Dell Computer Drive manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114

Ir para a página of

Bom manual de uso

As regras impõem ao revendedor a obrigação de fornecer ao comprador o manual com o produto Dell Computer Drive. A falta de manual ou informações incorretas fornecidas ao consumidor são a base de uma queixa por não conformidade do produto com o contrato. De acordo com a lei, pode anexar o manual em uma outra forma de que em papel, o que é frequentemente utilizado, anexando uma forma gráfica ou manual electrónicoDell Computer Drive vídeos instrutivos para os usuários. A condição é uma forma legível e compreensível.

O que é a instrução?

A palavra vem do latim "Instructio" ou instruir. Portanto, no manual Dell Computer Drive você pode encontrar uma descrição das fases do processo. O objetivo do manual é instruir, facilitar o arranque, a utilização do equipamento ou a execução de determinadas tarefas. O manual é uma coleção de informações sobre o objeto / serviço, um guia.

Infelizmente, pequenos usuários tomam o tempo para ler o manual Dell Computer Drive, e um bom manual não só permite conhecer uma série de funcionalidades adicionais do dispositivo, mas evita a formação da maioria das falhas.

Então, o que deve conter o manual perfeito?

Primeiro, o manual Dell Computer Drive deve conte:
- dados técnicos do dispositivo Dell Computer Drive
- nome do fabricante e ano de fabricação do dispositivo Dell Computer Drive
- instruções de utilização, regulação e manutenção do dispositivo Dell Computer Drive
- sinais de segurança e certificados que comprovam a conformidade com as normas pertinentes

Por que você não ler manuais?

Normalmente, isso é devido à falta de tempo e à certeza quanto à funcionalidade específica do dispositivo adquirido. Infelizmente, a mesma ligação e o arranque Dell Computer Drive não são suficientes. O manual contém uma série de orientações sobre funcionalidades específicas, a segurança, os métodos de manutenção (mesmo sobre produtos que devem ser usados), possíveis defeitos Dell Computer Drive e formas de resolver problemas comuns durante o uso. No final, no manual podemos encontrar as coordenadas do serviço Dell na ausência da eficácia das soluções propostas. Atualmente, muito apreciados são manuais na forma de animações interessantes e vídeos de instrução que de uma forma melhor do que o o folheto falam ao usuário. Este tipo de manual é a chance que o usuário percorrer todo o vídeo instrutivo, sem ignorar especificações e descrições técnicas complicadas Dell Computer Drive, como para a versão papel.

Por que ler manuais?

Primeiro de tudo, contem a resposta sobre a construção, as possibilidades do dispositivo Dell Computer Drive, uso dos acessórios individuais e uma gama de informações para desfrutar plenamente todos os recursos e facilidades.

Após a compra bem sucedida de um equipamento / dispositivo, é bom ter um momento para se familiarizar com cada parte do manual Dell Computer Drive. Atualmente, são cuidadosamente preparados e traduzidos para sejam não só compreensíveis para os usuários, mas para cumprir a sua função básica de informação

Índice do manual

  • Página 1

    www .dell.com | support.dell.com Dell™ PowerV ault™ Modular Disk Storage Manager User’ s Guide[...]

  • Página 2

    Notes and Notices NOTE: A NOTE indicates important information that helps you make better use of your computer . NOTICE: A NOTICE indicates either potential damage to ha rdware or loss of data and tells you how to avoid the problem. ____________________ Information in this document is subject to change without notice. © 2008 Dell Inc. All rights r[...]

  • Página 3

    Contents 3 Contents 1 About This Guide . . . . . . . . . . . . . . . . . . . 11 User Interface . . . . . . . . . . . . . . . . . . . . . . 11 Summary T ab . . . . . . . . . . . . . . . . . . . . 12 Configure T ab . . . . . . . . . . . . . . . . . . . 12 Modify T ab . . . . . . . . . . . . . . . . . . . . . 12 T ools T ab . . . . . . . . . . . . . .[...]

  • Página 4

    4 Contents Setting a Password . . . . . . . . . . . . . . . . . . . 21 Password Guidelines . . . . . . . . . . . . . . . . 22 Resetting a Password . . . . . . . . . . . . . . . . . . 22 Connecting the Serial Cable . . . . . . . . . . . . 22 Sy stem Setup for Password Reset . . . . . . . . . 23 Reset Password . . . . . . . . . . . . . . . . . . 24 C[...]

  • Página 5

    Contents 5 Viewing iSCSI Statistics and Setting Baseline Statistics . . . . . . . . . . . . . . . . . . . . . . . . . 37 Edit, Remove, or Rename Host T opology . . . . . . . . 38 4 Event Monitor . . . . . . . . . . . . . . . . . . . . . 41 Enabling the Event Monitor . . . . . . . . . . . . . . . 41 Disabling the Event Monitor . . . . . . . . . . . [...]

  • Página 6

    6 Contents 6 Disk Groups and Virtual Disks . . . . . . . . . 53 Creating Disk Groups and Virtual Disks . . . . . . . . 54 Automatic Configuration . . . . . . . . . . . . . . 55 Manual Configuration . . . . . . . . . . . . . . . 55 Hot Spare Drive Protection . . . . . . . . . . . . . . . 58 Automatically Configuring Hot Spares . . . . . . . 58 Manua[...]

  • Página 7

    Contents 7 7 Premium Feature—Snapshot Virtual Disks 67 Creating a Snapshot Vir tual Disk Using the Simple Path . . . . . . . . . . . . . . . . . . . . . . . 68 About the Simple Path . . . . . . . . . . . . . . . 68 Preparing Host Servers to Create the Snapshot Using the Simple Path . . . . . . . . . . . . . . . 69 Creating the Snapshot Using the [...]

  • Página 8

    8 Contents Creating a Virtual Disk Copy . . . . . . . . . . . . . . 87 Preparing Host Servers to Create a Virtual Disk Copy . . . . . . . . . . . . . . . . . . . . . . 87 Copying the Virtual Disk . . . . . . . . . . . . . . 88 Storage Array Performance During Virtual Disk Copy . . . . . . . . . . . . . . . . . . . . . . . . 89 Setting Copy Priority[...]

  • Página 9

    Contents 9 Device Health Conditions . . . . . . . . . . . . . . . . 101 SMrepassist Utility . . . . . . . . . . . . . . . . . . . 102 Support Information Package . . . . . . . . . . . . . . 103 Unidentified Devices . . . . . . . . . . . . . . . . . . 104 Recovering from an Un identified Storage Array . . . . 104 A Enclosure Hardware Replacement, Ma[...]

  • Página 10

    10 Contents[...]

  • Página 11

    About This Guide 11 About This Guide Dell™ P owerV ault™ Modular Disk (MD) Storage Manager software is used to create and manage multiple storage arra ys. The softwar e can be used on any host attached to the storage array , as well as on storage management stations connected to the same sub-network. MD Storage Manager is a graphical us er inte[...]

  • Página 12

    12 About This Guid e • Beneath the Array Selector is the Content Area . Several tabs appear in this area to group the tasks you can perfor m on the selected array . When you click on a tab, the Content Area dis plays link s for t he tasks you can perform. The following sections list so me of the tasks you can perform under each tab. Summary T ab [...]

  • Página 13

    About This Guide 13 To o l s Ta b • Rename a storage array • Set or change a password • View or enable pr emium features • T urn on indicator lights • Change enclosure ID numbers • Set or change enclosure tags • Set up e-mail alerts and SNMP alerts • Synchronize controller clocks, change th e network configuration, or reset the batt[...]

  • Página 14

    14 About This Guid e • View online help • View the event log Other Information Y ou May Need CAUTION: For complete regulatory and safety information, see your Product Information Guide . Warranty information may be included within this document or as a separate one. • Setting Up Y our Dell P owerV ault MD provides an overview of setting up an[...]

  • Página 15

    Storage Array 15 About Y our Storage Array This chapter covers basic information about how to manage storage arrays from MD Storage Manager , including a dding and removing arrays from the software, performing initial setup tasks, setting passwor ds on an array , and configuring alert notifications. F or information on planning your storage array ,[...]

  • Página 16

    16 Storage Array NOTICE: Removing or manipulating an access virtual di sk can cause a loss of management access. If yo u remove an access virtual disk mapping from an in-band-managed storage array , MD Stor age Manager can no longer access the storage array . Do not modify the access virtual disk either in the operating sy stem or with MD Storage M[...]

  • Página 17

    Storage Array 17 Adding Storage Array s T o add a storage array to MD Storage Manager , click New in the Array Selector area. A window is displayed that allows you to choose the automatic or manual process to add a new storage array . NOTE: V erify that your host or manage ment station network configuration— including station IP address, subnet m[...]

  • Página 18

    18 Storage Array • T o add a storage array that uses out-of-band management, specify the host name or IP address of each controller in the storage array . NOTE: It can take several mi nutes for MD Storage Ma nager to c onnect to the specified storage array . Naming Storage Array s Each storage array should be assig ned a unique name. A storage ar[...]

  • Página 19

    Storage Array 19 T o remove a storage array : 1 Click Remove located to the right of the drop-down menu in the Array Selector . 2 Click OK in the Rem ove dialog box. Y ou can still manage the storage ar ray from other storage management stations where it has been added. Setting Up Y our Storage Array The P erform Initial Setup T asks link located o[...]

  • Página 20

    20 Storage Array 6 Configure Host Access — Set up one or mor e hosts to access the storage array . See "Configuring Host Access" on page 43 for more information. 7 Configure storage array (2 options) a Automatic (Simple) configuration • Step 1: A utomatic Configuration — See "Creating Disk Groups and Virtual Disks" on page[...]

  • Página 21

    Storage Array 21 Storage Array Support Data Aggregated support data can be generate d for a storage array to aid in r emote troubleshooting and issue analysis. T o generate the support data report: 1 Click the Support tab, then click Gather Support Information . 2 Click Browse to display the Collect All Support Data dialog box. 3 In the Save in dro[...]

  • Página 22

    22 Storage Array T o remove a password: • Enter the curr ent password in the Current password text box. • Leave the New password and Confirm new password text box es blank. If you forget your passwor d, contact Dell for technical assistance. Password Guidelines Consider these guidelines when you create a passwor d: • Use secure passwor ds for[...]

  • Página 23

    Storage Array 23 Sy stem Setup for Password Reset Microsoft ® Windows ® Operating Sy stems 1 Click Start → P rograms → Accessories → Communication → HyperT erminal to run HyperT erminal. If HyperT erminal is not installed, click Control P anel → Add/Remove P rograms → Add/Remove Windows Components , find HyperT erminal and click the c[...]

  • Página 24

    24 Storage Array 7 P ress <I> to set the speed to 115200. 8 P ress <Q> to set the data , parity , and stopbits to 8-N-1 , then press <Enter>. 9 P ress <Enter> to exit the Comm P arameters screen. 10 Select Exit and press <Enter> again to e xit the setup screen. Reset Password NOTICE: Failure to stop data I/O to a non-f[...]

  • Página 25

    Storage Array 25 NOTE: If you require help wi th this procedure, co ntact Dell for technical assistance. For more information on contacting Dell, see the "Getting Help" chapter of the Hardware Owners Manua l. Changing Expansion Enclosure ID Numbers When an MD1000 expansion enclosur e is attached to an MD3000/MD3000i storage array for the [...]

  • Página 26

    26 Storage Array Sender e-mail settings include the SMTP and e-mail address information MD Storage Manager uses to send e-mail alerts. T o configure sender e-mail settings: 1 Click the T ools tab, then click Set Up Email Alerts . 2 Enter the following information: • Sender email address — The e-mail address that appears as the sender on every e[...]

  • Página 27

    Storage Array 27 • Every x hours — Sends an e-mail at the sp ecified interval if an event occurred during that period. Y ou can select this option only if the Information to send option is set to Event + Profile or Event + Support . 4 Click Save . Configuring SNMP Alerts T o add a management console to the li st of addresses configured to r ece[...]

  • Página 28

    28 Storage Array Starting or Restarting the Host-Agent Software in Windows The SMagent software automatically start s after you r eboot the host. If you add a storage array after the host server has started, or if iSCSI sessions are created while the SMagent is running, yo u must r estart the SMagent software manually using the following procedure:[...]

  • Página 29

    Storage Array 29 After the program completes the startup process, text similar to the following messages is displayed: Storage Manager Agent, Version 09.1x.00.00 Built Wed Aug 15 16:54:46 CDT 2006 Copyrigh t (C) 2006. All rights reserved. checking device /dev/rdsk/c0t0d0s2 : skipping checking device /dev/rdsk/c2t3d18s2 : s kipping checking device /[...]

  • Página 30

    30 Storage Array[...]

  • Página 31

    Using iSCSI 31 Using iSCSI This chapter provides information on using iSCSI in MD Storage Manager . F or iSCSI prer equisite requirements and detailed step-by-step instructions on setting up and configuring iSCSI, see the Installation Guide . Using the iSCSI T ab The iSCSI tab is shown in the MD Storage Manager only when the controllers contain iSC[...]

  • Página 32

    32 Using iSCSI Changing the iSCSI T arget Authentication If an initiator requir es mutual (bi -directional) authentication see "Entering Mutual Authentication P ermissions" on page 32. 1 Click the iSCSI tab, and then click Change T arget Authentication . 2 Select None if no authentication is requir e d for any initiator to access the targ[...]

  • Página 33

    Using iSCSI 33 must enter the same CHAP secret that is defined in the iSCSI initiator , and you must define a CHAP secret on the tar g et (the storage array) that must be configured in every iSCSI initiator that will connect to the tar get. F or mor e information on CHAP , see "Understanding CHAP Authentication" in the Installation Guide [...]

  • Página 34

    34 Using iSCSI Changing the iSCSI T arget Identification Y ou cannot change the iSCSI target name , but you can associate an alias with the target for simpler identification. Aliases ar e useful because the iSCSI target names ar e not intuitive. Y ou should provide an iSCSI tar get alias that is meaningful and easy to remember . 1 Click the iSCSI t[...]

  • Página 35

    Using iSCSI 35 Configuring the MD3000i iSCSI Host Ports Use the configuration dialog for the iS CSI host ports to se t up the MD3000i iSCSI host ports to use with storage a rrays in a storage area network (SAN). 1 Click the iSCSI tab, and then click Configure iSCSI Host P orts . 2 Select the controller in the iSCSI host port field, and then use one[...]

  • Página 36

    36 Using iSCSI NOTE: Changing any of these sett ings resets the iSCSI port. I/O is interrupted to any host accessing that port. Y ou can ac cess the I/O automatically after the port restarts and the host logs in again. V iewing or Ending an iSCSI Session 1 Click the iSCSI tab, and then click V iew/End iSCSI Sessions . 2 Select the session you want [...]

  • Página 37

    Using iSCSI 37 b In the confirmation window , type yes to confirm that you want to end the iSCSI session, and then click OK . NOTE: If you end a session, any correspond ing connections terminate the link between the host and the storage array , and the data on the storage array is no longer available. NOTE: When a session is manually ter minated us[...]

  • Página 38

    38 Using iSCSI c Confirm that you want to set the ba seline statistics in the dialog that appears. The baseline time shows the latest time you set the baseline. The sampling interval is the difference in time from when you set the baseline until you launch the dialog or click Ref re sh . NOTE: Y ou must first set a baseline be fore you can compare [...]

  • Página 39

    Using iSCSI 39 Add an iSCSI Initiator . 1 Click the Modify tab, and then click Edit Host To p o l o g y . 2 Select the host you want to add an iSCSI initiator to and click Add . 3 T ype or select an iSCSI initiator name and label for the iSCSI initiator and click OK . T able 3-3. Host T opology Actions (continued) Desired Action Steps to Complete A[...]

  • Página 40

    40 Using iSCSI[...]

  • Página 41

    Event Monitor 41 Event Monitor An event monitor is provided with MD Storage Manager . When enabled, the event monitor runs continuously in the ba ckground and monitors activity on the managed storage arrays. If the event monitor detects any critical problems, it can notify a host or remote system using e-mail, Simple Network Management P rotocol (S[...]

  • Página 42

    42 Event Monitor Disabling the Event Monitor Disable the event monitor if you do not want the system to send alert notifications. If you are running the event monitor on multiple systems, disabling the event monitor on all bu t one system prevents the sending of duplicate messages. Windows 1 Select Start → Settings → Control P anel → Administ[...]

  • Página 43

    About Y our Host 43 About Y our Host This chapter covers basic information ab out configuring host groups and host access, host topology , and I/O data path protection. A host is a system that accesses a stor age array and is mapped to the virtual disks through one or more host connections. Hosts have the following attributes: • Host name — A n[...]

  • Página 44

    44 About Y our Host T o begin configuring host access, click the Configure tab and then click either Configure Host Access (Automatic) or Configure Host Access (Manual) . See the appropriate section for manual configuration, depending on whether you are using SAS HBA or iSCSI. Automatic Configuration T o automatically configure a host for access to[...]

  • Página 45

    About Y our Host 45 4 Specify the HBA host ports by choosing known host ports or by manually defining host ports. T o select a host port that is alread y recognized by MD Storage Manager , click a host port in the Known HBA host ports list, then click Add . T o manually define a host port, click New , enter the HBA host port and Alias in the Enter [...]

  • Página 46

    46 About Y our Host T o manually define an initiator , click New , enter the iSCSI initiator name and iSCSI initiator label in the Enter new iSCSI initiator dialog box, and then click Add . NOTE: The initiator name entered must match the name on a host server that will connect to the storage array . 5 Click Next . 6 Indicate whether the host is pa [...]

  • Página 47

    About Y our Host 47 Host Groups A host group is a logical entity of two or more hosts that shar e access to specific virtual disks on the storage a rray . Y ou create host groups with MD Storage Manager . All hosts in a host group must have the same host type (operating system). In addition, all hosts in the host g roup must have special software, [...]

  • Página 48

    48 About Y our Host 4 Select the host group to which you want to move the host. 5 Click OK . The host is moved into the host group. The host retains the virtual disk mapp ings assigned to it, and inherits the virtual disk mappings assigned to t he group. Other hosts in the group do not inherit the mappings of the added host. Removing a Host From a [...]

  • Página 49

    About Y our Host 49 The host retains the virtual disk ma ppings assigned to it, and inherits the virtual disk mappings assigned to the group to which it is moved. The host loses the virtual disk mappings assig ned to the group from which it was moved. Removing a Host Group This section covers removing an entir e host group. T o remove a single host[...]

  • Página 50

    50 About Y our Host Host Context Agent The host context agent discovers the host topology . The host context agent starts when the host is started and stops when the host is turned off. The topology discovered by the host cont e xt agent can be viewed by clicking Configure Host Access (Automatic) in the Configure tab in the MD Storage Manager . Y o[...]

  • Página 51

    About Y our Host 51 I/O Data Path Protection Y ou can have multiple host-to-array connections for a host. Make sur e to select all of the connectio ns to the array when configuring host access to the storage array . NOTICE: Refer to the Installation Guide for more information on cabling configurations. NOTE: For maximum redundancy , you must sele c[...]

  • Página 52

    52 About Y our Host After the host is rebooted, the L UN is properly mapped and the MPP driver is loaded. All other sequential L UNs can be created and register ed to the operating system by running hot_add .[...]

  • Página 53

    Disk Groups and Virtual Disks 53 Disk Groups and V irtual Disks F ollowing is a list of terms us ed throughout this chapter: • Disk Group — A set of physical dis ks that are logically grouped and assigned a R AID level. Every disk group provides the overall capacity requir ed to create one or mor e virtual disks. • Virtual Disk — A logical [...]

  • Página 54

    54 Disk Groups and Virtual Disks Creating Disk Groups and V irtual Disks Disk groups are cr eated in the unconfigured capacity of a storage array , and virtual disks are cr eated in the free ca pacity of a disk group. The maximum number of physical disks supported in a disk group is 30. The hosts attached to the storage array read and write data to[...]

  • Página 55

    Disk Groups and Virtual Disks 55 performed in the department: Accoun ts Receivable (AR), Accounts P ayable (AP), internal billing, and so forth. In this scenario , the AR and AP virtual disks probably need more capacity th an the internal billing virtual disk. NOTE: In Linux, the host must be rebooted after de leting virtual disks to reset the /dev[...]

  • Página 56

    56 Disk Groups and Virtual Disks 3 Select Manual on the Create V irtual Disks – Ph ysical Disk Selection Choices page, then click Next . 4 Select the R AID level for the new disk group. 5 T o select one physical disk to add to the disk group, click the disk of your choice in the Unselected physical disks list. T o select more than one physical di[...]

  • Página 57

    Disk Groups and Virtual Disks 57 14 T o map the new virtual disk to a host now , select Map now and assign a logical unit number (L UN) to the vi rtual disk in the drop-down box. T o map the new virtual disk to a host later , select Map later . 15 Click Fi n i s h to create the new disk group a nd the first virtual disk in the group. Creating a Vir[...]

  • Página 58

    58 Disk Groups and Virtual Disks If you plan to create multiple virtual di sks, wait until you have cr eated all the virtual disks to register them. W aiting prevents you from having to register virtual disks more than once. Linux NOTE: Y ou need super -user (Linux) privileges to run the hot_add utility . The hot_add utility is installed with the h[...]

  • Página 59

    Disk Groups and Virtual Disks 59 coverage for the storage array . The num ber and type of hot spare drives is determined based on the number , type, an d capacity of physical disks in the storage array . T o add hot spare drive protectio n using automatic configuration: 1 Click the Configure tab, then click Configure Hot Spares . 2 T o automaticall[...]

  • Página 60

    60 Disk Groups and Virtual Disks Host-to-V irtual Disk Mapping After you create virtual disks, you mu st map them to the host(s) connected to the array . When you configure host-to- virtual disk mapping, consider these guidelines: • Each virtual disk in the storage array can be mapped to only one host or host group. • Host-to-virtual disk mappi[...]

  • Página 61

    Disk Groups and Virtual Disks 61 4 T o map the disk to a differe nt host or host group, click Change located to the right of the list. 5 T o remove the disk mapping to a host or host group, click Remove located to the right of the list. Changing Controller Ownership of the Virtual Disk If the host has a single data-path to t he MD storage array , t[...]

  • Página 62

    62 Disk Groups and Virtual Disks Administrative T ools and select the Disk Management MMC option to format and partition the disk. If the host serv er is running Windows Server 2008 Core version, partition and format the vir tual disk using the Microsoft DiskPart utility . Disk Group and V irtual Disk Expansion Adding free capacity to a disk group [...]

  • Página 63

    Disk Groups and Virtual Disks 63 If you receive a warning that the snapshot r epository virtual disk is becoming full, you may expand the snapshot r epo sitory virtual disk from MD Storage Manager . See "Snapshot Repository Capa city" on page 79 for step-by-step instructions. Storage Array Media Scan The media scan is a long-running opera[...]

  • Página 64

    64 Disk Groups and Virtual Disks 3 In the Select virtual disks to scan box, click the virtual disk you want to include in the media scan. NOTE: Press <Ctrl> and click to add more than one virtual disk to the media scan. Click Select All to include all virtual disks in the media scan. 4 Check the Scan selected virtual disks checkbox to enable [...]

  • Página 65

    Disk Groups and Virtual Disks 65 V olume Shadow-Copy Service The Microsoft V olume Shadow-copy Serv ice (VSS) is a st orage management interface for Microsoft W indows operating systems. VSS en ables your storage array to interact with third-party appl ications that use the VSS Application P rogramming Interface. Virtual disks that will be used as [...]

  • Página 66

    66 Disk Groups and Virtual Disks[...]

  • Página 67

    Snapshot Virtual Disks 67 Premium Feature—Snapshot V irtual Disks NOTE: If you ordered this feature, you received a Premium Feature Activation card shipped in the same box as your Dell PowerV ault MD storage array. Follow the directions on the card to obtain a key file and to enable the feature. A snapshot virtual disk is a point-in-time image of[...]

  • Página 68

    68 Snapshot Virtual Disks When you create a snapshot virtual disk, you specify wher e to create the snapshot repository virtual disk, its capacity , and other parameters. Y ou can disable or delete the snapshot virtual disk when you no longer need it, such as when the backup is complete. If you di sable a snapshot virtual disk, you can re-cr eate a[...]

  • Página 69

    Snapshot Virtual Disks 69 • Snapshot Repository V irtual Disk Name — A user -specified name that helps you associate the snapshot repository virtual disk to its corr esponding snapshot virtual disk a nd source virtual disk. Using the simple path, the following defaults are used for the other parameters of a snapshot virtual disk: • Capacity A[...]

  • Página 70

    70 Snapshot Virtual Disks Before cr eating a Snapshot Virtual Disk, note the following: • The following types of virtual disks are not valid source virtual disks: snapshot repository virtual disks, snap shot virtual disks, tar get virtual disks that are participating in a virtual disk copy . NOTE: Virtual Disk Copy is an Advanced (Premium) featur[...]

  • Página 71

    Snapshot Virtual Disks 71 3 Remove the drive letter(s) of the source in W indows or unmount the virtual drive(s) in Linux to help guaran tee a stable copy of the drive for the Snapshot. If this is not done, the snapsh ot operation will report that it has completed successfully , but the snapshot data will not be updated properly . NOTE: V erify tha[...]

  • Página 72

    72 Snapshot Virtual Disks 5 On the Create Snapshot V irtual Disks – Select P ath screen, select the Simple path. NOTE: A snapshot repository virtual disk re quires 8 MB of free space. If the required free space is n ot available in the disk group of the source virtual disk, the Create Snapshot Virtual Disks feature defaults to the advanced path. [...]

  • Página 73

    Snapshot Virtual Disks 73 Creating a Snapshot V irtual Disk Using the Advanced Path About the Advanced Path Use the advanced path to choose whethe r to place the snapshot repository virtual disk on free capacity or unconf igur ed capacity and to change the snapshot repository virtual disk parame ters. Y ou can select the advanced path regar dless o[...]

  • Página 74

    74 Snapshot Virtual Disks • Snapshot Repository V irtual Disk Full Conditions — Y ou can choose whe ther to f ail writ es to the source virtual disk or fail the snapshot virtual disk when the snapshot reposi tory virtual disk becomes full. • Host-to- V irtual Disk Mapping — Choose whether to map the snapshot virtual disk to a host or host g[...]

  • Página 75

    Snapshot Virtual Disks 75 Before cr eating a Snapshot V irtual Disk, note the following: • The following types of virtual disks are not valid source virtual disks: snapshot repository virtual disks, snapsh ot virtual disks, target virtual disks that are participating in a virtual disk copy . NOTE: Virtual Disk Copy is an Advanced (Premium) featur[...]

  • Página 76

    76 Snapshot Virtual Disks 4 F ollow any additional instructions for your operating system. F ailure to follow these additional instructions can create unusable snapshot virtual disks. NOTE: If your operating sy stem requires addi tional instructions, you can find those instructions in your o perating sy stem documentation. After your host server ha[...]

  • Página 77

    Snapshot Virtual Disks 77 6 Click Next . 7 T ype a name for the snapshot in the Snapshot virtual disk name text box. 8 T ype a name for the snapshot repository virtual disk in the Snapshot repository virtual disk name text box. 9 Click Next . 10 Choose whether to create the snap shot virtual disk from unconfigur ed capacity or free capacity . T o c[...]

  • Página 78

    78 Snapshot Virtual Disks T o map later , select Map later . 15 Click F inish to create the snapshot virtual disk and the associated snapshot repository virtual disk. 16 After you have created one or mor e snapshot virtual disks, mount or reassign a drive letter of the source virtual disk. 17 If needed, assign host-to-virtual disk mapping between t[...]

  • Página 79

    Snapshot Virtual Disks 79 • Whether you use the software-supplied sequence number that (by default) populates the Snapshot virtual disk name or the Snapshot repository virtual disk name field, the next default name for a snapshot or snapshot repository virtual disk still uses the sequence number determined by the software. F or example, if you gi[...]

  • Página 80

    80 Snapshot Virtual Disks • Any virtual disk in the disk grou p is in any state of modification. • The controller that has ownership of this virtual disk is currently adding capacity to another virtual disk. Each controller can add capacity to only one virtual disk at a time. • No free capacity e xists in the disk group. • No unconfigured c[...]

  • Página 81

    Snapshot Virtual Disks 81 T o disable a snapshot virtual disk: 1 Click the Modify tab, then click Modify snapshot virtual disks . 2 Click Disable Snapshot V irtual Disks . 3 Highlight the snapshot virtual disk to be disabled and click Disable beneath the list. 4 In the Confirm Disable Snapshot V irtual Disk dialog box, type yes and then click OK . [...]

  • Página 82

    82 Snapshot Virtual Disks 4 Remove the drive letter(s) of the sour ce and (if mounted) snapshot virtual disk in W indows or unmount the virtual drive(s) in Linux to help guarantee a stable copy of the drive for the Snapshot. If this is not done, the snapshot operation will report th at it has completed successfully , but the snapshot data will not [...]

  • Página 83

    Virtual Disk Copy 83 Premium Feature—V irtual Disk Copy NOTICE: A virtual disk copy overwr ites data on th e target virtual disk. Before starting a virtual disk copy , ensure that you no longer need the d ata or back up the data on the targ et virtual disk. NOTE: If you ordered this feature, you received a Premium Feature Activation card that shi[...]

  • Página 84

    84 Virtual Disk Copy Reasons to use virtual disk copy include the following: • Copying data for improved access — As your storage requir ements for a virtual disk change, you can use a virtual disk copy to copy data to a virtual disk in a disk group that uses drives with larger capacity within the same storage array . Copying data for larger ac[...]

  • Página 85

    Virtual Disk Copy 85 V irtual Disk Read/Write Permissions After the virtual disk copy is complete, the target virtual disk automatically bec omes rea d-on ly to the hosts . The tar get virtual disk rejects read and write requests while the virtual disk copy opera tion has a status of P ending or In P rogress or if the operation fails before complet[...]

  • Página 86

    86 Virtual Disk Copy V irtual Disk Copy Restrictions Before you perform any virtual disk co py tasks, understand and adher e to the restrictions listed in this section. The r estrictions apply to the source virtual disk, the target virtual disk, and the storage array . • While a virtual disk copy has a status of In P rogress, P ending, or F ailed[...]

  • Página 87

    Virtual Disk Copy 87 Creating a V irtual Disk Copy Use the Create V irtual Disk Copies featur e on the Configure tab to create a full copy of a source virtual disk. This operation overwrites any existing data on the target virtual disk. Once the v irtual disk copy has started, all I/O activity to the source virtual disk is read-only . Any attempts [...]

  • Página 88

    88 Virtual Disk Copy 4 Remove the drive letter(s) of the so urce and (if mounted) virtual disk in W indows or unmount the virtual driv e(s) in Linux to help guarantee a stable copy of the drive for the virtua l disk. If this is not done, the copy operation will report that it has completed successfully , but the copied data will not be updated prop[...]

  • Página 89

    Virtual Disk Copy 89 5 Set the copy priority for the virtual disk copy and click Next . The source virtual disk, the target virt ual disk, and the copy priority setting that you selected appear on the Create virtual disk copies—Confirm Copy Settings dialog. The higher priorities allocate more r esources to the virtual disk copy at the expense of [...]

  • Página 90

    90 Virtual Disk Copy Y ou can change the copy priority for a virtual disk copy in the following circumstances: • Before the virtual disk copy begins See "Creating a V irtual Disk Copy" on page 87. • While the virtual disk copy is in progress Click the Modify tab, then click Manage V irtual Disk Copies . Select an active copy operation[...]

  • Página 91

    Virtual Disk Copy 91 Preparing Host Servers to Recopy a Virtual Disk NOTICE: Before you create a new copy of a so urce virtual disk, stop any data access (I/O) activity or sus pend data transfer to the sour ce virtual disk (and, if applicable, the targe t disk) to ensure that you captu re an accurate point-in-time image of the source virtual disk. [...]

  • Página 92

    92 Virtual Disk Copy Recopying the Virtual Disk After first preparing the host server(s) as specified in the pr eceding procedure, complete the following steps to create a new virtual disk copy for an e xisting copy pair: 1 Click the Modify tab, and then click Manage virtual disk copies . Y ou can only select one copy operation at a time to be reco[...]

  • Página 93

    Virtual Disk Copy 93 3 Y ou must register the tar get virtual di sk with the operating system before you can use the new virtual disk. P erform the following steps: a Enable write permission on the targ et virtual disk by either r emoving the virtual disk copy pair (see "Removing Copy P airs" on page 93) or explicit ly setting write permi[...]

  • Página 94

    94 Virtual Disk Copy[...]

  • Página 95

    Firmware Downloads 95 Firmware Downloads Y ou can download the following types of firmware images with MD Storage Manager: • R AID controller module firmware that manages the storage array controllers • R AID nonvolatile static random a ccess memory (NVSRAM) images that specify the default settings fo r the storage array controllers • Physica[...]

  • Página 96

    96 Firmware Downloads Downloading Both RAID Controller and NVSRAM Firmware NOTE: I/O to the array can continue while yo u are upgrading RAID controller and NVSRAM firmware. NOTE: The RAID enclosure must contain at leas t two disk drives in order to update the firmware on the controller . Use the following procedure to down load R AID controller and[...]

  • Página 97

    Firmware Downloads 97 11 A Confirm Download dialog box appears listing the current versions and the versions you selected of the R A ID controller and NVSRAM firmwar e . T o complete the download, click Ye s . Downloading Only NVSRAM Firmware Use the following procedure to download NVSR AM firmware: 1 Click the Support tab, then click Download firm[...]

  • Página 98

    98 Firmware Downloads 3 Click Select F ile to browse to the file that you want to download. By default, only firmware images that ar e compatible with the current storage array configuration appear . 4 Click the non-redundant-MSCS NVSR AM file in the F ile Selection area and then click OK . 5 If the file you selected is not valid or is incompatible[...]

  • Página 99

    Firmware Downloads 99 7 A Confirm Download dialog box appears listing the current versions and the versions you selected of physical disk firmware. T o complete the download, click Ye s . Downloading EMM Firmware NOTICE: Do not make any configuration changes to the storage array while you are dow nload ing the EMM firmwa re. Doing so could cause th[...]

  • Página 100

    100 Firmware Downloads[...]

  • Página 101

    T roubleshooting 101 T roubleshooting Problems The following sections provide information to assist you in resolving problems that may occur with your MD Storage Array . Recovery Guru The Recovery Guru is a component of MD Storage Manager that diagnoses critical events on the storage array and recommends step-by-step r ecovery procedures for proble[...]

  • Página 102

    102 T roubleshooti ng A storage array is always in one of six possible health status conditions, which you can identify by the status icon. • Optimal status — Every component in the managed device is in the desired working condition. • Needs Attention status — A problem exis ts with the managed device that requir es intervention. If the sto[...]

  • Página 103

    T roubleshooting 103 where -f flushes all the memory-r esident data for the file system indicated by < fi le sy st em- identifier > , and < filesystem-identifier > specifies a unique file system in the following syntax: drive-letter: < mount-point-path> The file system identifier might consist of only a drive letter , as in the fo[...]

  • Página 104

    104 T roubleshooti ng Unidentified Devices An unidentified node or device occurs when the MD Storage Manager cannot access a new storage array . Causes fo r this error include network connection problems, the storage array is turned off, or the storage array does not exist. NOTE: Before beginning any recovery pro cedure, make sure that the host-age[...]

  • Página 105

    T roubleshooting 105 b Make sur e that the network can access the host by using the ping command in the following syntax: ping <host-name-or-IP-address-of-the-host> . If the network can access the host, cont inue to step c. If the network cannot access the host, skip to step d. c Remove the host with the unresponsive status from the MD Storag[...]

  • Página 106

    106 T roubleshooti ng d Make sur e that the applicable netw ork configuration tasks have been done (for example, the IP addr esses have been assigned to each controller). 5 Make sur e that the controller firmware is compatible with the MD Storage Manager on your management station . If the controller firmware was upgraded, the MD Storage Manager mi[...]

  • Página 107

    Hardware Considerations 107 Enclosure Hardware Replacement, Maintenance, and Configuration Considerations Removing and Inserting Enclosure Management Modules on Attached Expansion Enclosures The following procedures describe how to safely r emove and insert an enclosure management module (E MM) from an e xpansion enclosure attached to the MD3000/MD[...]

  • Página 108

    108 Hardware Considerations 2 After attaching the SAS cables, wait at least three minutes for the EMM to reach optimal state. NOTE: Y ou may experience a transitional failu re on multiple E MMs in the MEL log while the sy stem updates. Removing and Inserting Phy sical Disks Refer to the following guidelines to ens ure that physical disks ar e safel[...]

  • Página 109

    Hardware Considerations 109 MD3000 Cluster Configuration Guidelines for Standalone Host Servers If one of the standalone host servers you are planning to configur e into a cluster environment is running MD Storage Manager and has a virtual disk mapped to the array , use that host to create the Host Group and quorum virtual disk mapping. NOTE: Failu[...]

  • Página 110

    110 Hardware Considerations[...]

  • Página 111

    Index 111 Index A alert e-mail, 2 7 SNMP , 2 7 B backup, 84 C Configure tab, 12 copy pairs removing, 9 3 copy priority , 89 D disk expansion, 6 2 disk group, 12, 53-55, 80 documentation, 14 download firmware, 13 E e-mail alert, 27 event monitor , 15 F free capacity , 53 H HBA port, 43 host, 15 access, 1 2 configuration, 4 3 - 5 9 group, 4 7 name, 4[...]

  • Página 112

    112 Index I iSCSI advanced host port settings, 3 5 changing target discovery , 3 4 changing target identification, 3 4 configuring host ports, 3 5 edit, remove, or r ename host topology , 3 8 iSCSI tab, 1 3 viewing or ending a session, 3 6 viewing or setting statistics, 3 7 L logical unit number , 15 M Modify tab, 12 N NVSR AM file, 13 P passwor d,[...]

  • Página 113

    Index 113 U unconfigured capacity , 53 utilities hot_add, 5 8 V virtual disk, 53-54 access, 1 5 deleting in Linux, 5 5 n a m e , 78-79 recopy , 9 0 registering, 5 7 s o u r c e , 67, 79 virtual disk copy , 12, 87, 90 exa mp le s, 8 4 restrictions, 8 6 stop, 9 0 W warranty , 14[...]

  • Página 114

    114 Index[...]