Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
Dell POWERVAULT MD3620I manuale d’uso - BKManuals

Dell POWERVAULT MD3620I manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso Dell POWERVAULT MD3620I. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica Dell POWERVAULT MD3620I o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso Dell POWERVAULT MD3620I descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso Dell POWERVAULT MD3620I dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo Dell POWERVAULT MD3620I
- nome del fabbricante e anno di fabbricazione Dell POWERVAULT MD3620I
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature Dell POWERVAULT MD3620I
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio Dell POWERVAULT MD3620I non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti Dell POWERVAULT MD3620I e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio Dell in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche Dell POWERVAULT MD3620I, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo Dell POWERVAULT MD3620I, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso Dell POWERVAULT MD3620I. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    Dell PowerV ault MD3600i and MD3620i Storage Array s Owner’ s Manual Regulatory Model: E03J Series and E04J Series Regulatory T ype: E03J001 and E04J001 book.book Page 1 Tues day, September 27, 201 1 3:13 PM[...]

  • Pagina 2

    Notes, Cautions, and W arnings NOTE: A NOTE indicates important information that helps you make better use of your computer . CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followe d. WA RN I N G : A W ARNING indicates a potential for property damage, personal injury , or death. ___________ _______[...]

  • Pagina 3

    Contents 3 Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . 19 About This Document . . . . . . . . . . . . . . . . . . 19 Inside the Box of the De ll PowerV ault MD3600i Series Storage Array . . . . . . . . . . . . . . . . . . . 19 MD3600i Series Storage Array . . . . . . . . . . . 20 Dell PowerV ault Modular Disk Storage Manag[...]

  • Pagina 4

    4 Contents 3 Planning: RAID Controller Modules . . . . 31 RAID Controller Modules . . . . . . . . . . . . . . . . 31 RAID Controller Module Connectors and Features . . . . . . . . . . . . . . . . . . . . . . . 32 RAID Controller Modul e— Additional Features . . . . . 34 Battery Backup Unit . . . . . . . . . . . . . . . . 34 Storage Array Thermal [...]

  • Pagina 5

    Contents 5 Media V erification . . . . . . . . . . . . . . . . . 44 Cycle T ime . . . . . . . . . . . . . . . . . . . . . 44 V irtual Disk Operations Limit . . . . . . . . . . . . 45 Disk Group Operations . . . . . . . . . . . . . . . . . . 45 RAID Level Migration . . . . . . . . . . . . . . . . 45 Segment Size Migration . . . . . . . . . . . . . .[...]

  • Pagina 6

    6 Contents 5 Configuration: Overview . . . . . . . . . . . . 61 User Interface . . . . . . . . . . . . . . . . . . . . . . 61 Enterprise Management Window . . . . . . . . . 62 Array Management Window . . . . . . . . . . . . 63 6 Configuration: About Y our Storage Array . . . . . . . . . . . . . . . . . . . . . 67 Out-of-Band and In-Band Management [...]

  • Pagina 7

    Contents 7 Setting the Storage Array RAID Controller Module Clocks . . . . . . . . . . . . . . . . . . . 84 7 Configuration: Using iSCSI . . . . . . . . . . . 87 Changing the iSCSI T arget Authentication . . . . . . . 87 Entering Mutual Aut hen tication Permissions . . . . . . 88 Creating CHAP Secrets . . . . . . . . . . . . . . . . . 88 Initiator [...]

  • Pagina 8

    8 Contents 9 Configuration: About Y our Host . . . . . . . 99 Configuring Host Access . . . . . . . . . . . . . . . . . 99 Using the Mappings T ab . . . . . . . . . . . . . . . . 100 Defining a Host . . . . . . . . . . . . . . . . . . 101 Removing Host Access . . . . . . . . . . . . . . . . . 102 Managing Host Groups . . . . . . . . . . . . . . . .[...]

  • Pagina 9

    Contents 9 Choosing an Appropriate Phy sical Disk T ype . . . . . . 121 Phy sical Disk S ecurity with Self Encrypting Disk . . . . . . . . . . . . . . . . . . . . . 121 Creating a Security Key . . . . . . . . . . . . . . . 124 Changing a Security Key . . . . . . . . . . . . . . 126 Saving a Security Key . . . . . . . . . . . . . . . 128 V alidate S[...]

  • Pagina 10

    10 Contents Storage Partitioning . . . . . . . . . . . . . . . . . . 147 Disk Group and V irtual Disk Expansion . . . . . . . . 148 Disk Group Expansion . . . . . . . . . . . . . . . 148 V irtual Disk Expansion . . . . . . . . . . . . . . 149 Using Free Capacity . . . . . . . . . . . . . . . . 149 Using Unconfigured Capacity . . . . . . . . . . . 1[...]

  • Pagina 11

    Contents 11 Creating a Snapshot V irtual Disk Using the Advanced Path . . . . . . . . . . . . . . . . . . . . 162 About the Advanced Path . . . . . . . . . . . . . 162 Preparing Host Servers to Create the Snapshot Using the Advanced Path . . . . . . . . 164 Creating the Snapshot Using the Advanced Path . 166 Specifying Snapshot V irtual Disk Names [...]

  • Pagina 12

    12 Contents Virtual Disk Read/W rite Permissions . . . . . . . . . 182 Virtual Disk Copy Restrictions . . . . . . . . . . . . . 183 Creating a V irtual Disk Copy . . . . . . . . . . . . . . 184 Before you Be gin . . . . . . . . . . . . . . . . . 184 V irtual Disk Copy and Modification Operations . . . . . . . . . . . . . 185 Create Copy Wizard . . [...]

  • Pagina 13

    Contents 13 13 Configuration: Premium Feature— Upgrading to High-Performance-T ier . . . . . . . . . . . . . 193 14 Configuration: Device Mapper Multipath for Linux . . . . . . . . . . . . . . . . 195 Overview . . . . . . . . . . . . . . . . . . . . . . . . . 195 Using DM Multipathing Devices . . . . . . . . . . . . 196 Prerequisites . . . . . . [...]

  • Pagina 14

    14 Contents Media Errors and Unreadable Sectors . . . . . . . . 216 16 Management: Installing Array Components . . . . . . . . . . . . . . . . . 219 Recommended T ools . . . . . . . . . . . . . . . . . . 219 Front Bezel (Optional) . . . . . . . . . . . . . . . . . 220 Removing the Front Bezel . . . . . . . . . . . . . 220 Installing the Front Bezel[...]

  • Pagina 15

    Contents 15 Power Supply/Cooling Fan Module . . . . . . . . . . . 234 Removing a Power Supply/Cooling Fan Module . . . . . . . . . . . . . . . . . . . . . 234 Installing a Power Supply/Cooling Fan Module . . . . . . . . . . . . . . . . . . . . . 236 Control Panel . . . . . . . . . . . . . . . . . . . . . . . 237 Removing the Control Panel . . . . .[...]

  • Pagina 16

    16 Contents Retrieving T race Buffers . . . . . . . . . . . . . . . . 252 Collecting Phy sical Disk Data . . . . . . . . . . . . . 254 Event Log . . . . . . . . . . . . . . . . . . . . . . . . 255 Recovery Guru . . . . . . . . . . . . . . . . . . . . . 256 Storage Array Profile . . . . . . . . . . . . . . . . . . 256 V iewing the Logical Associatio[...]

  • Pagina 17

    Contents 17 T roubleshooting Storage Array Startup Failure . . . . . 273 T roubleshooting Loss of Communication . . . . . . . . 273 T roubleshooting External Connections . . . . . . . . . 273 T roubleshooting Power Supply/Cooling Fan Module . . . . . . . . . . . . . . . . . . . . . . . . 274 T roubleshooting Array Cooling Problems . . . . . . . . 2[...]

  • Pagina 18

    18 Contents Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 book.book Page 18 Tu esday, September 27, 2011 3 :13 PM[...]

  • Pagina 19

    Introduction 19 1 Introduction NOTE: Unless specified, MD3600i Series represents Dell PowerV ault MD3600i and Dell PowerV ault MD3620i storage array s. WA RN I N G : See the Safety , Environmental, and Regulatory Information document for important safety information before following any procedures listed in this document. About This Document This d[...]

  • Pagina 20

    20 Introduction • Mounting rails (2) (optional) • MD3600i Series res o u r c e m e d ia • Rack Installation Instructions • Getting Started W ith Y our System (provides information on enclosure features, the procedure to set up your enclosure, and technical specifications) MD3600i Series Storag e Array The MD3600i Series is a 2U rack-mou nte[...]

  • Pagina 21

    Introduction 21 Other Information Y ou May Need WA RN I N G : See the safety and regulatory info rmation that shipped with your sy stem. Warranty information may be in cluded within this document or as a separate document. NOTE: All the documents, unless spe cifie d otherwise, are available at support.dell.com/manuals . •T h e Getting Started Gui[...]

  • Pagina 22

    22 Introduction book.book Page 22 Tu esday, September 27, 2011 3 :13 PM[...]

  • Pagina 23

    Planning: About Y our Storage Array 23 2 Planning: About Y our Storage Array Overview The Dell P o werV ault MD3600i Series stor age array is des igned for high availability , offering r edund ant access to data storage. It supports sin gle and dual R AID controller configuration. The MD3600i Series storage array provides 1 GBase- T or 10 GBase- T [...]

  • Pagina 24

    24 Planning: About Y our Storage Array Hardware Features Front-Panel Feature s and Indica tors Figure 2-1. Front-Panel Features and Indicators—Dell PowerV ault MD3600i Figure 2-2. Front-Panel Features and Indicators—Dell PowerV ault MD3620i 1 2 3 5 4 6 1 2 3 4 6 5 book.book Page 24 Tu esday, September 27, 2011 3 :13 PM[...]

  • Pagina 25

    Planning: About Y our Storage Array 25 Figure 2-3. Front-Bezel Features and Indicators Item Indicator , Button, or Connector Icon Descript ion 1 Enclosu re status LED The encl osure stat us LED lights when t he enclosur e power is on. Lights blue during normal operation. Blinks blue when a host server is identifying the enclosur e or when the syste[...]

  • Pagina 26

    26 Planning: About Y our Storage Array 3 Split mode LED This LED must be unlit as the sp lit mode function is not support ed by the MD3600i Series storage arrays. 4 System identi fication button The system identification button on the front control panel can be u sed to locate a particula r enclosur e within a rack. When the button is pushed, the s[...]

  • Pagina 27

    Planning: About Y our Storage Array 27 Back-Panel Features and Indic ators Figure 2-4. Back-Panel Features and In dicat ors—Dell PowerV aul t MD3600i Series Storage Array 1 600 W power supply/cooling fan module 2 RAID Controller Module 0 3 RAID Controller Module 1 4 600 W power supply/cooling fan module 1 2 3 4 book.book Page 27 Tu esday, Septemb[...]

  • Pagina 28

    28 Planning: About Y our Storage Array Hard-Drive Indicator Patterns Figure 2-5. Hard Drive Indicators 1 hard-drive activity indicator (green) 2 hard-drive status indicator (green and amber) 1 2 book.book Page 28 Tu esday, September 27, 2011 3 :13 PM[...]

  • Pagina 29

    Planning: About Y our Storage Array 29 Power Supply and Cooling Fan Features The MD3600i Series storage array incl udes two integrat ed, hot-swappable power supply/cooling fan modules. Both modules must be in stalled to ensure proper cooli ng. The syst em requi res a t least one of the cooling f ans to function to avoid overheating. A power supply/[...]

  • Pagina 30

    30 Planning: About Y our Storage Array Power Indicator Codes and Features Figure 2-6. Power Indicator Codes and Features Item LED T y pe Icon Description 1 DC power The LED lights gr een when the DC output voltage is within the limit. If this LED is off, it indicat es that the DC output voltage is not within the limit. 2 P ower supply/cooling fan f[...]

  • Pagina 31

    Planning: RAID Controller Modules 31 3 Planning: RAID Controller Modules RAID Controller Modules The R AID controller modules provi de high-performance, ad vanced virtual disk c onfigurat ion, an d fault-t olera nt disk subsystem managemen t. Each R AID controller module contains 2 GB of cache that is mirror ed with the other controller's cach[...]

  • Pagina 32

    32 Planning: RAID Controller Modules RAID Controller Module Connectors and Features Figure 3-1. MD3600i Series i SCSI R AID Controller Module Item Component Function 1 SAS OUT port P rovides SAS connec tion for cabling to an e xpansion enclo sure. 2 iSCSI IN port 0 P rovides host-to-controller iSCSI 1/10 Gbps Ethernet connection. 3 iSCSI IN port 1 [...]

  • Pagina 33

    Planning: RAID Controller Modules 33 8 Controller power LED L ights gr een when controller is turned on. Off when controller is not turned on. 9 Controller fault LED Lights amber when controller fault detected. Off when controller operating normally . 10 iSCSI IN port activity LED Lights gr een when there is no activity on connection. Blinks gr een[...]

  • Pagina 34

    34 Planning: RAID Controller Modules RAID Controller Modu le—Additional Features Battery Backup Unit Each R AID controller contains a two- cell Lithium ion nanopolymer battery backup unit (BBU). It provides power to the R AID controller module in the event of a power outage. F or information on removing and installing the BBU, see "R AID Con[...]

  • Pagina 35

    Planning: RAID Controller Modules 35 Sy stem Password Re set T o re set a forgotten passwor d, push and hold down the password r eset switch for at le ast 5 seconds. The passwo rd is deleted. See F igure 3-1 to locate the password r eset switch. The R AID controller module allo ws yo u to change the passwor d. F or mor e information about setting y[...]

  • Pagina 36

    36 Planning: RAID Controller Modules Write-Thro ugh Cache In write-through ca che, data is written to the physical disk before completion status is r e turned to t he host operati ng system. W rite-thro ugh cache is considered mor e robust than write-back cache, since a power failur e is less lik ely to cause loss of data. The R AID controller auto[...]

  • Pagina 37

    Planning: MD3600i Series Storage Array T erms and Concepts 37 4 Planning: MD3600i Series Storage Array T erms and Concepts This chapter describes the storage arra y concepts, which help in configuring and operating the Dell P owerV ault M D3600i Series storage arrays. Phy sical Disks, Virtual Disks, and Disk Groups Physical disks in your storage ar[...]

  • Pagina 38

    38 Planning: MD3600i Series St orage Array T erms and Concepts Phy sical Disks Only Dell supported 6.0-Gbps SAS physica l disks are supporte d in the storage array . If the storage array detects un suppo rted physical disks, it marks the disk as unsupported and the physical disk be comes unavailable for all op erations. NOTE: The MD3600i Series sto[...]

  • Pagina 39

    Planning: MD3600i Series Storage Array T erms and Concepts 39 If a disk drive rebuild fails because of a source drive failur e or because the drive is too small, the MDSM r eports a failur e of the physical disk even though the LE D state on the drive in dicates that the rebuild was aborted (green for 3 seconds, amber for 3 seconds, then off for 3 [...]

  • Pagina 40

    40 Planning: MD3600i Series St orage Array T erms and Concepts 3 P rovide host server ac cess. 4 Cr eate mappings to associate the vi rtual di sks with the host s ervers. NOTE: Host server access must be cr eated before mapping virtual disks. Disk groups are always created in the un configured capacity of a storage array . Unconfigured capacity is [...]

  • Pagina 41

    Planning: MD3600i Series Storage Array T erms and Concepts 41 RAID Levels R AID levels determine the way in whic h data is written to physical disks. Different R AID levels provide different le vels of accessibility , r edundancy , and capacity . Using multiple physical disks h as the follo wing advant ages over using a s ingle physical disk: • P[...]

  • Pagina 42

    42 Planning: MD3600i Series St orage Array T erms and Concepts I/O performance is greatly improved by spreading the I/O load across many physica l disks. Althoug h it o ffers the bes t perform ance o f any RAID level , R AID 0 lacks data re dundancy . Select th is option only for non-critical data, because failure of one physical disk r esult s in [...]

  • Pagina 43

    Planning: MD3600i Series Storage Array T erms and Concepts 43 actual storage. R AID 10 is automatically use d when a R AID level of 1 is chosen with four or mor e physical disks. RAID 10 wor ks well for medium- sized databases or any environment that requir es high performance and fault tolerance and moderate -to-medium capacity . Segment Size Disk[...]

  • Pagina 44

    44 Planning: MD3600i Series St orage Array T erms and Concepts Foreground Initialization The storage array supports for eground in itializatio n for virtual disks. All access to the virtual disk is block ed du ring for eground init ialization. During foreground initia lization, zeros (0x 00) are written t o every se ctor of th e virtual disk. The v[...]

  • Pagina 45

    Planning: MD3600i Series Storage Array T erms and Concepts 45 The storage array tracks the cycle for ea ch disk group independent of other disk groups on the controller and crea tes a checkpoint. I f the media verification operation on a disk gro up is pr eempted or block ed by another operation on the disk group, the s torage array resumes after t[...]

  • Pagina 46

    46 Planning: MD3600i Series St orage Array T erms and Concepts Segment Size M igration Segment size r efers to the amount of data (in KB) that the st orage array writes on a physical disk in a virtual disk be fore writ ing data on the ne xt physical disk. V alid values for the segm ent size ar e 8 KB, 16 KB, 32 KB, 64 KB, 128 KB, 256 KB, and 512 KB[...]

  • Pagina 47

    Planning: MD3600i Series Storage Array T erms and Concepts 47 Disk Group Defragmentation Defragmenting consol idates the fr ee ca pacity in the disk group into one contiguous area. Defragment ation does not change the way in which the data is stored on the virtual disks. Disk Group Operations Limit The maximum number of active, conc urrent disk gro[...]

  • Pagina 48

    48 Planning: MD3600i Series St orage Array T erms and Concepts • Segment size migration • Disk group e xpansion • Disk group defragmentation The priority of each of these operations can be chan ged to address performance requirements of the environm ent in which the oper ations are to be e xecut ed. NOTE: Setting a high priority level impact [...]

  • Pagina 49

    Planning: MD3600i Series Storage Array T erms and Concepts 49 r ecognize the migrating metadata and that data is lost. In this case, MD3600i storage array initializes the physical disks and marks them as unconfigured capacity . NOTE: Only disk groups and associated virtual disks with all mem ber phy sical disks present can be migrated from one stor[...]

  • Pagina 50

    50 Planning: MD3600i Series St orage Array T erms and Concepts • Migrating virtual disks to a storage array with no existing physical disks— T urn off the destination storage array , when migrating disk groups or a complete set of physical disks from a stor age array to another storage array that has no existing physical dis ks. After the desti[...]

  • Pagina 51

    Planning: MD3600i Series Storage Array T erms and Concepts 51 Host T ypes A host server is a server that accesses a storage arra y . Host servers are mapped to the virtu al disks and use one or more iSCSI initi ator ports. Host servers have the following attributes: • Host name—A name that uniquely identifie s the host server . • Host group ([...]

  • Pagina 52

    52 Planning: MD3600i Series St orage Array T erms and Concepts Snapshots ar e used to r ecover pr evious versions of files that have changed since the sna pshot was tak en. Snapsh ots ar e implemented using a copy on write algorithm, which m ak es a backup copy of data the instant a wri te occurs to the virtual disk. Data on a virtual disk is copie[...]

  • Pagina 53

    Planning: MD3600i Series Storage Array T erms and Concepts 53 • Restore snapshot vir tual disk data to the source virtual disk. V irtual disk copy gene rates a full copy of data from the source virtual disk to the targ et virtual disk in a storage arra y and can be performe d ei ther online or offline. Source Virtual Disk When you cr eate a virtu[...]

  • Pagina 54

    54 Planning: MD3600i Series St orage Array T erms and Concepts Using Snapsh ot and Disk Copy T ogether Y ou can use the Snapshot Virtual Di sk and Virtual Disk Copy pr emium features together to back up data on th e same storage array , or to restor e the data on the snapshot virtual disk to its original source virtual disk. Y ou can copy d ata fro[...]

  • Pagina 55

    Planning: MD3600i Series Storage Array T erms and Concepts 55 controller module owner of a virtual disk after it is cr eated. If a host is connected to only one R AID controller module, th e preferr ed owner must manually be assigne d to the R AID contro ller module that the host can access. Ownership of a virtual disk is moved from the pr eferred [...]

  • Pagina 56

    56 Planning: MD3600i Series St orage Array T erms and Concepts Load Balancing A load balance policy is us ed to determine which path is used to process I/O . Multiple options for sett ing the load balance policies le t you optimize I/O performance when mixed host interfaces are configur ed. Y ou can choose one of these load balance policies to opti[...]

  • Pagina 57

    Planning: MD3600i Series Storage Array T erms and Concepts 57 Monitoring MD3600i Seri es Sy stem Performance Y ou can use the P erformance Monitor to select virtua l disks and R AID controller modules to monitor or to change the polling interval. K eep the foll owing guidel ines in mind when using the P erformance Monitor : • The P erformance Mon[...]

  • Pagina 58

    58 Planning: MD3600i Series St orage Array T erms and Concepts Each time the polling interval elapses, the P erformance Monitor queries the storage array again and upda tes the statistics in the table. 5 Click Start . V alues are displayed for the selected stor age arrays in the P erformance Monitor data table. The table is upda ted at the inter va[...]

  • Pagina 59

    Planning: MD3600i Series Storage Array T erms and Concepts 59 T able 4-3. Performance Monitor T able Description F or more information, see the online help topics . Column Headings Description Devices Controller , virtual disk or storage array total T otal IOs Cumulative IO’s per second from last start time Read P ercentage P ercentage of cumulat[...]

  • Pagina 60

    60 Planning: MD3600i Series St orage Array T erms and Concepts book.book Page 60 Tu esday, September 27, 2011 3 :13 PM[...]

  • Pagina 61

    Configuration: Overview 61 5 Configuration: Overview Dell P owerV ault Modular Disk Stor age Manager (MDSM) online help contains information on how to use the MDSM application to perform the configuration and management tasks de scribed in this document. Y ou can access online help by clicking Help located at the top right corner of MDSM interfa ce[...]

  • Pagina 62

    62 Configuration: Overview Enterprise M anagement Windo w The EMW provides high-level manage ment of storage arrays. When you start MDSM, the EMW is displayed. The EMW has the: • Devices tab—P rovides information about the storage arrays. • Setup tab—P r esents the initial setup ta sks that guide you through addin g storage arrays and confi[...]

  • Pagina 63

    Configuration: Overview 63 • Obtain information about the firmware inventory including the version of the R AID controller modules, physical disks, a nd the enclosure management modules (EMMs) in the storage array . Inheriting the Sy stem Settings Use the Inherit Syst em Settings option to im port the operating system theme settings into the MDSM[...]

  • Pagina 64

    64 Configuration: Overview • Disk groups and virtual disks • Lo gi c al tab—Y ou ca n view the organization of the storage array by virtual disks, disk groups, fr ee capacity nodes, and a ny unconfigur ed capacity for the storage array . • Physical tab—Y ou can view the organization of the storage array by R AID controller modules, phys i[...]

  • Pagina 65

    Configuration: Overview 65 book.book Page 65 Tu esday, September 27, 2011 3 :13 PM[...]

  • Pagina 66

    66 Configuration: Overview book.book Page 66 Tu esday, September 27, 2011 3 :13 PM[...]

  • Pagina 67

    Configuration: About Y our Storage Array 67 6 Configuration: About Y our Storage Array Out-of-Band and In-Band Management Y ou can manage a storage array in two ways: • Out-of -b and management • In-band ma nagement Out-of-Band Management In the out-of -band management me thod , data is separate from commands and events. Data travels through th[...]

  • Pagina 68

    68 Configuration: About Y our Storage Array In-Band Management Using in-band management, commands, events, and data travel through the host-to-controller interface. Unlik e out-of -band management, comm ands and events are mix ed with data. NOTE: For detailed information on settin g up in-band and out-of-band management see the Deployment Guide. Wh[...]

  • Pagina 69

    Configuration: About Y our Storage Array 69 NOTE: V erify that your host or management station network configuration— including station IP address, subnet ma sk, and default gateway—is correct before adding a new storage array using the Automatic option. NOTE: For Linux, set the default gateway so that broadcast packets are sent to 255.255.25 5[...]

  • Pagina 70

    70 Configuration: About Y our Storage Array • In-band managem ent —Enter a name or an IP address for the Host through which the storage array is attached to the network. NOTE: When adding a storage array using in-band management with iSCSI, a session must first be established between the initiator on the host server and the storage array . For [...]

  • Pagina 71

    Configuration: About Y our Storage Array 71 • Configure iSCSI host ports—Configure network parameters for each iSCSI host port automatically or spec ify the configuration information for each iSCSI host port. • Configur e the storage array—Create disk groups, virtual disks, and hot spare physical disks by using the A u tomatic configuration[...]

  • Pagina 72

    72 Configuration: About Y our Storage Array Locating Sto rage Array s Y ou can use the Blink option to physically locate and identify a storage array . NOTE: If the LEDs from the Blink Storage Array operation do not stop blinking, select Stop All Indications to stop the process manually . T o locate the storage array : 1 Select the relevant storage[...]

  • Pagina 73

    Configuration: About Y our Storage Array 73 The Name/Rename Storage Arrays dialog is displ ayed. 2 Select the r elevant storage array from the Select storage array table. If you do not know the name or physical location of the storage array , click Blink . After locating the storage array , cl ick OK to turn off the LEDs. The name of the storage ar[...]

  • Pagina 74

    74 Configuration: About Y our Storage Array • Select the Setup tab, and then click Set a Storage Array P assword . • In the AMW , select the Lo gi c al tab, right-cl ick and select Set Pa s s w o r d . The Set P assword dialog is displ ayed. 3 If you are r esetting the password, type the Current password . NOTE: If you are setting the password [...]

  • Pagina 75

    Configuration: About Y our Storage Array 75 V iewing Storage Array Connections Y ou can use the V iew Connections option to view the expansion enclosur es connected to the R AID controller module. T o view the storage array connections: 1 F rom the toolbar in AMW , select Storage Array  Vi e w  Connections . The <Storage Array>:Con nect[...]

  • Pagina 76

    76 Configuration: About Y our Storage Array Removing Storag e Array s Y ou can remove a storage array from th e list of managed arrays if you no longer want to manage it from a sp ec ific storage management station. Removing a storage array do es not affect the storage array or its data in any way . Removing a storage array simply re mo ves it from[...]

  • Pagina 77

    Configuration: About Y our Storage Array 77 Displaying Fail over Alert Y ou can change the failover alert delay for a storage array . The failov er alert delay lets you delay the logging of a cr itical event if the multi-path driv er transfers virtual disks to the non-preferr e d controller . If the multi-path driver transfers the virtual disks bac[...]

  • Pagina 78

    78 Configuration: About Y our Storage Array Changing Expa nsion Enclosure ID Nu mbers When an MD12 00 series ex pansion enclosur e is connected to an MD3600i Series storage array for the first time, an en c l os u re I D n u mb e r i s a s si g ne d a nd maintained by the expansion enclosur e. This enclosure ID number is also shown in the MDSM and [...]

  • Pagina 79

    Configuration: About Y our Storage Array 79 Configuring Alert Notifications MDSM can send an alert for any conditio n on the storage array that r e quires your attention. Alerts can be sent as e-mail messages or as Simple Networ k Management P rotocol (S NMP) trap message s. Y ou can configure alert notifications either for all the storage arrays o[...]

  • Pagina 80

    80 Configuration: About Y our Storage Array • All storage arrays —Select this option to se nd an e-mail alert about events on all storage arrays. • An individual storage array —Select this option to send an e-mail alert about events that occur on on ly a specified storage a rray . These results occur , depending on your selection: • If yo[...]

  • Pagina 81

    Configuration: About Y our Storage Array 81 • V alidating an e-ma il address—T ype the e-mail address in Email address or select the e-mail address in the Configured email addresses area, and click Te s t . A test e-mail is sent to the sele cted e-mail address. A dialog with the results of the test and any error is displayed. 8 F o r the select[...]

  • Pagina 82

    82 Configuration: About Y our Storage Array Configuring SNMP Alerts T o add a management console to the list of addresses configured to receive SNMP alerts: 1 Open the Configure Alerts dialog by performing one of these actions: • In the T ree view or the T able view on the Devices tab in the EMW , select a node, and select Edit  Configure Aler[...]

  • Pagina 83

    Configuration: About Y our Storage Array 83 • Replacing an SNMP addr ess—Se lect the SNMP address in the Configured SNMP addresses area, type the r eplacement community name in Community name and the trap destination in Tr a p destination , and click Rep l a ce . • Deleting an SNMP addr ess—Sele ct the SNMP address in the Configured SNMP ad[...]

  • Pagina 84

    84 Configuration: About Y our Storage Array A learn cycle starts automatically wh en you install a new battery m odule. L earn cycles for batteries in both R AID control ler modules in a duplex s ystem occur simultaneously . L earn cycles are scheduled to start auto matically at regul ar intervals, at the same time and on the sa me day of the week.[...]

  • Pagina 85

    Configuration: About Y our Storage Array 85 1 In the AMW , select Storage Array  Synchronize R AID Controller Module Clocks . 2 If a password is set, in the Enter P assword dialog, type the current password for the storage array , and click Synchronize . The R AID controller module clocks ar e synchronized with the storage management station. bo[...]

  • Pagina 86

    86 Configuration: About Y our Storage Array book.book Page 86 Tu esday, September 27, 2011 3 :13 PM[...]

  • Pagina 87

    Configuration: Using iSCSI 87 7 Configuration: Using iSCSI Changing the iSCSI T arget Authentication 1 In the AMW , select the Setup tab. 2 Select Manage iSCS I Settings . The Manage iSCSI Sett ings window is dis played and b y default, the T arget Authentication tab is selected. T o ch ange the authentication settings, select: • None —If you d[...]

  • Pagina 88

    88 Configuration: Using iSCSI Entering Mutual Authentication Permissions Mutual authentication or two-way authenti cation enables a client o r a user to verify themselves to a host server and fo r the host server to validate itself to the user . This validation is accomplished in such a way that both parties ar e sure of the other ’s ide ntity . [...]

  • Pagina 89

    Configuration: Using iSCSI 89 Initiator CHAP Secret The initiator CH AP secret is set on the host using the iSCSI init iator configuration program provided with th e host o perating system. If you are using the mutual authentication meth od, you must def ine the initiator CHAP secret when you set up the host. This must be the same CHAP secret that [...]

  • Pagina 90

    90 Configuration: Using iSCSI Changing the iSCSI T arget Identification Y ou cannot change the iSCSI tar get name, but you can associate an a lias with the tar get for simpler identification. Aliases ar e useful because the iSCSI targ et names are not intuitive. P rovide an iSCSI target alias that is meaningful and easy to reme mber . T o change th[...]

  • Pagina 91

    Configuration: Using iSCSI 91 • Select Specify Configuration , and type the IPv4 address to activate the targ et discovery . • T ype the iSNS server IP address in the IPv6 settings area to activate the targ et discovery . After you manually enter an IP address, you can also click Advanced to configure the customized TCP listening ports. If you [...]

  • Pagina 92

    92 Configuration: Using iSCSI 4 In the Configured Ethernet port speed list, select a network speed for the iSCSI host port. The network speed values in t he Configured Ethernet port speed list depend on the maximum speed that the network can support. Only the network speeds that ar e supported are displayed. All of the hos t ports on a single co nt[...]

  • Pagina 93

    Configuration: Using iSCSI 93 Advanced iSCSI Host Ports Settings NOTE: Configuring the advanced iSCSI hos t ports settings is optional. Use the advanced settings for the indivi dual iSCSI host ports to specify the TCP frame size, the virtual LA N, and the network priority . NOTE: Changing any of these settings resets the iSCSI port. I/O is interrup[...]

  • Pagina 94

    94 Configuration: Using iSCSI V iewing or Ending an iSCSI Session Y ou may want to end an iSCSI se ssion for the following reasons: • Unauthorized acces s—If an initiator whom you consi der to not have access is logged on , you can en d the iSCSI session. En ding the iSCSI session forces the initiator to log off the storage array . The initiato[...]

  • Pagina 95

    Configuration: Using iSCSI 95 V iewing iSCSI Statistics and Setting Baseline Statistics T o view iSCSI statis tics an d set baseline statistics: 1 In the AMW toolbar , select Storage Array  iSCSI  Statistics . The Vi e w i S C S I S t a t i s t i c s window is displayed. 2 Select the iSCSI statistic type you want to view in the iSCSI St atist[...]

  • Pagina 96

    96 Configuration: Using iSCSI Edit, Remove, or Rename Host T opology If you give access to the wro ng host or the wrong host group, you can r e move or edit the host topology . F ollow the appropriate procedures given in T able 7-3 to correct the host topol ogy : F or more inform ation about Host, Ho st Groups, and Host T o pology , see "Confi[...]

  • Pagina 97

    Configuration: Event Monitor 97 8 Configuration: Event Monitor An event monitor is provided with De ll P owerV ault Modular Disk Sto rage Manager (MDSM). The event monitor runs continuous ly in the background and monitors activity on the managed storage arrays. If the event monitor detects any critical problems, it can notify a host or r emote syst[...]

  • Pagina 98

    98 Configuration: Event Monitor Enabling or Disabli ng the Event Monitor Y ou can enable or disable the event monitor at any time. Disable the event monitor if you do not want the system to send alert notifications. If you ar e running the event monitor on multiple systems, disabling the event monitor on all but one system pr events t he sending of[...]

  • Pagina 99

    Configuration: About Y our Host 99 9 Configuration: About Y our Host Configuring Host Access Dell P owerV ault Modular Disk Stor age Manage r (MDSM) software is comprised of multiple modules. One of these modules is the Host Cont ext Agent, which is installe d as part of the MDSM insta l lation and runs continuously in the background. If the Host C[...]

  • Pagina 100

    100 Configuration: About Y our Host The host topology is re configurable. Y ou can perf orm the following tasks: • Cr eate a host and assign an alias or user label. • Add or associate a ne w host port id entifier to a particular h ost. • Change the host p ort identifier alia s or user label. • Move or associate a host port identifier to a d[...]

  • Pagina 101

    Configuration: About Y our Host 101 Defining a Host Y ou can use the Define Host W izard in the AMW to define a host for a storage array . Either a known unass ociat ed host port identifier or a new host port identifier can be added. NOTE: A user label must be specified before the host port identifier may be added (the add button is disabled until [...]

  • Pagina 102

    102 Configuration: About Y our Host The Specify Host T ype window is displayed. 7 In Host type, select the relevant operatin g system for the host. The Host Group Question window is d isplayed. 8 In this window , you ca n select: • Ye s —this host shares access to the same virtual d isks with other hosts. • No —this host does NOT share acce[...]

  • Pagina 103

    Configuration: About Y our Host 103 Managing Host Groups A host gro up is a logical entity of two or mor e hosts that shar e access to specific virtual disks on th e storage array . Y ou cr eate host groups with MDSM. All hosts in a host group must have the sam e host type (opera ting system). In addition, all hosts in the host group must have spec[...]

  • Pagina 104

    104 Configuration: About Y our Host Removing a Host From a Host Group Y ou can remove a host from the To p o l o g y pane on the Mappings tab of the Array Management Wi ndow . F o r more informatio n, see "Rem oving a Hos t Group" on page 105. Moving a Host to a Different Host Group T o move a host to a different host group: 1 In the AMW [...]

  • Pagina 105

    Configuration: About Y our Host 105 Removing a Host Group T o r emove a host group: 1 In the AMW , select the Mappings tab, select the host node in the To p o l o g y pane. 2 P erform one of these actions: • Select Mappings  Re m o v e . • Right-click the host node, a nd select Re m o v e from the pop-up menu . The Rem o v e dialog is displa[...]

  • Pagina 106

    106 Configuration: About Y our Host Starting or Stopping the Host Con text Agent The host context agent discovers the host topology and starts and stops with the host. The topolog y discover ed by the Host Context Agent can be viewed by clic king Configure Host Access (A utomatic) in the Configure tab in the MDSM. Y ou must stop an d rest art the H[...]

  • Pagina 107

    Configuration: About Y our Host 107 I/O Data Path Protection Y ou can have multiple host-to-array co nnections for a host. Ensu r e that you select all the connections to the arra y when configuring host access to the storage array . NOTE: See the Deployment Guide for more information on cabling configurations. NOTE: For more information on configu[...]

  • Pagina 108

    108 Configuration: About Y our Host Managing Host Port Identifiers Y ou can m anage the host port identifiers that are added to the storage array . Y ou can: • Add—Add or ass ociate a new hos t port identifier to a p articular host. • Edit—Change the ho st port identifier ali as or us er label. Y ou can move (associate) the host port identi[...]

  • Pagina 109

    Configuration: About Y our Host 109 5 Select the method to add a host port identifier to the host. Y ou can select: • Add by selecting a known unassociated host port identifier —Select the appropriate host port identifier from the existing list of Known unassociated host port iden tifiers. • Add by creating a new host port identifier —In Ne[...]

  • Pagina 110

    110 Configuration: About Y our Host book.book Page 110 Tuesday, September 27, 2011 3:13 PM[...]

  • Pagina 111

    Configuration: Disk Groups and Virtua l Disks 111 10 Configuration: Disk Groups and V irtual Disks Creating Disk Groups and V irtual Disks Disk groups ar e created in the unconfi g ured capacity of a storage array , and virtual disks ar e created in the fr ee capacity of a disk group. The maximum number of physical disks supported in a disk group i[...]

  • Pagina 112

    112 Configuration: Disk Groups and V irtual Disks A disk group must be organized accor ding to its related tasks and subtasks. F or example, if you cr eate a disk gr oup for the Accounting Department, you can cr eate virtual disks that mat c h the different types of accounting transactions performed in the depa rtment: Accounts Receivable (AR), Acc[...]

  • Pagina 113

    Configuration: Disk Gr oups and V irtual Disks 113 3 T ype the name of the disk group (up to 30 characters) in Disk group name . 4 Select the appropriate Physical Disk selection choices , you can select: • A utomatic , see step • Manual , see step 5 Click Next . F o r automatic co nfiguration, the RA I D L ev e l a n d C a p a c i t y window is[...]

  • Pagina 114

    114 Configuration: Disk Groups and V irtual Disks Locating a Disk Group Y ou can physically locate and identify al l of the physical disks that comprise a selected disk group. An LED blinks on each physical disk in the disk gro up. T o locate a disk group: 1 In the AMW , select the Lo gi c al tab. 2 Select the appropriate disk grou p and from the t[...]

  • Pagina 115

    Configuration: Disk Gr oups and V irtual Disks 115 NOTE: Ensure that you create disk gr oups before creating virtual disks. T o cr eate virtual disks: 1 Choose one of these methods to start the Create V irtual Disk W izard : • T o cr eate a virtual disk from unconfigured capacity in the storage array—On the Lo gi c a l tab, select an Unconfigur[...]

  • Pagina 116

    116 Configuration: Disk Groups and V irtual Disks 5 In Advanced virtual disk parameters , you can select: • Use recommended settings . • Customize settings . 6 If you s elect Use recommended settings in Advanced v irtual disk parameters , click Fi n i s h . Otherwise, cli ck Next . 7 In the Customize Advanced V irtual Disk P arameters window , [...]

  • Pagina 117

    Configuration: Disk Gr oups and V irtual Disks 117 4 Select one or more virtual disks. Move the Select modification priority slider bar to the desir ed priority . NOTE: T o select nonadjacent virtual disks, press <Ctrl> click. T o select adjacent virtu al disks, pres s <Shift> click. T o select all of the available virtual disks, click [...]

  • Pagina 118

    118 Configuration: Disk Groups and V irtual Disks T o select nonadjacent virtual disks, press <Ctrl> click. T o s elect adjacent virtual disks, p r ess <Shi ft> click. T o select all of the availa ble virtual disks, click Select All . 4 In the Select cache properties area, you can select: • Enable read caching —to enable read cachin[...]

  • Pagina 119

    Configuration: Disk Gr oups and V irtual Disks 119 Changing the Segment Size of a Virtual Disk Y ou can change the segme nt size on a selected virtual disk. During t his operation, I/O performance is affect ed, but you r data remains avai lable. Guidelines to pro ceed with cha nging the se gment siz e: • Y ou cannot cancel this operation after it[...]

  • Pagina 120

    120 Configuration: Disk Groups and V irtual Disks The segment size modification operation begins. The virtual disk icon in the Lo g i ca l pane shows an Operation in P rogre ss s tatus while the operation is taking place. NOTE: T o view the progress or change the prio rity of the modification operation, select a virtual disk in the disk group, and [...]

  • Pagina 121

    Configuration: Disk Gr oups and V irtual Disks 121 The corr esponding dynamic cache read pr efetch se tting and segment siz e values that are typically well suited for the selected virtual disk I/O characteristic type are populated in the Dynamic cache read prefetch field and the Segment size field . NOTE: If you selected the Custom option, select [...]

  • Pagina 122

    122 Configuration: Disk Groups and V irtual Disks the physical disks and R AID controller modules in a storage array sh are the same security k ey . The shared securit y key provides r ead and write access to the physical disks , while the physical disk encryption key on each physical disk is used to encrypt the data. A security capable physical di[...]

  • Pagina 123

    Configuration: Disk Gr oups and V irtual Disks 123 •S a v e S e c u r i t y K e y F i l e • V alidate Security K ey •U n l o c k D r i v e s NOTE: If you have not created a security key for the storage array , the Create Security Key option is active. If you have creat ed a security key for the storag e array , the Create Security Key option [...]

  • Pagina 124

    124 Configuration: Disk Groups and V irtual Disks The storage array password protects a storage array from potentially destructive operations by unauthorized users. The stora ge array passwo r d is independent from self encrypting disk and must not be confused with the pass phrase tha t is used to protect copies o f a security k ey . It is recommen[...]

  • Pagina 125

    Configuration: Disk Gr oups and V irtual Disks 125 4 In New password , enter a string f or the storage array password. If you are creating the storage array password for the first time, leave Current password blank. F ollow these guidelines for cryptographi c strength when you cr eate the storage array passwor d: • be between 8 and 32 characters [...]

  • Pagina 126

    126 Configuration: Disk Groups and V irtual Disks The pass phrase that you enter is mask ed. NOTE: Create Key is active only if the pass phrase meets the above mentioned criterion. 9 In the Confirm pass phrase dialog box, re-enter the e xact string that you entered in the P ass phra se dialog box. M a ke a re c ord of t h e p a s s p h r a se t h a[...]

  • Pagina 127

    Configuration: Disk Gr oups and V irtual Disks 127 for storage on other media. When you ch ange a security key , you also provide information to create a security k ey iden tifier . Changing the security k ey does not destroy any data. Y ou can change the secu rity key at an y time. Befor e you change the security k ey , ensure that: • All virtua[...]

  • Pagina 128

    128 Configuration: Disk Groups and V irtual Disks 6 In Confirm pass phrase , r e-enter the exact strin g you entere d in Pa s s phrase . M a ke a re c ord of t h e p a s s p h r a se you enter ed and the security k ey identifier it is associated with. Y ou need this information for later se cure operations. 7 Click Change K ey . 8 Mak e a r ecord o[...]

  • Pagina 129

    Configuration: Disk Gr oups and V irtual Disks 129 4 In Confirm p ass phrase , re-enter the e xact string you enter ed in Pa s s phrase . Mak e a record of the pass phrase you entered. Y ou nee d it for later secure operations. 5 Click Save . 6 Mak e a recor d of the security key identifier and the file name from the Save Security K ey Complete dia[...]

  • Pagina 130

    130 Configuration: Disk Groups and V irtual Disks Erasing Secure Phy sical Disks In the AMW , when you select a security enabled physical disk that is not part of a disk group, the Secure Erase menu it em is enabled on t he Physical Dis k menu. Y ou can use the secure erase proc edure to r e-provision a physical disk. Y ou can use the Secure Erase [...]

  • Pagina 131

    Configuration: Disk Gr oups and V irtual Disks 131 • The availabili ty of enclos ur e los s protection for a disk group depends on the location of the physical disks that comprise the disk group. T o make sure that enclosur e loss protection is not affected, you must replace a failed physical disk to initiate the copyback process. See "Enclo[...]

  • Pagina 132

    132 Configuration: Disk Groups and V irtual Disks 8 Select the relevant physical disks i n the Unassigned physical disks area, as hot spar es for the selected disk and click OK . 9 T o unassi gn hot spares, in the Hot Spare Coverage window , select the physical disks in the Hot spare physical disks area. 10 Review the information about the hot spar[...]

  • Pagina 133

    Configuration: Disk Gr oups and V irtual Disks 133 Hot Spare Op eration When a physical disk fails , the virtua l disk automatically rebuilds using an available hot spa re. When a r eplacem ent physical disk is install ed, data from the hot spare is copied back to the repl acement physical disk. This function is called copy back. By default, the RA[...]

  • Pagina 134

    134 Configuration: Disk Groups and V irtual Disks spare physical disk. T o make sur e that enclosur e loss protection is not affected, you must re place a failed phy sical disk to initiate the copyback proce ss. The virtual disk remains online and accessible while you are r e placing the failed physical disk, beca use the hot spare physical disk is[...]

  • Pagina 135

    Configuration: Disk Gr oups and V irtual Disks 135 Host-to-V irtual Disk Mapping After you creat e virtual di sks, you must map them to the host(s) connected to the array . Guidelines to configure ho st-to-virtual disk mapping: • Each virtual disk in the storage array can be mapped to only one host or host group. • Host-to-virtual disk mappings[...]

  • Pagina 136

    136 Configuration: Disk Groups and V irtual Disks • Each host has i ts own L UN address space. MDSM permits t he same L UN to be used b y different hosts or host grou ps to access virtual d isks in a storage array . • Not every operating system has the same number of L UNs available. • Y ou can define the mappings on the Mappings tab in the A[...]

  • Pagina 137

    Configuration: Disk Gr oups and V irtual Disks 137 4 In Host group or host , select the approp riate host group or hos t. All defined hosts, host groups, and the defau lt group are displayed in the list. NOTE: When configuring an iSCSI storage a rray , including the MD3600i or MD3620i, if a host or a host group is selected t hat does not have a SAS[...]

  • Pagina 138

    138 Configuration: Disk Groups and V irtual Disks • Select a s ingle virtual disk , and select Mappings  Change  Mapping . • Right-click the virtual disk, and select Change Mapping from the pop-up menu. 3 In Host group or host , select the appropriate host group or host. By default, the drop-dow n list shows the curr ent host group or the[...]

  • Pagina 139

    Configuration: Disk Gr oups and V irtual Disks 139 associated source virtual disk. Ch an ging the R AID controller module ownership of a virtual di sk changes the preferr ed R AID controller module ownership of the virtual disk. During a virtual disk copy , the same R A ID controller mo dule must own both the source virtual disk and the tar get vir[...]

  • Pagina 140

    140 Configuration: Disk Groups and V irtual Disks Y ou can change the R AID controller modu le ownership of a standar d virtual disk or a snapshot repository virtual disk. Y ou cannot direct ly change the R AID controller module ow nership of a snapshot virtual disk because the snapshot virtual disk inherits the R AID controller modu le owner of it[...]

  • Pagina 141

    Configuration: Disk Gr oups and V irtual Disks 141 Changing the RAID Level of a Disk Grou p Changing the R AID level of a disk group chang es the RAI D levels of every virtual disk that comprises the disk group. P erformance m ay be slightly affected during the operation. Guidelines to change t he R AID level of a disk group: • Y ou cannot cancel[...]

  • Pagina 142

    142 Configuration: Disk Groups and V irtual Disks [size=1.6T][features=3 queue_if_no_path pg_init_retries 50][hwhandler=1 rdac] _ round-robin 0 [prio=6][active] _ 1:0:0:2 sdf 8:80 [active][ready] _ round-robin 0 [prio=1][enabled] _ 0:0:0:2 sde 8:64 [active][ghost] In this e xample, the mpath6 device contains two paths: -- /dev/sdf at Host 1, Ch[...]

  • Pagina 143

    Configuration: Disk Gr oups and V irtual Disks 143 • If a new L UN is mapped, the new L U N is detected and given a multi- pathing device node • If you increased volume capacity , the new capacity is displayed. Restricted Mappings Many hosts ar e able to map up to 256 L U Ns (0 to 255) per storage partition. However , the maximum number of mapp[...]

  • Pagina 144

    144 Configuration: Disk Groups and V irtual Disks • I f t h e re i s a h o s t w i th a res t ri c t ed h o st ty p e th a t i s p ar t of a sp e c if i c s t o ra g e partition, all of the hosts in that storage partition are limited to the maximum number of L UNs allowed by the re stricted host type. • Y ou ca nnot move a host with a restrict [...]

  • Pagina 145

    Configuration: Disk Gr oups and V irtual Disks 145 disk c opy , ownership of the tar get virtual disk is al so changed. Under certain operating system environments, it may be necessar y to r econfigur e the multi- path driver befor e an I/O path can be used. 1 To c h a n g e : a The R AID controller module ownership of a virtual disk—Go to step 2[...]

  • Pagina 146

    146 Configuration: Disk Groups and V irtual Disks CAUTION: Possible loss of data access—Changing ownership at the disk group level causes every virtual disk in that disk group to transfer to the other RAID controller module and use the new I/O path. If you do not want to set every virtual disk to the new path, c hange ownershi p at the virtual di[...]

  • Pagina 147

    Configuration: Disk Gr oups and V irtual Disks 147 Storage Partitioning A storage partition is a logi cal entit y consisting of one or mor e virtual disks that can be accessed by a single host or shar ed among ho sts that are part of a host group. The first time you map a virtu al disk to a specific host or host group, a storage pa rtition is creat[...]

  • Pagina 148

    148 Configuration: Disk Groups and V irtual Disks • All mappings are defined. NOTE: Y ou can include a secondary virtual disk in a storage partition. However , any hosts that are mapped to the secondary virtual disk has read- only access until the virtual disk is promot ed to a primary virtual disk, or the mirror relati onship is removed. Storage[...]

  • Pagina 149

    Configuration: Disk Gr oups and V irtual Disks 149 NOTE: Y ou cannot mix different media types or diff erent interface types within a single disk group or virtual disk. 5 Click Add . A message promp ts you to confirm you r selection. 6 T o add the capacity to the disk group, click Ye s . Y ou can also use the Command Line In terface (CLI) on both W[...]

  • Pagina 150

    150 Configuration: Disk Groups and V irtual Disks capacity , in the form of unassigned phys ical disks to the dis k group of the standard virtual disk or the snapshot re pository virtual disk. See "Disk Group Expansion" on page 148. F or more inform ation, see the P owerV ault Modular Disk Storage Manager online help topic s. Disk Group M[...]

  • Pagina 151

    Configuration: Disk Gr oups and V irtual Disks 151 Exporting a Disk Grou p On the source storage array: 1 Save the storage array configuration. 2 Stop all I/O and u nmount or disconnect the fi le systems on the virtu al disks in the disk group. 3 Back up the data on the virt ual d isks in the dis k group. 4 Locate the disk group and label th e phys[...]

  • Pagina 152

    152 Configuration: Disk Groups and V irtual Disks 2 Review the Import Report for an overview of the disk group that you ar e impo rting . 3 Check for non-importable components. 4 Confirm that you want to proceed with the import procedure. NOTE: Some settings cannot be imported during the import disk group procedure. The followin g settings are r em[...]

  • Pagina 153

    Configuration: Disk Gr oups and V irtual Disks 153 error is reported to the event log. F or virtual disks without redundancy protection (R AID level 1, RAID level 5, and R AID level 6 virtual disks), the error is not corrected but is r eported to the event log. • Recover ed media error—Data could not be r e a d b y t h e p h y s i c a l d i s k[...]

  • Pagina 154

    154 Configuration: Disk Groups and V irtual Disks NOTE: A consistency check scans the data bl ocks in a RAID level 5 virtual disk, or a RAID level 6 virtual disk and checks the consistency information for each block. A consistency check compares data blo cks on RAID level 1 mirrored phy sical disks. RAID level 0 virtual disks have no data consisten[...]

  • Pagina 155

    Configuration: Premium Featur e—Sna pshot Virtual Disks 155 11 Configuration: Premium Feature— Snapshot V irtual Disks NOTE: If you order ed this feature, you recei ved a Premium Feature Activation card shipped in the same box as your Dell PowerV ault MD storage array . Follow the directions on the card to obtain a key file and to enable the fe[...]

  • Pagina 156

    156 Configuration: Premium F eature—Snapshot V irtual Disks repository uses less disk space than a full physical copy , because the only data blocks that ar e stor ed in the snapshot r epository vi rtual disk are those th at have changed sinc e the time of the snapshot. When you create a snapshot virtual disk, specify its location, capacity , sch[...]

  • Pagina 157

    Configuration: Premium Featur e—Sna pshot Virtual Disks 157 Scheduling a Snapshot V irtual Disk When you cr eate a snapshot virtual disk, you can choose whether the snapshot is created immediately or is cr eated according to a schedule that you determine. This schedu le can be a one-time snapsh ot cr eation or an ongoing snapshot cr eation that o[...]

  • Pagina 158

    158 Configuration: Premium F eature—Snapshot V irtual Disks F or more informat ion on creating snap sh ot virtual disk sche dules, see the following sections on creating snapshots. Guidelines for Creatin g Snapshot Sche dules Certain guidelines ap ply when creating snapshot virtual disk schedules: • Scheduled virtual disk snapshot operations do[...]

  • Pagina 159

    Configuration: Premium Featur e—Sna pshot Virtual Disks 159 F o r mor e information on sche duling snapshots virtual disks, see the P owerV ault Modular Disk Storage Manager online help topics and the CLI Guide . Creating a Snapshot V irt ual Disk Using the Simple Path Y ou can choose the simple path to create a snapshot virtual disk if the disk [...]

  • Pagina 160

    160 Configuration: Premium F eature—Snapshot V irtual Disks Using the simple path, the following de faults ar e used for the other parameters of a snapshot virtual disk: • Capacity Allocation—T he snapshot repository vir tual disk is created using fr ee capacity on the same disk group wher e the source virtual disk resides. • Host-to- Virtu[...]

  • Pagina 161

    Configuration: Premium Featur e—Sna pshot Virtual Disks 161 • Y ou cannot create a snapshot of a vir tual disk that contains unreadable sectors. • Y ou must satisfy the r equirements of your host o perating system for creating snapshot virtual disks. F ailure to meet the r equir ements of your host operating system results in an inaccurate sn[...]

  • Pagina 162

    162 Configuration: Premium F eature—Snapshot V irtual Disks 8 Enter the snapshot repository virtual di sks capacity as a percentage of the source virtual disk s capacity and click Next . The Pr e v i e w window containin g the summary of th e snapshot vir tual disk is displ ayed. 9 Click Fi n i s h . The Completed window is dis played. 10 Click O[...]

  • Pagina 163

    Configuration: Premium Featur e—Sna pshot Virtual Disks 163 • Snapshot Virtual Disk Name—A us er -s pecified name that hel ps you associate the snapshot virtual d isk to its corr esponding snap shot re pository virtual disk and source virtual disk. • Snapshot Repository Virtual Disk Name—A user -specifi ed name that helps you as sociate t[...]

  • Pagina 164

    164 Configuration: Premium F eature—Snapshot V irtual Disks • Schedule—Cr eates the snapshot virt ual dis k at a specified time, or accord ing to a regularly occurring interv al. If no schedule is specified, the snapshot operation begins i mmediately . This parameter can also be used to apply a schedu le to an e xisting snapshot virtual disk.[...]

  • Pagina 165

    Configuration: Premium Featur e—Sna pshot Virtual Disks 165 • Y ou cannot create a snapshot of a vir tual disk that contains unreadable sectors. • Y ou must satisfy the r equirements of your host o perating system for creating snapshot virtual disks. F ailure to meet the r equir ements of your host operating system results in an inaccurate sn[...]

  • Pagina 166

    166 Configuration: Premium F eature—Snapshot V irtual Disks If you want to use a snapshot regu larly , such as for backups, use the Disable Snaps hot and Re -c r e at e S n a ps h o t options to r euse the snapshot. Di sabling a nd re - cre a t in g s n ap s h ot s p re se r v es t h e existing virtual di sk-to-host mappings to the snapshot virtu[...]

  • Pagina 167

    Configuration: Premium Featur e—Sna pshot Virtual Disks 167 8 In the Snapshot virtual disk parameters area, select the relevant mapping option, you can select: • A utomatic • Map later 9 In the Snapshot repository virtual disk p arameters ar ea, en ter the sy stem behavior wh en: • The snapshot repository virtual disk is full to the selecte[...]

  • Pagina 168

    168 Configuration: Premium F eature—Snapshot V irtual Disks The default name for the associated snap shot r epository virtual disk that is shown in the Snapshot reposito ry virtual disk field is: <source-virtual disk-name>—R<sequence-number> F o r e xample, if you a re cr eating the fi rst snapshot virtual disk for a source virtual [...]

  • Pagina 169

    Configuration: Premium Featur e—Sna pshot Virtual Disks 169 Snapshot Repository Capacity If you r eceive a warning that the ca paci ty for the snapshot r epository virtual disk is approaching its threshold, you ca n increase the capacity of a snapshot r epo sitory virtua l di sk by using one of the follow ing methods: • Use the fr ee capacity a[...]

  • Pagina 170

    170 Configuration: Premium F eature—Snapshot V irtual Disks free capacity is available, the maximum free space is displayed in the Increase capacity by field. If free capacity does not e xist on th e disk group, the fr ee space that is displayed in the Incr ease capacity by spinner box is 0. Y ou must add physical disks to cr eate free capacity o[...]

  • Pagina 171

    Configuration: Premium Featur e—Sna pshot Virtual Disks 171 NOTE: The phy sical disks that are displayed have a capacity that is either the same size or larger than the capacity of the phy sical disks already being used by the disk group. 9 Select either a single physical disk to add or two physical disks to add. 10 Click Add . The Add Physical D[...]

  • Pagina 172

    172 Configuration: Premium F eature—Snapshot V irtual Disks Disabling a Snapshot V irtual Disk Disable a snapshot virtual disk if on e of the following conditions exists: • Y ou do not need the snapshot now . • Y ou intend to re-cr eate the snapshot at a later time and want to retain the associated snapshot repositor y virtual disk so th at y[...]

  • Pagina 173

    Configuration: Premium Featur e—Sna pshot Virtual Disks 173 Before r e-creating a snapshot virtual disk, both the host server and the associated virtual disk you are r e-creat ing have to be in the proper state. T o prepar e your host server and virtual disk: 1 Stop all I/O activity to the source an d snapshot vi rtual disk (if mounted). 2 Using [...]

  • Pagina 174

    174 Configuration: Premium F eature—Snapshot V irtual Disks NOTE: Failing to follow these additional instructions could create unusable snapshot virtual disks. For more information, see the PowerV ault Modular Disk Storage Manager online help topics. • T o use this option, the snapshot virtua l disk must be either in an Optimal status or Disab [...]

  • Pagina 175

    Configuration: Premium Featur e—Sna pshot Virtual Disks 175 • Rolling back a ba se virtual disk to a snaps hot virtual disk d oes not affect the contents of the snapshot virtual disks. • Only one snaps hot rollback ope ration can be perf ormed at a time. • While a base virtual disk that is under going a rollback, you cannot create a new sna[...]

  • Pagina 176

    176 Configuration: Premium F eature—Snapshot V irtual Disks Protecting Against a Failed Snapshot Rollback T o protect your base virtual disk data , it is r ecommended that you cr eate a new snapshot virtual disk from the ba se virtu al disk be fore beginning a rollback operation. If the snapshot roll ba c k f a i l s , u s e t h i s new snapshot [...]

  • Pagina 177

    Configuration: Premium Featur e—Sna pshot Virtual Disks 177 Resuming a Sn apshot Rollback If an error occurs during the snapshot rollback and the operation is paused, you can re sume the rollback using the following steps: 1 In the AMW , select the Log ic al tab. 2 Choose one: • Select the snapshot virtual disk, and select Vi r t u a l D i s k [...]

  • Pagina 178

    178 Configuration: Premium F eature—Snapshot V irtual Disks book.book Page 178 Tuesday, September 27, 2011 3:13 PM[...]

  • Pagina 179

    Configuration: Premium Feature—V irtual Disk Copy 179 12 Configuration: Premium Feature— V irtual Disk Copy NOTE: A virtual disk cop y overwrit es data on the target virtual disk. Before starting a virtual disk copy , ensure that you no longer need the data or back up the data on the target virtual disk. NOTE: If you order ed this feature, you [...]

  • Pagina 180

    180 Configuration: Premium F eature—V irtual Disk Copy Reasons to use virtual disk copy include: • Copying data for improved access—As your storage requir ements for a virtual disk change, you can use a virtual disk copy to copy data to a virtual disk in a d isk group that uses drives with larger capacity within the same storage array . Copyi[...]

  • Pagina 181

    Configuration: Premium Feature—V irtual Disk Copy 181 formatted with a journaling file system, any attempt to issue a read r e quest to the source virtual disk may be rejected by the storage array R A ID controller modules and result in an erro r message. M ake sur e that the Read-Only attribute for the target virtual disk is di sabled after the [...]

  • Pagina 182

    182 Configuration: Premium F eature—V irtual Disk Copy Creating a V irtual Disk Copy for an MSCS Shared Disk T o cr eate a virtual disk copy for a Mi cros oft Cluster Server (MSCS) shar ed disk, create a snapshot of the virtual disk, and then use the snapshot virtual disk as the source for the virtual disk copy . NOTE: An attempt to directly crea[...]

  • Pagina 183

    Configuration: Premium Feature—V irtual Disk Copy 183 • T o enable Read-Only permission, sel ect Change  Ta r g e t V i r t u a l D i s k Pe r m i s s i o n s  Enable R ead-Only . NOTE: Write requests to the target virt ual disk are rejected when the Read- Only permission is enabled on the target virtual disk. • T o disable Read-Onl y p[...]

  • Pagina 184

    184 Configuration: Premium F eature—V irtual Disk Copy NOTE: The following host preparation sectio ns also apply when using the virtual disk copy feature through the CLI interface. Creating a V irtual Disk Copy CAUTION: Possible loss of data—Source virtual disks that are participating in a virtual disk copy are available for read I/ O activity [...]

  • Pagina 185

    Configuration: Premium Feature—V irtual Disk Copy 185 V irtual Disk Co py and Modificati on Operations If a modifi cation operation is running on a source virtual disk or a target virtual disk, and the virtual disk copy ha s a status o f In P rogress , P ending, or F ailed, the virtual disk copy does not take place. If a modification operation is[...]

  • Pagina 186

    186 Configuration: Premium F eature—V irtual Disk Copy Preferred RAID Contro ller Module Ownership During a virtual disk copy , the same R AID controlle r module must own both the source virtual disk and the target vi rtual disk. If both virtual disk s do not have the same pr eferred R AID controller module when the virtual disk copy starts, the [...]

  • Pagina 187

    Configuration: Premium Feature—V irtual Disk Copy 187 A virtual di sk copy autom atically m akes the target virtual disk read-only to hosts. Y o u may want to k eep this attribut e enabled to pr eserve the data on the target virtual disk. CAUTION: If you decide not to preserve the data on the ta rget virtual disk after the virtual disk copy has c[...]

  • Pagina 188

    188 Configuration: Premium F eature—V irtual Disk Copy 9 Ty p e yes and clic k Fi n i s h . NOTE: Operation in Progress icons are displa yed on the source virtual disk and the target virtual disk while t he virtual disk copy has a stat us of In Progress or Pending. F or more inform ation, see the P owerV ault Modular Disk Storage Manager online h[...]

  • Pagina 189

    Configuration: Premium Feature—V irtual Disk Copy 189 2 In the table, select one or more copy pairs. 3 Select Change  Copy P r iority . The Change C opy P riority window is dis played. 4 In the Copy P riority ar ea, select the appropriate copy priority , depending on your system performance needs. NOTE: There are 5 copy priority rates availabl[...]

  • Pagina 190

    190 Configuration: Premium F eature—V irtual Disk Copy Recopying a V irtual Disk Y ou can recopy a virtual disk when you have stopped a virtu al disk copy and you want to start it a gain or when a virtual disk copy has failed. The Recopy opti on overwrites existing data on the target virtual disk and make s the target virtual disk r ead-only to h[...]

  • Pagina 191

    Configuration: Premium Feature—V irtual Disk Copy 191 4 Remove the drive letter(s) of th e source and (if mounted ) virtual disk in W indows or un mount the virtual drive(s) in Linux to help guarantee a stable copy of the drive for the virtual d isk. If this is not done, the copy operation reports that it has completed successfully , but th e cop[...]

  • Pagina 192

    192 Configuration: Premium F eature—V irtual Disk Copy 5 Select Copy  Re - C o p y . The Re- C op y window is displayed. 6 Set the copy priority . NOTE: There are 5 copy priority rates avail able: lowe st, low , medium, high, and highest. If the copy priority is set at the lowe st rate, I/O activity is prioritized, and the virtual disk copy ta[...]

  • Pagina 193

    Configuration: Premium Feature—U pgrading to High- Performance-T ier 193 13 Configuration: Premium Feature— Upgrading to High-Performance- Ti e r The High P erformance Tier pr emium feat ure on an MD3600i Series s torage array increases the performance of th e system beyond that of a MD3600 i Series storage array op erating at the standard perf[...]

  • Pagina 194

    194 Configuration: Premium Feature—Upgrading to High-Performance-T ier book.book Page 194 Tuesday, September 27, 2011 3:13 PM[...]

  • Pagina 195

    Configuration: Device M apper Multipath for Linux 195 14 Configuration: Device Mapper Multipath for Linux Overview The MD3600i Seri es storage ar ray uses a Li nux operating sy stem softwar e framework , known as Device Mapper (DM), to enable multipath capabilities on Linux Host Servers. The DM multip ath functionality is provided by a combination [...]

  • Pagina 196

    196 Configuration: Device Mapper Multipath for Linux Using DM Multipathing Devices NOTE: Using or modifyin g any nodes other than the multipathi ng device nodes can result in array or file sy stem problems, including loss of communication with the array and corruption of the file sy ste m. Avoid accessing any device other than the multipathing devi[...]

  • Pagina 197

    Configuration: Device M apper Multipath for Linux 197 Using the MDSM softwar e: 1 Map the host server to the MD3600i Series storage array . 2 Create the V irtual Disks. 3 Map newly created arrays to your host server . NOTE: Any array s configured with MDCU automatically get added to the list of Devices in the PowerV ault Modular Disk Storage Man ag[...]

  • Pagina 198

    198 Configuration: Device Mapper Multipath for Linux Scan for Newly Added Virtual Disks The rescan_dm_devs command scans the hos t server system looking for existing and newly adde d virtual disks mapped to the host server . # rescan_dm_devs If an array virtual disk (VD) is mapped to the host server at a later time, the rescan_dm_devices command mu[...]

  • Pagina 199

    Configuration: Device M apper Multipath for Linux 199 The followi ng is an e xample of SL ES output: mpathb(360080e500017b2f80000c6ca4a1d4ab8) dm-21 DELL,MD32xxi [size=1.0G][features=3 queue_if_no_path pg_init_retries 50][hwhandler=1 rdac][rw] _ round-robin 0 [prio=6][active] _ 4:0:0:22 sdx 65:112 [active][ready] _ round-robin 0 [prio=1][enabled[...]

  • Pagina 200

    200 Configuration: Device Mapper Multipath for Linux Add a New Partition to Device Mapper The kpartx command adds the new fdisk partition to the Device Mapper list of usable partitions. See e xamples below , where mpath<x> is the device node on which the partition was cr eated. # kpartx –a /dev/mapper/mpath<x> If successful, the comma[...]

  • Pagina 201

    Configuration: Device M apper Multipath for Linux 201 Create a File Sy stem on a Device Mapper Partition Use the standard mkfs command to cr eate the file system on the newly cr eated Device Mapper partition. Fo r e x a m p l e : # mkfs –t <filesystem type> /dev/mapper/<partition node> where <partition node> is the partition on [...]

  • Pagina 202

    202 Configuration: Device Mapper Multipath for Linux or blacklist { device { vendor vendor_string model model_string }; NOTE: RedHat version 6.0 and 6.1 users must rebuild the initramfs root file image to include the updated configuration file by running the #dracut -force command. 3 Reboot the host. Linux Host Server Reb oot Best Practices It is r[...]

  • Pagina 203

    Configuration: Device M apper Multipath for Linux 203 3 Flush the Device Mapper multipath maps list to remove any old or modified mappings: # multipath –F NOTE: The boot operating sy stem drive may have an entry with the Device Mapper multipathing table. Thi s is not affected by the multipath –F command. Ho wever , using #multipath –ll must n[...]

  • Pagina 204

    204 Configuration: Device Mapper Multipath for Linux Limitations and Known Issues • In certain error conditions with the no_path_retry or the queue_if_no_path feature is set, applications may hang. T o overcome these conditions, enter the following command for each affected multipath device: dmsetup message [device] 0 "fail_if_no_path" [...]

  • Pagina 205

    Configuration: Device M apper Multipath for Linux 205 • F ailback can be slow when the host sy stem is ex periencing heavy I/O . The problem is exacerbated if the host server is also e xperiencing very high processor utilization. • The Device Mapper Mult ipath service can be slow when the host system is e xperiencing heavy I/O . The problem is [...]

  • Pagina 206

    206 Configuration: Device Mapper Multipath for Linux I removed a L UN. But the multipathing mapping is still available. The multipathing device is still available after you re mo v e t he LUN s . Run multipath –f <device node for the delet ed LUN> to remove the multipathing mapping. F or exa mple, if a device related with /dev/dm-1 is delet[...]

  • Pagina 207

    Management: Firmware Downloads 207 15 Management: Firmware Downloads Downloading RAID Controller and NVSRAM Packages A version number exists for each firm ware file. Th e vers ion num ber indicates whether the firmware is a major versio n or a m inor version. Y ou can use the Enterprise Management W indow (EMW) to download and ac tivate both t he m[...]

  • Pagina 208

    208 Management: Firmware Downloads Downloading Both RAID Controller and NVSRAM Firmware NOTE: I/O to the array can continue while y ou are upgrading RAID controller and NVSRAM firmware. NOTE: It is recommended that the firmwa re and NVSRAM be upgraded during a maintenance period when the array is not being used for I/O. NOTE: The RAID enclosure mus[...]

  • Pagina 209

    Management: Firmware Downloads 209 7 Click Tr a n s f e r . K eep these guidelines in mind: –I f t h e Tr a n s f e r button is inactive, e nsure that you either select an N V S RA M f i l e o r c l e a r t h e T r a n s f e r N V S R A M f i l e w i t h R A I D c o n t r o l l e r module firmwar e. – If the file selected is not valid or is not[...]

  • Pagina 210

    210 Management: Firmware Downloads The Select F ile dialog is displ ayed. 13 Select the file to download. 14 Click OK . 15 If you want to downloa d the NVSR AM file with the R AID controller module firmwar e, select Download NVSR AM file with firmware in the Select files ar ea. Attributes of the firmware file are displayed in the F irmware file inf[...]

  • Pagina 211

    Management: Firmware Downloads 211 Downloading Only NVSRAM Firmware Use the c ommand li ne interf ace (CLI ) to download and activate NVSRAM to several storage arrays. F or mor e information, see the P owerV ault Modular Dis k Storage Manager online help topics. T o download only NVSR AM firmwar e: 1 T o download the NVSRAM firmware from: •E M W [...]

  • Pagina 212

    212 Management: Firmware Downloads 7 P erform one of these actions: • Select T ools  Upgrade R AID Controller Module F irmware . • Select the Setup tab, and click Upgrade R AID Controller Module Fi r m w a r e . The Upgrade R AID Controller Module F irmware window is displayed. The Storage array pane lists the storag e arrays. The Details pa[...]

  • Pagina 213

    Management: Firmware Downloads 213 12 Click OK . The Confirm Download dialog is displayed. 13 Click Ye s . The download starts and a progr ess in dicator is displayed in the Status column of the Upgrade R AID Contro lle r Module F irmwa re window . Downloading Phy sical Disk Firmware CAUTION: When updating phy sical disk firmware, you must stop all[...]

  • Pagina 214

    214 Management: Firmware Downloads • Mak e sure that the firmware that yo u downlo ad to the physical disks are compatible with the physic al disks that you select. • Do not make any configuration changes to the storage array while downloadin g the firmware. NOTE: Downloads can take several minutes to complete. During a download, the Download P[...]

  • Pagina 215

    Management: Firmware Downloads 215 Downloading MD1200 Series Expansion Module EMM Firmware NOTE: Due to a limitation with Linux, expansion enclosure EM M firmware updates must be performed using out-of-band management only . Failure to do so may result in the host server becoming unrespons ive, and it ma y require a reboot. Y ou can transfer a down[...]

  • Pagina 216

    216 Management: Firmware Downloads NOTE: If you click Stop while a firmware download is in progress, the download-in-progress finishes before t he operation stops. The sta tus for the remaining expansion enclosures changes to Canceled . 7 Monitor the progress and completion status of the download to the expansion enclosures. The progress and status[...]

  • Pagina 217

    Management: Firmware Downloads 217 controller encounters an e rror while accessing a peer disk, it is unable to r ecover the data and affected sectors ar e added to the unreadable sector log maintained by the controlle r . Other conditions under which sectors are added to the unreadable se ctor log include: • A media error is encounter ed when tr[...]

  • Pagina 218

    218 Management: Firmware Downloads book.book Page 218 Tuesday, September 27, 2011 3:13 PM[...]

  • Pagina 219

    Management: Installing Array Compone nts 219 16 Management: Installing Array Components Recommended T ools Y ou may need the f ollowing items to pe rform the procedur es in this section: • K ey to the system keylock •# 2 P h i l l i p s s c r e w d r i v e r •W rist grounding stra p book.book Page 219 Tuesday, September 27, 2011 3:13 PM[...]

  • Pagina 220

    220 Management: Installing Array Componen ts Front Bezel (Optional) Removing the Front Bezel 1 Using the system key , unlock the front bezel (if locked). 2 Lift up the r elease latch next to the keylock. 3 Rotate the left end of the be zel away from the front panel. 4 Unhook the right end of the bezel and pull the bezel away from the system. Figure[...]

  • Pagina 221

    Management: Installing Array Compone nts 221 Hard Drives SAFETY : Models AMT , E03J, and E04J Models AMT , E03J, and E04J ar e intended for installation only in restricted access locations as defined in cl 1.2.7.3 of IEC 60950-1:2005. Depending on your configur ation, your array either supports up to twenty f o u r 2 . 5 " SA S h a rd d r i v [...]

  • Pagina 222

    222 Management: Installing Array Componen ts Figure 16-3. Removing and Installing a 2. 5" Hard-Drive Blank (MD3620i Only) Installing a Hard -Drive Blank 1 If installed, r emove the front bezel . See "Removing the F ront Bezel" on page 220. 2 Insert the drive blank into the drive bay un til the blank is fully seated. 3 Close the handl[...]

  • Pagina 223

    Management: Installing Array Compone nts 223 2 F rom the Modular Disk Storage Manager (MDSM) software, pr epare the drive for r emoval. W ait until the hard-drive indicators on the drive carrier signal that the drive can be r emoved safely . F or more information, see your controller d ocumentation fo r information about hot-swap drive removal. If [...]

  • Pagina 224

    224 Management: Installing Array Componen ts Installing a Hard Drive CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troublesh ooting and simple repairs as authorized in your product documentation, or as dir ected by the online or telephone service and support team. Damage due to servicing that is n[...]

  • Pagina 225

    Management: Installing Array Compone nts 225 Removing a Hard Drive From a Hard-Drive Carrier Remove the scre ws from the slide rails on the har d-drive carrier and separate the har d drive from the carrier . See F igure 16-5 for P owerV ault MD3600i and F igure 16 -6 for P owerV ault MD3620i. Figure 16-5. Removing and Installing a Hard Drive Into a[...]

  • Pagina 226

    226 Management: Installing Array Componen ts Figure 16-6. Removing and Installing a Hard Drive Into a 2.5" Hard-Drive Carrier 1 screws (4) 2 hard-drive carrier 3 SAS screw hole 4 hard drive 4 1 3 2 book.book Page 226 Tuesday, September 27, 2011 3:13 PM[...]

  • Pagina 227

    Management: Installing Array Compone nts 227 Installing a Hard Drive Into a Hard-Drive Carrier 1 Insert the hard dr ive into the hard -d rive carrier with the connector end of the drive at the back. See F igure 16-5. 2 Align the screw holes on the hard drive with the back set of holes on the hard-drive carrier . When aligned correctly , the back of[...]

  • Pagina 228

    228 Management: Installing Array Componen ts 5 Connect all the power cables to the array . 6 T urn on the array and the host server . Figure 16-7. Removing and Installing a RAID Controller Module Blank Installing a RAID Controller Module Blank T o install a R AID controller module blank: 1 Align the blank with the R AID controller module bay 2 Inse[...]

  • Pagina 229

    Management: Installing Array Compone nts 229 Removing a RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team. Damage due to servicing t[...]

  • Pagina 230

    230 Management: Installing Array Componen ts Installing a RAID Controller Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or teleph one service and support team. Damage due to servicin[...]

  • Pagina 231

    Management: Installing Array Compone nts 231 Figure 16-9. Opening and Closing the RAID Controller Module Closing the RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by th e online or [...]

  • Pagina 232

    232 Management: Installing Array Componen ts RAID Controller Module Backup Battery Unit Removing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online[...]

  • Pagina 233

    Management: Installing Array Compone nts 233 Installing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by th e online or telephone service and support team. D[...]

  • Pagina 234

    234 Management: Installing Array Componen ts Power Supply/Cooling Fan Module NOTE: Y our storage array includes two integrated, hot-swappable power supply/cooling fan modules. The array supports two hot-swappable power supply/cooling fan modules. While the array can operate temporaril y with one module, both the modules must be present for proper s[...]

  • Pagina 235

    Management: Installing Array Compone nts 235 Figure 16-11. Removing and Installing a Power Supply/Cooling Fan Module 1 release tab 2 power supply 3 power supply handle 1 3 2 book.book Page 235 Tuesday, September 27, 2011 3:13 PM[...]

  • Pagina 236

    236 Management: Installing Array Componen ts Installing a Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or teleph one service and support team. Damage due to[...]

  • Pagina 237

    Management: Installing Array Compone nts 237 Control Panel Removing the Control Panel 1 T urn off the array and host server . 2 Disconnect all the power cables connected to the array . 3 Remove the har d drives from: – slots 0 to 2 in P owerV ault MD360 0i – slots 0 to 5 in P owerV ault MD362 0i See "Removing a Hard Drive" on page 222[...]

  • Pagina 238

    238 Management: Installing Array Componen ts Figure 16-14. Removing and Installing t he Control Panel-PowerV ault MD3620i Installing the Co ntrol Panel 1 Align the control panel with the slot on the ar ray . 2 Slide the control panel into the array until: – The release tab clicks into place in P owerV ault MD3600i . See F igure 16-13. – The rel[...]

  • Pagina 239

    Management: Installing Array Compone nts 239 Backplane CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team. Damage due to servicing that is not authorized by[...]

  • Pagina 240

    240 Management: Installing Array Componen ts Figure 16-15. Removing and Installing the RA ID Controller Module/Power Supply Cage 1 screws (6) 2 RAID controller module/power supply cage 2 1 book.book Page 240 Tuesday, September 27, 2011 3:13 PM[...]

  • Pagina 241

    Management: Installing Array Compone nts 241 Figure 16-16. Removing and Installing the Backplane-PowerV ault MD3600i Figure 16-17. Removing and Installing the Backplane-PowerV ault MD3620i 1 screws (5) 2 backplane 3 captive sc rew 1 screws (4) 2 backplane 3 captive sc rew 2 1 3 2 1 3 book.book Page 241 Tuesday, September 27, 2011 3:13 PM[...]

  • Pagina 242

    242 Management: Installing Array Componen ts Installing the Ba ckplane 1 Align the hol es on the back plan e with the holes on the array . 2 Tighten the captive scr ew to secur e the backplane to the chassis. See F igure 16-1 6 for P owerV ault MD3600i or F igur e 16-17 for P owerV ault MD3620i. 3 Replace the screws that secur e the backplane to th[...]

  • Pagina 243

    Management: Firmware Inventory 243 17 Management: Firmware Inventory A storage array is made up of many components, which may include R AID controller modules, physical disks, and enclo sur e management modules (EMMs). Each of these components cont ains firmware. Some versions of the firmware ar e dependent on other ve rsions of firmwar e. T o capt[...]

  • Pagina 244

    244 Management: Firmware Inventory book.book Page 244 Tuesday, September 27, 2011 3:13 PM[...]

  • Pagina 245

    Management: Sy stem Interfaces 245 18 Management: Sy stem Interfaces Microsoft Services V irtual Disk Service The Microsoft V irtual Disk Service (VDS) is a component of the W indows operatin g system. The VDS co mponent util izes thir d-party vendor s pecific software modules, known as providers, to access and configur e third-party storage resour[...]

  • Pagina 246

    246 Management: Sy stem Interfaces VSS attaches to the service and uses it to coor dinate the cr eation of snapshot virtual disks on the storag e array . VSS-initiated snap shot virtual disks c an be triggere d through backup to ols, known as requestors. The VSS P rovider Configuration T ool offers the following configuratio n options: • Snapshot[...]

  • Pagina 247

    T roubleshooting: Y our Storage Array Software 247 19 T roubleshooting: Y our Storage Array Software Start-Up Routine L ook and listen during t he array ’s start-up routine fo r the indications described in T able 19-1. F or a descri ption of the front- and back-panel indicators, see "Planning: About Y o ur Storage Array" on page 23. NO[...]

  • Pagina 248

    248 T roubleshooting: Y our Storage Array Software T o launch the AMW , perform one of these actions: •O n t h e Devices tab, in either the T ree view or the T able view , double-click a storage array . Alternatively , you can right-click a storage array and select Manage Storage Array from the pop-up men u. •O n t h e Setup tab, select Manage [...]

  • Pagina 249

    T roubleshooting: Y our Storage Array Software 249 In the T able view , every m anaged storag e array is listed once, regardless of the number of attachment s it has in the T ree view . After the storage arr ay is contacted by MDSM, an icon representing i ts h a rdw a re s ta t u s i s di s p la y e d . Hardwar e status can be Optimal, Needs Attent[...]

  • Pagina 250

    250 T roubleshooting: Y our Storage Array Software In the T ree vi ew , icons can ar e disp layed in a string to convey more information. F or example, the following string means that the storage array is optimal, an alert is set for the storag e array , and firmware is available for downloa d. NOTE: MDSM may take a few minutes to update a status c[...]

  • Pagina 251

    T roubleshooting: Y our Storage Array Software 251 Storage Array Support Data Y ou can gather various types of inventor y , status, and performance data that can help troubleshoot any problem with the storage array . All the files are compressed into a single archive in a zipp ed-file format. Y o u can forward the archive file to your T echnical Su[...]

  • Pagina 252

    252 T roubleshooting: Y our Storage Array Software WA RN I N G : Use this option only under the guidance of your T echnical Support representative. NOTE: Enable only one collect support bundle data to a single client sy stem. Setting multiple sy stems to collect data may potentially affect the storage array performance. T o automatically collect th[...]

  • Pagina 253

    T roubleshooting: Y our Storage Array Software 253 • A time stamp. • The version number for the R A ID controller module firmware. • The version number for the management application programming interface (API). • The model ID for the R AID controller module board. • The collection status for each R AID controller module. If th e status i[...]

  • Pagina 254

    254 T roubleshooting: Y our Storage Array Software Collecting Phy sical Disk Data Y ou can use the Collect Physical Disk Data option to collect log sense data from all the physical disks on your storage array . L og sense data consists of statistical informat ion that is mainta ined by each of the physical disks in your stor age array . Y our T ech[...]

  • Pagina 255

    T roubleshooting: Y our Storage Array Software 255 Event Log Y ou can use the Event Log V iewer to view a detailed list of events that occur in a storage array . The event log is stored on r eserved areas on the storage array disks. I t recor ds configuration events and storage arr ay component failur es. WA RN I N G : Use this option only under th[...]

  • Pagina 256

    256 T roubleshooting: Y our Storage Array Software Recovery Guru The Recovery Guru is a component of MDSM tha t diagnoses critical even ts on the storage array and recommends step-by-st ep re covery procedu res to res olve the problems. In the AMW , to display the Recovery Guru, perform one of these actions: •C l i c k Rec o v er y G ur u . •I [...]

  • Pagina 257

    T roubleshooting: Y our Storage Array Software 257 2 P erform one of these actions in the Storage Array P rofile dialog: • V iew detailed information—Go to step 3. • Search the storage array profile—Go to step 4. • Save the storage array profile—Go to step 5. • Close the storage array profile—Go to step 6. 3 Select one of the tabs, [...]

  • Pagina 258

    258 T roubleshooting: Y our Storage Array Software V iewing the Logical Associations Y ou can use the Associated L ogical Elements option to view the logical associations amo ng different virtual disks in a storage array . T o view the associations for so urce virtual disks, snapshot virtual disks, and snapshot repository virtual disks: 1 In the AM[...]

  • Pagina 259

    T roubleshooting: Y our Storage Array Software 259 Finding Nodes Y ou can use the F ind option to sear ch for a particular node on the Log i ca l tab, the Physical tab, or the Mappings tab of the AMW . The search may be based on a particular node name, the R AID level, virtual disk capacit y , or specific free capacity nodes. The search may be base[...]

  • Pagina 260

    260 T roubleshooting: Y our Storage Array Software 7 T o search for all F ree Capacity nodes with a parti cular capacity , perform these steps: NOTE: This option is not available when the Search by name option is selected or from the Mappings tab. Y ou must cancel the selection of the Search by name option to use this option. a Select F ind all fre[...]

  • Pagina 261

    T roubleshooting: Y our Storage Array Software 261 2 Select Vi e w  Go T o  Snapshot V irtual Disk . The selection jumps to the associated sna pshot virtual disk in the Lo gi c al pane. 3 Select Vi e w  Go T o  Snapshot Repository V irtual Disk . The selection jumps to the associated sna pshot repository virtual disk in the Lo gi c al p[...]

  • Pagina 262

    262 T roubleshooting: Y our Storage Array Software • Out-of -band manage d storage array—Go to step 6. • In-band managed storage array—Go to step 12. 6 F or an out-of -band managed storage array , ensure that the RAID controller modules ar e network accessible by using the ping command to mak e sur e that the R AID controller module ca n be[...]

  • Pagina 263

    T roubleshooting: Y our Storage Array Software 263 If you started the host system before you were connected to the RAID controller module in the storage array , the Host Conte xt Agent software is not able to detect the RAID controller modules. If this is the case, mak e sure that the connections ar e secure , and re start the Host Context Agent so[...]

  • Pagina 264

    264 T roubleshooting: Y our Storage Array Software Locating a Phy sical Disk Y ou can use the L ocate Physical Disk op tion to physically locate and identify one or more of the physical disks in an e xpansion enclosure by activating physical disk LEDs. T o locate the physical disk: 1 Select the Physical tab. 2 Select the physica l disks that you wa[...]

  • Pagina 265

    T roubleshooting: Y our Storage Array Software 265 Locating an Expansion Enclosure Y ou can use the Blink option to physica lly locat e and id entify an expansion enclosure in the storage array . The LED activation varies accor ding to the type of e xpansion enclosure that you have. • If you have an expansion enclosure with a white LED, the Blink[...]

  • Pagina 266

    266 T roubleshooting: Y our Storage Array Software Capturing the State Information Use the T roubleshootin g  Capture State Information option to captur e information about the curr ent state of your stor age array and save the captured information to a te xt file . Y ou can then send the captured information to your T echnical Suppo rt represen[...]

  • Pagina 267

    T roubleshooting: Y our Storage Array Software 267 SMrepassist Utility SMrepassist (r eplication ass istance) is a host-based utility for W indows platforms. This util ity is installed with MDSM. Use this uti lity befor e and after you creat e a virtual disk copy on a W indows operating system to ensure that all t he memor y-resident data for file [...]

  • Pagina 268

    268 T roubleshooting: Y our Storage Array Software Unidentified Devices An unidentified node or device occu rs when MDSM cannot access a new storage array . Causes for this error include network connection problems, the storage array is turned off, or the storage array does not e xist. NOTE: Before beginning any recovery proce dure, make sure that [...]

  • Pagina 269

    T roubleshooting: Y our Storage Array Software 269 b Mak e sure that the network can access the host by using the ping command in the foll owing syntax: ping <host-name-or-IP-address-of-the-host> . If the network can access the host, co ntinue to step c. If the network cannot access the hos t, go to st ep d. c Remove the host with the unr esp[...]

  • Pagina 270

    270 T roubleshooting: Y our Storage Array Software d Make sur e that the applicable network configuration tasks ar e done (for example, the IP addr esses ar e assigned to each contr oller). 5 Mak e sure that the controller firmware is compatible with MDSM on your management station. If the controller firmware was upgraded, the MDSM may not have acc[...]

  • Pagina 271

    T roubleshooting: Y our Storage Array Software 271 Starting or Restarting the Host Context Agent Software The Host Context Agent softwar e modu le is the software component that r esides on the server or manage ment station th at commun icates w ith the MD3600i Series storage arrays. The SMag ent software automatically starts after you reboot the h[...]

  • Pagina 272

    272 T roubleshooting: Y our Storage Array Software book.book Page 272 Tuesday, September 27, 2011 3:13 PM[...]

  • Pagina 273

    T roubleshooting: Y our Array 273 20 T roubleshooting: Y our Array Safety First—For you and Y our Array CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team[...]

  • Pagina 274

    274 T roubleshooting: Y our Array T roubleshooting Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troublesh ooting and simple repairs as authorized in your product documentation, or as dir ected by the online or telephone service and support team. Damage due to servi[...]

  • Pagina 275

    T roubleshooting: Y our Array 275 T roubleshooting Array Cooling Problems CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team. Damage due to servicing that i[...]

  • Pagina 276

    276 T roubleshooting: Y our Array c Reseat the EMM module and wai t for 30 seconds. See "Removing an EMM" in the MD1200 and MD1220 Storage Enclosures Hardware Owner's Manual . d T urn on the server . e Check the EMM status LED. f If the LED does not turn green, replace the EMM. If the problem is not r esolved, see "Getting Help&[...]

  • Pagina 277

    T roubleshooting: Y our Array 277 wait for up to 5 minutes to chec k if the LE D has turned blue. See "Recovery Guru" on page 256. b If following the r ecovery guru proc edures does not solve the problem, complete the following procedure to further troubleshoot the array . c T urn off the host ser ver as appropriate. d Remove the R AID co[...]

  • Pagina 278

    278 T roubleshooting: Y our Array T roubleshooting Hard Drives CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troublesh ooting and simple repairs as authorized in your product documentation, or as dir ected by the online or telephone service and support team. Damage due to servicing t hat is not au[...]

  • Pagina 279

    T roubleshooting: Y our Array 279 T roubleshooting Array and Expansion Enclosure Connections 1 V erify that th e R AID controller modu le port link statu s LED and the R AID controller module status LED are solid green for each port that is connected to a cable. If the LEDs are not solid gr een, see "Planning: RAID Controller Mo dules" on[...]

  • Pagina 280

    280 T roubleshooting: Y our Array 2 Remove the following components fr om the array . See "Management: Installing Array Comp onents" on page 219. •H a r d d r i v e s • RAID controller modules • P ower supply/cooling fan modules • Control panel •B a c k p l a n e 3 L et the system dry thoroughly for at least 24 hours. 4 Reinstal[...]

  • Pagina 281

    T roubleshooting: Y our Array 281 T roubleshooting RAID Controller Modules Conditions Certain events can cause a R AID controll er module to fail and/or shut down. Unre coverable ECC m emory or PCI errors , or critical physical conditions can cause lockdown. If your R AID storage ar ray is configured for r edundant access and cache mirroring, the s[...]

  • Pagina 282

    282 T roubleshooting: Y our Array PCI Errors The storage array firmware can detect an d only recover from PCI erro rs when the R AID controller modules ar e configur ed for redundancy . If a virtual disk uses cache mirroring , it fails over to its peer R AID controller module, which initiates a flush of the dirty cache. Critical Conditions The stor[...]

  • Pagina 283

    Getting Help 283 21 Getting Help Contacting Dell F o r customers in the United States , call 800- WWW -DELL (800-9 99-3355). NOTE: If you do not have an active Inte rnet connection, you can find contact information on your purchase invoice, packing slip, bill, or Dell product catalog. Dell provides several online and telepho ne-based support and se[...]

  • Pagina 284

    284 Getting Help book.book Page 284 Tuesday, September 27, 2011 3:13 PM[...]

  • Pagina 285

    Index 285 Index A Access Virtual Disk, 68 Advanced F eatur e Using Snaps hot and Disk Copy To g e t h e r , 5 4 Advanced F eatur es, 51 Snapshot Repository V irtual Disk, 5 2 Snapshot Virtual Disks, 5 1 Advanced iSCSI Host P orts Settings, 93 Advanced P ath, 162 Array Management T ypes In-Band Manage ment, 6 8 Out-of -Band Management, 6 7 B backpla[...]

  • Pagina 286

    Index 286 contacting Dell, 283 control panel installing, 2 3 8 re m o v i n g , 2 3 7 Copy Manager , 186 D Defining a Host, 101 Dell contacting, 2 8 3 Disk Group Creating, 1 1 2 Expansion, 1 4 8 Export, 1 5 0 E x p o r t i n g , 151 Import, 1 5 1 L o c a t i n g , 114 Migration, 1 5 0 Disk Group and V irtual Disk Expansion, 148 Disk Group Operation[...]

  • Pagina 287

    Index 287 F ree Capa city , 149 front bezel installing, 2 2 0 re m o v i n g , 2 2 0 H hard drive drive carrier , 2 2 5 installing, 2 2 4 re m o v i n g , 2 2 2 Har d-Drive Indicator Pa t t e r n s , 2 8 H ard w a re F e a t u re s Back panel featur es, 2 7 F ront panel featur es, 2 4 Hard dr ive indicator patterns, 2 8 P ower indicator codes, 3 0 [...]

  • Pagina 288

    Index 288 Media Errors and Unreadable Sectors, 216 Medi a Scan Changing setti ngs, 1 5 3 Suspending, 1 5 4 Microsoft Virtual Disk Serv ice, 2 4 5 V olume Shad ow-Copy Service, 2 4 5 Microsoft Services Vi rt u a l D i s k Co p y , 5 2 Monitoring P e rformance, 57 Multi-P ath P referre d and Alternate Controllers and P aths, 5 4 Multi-P ath Software,[...]

  • Pagina 289

    Index 289 front bezel, 2 2 0 hard drive, 2 2 2 har d drive from a drive carrier , 2 2 5 power supply/cooling fan module, 2 3 4 Removing Copy P airs, 192 Removing Host Access, 102 Restricted Mappings, 143 S Safety , 19 safety , 273 Security Key C h a n g i n g , 126 Creating, 1 2 4 Saving, 1 2 8 Segment Size, 43 Setting a P assword , 73 Setting Copy[...]

  • Pagina 290

    Index 290 Recovery Guru, 2 5 6 Starting or Restarting the Host-Agent Softw ar e, 2 7 1 Start-Up Routine, 2 4 7 Storag e Array P rofile, 2 5 6 Storage Array Support Data, 2 5 1 Unidentified De vices, 2 6 8 Vi ew i n g t h e L og i c a l A s s o c i a t i o n s , 258 Viewing the Physical A s s o c i a t i o n s , 258 troubleshooting, 273 connections,[...]

  • Pagina 291

    Index 291 Vi r t u a l D i s k O p e r a t i o n s Limit, 45 V irtual Disk Ownership, 55 Vi r t u a l D i s k S t a t e s , 40 Vi r t u a l D i s k C o p y Ta r g e t , 5 3 V irtual Disks and Disk Groups, 39 book.book Page 291 Tuesday, September 27, 2011 3:13 PM[...]

  • Pagina 292

    292 Index book.book Page 292 Tuesday, September 27, 2011 3:13 PM[...]