Dell EMC AX4-5I manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Dell EMC AX4-5I. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Dell EMC AX4-5I ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Dell EMC AX4-5I décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation Dell EMC AX4-5I devrait contenir:
- informations sur les caractéristiques techniques du dispositif Dell EMC AX4-5I
- nom du fabricant et année de fabrication Dell EMC AX4-5I
- instructions d'utilisation, de réglage et d’entretien de l'équipement Dell EMC AX4-5I
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Dell EMC AX4-5I ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Dell EMC AX4-5I et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Dell en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Dell EMC AX4-5I, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Dell EMC AX4-5I, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Dell EMC AX4-5I. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    www .dell.com | support.dell.com Dell|EMC AX4-5i iSCSI Storage Array s With Microsoft ® Windows Server ® Failover Clusters Hardware Installation and T roubleshooting Guide[...]

  • Page 2

    Notes, Notices, and Cautions NOTE: A NOTE indicates important informati on that helps you make better use of your computer . NOTICE: A NOTICE indicates either potentia l damage to hardware or loss of data and tells you how to avoid the problem. CAUTION: A CAUTION indicates a potential for property damage, personal injury , or death. _______________[...]

  • Page 3

    Contents 3 Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . 5 Cluster Solution . . . . . . . . . . . . . . . . . . . . . . 6 Cluster Hardware Requirements . . . . . . . . . . . . . 6 Cluster Nodes . . . . . . . . . . . . . . . . . . . . . 7 Cluster Storage . . . . . . . . . . . . . . . . . . . . 8 NICs Dedicated to iSCSI . . [...]

  • Page 4

    4 Contents 3 Preparing Y our Sy stems for Clustering . . . . . . . . . . . . . . . . . . . . . 27 Cluster Configuration Overview . . . . . . . . . . . . . 27 Installation Overview . . . . . . . . . . . . . . . . . . 29 Installing the iSCSI NICs . . . . . . . . . . . . . . 30 Installing the Microsoft iSCSI Software Initiator . . . . . . . . . . . . [...]

  • Page 5

    Introduction 5 Introduction A Dell™ F ailover Cluster combines specific hardwar e and softwar e components to provide enhanced availability for applications and services that run on your cluster . A F ailover Cl uster reduces the possibility of any single point of failure within the system that can cause the cluster ed applications or services to[...]

  • Page 6

    6 Introduction Cluster Solution Y our cluster supports a minimum of tw o nodes to a maximum of either eight nodes (with W indows Server 2003 operat ing systems) or sixteen nodes (with W indows Server 2008 operating systems) an d provides the following features: • Gigabit Ethernet technology for iSCSI clusters • High availability of r esources t[...]

  • Page 7

    Introduction 7 Cluster Nodes T able 1-1 lists the har dware r eq uirements for the cluster nodes. T able 1-1. Cluster Node Requirements Component Minimum Requirement Cluster nodes A minimum of two iden tical P owerEdge servers are r equir ed. The maximum number of nodes that is supported depends on the variant of the W indows Server operating syste[...]

  • Page 8

    8 Introduction Cluster Storage Cluster nodes can share access to e xterna l storage systems. However , only one of the nodes can own any R AID volume in the e xternal storage system at any time. Microsoft Cluster Services (MSC S) controls which node has access to each R AID volume in the shar ed storage system. T able 1-2 lists the supported storag[...]

  • Page 9

    Introduction 9 NOTE: Ensure that the core software versio n running on the storage sy stem is supported. For specific ve rsion requirements, see the Dell Cluster Configuration Support Matrices located on the De ll High A vailabilit y Cluster website at www .dell.com/ha . NICs Dedicated to iSCSI The NIC controlled by iSCSI Software I nitiator acts a[...]

  • Page 10

    10 Introduction Figure 1-1. Direct-Attached, Single-Cluster Configuration EMC PowerPath Limitations in a Direct-Attached Cl uster EMC P owerP ath provides failover capabili ties and multiple path detection as well as dynamic load balancing between multiple ports on the same storage processor . However , direct-attached clu sters supported by Dell c[...]

  • Page 11

    Introduction 11 Figure 1-2. iSCSI SAN-Attached Cluster Other Documents Y ou May Need CAUTION: For important safety and regulato ry information, see the safety information that shipped with your sy stem. Warranty information may be included within this document or as a separate document. NOTE: T o configure Dell blade server module s in a Dell Power[...]

  • Page 12

    12 Introduction •T h e Dell F ailover Clusters with Micros oft W indows Server 2008 Installation and T roubleshooting Guide provides mor e information on deploying your cluster with the W indows Server 2008 operating system. •T h e Dell Cluster Configuration Support Matrices provides a list of r ecommended operating systems, har d ware componen[...]

  • Page 13

    Cabling Y our Cluster Hardware 13 Cabling Y our Cluster Hardware NOTE: T o configure Dell blade server module s in a Dell™ PowerEdge™ cluster , see the Using Dell Blade Servers in a Dell PowerEdge High Availability Cluster document located on th e Dell Support website at support.dell.com . Cabling the Mouse, Keyboard, and Monitor When installin[...]

  • Page 14

    14 Cabling Y o ur Cluster Hardware Figure 2-1. Power Cabling Exam ple With One Power Supply in the PowerEdge Sy stems and One SPS in the AX4-5i Storage Array redundant power supplies on one AC power strip (or on one AC PDU [not shown]) primary power supplies on one AC power strip (or on one AC PDU [not shown]) NOTE: This illustration is intended on[...]

  • Page 15

    Cabling Y our Cluster Hardware 15 Figure 2-2. Power Cabling Example With T w o Power Supplies in the PowerEdge Sy stems and T wo SPSs in the AX4-5i Storage Array Cabling Y our Cluster for Public and Private Networks The network adapters in the cluster nodes provide at least two network connections for each node, as described in T able 2-1. NOTE: T [...]

  • Page 16

    16 Cabling Y o ur Cluster Hardware F igure 2-3 shows an e xample of cabling in which dedicated network adapters in each node are connected to each ot her (for the private network) and the remaining network adapters ar e co nnected to the public network. Figure 2-3. Example of Network Cabling Connection Cabling the Public Network Any network adapter[...]

  • Page 17

    Cabling Y our Cluster Hardware 17 Cabling the Private Network The private network connection to the no des is provided by a different network adapter in each node. This network is used for intra-cluster communications. T able 2-2 describe s thr ee possible private network configurations. NOTE: Throughout this doc ument, the term Gigabit Ethernet re[...]

  • Page 18

    18 Cabling Y o ur Cluster Hardware Cabling the Storage Sy stems This section provides information fo r connecting your clus ter to a storage system in a dir ect-attached configuration , or to one or mor e storage systems in an iSCSI SAN-attached configuration. Connect the management port on each storage processor to the network where the management[...]

  • Page 19

    Cabling Y our Cluster Hardware 19 Each cluster node attaches to the stor age system using CA T5e or CA T6 LAN cables with RJ45 connectors that at tach to Gigabit Ethernet NICs in the cluster nodes and the Gigabit iSCSI storage processor (SP) ports in the Dell|EMC storage system. NOTE: The connections listed in this secti on are representative of on[...]

  • Page 20

    20 Cabling Y o ur Cluster Hardware Figure 2-5. Cabling the Cluster Node s to an AX4-5i Storage Sy stem Cabling Storage for Y our iSCSI SAN-Attached Cluster An iSCSI SAN-attached cluster is a cl uster configuration where all cluster nodes are attached to a single storage system or to multip le storage systems through a network using a re dundant swi[...]

  • Page 21

    Cabling Y our Cluster Hardware 21 Figure 2-6. T wo-Node iSCSI SAN-Attached Cluster cluster node cluster node private network iSCSI connections storage sy stem Gigabit Ethernet switch Gigabit Ethernet switch public network iSCSI connections[...]

  • Page 22

    22 Cabling Y o ur Cluster Hardware Figure 2-7. Eight-Node iSCSI SAN-Attached Cluster public network storage sy stem cluster nodes (2-8) Gigabit Ethernet switch Gigabit Ethernet switch private network[...]

  • Page 23

    Cabling Y our Cluster Hardware 23 Cabling One iSCSI SAN-Attached Cluster to a Dell|EMC AX4-5i Storage S y stem 1 Connect cluster node 1 to the iSCSI network. a Connect a network cable from iSCSI NIC 0 (or NIC port 0) to the network switch 0 (sw0). b Connect a network cable from iSCSI NIC 1 (or NIC port 1) to the network switch 1 (sw1). 2 Repeat ste[...]

  • Page 24

    24 Cabling Y o ur Cluster Hardware Figure 2-8. Cabling an iSCSI SAN-Attached Cluster to the Dell|EMC AX4-5i sw0 sw1 cluster node 2 cluster node 1 AX4-5i storage sy stem 0 1 0 1 Gigabit Ethernet ports (2) Gigabit Ethernet ports (2) SP-A SP-B[...]

  • Page 25

    Cabling Y our Cluster Hardware 25 Cabling Multiple iSCSI SAN-Attached Cl usters to a Dell|EMC Storage Sy stem T o cable multiple clusters to the stora ge system, connect the cluster nodes to the appropriate iSCSI switches and t hen connect the iSCSI switches to the appropriate storage processors on the processor enclosur e. F or rules and guideline[...]

  • Page 26

    26 Cabling Y o ur Cluster Hardware When attaching multiple storage systems with your cluster , the following rules apply : • Ther e is a maximum of four storage systems per cluster . • The shar ed storage systems and firmwar e must be identical. Using dissimilar storage systems and firmwar e for your shar ed storage is not supported. • MSCS i[...]

  • Page 27

    Preparing Y our Sy stems for Clustering 27 Preparing Y our Sy stems for Clustering CAUTION: Only trained service technicians are authorized to remove and access any of the components ins ide the sy stem. For complete information about safety precautions, working insid e the computer , and protecting against electrostatic discharge, see the safety i[...]

  • Page 28

    28 Preparing Y our Sy st ems for Clustering 4 Establish the physical network topo logy and the T CP/IP settings for network adapters on each cluster no de to provide access to the cluster public and private networks. 5 Configure each cluster node as a member in the same W indows Active Directory Domain. NOTE: Y ou can configure the cluster nodes as[...]

  • Page 29

    Preparing Y our Sy stems for Clustering 29 11 T est the failover capabilities of your new cluster . NOTE: For Failover Clusters configured wi th Windows Server 2008, you can also use the Cluster V alidation Wizard . 12 Configur e highly-available applications and services on your F ailover Cluster . Depending on your configurat ion, this may also r[...]

  • Page 30

    30 Preparing Y our Sy st ems for Clustering The following sub-sections describe steps that enable you to establish communication between the cluster nodes and your shared Dell|EMC AX4-5i storage array , and to present disks from the storage array to the cluster . The following installation procedur es are discussed in the subsequent sections: • &[...]

  • Page 31

    Preparing Y our Sy stems for Clustering 31 6 Read and accept the license agr eement and click Next to install the software . 7 At the completion screen, click Fi n i s h to complete the installation. 8 Select the Do not restart now option to re boot the system after modifying the TC P/IP r egistry settings in the section "Configuring the Shar [...]

  • Page 32

    32 Preparing Y our Sy st ems for Clustering 4 In the Choose Language Setup screen, select the r equired language, and click OK . 5 In the We l c o m e window of the setup wizard, click Next . 6 In the CLARiiON AX -series window , select P owerP ath and click Next . F ollow the on-the-screen instructi ons to complete the installation. 7 Click Ye s t[...]

  • Page 33

    Preparing Y our Sy stems for Clustering 33 5 F ollow the on-screen instructions to complete the installation. 6 T o initialize the storage system: a F rom the cluster node or management station launch the Navisphere Storage System Initialization Util ity that you installed. Go to Start → P rograms → EMC → Navisphere → Navisphere Storage Sys[...]

  • Page 34

    34 Preparing Y our Sy st ems for Clustering Configuring the Navisphere Server Utility The Navisphere Server Utility r egisters the cluster node NICs with the storage systems, allowing the nodes to access t he cluster storage data. The tool is also used for cluster node maint enance procedures, such as: • Updating the cluster node host name and/or[...]

  • Page 35

    Preparing Y our Sy stems for Clustering 35 Configuring the iSCSI Initiator Configuring the iSCSI Initiator using iSNS iSNS includes an iSNS server component and iSNS client component. The iSNS server must reside within the IP storage network on a host or in the switch firmware . An iSNS client re sides on both the iSCSI storage system and any iSCSI[...]

  • Page 36

    36 Preparing Y our Sy st ems for Clustering • Discovery domains and login control service – Resources in a typical storage network ar e divided into ma nageable groups called discovery domains. Discovery domains help scal e the storage network by reducing the number of unnecessary logins; each i nitiator only logins to a subset of targets which[...]

  • Page 37

    Preparing Y our Sy stems for Clustering 37 T o connect to the storage system: 1 On the cluster node, open the Navisphere Server Utility . 2 Select Configure iSCSI Connections on this cluster node and click Next . 3 Select Configure iSCSI Connections and click Next . 4 In the iSCSI T argets and Connections window , select Discover iSCSI targets usin[...]

  • Page 38

    38 Preparing Y our Sy st ems for Clustering Configuring the iSCSI Initiator without iSNS On the cluster node: 1 Open the Navispher e Server Utility . 2 Select Configure iSCSI Connections on this cluster node and click Next . 3 Select Configure iSCSI Connections and click Next . 4 In the iSCSI T argets and Connections window , select one of the foll[...]

  • Page 39

    Preparing Y our Sy stems for Clustering 39 7 Click Next . If the Network Interfaces (NICs) window is displayed, go to step 8. If the Ser ver Re gistration window is displayed, go to step 9. 8 In the Network Interfaces (NICs) window : a Deselect any NICs that are used for general network traffic and click Apply . b Click OK and then click Next . 9 I[...]

  • Page 40

    40 Preparing Y our Sy st ems for Clustering Advanced Storage Features (Optional) Y our Dell|EMC AX4-5i storage array may be configured to provide advanced features that can be used with your cluster . These features include Snapshot Management, SANCopy , Navisphere Manager , and MirrorView . The following sections describe these features. Snapshot [...]

  • Page 41

    Preparing Y our Sy stems for Clustering 41 Installing and Configuring a Failover Cluster Y ou can configure the operating system s ervices on your F ailover Cluster , after you have established the private and pu blic networks and have assigned the shared disks from the stor age array to the cluster no des. The procedures for configuring the failov[...]

  • Page 42

    42 Preparing Y our Sy st ems for Clustering[...]

  • Page 43

    T roubleshooting 43 T roubleshooting This appendix provides troublesho oting information for your cluster configuration. T able A-1 describes general cluster pr oblems you may encounter and the probable causes and solutions for each problem. T able A-1. General Cluster T roubleshooting Problem Probable Cause Corrective Action The nodes cannot acces[...]

  • Page 44

    44 T roubleshooting One or more nodes may have the Internet Connection F irewall enabled, blocking Remote P rocedur e Call (RPC) communications between the nodes. Configure the Internet Connection F irewall to allow communications that are r e quired by the Microsoft ® Cluster Service (MSCS) and the clustered applications or services. F or more in[...]

  • Page 45

    T roubleshooting 45 The cluster network name is not responding on the network because the Internet Connection F irewall is enabled on one or more nodes. Configure the Internet Connection F irewall to allow communications that are requir ed by MSCS and the clustered applications or services. F or more information, see Microsoft Knowledge Base articl[...]

  • Page 46

    46 T roubleshooting Unable to add a node to the cluster . The new node cannot access the shared disks. The shared disks ar e enumerated by the operating system differently on the cluster nodes. Ensure that the new cluster node can enumerate the cluster disks using W indows Disk Administration. If the disks do not appear in Disk Administration, chec[...]

  • Page 47

    T roubleshooting 47 Cluster Services d oes not operate correctly on a cluster running W indows Server 2003 and the Internet F irewall enabled. The W indows Internet Connection F irewall is enabled, which may conflict with Cluster Services. P erform the following steps: 1 On the W indows desktop, right-click My Computer and click Manage . 2 In the C[...]

  • Page 48

    48 T roubleshooting P ublic network clients cannot access the applications or services that are provided by the cluster . One or more nodes may have the Internet Connection F irewall enabled, blocking RPC communications between the nodes. Configure the Internet Connection F irewall to allow communications that are requir ed by the MSCS and the clus[...]

  • Page 49

    Cluster Data Form 49 Cluster Data Form Y ou can attach the following form in a convenient location near each cluster node or rack to r ecor d information abou t the cluster . Use the form when you call for technical support. T able B-1. Cluster Co nfiguration Information Cluster Information Cluster Solution Cluster name and IP address Server type I[...]

  • Page 50

    50 Cluster Data Form T able B-3. Additional Network Information Additional Networks T able B-4. Storage Arra y Configuration Information Array Array Service T ag IP Address Num ber of Attached DAEs Virtual Disks 1 2 3 4[...]

  • Page 51

    iSCSI Configuration W orksheet 51 iSCSI Configuration W orksheet If you need additional space for more than one host server , use an additional sheet. A Server 1, iSCSI NIC port 0 Server 1, iSCSI NIC port 1 Server 2, iSCSI NIC port 0 Server 2, iSCSI NIC port 1 Server 3, iSCSI NIC port 0 Server 3, iSCSI NIC port 1 B SP-A, iSCSI port 0 SP-A, iSCSI po[...]

  • Page 52

    52 iSCSI Configuration W orksheet[...]

  • Page 53

    Index 53 Index C cable configurations cluster interconnect, 1 7 for client networks, 1 6 for mouse, k eyboar d, and monitor , 1 3 for power supplies, 1 3 cluster optional configurations, 9 cluster configurations connecting to multiple shar ed storage systems, 2 5 connecting to one shared storage system, 9 direct-attached, 9 , 1 8 iSCSI SAN-attached[...]

  • Page 54

    54 Index K key b o ard cabling, 1 3 M monitor cabling, 1 3 mouse cabling, 1 3 MSCS installing and configuring, 4 1 N network adapters cabling the private network, 1 6 - 1 7 cabling the public network, 1 6 O operating system W indows Server 2003, Enterprise Edition installing, 29 P power supplies cabling, 1 3 private network c a b l i n g , 15, 17 h[...]