Dell MD3620I manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282

Ir para a página of

Bom manual de uso

As regras impõem ao revendedor a obrigação de fornecer ao comprador o manual com o produto Dell MD3620I. A falta de manual ou informações incorretas fornecidas ao consumidor são a base de uma queixa por não conformidade do produto com o contrato. De acordo com a lei, pode anexar o manual em uma outra forma de que em papel, o que é frequentemente utilizado, anexando uma forma gráfica ou manual electrónicoDell MD3620I vídeos instrutivos para os usuários. A condição é uma forma legível e compreensível.

O que é a instrução?

A palavra vem do latim "Instructio" ou instruir. Portanto, no manual Dell MD3620I você pode encontrar uma descrição das fases do processo. O objetivo do manual é instruir, facilitar o arranque, a utilização do equipamento ou a execução de determinadas tarefas. O manual é uma coleção de informações sobre o objeto / serviço, um guia.

Infelizmente, pequenos usuários tomam o tempo para ler o manual Dell MD3620I, e um bom manual não só permite conhecer uma série de funcionalidades adicionais do dispositivo, mas evita a formação da maioria das falhas.

Então, o que deve conter o manual perfeito?

Primeiro, o manual Dell MD3620I deve conte:
- dados técnicos do dispositivo Dell MD3620I
- nome do fabricante e ano de fabricação do dispositivo Dell MD3620I
- instruções de utilização, regulação e manutenção do dispositivo Dell MD3620I
- sinais de segurança e certificados que comprovam a conformidade com as normas pertinentes

Por que você não ler manuais?

Normalmente, isso é devido à falta de tempo e à certeza quanto à funcionalidade específica do dispositivo adquirido. Infelizmente, a mesma ligação e o arranque Dell MD3620I não são suficientes. O manual contém uma série de orientações sobre funcionalidades específicas, a segurança, os métodos de manutenção (mesmo sobre produtos que devem ser usados), possíveis defeitos Dell MD3620I e formas de resolver problemas comuns durante o uso. No final, no manual podemos encontrar as coordenadas do serviço Dell na ausência da eficácia das soluções propostas. Atualmente, muito apreciados são manuais na forma de animações interessantes e vídeos de instrução que de uma forma melhor do que o o folheto falam ao usuário. Este tipo de manual é a chance que o usuário percorrer todo o vídeo instrutivo, sem ignorar especificações e descrições técnicas complicadas Dell MD3620I, como para a versão papel.

Por que ler manuais?

Primeiro de tudo, contem a resposta sobre a construção, as possibilidades do dispositivo Dell MD3620I, uso dos acessórios individuais e uma gama de informações para desfrutar plenamente todos os recursos e facilidades.

Após a compra bem sucedida de um equipamento / dispositivo, é bom ter um momento para se familiarizar com cada parte do manual Dell MD3620I. Atualmente, são cuidadosamente preparados e traduzidos para sejam não só compreensíveis para os usuários, mas para cumprir a sua função básica de informação

Índice do manual

  • Página 1

    Dell PowerV ault MD3600i and MD3620i Storage Array s Owner’ s Manual Regulatory Model: E03J Series and E04J Series Regulatory T ype: E03J0 01 and E04J001 book.book Page 1 Thursday, December 9, 2 010 3:20 PM[...]

  • Página 2

    Notes, Cautions, and W arnings NOTE: A NOTE indicates important information that helps you make b etter use of your computer . CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WAR N IN G: A WARNING indicates a potential for property damage, personal injury , or death. ______________ ______ [...]

  • Página 3

    Contents 3 Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . 19 About This Document . . . . . . . . . . . . . . . . . . 19 Inside the Box of the De ll PowerV ault MD36 00i Series Storage Array . . . . . . . . . . . . . . . . . . . 19 MD3600i Series Storage Array . . . . . . . . . . . 20 Dell PowerV ault Modular Disk Storage Mana[...]

  • Página 4

    4 Contents 3 Planning: RAID Controller Modules . . . . 31 RAID Controller Modules . . . . . . . . . . . . . . . . 31 RAID Controller Module Connectors and Features . . . 32 RAID Controller Modul e—Addition al Features . . . . . 34 Battery Backup Unit . . . . . . . . . . . . . . . . 34 Storage Array Thermal Shutdown . . . . . . . . . 34 Sy stem Pa[...]

  • Página 5

    Contents 5 Cycle T ime . . . . . . . . . . . . . . . . . . . . . 44 Virtual Disk Operations Limit . . . . . . . . . . . . 45 Disk Group Operations . . . . . . . . . . . . . . . . . . 45 RAID Level Migration . . . . . . . . . . . . . . . . 45 Segment Size Migration . . . . . . . . . . . . . . 46 Virtual Disk Capa city Expansion . . . . . . . . . . 4[...]

  • Página 6

    6 Contents 5 Configuration: Overview . . . . . . . . . . . . 61 User Interface . . . . . . . . . . . . . . . . . . . . . . 61 Enterprise Management Window . . . . . . . . . 62 Array Management Window . . . . . . . . . . . . 63 6 Configuration: About Y our Storage Array . . . . . . . . . . . . . . . . . . . . . 65 Out-of-Band and In-Band Management [...]

  • Página 7

    Contents 7 Setting the Storage Array RAID Controller Module Clocks . . . . . . . . . . . . . . . . . . . 82 7 Configuration: Using iSCSI . . . . . . . . . . . 83 Changing the iSCSI T arget Authentication . . . . . . . 83 Entering Mutual Aut hentica tion Permissions . . . . . . 84 Creating CHAP Secrets . . . . . . . . . . . . . . . . . 84 Initiator [...]

  • Página 8

    8 Contents 9 Configuration: About Y our Host . . . . . . . 95 Configuring Host Access . . . . . . . . . . . . . . . . . 95 Using the Mappings T ab . . . . . . . . . . . . . . . . . 96 Defining a Host . . . . . . . . . . . . . . . . . . . 97 Removing Host Access . . . . . . . . . . . . . . . . . . 98 Managing Host Groups . . . . . . . . . . . . . . [...]

  • Página 9

    Contents 9 Choosing an Appropriate Phy sical Disk T ype . . . . . . 117 Phy sical Disk Security with Self Encrypting Disk . . . . . . . . . . . . . . . . . . . 117 Creating a Security Key . . . . . . . . . . . . . . . 120 Changing a Security Key . . . . . . . . . . . . . . 122 Saving a Security Key . . . . . . . . . . . . . . . 124 V alidate Securi[...]

  • Página 10

    10 Contents Disk Group and Virtual Disk Expan sion . . . . . . . . 143 Disk Group Expansion . . . . . . . . . . . . . . . 143 Virtual Disk Expa nsion . . . . . . . . . . . . . . 144 Using Free Capacity . . . . . . . . . . . . . . . . 144 Using Unconfigured Capacity . . . . . . . . . . . 144 Disk Group Migration . . . . . . . . . . . . . . . . . 145[...]

  • Página 11

    Contents 11 Snapshot Repository Capacity . . . . . . . . . . . . . . 163 Re-Creating Snapshot Virtual Disks . . . . . . . . . . . 166 Disabling a Snapshot V irtual Disk . . . . . . . . . . . . 166 Preparing Host Servers to Re-Create a Snapshot Virtual Disk . . . . . . . . . . . . . . . . 167 Re-Creating a Snapshot Virtual Disk . . . . . . . . . . 1[...]

  • Página 12

    12 Contents Stopping a Virtual Disk Co py . . . . . . . . . . . . . 178 Recopying a V irtual Disk . . . . . . . . . . . . . . . . 179 Preparing Host Ser vers to Recopy a Virtual Disk . . . . . . . . . . . . . . 179 Recopying the V irtual Disk . . . . . . . . . . . . 180 Removing Copy Pairs . . . . . . . . . . . . . . . . . . 181 13 Configuration: P[...]

  • Página 13

    Contents 13 Downloading Both RAID Controller and NVSRAM Firmware . . . . . . . . . . . . . . . . . 198 Downloading Only NVSRAM Firmware . . . . . . . . . 201 Downloading Phy sical Disk Firmware . . . . . . . . . 203 Downloading MD1200 Series Expansion Module EMM Firmware . . . . . . . . . . . 205 Self-Monitoring Analy sis and Reporting T echnology [...]

  • Página 14

    14 Contents Installing a RAID Controller Module . . . . . . . 220 Opening the RAID Controller Module . . . . . . . 220 Closing the RAID Controller Module . . . . . . . 221 RAID Controller Module Backup Battery Unit . . . . . 222 Removing the RAID Controller Module Backup Battery Unit . . . . . . . . . . . 222 Installing the RAID Controller Module B[...]

  • Página 15

    Contents 15 19 T roubleshooting: Y our Storage Array Software . . . . . . . . . . . . 237 Start-Up Routine . . . . . . . . . . . . . . . . . . . . . 237 Device Health Conditions . . . . . . . . . . . . . . . . 237 Storage Array Support Data . . . . . . . . . . . . . . . 241 Automatically Collect the Support Bundle Data . . . . 241 Retrieving T race[...]

  • Página 16

    16 Contents Recovering From an Unidentified Storage Array . . . 258 Starting or Restarting the Host Context Agent Software . . . . . . . . . . . . . 261 20 T roubleshooting: Y our Array . . . . . . . . . 263 Safety First—For you and Y our Array . . . . . . . . . 263 T roubleshooting Storage Array Startup Failure . . . . 263 T roubleshooting Loss [...]

  • Página 17

    Contents 17 Critical Conditions . . . . . . . . . . . . . . . . . 272 Noncritical Conditions . . . . . . . . . . . . . . . 272 21 Getting Help . . . . . . . . . . . . . . . . . . . . . . 273 Contacting Dell . . . . . . . . . . . . . . . . . . . . . 273 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 book.book Page 17 Thursday,[...]

  • Página 18

    18 Contents book.book Page 18 Thursday, December 9, 2010 3:20 PM[...]

  • Página 19

    Introduction 19 1 Introduction WAR N IN G: See the Safety, Environmental, and Regulatory Information document for important safety information before following any procedures listed in this document. About This Document This document familiarizes you with the function s of the Dell P owerV ault MD3600i Series storage array . The docu ment is organi[...]

  • Página 20

    20 Introduction • Mounting rails (2) (optional) • MD3600i Series res ou r c e m e di a • The rack installation ins tructions included with your rack solution describes how to install your encl osure into a rack • Getting Started W ith Y our System provides information on enclosure features, the procedure to set up your enclosure, and techni[...]

  • Página 21

    Introduction 21 Other Information Y ou May Need WAR N IN G: See the safety and regulatory info rmation that shipped with your sy stem. Warranty information may be in cluded within this document or as a separate document. NOTE: All the documents, unless specifie d otherwise, are available at support.dell.com/manuals . • Getting Started Guide provi[...]

  • Página 22

    22 Introduction book.book Page 22 Thursday, December 9, 2010 3:20 PM[...]

  • Página 23

    Planning: About Y our Storage Array 23 2 Planning: About Y our Storage Array Overview The Dell P owerV ault MD3600i Series storag e array is des igned for high availability , offering redund ant access to data storage. It supports single and dual R AID controller configuration. The MD3600i Series storage array provides 1 GBase- T or 10 GBase- T con[...]

  • Página 24

    24 Planning: About Y our Storage Array Hardware Features Front-Panel Features and Indicators Figure 2-1. Front-Panel Features and Indicators—Dell PowerV ault MD3600i Figure 2-2. Front-Panel Features and Indicators—Dell PowerV ault MD3620i 1 2 3 5 4 6 1 2 3 4 6 5 book.book Page 24 Thursday, December 9, 2010 3:20 PM[...]

  • Página 25

    Planning: About Y our Storage Array 25 Figure 2-3. Front-Bezel Features and Indicators Item Indicator , Button, or Connector Icon Description 1 Enclosure sta tus LED The encl osure status L ED lights when the enclosure power is on. Lights blue during normal operation. Blinks blue when a h ost server is identifying the enclosur e or when the system [...]

  • Página 26

    26 Planning: About Y our Storage Array 3 Split mode LED This LED should be unlit as the split mode function is not supported by the MD3600i Series storage arrays. 4 System identification button The system identification button on the front control panel can be use d to locate a particular enclosure with in a rack. When the button is pushed, the sys[...]

  • Página 27

    Planning: About Y our Storage Array 27 Back-Panel Featu res and Indicators Figure 2-4. Back-Panel Features and In dicat ors—Dell PowerV aul t MD3600i Series Storage Array 1 600 W power supply/cooling fan module 2 RAID Controller Module 0 3 RAID Controller Module 1 4 600 W power supply/cooling fan module 1 2 3 4 book.book Page 27 Thursday, Decembe[...]

  • Página 28

    28 Planning: About Y our Storage Array Hard-Drive Indicator Patterns Figure 2-5. Hard Drive Indicators 1 hard-drive activity indicator (green) 2 hard-drive status indicator (green and amber) 1 2 book.book Page 28 Thursday, December 9, 2010 3:20 PM[...]

  • Página 29

    Planning: About Y our Storage Array 29 Power Supply and Cooling Fan Features The MD3600i Series storage array incl udes two integrat ed, hot-swappable power supply/cooling fan modules. Both modules must be in stalled to ensure proper cooling. Each module contains two se parate cooling fans. The syste m requi res at le ast one of the cooling fa ns t[...]

  • Página 30

    30 Planning: About Y our Storage Array Power Indicator Codes Figure 2-6. Power Indicator Codes Item LED T ype Icon Description 1 DC power The LED lights gr een when the DC output voltage is within the limit. If this LED is off, it indicates that the DC output voltage is not within the limit. 2 P ower supply/cooling fan fault The LED lights amber wh[...]

  • Página 31

    Planning: RAID Controller Modules 31 3 Planning: RAID Controller Modules RAID Controller Modules The R AID controller modules provide high-perform ance, advanced virtual disk co nfigurat ion, and fault-tolera nt disk subsystem management. Each R AID controller module contains 2 GB of cache that is mirror ed with the other controller's cache fo[...]

  • Página 32

    32 Planning: RAID Controller Modules RAID Controller Module Connectors and Features Figure 3-1. MD3600i Series i SCSI RAID Controller Module Item Component Function 1 SAS OUT port P rovides SAS connec tion for cabling to an e xpansion enclosu re. 2 iSCSI IN port 0 Provides host-to-controller iSCSI 1/10 Gbps Ethernet connection. 3 iSCSI IN port 1 Pr[...]

  • Página 33

    Planning: RAID Controller Modules 33 8 Controller power LED Lights green when controller is turned on. Off when controller is not turned on. 9 Controller fault LED Lights amber when controller fault detected. Off when controller operating normally . 10 iSCSI IN port activity LED Lights gr een when there is no activity on connecti on. Blinks gree n [...]

  • Página 34

    34 Planning: RAID Controller Modules RAID Controller Modu le—Additional Features Battery Backup Unit Each R AID controller contains a two- cell lithium ion nanopolymer battery backup unit (BBU). It provides power to the R AID controller module in the event of a power outage. F or information o n removing and installing the BBU, see "R AID Co[...]

  • Página 35

    Planning: RAID Controller Modules 35 Sy stem Password Reset T o reset a for gotten password, push and hold down the password r eset switch for at least 5 s econds. The passwor d is deleted. See F igur e 3-1 to locate the password r eset switch. The R AID controller module allows yo u to change the password. F o r more information about setting your[...]

  • Página 36

    36 Planning: RAID Controller Modules Write-Throug h Cache In write-through cach e, data is writ ten to the physical disk before completion status is r eturned to t he host operati ng system. W rite-thro ugh cache is considered mor e robust than write-back cache, since a power failure is less likel y to cause loss of data. The RAID controller automa[...]

  • Página 37

    Planning: MD3600i Series Storage Array T erms and Concepts 37 4 Planning: MD3600i Series Storage Array T erms and Concepts This chapter describes the storage arra y concepts, which help in configuring and operating the Dell P owerV ault MD3600i Series sto rage arrays. Phy sical Disks, V irtual Disks, and Disk Groups Physical disks in your storage a[...]

  • Página 38

    38 Planning: MD3600i Series St orage Array T erms and Concepts Phy sical Disks Only Dell supported 6.0-Gbps SAS physica l disks are supporte d in the storage array . If the storage array detects unsuppo rted physical disks, it m arks the disk as unsupported and the physical disk be comes unavailable for all operations. NOTE: The MD3600i storage enc[...]

  • Página 39

    Planning: MD3600i Series Storage Array T erms and Concepts 39 If a disk drive rebuild fails because of a source drive failur e or because the drive is too small, the MDSM r eports a failure of the phys ical disk even though the LED state on the drive in dicates that the rebuild was aborted (green for 3 seconds, amber for 3 seconds, then off for 3 s[...]

  • Página 40

    40 Planning: MD3600i Series St orage Array T erms and Concepts 3 P rovide host server acces s. 4 Create mappings to associate the vi rtual di sks with the host serv ers. NOTE: Host server access must be cr eated before mapping virtual disks. Disk groups are always created in the un configured capacity of a storage arra y . Unconfigured capacity is [...]

  • Página 41

    Planning: MD3600i Series Storage Array T erms and Concepts 41 RAID Levels R AID levels determine the way in whic h data is written to physical disks. Different R AID levels provide different le vels of accessibility , redundancy , and capacity . Using multiple physical disks has the follo wing advantages over usi ng a single physical disk: • Plac[...]

  • Página 42

    42 Planning: MD3600i Series St orage Array T erms and Concepts I/O performance is greatly improved by spreading the I/O load across many physical disks. Alth ough it o ffers th e best perfo rmance of any RAID level, RAID 0 l acks data re dundancy . Choose th is option only for non-critical data, because failure of one physical disk r esult s in the[...]

  • Página 43

    Planning: MD3600i Series Storage Array T erms and Concepts 43 actual storage. RAID 10 is automatically used when a R AID level of 1 is chosen with four or mor e physical disks. R AID 10 works well for medium- sized databases or any environment that requires high performance and fault tolerance and moderate -to-medium capacity . Segment Size Disk st[...]

  • Página 44

    44 Planning: MD3600i Series St orage Array T erms and Concepts Foreground Initialization The storage array supports fore ground in itialization for vi rtual disks. All access to the virtual disk is block ed du ring for eground init ialization. During foreground initiali zation, zeros ( 0x00) are written to e very sector of the virtual disk. The vir[...]

  • Página 45

    Planning: MD3600i Series Storage Array T erms and Concepts 45 The storage array tracks the cycle for ea ch disk group independent of other disk groups on the controller a nd create s a checkpoint. If the media verification operation on a disk gro up is preempted or block ed by another operation on th e disk group, the storage array re sumes after t[...]

  • Página 46

    46 Planning: MD3600i Series St orage Array T erms and Concepts Segment Size Migra tion Segment size refer s to the amount of da ta (in kilobytes) that the storage array writes on a physi cal disk in a virtual disk befor e writing data on the ne xt physical disk. V alid valu es for the segment size are 8, 16, 32, 64, 128, 256, and 512 KBs. Dynamic s[...]

  • Página 47

    Planning: MD3600i Series Storage Array T erms and Concepts 47 Disk Group Defragmentation Defragmenting consolida tes the free ca pacity in the disk group into one contiguous area. Defragment ation does not change the way in which the data is stored on the virtual disks. Disk Group Operations Limit The maximum number of active, conc urrent disk grou[...]

  • Página 48

    48 Planning: MD3600i Series St orage Array T erms and Concepts • Segment size migration • Disk group expansion • Disk group defragmentation. The priority of each of these operat ions can be changed to address performance requirements of the environment in whi ch the operations are to be e xecut ed. NOTE: Setting a high priority level impact s[...]

  • Página 49

    Planning: MD3600i Series Storage Array T erms and Concepts 49 array , the MD3600i array does not reco gnize the migrating metadata and that data is lost. In this ca se, MD3600i initialize s the physical disks and ma rks them as unconfigured capacity . NOTE: Only disk groups and associated virtual disks with all mem ber phy sical disks present can b[...]

  • Página 50

    50 Planning: MD3600i Series St orage Array T erms and Concepts • Migrating virtual disks to a storage array with no existing physical disks— T urn off the destination storage array , when migrating disk groups or a complete set of physical disks from a storage arra y to another storage array that has no existing physical disks. A fter the desti[...]

  • Página 51

    Planning: MD3600i Series Storage Array T erms and Concepts 51 • A unique L UN must be used by a host group or host server to access a virtual disk. • Not every operating system has the sa me number of L UNs available for use. Host T ypes A host server is a server that accesses a storage array . Ho st servers are mapped to the virtual dis ks and[...]

  • Página 52

    52 Planning: MD3600i Series St orage Array T erms and Concepts Snapshot Virtual Disks A snapshot is a point-in-time image of a virtual disk. The snapshot provides an image of the virtual disk at the time the snapshot was cr eated. Y ou create a snapshot so that an application (for example, a backup application) can access the snapshot and read the [...]

  • Página 53

    Planning: MD3600i Series Storage Array T erms and Concepts 53 F o r details on mapping the snapshot virtu al disk to the secondary node, r efer to the Dell P owerV ault MD3 600i and MD3620i Storage A rrays With Microsoft Wi n d ow s S e r v e r F ai l o v e r Clusters on support.dell.com/manuals . Vi rtual Disk Copy Virtual disk copy is a pr em ium[...]

  • Página 54

    54 Planning: MD3600i Series St orage Array T erms and Concepts Virtual Disk Recovery Y ou can use the Edit host server -to-virt ual disk mappings feature to recover data from the backup virtual disk. Th is functionality enables you to unmap the original source virtual disk from its host server , then map the backup virtual disk to the same host ser[...]

  • Página 55

    Planning: MD3600i Series Storage Array T erms and Concepts 55 The multi-path software identifies the ex istence of multiple paths to a virtual disk and establishes a pr eferred path to that disk. If any component in t he preferr ed path fails, the multi-path sof tware automati cally re-routes I/O requests to the alternate path so that the storage a[...]

  • Página 56

    56 Planning: MD3600i Series St orage Array T erms and Concepts Ownership can later be mo dified to balance worklo ad according to a ctual usage. If virtual disk ownership is not manually balanced, it is possible for one controller to have the majority of the work, while the other controller is idl e. Limit the number of virtual disks in a disk grou[...]

  • Página 57

    Planning: MD3600i Series Storage Array T erms and Concepts 57 • Least path weight with subset (Windows operating systems only)—The least queue depth with subset policy is also known as the le ast I/Os or least requests policy . This policy routes the ne xt I/O request to a data path that has the least outstanding I/O requests queued. F or this [...]

  • Página 58

    58 Planning: MD3600i Series St orage Array T erms and Concepts • R AID Controller modules •V i r t u a l d i s k s • Storage array totals NOTE: By default, all items are selected. b In P olling inter val , select how often you want to update the performance statistics. NOTE: For an accurate elapsed time, do not use the Set RAID Controller Mod[...]

  • Página 59

    Planning: MD3600i Series Storage Array T erms and Concepts 59 The P erformance Monitor data provides information about how your storage array is performing. The data is presented in eight columns, which are described in this table. Use this data to make perf ormanc e tuning decisions for your storage array . F o r more information, see the online h[...]

  • Página 60

    60 Planning: MD3600i Series St orage Array T erms and Concepts book.book Page 60 Thursday, December 9, 2010 3:20 PM[...]

  • Página 61

    Configuration: Overview 61 5 Configuration: Overview Dell P owerV ault Modular Disk Stor age Manager (MDSM) online help contains information on the how to use the MDSM application to perform the configuration and mana gement tasks described in this document. Y ou can access online help by clicking Help located at the top right corner of MDSM interf[...]

  • Página 62

    62 Configuration: Overview Enterprise Mana gement Window The EMW provides high-level manageme nt of storage arrays. When you start MDSM, the EMW opens. The EMW has the: • Devices tab—P rovides information about the storage arrays. • Setup tab—P resents the initial setup ta sks that guide you through adding storage arrays and configuring ale[...]

  • Página 63

    Configuration: Overview 63 • Upgrade firmware on multiple storage arrays concurrently . • Obtain information about the firmware inventory including the version of the RAID controller modules, physical disks, and the enclosure management modules (EMMs) in the storage array . Inheriting the Sy stem Settings Use the Inherit Syst em Settings option[...]

  • Página 64

    64 Configuration: Overview • Storage partitions • Disk groups and virtual disks • Log i ca l tab—Y ou ca n view the organization of the storage array by virtual disks, disk grou ps, fr ee capacity nod es, and any unconfigur ed capacity for the storage array . • Physical tab—Y ou can view the organization of the storage array by R AID co[...]

  • Página 65

    Configuration: About Y our Storage Array 65 6 Configuration: About Y our Storage Array Out-of-Band and In-Band Management Y ou can manage a storage array in two ways: • Out-of -band management • In-band management Out-of-Band Management In the out-of -band management metho d , data is separate from commands and events. Data travels through the [...]

  • Página 66

    66 Configuration: About Y our Storage Array In-Band Management Using in-band-management, commands, ev ents, and data travel through the host-to-controller interface. Unlike out-of -band management, commands and events are mixed with data. NOTE: For detailed info rmation on settin g up in-band and out-of-band management see the Deployment Guide . Wh[...]

  • Página 67

    Configuration: About Y our Storage Array 67 NOTE: V erify that your host or management station network configuration — including station IP address, subnet ma sk, and default gateway—is correct before adding a new storage array using the Automatic option. NOTE: For Linux, set the default gateway so that broadcast packets are sent to 255.255.255[...]

  • Página 68

    68 Configuration: About Y our Storage Array • In-band management —Enter a name or an IP ad dress for the Host through which the storage array is attached to the network. NOTE: When adding a storage array using in-band management with iSCSI, a session must first be established between the initiator on the host server and the storage array . For [...]

  • Página 69

    Configuration: About Y our Storage Array 69 • Configure iSCSI host ports—Configure network parameters for each iSCSI host port automatically or spec ify the configuration information for each iSCSI host port. • Configure the storage array—Cr eate disk groups, virtual disks, and hot spare physical disks by using the Au tomatic configuration [...]

  • Página 70

    70 Configuration: About Y our Storage Array Locating Storag e Array s Y ou can use the Blink option to physically locate and identify a storage array . NOTE: If the LEDs from the Blink Storage Array operation do not stop b linking, select Stop All Indications to stop the process manually . T o locate the storage array : 1 Select the relevant storag[...]

  • Página 71

    Configuration: About Y our Storage Array 71 The Name/Rename Storage Arrays dialog appears. 2 Select the relevant storage array from the Select storage array table. If you do not know the name or physical location of the storage array , click Blink . After locating the storage array , click OK to turn off the LEDs. The name of the storage array appe[...]

  • Página 72

    72 Configuration: About Y our Storage Array • Select the Setup tab, and then click Set a Storage Array P assword . • In the AMW , select the Log i ca l tab, right-cl ick and select Set Pa s s w o r d . The Set P assword dialog appears. 3 If you are r esetting the password, type the Current password . NOTE: If you are setting the password for th[...]

  • Página 73

    Configuration: About Y our Storage Array 73 Vi ewing Storage Array Conn ections Y ou can use the V iew Connections option to view the expansion enclosures connected to the R AID controller module. T o view the storage array connections: 1 F rom the toolbar in AMW , select Storage Array  Vi e w  Connections . The <Storage Array>:Connecti[...]

  • Página 74

    74 Configuration: About Y our Storage Array Removing Storage Array s Y ou can remove a storage array from th e list of manage d arrays if you no longer want to manage it from a sp ecific storage management station. Removing a s torage array do es not affect the storage array or its data in any way . Removing a sto rage array simply r emo ves it fro[...]

  • Página 75

    Configuration: About Y our Storage Array 75 Displaying Failover Alert Y ou can change the failover alert delay for a storage array . The fa ilover alert delay lets you delay the logging of a cr itical event if the multi-path driver transfers virtual disks to the non-preferr e d controller . If the multi-path driver transfers the virtual disks back [...]

  • Página 76

    76 Configuration: About Y our Storage Array Changing Expansion Enclosure ID Numbers When an MD1200 series ex pansion enclosure is connected to an MD3600i Series storage array for the first time, an en cl os ure ID n um be r i s as si gn ed a nd maintained by the expansion enclosure. This enclosur e ID number is also shown in the MDSM and can be cha[...]

  • Página 77

    Configuration: About Y our Storage Array 77 Configuring Alert Notifications MDSM can send an alert for an y conditio n on the storage array that requir es your attention. Alerts can be sent as e-mail messages or as Simple Network Management P rotocol (SNMP) trap messages. Y ou can configure alert notifications either for all the storage arrays or a[...]

  • Página 78

    78 Configuration: About Y our Storage Array • All storage arrays —Select this option to se nd an e-mail alert about events on all storage arrays. • An individual storage array —Select this option to send an e-mail alert about events that occur on on ly a specified storage array . These results occur , depending on your sele ction: • If yo[...]

  • Página 79

    Configuration: About Y our Storage Array 79 • V alidating an e-mail address—T ype the e-mail address in Email address or select the e-mail address in the Configured email addresses area, and click Te s t . A test e-mail is sent to the selected e-mail address. A dialog with the results of the test and any error appears. 8 F or the selected e-mai[...]

  • Página 80

    80 Configuration: About Y our Storage Array Configuring SNMP Alerts T o add a management console to th e list of addresses configured to receive SNMP alerts: 1 Open the Configure Alerts dialog by performing one of these actions: • In the T ree view or the T able view on the Devices tab in the EMW , select a node, and select Edit  Configure Ale[...]

  • Página 81

    Configuration: About Y our Storage Array 81 • Deleting an SNMP addr ess—Sele ct the SNMP address in the Configured SNMP addresses area, and click Delete . • V alidating an SNMP address—Select the SNMP address in the Configured SNMP addresses are a, and click Te s t . A test message is sent to the SNMP address. A mess age box with the r esul[...]

  • Página 82

    82 Configuration: About Y our Storage Array Use the following guidelines to adjust the interval: • Y ou can use the default interval. • Y ou can run a learn cycle at any time. • Y ou can set the learn cycle earlier than the currently scheduled time. • Y ou cannot set the learn cycle to star t more than seven days later than the currently sc[...]

  • Página 83

    Configuration: Using iSCSI 83 7 Configuration: Using iSCSI Changing the iSCSI T arget Authentication T o change the iSCSI ta rget authentication: 1 In the AMW , select the Setup tab. 2 Select Manage iSCSI Setti ngs . The Manage iSCSI Settings window is displa yed and by def ault, the T arget Authentication tab is selected. T o ch ange the authentic[...]

  • Página 84

    84 Configuration: Using iSCSI Entering Mutual Authentication Permissions Mutual authentication or two-way authen t ication is a way for a client or a user to verify themselves to a host serv er , and for the host server to validate itself to the user . This validation is accompli shed in such a way that both parties are sur e of the ot her ’s ide[...]

  • Página 85

    Configuration: Using iSCSI 85 Initiator CHAP Secret The initiator CHAP se cret is set on the host using the iSCSI initiator configuration program provided with th e host operatin g system. If you are using the mutual authentication meth od, you must define the initiator CHAP secret when you set up the host. This must be the same CHAP secret that is[...]

  • Página 86

    86 Configuration: Using iSCSI Changing the iSCSI T arget Identification Y ou cannot change the iSCSI tar get name, but you can associate an alias with the targ et for simpler identification. Aliases are useful because the iSCSI target names are not intuitive. Y ou should provide an iSCS I target alias that is meaningful and easy to remember . T o c[...]

  • Página 87

    Configuration: Using iSCSI 87 • Select Specify Configuration , and type the IPv4 address to activate the target discovery . • T ype the iSNS server IP address in the IPv6 settings area to activate the target discovery . After you manually enter an IP addr ess, you can also click Advanced to configure the customized T CP listening ports. If you [...]

  • Página 88

    88 Configuration: Using iSCSI 4 In the Configured Ethernet port speed list, select a network speed for the iSCSI host port. The network speed values in the Configured Ethernet port speed list depend on the maximum speed that the network can support. Only the network speeds that are supported ar e displayed. All of the host ports on a single co ntro[...]

  • Página 89

    Configuration: Using iSCSI 89 Advanced iSCSI Host Ports Settings NOTE: Configuring the advanced iSCSI hos t ports settings is optional. Use the advanced settings for the indivi dual iSCSI host ports to specify the TCP frame size, the virtual LA N, and the network priority . NOTE: Changing any of these settings resets the iSCSI port. I/O is interrup[...]

  • Página 90

    90 Configuration: Using iSCSI Vi ewing or Ending an iSCSI Session Y ou might want to end an iSCSI session for the following reason s: • Unauthorized access—If an initiator is logged on whom you consider to not have access, you can end the iSCSI session. End ing the iSCSI session forces the initiator to log off the stor age array . The initiator[...]

  • Página 91

    Configuration: Using iSCSI 91 V iewing iSCSI Statistics and Setting Baseline Statistics T o view iSCS I statistics an d set baseline statistics: 1 In the AMW toolbar , select Storage Array  iSCSI  Statistics . The Vi e w i S C S I S t a t i s t i c s window is displayed. 2 Select the iSCSI statistic type you want to view in the iSCSI Stat ist[...]

  • Página 92

    92 Configuration: Using iSCSI Edit, Remove, or Rename Host T opology If you give access to the wrong host or the wrong host group, you can r emove or edit the host topology . F ollow the appropriate procedures given in T able 7-3 to corr ect the host topology : F or more informatio n about Host , Host Groups, and Host T opology , refer to "Con[...]

  • Página 93

    Configuration: Event Monitor 93 8 Configuration: Event Monitor An event monitor is provided with De ll P owerV ault Modular Disk Storage Manager (MDSM). The event monitor runs continuous ly in the background and monitors activity on the managed storage arrays. If the event monitor detects any crit ical problems, it can notify a host or r emote syst[...]

  • Página 94

    94 Configuration: Event Monitor Enabling or Disabli ng the Event Monitor Y ou can enable or dis able the eve nt monitor at any time. Disable the event monitor if you do not want the system to send alert notifications. If you are running the event monitor on multiple systems, disabling the event monitor on all but one system pr events the s ending o[...]

  • Página 95

    Configuration: About Y our Host 95 9 Configuration: About Y our Host Configuring Host Access Dell P owerV ault Modular Disk Stor age Mana ger (MDSM) software is comprised of multiple modules. One of these modules is the Host Context Agent, which is installed as pa rt of the MDSM instal lation and runs continuously in the background. If the Host Con[...]

  • Página 96

    96 Configuration: About Y our Host The host topology is re configurable. Y ou can perf orm the following tasks: • Create a host and assign an alias or user label. • Add or associate a new h ost port identifier to a particul ar host. • Change the host port ide ntifier alias or user label. • Move or associate a host port identifier to a diffe[...]

  • Página 97

    Configuration: About Y our Host 97 Defining a Host Y ou can use the Define Host W izar d in the AMW to define a host for a storage array . Eithe r a known unassoci at ed host port identifier or a new host port identifier can be added. NOTE: A user label must be specified before the host port identifier may be added (the add button is disabled until[...]

  • Página 98

    98 Configuration: About Y our Host 7 In Host type, select the relevant operating system for the host. The Host Group Question window is disp layed. 8 In this window , you can select: • Ye s —this host shares access to the same virtual disks with other hosts. • No —this host does NOT share access to the same virtual disks with other hosts. 9[...]

  • Página 99

    Configuration: About Y our Host 99 Managing Host Groups A host group is a logical enti ty of two or mor e hosts that shar e access to specific virtual disks on th e storage array . Y ou cr eate host groups with MDSM. All hosts in a host group must have the same ho st type (operating system). In addition, all hosts in the host group mu st have speci[...]

  • Página 100

    100 Configuration: About Y our Host Removing a Host From a Host Group Y ou can remove a host from the To p o l o g y pane on the Mappings tab of the Array Management W indow . F or mor e information, see "Removing a Host Group" on page 101. Moving a Host to a Different Host Group T o move a host to a different host group: 1 In the AMW , s[...]

  • Página 101

    Configuration: About Y our Host 101 Removing a Host Group T o remove a host group: 1 In the AMW , select the Mappings tab, select the hos t node in the To p o l o g y pane. 2 P erform one of these actions: • Select Mappings  Rem o v e . • Right-click the host node, a nd select Rem o v e from the pop-up menu. The Rem ov e dialog appears. 3 Cl[...]

  • Página 102

    102 Configuration: About Y our Host Starting or Stopping the Host Contex t Agent The Host Context Agent discovers the host topology . The Host Context Agent starts and stops with the host. T he topolog y discover ed by the Host Context Agent can be viewed by clicking Configure Host Access (Automat ic) in the Configure tab in the MDSM. Y ou must sto[...]

  • Página 103

    Configuration: About Y our Host 103 I/O Data Path Protection Y ou can have multiple host -to- array connect ions for a host. Ensure that you select all the connections to the arra y when configuring host access to the storage array . NOTE: See the Deployment Guide for more information on cabling configurations. NOTE: For more information on configu[...]

  • Página 104

    104 Configuration: About Y our Host Managing Host Port Identifiers Y ou can manage the host port iden tifiers that are added to the storage array . Y ou can: • Add—Add or associa te a new host port iden tifier to a particular host. • Edit—Change the host po rt identifier alias or user label. Y ou can move (associate) the host port identifie[...]

  • Página 105

    Configuration: About Y our Host 105 5 Select the method to add a host port iden tifier to the host. Y ou can select: • Add by selecting a known unassociated host port identifier —Select the appropriate host port identifier from the existing list of Known unassociated host port identifiers . • Add by creating a new host port identifier —In N[...]

  • Página 106

    106 Configuration: About Y our Host book.book Page 106 Thursd ay, December 9, 2010 3:20 PM[...]

  • Página 107

    Configuration: Disk Groups and Virtual Disks 107 10 Configuration: Disk Groups and V irtual Disks Creating Disk Groups and V irtual Disks Disk groups ar e cr eated in the unconfig ur ed capacity of a storage array , and virtual disks ar e created in the fr ee ca pacity of a disk group. The maximum number of physical disks supported in a disk group [...]

  • Página 108

    108 Configuration: Disk Groups and V irtual Disks A disk group should be organized according to its related tasks and subtasks. F or example, if you create a disk gr oup for the Accounting Department, you can create virtual disks that matc h the differ ent types of accounting performed in the department: Accounts Receivable (AR), Accounts P ayable [...]

  • Página 109

    Configuration: Disk Gr oups and V irtual Disks 109 3 T ype u p to 30-character name of th e disk group in Disk group name . 4 Select the appropriate Physical Disk selection choices , you can select: • Automati c , see step 6 • Manual , see step 9 5 Click Next . 6 F or automatic configuration, the RAI D L e v e l an d C ap a c it y window is dis[...]

  • Página 110

    110 Configuration: Disk Groups and V irtual Disks Locating a Disk Group Y ou can physically locate and identify al l of the physical disks that comprise a selected dis k group. An LED bl inks on each physical disk in the disk group. T o locate a disk group: 1 In the AMW , select the Log i ca l tab. 2 Select the appropriate disk grou p and from the [...]

  • Página 111

    Configuration: Disk Gr oups and V irtual Disks 111 T o create virtual disks: 1 Choose one of these methods to start the Create Virtual Disk W izard: • T o cr eate a virtual disk from unconfigured capacity in the storage array—On the Log i c al tab, select an Unconfigured Capacity node, and select Vi r t u a l D i s k  Create . Alternatively [...]

  • Página 112

    112 Configuration: Disk Groups and V irtual Disks 5 In Advanced virtual disk param eters , you can select: • Use recommended settings . • Customize settings . 6 If you sel ect Use recommended settings in Advanced vir tual disk parameters , click Fi n i s h . Otherwise, click Next . 7 In the Customize Advanced V irtual Disk P arameters window , [...]

  • Página 113

    Configuration: Disk Gr oups and V irtual Disks 113 4 Select one or more virtual disks. Move the Select modification priority slider bar to the desir ed priority . NOTE: T o select nonadjacent virtual disks, press <Ctrl> click. T o select adjacent virtual disks, pres s <Shift> click. T o select all of the available virtual disks, click S[...]

  • Página 114

    114 Configuration: Disk Groups and V irtual Disks T o select nona djacent virtual disks, press <Ctrl> click. T o select adjacent virtual disks, press <Shift> click. T o select all of the available virtual disks , click Select All . 4 In the Select cache properties area, you can select: • Enable read caching —to enable read caching. [...]

  • Página 115

    Configuration: Disk Gr oups and V irtual Disks 115 Changing the Se gment Size of a V irtual Disk Y ou can change the segment size on a selected virtual disk. During this operation, I/O performance is affect ed, but your da ta remains available . Guidelines to procee d with changing the segment siz e: • Y ou cannot cancel this opera tion after it [...]

  • Página 116

    116 Configuration: Disk Groups and V irtual Disks The segment size modification ope ration begins. The virtual disk icon in the Lo gical pane shows an Operation in Progress status while the operation is taking place. NOTE: T o view the progress or change the prio rity of the modification operation, select a virtual disk in the disk group, and selec[...]

  • Página 117

    Configuration: Disk Gr oups and V irtual Disks 117 The corresponding dy namic cache read pr efetch setting a nd segment size values that are typically well suited for t he selected virtual disk I/O characteristic type are populated in the Dynamic cache read pr efetch and Segment size fields. NOTE: If you selected the Custom option, select your pref[...]

  • Página 118

    118 Configuration: Disk Groups and V irtual Disks All of the physical disks an d R AID contro ller modules in a storage array share the same security key . The shar ed securi ty key provides r ead and write access to the physical disks, while the physical disk encryption key on each phys ical disk is used to encrypt the data. A securi ty capable ph[...]

  • Página 119

    Configuration: Disk Gr oups and V irtual Disks 119 •S a v e S e c u r i t y K e y F i l e • V alidate Security K ey •U n l o c k D r i v e s NOTE: If you have not created a security key for the storage array , the Create Security Key option is active. If you have creat ed a security key for the storage array , the Create Security Key option i[...]

  • Página 120

    120 Configuration: Disk Groups and V irtual Disks The storage array password protects a storage array from potentially destructive operations by unauthorized users. The storage a rray password is independent from self encrypting disk, and should not be confused with the pass phrase that is used to protect copies of a security ke y . However , it is[...]

  • Página 121

    Configuration: Disk Gr oups and V irtual Disks 121 4 In New password , enter a string for the storage array password. If you are creating the storage array password for the first time, leave Current password blank. F ollow these guidelines for cryptographic strength when you create the storage array passwor d: • The passwor d should be between ei[...]

  • Página 122

    122 Configuration: Disk Groups and V irtual Disks The pass phrase that you enter is mask ed. NOTE: Create Key is active only if the pass phrase meets the above mentioned criterion. 9 In the Confirm pass phrase dialog box, re-enter the ex act string that you entered in the P ass phrase dialog box. Ma ke a rec o rd of t h e p a ss p hr a se t h at yo[...]

  • Página 123

    Configuration: Disk Gr oups and V irtual Disks 123 for storage on other media. When you ch ange a security ke y , you also provide information to create a security k ey iden tifier . Changing the security key does not destroy any data. Y ou can change the securi ty key at any tim e. Before you change the security ke y , ensure that: • All virtual[...]

  • Página 124

    124 Configuration: Disk Groups and V irtual Disks 6 In Confirm pass phrase , re-ent er the exact string you enter ed in Pa s s phrase . Ma ke a rec o rd of t h e p a ss p hr a se you entered and the security key identifier it is associa ted with. Y ou need this information for late r secure operations. 7 Click Change K ey . 8 Make a re cord of the [...]

  • Página 125

    Configuration: Disk Gr oups and V irtual Disks 125 4 In Confirm pass phrase , re-enter the e xact string you enter ed in Pa s s phrase . Make a r ecord of the pass phrase you entered. Y ou need it for later secure operations. 5 Click Save . 6 Make a r ecord of the security k ey identifier and the file name from the Save Security Key Complete dialog[...]

  • Página 126

    126 Configuration: Disk Groups and V irtual Disks Erasing Secure Phy sical Disks In the AMW , when you select a security enabled physical disk that is not part of a disk group, the Secure Erase menu item i s enabled on th e Physical Disk menu. Y ou can use the secure erase proc edure to r e-provision a physical disk. Y ou can use the Secure Erase o[...]

  • Página 127

    Configuration: Disk Gr oups and V irtual Disks 127 • The availability of en closure loss protection for a disk group depends on the location of the physical disks that comprise the disk gr oup. T o make sure that enclosur e loss protection is not affected, you must replace a failed physical disk to ini tiate the copyback process. See "Enclos[...]

  • Página 128

    128 Configuration: Disk Groups and V irtual Disks 8 Select the relevant Physical disks in the Unassigned physical disks area, as hot spares for the selected disk and click OK . 9 T o unassign ho t spares, in the Hot Spare Coverage window , select physical disks in the Hot spare physical disks area. 10 Review the information about the hot spare cove[...]

  • Página 129

    Configuration: Disk Gr oups and V irtual Disks 129 Hot Spare Operation When a physical disk fails, the virt ua l disk automatically rebuilds using an available hot spar e. When a r eplacement phys ical disk is install ed, data from the hot spare is copied back to the repl acement physical disk. This function is called copy back. By default, the RA [...]

  • Página 130

    130 Configuration: Disk Groups and V irtual Disks hot spare physical disk. T o make sure that encl osure lo ss protection is not affected, you must replace a failed phy sical disk to initiate the copyback process . The virtual disk remains online and accessible while you are r eplacing the failed physical disk, beca use the hot spare physical disk [...]

  • Página 131

    Configuration: Disk Gr oups and V irtual Disks 131 Host-to-V irtual Disk Mapping After you create virtual di sks, you must map them to the host(s) connected to the array . Guidelines to configure ho st-to-virtual disk mapping: • Each virtual disk in the storage array can be mapped to only one host or host group. • Host-to-virtual disk mappings [...]

  • Página 132

    132 Configuration: Disk Groups and V irtual Disks • Each host has its ow n L UN address space. MDSM permits the same LUN to be used by diff erent hosts or host groups to access virtu al disks in a storage array . • Not every operating system has the same number of L UNs available. • Y ou can define the mappings on the Mappings tab in the Arra[...]

  • Página 133

    Configuration: Disk Gr oups and V irtual Disks 133 4 In Host group or host , select the appropriate host group or host. All defined hosts, host groups, and the default group app ear in the list. NOTE: When configuring an iSCSI storage a rray , including the MD3600i or MD3620i, if a host or a host group is selected t hat does not have a SAS host bus[...]

  • Página 134

    134 Configuration: Disk Groups and V irtual Disks • Right-click the virtual disk, and select Change Mapping from the pop-up menu. 3 In Host group or host , select the appropriate host group or host. By default, the drop -dow n list shows the cu rrent host grou p or the host associated with the selected virtual disk. 4 In Log i c al u ni t nu m be[...]

  • Página 135

    Configuration: Disk Gr oups and V irtual Disks 135 During a virtual disk copy , the same R A ID controller module must own both the source virtual disk and the tar get virtual disk . Sometimes both virtual disks do not have the same pr eferr e d R AID controller module when the virtual disk copy starts. Ther efor e, the ownership of the tar get vir[...]

  • Página 136

    136 Configuration: Disk Groups and V irtual Disks associated source vi rtual disk. Chan ging the R AID controller module ownership of a virtual disk changes th e preferred R AID controller module ownership of the virtual disk. During a virtual disk copy , the same RAID controlle r module must own both the source virtual disk and the target virtual [...]

  • Página 137

    Configuration: Disk Gr oups and V irtual Disks 137 Changing the RAID Level of a Disk Grou p Changing the R AID level of a disk group changes the R AID levels of ever y virtual disk that comprises the disk group. P erformance might be slightly affected during the operation. Guidelines to change the R AID level of a disk group: • Y ou cannot cancel[...]

  • Página 138

    138 Configuration: Disk Groups and V irtual Disks Guidelines when you work with host types with L UN mapping restrictions: • Y ou cannot change a host adapter port to a restricted host type if there are already mappings in the storage part ition that would ex ceed the limit imposed by the restricted host type. • Consider the case of the Default[...]

  • Página 139

    Configuration: Disk Gr oups and V irtual Disks 139 Changing the RAID Controller Mod ule Ownership of a Virtu al Disk or a Disk Group Y ou can change the R AID controller modu le ownership of a virtual disk or a disk group. Y ou can change the RAID control ler mo dule ownership of a standard virtual disk or a snapshot r epository virtual disk. Y ou [...]

  • Página 140

    140 Configuration: Disk Groups and V irtual Disks d Select the R AID co ntroller modul e. CAUTION: Possible loss of data access—If you do not use a multi-path driver , shut down any host applications that are currently using the virtual disk. This action prevents application erro rs when the I/O path changes. e Click Ye s . The ownership of the v[...]

  • Página 141

    Configuration: Disk Gr oups and V irtual Disks 141 Changing the RAID Level of a Disk Group Use the Change  RA I D L ev e l option to change the R AID level on a selected disk group. Using this op tion changes the RAID leve ls of every virtual disk that comprises the disk group. P erforma nce might be slightly affected during the operation. Keep [...]

  • Página 142

    142 Configuration: Disk Groups and V irtual Disks When you choose this type of configur ation, all of the hosts must have the same operatin g system and spe cial softwa r e (such as clustering softwar e) to manage virtual disk sharing and accessib ility . More than one storage partition is r equired if: • Specific hosts must ac cess specific virt[...]

  • Página 143

    Configuration: Disk Gr oups and V irtual Disks 143 Storage partitioning topology is the co llection of elements, such as Default Group, host groups, hosts, and host ports shown as nodes in the T opology pane of the Mappings tab in the AMW . F or mor e information, see "Using the Mappings T ab" on page 96. If a storage partitioning topolog[...]

  • Página 144

    144 Configuration: Disk Groups and V irtual Disks Y ou can also use the Command Line Interface (CLI) on both W indows and Linux hosts to add free capacity to a disk group. Se e the CLI Guid e for mor e information. After the capacity expansion is completed, additional fr ee capacit y is available in the disk group for cr eation of new virtual disks[...]

  • Página 145

    Configuration: Disk Gr oups and V irtual Disks 145 Disk Group Migration Disk group migration allows to you e xport a disk grou p so that you can import the disk group to a different storage arra y . Y o u can also export a disk group so that you can sto re the data offline. NOTE: During the export process (before the di sk group is imported) you lo[...]

  • Página 146

    146 Configuration: Disk Groups and V irtual Disks 4 Locate the disk group, and label the physical disks. 5 Place the disk group offline. 6 Obtain blank ph ysical disk modu les or new physical dis ks. On the target storage array : 1 V erify that the target storage array has available physical disk slots. 2 V erify that the target storage array suppo[...]

  • Página 147

    Configuration: Disk Gr oups and V irtual Disks 147 The following settings are remove d/cleared during the procedur e: • P ersistent reservations • Host-to-virtual disk mappings • Virtual disk copy pairs • Snapshot virtual disks and snapshot repository virtual disks • Remote mirror pairs • Mirror repositories Non-Importable Components So[...]

  • Página 148

    148 Configuration: Disk Groups and V irtual Disks • Redundancy mismatches error—The fi rst 10 redundancy mismatches that are found on the virtual disk are r eported to the event log. • Unfixable error—Data could not be read and parity or r edundancy information could not be used to r egenerate the data. F or example, redundancy information [...]

  • Página 149

    Configuration: Disk Gr oups and V irtual Disks 149 Suspending the Media Scan Y ou cannot perform a m edia scan whil e performing another long-running operation on the disk drive such as reconstruction, copy-back, reconfig uration, virtual disk initialization, or i mmediate availability formatting. If you want to perform anoth er long -running opera[...]

  • Página 150

    150 Configuration: Disk Groups and V irtual Disks book.book Page 150 Thursd ay, December 9, 2010 3:20 PM[...]

  • Página 151

    Configuration: Premium Featur e—Snapshot V irtual Disks 151 11 Configuration: Premium Feature— Snapshot V irtual Disks NOTE: If you ordered this featur e, you recei ved a Premium Feature Activation card shipped in the same box as your Dell PowerVault MD storage array . Follow the directions on the card to obtain a key file and to enable the fea[...]

  • Página 152

    152 Configuration: Premium F eature—Snapshot V irtual Disks repository uses less disk space than a full physical copy , because the only data blocks that ar e stor ed in the snapshot r epository virtua l disk are those that have changed since th e time of the snapshot. When you create a snapshot virtual di sk, you specify its location, capacity ,[...]

  • Página 153

    Configuration: Premium Featur e—Snapshot V irtual Disks 153 Creating a Snapshot V irt ual Disk Using the Simple Path Y ou can choose the simple path to create a snapshot virtual disk if the disk group of the source virtual disk has th e required amount of free space. A snapshot repository virtual disk r equires a minimum of 8 MB free capacity . T[...]

  • Página 154

    154 Configuration: Premium F eature—Snapshot V irtual Disks • P ercent F ull—When the snapshot repository virtual disk reaches the specified repository full percentage le vel, the event is logged in the Major Event Log (MEL). Th e default sna pshot repository full percentage level is 50 percent of the source vi rtual disk. • Snapshot Reposi[...]

  • Página 155

    Configuration: Premium Featur e—Snapshot V irtual Disks 155 NOTE: Before you create a new snapshot of a source virtual disk, stop any data access (I/O) activity or suspend data transfer to the source virtual disk to ensu re that you capture an accurate snapshot of the source virtual disk. Close all applications, including Windows Internet Explore[...]

  • Página 156

    156 Configuration: Premium F eature—Snapshot V irtual Disks 9 In the AMW , select the Mappings tab, assign mappings between the snapshot virtual disk and the host that accesses the snapshot virtual disk. NOTE: In some cases, conflicts might result from mapping the same host to both a source virtual disk and its ass ociated snapshot vi rtual disk.[...]

  • Página 157

    Configuration: Premium Featur e—Snapshot V irtual Disks 157 – Use fr ee capacity on the same disk group where the source virtual disk resides. – Use fr ee capacity on another disk group. – Use unconfigur ed capacity and create a new disk group for the snapshot repository virtual disk. – It is r ecommended placing the snapsh ot repository [...]

  • Página 158

    158 Configuration: Premium F eature—Snapshot V irtual Disks The destination of a snapshot repository virtual disk is determined based on the fr ee capacity avail able in the disk gr oup. A snapshot repository virtual disk requir es a minimum of 8 MB fr ee capa city . Y ou can choose your preferr ed creation path—simple or advanced—if th e dis[...]

  • Página 159

    Configuration: Premium Featur e—Snapshot V irtual Disks 159 Before creating a snapshot virtual disk, the host server must be in the proper state. T o prepare your host server : 1 Stop all I/O activity to the source. 2 Using your W indows system, flush the cache to the source. At the host prompt, type SMrepassist -f <filename-identifier> and[...]

  • Página 160

    160 Configuration: Premium F eature—Snapshot V irtual Disks Creating the Snapsho t Using the Advanced Pa th NOTE: Removing the drive letter of the as sociated virtual disk in Windows or unmounting the virtual drive in Linux helps to guarantee a stable copy of the drive for the Snapshot. After first pr eparing the host server (s) as specified in t[...]

  • Página 161

    Configuration: Premium Featur e—Snapshot V irtual Disks 161 9 In the Snapshot repository virtual disk parameters ar ea, ent er the sy stem behavior when: • The snapshot repository virtual disk is full to the selected percentage level. • The snapshot repository virtual disk is full. 10 Click Next . The Pr e v i e w window containing the summar[...]

  • Página 162

    162 Configuration: Premium F eature—Snapshot V irtual Disks F or e xample, if you a re cr eating the fi rst snapshot virtual disk for a source virtual disk called Accounting, the default snapsho t virtual disk is Accounting-1, and the associa ted snapsh ot repository virtual disk default name is Accounting-R1. The default name of the next snapsho[...]

  • Página 163

    Configuration: Premium Featur e—Snapshot V irtual Disks 163 Snapshot Repository Capacity If you r eceive a war ning that the capa ci ty for the snapshot reposit ory virtual disk is approaching its threshold, you ca n increase the capacity of a snapshot repository virtual di sk by using one of the following methods: • Use the free capacity avail[...]

  • Página 164

    164 Configuration: Premium F eature—Snapshot V irtual Disks capacity is available, the maximum free space appears in the Increase capacity by . If free capacity does not e xist on the disk group, the free space that appears in the Increase capacity by spinner box is 0. Y ou must add physical disks to create free capacity on the disk group. 4 T o [...]

  • Página 165

    Configuration: Premium Featur e—Snapshot V irtual Disks 165 NOTE: The phy sical disks that appear have a capacity that is either the same size or larger than the capa city of t he phy sical disks already being used by the disk group. 9 Select either a single physical disk to add or two physical disks to add. 10 Click Add . The Add Physical Disks [...]

  • Página 166

    166 Configuration: Premium F eature—Snapshot V irtual Disks Re-Creating Snapshot V irtual Disks Y ou can re-create a snapshot virtual disk that you have previously disabled. CAUTION: Possible loss of data redundancy — If the snapshot virtual disk is in Optimal status, it is first disabled p rior to being re-created. This action invalidates the [...]

  • Página 167

    Configuration: Premium Featur e—Snapshot V irtual Disks 167 NOTE: If you do not intend to re-create the snaps hot virtual disk at a later time, in the Logical pane, select the s napshot virtual disk, and select Virtual Disk  Delete to remove it. The associated snapshot repositor y virtual disk is also removed. Refer to the PowerV ault Modul[...]

  • Página 168

    168 Configuration: Premium F eature—Snapshot V irtual Disks 3 Click the Summary tab, then click Disk Groups & V irtual Disks to ensure that the snapshot virtual disk is in Optimal or Disabled status. 4 Remove the drive letter(s) of the source and (if mounted) snapshot virtual disk in W indows or unmount the virtual drive(s) in Linux to help g[...]

  • Página 169

    Configuration: Premium Feature—V irtual Disk Copy 169 12 Configuration: Premium Feature— V irtual Disk Copy NOTE: A virtual disk copy overwrit es data on the target virtual disk. Before starting a virtual disk copy , ensure that you no longer need the data or back up the data on the target virtual disk. NOTE: If you ordered this featur e, you r[...]

  • Página 170

    170 Configuration: Premium F eature—V irtual Disk Copy Reasons to use virtual disk copy include: • Copying data for improved access—As your storage requirements for a virtual disk change, you can use a virtual disk copy to copy data to a virtual disk in a disk group that uses drives with larger capacity within the same storage array . Copying[...]

  • Página 171

    Configuration: Premium Feature—V irtual Disk Copy 171 V irtual Disk Read/Write Permissions After the virtual disk copy is complete , the tar get virtual disk automatically be co m es rea d- o nl y t o th e h os t s. Th e t arg e t v ir t ua l d is k re j ec ts rea d an d w ri t e requests whil e the virtual disk copy op eration has a status of P [...]

  • Página 172

    172 Configuration: Premium F eature—V irtual Disk Copy Vi rtual Disk Copy Restrictions Before y ou perform any virtual disk copy tasks, understand and adher e to the restrictions listed in this section. The r estrictions apply to the source virtual disk, the target virtual disk, and the storage array . • While a virtual disk copy has a status o[...]

  • Página 173

    Configuration: Premium Feature—V irtual Disk Copy 173 journaling file sy stem , any attempt to issue a read request to the source virtual disk might be rejected by the storage array , and an error message might appear . The journaling file sy st em driver issues a write req uest before it attempts to issu e the read request. The storage array rej[...]

  • Página 174

    174 Configuration: Premium F eature—V irtual Disk Copy Create Copy Wizard The Create Cop y Wizard guides you th rough: 1 Selecting a source virtual disk from a list of available virtual disks 2 Selecting a target virtual disk from a list of available virtual disks 3 Setting the copy priority for the virtual disk copy When you have completed the w[...]

  • Página 175

    Configuration: Premium Feature—V irtual Disk Copy 175 Failed RAID Controller Module Y ou must manually change RAID cont roller module ownership to the alternate RAID controller mo dule to allow t he virtual disk copy to complete under all of these conditions: • A virtual disk copy has a status of In Progr ess. • The preferred R AID controller[...]

  • Página 176

    176 Configuration: Premium F eature—V irtual Disk Copy T o prevent write-protected error messa ges from appearing, do not try to access a source virtual disk that is participating in a virt ual disk copy while the virtual disk copy has a status of In Progr ess. Also , make sur e that the Read- Only attribute for the tar get virtual disk is disabl[...]

  • Página 177

    Configuration: Premium Feature—V irtual Disk Copy 177 Storage Array Performanc e During Virtual Disk Copy The following factors contribute to th e overall performance of the storage array : • I/O activity • Virtual disk R AID level • Virtual disk configuration—Number of drives in the virtual disk group s • Virtual disk type—Snapshot v[...]

  • Página 178

    178 Configuration: Premium F eature—V irtual Disk Copy 3 Select Change  Copy P riority . The Change Copy P riority window is displayed. 4 In the Copy Pr iority area, select the appropriate copy priority , depending on your system performance need s. NOTE: There are 5 copy priority rates avai lable: lowest, low , me dium, high, and highest. If [...]

  • Página 179

    Configuration: Premium Feature—V irtual Disk Copy 179 Recopying a Vi rtual Disk Y ou can recopy a virtual disk when you have stopped a virtual disk copy and you want to start it again or when a virtual disk copy has failed. The Recopy option overwrites e xisting data on the tar get virtual disk and makes the tar get virtual disk r ead-only to hos[...]

  • Página 180

    180 Configuration: Premium F eature—V irtual Disk Copy 4 Remove the drive letter(s) of the source and (if mounted) virtual disk in W indows or unmount th e virtual drive(s) in Linux to help guarantee a stable copy of the drive f or the virtual disk. If this i s not done, the copy operation reports that it has completed successfully , but the copi[...]

  • Página 181

    Configuration: Premium Feature—V irtual Disk Copy 181 5 Select Copy  Re- Co py . The Re- Co py window is displayed. 6 Set the copy priority . NOTE: There are five copy priority rates avai lable: lowest, low , medium, high, and highest. If the copy prio rity is set at the lowest rate, I/O activity is prioritized, and the virtual disk copy takes[...]

  • Página 182

    182 Configuration: Premium F eature—V irtual Disk Copy book.book Page 182 Thursd ay, December 9, 2010 3:20 PM[...]

  • Página 183

    Configuration: Premium Feature—U pgrading to High-Performance-T ier 183 13 Configuration: Premium Feature— Upgrading to High-Performance- Ti e r The High P erfo rmance Tier pr emium feature on an MD3600i Series array increases the performance of the system beyond that of a M D3600i Series array operating at the standard performance level. If th[...]

  • Página 184

    184 Configuration: Premium Feature—Upgrading to High-Performance-T ier book.book Page 184 Thursd ay, December 9, 2010 3:20 PM[...]

  • Página 185

    Configuration: Device M apper Multipath for Linux 185 14 Configuration: Device Mapper Multipath for Linux Overview The MD3600i Series s torage array uses a Linux operating syste m softwar e framework, k nown as Device Mappe r (DM), to en able multipath capa bilities on Linux Host Servers. The DM multip ath functionality is provided by a combination[...]

  • Página 186

    186 Configuration: Device Mapper Multipath for Linux Using DM Multipathing Devices NOTE: Using or modifying any nodes other than the multipathi ng device nodes can result in array or file sy stem problems, including loss of communication with the array and corruption of the file sy ste m. Avoid accessing any device other than the multipathing devic[...]

  • Página 187

    Configuration: Device M apper Multipath for Linux 187 Using the MDSM software : 1 Map the host server to the MD3600i Series storage array . 2 Create the V irtual Disks. 3 Map newly created arrays to your host server . NOTE: Any array s configured with MDCU automatically get added to the list of Devices in the PowerV ault Modular Disk Storage Manage[...]

  • Página 188

    188 Configuration: Device Mapper Multipath for Linux Scan for Newly Added Virtual Disks The rescan_dm_devs command scans the host server system looking for existing and newly adde d virtual disks mapped to the host server . # rescan_dm_devs If an array virtual disk (VD) is mapped to the host server at a later time the rescan_dm_devices command must[...]

  • Página 189

    Configuration: Device M apper Multipath for Linux 189 The following is an e xample of SLES o utput: mpathb(360080e500017b2f80000c6ca4a1d4ab8) dm-21 DELL,MD32xxi [size=1.0G][features=3 queue_if_no_path pg_init_retries 50][hwhandler=1 rdac][rw] _ round-robin 0 [prio=6][active] _ 4:0:0:22 sdx 65:112 [active][ready] _ round-robin 0 [prio=1][enabled][...]

  • Página 190

    190 Configuration: Device Mapper Multipath for Linux Add a New Partition to Device Mapper The kpartx command adds the new fdisk partition to the Devic e Mapper list of usable partitions. See exampl es below , wher e mpath<x> is the device node on which the partition was cr eated. # kpartx –a /dev/mapper/mpath<x> If successful, the com[...]

  • Página 191

    Configuration: Device M apper Multipath for Linux 191 Create a File Sy stem on a Device Mapper Partition Use the standard mkfs command to create the file system on the newly created Device Mapper partition. Fo r e x a m p l e : # mkfs –t <filesystem type> /dev/mapper/<partition node> where <partition node> is the partition on wh[...]

  • Página 192

    192 Configuration: Device Mapper Multipath for Linux 3 Flush the Device Mapper multipath maps list to remove any old or modified mappings: # multipath –F NOTE: The boot operating sy stem drive may have an entry with the Device Mapper multipathing table. This is not affected by the multipath –F command. However , using #multipath –ll should no[...]

  • Página 193

    Configuration: Device M apper Multipath for Linux 193 Limitations and Known Issues • In certain error conditions with th e no_path_retry or the queue_if_no_path feature is set, applications may hang. T o over come these conditions, enter the following command for each a ffected multipath device: dmsetup message [device] 0 "fail_if_no_path&qu[...]

  • Página 194

    194 Configuration: Device Mapper Multipath for Linux • F ailback can be slow when the host system is experiencing heavy I/O . The problem is exacerbated if the host serv er is also e xperiencing very high CPU utilization. • The Device Mapper Mu ltipath service can be sl ow when the host system is experiencing heavy I/O . The problem is exacerba[...]

  • Página 195

    Configuration: Device M apper Multipath for Linux 195 I remo ved a L UN. But the multipathing mapping is still available. The multipathing device is still available after you rem o ve t he LUN s. Run multipath –f <device node for the delete d LUN> to remove the multipathing mapping. F or example, if a device r elated with /dev/dm-1 is delet[...]

  • Página 196

    196 Configuration: Device Mapper Multipath for Linux book.book Page 196 Thursd ay, December 9, 2010 3:20 PM[...]

  • Página 197

    Management: Firmware Downloads 197 15 Management: Firmware Downloads Downloading RAID Controller and NVSRAM Packages A version number exists for each firm wa re file. The ver s ion number indicates whether the firmware is a major ver sio n or a minor version. Y ou can use the Enterprise Management W indow (EMW) to download and ac tivate both the ma[...]

  • Página 198

    198 Management: Firmware Downloads Downloading Both RAID Controller and NVSRAM Firmware NOTE: I/O to the array can continue while y ou are upgrading RAID controller and NVSRAM firmware. NOTE: It is recommended that the firmwa re and NVSRAM be upgraded during a maintenance period when the array is not being used for I/O. NOTE: The RAID enclosure mus[...]

  • Página 199

    Management: Firmware Downloads 199 7 Click Tr a n s f e r . Keep these guidelines in mind: –I f t h e Tr a n s f e r button is inactive, ensure that you either sele ct an N V S RA M f i l e o r c l e a r t h e T r a n s f e r N V S RA M f i l e w i t h R A I D c o n t r o l l e r module firmware. – I f the file selected is not valid or is not c[...]

  • Página 200

    200 Management: Firmware Downloads 13 Select the file to download. 14 Click OK . 15 If you want to download the NVSR AM file with the R AID control ler module firmware, select Download NVSR AM file with firmware in the Select files are a. An y a tt ri b ute s o f t h e f ir mw are fi le ap pe ar in th e Firm wa re f il e i nf or m at io n area. The[...]

  • Página 201

    Management: Firmware Downloads 201 Downloading Only NVSRAM Firmware Use the com mand line inte rface (CLI ) to download and activate NVSRAM to several storage arrays. F or mor e information, see the P owerV ault Modular Disk Storage Manager online help topics. T o download only NVSRAM firmwar e: 1 T o download th e NVSR AM firmware from: •E M W ?[...]

  • Página 202

    202 Management: Firmware Downloads 7 P erform one of these actions: • Select T ools  Upgrade R AID Controller Module F irmware . • Select the Setup tab, and click Upgrade RA ID Controller Module Fi r m w a r e . The Upgrade R AID Controller Module F irmware window is displa yed. The Storage array pane lists the storage arrays. The Details pa[...]

  • Página 203

    Management: Firmware Downloads 203 13 Click OK . The Confirm Download dialog appears. 14 Click Ye s . The download starts and a pro gress indi cator appears in the Status column of the Upgrade R AID Controller Module F irmware window . Downloading Phy sical Disk Firmware CAUTION: When updatin g phy sical disk firmware , you should stop all I/O acti[...]

  • Página 204

    204 Management: Firmware Downloads • Mak e sure that the firmware that yo u download to the physical disks ar e compatible with the physic al d isks that you select. • Do not make any configuration changes to the storage array while downloading the firmwa re. NOTE: Downloads can take several minutes to complete. During a download, the Download [...]

  • Página 205

    Management: Firmware Downloads 205 Downloading MD1200 Series Expansion Module EMM Firmware NOTE: Do not make any configuration changes to the storage array while you are downloading the expansion enclosure EM M firmware. Doing so could cause the firmware download to fail, damage the storage array , or cause loss of data accessibility . NOTE: Due to[...]

  • Página 206

    206 Management: Firmware Downloads 6 Click Ye s to continue with the firmware download, NOTE: If you click Stop while a firmware download is in progress, the download-in-progress finishes before t he operation stops. The status for the remaining expansion enclosures changes to Canceled . 7 Monitor the progress and completion status of the download [...]

  • Página 207

    Management: Firmware Downloads 207 Media Errors and Unreadable Sectors If the R AID controller detects a medi a error while accessing data from a physical disk that is a member of a disk group with a redundant R AID level (RAID 1, R AID 5 or RAID 10), the contro ller tries to recover the data from peer disks in the disk gr oup and uses recovered da[...]

  • Página 208

    208 Management: Firmware Downloads book.book Page 208 Thursd ay, December 9, 2010 3:20 PM[...]

  • Página 209

    Management: Installing Array Components 209 16 Management: Installing Array Components Recommended T ools Y ou may need the fol lowing items to pe rfor m the procedur es in this section: • Key to the system k eylock •# 2 P h i l l i p s s c r e w d r i v e r •W rist grounding stra p book.book Page 209 Thursd ay, December 9, 2010 3:20 PM[...]

  • Página 210

    210 Management: Installing Array Components Front Bezel (Optional) Removing the Front Bezel 1 Using the system key , unlock the front bezel (if locked). 2 Lift up the release latch next to the k eylock. 3 Rotate the left end of the be zel away from the front panel. 4 Unhook the right end of the bezel and pull the bezel away from the system. Figure [...]

  • Página 211

    Management: Installing Array Components 211 Hard Drives SAFETY : Models AMT , E03J, and E04J Models AMT , E03J, and E04J are intended for installation only in r estricted access locations as defined in cl 1.2.7.3 of IEC 60950-1:2005. Depending on your configur ation, your array either supports up to 24, 2.5- inch SAS hard drives or up to 12, 3.5-in[...]

  • Página 212

    212 Management: Installing Array Components Figure 16-3. Removing and Installi ng a 2.5-Inch Hard-Drive Blank Installing a Drive Blank 1 If installed, remove the front bezel . See "Removing the F ront Bezel" on page 210. 2 Insert the drive blank into the drive bay until the blank is fully seated . 3 Close the handle to lock the blank in p[...]

  • Página 213

    Management: Installing Array Components 213 2 F rom the Modular Disk Storage Manager (MDSM) software, pr epare the drive for re moval. W ait until the hard-drive indicators on the drive carrier signal that the drive can be removed safely . F or more information, see your controller documentation fo r information about hot-swap drive removal. If the[...]

  • Página 214

    214 Management: Installing Array Components Installing a Hard Drive CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou should only perform troubleshooting and simple repairs as authorized in your product documentation, or as dir ected by the online or telephone service and support team. Damage due to servicing that is n[...]

  • Página 215

    Management: Installing Array Components 215 Removing a Hard Drive From a Hard-Drive Carrier Remove the screws from the slide rails on the har d-drive carrier and separate the hard drive from the carrier . See F igur e 16-5 for P owerV ault MD3600i and F igur e 16-6 for P owerV ault MD3620i. Figure 16-5. Removing and Installing a Hard Drive Into a 3[...]

  • Página 216

    216 Management: Installing Array Components Figure 16-6. Removing and Installing a Ha rd Drive Into a 2.5-Inch Drive Carrier 1 screws (4) 2 drive carrier 3 SAS screw hole 4 hard drive 2 1 3 4 book.book Page 216 Thursd ay, December 9, 2010 3:20 PM[...]

  • Página 217

    Management: Installing Array Components 217 Installing a Hard Drive Into a Drive Carrier 1 Insert the hard drive into the har d-d rive carrier with the connector end of the drive at the back. See F igur e 16-5. 2 Align the screw holes on the hard drive with th e back set of holes on the hard-drive carrier . When aligned correctly , the back of the [...]

  • Página 218

    218 Management: Installing Array Components 5 Connect all the power cables to the array . 6 T urn on the array and the host server . Figure 16-7. Removing and Installing a RAID Controller Module Blank Installing a RAID Controller Module Blank T o install a R AID controller module blank, align the blank with the R AID controller module bay and inser[...]

  • Página 219

    Management: Installing Array Components 219 Removing a RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. Y ou should only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team. Damage due to servicing [...]

  • Página 220

    220 Management: Installing Array Components Installing a RAID Controller Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou should only perform troubleshooting and si mple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servici[...]

  • Página 221

    Management: Installing Array Components 221 Figure 16-9. Opening and Closing the RAID Controller Module Closing the RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. Y ou should only perform troubleshooting and simple re pairs as authorized in your product documentation, or as directed by the on line o[...]

  • Página 222

    222 Management: Installing Array Components RAID Controller Module Backup Battery Unit Removing the RAID Controller Module Backup Battery Uni t CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou should only perform troubleshooting and si mple repairs as authorized in your product documentation, or as directed by the onl[...]

  • Página 223

    Management: Installing Array Components 223 Installing the RAID Controller Module Backup Batt ery Unit CAUTION: Many repairs may only be done by a certified service technician. Y ou should only perform troubleshooting and simple re pairs as authorized in your product documentation, or as directed by the on line or telephone service and support team[...]

  • Página 224

    224 Management: Installing Array Components Power Supply/Cooling Fan Module The array supports two hot-swappable power supply/cooling fan modules. While the array can operate temporaril y wit h one module, both the modules must be present for proper system cooling. CAUTION: A single power supply/cooling fan module can be removed from a powered-on a[...]

  • Página 225

    Management: Installing Array Components 225 Figure 16-11. Removing and Installing a Power Supply/Cooling Fan Module 1 release tab 2 power supply 3 power supply handle 1 3 2 book.book Page 225 Thursd ay, December 9, 2010 3:20 PM[...]

  • Página 226

    226 Management: Installing Array Components Installing a Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou should only perform troubleshooting and si mple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due t[...]

  • Página 227

    Management: Installing Array Components 227 Control Panel Removing the Control Panel 1 T u rn off the array and host server . 2 Disconnect all the power cables connected to the array . 3 Remove the hard drives from: – slots 0 to 2 in P owerV ault MD3600i – slots 0 to 5 in P owerV ault MD3620i See "Removing a Hard Drive" on page 212. N[...]

  • Página 228

    228 Management: Installing Array Components Figure 16-14. Removing and Installing t he Control Panel—PowerV ault MD3620i Installing the Contro l Panel 1 Align the control panel with the slot on the array . 2 Slide the control panel into the array until: – The r elease tab clicks into place in P owerV ault MD3600i . See F igure 16-13. – The r [...]

  • Página 229

    Management: Installing Array Components 229 Backplane WAR N IN G: Whenever you need to lift the array , get others to assist you. T o avoid injury , do not attempt to lift the array by yourself. CAUTION: Many repairs may only be done by a certified service technician. Y ou should only perform troubleshooting and simple repairs as authorized in your[...]

  • Página 230

    230 Management: Installing Array Components Figure 16-15. Removing and Installing the RA ID Controller Module /Power Supply Cage 1 RAID controller module /power supply cage 2 screws (6) 1 2 book.book Page 230 Thursd ay, December 9, 2010 3:20 PM[...]

  • Página 231

    Management: Installing Array Components 231 Figure 16-16. Removing and Installing the Backplane—Power V ault MD3600i Figure 16-17. Removing and Installing the Backplane—Power V ault MD3620i 1 screws (5) 2 backplane 3 captive screw 1 screws (4) 2 backplane 3 captive screw 2 1 3 2 1 3 book.book Page 231 Thursd ay, December 9, 2010 3:20 PM[...]

  • Página 232

    232 Management: Installing Array Components Installing the Back plane 1 Align the holes on the backpl an e with the holes on the array . 2 Tighten the captive scr ew to secure the backplane to the chassis. See F igur e 16-16 for P owerV ault MD3600i or F igur e 16-17 for P owerV ault MD3620i. 3 Replace the screws that secur e the backplane to the c[...]

  • Página 233

    Management: Firmware Inventory 233 17 Management: Firmware Inventory A storage array is made up of many components, which might include R AID controller modules, physical disks, and enclosur e manag ement modules (EMMs). Each of these components cont ains firmware. Some versions of the firmware ar e dependent on other v e rsions of firmware. T o ca[...]

  • Página 234

    234 Management: Firmware Inventory book.book Page 234 Thursd ay, December 9, 2010 3:20 PM[...]

  • Página 235

    Management: Sy stem Interfaces 235 18 Management: Sy stem Interfaces Microsoft Services Virtual Di sk Service The Microsoft Virtual Disk Service (VDS) is a component of the W indows operating sys tem. The VDS compo nent utilizes t hird-pa rty vendor speci fic software modules, known as providers, to access and configure thir d-party storage resourc[...]

  • Página 236

    236 Management: Sy stem Interfaces VSS attaches to the service and uses it to coor dinate the cr eation of snapshot virtual disks on the storag e array . VSS-initiated snap shot virtual disks can be triggered through backup to ols, known as requestors. The VSS P rovider Configuration T ool m ake s available the follow ing configuration options: •[...]

  • Página 237

    T roubleshooting: Y our Storage Array Software 237 19 T roubleshooting: Y our Storage Array Software Start-Up Routine Look and listen during the array’s start-up routine fo r the indications described in T able 19-1. F or a descri ption of the front- and back-panel indicators, see "Planning: About Y o ur Storage Array" on page 23. NOTE:[...]

  • Página 238

    238 T roubleshooting: Y our Storage Array Software T o launch the AMW , perform one of these actions: •O n t h e Devices tab, in either the T ree view or the T able view , double-click a storage array . Alternatively , you can right-click a storage array and select Manage Storage Array from the pop-up menu. •O n t h e Setup tab, select Manage a[...]

  • Página 239

    T roubleshooting: Y our Storage Array Software 239 In the T able view , every managed storage array is listed once, r egardless of the number of attachments it has in the T r ee view . After the storage array has been contacted by MDSM, an icon repres enting its har dware status appears. Hardwar e status can be Optimal, Needs Attent ion, or F ixing[...]

  • Página 240

    240 T roubleshooting: Y our Storage Array Software In the T ree view , icons can appear in a string to convey more information. F or example, the following string means that the storag e array is optimal, an alert is set for the storage array , and fi rmware is available for download. NOTE: MDSM may take a few minutes to update a status change to U[...]

  • Página 241

    T roubleshooting: Y our Storage Array Software 241 Storage Array Support Data Y ou can gather various types of inventor y , status, and performance data that can help troubleshoot any problem with the storage array . All the files ar e compressed into a single archive in a zipped-file forma t. Y ou can forward the archive file to your T echnical Su[...]

  • Página 242

    242 T roubleshooting: Y our Storage Array Software NOTE: Enable only one collect support bundle data to a single client sy stem. Setting multiple sy stems to collect data may potentially affect the storage array performance. T o automatically collect the support bundle data: 1 In the AMW , select Advanced  T roubleshooting  Support Data  A[...]

  • Página 243

    T roubleshooting: Y our Storage Array Software 243 • The version number for the management application programming interface (API). • The model ID for the RA ID controller module board. • The collection status for each RAID controller module. If the status is F ailed, the reason for failure is noted, and there is no trace file for the failed [...]

  • Página 244

    244 T roubleshooting: Y our Storage Array Software Collecting Phy sical Disk Data Y ou can use the Collect Physical Disk Data option to collect log sense data from all the physical disks on your storage array . Log sense data consists of statistical information that is maintained by each of the physical disks in your stor age array . Y our T echnic[...]

  • Página 245

    T roubleshooting: Y our Storage Array Software 245 Event Log Y ou can use the Event Log V iewer to view a detailed list of events that occur in a storage array . The event log is stored on reserved ar eas on the storage array disks. It r ecor ds confi guration events and st orage array compone nt failur es. WAR N IN G: Use this option only under th[...]

  • Página 246

    246 T roubleshooting: Y our Storage Array Software Recovery Guru The Recovery Guru is a component of MD SM that diag noses critical even ts on the storage array and recommends step-by-step recovery procedures for problem re solution. In the AMW , to display the Recovery Guru, perf orm one of these actions: •C l i c k Rec ov er y G u ru . •I n t[...]

  • Página 247

    T roubleshooting: Y our Storage Array Software 247 2 P erform one of these actions in the Storage Array P rofile dialog: • V iew detailed information—Go to step 3. • Search the storage array profile—Go to step 4. • Save the storage array profile—Go to step 5. • Close the storage array profile—Go to step 6. 3 Select one of the tabs, [...]

  • Página 248

    248 T roubleshooting: Y our Storage Array Software Vi ewing the Logical Associations Y ou can use the Associated L ogical Elements option to view the logical associations among di fferent virtual disks in a storage array . T o view the associa tions for source virtual disks, snapshot virtual disks, and snapshot repository virtual disks: 1 In the AM[...]

  • Página 249

    T roubleshooting: Y our Storage Array Software 249 Finding Nodes Y ou can use the F ind option to sear ch for a particular node on the Log i ca l tab, the Physical tab, or the Mappings tab of the Array Management W indow . The search might be based on a particular node name, the R AID level, virtual disk capacity , or specific fr ee capacity nodes.[...]

  • Página 250

    250 T roubleshooting: Y our Storage Array Software 7 T o sea rch for all F ree Capacity nodes with a particu lar capacity , perform these steps: NOTE: This option is not available when the Search by name option is selected or from the Mappings tab. Y ou must cancel the selection of the Search by name option to use this option. a Select F ind all fr[...]

  • Página 251

    T roubleshooting: Y our Storage Array Software 251 2 Select Vi e w  Go T o  Snapshot V irtual Disk . The selection jumps to the as sociated snapshot virtual d isk in the L ogical pane. 3 Select Vi e w  Go T o  Snapshot Repository V irtual Disk . The selection jumps to the as sociated snapshot repository virtual disk in the Logical pane.[...]

  • Página 252

    252 T roubleshooting: Y our Storage Array Software • Out-of -band managed storage array—Go to step 6. • In-band managed storage array – Go to step 12. 6 F or an out-of -band managed storage array , ensur e that the RA ID controller modules are network accessible by using the ping command to mak e sure that the R AID controller module ca n b[...]

  • Página 253

    T roubleshooting: Y our Storage Array Software 253 If you started the host system before you were connected to the RAID controller module in the storage array , the Host Context Agent softwar e will not be able to detect the RAID co ntroller modules. If this is the case, make sur e that the connections ar e secure, and restart the Host Conte xt Age[...]

  • Página 254

    254 T roubleshooting: Y our Storage Array Software Locating a Phy sical Disk Y ou can use the Locate Physical Disk op tion to physically locate and identify one or more of the physical disks in an e xpansion enclosure by activating physical disk LEDs. T o locate the physical disk: 1 Select the Physical tab. 2 Select the physical disk s that you wan[...]

  • Página 255

    T roubleshooting: Y our Storage Array Software 255 Locating an Expansion Enclosure Y ou can use the Blink option to physica lly lo cate and i dentify an expansio n enclosure in the storage array . The LED activation varies according t o the type of expansion enclosur e that you have. • If you have an expansion enclosure with a white LED, the Blin[...]

  • Página 256

    256 T roubleshooting: Y our Storage Array Software Capturing the State Information Use the T roubleshooting  Capture State Inform ation option to captur e information about the current state of your storage array and save the captured information to a te xt file . Y ou can then send the captured information to your T echnical Suppo rt repr esent[...]

  • Página 257

    T roubleshooting: Y our Storage Array Software 257 SMrepassist Utility SMrepassist (replication assistance) is a host-based utility for W indows platforms. This utilit y is installed with MDS M. Use this utilit y before and after you create a virtual disk copy on a W indows operating system to e nsure that all the m emory-residen t data for file sy[...]

  • Página 258

    258 T roubleshooting: Y our Storage Array Software Unidentified Devices An unidentified node or device occu rs when MDSM cannot access a new storage array . Causes for this error include network connection problems, the storage array is turned off, or the storage array does not e xist. NOTE: Before beginning any recovery proce dure, make sure that [...]

  • Página 259

    T roubleshooting: Y our Storage Array Software 259 b Make sur e that the network can access the host by using the ping command in the following syntax: ping <host-name-or-IP-address-of-the-host> . If the network can access the host, co ntinue to step c. If th e network cannot access the host, skip to step d. c Remove the host with the unr esp[...]

  • Página 260

    260 T roubleshooting: Y our Storage Array Software d Make sur e that the applicable network configuration tasks have been done (for example, the IP addres ses have been assigned to each controller). 5 Make sur e that the controller firmware is compatible with MDSM on your management station. If the controller firmware was upgraded, the MDSM might n[...]

  • Página 261

    T roubleshooting: Y our Storage Array Software 261 Starting or Restarting the Host Context Agent Software The Host Context Agent softwar e modu le is the software component that res ides on the server or manageme nt station that communica tes with the MD3600i Series storage arrays. The SMag ent software automatically starts after you reboot the hos[...]

  • Página 262

    262 T roubleshooting: Y our Storage Array Software Checking device /dev/sdb (/dev/sg11): Skipping Checking device <n/a> (/dev/sg3): Activating Checking device <n/a> (/dev/sg4): Activating Checking device <n/a> (/dev/sg5): Activating Checking device <n/a> (/dev/sg6): Activating Checking device <n/a> (/dev/sg7): Activati[...]

  • Página 263

    T roubleshooting: Y our Array 263 20 T roubleshooting: Y our Array Safety First—For you and Y our Array CAUTION: Many repairs may only be done by a certified service technician. Y ou should only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support te[...]

  • Página 264

    264 T roubleshooting: Y our Array T roubleshooting Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou should only perform troubleshooting and simple repairs as authorized in your product documentation, or as dir ected by the online or telephone service and support team. Damage due to serv[...]

  • Página 265

    T roubleshooting: Y our Array 265 T roubleshooting Array Cooling Problems CAUTION: Many repairs may only be done by a certified service technician. Y ou should only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team. Damage due to servicing that[...]

  • Página 266

    266 T roubleshooting: Y our Array c Reseat the EMM module and wait for 30 seconds. See Removing an EMM in the MD1200 and MD1220 Storage Enclosures Hardware Owner's Manual . d T urn on the server . e Check the EMM status LED. f If the LED does not turn gr een, r eplace the EMM. If the problem is not r esolved, see "Getting Help" on pa[...]

  • Página 267

    T roubleshooting: Y our Array 267 wait for up to 5 minutes to chec k if the LED has turned blue. See "Recovery Guru" on page 246. b If following the recovery guru proc edur es does not solve the problem, complete the following procedure to further troubleshoot the array . c T u rn off the host server as appropria te. d Remove the RAID con[...]

  • Página 268

    268 T roubleshooting: Y our Array T roubleshooting Hard Drives CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou should only perform troubleshooting and simple repairs as authorized in your product documentation, or as dir ected by the online or telephone service and support team. Damage due to servicing t hat is not a[...]

  • Página 269

    T roubleshooting: Y our Array 269 T roubleshooting Array and Expansion Enclosure Connections 1 V erify that th e R AID controller module p ort link status LED and the R AID controller module status LE D are solid gr een for each port that i s connected to a cable. If the LEDs are not solid green, see "Planning: R AID Controller Modu les" [...]

  • Página 270

    270 T roubleshooting: Y our Array 2 Remove the following components fr om the array . See "Management: Installing Array Comp onents" on page 209. •H a r d d r i v e s • R AID controller modules • P ower supply/cooling fan modules • Control panel •B a c k p l a n e 3 Let the system dry thoroughly for at least 24 hours. 4 Reinstal[...]

  • Página 271

    T roubleshooting: Y our Array 271 T roubleshooting RAID Controller Modules Conditions Certain events can cause a R AID controll er module to fail and/or shut down. Unrecoverable ECC memory or PCI errors , or critical physical conditions can cause lockdown. If your R AID storage ar ray is configured for re dundant access and cache mirroring, the sur[...]

  • Página 272

    272 T roubleshooting: Y our Array PCI Errors The storage array firmware can detect an d only recover from P CI errors whe n the R AID controller modules are configur ed for redundancy . If a virtual disk uses cache mirroring, it fails over to its peer R AID controller module, which initiates a flush of the dirty cache. Critical Conditions The stora[...]

  • Página 273

    Getting Help 273 21 Getting Help Contacting Dell F or customers in the United States, call 8 00- WWW -DELL (800 -999-3355). NOTE: If you do not have an active Inte rnet connection, you can find contact information on your purchase invoice, packing slip, bill, or Dell product catalog. Dell provides several online and telepho ne-based support and ser[...]

  • Página 274

    274 Getting Help book.book Page 274 Thursd ay, December 9, 2010 3:20 PM[...]

  • Página 275

    Index 275 Index A Access Virtual Disk, 66 Advanced F eature Using Snapshot and Disk Copy To g e t h e r, 5 4 Advanced F eatures , 51 Snapshot Repository Virtual Disk, 5 2 Snapshot Virtual Disks, 5 1 Advanced iSCSI Host P orts Settings, 89 Advanced P ath, 154 Array Management T ypes In-Band Management, 6 6 Out-of -Band Management, 6 5 B Backplane In[...]

  • Página 276

    Index 276 Control P anel Installing, 2 2 0 Removing, 2 1 9 Copy Manager , 173 D Defining a Host, 96 Dell Contacting, 2 6 5 Disk Group Creating, 1 0 6 Expansion, 1 4 1 Export, 1 4 3 E x p o r t i n g , 144 Import, 1 4 4 L o c a t i n g , 108 Migration, 1 4 3 Disk Group and Virtual Disk Expansion, 141 Disk Group Operations, 45 Defragmentation, 4 6 Ex[...]

  • Página 277

    Index 277 F r ee Capacity , 142 F ront Beze l Installing, 2 0 2 Removing, 2 0 2 H Hard Drive Drive Carrier , 2 0 6 Installing, 2 0 6 Removing, 2 0 4 Hard-Drive Indi cator Pa t t e r n s , 2 8 Ha rd wa re F e at ur es Back P anel F eatures, 2 7 F ront P anel F eatures, 2 4 Hard Drive Indicator P a tterns, 2 8 P ower Indicator Codes, 3 0 P ower Supp [...]

  • Página 278

    Index 278 MDSM, 20 Media Errors and Unreadable Sectors, 200 Media S can Changing Settings, 1 4 6 Suspending, 1 4 7 Microsoft Virtual Disk Servic e, 2 2 7 V olume Sha dow-Copy Service, 2 2 7 Microsoft Services Vir t ua l Di s k C o p y , 5 2 Monitoring P erformance, 57 Multi-P ath P r eferred and Al ternate Controllers and P aths, 5 4 Multi-P ath So[...]

  • Página 279

    Index 279 EMM blank, 2 0 9 F r ont Bezel, 2 0 2 Hard Drive, 2 0 4 Hard Drive F rom a Drive Carrier , 2 0 6 P ower Supp ly/cooling F an Module, 2 1 5 Removing Copy P airs, 178 Removing Host Access, 9 8 Restricted Mappings, 136 S Safety , 19 Safety , 255 Security Key C h a n g i n g , 120 Creating, 1 1 8 Saving, 1 2 1 Segment Size, 43 Setting a P ass[...]

  • Página 280

    Index 280 Recovering from an Unr espons ive Storage Array Condition, 2 4 3 Recovery Guru, 2 3 7 Starting or Restarting the Host-Agent Software, 2 5 2 Start-Up Routine, 2 2 9 Storage Array P rofile, 2 3 8 Storage Array Support Data, 2 3 2 Unidentified Devi ces, 2 5 0 Vie w in g th e L o gi c al A s s o c i a t i o n s , 239 Viewing the Physical A s [...]

  • Página 281

    Index 281 Vir t u a l D i s k O p e ra t io n s Limit, 45 Virtual Disk Ownership, 55 Vir t u a l D i s k S t a te s , 4 0 Vir t u a l D i s kC o p y Ta r g e t , 5 3 Virtual Disks a nd Disk Groups, 39 book.book Page 281 Thursd ay, December 9, 2010 3:20 PM[...]

  • Página 282

    282 Index book.book Page 282 Thursd ay, December 9, 2010 3:20 PM[...]