PS Series Storage Arrays Group Administration PS Series Firmware Version 5.
Copyright 2010 Dell, Inc. All rights reserved. EqualLogic is a registered trademark of Dell, Inc. Dell is a trademark of Dell, Inc. All trademarks and registered trademarks mentioned herein are the property of their respective owners. Information in this document is subject to change without notice. Reproduction in any manner whatsoever without written permission is strictly forbidden.
Table of Contents Preface .................................................................................................................................................... xiii Audience.................................................................................................................................................................. xiii Organization ...............................................................................................................................................
Group Administration Table of Contents Setting advanced policies ................................................................................................................................. 3-6 Using the CLI .......................................................................................................................................................... 3-6 Starting online help for group manager....................................................................................................
Group Administration Table of Contents Modifying the group IP address or group name ............................................................................................... 5-5 Modifying the group membership password .................................................................................................... 5-6 Shutting down a group......................................................................................................................................
Group Administration Table of Contents Displaying storage pool details ............................................................................................................................... 7-3 Storage pool status tab...................................................................................................................................... 7-3 Storage pool volumes tab ........................................................................................................................
Group Administration Table of Contents Configuring access control records ....................................................................................................................... 9-10 Modifying or deleting an access control record .................................................................................................... 9-11 About cloning volumes ........................................................................................................................................
Group Administration Table of Contents 11 Snapshot management.................................................................................................................... 11-1 About snapshots .................................................................................................................................................... 11-1 About snapshot reserve allocation.........................................................................................................................
Group Administration Table of Contents About delegated space and replica reserve ......................................................................................................... 12-11 Replica volume reserve ................................................................................................................................ 12-12 Replica reserve usage ...................................................................................................................................
Group Administration Table of Contents Deleting inbound replica collection sets, replica collections, or replicas ........................................................... 12-33 13 Data recovery .................................................................................................................................. 13-1 About data recovery ..............................................................................................................................................
Group Administration Table of Contents Monitoring iSCSI connections .............................................................................................................................. 15-3 Monitoring snapshot schedules ............................................................................................................................. 15-4 Monitoring replication schedules ....................................................................................................................
Group Administration Table of Contents Additional monitoring tools ................................................................................................................................ 15-32 Contacting customer support............................................................................................................................... 15-33 Displaying member service information ......................................................................................................
Preface This document describes PS Series group functionality and management operations. It describes how you use the Group Manager graphical user interface (GUI) to perform tasks. For information about using the command line interface (CLI) to manage a group, see the CLI Reference manual on the EqualLogic customer support Website.
Group Administration Preface Part II: Using Group Storage: • Chapter 7, Storage pools, describes how to organize storage for a group. • Chapter 8, iSCSI target security, describes how to protect volumes and snapshots from unauthorized and uncoordinated iSCSI initiator access. • Chapter 9, Basic volume operations, describes how to create volumes and perform basic volume tasks.
Group Administration Preface PS Series Array Software • • Firmware – Installed on each array, PS Series firmware allows you to manage your storage environment and provides capabilities such as volume snapshots, cloning, and replication to protect data hosted on the array in the event of an error or disaster. – Group Manager GUI: Provides a graphical user interface for managing a group. – Group Manager CLI: Provides a command line interface for managing a group.
Group Administration Preface Related Documentation For detailed information about PS Series arrays, groups, volumes, array software, and host software, see the documentation listed in the following figure: Figure 2-1: PS Series Documentation xvi
Group Administration Preface Technical Support and Customer Service Dell’s support service is available to answer your questions about PS Series arrays. If you have an Express Service Code, have it ready when you call. The code helps Dell's automated-support telephone system direct your call more efficiently. Contacting Dell Dell provides several online and telephone-based support and service options. Availability varies by country and product, and some services might not be available in your area.
1 Storage solutions for all enterprises PS Series storage arrays provide consolidated storage in a self-managing, iSCSI (Internet Small Computer System Interface) storage area network (SAN). Featuring automated management and fast, flexible scalability, PS Series arrays can greatly decrease the total cost of storage acquisition and management. Today, large and small businesses alike are under pressure to manage rapidly-growing storage environments.
Group Administration Storage solutions for all enterprises By default, a group provides a single pool of storage. If you have multiple members, you can divide group space into different storage pools and then assign members. Pools help you organize storage according to usage and give you a way to allocate resources, from a single-system management view. You create volumes to access storage space in a pool, and you can modify volume size and attributes on-demand.
Group Administration Storage solutions for all enterprises • Support for standard Ethernet networks. Only one IP network connection is necessary for array operation. You can configure all the network interfaces for maximum bandwidth. You do not have to train administrators in unfamiliar and complex technologies such as Fibre Channel. Also, high-volume production and intense vendor competition among Ethernet hardware vendors decrease cost of ownership. • Easy and online expansion.
Group Administration Storage solutions for all enterprises Automatic SAN operation In contrast to traditional storage management environments involving error-prone, manual tasks, a PS Series group does complex tasks correctly and without user intervention: • Automatic RAID configuration and data provisioning. Administrators do not have to manually create RAID sets or map data onto disks or individual network interfaces.
Group Administration Storage solutions for all enterprises You can restrict iSCSI access to volumes according to IP address, iSCSI initiator name, or Challenge Handshake Authentication Protocol (CHAP) user name. You can set up and authenticate CHAP accounts locally in the group or through a RADIUS (Remote Authorization Dial-in User Service) server. Advanced functionality at no extra cost PS Series arrays match ease-of-use with ease-of-doing-business.
Group Administration Storage solutions for all enterprises A replica represents the contents of a volume at a specific point in time. You can create replicas on-demand and through schedules. • Failover and failback. If a volume is destroyed, you can fail over to the recovery group and recover data from a replica. Users can then resume access to the recovery volume. When the original volume becomes available, you can failback to the original group.
Part I: Managing Groups
2 Common group tasks When you use the setup utility or the Remote Setup Wizard to create a new PS Series group with one or more members, you have a fully functioning group with many features. Dell recommends you perform the common post-setup tasks listed here. See About the Group Manager GUI on page 3-1 for information about logging in to the group. Setting the group time All members of a group share the same time zone. Each array’s clock is set at the factory, based on GMT.
Group Administration Common group tasks Configuring CHAP for initiator authentication You can use Challenge Handshake Authentication Protocol (CHAP) for iSCSI authentication to manage access controls more efficiently. Using a challenge-response mechanism, CHAP restricts target access through user names and passwords instead of unique IP addresses or iSCSI initiator names. You can use CHAP to authenticate iSCSI initiators by specifying a CHAP user name in an access control record.
3 Group Manager user interfaces PS Series arrays provide simple, yet robust user interfaces for creating, expanding, and managing groups. The graphical user interface (GUI) and the command-line user interface provide virtually identical functionality. About the Group Manager GUI You can run the Group Manager GUI: • From a Web browser. In addition to ports 3002 and 3003, the GUI uses the standard HTTP port (80). • By installing the GUI on a local computer and running it as a standalone application.
Group Administration Group Manager user interfaces b. Navigate to the Windows Programs menu, and click EqualLogic PS Group, then group_name Group Manager. When you install the GUI locally, it automatically updates when you upgrade the PS Series firmware. However, you must log out of the GUI and then log in again after performing a firmware update to make sure the GUI displays all the features in the updated firmware.
Group Administration • Group Manager user interfaces – Inbound replica collections - related sets of storage objects located on a partner group, sending replicated data to the login group. – Inbound replicas- individual storage objects located on a partner group, sending replicated data to the login group. – Out bound replica collections - related sets of storage objects located on the login group, sending replicated data to a partner group.
Group Administration Group Manager user interfaces Table 3-1: Keyboard Shortcuts (Continued) Type Table Navigation Tree Navigation Tabs Alarms Pane Move to the next row Move to the previous row Move to the next cell Move to the previous cell Leave table and move to the next item in the pane Leave table and move to the previous item in the pane Show context (right-click) menu for current table row Move to previous tree node Move to next tree node Collapse current tree node or move to parent of a collaps
Group Administration Group Manager user interfaces Displaying the tools panel If the Tools panel is not showing in the bottom left of the GUI window, click its Show window icon ( the Tools panel. To keep the Tools window open, drag the panel divider bar .
Group Administration Group Manager user interfaces 2. In the User Preferences – General dialog box, select your preferences and click OK. See the online help for information about the options. Setting GUI communication policies To manage connections between your workstation and the Group Manager GUI: 1. Click Tools, then User Preferences, then the Communication tab. 2. Select the policies and click OK. See the online help for information about the options.
Group Administration Group Manager user interfaces Starting online help for group manager In addition to tooltips and command-line help for the GUI and CLI, online help is available for the Group Manager GUI. An internet connection is required to use online help, which is served from a Web site in the Dell.com domain. You have the option to install the help on your local system or a private Web server. Note: Setting the online help to a local path only applies to users of the local system.
4 Group security Group security features enable you to control access to the group and the data it contains. About group security To access a group for management purposes, an administrator must meet several security conditions. See Table 4-1. Table 4-1: Access Requirements for Group Administration Security Condition Description Network access The administrator’s computer must have access to the group network address (group IP address or dedicated management address).
Group Administration Group security Administration access options Table 4-3 shows the access options and network services. Table 4-3: Administration Access Options Field Description Shortcut User Actions Enable Web access Whether administrators can access the Group Manager through the web interface. Alt+W See Enabling or disabling GUI or CLI access on page 4-2 Allow only secure SSL Whether administrators must use an SSL connections connection when connecting to the GUI.
Group Administration Group security You can manage accounts locally or remotely: • Locally in the group – If you have relatively few administration accounts, this method is practical. Account authentication occurs within the group. The default administration account, grpadmin, is a local account created automatically when the group is first configured. See Creating a local administration account on page 4-5.
Group Administration Group security Table 4-4: Types of Administrator Accounts (Continued) Account Type Description Volume administrator Assigned a quota of storage to manage within one or more pools. They can create and manage volumes within their quota, and can perform all operations on volumes they own. Volume administrators can view information only for pools and volumes to which they have access.
Group Administration Group security Table 4-5: Administration Account Attributes (Continued) Attribute Description Type Account type: • Group administrator – Can change any and all aspects of the group, storage pools, members, and volumes, except updating member firmware. • Pool administrator – Can manage the volumes, members, snapshots, and other objects only in the pool or pools for which the account has authorization. Optionally, pool administrators can view information about all group objects.
Group Administration Group security • For a pool administrator, select one or more pools the account can manage and whether the account has read-only access to the entire group. • For a volume administrator, select one or more pools the account can manage and specify the quotas for each pool. 5. Select whether to enable (default) or disable the account, then click Next. (You can enable and disable accounts at any time.
Group Administration Group security About administration accounts on a RADIUS authentication server You can use an external RADIUS authentication server to centralize the management of administration accounts. The RADIUS server authenticates administration accounts and also determines the account privileges. You can also use a RADIUS accounting server to monitor the login and logout times for accounts that a RADIUS server authenticates.
Group Administration Group security • You want to create a volume administrator account. You must specify the EQL-Admin attribute, the EQLPool-Access attribute, and (optionally) the EQL-Replication-Site-Access attribute. • You want to create a read-only account. You must specify the EQL-Admin attribute and the EQL-AdminAccount-Type attribute. • You plan to select the Require vendor-specific RADIUS attribute option when you configure the group to use a RADIUS authentication server.
Group Administration Group security Table 4-6: Vendor-Specific Attributes (Continued) Attribute Field Required Value Admin-Email VSA vendor ID 12740 (Optional) E-mail address of the administrator. VSA number 2 VSA syntax String (3 to 247 characters) Admin-Phone VSA vendor ID 12740 (Optional) Phone number for the administrator. VSA number 3 VSA syntax String (3 to 247 characters) Admin-Mobile VSA vendor ID 12740 (Optional) Mobile phone number for the administrator.
Group Administration Group security Table 4-7: RADIUS Server Prerequisites (Continued) Task Description Configure iSCSI CHAP accounts. For iSCSI CHAP accounts, add each configured network interface on all the group members as a RADIUS client. Specify the network interface IP address and, optionally, a password (or secret), up to 63 characters. If you specify a password, enter this password when you configure the group to use the RADIUS authentication server.
Group Administration • Group security Number of retries value 1. Click Group, then Group Configuration, and then the Administration tab. 2. In the RADIUS Authentication panel, click RADIUS settings. 3. To change a server IP address or password, select the server IP address and click Modify in the RADIUS settings dialog box. Change the settings and click OK. 4. Click OK. Deleting a RADIUS server connection 1. Click Group, then Group Configuration, and then the Administration tab. 2.
Group Administration Group security To change SNMP access: 1. In the SNMP Access panel, click Add. 2. Enter a SNMP community name (for example, public) and click OK. You can specify up to five names. 3. Click Save all changes (Control+S). To modify or delete an SNMP community name: 1. In the SNMP Access panel, select the name. 2. Click Modify or Delete. Host-based application access requirements Host-based applications from EqualLogic facilitate access between computers and PS Series group storage.
Group Administration Group security VDS/VSS access control records use the same criteria for restricting access as iSCSI target access control records: CHAP user name, iSCSI initiator name, or iSCSI initiator IP address. See About iSCSI target access controls on page 8-1. To display VDS/VSS Access, click Group, then Group Configuration, and then the VDS/VSS tab. See the online help for information about the data fields and options. Adding a VDS/VSS access control record 1.
Group Administration Group security Although a dedicated management network can provide additional group administration security, it has disadvantages: • Because you assign the highest-numbered network interface on each group member to the management network, iSCSI traffic is limited to the remaining network interfaces. Therefore, total iSCSI bandwidth might decrease, depending on the control module type.
Group Administration Group security Procedure for configuring a management network Warning: When you complete the management network configuration, administrators cannot log in to the group using the group IP address. Instead, administrators must use the new management IP address. Any open GUI or CLI sessions using the group IP address eventually time out and close. 1. Click Group, then Group Configuration, and then the Advanced tab. 2.
Group Administration Group security Figure 4-1: Configure Management Network – Configuration Complete 8. In the Warning dialog box, click Yes to restart the Group Manager GUI session using the new management IP address. Note: When you configure a management network correctly, the highest-numbered interface is on the same subnet as the management IP address and Mgmt appears in the Traffic column (Figure 4-1).
Group Administration Group security Adding a member to a group with a management network If you add a member to a group that has a management network, you must assign the highest-numbered network interface on the new member to the management network. After you select the pool and RAID policy for the new member, as described in Setting the RAID policy and pool for a new member on page 6-6, the Modify IP Settings – Management Network dialog box appears.
Group Administration Group security Unconfiguring a management network You can unconfigure a dedicated management network and re-enable the group IP address to be used for group management. 1. Click Group, then Group Configuration, and then the Advanced tab. 2. In the Group Advanced window’s Dedicated Management Network panel, click Configure management network. 3. In the Configure Management Network dialog box, deselect Enable dedicated management network. 4.
5 Group configuration You can change the group configuration defaults and initial settings. You can also add members to a group to expand group capacity and improve performance. Displaying the Group summary The Group Summary window appears when you first start the Group Manager GUI or when you click the group name at the top of the far-left panel.
Group Administration Group configuration Displaying the Group configuration To display the current configuration, click Group Configuration in the left panel. The Summary panel contains important configuration attributes and provides links to views that contain more details and in some cases, provide options to modify group configuration attributes.
Group Administration Group configuration Group configuration tabs Each of the Group Configuration tabs provides additional information and configuration options as shown in Table 5-2: Table 5-2: Group Configuration Tabs Tab Name General Administration Description User Actions General group settings, date and time.
Group Administration Group configuration Setting the time through an NTP server You can specify that the group use up to three external Network Time Protocol (NTP) servers to automatically set the same time for all the group members. The group uses one NTP server at a time and the first listed server is the default server. The group uses the other servers, in the order specified, if the default server is not available. Requirement: The NTP server must be accessible to all the group members.
Group Administration Group configuration About group network configuration The group network configuration, which appears in the Group Summary window, includes the group name and group IP address, which you set when creating a group: • Group name – Identifies the group on the network. For example, when you configure a replication partner, you use the name to identify the group. • Group IP address – Network address for the group.
Group Administration Group configuration 1. Click Group, then Group Configuration. 2. Select the General tab. (See the online help for information about the data fields and options.) 3. Modify the group name or group IP address. 4. [Optional] Change the location and group description. 5. Click Save all changes (Control+S). Modifying the group membership password To add a member to a group, you need the group membership password that is initially established when you create the group. 1.
6 Group members A PS Series group includes one or more PS Series arrays configured as group members. Displaying Group members To display information about all group members, click Members in the far-left panel. The Group Members panel appears, containing the following panels: • Group disk space panel – Provides information about capacity use for the group and pools and capacity use distribution by raid level.
Group Administration Group members – Click Front view to see the front panel of the array. For some array models, the GUI shows disk drives located behind the front bezel. – Click Inside view (not available on all array models) to see the disk drives located inside the array. – Click Rear view to see the back panel of the array, including the control modules and the power supply and cooling modules. The front and rear views shown in your GUI depend on the array model of the group member.
Group Administration Group members Controllers tab 1. Click Group, then expand Members. 2. Select the member name, and click the Controllers tab. The following panels provide information about the member’s controller modules: • Control module panel – Enables you to identify controller locations and verify their status and cache battery condition. Identifies the current PS Series firmware • Memory cache panel – Describes the cache mode and current caching policies.
Group Administration Group members Connections tab 1. Click Group, then expand Members. 2. Select the member name, and click the Connections tab. The iSCSI Connection panel displays details of the current initiator connections. See the online help for information about the data fields and options. See also Monitoring iSCSI connections on page 15-3. Service tab 1. Click Group, then expand Members. 2. Select the member name, and click the Service tab.
Group Administration Group members The RAID policy for a member consists of two parts: • RAID level – RAID 10, RAID 50, RAID 5, or RAID 6. See RAID level characteristics. Recommendation: For optimal performance, Dell recommends that you assign the same RAID level to pool members with the same disk type and disk speed. • Spare drive policy – Whether the member automatically configures and uses spare disk drives. Spare drives increase availability.
Group Administration Group members Table 6-1 compares the performance and availability characteristics of the supported RAID levels. The first column lists workload requirements, with the other columns respectively listing the performance quality for each requirement at RAID 10, RAID 50, RAID 5, and RAID 6.
Group Administration Group members 1. In the Group Summary window, expand Members and double-click the member name or click Group, then expand Members, and then select the member name. The GUI shows whether a member is configured or not. 2. In the warning dialog box that appears, click Yes to configure RAID on the member. 3. In the Configure Member – General Settings dialog box, select the pool and click Next. 4. If prompted, confirm you want to assign the member to the pool.
Group Administration Group members Recommendation: For high availability and performance, Dell recommends that you configure multiple network interfaces and use redundant network switches. Note: Some control module types include a network interface that can be used only in a dedicated management network.
Group Administration Group members 1. Install a secondary control module in the member. 2. For each configured network interface, connect the Ethernet port on the secondary control module to the network. Configuring redundant network switches Redundant network switches protect against network and switch failures and improve network performance. Requirement: Requires redundant network connections. See Configuring redundant network connections. 1.
Group Administration Group members Note: Unless you are using a dedicated management network, the default gateway is the same for all network interfaces on an array. To modify the default gateway, see Modifying the default gateway for a member. 6. Select Enable this interface. You must enable the interface in order to use it. 7. Click OK. Enabling or disabling a network interface Enabling a network interface makes it operational if you configure it properly.
Group Administration Group members Requirement: You must use a default gateway to enable communication outside the local network. 1. Click Group, then expand Members, then select the member name, and then click the Network tab. 2. In the IP Configuration panel next to the Default gateway field, click Modify. 3. Specify a default gateway IP address if you want to use a default gateway, or delete the IP address if you do not want to use a default gateway. 4. Click OK.
Group Administration Group members on the functional control module uses write-through mode. If you disable this policy (the default), the cache on the functioning control module uses write-back mode. • Use write-through mode if battery charge is below tolerance – Also called low-battery-safe mode, if you enable this policy (the default) on a member with a single control module, the cache uses write-through mode if the charge on the cache battery is low.
Group Administration Group members Before updating firmware, see Firmware update considerations and prerequisites for important information to consider. Firmware update considerations and prerequisites Regular firmware updates are an important part of maintaining a well-functioning group. Before performing any firmware update, read the Release Notes for the new firmware and the Updating Storage Array Firmware document.
Group Administration Group members Disallowing member firmware downgrades If the Disallow downgrades option is active, the group is not using all features of the installed firmware. You must disallow firmware downgrades to use the features in an updated firmware release. Requirement: Before you disallow firmware downgrades, make sure all group members are running the same firmware version. 1. Click Group, then Group Configuration, and then the Advanced tab. 2.
Group Administration Group members The group sets any volumes with data on the member offline. The group sets the volumes online when you restart the member. Restarting a member When you restart a member, the group sets any volumes with data on the member offline. The group sets the volumes online when the restart completes. Restarting a member has no effect on member, volume, or group configuration information or volume data stored on the member. Restriction: Do not repeatedly restart a member. 1.
Part II: Using Group Storage Space
7 Storage pools About storage pools Storage pools allocate storage space into partitions comprising one or more members. By default, a group provides a single pool of storage. If your group has multiple members, you can divide group space into different pools and then assign members. Note: Load balancing operates only within pools. By default, a PS Series group provides a single pool of storage.
Group Administration – Disk speed – Member RAID level (RAID 10, RAID 50, RAID 5, RAID 6) Storage pools Recommendation: Dell recommends that pool members with the same disk spin rate have the same RAID level. For example, if a pool contains two members that have 7200 RPM disks installed, configure both members with the same RAID level. • Disk space and performance needs of each application.
Group Administration Storage pools 2. Under Storage pool assignment, click Create new pool. 3. In the Create Storage Pool dialog box, enter a name and description for the new pool and click OK. If a description contains spaces, surround it with quotation marks. 4. In the Modify Member Settings dialog box, click OK. 5. Confirm that you want to create the pool. The member status shows as moving until the move operation completes. If necessary, you can cancel an in-progress member pool move operation.
Group Administration • Storage pools Pool members panel– Provides information that enables you to identify members in the pool, member status and configuration, and pool iSCSI connections. See the online help for information about the data fields and options. Storage pool volumes tab To display the volumes in a storage pool: click Group, then expand Storage Pools, then select the pool name, and then click the Volumes tab.
Group Administration Storage pools To cancel an in-progress member pool move operation, click Members, then member_name, then Cancel member move. Moving a volume to a pool When you create a volume, you assign the volume to a pool. The group stores volume data on the pool members. You can also move a volume from its current pool to a different pool, with no effect on users or applications. While a volume is moving, the group allocates volume space in the current pool and in the new pool.
Group Administration Storage pools 1. Click Group, then expand Storage pools, then select the pool name, and then click Modify pool settings. 2. Modify the pool name or description and click OK. Deleting a storage pool If you delete a storage pool, the group immediately moves its members and volumes to the default pool. Note: You cannot delete the default pool. 1. Click Group, then expand Storage pools, then select the pool name, and then click Delete storage pool. 2.
8 iSCSI target security Volumes and snapshots are seen on the network as iSCSI targets. It is important to understand how to protect your volumes and snapshots from unauthorized and uncontrolled access by iSCSI initiators. About iSCSI access requirements To access an iSCSI target (for example, a volume or snapshot), an iSCSI initiator must meet the security requirements identified in Table 8-1.
Group Administration iSCSI target security Authenticating initiators through CHAP CHAP is a network login protocol that uses a challenge-response mechanism. You can use CHAP to authenticate iSCSI initiators by specifying a CHAP user name in an access control record. To meet this condition, a computer must supply the user name and its password (or “secret”) in the iSCSI initiator configuration interface when logging in to the target.
Group Administration iSCSI target security Note: For optimal security, passwords must contain at least 12 characters (preferably random). Individual iSCSI initiators have their own rules and restrictions for length and format. Consult your initiator documentation for details. • Select whether to enable the account. You must enable an account to use it for initiator authentication. You can later modify an account and enable or disable it. • Click OK. 5.
Group Administration iSCSI target security 5. If you have not already configured the group to use a RADIUS server, click RADIUS settings and add at least one RADIUS server. See the procedure in Using RADIUS authentication and accounting servers on page 4-9 for adding RADIUS servers. 6. Click Save all changes. After creating the CHAP account, create an access control record for a volume and specify the CHAP user name in the record. See Configuring access control records.
Group Administration iSCSI target security When an initiator tries to log in to a target, the group uses access control records to determine if access should be authorized. However, access control records do not prevent multiple initiators, either on the same computer or different computers, from accessing the same target. Therefore, by default, the group disables multi-host (shared) access to a target. Therefore, only one iSCSI qualified name (IQN) can connect to a target at one time.
Group Administration iSCSI target security Deleting an iSNS server To delete the IP address for an iSNS server, select the address in the iSCSI Discovery panel in the Group iSCSI window and click delete. Then, click Save all changes (Control+S). Preventing the discovery of unauthorized targets By default, iSCSI initiators that use discovery try to log in to group targets protected by CHAP, even if they do not have the correct access credentials.
Group Administration • iSCSI target security If an initiator is connected to the volume, the group compares the IQN of the current connection to the IQN of the incoming connection. If the IQNs are not the same, access is denied. If the IQNs are the same, the group uses access control records to determine whether to authorize access. However, some environment might need multi-host access to a target.
Group Administration iSCSI target security Note: In some file systems, volumes and snapshots must have read-write permission even if the file system is read-only. See Modifying volume permission and Modifying snapshot permission.
9 Basic volume operations Basic volume operations consist of creating volumes, setting up access controls, and modifying volume attributes. You can also clone a volume to create an exact copy. About volumes A computer uses an industry-standard iSCSI initiator to access a volume in a group. Most operating systems provide an iSCSI initiator (in the form of an iSCSI driver or a host bus adapter), with a range of price and performance options.
Group Administration Basic volume operations You can replicate any volume type, resulting in a replica set for the volume. In addition, you can fail over any volume type, resulting in a recovery version of the volume. However, you can only fail back a standard volume or a thin clone volume.
Group Administration Basic volume operations In addition, you can allow or disallow volume access from multiple initiators, depending on your configuration needs. See Allowing or disallowing multi-host volume access on page 9-14. About volume data protection Dell recommends that you use snapshot and replication functionality to protect volume data. A snapshot is a point-in-time copy of volume data that can protect against mistakes, viruses, or database corruption.
Group Administration Basic volume operations Table 9-1: Volume Attributes (Continued) Volume Attribute Thin provisioning settings Description Controls whether the volume is thin-provisioned and, if so, the minimum and maximum volume reserve and the in-use space warning limit. The defaults are no thin provisioning and the group-wide volume settings. Snapshot reserve See About thin provisioning on page 10-1.
Group Administration Basic volume operations Displaying group-wide default volume settings When you create a volume or enable thin provisioning on a volume, group-wide defaults are applied, unless you explicitly override them for a volume. These default values control snapshot space, snapshot behavior, thin provisioning space, and iSCSI alias naming. To display group-wide default volume settings, click Group, then Group Configuration, and then the Defaults tab.
Group Administration Basic volume operations To create a standard volume: 1. Click Volumes in the lower-left panel and then click Create volume. 2. In the Create Volume – Volume Settings dialog box, specify: • Volume name • Optional volume description • Storage pool 3. Click Next. 4. In the Create Volume – Space dialog box, specify: • Reported volume size and the unit of measure. • Whether to use thin provisioning on the volume. See About thin provisioning.
Group Administration Basic volume operations the Volumes Summary window provides the following volume information: • Identifiers – name, storage pool location and accessibility status. • Capacity – Reported size and reserve space allocation. • Parameters – Replication partner, snapshot count, connection count and administration account. See the online help for information about the data fields and options. You can modify the display: 1.
Group Administration • – Name, status, and security (access) – Capacity and reserve – iSCSI connections – Storage pool and (if a thin clone) template volume – Replication identifiers Basic volume operations Volume and snapshot space panel – Provides information about volume use: – Size, capacity use, and reserve allocation – Whether the volume is thin provisioned – Snapshot reserve and space use – Policies for recovery, RAID, load balancing, and member striping – Whether the volume is
Group Administration – Collections and schedules that include this snapshot – Accessibility (security) and current connections Basic volume operations See the online help for information about the data fields and options. Displaying volume replication Displays the replication configuration and replicas for the volume. Click Volumes in the lower-left panel, then expand Volumes in the far-left tree, then select the volume name, and then click the Replication tab.
Group Administration • Basic volume operations Schedules summary panel – Provides information about the snapshot and replication schedules for a volume, schedule status and the next scheduled event. • Snapshot and Replication schedules panel – Provides information about individual schedules, event times and schedule status. Select Also show schedules for collections that include the volume or enter Alt+A to include the snapshot and replication schedules for volume collections that include the volume.
Group Administration Basic volume operations 2. In the Access Control List panel, click Add. The Add Access Control Record dialog box appears. 3. Select the conditions that a computer must meet and specify the required information (CHAP user name, IP address, iSCSI initiator name). 4. Select whether the access control record applies to the volume, its snapshots, or the volume and its snapshots (default). 5. Click OK. Modifying or deleting an access control record To modify an access control record: 1.
Group Administration Basic volume operations 2. Click Clone. The following dialog box appears: Clone Volume – Settings. Specify the new volume name and description. 3. Click Next.The following dialog box appears: Clone Volume – Space. Enable or disable thin provisioning (only applicable to standard volumes).
Group Administration Basic volume operations 1. Click Volumes in the lower-left panel, then expand Volumes in the far-left tree, then select the volume name, then click the Modify settings, and then click the General tab. 2. In the Modify volume settings – General dialog box, modify the name or the description. The volume name must be unique in the group and can contain up to 63 alphanumeric characters, including periods, hyphens, and colons. The description can contain up to 127 ASCII characters. 3.
Group Administration Basic volume operations Modifying volume permission A volume can have read-write or read-only permission, unless it is a template volume. Requirement: To change a volume permission to read-only, you must first set the volume offline. Restriction: You cannot set a template volume to read-write permission. To modify a volume permission: 1. Click Volumes in the lower-left panel, then expand Volumes in the far-left tree, then select the volume name, and then click Set access type. 2.
Group Administration Basic volume operations You cannot use the Group Manager GUI to enable or disable iSNS discovery for a volume or snapshot. Instead, you must use the following CLI command formats: volume select volume_name isns-discovery enable | disable volume select volume_name snapshot select snapshot_name isns-discovery enable | disable Deleting a volume You can delete a volume. Space that the group allocated to the volume becomes part of free pool space.
10 Advanced volume operations Only knowledgeable group administrators should perform advanced volume operations, including creating thinprovisioned volumes, using template volumes and thin clones, changing a volume size, using volume collections, and scheduling volume operations. About thin provisioning You can use thin provisioning technology to more efficiently allocate storage space, while still meeting application and user storage needs.
Group Administration – Advanced volume operations For a volume with a reported size that is less than 100GB, when free volume reserve falls below 6% of the reported volume size, the group allocates an additional 10% of the reported volume size. Event messages inform you when in-use volume reserve surpasses a user-defined limit and reaches the maximum.
Group Administration Advanced volume operations Enabling thin provisioning on a volume When you create a new volume or clone an existing volume, you can enable thin provisioning on the volume. In addition, you can modify an existing volume and enable thin provisioning. Thin provisioning is not appropriate for all environments or volumes. You must fully understand thin provisioning before implementing the functionality on a volume. See About thin provisioning on page 10-1.
Group Administration Advanced volume operations • Because the group bases snapshot space and replication space on a percentage of the volume reserve, disabling thin provisioning increases snapshot space and replication space. Therefore, you must have sufficient free pool space. • In some cases, if you disable thin provisioning on a volume, the group automatically decreases the snapshot reserve percentage to prevent an excessive allocation of snapshot space.
Group Administration Advanced volume operations About reported volume size You can change the reported size of a volume while the volume is online and without disrupting access to the volume. Warning: Not all operating systems, file systems, and applications easily handle volume size changes or behave in a predictable manner when you change a volume size.
Group Administration Advanced volume operations Decreasing the reported size of a volume You can decrease the reported size of the volume, while the volume remains online. Decreasing the size of a volume is sometimes called “shrinking” a volume. See About reported volume size on page 10-5 for information on the impact of changing the reported size of a volume. Caution: If you decrease a volume size to less than the amount of space currently in use, you can lose data.
Group Administration Advanced volume operations The group always maintains and shows the dependency of a thin clone on a template volume. If you expand Volumes in the far-left panel, you can choose to display all volumes in alphabetical order or display thin clones under the template volume on which they depend. If you replicate a template volume and its attached thin clones, the primary and secondary groups maintain the dependency.
Group Administration Advanced volume operations thin clone before you need to increase its size. This value is the same as the value for “unreserved” space in the Volume Space table in the Volume Status window for the template volume. If you detach a thin clone, the resulting new standard volume has in-use space equal to the combined shared space and unshared space, as shown in the Shared Space table in the Volume Status window.
Group Administration Advanced volume operations Note: When you convert to a template volume, the group disables any schedules that include the volume. If you later convert the template volume to a standard volume, the group does not automatically enable the schedules. Requirement: Before converting to a template volume, make sure the standard volume contains all the data that is shared with the thin clones.
Group Administration Advanced volume operations If you detach a thin clone from a template volume, the thin clone is converted to a standard volume and no longer shares space with the template volume. Therefore, when you detach a thin clone, the volume reserve for the thin clone increases by the amount of space the thin clone shares with the template volume.
Group Administration Advanced volume operations 4. Review the Create Volume Collection – Summary dialog box and, if satisfactory, click Finish. To make changes, click Back. The volume collection appears in the far-left GUI panel, under Volume Collections. Displaying volume collections Click Volumes and then Volume Collections. The Volume Collection Summary window appears, containing the following information: • Collection, volumes, and storage pool identifiers.
Group Administration Advanced volume operations • Snapshot summary panel – Provides information about snapshot collections, schedules, and scheduled events. • Snapshots panel – Provides information about snapshot timestamp, schedule name, security, and connections. See the online help for information about the data fields and options. Replicas tab Click Volumes, then expand Volume Collections, then select the collection. Click the Replicas tab.
Group Administration Advanced volume operations Deleting a volume collection Note: Deleting a volume collection does not delete the volumes in the collection or any snapshots or replicas. However, the group deletes any schedules for the volume collections. 1. Click Volumes, then expand Volume Collections, then select the collection, and then click Delete volume collection. 2. Confirm that you want to delete the collection.
Group Administration Advanced volume operations Table 10-2: Schedule Attributes (Continued) Attribute Number of snapshots or replicas to keep Snapshot permission Description How many snapshots or replicas to keep (from 1 to 512; the default is 10). This attribute applies only to snapshots or replicas that the schedule creates. If the schedule exceeds the maximum number of snapshots or replicas to keep, the group automatically deletes the oldest snapshots or replicas before creating new ones.
Group Administration Advanced volume operations Displaying volume schedules 1. Click Volumes, then expand Volumes, then select the volume, and then click the Schedules tab. The Schedules Summary panel shows the status of the volume schedules and the creation time for the next scheduled snapshot or replica. A running schedule is a schedule that you enabled. 2. In the Snapshot and Replication Schedules panel, select a schedule to display details.
Group Administration Advanced volume operations Enabling and disabling a volume RAID preference A PS Series group uses automatic performance load balancing (enabled by default) to identify the RAID level that provides the best performance for a volume and store volume data on pool members with that RAID level, if such members are available. You can override automatic performance load balancing by enabling a RAID level preference (RAID 10, RAID 50, RAID 5, or RAID 6) on a volume.
Group Administration Advanced volume operations To unbind a volume from a member, use the following CLI command format: volume select volume_name unbind See the PS Series CLI Reference manual for more information about using CLI commands. Managing a volume or snapshot with lost blocks In rare circumstances, a volume (or snapshot) might lose blocks. For example, this can occur if there is a power failure and then a control module cache battery fails.
11 Snapshot management Snapshots greatly simplify and increase the performance of backup and recovery operations. About snapshots A snapshot is a point-in-time copy of volume data. Creating snapshots on a regular basis can protect you from data loss due to mistakes, viruses, or database corruption. A snapshot represents the contents of a volume at the time of creation. You can create snapshots of standard volumes, in addition to template volumes and thin clone volumes.
Group Administration Snapshot management About snapshot reserve allocation Before you can create snapshots of a volume, you must allocate snapshot reserve for the volume. Snapshot reserve is consumed from the pool where the volume resides. You can allocate snapshot reserve when you create a volume, or you can modify a volume’s properties to change the snapshot reserve. Snapshot reserve is a percentage of the volume reserve.
Group Administration Snapshot management See Modifying snapshot reserve settings for a volume on page 11-3. About snapshot schedules You can set up a schedule for creating snapshots of a volume or volume collection at a specific time or on a regular basis. Using a schedule can cause a large number of snapshots. Make sure you have sufficient snapshot reserve. You can set a limit on the number of snapshots the schedule can create.
Group Administration Snapshot management The default snapshot name is the volume name followed by the date and time when you created the snapshot (for example, dbase-2009-03-25-15:31:14.7668). Snapshots appear under a volume in the far-left panel listed by by timestamp. When you select a snapshot timestamp, its full name (volume and timestamp) appears in the GUI main window and in the Snapshot iSCSI Settings pane. Displaying snapshots for a volume 1.
Group Administration Snapshot management Snapshot status tab The Snapshot Status tab provides the following panels: • General snapshot information panel – Provides information about: – Volume status and accessibility (security) – Schedule and collection relating to this snapshot – Creation timestamp and size of the snapshot • Snapshot iSCSI settings panel – Provides information about the iSCSI target and alias name of the snapshot.
Group Administration Snapshot management Creating a snapshot collection You can create snapshots of all the volumes in a volume collection in one operation. The resulting set of snapshots, one for each volume in the collection, is called a snapshot collection. Requirement: Before you create a snapshot collection, you must allocate snapshot reserve for each volume in the volume collection. See About snapshot reserve settings on page 11-2. 1.
Group Administration Snapshot management The snapshot collection Modification status can be: • not modified — No snapshot in the collection is set online with read-write permission. • potentially modified — One or more snapshots in the collection are currently set online with read-write permission. The Snapshots panel displays information about the snapshots in the collection. Double-click a snapshot to display details about the snapshot.
Group Administration Snapshot management Displaying snapshot collection status Click Volumes, then Custom Snapshot Collections, and then the timestamp of the collection.
Group Administration Snapshot management Click Volumes, then expand Volume Collections, then expand the collection, and then select the timestamp for the snapshot collection. • If you are deleting a custom snapshot collection: Click Volumes, then expand Custom Snapshot Collections, and then select the timestamp for the custom snapshot collection. 2. Click Delete snapshot collection. 3. Confirm that you want to delete the snapshot collection or the custom snapshot collection.
Group Administration Snapshot management See Volume attributes for attributes that apply to a new volume. In addition, you should fully understand volume access controls. See iSCSI target security. 1. Click Volumes in the lower-left panel, then expand Volumes in the far-left panel, then select the volume, then select the snapshot timestamp, and then click Clone snapshot. 2. Follow the prompts in the Clone Snapshot wizard.
Group Administration Snapshot management Setting a snapshot online or offline By default, a snapshot is offline. You can set a snapshot online, making it accessible to iSCSI initiators that match one of the snapshot’s access control records. If you set a snapshot offline, any current iSCSI connections to the snapshot are lost. 1. Click Volumes in the lower-left panel, then expand Volumes in the far-left panel, then expand the volume name, and then select the snapshot timestamp. 2.
Group Administration Snapshot management Deleting snapshots Note: If you delete a snapshot that is part of a snapshot collection or a custom snapshot collection, the collection Integrity status changes to incomplete. 1. Click Volumes in the lower-left panel, then expand Volumes in the far-left panel, then expand the volume name, then select the snapshot timestamp, and then click Delete snapshot. 2. Confirm that you want to delete the snapshot.
12 Volume replication Volume replication between different groups provides protection against data loss. If a volume is destroyed, you can fail over to the recovery group and recover data from a replica. Users can then resume access to the recovery volume. When the original volume becomes available, you can failback to the original group.
Group Administration Volume replication How replication works Before you can replicate volume data, you must configure the group where the volume resides and the group that stores the volume replicas as replication partners. Each partner plays a role in the replication of a volume, and you can monitor replication activity from either partner: • Primary group. Location of the volume.
Group Administration Volume replication About manual transfer replication If you are transferring a large amount of data and your network link between the primary and secondary groups is not sufficient, you can use manual transfer replication for a replication operation. Manual transfer replication requires manual tasks and uses external media to copy data to the secondary group, instead of using the network.
Group Administration Volume replication Replication configuration options A group can have multiple replication partners. However, you can replicate a volume only to one replication partner at a time. Choose the replication configuration that is right for your environment. Replication to one partner One replication partner replicates volumes to another partner. For example, in Figure 12-1, GroupA replicates Volume1 and Volume2 to GroupB. GroupA is the primary group, and GroupB is the secondary group.
Group Administration Volume replication Reciprocal replication between partners Both partners replicate volumes to each other. For example, in Figure 12-3, GroupA replicates Volume1 to GroupB, and GroupB replicates Volume2 to GroupA. For the replication of Volume1, GroupA is the primary group, and GroupB is the secondary group. For the replication of Volume2, GroupB is the primary group, and GroupA is the secondary group.
Group Administration Volume replication How volume changes affect replication space How much space you need for replication depends on the volume size and the rate of volume changes. The first replication of a volume copies the entire volume contents from the primary group to the secondary group. Subsequent replication operations transfer only the data that changed since the previous replication. Replication time and space requirements increase as the amount of transferred data increases.
Group Administration Volume replication See the PS Series Release Notes for replication limits. 2. If you did not already configure the groups as replication partners: a. Log in to the primary group and configure the secondary group as a replication partner. b. Log in to the secondary group and configure the primary group as a replication partner. Make sure you delegate the correct amount of space to the primary group for storing replicas of primary group volumes.
Group Administration Volume replication See About delegated space and replica reserve on page 12-11 and Replica reserve usage on page 12-12. To make sure replication operations complete and to keep the desired number of volume replicas, you must allocate sufficient replication space. To determine the optimal amount of replication space, Dell recommends that you set up replication using the default space values, monitor activity over some time period, analyze the space usage, and make adjustments.
Group Administration Volume replication After each replication completes, the primary group replaces the failback snapshot to update the failback baseline. Therefore, the volume data represented by the failback snapshot on the primary group always matches the volume data represented by the most recent complete replica on the secondary group.
Group Administration Volume replication However, using the recommended values might not be the most efficient use of local replication reserve. Ideally, you want to allocate only enough space to meet the volume requirements. However, specifying too little space can prevent successful replication. The optimal value for local replication reserve depends on the volume change rate, the replication frequency, and whether you are keeping the failback snapshot.
Group Administration Volume replication 5% + change rate For example, if you estimate that at most 20% of the volume changes, a value of 25% might be appropriate (5% plus 20%). If you use a local replication reserve value that is less than 100%, sufficient space might not be available to maintain the failback snapshot. Therefore, Dell recommends that you select the option that allows you to borrow free pool space if there is not enough local replication reserve to maintain the failback snapshot.
Group Administration Volume replication group. Replica reserve is based on a percentage of the volume’s replica volume reserve. See Replica volume reserve and Replica reserve usage. Replica volume reserve Each replicated volume has a replica volume reserve, which approximates the amount of in-use volume space. The value of the replica volume reserve is used to allocate replica reserve for a volume.
Group Administration Volume replication When you configure a volume for replication, you specify the replica reserve size as a percentage (minimum 105%) of the replica volume reserve, which approximates in-use volume space. As volume usage increases, the replica volume reserve increases; therefore, the replica reserve also increases, providing more space for replicas, up to a limit. See Replica volume reserve. For example, if you specify 200% for the replica reserve, and the replica volume reserve is 2.
Group Administration Volume replication The most recent complete replica is never deleted automatically, ensuring that you always have a viable copy of volume data on the secondary group. Note: If you cannot free enough replica reserve for the volume data by deleting replicas, the replication pauses, and the primary group generates an event message, indicating the replica reserve percentage required to complete the replication. 4.
Group Administration Volume replication To obtain an appropriate replica reserve value, estimate the average volume changes that occur between replication operations. Then, use this calculation, where 105% is the minimum replica reserve value: 105% + [change rate x (number of replicas to keep -1)] For example, if you estimate that at most 20% of the volume changes between replication operations, and you want to keep three replicas, specify 145% for the replica reserve value.
Group Administration Volume replication About replication partners Before you can replicate volume data between two PS Series groups, you must configure the groups as replication partners. Each partner plays a role in the replication of a volume, and you can monitor replication activity and manage replicas from either partner: • Primary group. Location of the volume. The primary group administrator configures the secondary group as a replication partner and initiates the replication operation.
Group Administration Volume replication Replication partner attributes When you configure a replication partner, you specify values for the attributes described in Table 12-1. The first column lists attributes, and the second describes them. You can also modify the partner configuration and change the attribute settings.
Group Administration • Group IP address. • Optional description for the partner. Volume replication Then, click Next. 3. In the Configure Replication Partner – Contact dialog box, enter the optional name, e-mail address, and phone number or mobile number for the partner administrator. Then, click Next. 4. In the Configure Replication Partner – Authentication dialog box, enter the passwords that the partners use for mutual authentication: • Specify a password in the Password for partner field.
Group Administration Volume replication Displaying the replication configuration for a partner Click Replication and then select the partner name.
Group Administration Volume replication Modifying partner passwords If you make a modification on one partner, you must make the reciprocal modification on the other partner. The password in the Password for partner field on one partner must match the password in the Password obtained from partner field on the other partner. To modify partner passwords: 1. Click Replication, then select the partner, and then click Modify passwords. 2.
Group Administration Volume replication To delete a replication partner: 1. Click Replication, then select the partner, and then click Pause inbound. 2. Click Delete partner. 3. Confirm that you want to delete the partner. Displaying inbound and outbound replication Click Replication and then expand the partner name. From the Replication Partner Status window, you can: • Click Inbound Replicas to display partner replicas stored in the group. Select an individual replica to display detailed information.
Group Administration Volume replication The Inbound Replicas Collections window appears, containing the following panels: • • Delegated space panel – Provides information about the space the group delegated to the selected partner: – Space delegated, used, and free – Failback replica space – Inbound replica status Inbound replicas panel – Provides information about inbound replicas and replica status. See the online help for information about the data fields and options.
Group Administration Volume replication Template replicas tab In the Replica Set Status window, the Template Replicas tab provides information about the inbound replica set for the template volume and includes the following panels: • • Template replicas panel – Provides information about template volume replication configuration.
Group Administration Volume replication Note: You can also display information about volume collection replication by clicking Volumes in the lower-left corner, then expanding Volume Collections, then selecting the collection name, and then clicking the Replicas tab. • Replication summary panel – Provides information about the volume collection replication configuration, including replication partner, and schedule status.
Group Administration Volume replication Volume replication configuration attributes Table 12-2 describes the attributes you set when configuring the volume for replication. The first column lists their attributes and the second describe them. You can modify the replication configuration and change the attribute values. Table 12-2: Volume Replication Configuration Attributes Attribute Replication partner Description Partner that stores the volume replicas.
Group Administration Volume replication Because a template volume is read-only and cannot be failed back from the secondary group, keeping the failback snapshot is not necessary for this type of volume. 5. In the Configure Volume Replication – Summary window, review the information and click Finish if the configuration is correct. Click Back to make changes. When you complete the volume replication configuration, you can choose to create a replica.
Group Administration Volume replication See Configuring a volume for replication on page 12-25. If a volume is configured to replicate to a different partner, click the partner name link to modify the volume replication configuration and change the partner. See Modifying volume replication configuration settings on page 12-26. 3. Click OK. Modifying volume collection replication configuration settings You can modify the replication configuration of a volume collection or the volumes in the collection. 1.
Group Administration Volume replication Creating a replica The first time you replicate a volume to a partner, the primary group copies the entire volume contents to replica reserve on the secondary group. Subsequent replication operations transfer only the volume data that changed since the previous complete replication. Note: Very large data transfers might exceed the capacity of the network link between the primary group and the secondary group.
Group Administration • Volume replication Replication operation status and replica status. 2. In the Remote Replicas panel, click Replication History to show details about each replication operation: • Time the operation started. • Replication partner. • Total replication time. The duration time includes the amount of time during which replication was paused or the network was down. • Amount of data transferred. • Data transfer speed. • Status of the replication.
Group Administration Volume replication The Remote Replicas panel shows the replica collections for the volume collection. Expand a replica collection to see the individual replicas and their status. Using schedules to create replicas Schedules enable you to create replicas of a volume or all the volumes in a collection on a regular basis. Note: Schedules apply only to network replications. Scheduled replications do not run until any in-process manual transfer replications are complete.
Group Administration • Volume replication To resume inbound replication from a partner: Click Replication, then expand the partner name, and then click Resume inbound. Cancelling a volume replication You can cancel an in-progress volume replication. Note: To temporarily stop volume replication instead of cancelling it, pause the replication. See Pausing and resuming replication of a volume on page 12-30. Click Volumes, expand Volumes, then select the volume name, and then click Cancel replication.
Group Administration Volume replication Deleting outbound replica sets or replicas Deleting a replica set disables replication on the volume. If you re-enable replication on the volume, the first replication is a complete transfer of volume data. 1. Click Volumes, then expand Volumes, then select the volume name, and then click the Replication tab. 2. In the Volume Replication window, click Volume replicas in the Remote Replicas panel. 3.
Group Administration Volume replication Deleting inbound replica sets or replicas If the primary group is not available, you can delete replicas and replica sets when logged in to the secondary group. However, if you delete replicas or replica sets from the secondary group, the primary group information is not updated and errors can result. Deleting a replica set disables replication on the volume. Recommendation: Dell recommends that you delete replicas when logged in to the primary group.
Group Administration Volume replication The replica, replica collection, or replica collection set no longer appears in the group. However, the replica or replica set still appears on the partner (primary group), if it is available. You can log in to the primary group and delete the replica or replica set.
13 Data recovery If you replicate a volume to a partner (see Chapter 12, Volume replication), you can recover volume data on the partner. In addition, you might be able to fail over to the partner and later fail back to the original group. About data recovery Effective data recovery requires a well-planned disaster protection strategy and the regular creation of replicas and backups.
Group Administration Data recovery Data recovery procedures Table 13-1 describes common data recovery procedures. Table 13-1: Data Recovery Procedures Goal Procedure Fail over and fail back a 1. Promote the replica set to a recovery volume. volume. 2. Demote the volume to a failback replica set. Use this method if the 3. Replicate the recovery volume. volume is unavailable 4. Demote the recovery volume to a replica set. due to a failure or maintenance. 5. Promote the failback replica set to a volume.
Group Administration Data recovery See Replicating a recovery volume to the primary group. 3. When you are ready to fail back to the primary group, use the Failback to Partner operation to: • Set the recovery volume offline. • Perform a final replication to synchronize the volume data across both groups. • Demote the recovery volume to an inbound replica set. • Promote the failback replica set to a volume and snapshots. The volume represents the data that was in the most recent complete replica.
Group Administration Data recovery Figure 13-2 shows the replication configuration after a failure in the primary group (GroupA).
Group Administration Data recovery Figure 13-3 shows the first step in recovering data on the secondary group, which is to fail over the volume to the secondary group. To do this, promote the inbound replica set to a recovery volume and snapshots. The recovery volume contains the volume data represented by the most recent complete replica. Users can connect to the recovery volume to resume access to volume data.
Group Administration Data recovery Figure 13-4 shows the second step in recovering data—replicate to the primary group. When the primary group is available: • Demote the original volume to a failback replica set. • Replicate the recovery volume to the primary group. Note: If the failback snapshot is not available on the primary group, the first replication transfers all the recovery volume data, instead of only the changes that users made to the recovery volume.
Group Administration Data recovery Figure 13-5 shows the final step in recovering data—fail back to the primary group. To fail back to the primary group: • Set the recovery volume offline. • Replicate the recovery volume to synchronize volume data across both groups. • Demote the recovery volume to an inbound replica set. • Promote the failback replica set to a volume. You can perform these tasks separately, or use the Replicate to Primary operation, which encompasses all the tasks.
Group Administration Data recovery Promoting an inbound replica set does not require any additional space on the secondary group, because it reduces delegated space by the size of the volume’s replica reserve. With some exceptions, all volume operations apply to a recovery volume. See Recovery volume restrictions. Restriction: You cannot convert a recovery template to a standard volume. You must first You must first make the promotion permanent. You cannot detach a recovery thin clone. 1.
Group Administration • Data recovery If the original volume becomes permanently unavailable, you can make the inbound replica set promotion permanent. See Making an inbound replica set promotion permanent on page 13-13. Recovery volume restrictions To temporarily fail over a volume to the secondary group, you promote the volume’s inbound replica set to a recovery volume. Users can connect to the recovery volume and resume access the volume data.
Group Administration Data recovery 3. In the Replicate Recovery Volume dialog box: • Specify the group administrator account name and password. • Select whether to perform the replication by using manual transfer replication. See About manual transfer replication on page 12-3. • Select whether to save the primary group administrator account name and password for future use in the current GUI session. 4. Click OK.
Group Administration Data recovery Moving a failback replica set to a different storage pool You can move a failback replica set to a different pool in the primary group. If you later promote the failback replica set to a volume, the volume belongs to the new pool. 1. On the primary group, click Replication, expand the replication partner, expand Inbound Replicas, select the failback replica set, and click Change storage pool. 2. Select the new pool and click OK.
Group Administration Data recovery Note: If you chose to use manual transfer replication, the status of the create replica task is in-progress until you complete the manual transfer replication. When the manual transfer replication is complete, the Failback to Primary operation continues automatically. When the Failback to Primary operation completes, on the secondary group, the recovery volume disappears from the list of volumes, and the inbound replica set reappears in the list of inbound replica sets.
Group Administration Data recovery 2. On the secondary group: a. Promote the replica set to a recovery volume. Make sure you keep the ability to demote the recovery volume, in case you decide to cancel the role switch. See Promoting an inbound replica set to a recovery volume. Users can now access volume data by connecting to the recovery volume. See Connecting initiators to iSCSI targets on page 8-7. b. Replicate the recovery volume to the primary group.
Group Administration Data recovery Then, click Next. 4. Review the information in the Convert Recovery Volume – Summary dialog box and click Finish if satisfactory. Click Back to make changes. When the operation completes, the recovery volume is converted to a volume. Where to go next • If you are permanently switching partner roles, see Converting a failback replica set to an inbound replica set for the next step in the procedure.
Group Administration Data recovery 3. In the Promote Replica Set – Volume Options dialog box: • Choose whether to set the volume online or offline. • Choose whether to retain the iSCSI target name of the original volume. This can facilitate initiator access to the volume. • Deselect the Keep ability to demote to replica set option. Then, click Next. 4.
Group Administration Data recovery Manually performing the replicate to partner operation The Replicate to Partner operation consolidates multiple tasks. You can perform each task in the operation individually. Requirement: You must promote the inbound replica set to a recovery volume, before performing the individual Replicate to Partner tasks. See Promoting an inbound replica set to a recovery volume. 1. On the primary group: a. Set the original volume offline.
Group Administration Data recovery 3. On the primary group, promote the failback replica set to the original volume: Click Replication, expand the partner name, expand Inbound Replicas, select the failback replica set, and click Promote to volume.
Part III: Troubleshooting
14 Group event logging A PS Series group generates events when normal group operations occur and also when significant events occur. Events enable you to track operations and also detect and solve problems before they affect performance or data availability. In addition, you can use SNMP traps to track significant group events. About event messages When an event occurs in the group (for example, you create a volume or a power supply fails), the group generates an event message.
Group Administration Group event logging Event priorities Each event has a priority. Table 14-1 lists event priorities in order of lowest (least severe) to highest (most severe). The first column lists the priorities, the second describes them. Table 14-1: Event Priorities Priority INFO WARNING ERROR FATAL Description Informational message. Indicates an operational or transitional event that requires no action. Potential problem.
Group Administration Group event logging Configuring E-Mail notification Requirement: To use e-mail notification, a group must have access to a Simple Mail Transfer Protocol (SMTP) server or e-mail relay. 1. Click Group, then Group Configuration, and then the Notifications tab. See the online help for information about the data fields and options. 2. In the E-Mail Event Notifications panel, select Send E-mail to addresses. 3. Under E-mail recipients, click Add and enter an e-mail address.
Group Administration Group event logging Configuring E-Mail home If a hardware component fails or if you update firmware, the group can automatically notify customer support through email. Recommendation: Dell strongly recommends that you enable E-Mail Home, to expedite customer support becoming engaged in solving any problems. E-Mail Home is available to all PS Series customers, but response time and assistance is based on the validity and level of your support contract.
Group Administration Group event logging • To modify the IP address for an SMTP server, select the IP address, click Modify, change the address, and click OK. • To delete an SMTP server, select the IP address and click Delete. 3. Click Save all changes (Control+S) to apply the changes. Configuring syslog notification Requirement: The syslog server must be able to store remote log files. 1. Click Group, then Group Configuration. 2. Click the Notifications tab.
Group Administration Group event logging About SNMP traps SNMP traps are unsolicited event messages sent to a management console by an agent. PS Series arrays send traps for equipment issues and security issues. See Displaying and configuring SNMP access to a Group on page 4-11 and Configuring SNMP trap destinations on page 14-7. The PS Series array MIBs (Management Information Bases) contain information about SNMP traps and trap thresholds. See Accessing PS Series array MIBs on page 14-7.
Group Administration Group event logging Configuring SNMP trap destinations You can configure network addresses to receive SNMP traps from the group. 1. Click Group, then Group Configuration. 1. Click the SNMP tab. See the online help for information about the data fields and options. 2. In the SNMP Traps panel, click Add. 3. Enter the IP address where SNMP traps are sent and click OK. You can specify up to five IP addresses. All the addresses receive traps. 4.
15 Group monitoring It is best practice to regularly monitor a PS Series group, so you can address issues before service is interrupted. About monitoring best practices Dell recommends that you set up event notification to inform you automatically of events and operations in a group. See Event notification methods on page 14-2. If you configured SNMP trap notification, you can examine the traps using an SNMP console. See About SNMP traps on page 14-6.
Group Administration Group monitoring Getting started with group monitoring All monitoring information is available by clicking Monitoring in the lower-left panel. Monitoring events The group generates a message when a significant event that requires corrective action occurs in the group (for example, when hardware fails, or replication space is insufficient).
Group Administration Group monitoring • Double-click an event. The event details panel opens at the bottom of the events list. • Select an event and click the View details ( opens at the bottom of the events list. ) or Hide details icons ( ). The event details panel See the online help for information about the data fields and options. Accessing the event log file on a remote computer If you configured syslog notification, the group logs events to one or more syslog servers.
Group Administration Group monitoring Check for multiple initiators writing to the same target. This can cause volume corruption if not handled correctly by the servers. Note: You can sort the table in the GUI by clicking column headings. By default, the table is sorted by Initiator address. See the online help for information about the data fields and options. Monitoring snapshot schedules To monitor snapshot schedules, click Monitoring and then Snapshot Schedules.
Group Administration • Group monitoring Time and data parameters and schedule run status To see more detail about a schedule, move the pointer over a schedule entry in the panel.
Group Administration Group monitoring Table 15-3 describes some best practices for monitoring replication between groups. The first column lists the monitoring condition, the second column describes it, and the third column provides a reference for more information about addressing the issue.
Group Administration Group monitoring You can take the following actions: • Click a volume name to navigate to the Volumes Status window. • Double-click a row to navigate to the Outbound Replicas window. Table 15-4 shows the outbound replication operation status. The first column lists the status values, the second column provides descriptions, and the third column provides solutions.
Group Administration Group monitoring Table 15-4: Outbound Replication Operation Status (Continued) Status remote-replicaset-isrecovery-volume waiting Description The replica set on the partner has been promoted to a recovery volume. Replication data transfer did not start because the group cannot create more iSCSI sessions. Solution Demote the recovery volume on the partner and retry the replication. In most cases, the problem resolves itself, and replication continues automatically.
Group Administration Group monitoring • Maximum reserve, snapshot reserve, and free space • How the latest replication occurred (over the network or through Manual Transfer Replication) • Whether a failback snapshot is enabled • Current and operational status (online or offline) • Number of replicas in the replica set • Description, if any Click a replica set name or double-click a row to navigate to the Inbound Replicas window for that partner, with the replica set selected and its detail sho
Group Administration Group monitoring To display a list of all the replication partners for a group, click Replication and then Replication Partners. The Delegated Space panel shows all the delegated space for all partners, and how much free space is available. The Replication panel shows all the replications, and their direction, between this group and all configured partners. You should monitor the usage of delegated space.
Group Administration • Group monitoring Critical – Serious problem that can cause damage to the array or data loss. See Displaying critical alarms on page 15-11. When an alarm occurs: • The Alarms panel header flashes. Click the header to open and close the panel. • The group generates a corresponding event message. • LEDs on the array chassis light. The Alarms panel header is divided into two areas: Alarms and Operations. Each header includes icons that match the tabs in the panel.
Group Administration Group monitoring Critical alarms appear on the Critical tab of the Alarms panel. A critical alarm indicates a serious problem that can cause damage to the array or data loss. Correct the problem that causes a critical alarm immediately. Note: Critical alarms correspond to ERROR events. Critical alarms include: • • • • Data integrity: – RAID is not functioning. – More than one valid RAID set in the array. – Full lost block table. Cache: – Control module cache has lost data.
Group Administration Group monitoring Note: Warning alarms correspond to WARNING events. Warning alarms include: • • • • Data integrity: – Degraded, but functioning RAID set. – RAID (volume-level) has lost blocks. – Installed spare drive does not have enough capacity to replace a RAID set drive. Hardware Component: – Failed non-critical hardware component. – Component temperature is near upper or lower limit. – Fan RPMs exceed upper or lower limit. – Failed power supply fan.
Group Administration Group monitoring Some complex operations, such as manual transfer replication, require administrators to perform multiple tasks. To display incomplete tasks, open the Alarms and Operations panel and click the Actions tab. If a multi-task operation is in progress, the GUI displays the incomplete tasks. Make sure you complete all multitask operations.
Group Administration Group monitoring Table 15-11: Alarms and Operations - Failback Operations Tab (Continued) Column Status Description Status of the operation. User Actions Monitoring replication partners on page 15-9 Started Time and date the operation started.
Group Administration Group monitoring Monitoring a specific member Click Group, expand Members, then select the member name, and then click the Status tab. Displaying general member information In the General Member Information panel, check the RAID status. Table 15-12 describes the RAID status values and provides possible solutions where appropriate. Table 15-12 shows RAID status for a member.
Group Administration Group monitoring Table 15-13 shows member status, description, and how to solve any issues. Table 15-13: Member Status Status unconfigured initializing online Description You did not select a RAID policy for the member. Member is initializing according to the selected RAID policy. Array is a functioning member of the group. Member is unavailable, failed, or power was removed.
Group Administration Group monitoring Monitoring power supplies A member has two or three power supplies. Most PS Series arrays use power supplies that have integrated cooling modules. A member can survive one power supply failure. Replace failed power supplies as soon as possible. For proper cooling, do not remove a power supply until you have a replacement. For information about replacing a power supply, see the Hardware Maintenance manual for your array model or contact your PS Series support provider.
Group Administration Group monitoring The Temperature Sensors panel shows the current temperature for the various array controllers and processors, in addition to the normal temperature range. Table 15-16 describes the array temperature status, descriptions, and how to solve any issues. Table 15-16: Array Temperature Status Status normal warning critical Description Temperature is within normal range. Temperature is outside normal range, but within limits. Temperature is outside operating limits.
Group Administration Group monitoring Monitoring the EIP card Some array models include an Enclosure Interface Processor (EIP) card. An array continues to operate if the EIP card fails. You can replace the failed EIP card with no impact on group operation. In the Member Enclosure window, the EIP card panel shows the EIP card status. Table 15-18 describes EIP card status, descriptions, and how to solve any issues.
Group Administration Group monitoring • Cache battery status and NVRAM battery status. See Table 15-20 and Table 15-21 for descriptions of battery status and possible solutions where appropriate. • Model number. • Boot ROM version. • PS Series firmware version. An empty slot means that a control module is not installed or has failed. For information about replacing a control module, see the Hardware Maintenance manual for your array model or contact your PS Series support provider.
Group Administration Group monitoring NVRAM battery status Table 15-21 describes the control module NVRAM coin cell battery status, descriptions, and how to solve any issues. Not every array has an NVRAM battery. Table 15-21: NVRAM Battery Status Status good bad Description Battery installed and fully charged. Battery failure. not-present Battery is not installed. unknown Battery status is not known. Solution None needed; informational.
Group Administration Group monitoring Table 15-22: Disk Drive Status (Continued) Status spare unsupported-version Description Disk drive is a spare drive. Disk drive cannot use the firmware running on the member. Solution None needed; informational. See your PS Series support provider. Warning: A disk drive failure in a RAID 5 or RAID 10 set that is degraded might result in data loss.
Group Administration Group monitoring To display the network information, click Group, expand Members, then select the member name, and then click the Network tab. The Status of Network Interfaces panel shows the following information: • • Operational status – This is the current status of the network interface and can be: – up – Operational, connected to a functioning network, configured with an IP address and subnet mask, and enabled.
Group Administration Group monitoring Monitoring volumes and snapshots Make sure volumes and snapshots are online or offline. Make sure that thin-provision volumes are not about to run out of volume reserve. Also check free volume space. To display information for all group volumes, click Volumes in the lower-left panel and then click Volumes in the far-left panel. The Volume Summary window appears. To display detailed information about a specific volume, expand Volumes and select the volume name.
Group Administration Group monitoring The group also sets a thin-provisioned volume offline if the volume’s maximum in-use space setting is less than 100% and a write exceeds this value. In the Volume Summary window, check the current volume status in the Volumes panel. The requested status appears when you move the pointer over the volume in the Volumes panel. If the requested status and current status are not the same, investigate further.
Group Administration Group monitoring Table 15-24: Current Volume and Snapshot Status (Continued) Status offline-max-grow-met Description A thin-provisioned volume and its snapshots were automatically set offline because a write exceeded the maximum in-use space value. offline-missing-pages A volume or snapshot was set offline because some volume data cannot be found. This is a serious condition.
Group Administration Group monitoring Starting Performance Monitor from the Group Manager GUI 1. From the Members list, select a member name. 2. On the Disks or Network tab, click a row for a drive or an Ethernet port. 3. In the Statistics Activity panel, select the statistic to display. The Performance Monitor window opens and displays the selected data (Figure 15-1).
Group Administration Group monitoring Using the Performance Monitor Table 15-25 shows the operation icons in the Performance Monitor window. Table 15-25: Performance Monitor Operations Click Icon Operation Start polling the data. Stop polling the data. Go to the start (first item). Go to the previous item. Go to the next item. Go to the end (last item). Adding, changing, or removing statistics You can display up to four sets of statistics in the Performance Monitor. To add more statistics: 1.
Group Administration Group monitoring Changing how data is displayed Table 15-26 shows the icons you use to change the data display. You can view the data as a chart, histogram (bar graph), or as a data table.
Group Administration Group monitoring Figure 15-2: Performance Monitor - Select Data Point Customizing the Performance Monitor Within the Performance Monitor window, you can change the following: • colors used in graphs • length of time between which data points are collected • number of data points to save Changing the display colors On the left side of the window within each statistics panel, you can change the colors used in the display.
Group Administration Group monitoring Figure 15-3: Performance Monitor- Select a Color Dialog Box Changing the data collection values Click Preferences to change: • The time interval between data points. The default is 1 second, and the maximum is 60 seconds. You can choose from a list of predefined intervals (1, 5, 10, 30, and 60) or enter any integer value between 1 and 60; for example, 45. • The number of data points to save. The default is 100 and the maximum is 1000.
Group Administration Group monitoring Contacting customer support The Customer Support website contains downloads for firmware updates, documentation, and other services. You can also create and log into your customer support account to report a problem and receive direct technical support. To launch the EqualLogic Customer Support website from the GUI, click Tools and then Customer Support.
Group Administration • Group monitoring Select whether to send reports to your support provider (requires E-Mail Home), one or two e-mail addresses (separated by a comma), or both. Note: Do not change the default settings unless your support provider instructs you to change them. 5. Click OK. To monitor progress while the group generates diagnostic reports, check the Alarms and Operations panel.
Appendix A Legal notices This appendix lists the third-party copyrights for software used in the PS Series product. This product contains portions of the NetBSD operating system: For the most part, the software constituting the NetBSD operating system is not in the public domain; its authors retain their copyright. Copyright © 1999-2001 The NetBSD Foundation, Inc. All rights reserved.
Group Administration Legal notices This code is derived from software contributed to Berkeley by Rick Macklem. Copyright © 1989 Digital Equipment Corporation. This product includes software developed by Manuel Bouyer. Copyright © 1999 Manuel Bouyer. This product includes software developed by Adam Glass. Copyright © 1994 Adam Glass. This code is derived from software contributed to Berkeley by Paul Vixie. This code is derived from software contributed to Berkeley by Chris Torek.
Group Administration Legal notices Copyright © 1990,1994 The University of Utah and the Computer Systems Laboratory (CSL). Copyright © 1991 Bell Communications Research, Inc. (Bellcore). Copyright © 2000 Caldera Systems, Inc. All rights reserved. Copyright © 1995 - 2000 Kungliga Tekniska Högskolan. (Royal Institute of Technology, Stockholm, Sweden). All rights reserved. Copyright © 1993-1995 HEWLETT-PACKARD COMPANY. Copyright © 1995-1997 Eric Young All rights reserved.
Group Administration Legal notices Copyright © 1995-1998 Mark Adler. Copyright © 1995-1998 Jean-loup Gailly. Copyright © 1998-1999 Brett Lymn. All rights reserved. Copyright © 1996-1999 SciTech Software, Inc. Copyright © 2001, 2002 Brian Stafford. Copyright © 1999-2001 Bruno Haible. Copyright © 2001 Alex Rozin, Optical Access. All rights reserved. Copyright © 1989 TGV, Incorporated. All rights reserved. Copyright © 2000 Frank Strauss. All rights reserved. Copyright © 1997 Niels Baggesen.
Glossary This glossary defines the storage technology terminology that is specific to EqualLogic. If a term has unique meaning in the context of hardware or of a specific software application, that context is indicated. See The SNIA Dictionary (http://www.snia.org/education/dictionary/) for definitions of any industry-standard storage terms used in this manual. .bcd (Auto-Snapshot Manager) The file extension used by ASM to identify a Smart Copy backup document. .
Group Administration Glossary array (hardware) A PS Series storage array is a completely self-contained storage unit that includes multiple disk drives configured in a highly available RAID set with dual control modules and redundant power supplies and cooling modules. array serial number (Auto-Snapshot Manager) A unique PS Series array identification string that is encoded in the array's hardware. See service tag.
Group Administration Glossary CHAP properties (Auto-Snapshot Manager) An ASM configuration option that enables you to specify CHAP credentials for VSS or VDS access to groups and for computer access to Smart Copies for importing. checksum verification The process of verifying the integrity of Microsoft Exchange Smart Copies. You use the Windows eseutil.exe, a database maintenance utility. cloning The process of creating a new copy of an object such as a volume.
Group Administration Glossary device-specific module (DSM) (Host Integration Tools) A plug-in for Microsoft Windows device driver module. For multipath implementation on PS Series arrays, you use EqualLogic Multipath I/O DSM in conjunction with Microsoft MPIO. It provides the EHCMservice.exe user mode Windows service, and the eqldsm.sys kernel mode driver.
Group Administration Glossary group access 1. (Auto-Snapshot Manager).The process of enabling computer access to a PS Series Group by configuring and supplying credentials. See access credentials and CHAP. 2. (Group Manager) Access to the Group Manager UIs for management purposes. Access the GUI or CLI though the network. You can access the CLI through the optional serial port on the controller. 3. (hardware) Access to the group storage.
Group Administration Glossary jumbo frames Ethernet frames capable of more than 1,500 bytes of payload (MTU). Enabling jumbo frames might improve performance on certain configurations. keep count 1. (Auto-Snapshot Manager) The maximum number of snapshots or replicas retained by a Smart Copy schedule. 2. (Group Manager) The user-established limit on the number of snapshots or replicas created by using a schedule on the PS Series group. latency The time required to complete a specific I/O operation.
Group Administration Glossary MPIO Acronym for multipath I/O. Multiple connections from an iSCSI initiator to targets on a PS Series Group over the network to provide redundancy and enhance performance. See device-specific module (DSM). MPIO properties tab (HIT) A EqualLogic-specific tab on the iSCSI Initiator properties page that provides status information about multipathing sessions. The ehcmn.log file is a rotating log file (such as ehcm0.log) containing the data displayed in the MPIO properties tab.
Group Administration Glossary RAID policy The type of RAID level (such as RAID 10 or RAID 6) that you configure for a member, coupled with the sparing policy (spares or no spares). read-only account (Group Manager) An administration account that only provides read-only access to group information. recovery volume Temporary volume created by promoting an inbound replica set as part of a failover operation. You can also create recovery template volumes and recovery thin clones. See promote.
Group Administration Glossary secondary group (Group Manager) In a replication configuration, the group that receives replicas of a source volume. See primary group. service tag (Group Manager) A unique ID assigned by Dell to particular equipment, for use by customer service. sessions (Group Manager) In an multipath configuration, the number of connections made to targets that span multiple members. The number of sessions can be configured to manage bandwith use.
Group Administration Glossary VDS provider (hardware) The EqualLogic VDS provider is a component of the Host Integration Tools that enables you use Microsoft Storage Manager for SANS to create and manage volumes in a PS Series Group. volume Storage allocated by a PS Series group as an addressable iSCSI target. volume collection (Group Manager) A number of volumes grouped together for purposes of performing operations on the volumes simultaneously. See also snapshot collection and replica collection.
Index A access control snapshot 11-2 access control records creating 9-6, 9-10 deleting 9-11 iSCSI target access 8-1 modifying 9-11 snapshot access 9-2 VDS/VSS access 4-12 volume access 9-2 access controls, iSCSI targets 8-1 accessing data snapshot 11-1 accounts (administration) attributes 4-4 group administrator 4-3 local 2-1, 4-5 creating 4-5 displaying 4-5 modifying 4-6 monitoring 15-3 pool administrator 4-3 RADIUS 4-7 attributes 4-7 configuring servers 4-10 disabling 4-11 prerequisites 4-9 read-only 4-3
Group Administration Index priorities 14-2 WARNING 14-2 D data accessing in a snapshot 11-1 data recovery example 13-3 failback 13-3 failover 13-3 methods 13-1, 13-2 date setting 5-4 dedicated management network, See management network default gateway management network 4-14 members 6-10 delegated space monitoring 15-10 over-provisioning 12-15 sizing 12-15 usage 12-11 demote converting volume to replica set 13-1, 13-11 diagnostics, collecting 15-33 disk drives monitoring 15-22 status 15-22 Displaying 6-1
Group Administration members 6-1 MIBs 14-6, 14-7 monitoring 15-1 name 5-5 network configuration 5-5 notification of events 14-2 pools 7-1 RAID support 6-4 removing members 6-14 scalability 1-3 security 1-4, 1-5 shutting down 5-6 SMTP servers 14-3 snapshots 11-1 SNMP access 4-11 user interfaces 3-1 VDS/VSS access 4-12 volumes 9-1 group IP address 5-5 modifying 5-5, 5-6 usage 5-5 GUI alarm notification 3-6 communication policies 3-6 controlling operation 3-5 event display 3-6 help location 3-7 icons 3-4 navi
Group Administration cache modes setting 6-12 write-back 6-11 write-through 6-11 cancelling pool move operation 7-3, 7-4 collecting diagnostics 15-33 displaying 6-1 firmware 6-12 disallowing downgrades 6-14 updating 6-13 flashing LEDs 15-17 monitoring 15-16, 15-17 batteries 15-21 channel cards 15-19 control modules 15-20 cooling modules 15-18 disk drives 15-22 EIP card 15-20 iSCSI connections 15-24 network 15-24 network configuration 15-24 power supplies 15-17, 15-18 temperature 15-19 network configuration
Group Administration setting snapshots 11-1 organization 2-xiii P partners monitoring 15-10 Performance Monitor changing the displayed statistics 15-29 closing a statistics panel 15-29 Performance Monitor, using 15-27 point-in-time 11-1 policy snapshot space recovery 11-2 pools creating 7-2 deleting 7-6 displaying 7-3 free space recommendation 15-15 merging 7-5 modifying description 7-5 modifying name 7-5 monitoring free space 15-15 monitoring move operations 15-14 moving members 7-4 moving volumes 7-5 or
Group Administration firmware requirements 12-16 manual transfer 12-3 monitoring 15-5, 15-7, 15-8 partners 12-16 pausing 12-30 recovering data 12-2 recovery volumes 13-9 resuming 12-30 scheduling 12-30 space 12-25 borrowing 12-8 delegated 12-11 failback snapshot 12-8 guidelines delegated space 12-15 local replication reserve 12-9, 12-10 replica reserve 12-14 local replication reserve 12-8 replica reserve 12-11, 12-12 replica volume reserve 12-12 requirements 12-7 usage 12-6 status 15-7, 15-8 volume collect
Group Administration displaying alias 11-10 handling lost blocks 10-17 introduction 11-1 iSCSI security 11-2 modifying contents of 11-2 modifying description 11-10 modifying name 11-10 modifying settings 11-3 monitoring 15-25 multi-host access 8-4, 8-6 disabling 11-11 enabling 11-11 naming 11-4 offline 11-1 preserving 11-2 recovering space 11-2 reserve allocation 11-2 restore volume from 11-1 restoring volumes 11-9 schedules 11-1 scheduling 11-3 set online 11-1 setting offline 11-11 setting online 11-11 se
Group Administration cloning 9-11 collections 10-10 controlling access 8-1 current status 15-25 data recovery 13-1 default settings 9-5 deleting 9-15 displaying 9-6 handling lost blocks 10-17 iSNS discovery disabling 9-14 enabling 9-14 modifying permission 9-14 modifying snapshot settings 11-3 monitoring 15-25 multi-host access 8-4, 8-6 disabling 9-6 enabling 9-6 naming 9-1 pool choosing 9-3 moving 7-5 protecting data 9-3 recovering data 12-2 replication 12-1 reported size 9-2 requested status 15-25 restor