium Featur e—Sna pshot Virtual Disks 159 2 Using your W ind ows system, fl ush the cache to th e source. At th e host prompt, type SMrepassist -f <filename-identifier> and press <Enter>. F or more information, see "SMrepassist Utility" on page 257. 3 Remove the drive letter(s) of the s ource in W indows or[...]

  • Page 160

    160 Configuration: Premium F eature—Snapshot V irtual Disks 3 Select Vi r t u a l D i s k  Snapshot  Create . Alternatively , you can right- click the source virtual dis k and select Create Snapshot V irtual Disk from the pop-up menu . The Create Snapshot V irtual Disk Wizard - Introduction dialog is displayed. 4 Select Advanced , and click[...]

  • Page 161

    Configuration: Premium Featur e—Sna pshot Virtual Disks 161 12 Click OK . 13 In the Mappings tab, assign mappings between the snapshot vir tual disk and the host that accesses the snapshot virtual disk. 14 T o r egister the snapshot virtual disk with the host operating system, run the host-based hot_add utility . 15 T o associate the mapping betw[...]

  • Page 162

    162 Configuration: Premium F eature—Snapshot V irtual Disks • The next available sequence numbe r is based on th e number of existing snapshots of a source virtual disk. If you delete a sn apshot virtual disk , its sequence number becom es available again. • Y ou mus t choose a unique name for the snapshot virtual disk and the snapshot reposi[...]

  • Page 163

    Configuration: Premium Featur e—Sna pshot Virtual Disks 163 NOTE: Y ou can add a maximum of two phy sical disks at one time to increase snapshot repository virtual disk capacity . T o e xpand the snapshot r epository virtual disk from MDSM: 1 In the AMW , select the Log ic al tab. 2 Select the snapshot repository virtual dis k for which you want [...]

  • Page 164

    164 Configuration: Premium F eature—Snapshot V irtual Disks 7 If unassigned physical disks are not available, do you have empty s lots in the e xpansion enclosures? • Y e s, there ar e empty slots—Insert new physical disks by using the information in the initial setup guid e f or your expansion enclosure. Go to step 9. • No , there ar e no [...]

  • Page 165

    Configuration: Premium Featur e—Sna pshot Virtual Disks 165 • Not all of the capacity that is added is used to incr ease the capacity of the snapshot repository virtual disk. On the Physical tab, the unas signed physical dis ks or unconfigured capacity that you added to incr ease th e capacity of the snapshot repository virtual disk change to a[...]

  • Page 166

    166 Configuration: Premium F eature—Snapshot V irtual Disks Preparing Host Servers to Re-create a Snapsho t Virtua l Disk NOTE: Before you create a new snapshot of a sour ce virtual disk, stop any data access (I/O) activity or suspend data transfer to the source virtual disk and snapshot virtual disk to ensure that yo u captur e an accurate snaps[...]

  • Page 167

    Configuration: Premium Featur e—Sna pshot Virtual Disks 167 Re-creating Snapshot V irtual Disks Y ou can r e-create a snapsh ot virtual disk that you have previously disabled. CAUTION: Possible loss of data redundancy – If the snapshot virtual disk is in Optima l status, it is fi rst disabled prior to being re-cr eated. This action invalidates [...]

  • Page 168

    168 Configuration: Premium F eature—Snapshot V irtual Disks The associated snapshot r epository virtu al disk must have sufficient capacity to process the rollback operation and th e write operati ons from the ho st. At most, the snapsho t repository virtual disk may need twice the size of the base disk, plus additional metadata space equaling ap[...]

  • Page 169

    Configuration: Premium Featur e—Sna pshot Virtual Disks 169 If an error occurs during the rollback , the operation is paused and the base virtual disk and snapshot virtual di sk displays Ne eds Attention icons. The R AID controller module also logs th e event to the Major Event Log (MEL). F ollow the Recovery Guru procedur e to corr ect the error[...]

  • Page 170

    170 Configuration: Premium F eature—Snapshot V irtual Disks 2 Choose one: • Select the snapshot virtual disk, and select Vi r t u a l D i s k  Snapshot  Rollb ack . • Right-click the snapshot virtual disk and select Rol l b ac k . The Confirm R ollback Snapshot V irtual Disk dialog is dis played. 3 In the Select rollback priority are[...]

  • Page 171

    Configuration: Premium Featur e—Sna pshot Virtual Disks 171 Canceling a Sna pshot Rollback WA RN I N G : Risk of data loss: If you cancel a snapshot rollback in progr ess, the base virtual disk may remain in an unusabl e state and the snapshot virtual disk is displayed as failed in the MD stor age management software. Therefore, do not cancel a s[...]

  • Page 172

    172 Configuration: Premium F eature—Snapshot V irtual Disks book.book Page 172 Saturday, Sep tember 24, 2011 9:06 AM[...]

  • Page 173

    Configuration: Premium Feature—V irtual Disk Copy 173 12 Configuration: Premium Feature— V irtual Disk Copy NOTE: A virtual disk cop y overwrit es data on the target virtual disk. Before starting a virtual disk copy , ensure that you no longer need the data or back up the data on the target virtual disk. NOTE: If you order ed this feature, you [...]

  • Page 174

    174 Configuration: Premium F eature—V irtual Disk Copy • Copying data for improved access—As your storage requir ements for a virtual disk change, you can use a virtual disk copy to copy data to a virtual disk in a d isk group tha t uses drives with larger capacity within the same storage array . Copying data for larger access capacity enable[...]

  • Page 175

    Configuration: Premium Feature—V irtual Disk Copy 175 the source virtual disk may be rejected by the storage array R A ID controller modules and result in an erro r message. M ake sur e tha t the Read-Only attribute for the target virtual disk is di sabled after the virtual disk copy is complete to pr event error me ssage s from being displayed. [...]

  • Page 176

    176 Configuration: Premium F eature—V irtual Disk Copy Creating a V irtual Disk Copy for an MSCS Shared Disk T o cr eate a virtual disk copy for a Mi cros oft Cluster Server (MSCS) shar ed disk, create a snapshot of the virtual disk, and then use the snapshot virtual disk as the source for the virtual disk copy . NOTE: An attempt to directly crea[...]

  • Page 177

    Configuration: Premium Feature—V irtual Disk Copy 177 • T o enable Read-Only permission, sel ect Change  Ta r g e t V i r t u a l D i s k Pe r m i s s i o n s  Enable R ead-Only . NOTE: Write requests to the target virt ual disk are rejected when the Read- Only permission is enabled on the target virtual disk. • T o disable Read-Onl y p[...]

  • Page 178

    178 Configuration: Premium F eature—V irtual Disk Copy Creating a V irtual Disk Copy CAUTION: Possible loss of data – Source virt ual disks that are participating in a virtual disk copy are available for read I/ O activity only while a virtual disk copy has a status of In Progress or Pending. Wr ite requests are allowed afte r the virtual disk [...]

  • Page 179

    Configuration: Premium Feature—V irtual Disk Copy 179 V irtual Disk Co py and Modificati on Operations If a modifi cation operation is running on a source virtual disk or a target virtual disk, and the virtual disk copy ha s a status o f In P rogress , P ending, or F ailed, the virtual disk copy does not take place. If a modification operation is[...]

  • Page 180

    180 Configuration: Premium F eature—V irtual Disk Copy Preferred RAID Contro ller Module Ownership During a virtual disk copy , the same R AID controlle r module must own both the source virtual disk and the target vi rtual disk. If both virtual disk s do not have the same pr eferred R AID controller module when the virtual disk copy starts, the [...]

  • Page 181

    Configuration: Premium Feature—V irtual Disk Copy 181 A virtual di sk copy autom atically makes the target virtual disk read-only t o hosts. Y o u may want to k eep this attribut e enabled to pr eserve the data on the target virtual disk. CAUTION: If you decide not to preserve the data on the ta rget virtual disk after the virtual disk copy has c[...]

  • Page 182

    182 Configuration: Premium F eature—V irtual Disk Copy 9 Ty p e yes and clic k Fi n i s h . NOTE: Operation in Progress icons are displa yed on the source virtual disk and the target virtual disk while t he virtual disk copy has a stat us of In Progress or Pending. F or more inform ation, see the P owerV ault Modular Disk Storage Manager online h[...]

  • Page 183

    Configuration: Premium Feature—V irtual Disk Copy 183 2 In the table, select one or more copy pairs. 3 Select Change  Copy P r iority . The Change C opy P riority window is dis played. 4 In the Copy priority area, select the appropriate copy priority , depending on your system performance needs. NOTE: There are 5 copy priority rates available:[...]

  • Page 184

    184 Configuration: Premium F eature—V irtual Disk Copy Preparing Host Servers to Recopy a V irtual Disk NOTE: Before you create a new copy of a source virtual disk, stop any data access (I/O) activity or suspend data transfer to the source virtu al disk (and, if applicable, the target disk) to ensure that you captur e an accurate point-in-time im[...]

  • Page 185

    Configuration: Premium Feature—V irtual Disk Copy 185 Re-Copying a V irtual Disk Y ou can use the Copy Manager to create a new virtual disk copy for a selected source virtual disk and a tar get virtual disk. Use th is option when you have stopped a virtual disk copy and want to start it again or when a virtual disk copy has failed or completed. T[...]

  • Page 186

    186 Configuration: Premium F eature—V irtual Disk Copy Removing Copy Pairs Y ou can remove one or more virtual disk copies by using the Copy Manager . Any virtual disk copy-rel ated informatio n f or the source virtual disk and the targ et virtual disk is r emoved from the Vi r t u a l D i s k P r o p e r t i e s and the Storage Array P rofile di[...]

  • Page 187

    Configuration: Premium Feature—U pgrading to High- Performance-T ier 187 13 Configuration: Premium Feature— Upgrading to High-Performance- Ti e r The High P erformance Tier pr emium feature on an MD3200i Series array increases the performance of the system beyond that o f a MD3200i Series array operating at the standa rd performance le vel. If [...]

  • Page 188

    188 Configuration: Premium Feature—Upgrading to High-Performance-T ier book.book Page 188 Saturday, Sep tember 24, 2011 9:06 AM[...]

  • Page 189

    Configuration: Device M apper Multipath for Linux 189 14 Configuration: Device Mapper Multipath for Linux Overview The MD3200i Seri es storage ar ray uses a Li nux operating sy stem softwar e framework , known as Device Mapper (DM), to enable multipath capabilities on Linux Host Servers. The DM multip ath functionality is provided by a combination [...]

  • Page 190

    190 Configuration: Device Mapper Multipath for Linux Using DM Multipathing Devices NOTE: Using or modifyin g any nodes other than the multipathi ng device nodes can result in array or file sy stem problems, including loss of communication with the array and corruption of the file sy ste m. Avoid accessing any device other than the multipathing devi[...]

  • Page 191

    Configuration: Device M apper Multipath for Linux 191 NOTE: Any array s configured with MDCU automa tically adds to the list of Devices in the PowerV ault Modular Disk Storage Manager Enterprise Ma nagement Window (EMW). Device Mapper Con figuration Steps T o complete the DM multipathing conf iguration and make storage available to the Linux host s[...]

  • Page 192

    192 Configuration: Device Mapper Multipath for Linux Display the multipath device topology using the multipath comman d The multipath command adds newly sca nned and mapped virtual disks to the Device Mapper tables an d creates entries for them in the /dev/mapper dir ectory on the host server . Thes e devices ar e the same as any other block device[...]

  • Page 193

    Configuration: Device M apper Multipath for Linux 193 _ round-robin 0 [prio=1][enabled] _ 6:0:0:22 sdcl 69:144 [active][ghost] where: mpathb is the name of the virtual device cr eated by device mapper . It is located in the /dev/mapper directory . DELL is the vendor of the device MD3200i is the model of the device Sdx is the physical path to the [...]

  • Page 194

    194 Configuration: Device Mapper Multipath for Linux # ls The followi ng are some examples of the general mapping formats: On RHEL hosts ,a partit ion node has the form at /dev/mapper/mpath<x>p<y>, where <x> is the alphabetic number for the multipathing device, <y> is the partition number for this device. On SLES 11.x hosts,[...]

  • Page 195

    Configuration: Device M apper Multipath for Linux 195 Blacklist Local Drive in Multi-path Driver If your multipath drivers are connecting to storage ar ea networks (SANs), it may be useful to be able to ex clude or "b lacklist" certain devices in your /etc/m ultipa th.con f file. Blacklisting prevents the multipath driver from attempting [...]

  • Page 196

    196 Configuration: Device Mapper Multipath for Linux 2 Stop the Device Mapper multipath service # /etc/init.d/multipathd stop 3 Flush the Device Mapper multipa th maps list to r emove any old or modified mappings # multipath –F NOTE: The boot operating sy stem drive may have an entry with the Device Mapper multipathing table. This is not affected[...]

  • Page 197

    Configuration: Device M apper Multipath for Linux 197 Limitations and Known Issues • In certain error conditions with the no_path_retry or the queue_if_no_path feature is set, applications may hang. T o over come these conditions the you must ente r the followi ng command for each affected multipath device: dmsetup message [device] 0 "fail_i[...]

  • Page 198

    198 Configuration: Device Mapper Multipath for Linux • After a failed path is r estored on an MD3600i S eries array , failback does not occur automatically because the driver cannot auto-detect devices without a forced rescan. R un the command rescan_dm_devs to force a rescan of the host server . This re stores the fa iled paths enabling failback[...]

  • Page 199

    Configuration: Device M apper Multipath for Linux 199 I re moved a L UN. But the multipathing mapping is still ther e. The multi pathing device is still there aft er you re mo v e t h e LU N s. Run multipath –f <device node for the delete d LUN> to remove the multipathing mapping. F or example, if a device r elated with /dev/dm-1 is deleted[...]

  • Page 200

    200 Configuration: Device Mapper Multipath for Linux book.book Page 200 Saturday, Sep tember 24, 2011 9:06 AM[...]

  • Page 201

    Management: Firmware Downloads 201 15 Management: Firmware Downloads Downloading RAID Controller and NVSRAM Packages A version number exists for each firm ware file. Th e vers ion num ber indicates whether the firmware is a major versio n or a m inor version. Y ou can use the Enterprise Management W indow (EMW) to download and ac tivate both t he m[...]

  • Page 202

    202 Management: Firmware Downloads Downloading Both RAID Controller and NVSRAM Firmware NOTE: I/O to the array can continue while y ou are upgrading RAID controller and NVSRAM firmware. NOTE: Dell recommends that the firmware and NVSRAM be upgraded during a maintenance period when the array is not being used for I/O. NOTE: The RAID enclosure must c[...]

  • Page 203

    Management: Firmware Downloads 203 7 Click Tr a n s f e r . K eep these guidelines in mind: –I f t h e Tr a n s f e r button is inactive, e nsure that you either select an NVSR AM file or cl eared the T ransfer NVSR AM file with RAID controller module firmwar e. – If the file selected is not valid or is not compatible with the curr ent storage [...]

  • Page 204

    204 Management: Firmware Downloads The Select F ile dialog is displ ayed. 13 Select the file to download. 14 Click OK . 15 If you want to downloa d the NVSR AM file with the R AID controller module firmwar e, select Download NVSR AM file with firmware in the Select files ar ea. Attributes of the firmware file are displayed in the F irmware file inf[...]

  • Page 205

    Management: Firmware Downloads 205 2 Select Advanced  Maintenance  Download  RA I D C o n t r o l l e r Module NVSRAM or Select the Support tab, and click Download F irmware . In Select download task , select Download R AID controller module NVSRAM and click OK . An error message is di splayed. Click OK to close it and select a compatible [...]

  • Page 206

    206 Management: Firmware Downloads NOTE: The Details pane shows the details of only one storage array at a time. If you select more than one storage array in the Storage array pane, th e details of the storage array s are not shown in the Detai ls pane. 9 Click NVSR AM in the Download ar ea. NOTE: If you select a storage array that cannot be upgrad[...]

  • Page 207

    Management: Firmware Downloads 207 disk called DA Cstore. D ACstor e and the physical disk firmware enable easier r econfiguration and migr ation of the physical disks. The physical disk firmwar e performs these functions: • Th e p h y s i c a l d is k f i r m w a re re c ord s t h e l o c a t io n o f t h e p h y s ic a l d i s k i n a n ex pans[...]

  • Page 208

    208 Management: Firmware Downloads 4 Navigate to the location of the packages and click OK . The selected package is added to the P ackages to be transferred area. 5 Click Next . The Download Physical Disk F irmware - Select Physical Disks window is displayed. 6 In the Compatible Physical Disks tab, select the appropriate physical disks or Select a[...]

  • Page 209

    Management: Firmware Downloads 209 •I n t h e A M W , s e l e c t Advanced  Maintenance  Download  EMM F irmware . • Select the Support tab, and click Download F irmware . In the dialog that is displayed, select the EMM firmware , and click OK . The Download Environmental (EMM) F irmware dialog is dis played. 2 In the Select enclosures[...]

  • Page 210

    210 Management: Firmware Downloads • The download fail ed—The status of one expansion enclosure shows F ailed and the remainder o f the ex pansion enclosur es show Canceled. Mak e sure that the new firmwar e file is compatible befor e attempting another firmware download. Self-Monitoring Analy sis and Reporting T echnology (SMART) Self -Monitor[...]

  • Page 211

    Management: Installing Array Compone nts 211 16 Management: Installing Array Components Recommended T ools Y ou may need the f ollowing items to pe rform the procedur es in this section: • K ey to the system keylock •# 2 P h i l l i p s s c r e w d r i v e r •W rist grounding stra p book.book Page 211 Saturday, Sep tember 24, 2011 9:06 AM[...]

  • Page 212

    212 Management: Installing Array Componen ts Front Bezel (Optional) Removing the Front Bezel 1 Using the system key , unlock the front bezel (if lock ed). 2 Lift up the r elease latch next to the keylock. 3 Rotate the left end of the be zel away from the front panel. 4 Unhook the right end of the bezel and pull the bezel away from the system. Figur[...]

  • Page 213

    Management: Installing Array Compone nts 213 Hard Drives SAFETY : Models AMT , E03J, and E04J Models AMT , E03J, and E04J ar e intended for installation only in restricted access locations as defined in cl 1.2.7.3 of IEC 60950-1:2005. Depending on your configur ation, your array either supports up to twenty f o u r 2 . 5 " S A S ha rd d r i v [...]

  • Page 214

    214 Management: Installing Array Componen ts Figure 16-3. Removing and Installing a 2. 5" Hard-Drive Blank (MD3220i Only) Installing a Hard -Drive Blank 1 If installed, r emove the front bezel . See "Removing the F ront Bezel" on page 212. 2 Insert the hard-drive blank into the dr ive bay until the blank is fully seated. 3 Close the [...]

  • Page 215

    Management: Installing Array Compone nts 215 2 F rom the Modular Disk Storage Manager (MDSM) software, pr epare the drive for r emoval. W ait until the har d-drive indicators on the drive carrier signal that the drive can be r emoved safely . F or more information, see your controller d ocumentation fo r information about hot-swap drive removal. If[...]

  • Page 216

    216 Management: Installing Array Componen ts Installing a Hard Drive CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troublesh ooting and simple repairs as authorized in your product documentation, or as dir ected by the online or telephone service and support team. Damage due to servicing that is n[...]

  • Page 217

    Management: Installing Array Compone nts 217 Figure 16-5. Removing and Installing a Hard Drive Into a 3.5" Hard-Drive Carrier 1 screws (4) 2 hard drive 3 SAS screw hole 4 hard-drive carrie r 2 4 1 3 book.book Page 217 Saturday, Sep tember 24, 2011 9:06 AM[...]

  • Page 218

    218 Management: Installing Array Componen ts Figure 16-6. Removing and Installing a Hard Drive Into a 2.5" Hard-Drive Carrier 1 screws (4) 2 hard drive 3 SAS screw hole 4 hard-drive carrier 4 1 3 2 book.book Page 218 Saturday, Sep tember 24, 2011 9:06 AM[...]

  • Page 219

    Management: Installing Array Compone nts 219 Installing a Hard Drive Into a Hard-Drive Carrier 1 Insert the hard dr ive into the hard-d rive carrier with the connector end of the drive at the back. See F igure 16-5. 2 Align the screw holes on the hard drive with the back set of holes on the hard-drive carrier . When aligned correctly , the back of [...]

  • Page 220

    220 Management: Installing Array Componen ts 5 Connect all the power cables to the array . 6 T urn on the array and the host server . Figure 16-7. Removing and Installing a RAID Controller Module Blank Installing a RAID Controller Module Blank T o install a R AID controller module blank: 1 Align the blank with the R AID controller module bay 2 Inse[...]

  • Page 221

    Management: Installing Array Compone nts 221 Removing a RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team. Damage due to servicing t[...]

  • Page 222

    222 Management: Installing Array Componen ts Installing a RAID Controller Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or teleph one service and support team. Damage due to servicin[...]

  • Page 223

    Management: Installing Array Compone nts 223 Figure 16-9. Opening and Closing the RAID Controller Module Closing the RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by th e online or [...]

  • Page 224

    224 Management: Installing Array Componen ts RAID Controller Module Backup Battery Unit Removing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online[...]

  • Page 225

    Management: Installing Array Compone nts 225 Installing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by th e online or telephone service and support team. D[...]

  • Page 226

    226 Management: Installing Array Componen ts support team. Damage due to servicing tha t is not authorized by Dell is not covered by your warranty . Read and follow the safe ty instructions t hat came with the product. NOTE: If you remove a fully func tioning pow er supply/cooling fan module, the fan speed in the remaining module increases signific[...]

  • Page 227

    Management: Installing Array Compone nts 227 Figure 16-11. Removing and Installing a Power Supply/Cooling Fan Module 1 release tab 2 power supply 3 power supply handle 1 3 2 book.book Page 227 Saturday, Sep tember 24, 2011 9:06 AM[...]

  • Page 228

    228 Management: Installing Array Componen ts Installing a Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or teleph one service and support team. Damage due to[...]

  • Page 229

    Management: Installing Array Compone nts 229 Control Panel Removing the Control Panel 1 T urn off the array a nd host server . 2 Disconnect all the power cables connected to the array . 3 Remove the har d drives from: – slots 0 to 2 in P owerV ault MD320 0i – slots 0 to 5 in P owerV ault MD322 0i See "Removing a Hard Drive" on page 21[...]

  • Page 230

    230 Management: Installing Array Componen ts Figure 16-14. Removing and Installing t he Control Panel-PowerV ault MD3220i Installing the Co ntrol Panel 1 Align the control panel with the slot on the ar ray . 2 Slide the control panel into the array until: – The release tab clicks into place in P owerV ault MD3200i . See F igure 16-13. – The rel[...]

  • Page 231

    Management: Installing Array Compone nts 231 Backplane CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team. Damage due to servicing that is not authorized by[...]

  • Page 232

    232 Management: Installing Array Componen ts Figure 16-15. Removing and Installing the RA ID Controller Module/Power Supply Cage 1 screws (6) 2 RAID controller module/power supply cage 2 1 book.book Page 232 Saturday, Sep tember 24, 2011 9:06 AM[...]

  • Page 233

    Management: Installing Array Compone nts 233 Figure 16-16. Removing and Installing the Backplane-PowerV ault MD3200i Figure 16-17. Removing and Installing the Backplane-PowerV ault MD3220i 1 screws (5) 2 backplane 3 captive sc rew 1 screws (4) 2 backplane 3 captive sc rew 2 1 3 2 1 3 book.book Page 233 Saturday, Sep tember 24, 2011 9:06 AM[...]

  • Page 234

    234 Management: Installing Array Componen ts Installing the Ba ckplane 1 Align the hol es on the back plan e with the holes on the array . 2 Tighten the captive scr ew to secur e the backplane to the chassis. See F igure 16-1 6 for P owerV ault MD3200i or F igure 16-17 for P owerV ault MD3220i. 3 Replace the screws that secur e the backplane to the[...]

  • Page 235

    Management: Firmware Inventory 235 17 Management: Firmware Inventory A storage array is made up of many components, which may include R AID controller modules, physical disks, and enclo sur e management modules (EMMs). Each of these components co ntains firmware. Some versions of firmware ar e dependent on other ve rsions of firmwar e. T o capture [...]

  • Page 236

    236 Management: Firmware Inventory book.book Page 236 Saturday, Sep tember 24, 2011 9:06 AM[...]

  • Page 237

    Management: Sy stem Interfaces 237 18 Management: Sy stem Interfaces Microsoft Services V irtual Disk Service The Microsoft V irtual Disk Service (VDS) is a component of the W indows operatin g system. The VDS co mponent util izes thir d-party vendor s pecific software modules, known as providers, to access and configur e third-party storage resour[...]

  • Page 238

    238 Management: Sy stem Interfaces VSS attaches to the service and uses it to coor dinate the cr eation of snapshot virtual disks on the storag e array . VSS-initiated snap shot virtual disks c an be triggere d through backup to ols, known as requestors. The VSS P rovider Configuration T ool offers the following configuration o ptions: • Snapshot[...]

  • Page 239

    T roubleshooting: Y our Storage Array Software 239 19 T roubleshooting: Y our Storage Array Software Start-Up Routine L ook and listen during t he array ’s start-up routine fo r the indications described in T able 19-1. F o r a descri ption of the front- and back-panel indicators, see "Planning: About Y o ur Storage Array" on page 23. N[...]

  • Page 240

    240 T roubleshooting: Y our Storage Array Software •O n t h e Devices tab, in either the T r ee view or the T able view , double-click a storage array . Alternatively , you can right-click a storage array and select Manage Storage Array from the pop-up men u. •O n t h e Setup tab, select Manage a Storage Array . After the AMW is displ ayed, sel[...]

  • Page 241

    T roubleshooting: Y our Storage Array Software 241 In the T a ble view , every managed storage array is listed once, r egardless of the number of attachment s it has in the T ree view . After the storage array is contacted by MDSM, an icon representing i ts h a rd wa re s t a tu s i s d i sp l a ye d . Hardwar e status can be Optimal, Needs Attent [...]

  • Page 242

    242 T roubleshooting: Y our Storage Array Software NOTE: MDSM may take a few minutes to update a status change to Unresponsive or from Unresponsive. A status change from or to Unresponsive depends on th e network link to the storage array . All other status change updates faster . Storage Array Support Data Y ou can gather various type s of invento[...]

  • Page 243

    T roubleshooting: Y our Storage Array Software 243 2 Enter a name for the support data file in Specify filename or click Browse to navigate to a previously saved file to overwrite an existing file. The suffix .zip is added automatically to the file if you do not specify a suffix for the fil e. 3 Enter the Execution summary . 4 Click Start . After a[...]

  • Page 244

    244 T roubleshooting: Y our Storage Array Software Collecting the Phy sical Disk Data Y ou can use the Collect Physical Disk Da ta optio n to colle ct log sens e data from all the physical disks on your storage array . L og sense data consists of statistical informat ion that is mainta ined by each of the physical disks in your stor age array . Y o[...]

  • Page 245

    T roubleshooting: Y our Storage Array Software 245 The event log window shows two types of event views: • Summary view—Shows an even t summary in a table form. • Detail view—Shows details about a selected event. T o view the event log: 1 In the AMW , select Advanced  T roubleshooting  V iew Event L og . The Event Log is displayed. By [...]

  • Page 246

    246 T roubleshooting: Y our Storage Array Software • Alert notification messages that ar e sent to the appropriate de stinations • Hardwar e indicator lights The status icons r eturn to Optimal status as problems are resolved. Storage Array Profile The storage array profile provi des a desc ription of all of the components and properties of the[...]

  • Page 247

    T roubleshooting: Y our Storage Array Software 247 b T ype the term that you want to search for in the Fi n d text box. If the term is located on the current tab, the term is highlighted in the storage array profile information. NOTE: The search is limited to the current tab. If you want to search for the term in other tabs, select the tab and clic[...]

  • Page 248

    248 T roubleshooting: Y our Storage Array Software 2 Select Vi e w  Associated Logical Elements . Alternatively , you can right- click the virtual d isk to open a pop-up me nu and select Vi e w  Associated L ogical Elements . If you select a virtu al disk that does not ha ve logical associations with other virtual disks, the Associated Logica[...]

  • Page 249

    T roubleshooting: Y our Storage Array Software 249 • The node name and the R AID level • The node name and the virtual disk capacity T o find nodes: 1 In the AMW , select Vi e w  Fi n d . 2 Based on the type of se arch, select one of these options, and go to the indicated s tep: • Search by name – see step 3. • Search by special criter[...]

  • Page 250

    250 T roubleshooting: Y our Storage Array Software b T ype the capacity in the GB box. c Specify that the fr ee capacity to be matched is less than, equal to , or greater than the capacity entered in the GB box. d Go to step 8. 8 Click Fi n d N e x t . T o see every node that matches the criteria, click Fi n d N e x t r epeatedly . If no matches ar[...]

  • Page 251

    T roubleshooting: Y our Storage Array Software 251 4 Select Vi e w  Go T o  Source V irtual Disk . The selection jumps to the associated source virtual disk in the Lo gi c a l pane. 5 Select Vi e w  Go T o  T arget V irtual Disk . NOTE: If the source virtual disk has more th an one associated target virtual disk, select the target vi rt[...]

  • Page 252

    252 T roubleshooting: Y our Storage Array Software • ping <host-name> • ping <RAID controller module-IP -address> 7 If the ver ification is successful, see step 8, if not, see step 9. 8 Remove the storage array with the Unresponsive status from the EMW , and s elect Add Storage Array to add the storage array again. 9 If the storage [...]

  • Page 253

    T roubleshooting: Y our Storage Array Software 253 19 If you have recently replaced or added the RAID controller module, restart the host conte xt agent software so that the new R AID controller module is rec o g n i z e d . 20 If the problem still exists, make the appropriate host modifications, check with other administrators to see if a firmware[...]

  • Page 254

    254 T roubleshooting: Y our Storage Array Software T o locate the physical disk: 1 Select the Physical tab. 2 Select the physica l disks that you want to locate. 3 Select Physical Disk  Blink  Physical Disk . The LEDs on the selected physical disks blink. 4 When you have located the physical disk s, click OK . The LEDs stop blinkin g. If any [...]

  • Page 255

    T roubleshooting: Y our Storage Array Software 255 Locating an Expansion Enclosure Y ou can use the Blink option to physica lly loc ate and i dentify a n expansion enclosure in the storage array . The LED activation varies accor ding to the type of e xpansion enclosure that you have. • If you have an expansion enclosure with a white LED, the Blin[...]

  • Page 256

    256 T roubleshooting: Y our Storage Array Software Capturing the State Information Use the T roubleshootin g  Capture State Information option to captur e information about the curr ent state of your stor age array and save the captured information to a te xt file . Y ou can then send the captured information to your T echnical Suppo rt repr ese[...]

  • Page 257

    T roubleshooting: Y our Storage Array Software 257 SMrepassist Utility SMrepassist (r eplication ass istance) is a host-based utility for W indows platforms. This util ity is installed with MDSM. Use this uti lity befor e and after you creat e a virtual disk copy on a W indows operating system to ensure that all t he memor y-resident data for file [...]

  • Page 258

    258 T roubleshooting: Y our Storage Array Software Unidentified Devices An unidentified node or device occu rs when MDSM cannot access a new storage array . Causes for this error include network connection problems, the storage array is turned off, or the storage array does not e xist. NOTE: Before beginnin g any recovery procedure, make sure that [...]

  • Page 259

    T roubleshooting: Y our Storage Array Software 259 ping <host-name-or-IP-address-of-the-host> . If the network can access the host, co ntinue to step c. If the n etwork cannot access the hos t, go to st ep d. c Remove the host with the unr espon sive status from the MDSM, and add that host again. If the host returns to optimal status, you hav[...]

  • Page 260

    260 T roubleshooting: Y our Storage Array Software 5 Mak e sure that the controller firmware is compatible with MDSM on your management station. If the controller firmware was upgraded, the MDSM may not have access to the storage arr ay . A new version of MDSM may be needed to manage the storage array with the new version of the controller firmw ar[...]

  • Page 261

    T roubleshooting: Y our Storage Array Software 261 or Click Start  Administrative T ools  Ser vices . 2 In the Ser vices dialog , select Modular Disk Storage Manager Agent . 3 If the modular disk storage ma nager agent is running, click Action  Stop and wait approxim ately 5 seconds. 4 Click Action  Start . Linux T o start or r estart t[...]

  • Page 262

    262 T roubleshooting: Y our Storage Array Software book.book Page 262 Saturday, Sep tember 24, 2011 9:06 AM[...]

  • Page 263

    T roubleshooting: Y our Array 263 20 T roubleshooting: Y our Array Safety First—For you and Y our Array CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team[...]

  • Page 264

    264 T roubleshooting: Y our Array T roubleshooting Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troublesh ooting and simple repairs as authorized in your product documentation, or as dir ected by the online or telephone service and support team. Damage due to servi[...]

  • Page 265

    T roubleshooting: Y our Array 265 T roubleshooting Array Cooling Problems CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team. Damage due to servicing that i[...]

  • Page 266

    266 T roubleshooting: Y our Array c Reseat the EMM module and wai t for 30 seconds. See "Removing an EMM" in the MD1200 and MD 1220 Storage Enclosures Hardwar e Owner's Manual . d T urn on the server . e Check the EMM status LED. f If the LED does not turn Gr een, replace the EMM. If the problem is not r esolved, see "Getting He[...]

  • Page 267

    T roubleshooting: Y our Array 267 T roubleshooting RAID Controller Modules CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team. Damage due to servicing that [...]

  • Page 268

    268 T roubleshooting: Y our Array e Check the link status LED. If the link sta tus LED is not gr een, replace the cables. If the problem is not r esolved, see "Getting Help" on page 273. T roubleshooting Hard Drives CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troublesh ooting and simpl[...]

  • Page 269

    T roubleshooting: Y our Array 269 T roubleshooting Array and Expansion Enclosure Connections 1 V erify that the RAID controller module po rt link status LED and the R AID controller module status LED are solid green for each port that is connected to a cable. If the LEDs are not solid gr een, see "Planning: RAID Controller Mo dules" on pa[...]

  • Page 270

    270 T roubleshooting: Y our Array •H a r d d r i v e s • RAID controller modules • P ower supply/cooling fan modules • Control panel •B a c k p l a n e 3 L et the system dry thoroughly for at least 24 hours. 4 Reinstall the components you removed in step 2. 5 Connect all the cables and turn on the array . If the array does not start prope[...]

  • Page 271

    T roubleshooting: Y our Array 271 T roubleshooting RAID Controller Modules Conditions Certain events can cause a R AID controll er module to fail and/or shut down. Unre coverable ECC m emory or PCI errors , or critical physical conditions can cause lockdown. If your R AID storage ar ray is configured for r edundant access and cache mirroring, the s[...]

  • Page 272

    272 T roubleshooting: Y our Array PCI Errors The storage array firmware can detect an d only recover from PCI erro rs when the R AID controller modules ar e configur ed for redundancy . If a virtual disk uses cache mirroring , it fails over to its peer R AID controller module, which initiates a flush of the dirty cache. Critical Conditions The stor[...]

  • Page 273

    Getting Help 273 21 Getting Help Contacting Dell F or cus tomers in the United States , call 800- WWW -DELL (800-9 99-3355). NOTE: If you do not have an active Inte rnet connection, you can find contact information on your purchase invoice, packing slip, bill, or Dell product catalog. Dell provides several online and telepho ne-based support and se[...]

  • Page 274

    274 Getting Help book.book Page 274 Saturday, Sep tember 24, 2011 9:06 AM[...]

  • Page 275

    Index 275 Index A Access Virtual Disk, 66 Advanced F eatur e Using Snaps hot and Disk Copy To g e t h e r , 5 4 Advanced F eatur es, 50 Snapshot Repository Virtual Disk, 5 2 Snapshot Virtual Disks, 5 1 Advanced iSCSI Host P orts Settings, 89 Advanced P ath, 156 Array Management T ypes In-Band Manage ment, 6 6 Out-of -Band Management, 6 5 B backplan[...]

  • Page 276

    Index 276 contacting Dell, 273 control panel installing, 2 3 0 re m o v i n g , 2 2 9 Copy Manager , 180 D Defining a Host, 96 Dell contacting, 2 7 3 Disk Group Creating, 1 0 6 Expansion, 1 4 1 Export, 1 4 3 E x p o r t i n g , 143 Import, 1 4 4 L o c a t i n g , 108 Migration, 1 4 3 Disk Group and V irtual Disk Expansion, 141 Disk Group Operations[...]

  • Page 277

    Index 277 F ree Capa city , 142 front bezel installing, 2 1 2 re m o v i n g , 2 1 2 H hard drive drive carrier , 2 1 6 installing, 2 1 6 re m o v i n g , 2 1 4 Har d-Drive Indicator Pa t t e r n s , 2 8 H ard w a re F e a t u re s Back panel featur es, 2 7 F ront panel featur es, 2 4 Hard dr ive indicator patterns, 2 8 P ower indicator codes, 3 0 [...]

  • Page 278

    Index 278 Media Errors and Unreadable Sectors, 210 Medi a Scan Changing setti ngs, 1 4 6 Suspending, 1 4 7 Microsoft Virtual Disk Serv ice, 2 3 7 V olume Shadow-Cop y Service, 2 3 7 Microsoft Services Vi rt u a l D i s k C o p y , 5 3 Monitoring P e rformance, 57 Multi-P ath P referre d and Alternate Controllers and P aths, 5 5 Multi-P ath Software[...]

  • Page 279

    Index 279 front bezel, 2 1 2 hard drive, 2 1 4 har d drive from a drive carrier , 2 1 6 power supply/cooling fan module, 2 2 5 Removing Copy P airs, 186 Removing Host Access, 98 Restricted Mappings, 136 S Safety , 19 safety , 263 Security Key C h a n g i n g , 119 Creating, 1 1 8 Saving, 1 2 1 Segment Size, 42 Setting a P assword , 71 Setting Copy [...]

  • Page 280

    Index 280 Starting or Restarting the Host-Agent Softw are, 2 6 0 Start-Up Routine, 2 3 9 Storag e Array P rofile, 2 4 6 Storage Array Support Data, 2 4 2 Unidentified De vices, 2 5 8 Vi ew in g t h e L og i c a l A s s o c i a t i o n s , 247 Viewing the Physical A s s o c i a t i o n s , 248 troubleshooting, 263 connections, 2 6 9 cooling problems[...]

  • Page 281

    Index 281 Vi r t u a l D i s k O p e r a t i o n s Limit, 45 V irtual Disk Ownership, 55 Vi r t u a l D i s k S t a t e s , 4 0 Vi r t u a l D i s k C o p y Ta r g e t , 5 3 V irtual Disks and Disk Groups, 39 book.book Page 281 Saturday, Sep tember 24, 2011 9:06 AM[...]

  • Page 282

    282 Index book.book Page 282 Saturday, Sep tember 24, 2011 9:06 AM[...]