Administrator Guide
Table Of Contents
- Dell EMC PowerVault ME4 Series Storage System Administrator’s Guide
- Contents
- Getting started
- New user setup
- Configure and provision a new storage system
- Using the PowerVault Manager interface
- System concepts
- About virtual and linear storage
- About disk groups
- About RAID levels
- About ADAPT
- About SSDs
- About SSD read cache
- About spares
- About pools
- About volumes and volume groups
- About volume cache options
- About thin provisioning
- About automated tiered storage
- About initiators, hosts, and host groups
- About volume mapping
- About operating with a single controller
- About snapshots
- About copying volumes
- About reconstruction
- About quick rebuild
- About performance statistics
- About firmware updates
- About managed logs
- About SupportAssist
- About CloudIQ
- About configuring DNS settings
- About replicating virtual volumes
- About the Full Disk Encryption feature
- About data protection with a single controller
- Working in the Home topic
- Guided setup
- Provisioning disk groups and pools
- Attaching hosts and volumes in the Host Setup wizard
- Overall system status
- Configuring system settings
- Managing scheduled tasks
- Working in the System topic
- Viewing system components
- Systems Settings panel
- Resetting host ports
- Rescanning disk channels
- Clearing disk metadata
- Updating firmware
- Changing FDE settings
- Configuring advanced settings
- Changing disk settings
- Changing system cache settings
- Configuring partner firmware update
- Configuring system utilities
- Using maintenance mode
- Restarting or shutting down controllers
- Working in the Hosts topic
- Working in the Pools topic
- Working in the Volumes topic
- Viewing volumes
- Creating a virtual volume
- Creating a linear volume
- Modifying a volume
- Copying a volume or snapshot
- Abort a volume copy
- Adding volumes to a volume group
- Removing volumes from a volume group
- Renaming a volume group
- Remove volume groups
- Rolling back a virtual volume
- Deleting volumes and snapshots
- Creating snapshots
- Resetting a snapshot
- Creating a replication set from the Volumes topic
- Initiating or scheduling a replication from the Volumes topic
- Manage replication schedules from the Volumes topic
- Working in the Mappings topic
- Working in the Replications topic
- About replicating virtual volumes in the Replications topic
- Replication prerequisites
- Replication process
- Creating a virtual pool for replication
- Setting up snapshot space management in the context of replication
- Replication and empty allocated pages
- Disaster recovery
- Accessing the data while keeping the replication set intact
- Accessing the data from the backup system as if it were the primary system
- Disaster recovery procedures
- Viewing replications
- Querying a peer connection
- Creating a peer connection
- Modifying a peer connection
- Deleting a peer connection
- Creating a replication set from the Replications topic
- Modifying a replication set
- Deleting a replication set
- Initiating or scheduling a replication from the Replications topic
- Stopping a replication
- Suspending a replication
- Resuming a replication
- Manage replication schedules from the Replications topic
- About replicating virtual volumes in the Replications topic
- Working in the Performance topic
- Working in the banner and footer
- Banner and footer overview
- Viewing system information
- Viewing certificate information
- Viewing connection information
- Viewing system date and time information
- Viewing user information
- Viewing health information
- Viewing event information
- Viewing capacity information
- Viewing host information
- Viewing tier information
- Viewing recent system activity
- Other management interfaces
- SNMP reference
- Using FTP and SFTP
- Using SMI-S
- Using SLP
- Administering a log-collection system
- Best practices
- System configuration limits
- Glossary of terms
Table 36. Life cycle indications (continued)
Profile or
subprofile
Element description and name WQL or
CQL
Send life cycle indication when a create or delete operation completes for a volume, LUN, or
snapshot.
Masking and
Mapping
SELECT * FROM CIM_InstCreation WHERE SourceInstance ISA
CIM_AuthorizedSubject
Send life cycle indication when a host privilege is created or deleted.
Both
Masking and
Mapping
SELECT * FROM CIM_InstCreation WHERE SourceInstance ISA
CIM_ProtocolController
Send life cycle indication when create/delete storage hardware ID (add/remove hosts).
Both
Masking and
Mapping
SELECT * FROM CIM_InstCreation WHERE SourceInstance ISA
CIM_ProtocolControllerForUnit
Send life cycle indication when a LUN is created, deleted, or modified.
Both
Multiple
Computer
System
SELECT * FROM CIM_InstCreation WHERE SourceInstance ISA
CIM_ComputerSystem
Send life cycle indication when a controller is powered on or off.
Both
Multiple
Computer
System
SELECT * FROM CIM_InstModification WHERE SourceInstance
ISA CIM_ComputerSystem AND SourceInstance.OperationalStatus <>
PreviousInstance.OperationalStatus
Send life cycle indication when a logical component degrades or upgrades the system.
WQL
Multiple
Computer
System
SELECT * FROM CIM_InstModification WHERE SourceInstance
ISA CIM_RedundancySet AND SourceInstance.RedundancyStatus <>
PreviousInstance.RedundancyStatus
Send life cycle indication when the controller active-active configuration changes.
WQL
Target Ports
SELECT * FROM CIM_InstCreation WHERE SourceInstance ISA CIM_FCPort
Send life cycle indication when a target port is created or deleted.
Both
Target Ports
SELECT * FROM CIM_InstModification WHERE SourceInstance
ISA CIM_FCPort AND SourceInstance.OperationalStatus <>
PreviousInstance.OperationalStatus
Send life cycle indication when the status of a target port changes.
WQL
SMI-S configuration
In the default SMI-S configuration, the secure SMI-S protocol is enabled. The secure SMI-S protocol is the recommended
protocol for SMI-S.
Table 37. CLI commands for SMI-S protocol configuration
Action CLI command
Enable secure SMI-S port 5989 (and disable port 5988) set protocols smis enabled
Disable secure SMI-S port 5989 set protocols smis disabled
Enable unsecure SMI-S port 5988 (and disable port 5989) set protocols usmis disabled
Enable unsecure SMI-S port 5988 set protocol usmis enabled
See the current status show protocols
Reset all configurations reset smis-configurations
Other management interfaces 169