Administrator Guide
Table Of Contents
- Dell EMC PowerVault ME4 Series Storage System Administrator’s Guide
- Contents
- Getting started
- New user setup
- Configure and provision a new storage system
- Using the PowerVault Manager interface
- System concepts
- About virtual and linear storage
- About disk groups
- About RAID levels
- About ADAPT
- About SSDs
- About SSD read cache
- About spares
- About pools
- About volumes and volume groups
- About volume cache options
- About thin provisioning
- About automated tiered storage
- About initiators, hosts, and host groups
- About volume mapping
- About operating with a single controller
- About snapshots
- About copying volumes
- About reconstruction
- About quick rebuild
- About performance statistics
- About firmware updates
- About managed logs
- About SupportAssist
- About CloudIQ
- About configuring DNS settings
- About replicating virtual volumes
- About the Full Disk Encryption feature
- About data protection with a single controller
- Working in the Home topic
- Guided setup
- Provisioning disk groups and pools
- Attaching hosts and volumes in the Host Setup wizard
- Overall system status
- Configuring system settings
- Managing scheduled tasks
- Working in the System topic
- Viewing system components
- Systems Settings panel
- Resetting host ports
- Rescanning disk channels
- Clearing disk metadata
- Updating firmware
- Changing FDE settings
- Configuring advanced settings
- Changing disk settings
- Changing system cache settings
- Configuring partner firmware update
- Configuring system utilities
- Using maintenance mode
- Restarting or shutting down controllers
- Working in the Hosts topic
- Working in the Pools topic
- Working in the Volumes topic
- Viewing volumes
- Creating a virtual volume
- Creating a linear volume
- Modifying a volume
- Copying a volume or snapshot
- Abort a volume copy
- Adding volumes to a volume group
- Removing volumes from a volume group
- Renaming a volume group
- Remove volume groups
- Rolling back a virtual volume
- Deleting volumes and snapshots
- Creating snapshots
- Resetting a snapshot
- Creating a replication set from the Volumes topic
- Initiating or scheduling a replication from the Volumes topic
- Manage replication schedules from the Volumes topic
- Working in the Mappings topic
- Working in the Replications topic
- About replicating virtual volumes in the Replications topic
- Replication prerequisites
- Replication process
- Creating a virtual pool for replication
- Setting up snapshot space management in the context of replication
- Replication and empty allocated pages
- Disaster recovery
- Accessing the data while keeping the replication set intact
- Accessing the data from the backup system as if it were the primary system
- Disaster recovery procedures
- Viewing replications
- Querying a peer connection
- Creating a peer connection
- Modifying a peer connection
- Deleting a peer connection
- Creating a replication set from the Replications topic
- Modifying a replication set
- Deleting a replication set
- Initiating or scheduling a replication from the Replications topic
- Stopping a replication
- Suspending a replication
- Resuming a replication
- Manage replication schedules from the Replications topic
- About replicating virtual volumes in the Replications topic
- Working in the Performance topic
- Working in the banner and footer
- Banner and footer overview
- Viewing system information
- Viewing certificate information
- Viewing connection information
- Viewing system date and time information
- Viewing user information
- Viewing health information
- Viewing event information
- Viewing capacity information
- Viewing host information
- Viewing tier information
- Viewing recent system activity
- Other management interfaces
- SNMP reference
- Using FTP and SFTP
- Using SMI-S
- Using SLP
- Administering a log-collection system
- Best practices
- System configuration limits
- Glossary of terms
where key-file-name is the name of the security key file for your specific system.
7. Restart both Management Controllers to have the new security certificate take effect.
Using SMI-S
This appendix provides information for network administrators who are managing the storage system from a storage
management application through the Storage Management Initiative Specification (SMI-S). SMI-S is a Storage Networking
Industry Association (SNIA) standard that enables interoperable management for storage networks and storage devices.
NOTE: SMI-S is not supported for a system with 5U84 enclosures.
SMI-S replaces multiple disparate managed object models, protocols, and transports with a single object-oriented model for
each type of component in a storage network. The specification was created by SNIA to standardize storage management
solutions. SMI-S enables management applications to support storage devices from multiple vendors quickly and reliably because
they are no longer proprietary. SMI-S detects and manages storage elements by type, not by vendor.
The key SMI-S components are:
● Web-based Enterprise Management (WBEM). A set of management and internet standard technologies developed to unify
the management of enterprise computing environments. WBEM includes the following specifications:
○ CIM XML: defines XML elements, conforming to DTD, which can be used to represent CIM classes and instances
○ CIMxml Operations over HTTP/HTTPS: defines a mapping of CIM operations onto HTTP/HTTPS; used as a transport
mechanism
● Common Information Model (CIM). The data model for WBEM. Provides a common definition of management information
for systems, networks, applications and services, and allows for vendor extensions. SMI-S is the interpretation of CIM for
storage. It provides a consistent definition and structure of data, using object-oriented techniques. The standard language
used to define elements of CIM is MOF.
● Service Location Protocol (SLP). Enables computers and other devices to find services in a local area network without prior
configuration. SLP has been designed to scale from small, unmanaged networks to large enterprise networks.
Embedded SMI-S array provider
The embedded SMI-S array provider provides an implementation of SMI-S 1.5 using cim-xml over HTTP/HTTPS. The provider
supports the Array and Server profiles with additional (or supporting) subprofiles. The Server profile provides a mechanism
to tell the client how to connect and use the embedded provider. The Array profile has the following supporting profiles and
subprofiles:
● Array profile
● Block Services package
● Physical Package package
● Health package
● Multiple Computer System subprofile
● Masking and Mapping profile
● FC Initiator Ports profile
● SAS Initiator Ports profile
● iSCSI Initiator Ports profile
● Disk Drive Lite profile
● Extent Composition subprofile
● Storage Enclosure profile
● Fan profile
● Power Supply profile
● Sensors profile
● Access Points subprofile
● Location subprofile
● Software Inventory subprofile
● Block Server Performance subprofile
● Copy Services subprofile
● Job Control subprofile
164
Other management interfaces