APC iSCSI SATA II manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of APC iSCSI SATA II, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of APC iSCSI SATA II one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of APC iSCSI SATA II. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of APC iSCSI SATA II should contain:
- informations concerning technical data of APC iSCSI SATA II
- name of the manufacturer and a year of construction of the APC iSCSI SATA II item
- rules of operation, control and maintenance of the APC iSCSI SATA II item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of APC iSCSI SATA II alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of APC iSCSI SATA II, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the APC service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of APC iSCSI SATA II.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the APC iSCSI SATA II item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    iSCSI – SATA II RAID SUBSYSTEM Installation and Configuration Manual Revision 1.0 P/N: PW0020000000328[...]

  • Page 2

    [2] Table of Contents Chapter 1 Introduction ........................................................................................... 4 1.1 Key Features ............................................. ........................................................................................................... 5 1.2 Technical S pecifi cations .......[...]

  • Page 3

    [3] 3.5.1 Entit y Property ........................................ ............................................................... ................................. 38 3.5.2 NIC.................................................... ............................................................... ............................................ 39 3.5.3 N[...]

  • Page 4

    [4] Chapter 1 Introduction The iSCSI RAID Subsystem The iSCSI RAID subsystem is a 4 -bay disk array based on hardware RAID configuration. It is an easy-to-use storage system which can be co nfigured to any RAID level. It provides reliable dat a protection f or servers, and the RAID 6 function is available. Th e RAID 6 function allow s failure of tw[...]

  • Page 5

    [5] 1.1 Key Features ¾ Front-end 2 x 1Gigabit port full iSC SI offload ¾ Supports iSCSI jumbo frame ¾ Supports RAID levels 0, 1, 0+1, 3, 5, 6 , 10 and JBOD ¾ Global hot spare disks ¾ Write-through or write-back cache policy for differen t application usage ¾ Supports greater than 2TB per vo lume set (64-bit LBA support) ¾ RAID level migratio[...]

  • Page 6

    [6] 1.2 Technical Specifications Form Factor : 1U 19-inch rackmount chassis RAID processor : Intel XScale IOP331 Instant RAID volu me availabilit y and background initializ ation su pport RAID Level : 0, 1, 0+1, 3, 5, 6, 10 and JBOD Supports over 2TB per volume Cache memory : 512MB ~ 1GB DDR333 DIMM supported Online consisten cy check No. o[...]

  • Page 7

    [7] 1.3 Terminology The document uses the following terms: RAID RAID is the abbreviation of “R edundant A rray of I ndependent D isks ” . There are different RAID level s with different degree of the data protection, data availability, and performance to host environment. PD The P hysical D isk belongs t o th e member di sk of one specific RAID[...]

  • Page 8

    [8] DS D edicated S pare disks. The spare disks ar e only used by one specific RG. Others could not use these dedicated spare disks for any rebuilding purpose. GS G lobal S pare disks. GS is shared for rebuilding purpose. If some RGs need to use the global spare disks for rebuilding, they could get the spare disks out from the common s pare disks p[...]

  • Page 9

    [9] 1.4 RAID Concepts RAID Fundamentals The basic idea of RAID (Redundant Array of Independent Disks) is to combine multipl e inexpensive disk driv es into an array of disk drives to obtain performance, capacity and reliability that exceeds that of a single large drive. The array of drives appears to the host computer as a single logical drive. Fiv[...]

  • Page 10

    [10] Definition of RAID Levels RAID 0 is typically defined as a group o f stripe d disk drives without parity or data redundancy. RAID 0 arrays can be config ured with large stripes for multi-us er environments or small stripe s for single-user systems th at access long sequential records. RAID 0 arrays delive r the best data storage effici ency an[...]

  • Page 11

    [11] RAID 3 sector-stripes data acros s groups of drives, but one drive in the group is dedicated to storing parity information. RA ID 3 relies on the embedded ECC in each sector for error detection. In the case of drive failure, data recovery is accomplish ed by calculating the exclu sive OR (XOR) of the inf ormation recorded on the remain ing dri[...]

  • Page 12

    [12] Dual-level RAI D achieves a balance between the incr eased data availability inherent in RAID 1 and RAID 5 and the increased read performance inherent i n disk striping (RAID 0). These arrays are sometimes referred to as RAID 0 +1 or RAID 10 and RAID 0+5 or RAID 50. RAID 6 is similar to RAID 5 in that data protection is achieved by writing par[...]

  • Page 13

    [13] RAID Management The subsystem can implement sev eral different levels of RAID technology . RAID levels supported by the subsystem are shown below. RAID Level Description Min. Drives 0 Block striping is provid e, which yields higher performance than with individual drives. There is no redundancy. 1 1 Drives are paired and mirrored. All data is [...]

  • Page 14

    [14] 1.5 Volume Relationship Diagram This diagram shows how the volume st ructure of the iSCSI RAID subsystem is designed. It describes the relationship of RAID compo nents. One RG (RAID group) consists of a set of VDs (Vi rtual disk) and owns one RAID le vel attribute. Each RG can be divided into several VDs. The VDs in one RG share the same RAID [...]

  • Page 15

    [15] Chapter 2 Getting Started 2.1 Packaging, Shipment and Delivery  Before removing the subsystem from the shipping carton, you should visually inspect the physical condit ion of the shipping cart on.  Unpack the subsystem and verify that th e co ntents of the shipping carton are all there and in good cond it ion.  Exterior damage to the [...]

  • Page 16

    [16] 2.3 Identifying Parts of the iSCSI RAID Subsystem The illustrations below iden tify the various parts of the su bsystem. 2.3.1 Front View 1 Carrier Open Butt on – Use this to open the disk tray. Press the butt on to open. This button also shows the Lock Ind icat or . When the Lock Groove is horizontal, this indicates that the Drive Tray is l[...]

  • Page 17

    [17] 5 LCD Display Panel 6 LCD Control Module (LCM) Use the function keys to navigate t hrough the menu options avail able in the LCM. Parts Function Up and Down Arrow buttons Use the Up or Down arrow keys to go through the i nformation on the LCD screen. This is also used to move between each menu when you configure the subsystem. Select button Th[...]

  • Page 18

    [18] 2.3.2 Rear View 1. Uninterruptible Power Su pply (UPS) Port (APC Smart UP S only) The subsystem may come wi th an optional UPS port all owing you to connect a APC Smart UPS device. Connect the cable from the UPS device to the UPS port located at the rear of the subsystem. This w ill automatically al low the subsystem to us e th e functions and[...]

  • Page 19

    [19] 2.4 Connecting the iSCSI RA ID Subsystem to Your Network To connect the iSCSI uni t to the network, insert the ca ble that came with the u nit into the Gigabit networ k port (LAN1) on the ba ck of iSCSI unit. Insert the other end into a Gigabi t BASE-T Ethernet connection on your network hub or swi tch. You may connect the other network port L[...]

  • Page 20

    [20] 2.6 Installing Hard Drives The expansion chassis supports hot-swa pping allowing you to inst all or replace a hard drive while the s ubsystem is running. Each Drive Carrier has a locking mechanis m. When the Lock Gr oove is hori zontal, this indicates that the Driv e Carrier is locked. When the Lock Groove is vertical , the Drive Carrier is un[...]

  • Page 21

    [21] 2.7 iSCSI Introduction iSCSI (Intern et SCSI) is a protocol wh ic h encapsulates SCSI (Sm all Computer System Interface) commands and data in T CP/IP packets for linking stora ge devices with servers over common IP in frastructure s. iSCSI provi des high performance SANs over standard IP netw orks like LAN, WAN or the Internet. IP SANs are tru[...]

  • Page 22

    [22] 1. Link to download t he Microsoft iSCSI softw are initiator: http://www.microsoft.com/downl oads/details.aspx?FamilyID=12cb3c1a-15d6- 4585-b385-befd1319f825&DisplayLang=en Please refer to Appendix D for Microsoft iSCSI initiator installation procedur e. 2. Linux iSCSI initiator i s also available. For different kernels, there are differen[...]

  • Page 23

    [23] http://192.168.10 .50 or https://192.168.10.50 (https : connection w ith encr ypted Secure Sockets La yer (SSL). Please be aware of the https function is sl ower than http.) Click any funct ion at the f irst time; it will pop up a dialog t o authenticate cu rrent user. Login name: admin Default password: 00000000 Or login with the read-on ly a[...]

  • Page 24

    [24] 2.9 Enclosure 2.9.1 LCD Control Module (LCM) There are four buttons to control the subsys tem LCM (LCD Control Module). These are: c (Up) d (Down) (Enter) (Escape) After booting up the system , the following screen sho ws management port IP and model name: 192.168.10.50 iSCSI-Model-Name ← Press “ ” , the LCM functi ons “System Info,”[...]

  • Page 25

    [25] The following is the LCM menu hierarchy. [Firmware Version] [System Info.] [RAM Size] [Alarm Mute] [ c Yes N o d ] [Reset] [ c Yes No d ] [Reset/Shutdown] [Shu tdown] [ c Yes No d ] [Quick Install] RAID 0 RAID 1 RAID 3 RAID 5 RAID 6 RAID 0+1 xxx GB [Apply The Config] [ c (Yes No d ] [Local] RAID 0 RAID 1 RAID 3 RAID 5 RAID 6 RAID 0+1 [Use defa[...]

  • Page 26

    [26] 2.9.2 System Buzzer The system buzzer features are described as follows: 1. The system buzzer alarms 1 second wh en system boots up suc cessfully. 2. The system buzzer alarms continuous ly when there is error level event happened. The alarm will be stopped after mute. 3. The alarm will be muted automatically when the error situati on is resolv[...]

  • Page 27

    [27] Chapter 3 W eb GUI Guideline 3.1 iSCSI RAID Subsystem GU I Hierarchy The below table is the hierar chy of the subsystem GUI. Quick installation Æ Step 1 / Step 2 / Confirm System configuration System setting Æ System name / Date and time IP address Æ MAC address / Address / DNS / port Login setting Æ Login configuration / Admin password / [...]

  • Page 28

    [28] Reboot and shutdown Æ Reboot / Shutdown Logout Sure to logout? 3.2 Login The iSCSI RAID subsystem su pports graphical user int erface (GUI) to operate the system. Be sure to connect the LAN cable. The default IP setti ng is DHCP ; open web browser and enter: http://192.168.10.50 (Please check the DHCP address first on LCM) Click any funct ion[...]

  • Page 29

    [29] 3.2.1 Language Before clicking the Login button, you can ch ange the GUI l anguage if needed. There are 4 options to select: English , Simplified Chinese, German , and French. 3.2.2 Status Indicators There are six indicators at the top-right corner . 1. RAID light: Green means RAID works well. Red represents RAID failure happening. 2. Temperat[...]

  • Page 30

    [30] 3.3 Quick Install It is easy to use “Qui ck install” to create a volume. It uses whole physical disks to create a RG. The system will calcu late maximum spaces on RAID levels 0/1/3/5/6/ 0+1. “Quick install” will occupy all residual RG space for on e VD, and it has no space for spare disk. If spare disk is needed, plea se create RG and [...]

  • Page 31

    [31] 3.4 System Configuration “Sys tem co nfig urat ion” is designed for setting up the “System s etting” , “IP address” , “Login setting” , “M ai l setting” , and “Notification setting” .[...]

  • Page 32

    [32] 3.4.1 System Setting Select “System setting” to change system name and date. Default s ystem name is the model name, e.g.: SB-1404-G1A3. Check “Change date and time” option to set up the current date, time, and ti me zone before using, or sync hronize time from NTP (Network Ti me Protocol) server.[...]

  • Page 33

    [33] 3.4.2 IP Address Select “IP address” to change IP address for remote admini stration usage. There are 2 options, DHCP (Get IP address from DHCP ser ver) or Static (static IP). The default setting is DHCP e nabled. User can change the HTTP, HTTPS, and SSH port number when the default port number is not allowed on host/serv er.[...]

  • Page 34

    [34] 3.4.3 Login Setting Select “Login setting” to set s ingle admin login, set the au to logout timing, and change admin or user password. The single admi n login can prevent m ultiple users to access the same iSCSI RAID system at the sa me time. 1. Auto logout: The options are (1) Disable; (2) 5 minutes; (3) 30 minutes; (4) 1 hour. The system[...]

  • Page 35

    [35] 3.4.4 Mail Setting Select “Mail setting” to enter at most 3 mail addresses for receiving event notifications. Some ma il servers would check “Mail- from address” and need authenticat ion for anti-spam. Please fill t he necessary fields and select “Send test mail” to check whether the email works fine. User can also select which lev[...]

  • Page 36

    [36] 3.4.5 Notification Setting You can use “Notification setting” to set up SNMP trap for sending alerts via SNMP , pop-up messages via Wi ndows Messenger (not MSN), and alerts via syslog pr otocol, and set event log filter. “SNMP” allows up to 3 SNMP tra p addresses. Default c ommunity is set to “public”. User can choose the event log[...]

  • Page 37

    [37] Using “Messenger” , user must enable the service “Messe nger” in Windows (Start Æ Control Panel Æ Administrative Tools Æ Services Æ Messenger), and then event l ogs can be received. It allows up to 3 messe nger addresses. User can choose the event log levels. Note th at in default settings, only the WARNING and ERROR even t logs ar[...]

  • Page 38

    [38] 3.5 iSCSI Config “iSCSI config” selection is for the setup of “Entity Pr operty” , “NIC” , “Node” , “Session” , and “CHAP account” . 3.5.1 Entity Property Select “Entity property” to view the enti ty name of the iSCSI RAID subs ystem, and setup “iSNS IP” for iSNS (I nternet Storage Name Service) service. iSNS pr[...]

  • Page 39

    [39] 3.5.2 NIC Select “NIC” to change IP addresses of iSCSI da ta ports. There are two gigabit LAN ports to transmit data. Each of them must be assigned one IP a ddress in multi-home d mode. The screen sh ot above show s the 2 iSCSI dat a ports. Each of th em is set to st at ic IP. LAN1 has Jumbo Frame enabled. IP settings: User can change IP a[...]

  • Page 40

    [40] 3.5.3 Node Select “Node” to view the target name for iSCSI node. Press “Authenticate” to enable CHAP authentication. CHAP is the abbreviation of Challenge Han dshake Authorization Protocol. CHAP is a strong authe ntication method used in point-to-point for user login. It’s a t ype of authentication i n which the authentication server[...]

  • Page 41

    [41] 3.5.4 Session “Session” function can display iSCSI session an d connection information, including the following it ems: 1. Host (Initiator Name) 2. Error Recovery Level 3. Error Recovery Count 4. Detail of Authentication status and Source IP: port number. Move the mouse pointer to the gr ay button of session number and click “List connec[...]

  • Page 42

    [42] 3.5.5 CHAP Account Enter “CHAP account” function to create a CHAP account for authentication. To setup CHAP account, please follow these steps: 1. Click “ ”. 2. Enter account name in “User” box, and type the secret in “Secret” and “Confirm” bo x es. 3. Click “ ”. 4. T o delete the CHAP acco unt, select “ Delete ”. N[...]

  • Page 43

    [43] 3.6 Volume Configuration “Volume configur ation” is designed for setting u p the volume configurat ion which includes “Volume create wizard” , “Physical disk” , “RAID grou p” , “Virtu al disk” , “Snapshot”, and “Logical unit” . NOTE: Snapshot function is not avail able in the iSCSI RAID subsystem.[...]

  • Page 44

    [44] 3.6.1 Volume Create Wizard “Volume create wizard” has a smarter policy. When the system is inserted with some HDDs. “Volume creat e wizard” lists all possibilit ies and siz es in different RAID levels, it wi ll use all a vailable HD Ds for RAID level dep ends on which u ser chooses. When system has different sizes of HD Ds, e.g., 3*200[...]

  • Page 45

    [45] Step 3: Deci de VD size. User can enter a num be r less or equal to the default number. Then click “ ”. Step 4: Confirm page. Click “ ” if all setups are correct. Then a VD will be created. It’s done. You can sta rt to use the system no w.[...]

  • Page 46

    [46] 3.6.2 Physical Disk Enter “Physical disk” to view t he status of hard dr ives inserted in the system. The following are operation t ips: 1. Move the mouse pointer to the gray butt o n n e x t t o t h e n u m b e r o f s l o t , i t will show the fu nctions which can be executed. 2. Active function(s ) can be selected, but inactive func tio[...]

  • Page 47

    [47] It’s done. View the “Physical disk” page. Physical disks of slots 1, 2, and 3 are used for RG named “QUICK37598”. Slot 4 is set as dedicated spare di sk for RG “QUICK37598”. PD column description: Slot The position of hard drives. T he button next to the number of slot shows the functions which can be executed. Size (GB) Capacity[...]

  • Page 48

    [48] a global spare of all RGs. “RS” Æ R e S erve. The hard drive contains the RG information but cannot be used. It may be caused by an uncompleted RG set, or hot-plug of this disk in the running time. In order to protect t he data in the disk, the status changes to reserve. It can be reused after setting it t o “FR” manually. Vendor Hard[...]

  • Page 49

    [49] 3.6.3 RAID Group Enter “Volume group” to view the status of e ach volume group. The following is an example of how to create a RG: Step 1: Click “ ”, enter “Name” , choose “RAI D level” , click “ ” to select PD. Then click “ ”. Step 2: Confirm page. Click “ ” if all setups are correct. It’s done. View the “RAID [...]

  • Page 50

    [50] RG column description: No. Number of RAID group. The butto n next to the No. s hows the functions which can be executed. Name RAID group name. Total(GB) Total capacity of this RAID group. Free(GB) Free capacity of this RAID group. #PD The number of physical disks in RAID group. #VD The number of virtual disks in RAID group. Status The status o[...]

  • Page 51

    [51] RG operations description: Create Create a RAID group. Migrate Migrate a RAID group. Please refer to succeeding c hapter for more detail. Activate Activate a RAID grou p; it can be executed whe n RG status is offline. Th is is for online roaming pu rpose. Deactivate Deactivate a RAID group; it can be executed when RG status is online. T h is i[...]

  • Page 52

    [52] 3.6.4 Virtual Disk Enter “Virtua l disk” function to v iew the status of each user data volume. The following is an example of how to create a VD: Step 1: C lick “ ”, ente r “Name” , choose “RG name” , “Stripe height (KB)” , “Block size (B)” , “Read/Wri te” mode, “Priority” , “Bg rate” (Background task pri o[...]

  • Page 53

    [53] Right “WT” Æ W rite T hrough. “WB” Æ W rite B ack. “RO” Æ R ead O nly. Priority “HI” Æ HI gh priority. “MD” Æ M i D priority. “LO” Æ LO w priority. Bg rate Background task priority. “4 / 3 / 2 / 1 / 0” Æ Default value is 4. The hi gher number the background priority of a VD has, the more background I/O will b[...]

  • Page 54

    [54] UDV operations description: Extend Extend a Virtual disk capaci ty. Scrub Scrub a Virtual disk. It’s a pari ty re generation function. It supports RAID 3 / 5 / 6 only. Delete Del ete a Virtual disk. Set property Change the VD name, righ t, priority and bg rate. Right options: “WT” Æ W rite T hrough. “WB” Æ W rite B ack. “RO” Æ[...]

  • Page 55

    [55] 3.6.5 Logical Unit Enter “Logical unit” f unction to view the status of attached logical uni t number of each VD. User can attach LUN by clicking the “ ”. Select the VD to attach in the “ VD ” field. In the “Host” filed, enter the iSCSI node name for access contr ol, or use the default wildcard “*”, which means every host c[...]

  • Page 56

    [56] 3.6.6 Example The following is an example for creating vo lum es. Example 1 is to create two VDs and set a global spare disk. ¾ Example 1 Example 1 is to create two VDs in one RG, each VD uses global cache volume. Global cache volume is created after system boots up automatically . So, no action is needed to set CV . Then set a global spare d[...]

  • Page 57

    [57] Step 2: Create VD (Virt ual disk). To create a volume, please follow these steps: 1. Select “/ Volume configuration / Virtual disk” . 2. Click “ ”. 3. Input a VD name, choose a RG Name and enter a size of VD; decide the stripe high, block size, read/write mode and set pri ority , finally click “ “. 4. Done. A VD has been c reated. [...]

  • Page 58

    [58] Step 3: Atta ch LU N t o VD. There are 2 methods to attach LUN to VD . 1. In “/ Volume configuration / Virtual disk” , mo ve the mouse pointer to the gra y button next to the VD number; cl ick “ Attac h LUN” . 2. In “/ Volume confi guration / Logical unit ” , click “ ”. The procedures are as follows: 1. Select a VD . 2. Input ?[...]

  • Page 59

    [59] Step 4: Set global spare disk. To set a global spare disk , please follow the step. 1. Select “/ Volume configuration / Physic al disk” . 2. Move the mouse pointer to the gr ay button ne xt to the PD slot; cli ck “Set Global spare” . 3. “GS” icon is shown in “Usage” column. Step 5: Done. Host initiator can connect to the LUNs a[...]

  • Page 60

    [60] Step 7: Delete VD (Vi rtual disk). T o delete the Virtual disk , please follow the steps: 1. Select “/ Volume configuration / Virtual disk” . 2. Move the mouse poi nter to the gra y button next to the VD number; click “Delete” . There will pop up a confirmation page, click “OK” . 3. Done. The VDs are deleted. NOTE: When deleting VD[...]

  • Page 61

    [61] 3.7 Enclosure Management “Enclosure manage ment” function allo ws managing encl osure information including “SES config” , “Hardware monitor” , “S.M.A.R.T.” and “UPS” fun ctions. For the enclosure management, there are many sensors for different purposes, such as temperature sensors, voltage sensors, hard disks, fan s ensor[...]

  • Page 62

    [62] 3.7.1 SES Configuration SES represents S CSI E nclosure S ervices, one of the enclosure manag ement standards. Use “SES conf ig” function to enable or disabl e the management of SES. To enable SES: 1. Click “Enable”. 2. Enter Host name (iSCSI no de name). Click “Co nfirm”. 3. Done. The SES client soft ware is availabl e at the foll[...]

  • Page 63

    [63] 3.7.2 Hardware Monitor Enter “Hardware m o nitor” func tion to view the informatio n of current voltage, temperature, power supply, and fa n status. If “Auto shutdown” has been checked, the system wi ll shutdown automaticall y when voltage or temperature is out of the normal range. For b etter data protection, pl ease check “ Auto Sh[...]

  • Page 64

    [64] 3.7.3 Hard Drive S.M.A.R.T. Function S.M.A.R.T. ( S elf- M onitoring A nalysis and R epor tin g T echn ology) is a diagnostic too l for hard drives to deliv er warning of drive fai lures in advance. S.M .A.R.T. provides users chances to take a ctions be fore possible drive failure. S.M.A.R.T. measures many attributes of the hard dri ve all the[...]

  • Page 65

    [65] 3.7.4 UPS Enter “UPS” fu nction to set up UP S ( U ninterruptibl e P ower S upply). Currently, the system only support and commu nicate with smart-UPS f unction of APC (American Power Conversi on Corp.) UPS. Please check detail from http://www.apc.com/ . First, connect the RAID system UPS port and the APC UPS via RS-232 for communication. [...]

  • Page 66

    [66] 3.8 System Maintenance “Maintenance” allows the operation of system functions wh ich include “System information” to show the system version, “Upgr ade” to update firmware to latest version, “Reset to factory default” to reset all cont roller config uration valu es to factory settings, “Import and export” to import and expo[...]

  • Page 67

    [67] 3.8.2 Upgrade “Upgrade” can upgrade firmware. Please pr epare new firmware file named “xxxx.bin” in local hard drive, then click “ ” to select the file. Click “ ”, it will pop up a message “Upgrade syst em now? If you want to downgrade to the previous FW later (not recommended), please export your system configuration f irst![...]

  • Page 68

    [68] 3.8.4 Config Import & Export Use “Import and export” f u n c t i o n t o i m p o r t o r e x po rt c o n f i g u r a t i o n . “ E xp o rt ” a l l o w s user to save system configuration v alues, and “Import” to apply sav ed configuration. For the volume configu ration setting, the values are available in export and not availab[...]

  • Page 69

    [69] 3.8.5 Event Log Use “Event log” to view the system event messa ges. Check the INFO, WARNING, and ERROR checkboxes to choose the leve l of event log t o display. Clicking “ ” button will save the wh ole event log as a text f ile with file name “log-ModelName-Date-Time .txt” (e.g., log-SB-1404-G1A3-20080723- 150659.txt). Click ” ?[...]

  • Page 70

    [70] 3.8.6 Reboot and Shutdown “Reboot and shutdown” displays “Reboot” and “Shutdown” buttons. Before power off, it is better to execute “Shutdown” to fl ush the data from cache to physi cal disks. The step is necessary for data protection. 3.9 Logout For security reason, “Logout” function will allow user t o logout when it is n[...]

  • Page 71

    [71] Chapter 4 Advanced Operation 4.1 Rebuild If one physical disk of a Raid Group, which is set to a protected RAID level ( e.g.: RAID 3 , R A I D 5 , o r R A I D 6 ) , i s F A I L E D o r h a s b e e n u n p l u g g e d / r e m o v e d , t h e R G s t a t u s i s changed to degraded mode. The system will search/ detect spare disk to rebuild the d[...]

  • Page 72

    [72] Sometimes, rebuild is called recover; thes e two have the same me aning. The foll owing table is the relationship bet w een RAID levels and rebuild. RAID 0 Disk striping. No protection for data. RG fail s if any hard drive fails or unplugs. RAID 1 Disk mirroring over 2 disks. RAID 1 allows one hard drive fails or unplugging. Need one n ew hard[...]

  • Page 73

    [73] 4.2 RG Migration To migrate the RAID level, pl ease follow below procedures. 1. Select “/ Volume configuration / RAI D group” . 2. Move the mouse poi nter to the gr ay button next to t he RG number; click “Migrate” . 3. Change the RAID level by clicking the down arrow t o “RAID 5 ” . There will be a pup-up which ind icates that HDD[...]

  • Page 74

    [74] 6. Migration starts and it can be seen from the “status” o f a R G w i t h “Migrating” . In “/ Volume configuration / Virtual disk” , it displays a “Migrating” in “Sta tus” and complete percentage of migration in “R%” . To do migration, the tot al size of RG must be larger or equ al to the original RG. It does not allow[...]

  • Page 75

    [75] 4.3 VD Extension To extend VD size, please follow the procedures. 1. Select “/ Volume configuration / Virtual disk” . 2. Move the mouse poi nter to the gra y button next to the VD number; click “Extend” . 3. Change the size. The size must be larger th an the original, an d then click “ “ to start extension. 4. Extension starts. If [...]

  • Page 76

    [76] 4.5 Disk Roaming Physical disks can be re-sequenced in the same system or move all ph ysical disks from system-1 to system-2. This is called disk roaming. System can execute disk roaming online. Please follow the procedures. 1. Select “/ Volume configuration / RAI D group” . 2. Move the mouse poi nter to the gr ay button next to the RG num[...]

  • Page 77

    [77] Appendix A. Certification List RAM RAM Spec: 184pins, DDR333(PC2700), Reg. (register) or UB(Unbufferred), ECC or Non-ECC, from 64MB to 1GB, 32-bit or 64-bit data bus width, x8 or x16 devices, 9 to 11 bits column address. Vendor Model ATP AG64L72T8SQC4S, 512MB DDR-400 (ECC) with Samsung ATP AG28L64T8SHC4S, 1GB DDR-400 with Samsung ATP AG28L72T8[...]

  • Page 78

    [78] build-in iSCSI initiator iscsi-i nitiator-utils-4.0.3.0-4 in kernel 2.6.9 3. For Red Hat Enterprise Linux 5 (Kernel 2.6), use the build-in iSCSI initiator iscsi -initiator-utils-6.2.0.742- 0.5.el5 in kernel 2.6.18 Mac ATTO Xtend SAN iSC SI initiator v3. 10 System Requirements: 1. Mac OS X v10.5 or later For ATTO Xtend SAN iSC SI init iator, it[...]

  • Page 79

    [79] Hard drive Vendor Model Hitachi Deskstar 7K250, HDS722580VLSA80, 80GB, 72 00RPM, SATA, 8M Hitachi Deskstar E7K500, HDS 725050KLA360, 500GB, 7200RPM, SATA II, 16M Hitachi Deskstar 7K80, HDS728040PLA320, 40GB, 7200RPM, SATA II, 2M Hitachi Deskstar T7K500, HDT7 25032VLA360, 320GB, 7200RPM, SATA II, 16M Hitachi Deskstar P7K500, HDP7 25050GLA360, 5[...]

  • Page 80

    [80] B. Event Notifications  PD events Level Type Description INFO Disk inserted Disk <slot> is inserted into system. WARNING Disk removed Disk <slot> is removed from sy stem. ERROR HDD failure Disk <slot > is disabled.  HW events Level Type Description WARNING ECC error Single-bit ECC error is detected. ERROR ECC error Mult[...]

  • Page 81

    [81] auto shutdown immediately. WARNING SMART T.E.C. Disk <slot> S. M.A.R.T. Threshold Exceed Condition occurred f or attribute <item>. WARNING SMART failure Disk <slot>: Failu re t o get S.M.A.R.T information.  RMS events Level Type Description INFO Console Log in <username> login fro m <IP or serial console> via C[...]

  • Page 82

    [82] started INFO VD migration finished VD <name> completes migration. ERROR VD migration failed Fail ed to complete migration of VD <name>. INFO VD scrubbing started VD <name> starts scrubbing. INFO VD scrubbing finished VD <name> completes scrubbing. INFO RG migration started RG <name> starts migration. INFO RG migra[...]

  • Page 83

    [83] imported. INFO RG restored Configuration of RG <name> has been restored. INFO VD restored Configurati on of VD <name> has b een restored.  iSCSI events Level Type Description INFO iSCSI login succeeds iSCSI login from <IP> succeeds. INFO iSCSI login rejected iSCSI login from <IP> was rejected, reason [<string>][...]

  • Page 84

    [84] occurred <address> of JBOD <number> PD <slot>. WARNING PD write error occurred Write error occurred at LBA <address>- <address> of JBOD <number> PD <slot>. INFO PD freed JBOD <number> PD <slot> has been removed from RG <name>.  System maintenance events Level Type Description INFO [...]

  • Page 85

    [85] D. Microsoft iSCSI Initiator Here are the steps to setup Mi crosoft iSCSI Initiator . Please visit Microsoft websi te for latest iSCSI initiat or . T he following set u p may not use the latest Microsoft iSCSI initiato r . 1. Run Microsoft iSCSI Init iat or . 2. Click “Discovery” . 3. Click “Add” . Input IP address or DNS name of iSCSI[...]

  • Page 86

    [86] 4. Click “OK” . 5. Click “Targets” .[...]

  • Page 87

    [87] 6. Click “Log On” . Check “Enable multi-path” if running MPIO . 7. Click “Advance” if CHAP information is needed. 8. Click “OK” . The status would be “Connected” . 9. Done, it can connect to an iSCSI disk.[...]

  • Page 88

    [88] The following procedu re is to log off iSCSI device. a. Click “Details” . b. Check the Identifier , which will be delet ed. c. Click “Log of f” . d. Done, the iSCSI device log off s uccessfully .[...]

  • Page 89

    [89] E. Installation Steps fo r Large Volume (Over 2TB) Introduction: The iSCSI RAID subsystem is capable of supportin g large volumes (>2TB). When connecting controllers to 64bit OS installed host/server, the host/server is inherently capable for large volumes from the 64bit addr ess. On the other side, if the host/server is installed with 32bi[...]

  • Page 90

    [90] Step 3: Initialize/F o rm at/Moun t the disk 1. Go to Start Æ Control P anel Æ Computer Management Æ Disk Manag ement, it displays a new disk. 2. Initialize th e disk. 3. Convert to GPT disk for over 2TB capacity . For more detail information about GPT , please visit http://www .microsoft.c om/whdc /device/storage/GPT_F AQ.mspx[...]

  • Page 91

    [91] 4. For m a t t h e di s k . 5. Done. 6. The new disk is ready to use, the a vailable size = 2.72TB. WARNING: If user setups 512B block size for VD and the host/server OS is 32bit, in the last step of for matting disk, user will find OS cannot format t he disk sector after 2048GB (2TB).[...]

  • Page 92

    [92] 7. W rong setting result: OS can not fo rmat disk sector after 2048GB(2TB). F. MPIO and MC/ S Setup Instructions Here is the instruct ion to setup MPIO. The following network diagrams are the examples. Please follow them to setup the environment. Remi nd that host must have multi NICs wh ich are set up with dif ferent IPs ¾ Network diagr am o[...]

  • Page 93

    [93] The MPIO setup in structions are the following: 1. Create RG/VD , and then attach LU N. 2. Add the first “T arget Portal” on Microsoft iSCSI initiator . 3. Add the second “T arget Portal” on Microsoft iSCSI init iator . 4. Logon. 5. Enable “Enable multi- path” checkbox. Then click “Advanced…” . 6. Select the first “Source I[...]