book.
book.book Page 2 Tuesday, June 18, 2013 3:03 PM Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. ____________________ © 2013 Dell Inc.
book.book Page 3 Tuesday, June 18, 2013 3:03 PM Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . About This Document . . . . . . . . . . . . . . . . . . Inside the Box of the Dell PowerVault MD3600f Series Storage Array. . . . . . . . . . . . . . . 22 . . . . . . . . . . 22 . . . . . . . . . . . 22 . . . . . . . . . . . . 23 Dell PowerVault Modular Disk Storage Manager . . . . . . . 2 Planning: About Your Storage Array . Overview . . . . 25 . . . . . . . . . . . . . .
book.book Page 4 Tuesday, June 18, 2013 3:03 PM RAID Controller Module Connectors and Features Host Channel LED Link/Rate Indications . . . 34 . . . . . . . . 36 . . . . 36 . . . . . . . . . . . . . . . . 36 RAID Controller Module—Additional Features . Battery Backup Unit Storage Array Thermal Shutdown System Password Reset . . . . . . . . . 37 . . . . . . . . . . . . . . 37 . . . . . . . . . . . . . 37 . . . . . . . . . . . . . . . . . . 37 Cache Functions and Features .
book.book Page 5 Tuesday, June 18, 2013 3:03 PM Virtual Disk Initialization . . . . . . . . . . . . . . Background Initialization . 47 . . . . . . . . . . . . . 48 . . . . . . . . . . . . . . 48 Consistency Check . . . . . . . . . . . . . . . . . 48 Media Verification . . . . . . . . . . . . . . . . . 48 . . . . . . . . . . . . . . . . . . . . . 49 Foreground Initialization Cycle Time Virtual Disk Operations Limit Disk Group Operations. . . . . . . . . . . . . 49 . . . . . . . . . . .
book.book Page 6 Tuesday, June 18, 2013 3:03 PM Load Balancing. . . . . . . . . . . . . . . . . . . . . . Monitoring MD3600f Series System Performance 5 Configuration: Overview User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 65 . . . . . . . . . 66 . . . . . . . . . . . . 67 Configuration: About Your Storage Array . . . . . . . . . . . . . . . . . . . . . 69 . . . . . . . . . . . . . . . . . . . . . . 70 Storage Arrays Adding Storage Arrays . . . . .
book.book Page 7 Tuesday, June 18, 2013 3:03 PM Configuring SNMP Alerts . Battery Settings . . . . . . . . . . . . . 83 . . . . . . . . . . . . . . . . . . . . . 85 Setting the Storage Array RAID Controller Module Clocks . . . . . . . . . . . . . . . 7 Configuration: Event Monitor . . . . 86 . . . . . . . . . 87 Enabling or Disabling the Event Monitor . . . . . . . . 88 . . . . . . . . . . . . . . . . . . . . . . 88 . . . . . . . . . . . . . . . . . . . . . . . .
book.book Page 8 Tuesday, June 18, 2013 3:03 PM 9 Configuration: Disk Groups and Virtual Disks . . . . . . . . . . . . . . . . . . . . . 101 . . . . . . . 101 . . . . . . . . . . . . . . . 102 Creating Disk Groups and Virtual Disks . Creating Disk Groups Locating a Disk Group . . . . . . . . . . . . . . 104 Creating Virtual Disks . . . . . . . . . . . . . . . 104 Changing the Virtual Disk Modification Priority . . . . . . . . . . . . . . . Changing the Virtual Disk Cache Settings . . . .
book.book Page 9 Tuesday, June 18, 2013 3:03 PM Modifying and Removing Host-to-Virtual Disk Mapping . . . . . . . . . . . . . . . Changing Controller Ownership of the Virtual Disk . . . . . . . . . . . . . . . . . . . . 127 . . . . . . 128 Removing Host-to-Virtual Disk Mapping . Changing the RAID Controller Module Ownership of a Disk Group . . . . . . . . . . . . 129 . . . . . . 129 Changing the RAID Level of a Disk Group . . . . . Removing a Host-to-Virtual Disk Mapping Using Linux DMMP . . .
book.book Page 10 Tuesday, June 18, 2013 3:03 PM 10 Configuration: Premium Feature—Snapshot Virtual Disks Scheduling a Snapshot Virtual Disk . . . . . . 145 . . . . . . . . . 146 Common Reasons for Scheduling a Snapshot Virtual Disk . . . . . . . . . . . . . . . 146 Guidelines for Creating Snapshot Schedules . . . . . . . . . . . . . . . . . . . . . 147 Enabling and Disabling Snapshot Schedules . . . . . . . . . . . . . . . . . . . . .
book.book Page 11 Tuesday, June 18, 2013 3:03 PM Protecting Against a Failed Snapshot Rollback . . . . . . . . . . . . . . . . . . . . . . . 166 Previous Versions of the MD Storage Manager . . . . . . . . . . . . . . . . . . . . . . 166 . . . . . . . . . . . 166 Starting a Snapshot Rollback . Resuming a Snapshot Rollback . . . . . . . . . . 167 Canceling a Snapshot Rollback . . . . . . . . . . 168 11 Configuration: Premium Feature—Virtual Disk Copy Types of Virtual Disk Copies . . . . . . .
book.book Page 12 Tuesday, June 18, 2013 3:03 PM Storage Array Performance During Virtual Disk Copy . . . . . . . . . . Setting Copy Priority . . . . . . . . . . . 178 . . . . . . . . . . . . . . . . . 178 . . . . . . . . . . . . . 179 . . . . . . . . . . . . . . . 179 Stopping a Virtual Disk Copy Recopying a Virtual Disk . Preparing Host Servers to Recopy a Virtual Disk . . . . . . . . . . . . . . . . . . . . 180 . . . . . . . . . . . . 181 . . . . . . . . . . . . . . . . .
book.book Page 13 Tuesday, June 18, 2013 3:03 PM Virtual Disk Expansion With Remote Replication . . . . . . . . . . . . . . . . . Required Switch Zoning Configurations . . . . . . Zoning Guidelines for Remote Replication . Switch Cascading 189 190 . . . . 190 . . . . . . . . . . . . . . . . . 190 Journaling File Systems and Remote Replication . . . . . Setting Up and Managing Remote Replication . . . . . . . . . . . . . . . . 191 . . . . . . . . . . . . .
book.book Page 14 Tuesday, June 18, 2013 3:03 PM Resynchronizing Virtual Disks . . . . . . . . . . Normally Synchronized Virtual Disks . . . . . . . 204 . . . . . . . . 205 . . . . . . . . . . 207 Changing Synchronization Priority and Method . . . . . . . . . . . . Unsynchronized Virtual Disks . Automatically Resynchronizing Virtual Disks . . . 208 Manually Resynchronizing Virtual Disks . . . . . 208 Reversing Roles Between the Primary and Secondary Virtual Disks . . . . . . . . . . .
book.book Page 15 Tuesday, June 18, 2013 3:03 PM Using DM Multipathing Devices Prerequisites . . . . . . . . . . . . 220 . . . . . . . . . . . . . . . . . . . . 220 Device Mapper Configuration Steps . . . . . . . . 221 . . . . . . . . . . . . . 227 . . . . . . . . . . . . . . . . . . . . . 228 Limitations and Known Issues. Troubleshooting 15 Management: Firmware Downloads . . . . . . . . . . . . . . . . . . . . . . Downloading RAID Controller and NVSRAM Packages . . . . . . . . 229 229 . .
book.book Page 16 Tuesday, June 18, 2013 3:03 PM Hard Drives . . . . . . . . . . . . . . . . . . . . . . . Removing a Hard-Drive Blank . . . . . . . . . . 243 Installing a Hard-Drive Blank . . . . . . . . . . . 244 Removing a Hard Drive . . . . . . . . . . . . . . 244 Installing a Hard Drive . . . . . . . . . . . . . . 246 Removing a Hard Drive From a Hard-Drive Carrier . . . . . . . . . . . . . . . . 247 . . . . . . . . . . . 249 . . . . . . . . . . . . . . . .
book.book Page 17 Tuesday, June 18, 2013 3:03 PM Installing the Backplane 17 Management: Firmware Inventory Viewing the Firmware Inventory 267 . . . . . 269 269 269 . . . . . . . . . . . . . . . . Volume Shadow-Copy Service . 269 . . . . . . . . . . 19 Troubleshooting: Your Storage Array Software . . . . . . . . . . . . . . . . . . . 271 . . . . . . . . . . . . . . . . . . . . Device Health Conditions . . . . . . . . . . . . . . . . Storage Array Support Data . . . . . . . . . . . . . . .
book.book Page 18 Tuesday, June 18, 2013 3:03 PM Using Go To . . . . . . . . . . . . . . . . . . . . . . . Recovering From an Unresponsive Storage Array Condition. . . . . . . . . . . . . . . . Locating a Physical Disk . . . . . . 284 . . . . . . . . . . . . . . . 287 . . . . . . . . . . 287 . . . . . . . . . . . 288 . . . . . . . . . . . . . . . . . . 289 Locating an Expansion Enclosure . Capturing the State Information . SMrepassist Utility . Unidentified Devices . . . . . . . . . . . . .
book.book Page 19 Tuesday, June 18, 2013 3:03 PM Troubleshooting Hard Drives Troubleshooting Array and Expansion Enclosure Connections . . . . . . . . . . . . . . . . . 303 Troubleshooting a Wet Storage Array . . . . . . . . . . 304 . . . . . . . . . . . 305 Troubleshooting a Damaged Array Troubleshooting RAID Controller Modules Conditions. 21 Getting Help . . . . . . . . 306 . . . . . . . . . . . . . . . . . . . . . 306 . . . . . . . . . . . . . . . . . . . . .
book.
book.book Page 21 Tuesday, June 18, 2013 3:03 PM 1 Introduction NOTE: Unless specified, MD3600f Series represents Dell PowerVault MD3600f and Dell PowerVault MD3620f storage arrays. WARNING: See the Safety, Environmental, and Regulatory Information document for important safety information before following any procedures listed in this document. About This Document This guide familiarizes you with the functions of the Dell PowerVault MD3600f Series storage array.
book.
book.book Page 23 Tuesday, June 18, 2013 3:03 PM Other Information You May Need WARNING: See the safety and regulatory information that shipped with your system. Warranty information may be included within this document or as a separate document. • The Getting Started Guide provides an overview of setting up and cabling your storage array. • The Deployment Guide provides installation and configuration instructions for both software and hardware.
book.
book.book Page 25 Tuesday, June 18, 2013 3:03 PM 2 Planning: About Your Storage Array Overview The MD3600f Series storage array is designed for high availability, offering redundant access to data storage. It’s features support for both single and dual RAID controller configurations. The Dell PowerVault MD3600f Series storage array provides Fibre Channel (FC) connectivity to the host server and enables access for up to eight nonredundant servers or four redundant servers.
book.book Page 26 Tuesday, June 18, 2013 3:03 PM Hardware Features Front-Panel Features and Indicators Figure 2-1. Front-Panel Features and Indicators—Dell PowerVault MD3600f 1 2 3 4 5 6 Figure 2-2.
book.book Page 27 Tuesday, June 18, 2013 3:03 PM Figure 2-3. Front-Bezel Features and Indicators 1 2 3 Item Indicator, Button, or Connector 1 Enclosure status LED Icon Description The enclosure status LED lights when the enclosure power is on. Lights blue during normal operation. Blinks blue when a host server is identifying the enclosure or when the system identification button is pressed. Lights amber as enclosure boots or is reset.
book.book Page 28 Tuesday, June 18, 2013 3:03 PM Item Indicator, Button, or Connector Icon Description 3 Split mode LED This LED must be unlit as the split mode function is not supported by the MD3600f Series Storage Arrays. 4 System identification button The system identification button on the front control panel can be used to locate a particular enclosure within a rack.
book.book Page 29 Tuesday, June 18, 2013 3:03 PM Back Panel Features and Indicators Figure 2-4.
book.book Page 30 Tuesday, June 18, 2013 3:03 PM Hard–Drive Indicator Patterns Figure 2-5.
book.book Page 31 Tuesday, June 18, 2013 3:03 PM Drive-Status Indicator Pattern Condition Off The physical disk is: • not yet discovered by the host server • is spun down for removal • not supported for the RAID controller module or is not in the physical disk slot NOTE: The drive status indicator remains off until all hard drives are initialized after system power is turned on. Drives are not ready for insertion or removal during this time.
book.book Page 32 Tuesday, June 18, 2013 3:03 PM Power Indicator Codes and Features Figure 2-6. Power Indicator Codes and Features 1 2 3 4 5 Item LED Type 1 DC power Icon Description The LED lights green when the DC output voltage is within the limit. If this LED is off, it indicates that the DC output voltage are not within the limit. 2 Power supply/cooling fan fault The LED lights amber when the DC output voltage is not within the limit or a fault with the fan is detected.
book.book Page 33 Tuesday, June 18, 2013 3:03 PM 3 Planning: RAID Controller Modules RAID Controller Modules The RAID controller modules provide high-performance, advanced virtual disk configuration, and fault-tolerant disk subsystem management. Each RAID controller module contains 2 GB or 4 GB of mirrored cache for high availability and is protected by a battery powered cache offload mechanism. NOTE: The 4 GB mirrored cache is an optional feature.
book.book Page 34 Tuesday, June 18, 2013 3:03 PM RAID Controller Module Connectors and Features Figure 3-1. MD3600f Series Fibre Channel RAID Controller Module 1 2 21 20 3 4 19 18 17 16 15 14 13 6 5 12 11 7 10 9 8 Item Component Function 1 SAS OUT port Provides SAS connection for cabling to a downchain expansion enclosure. 2 FCIN port 0 Provides host-to-controller FC connection. 3 FCIN port 1 Provides host-to-controller FC connection.
book.book Page 35 Tuesday, June 18, 2013 3:03 PM Item Component Function 9 Management port Ethernet connector Provides a 100/1000 Mbps Ethernet connection for out-ofband management of the enclosure. 10 Management port speed LED Lights green when Ethernet connection is operating at 1000 Mbps. Lights amber when Ethernet connection is operating at 100 Mbps. Off when Ethernet connection is operating at 10 Mbps or is not active. 11 Password reset switch Activating this switch resets the password.
book.book Page 36 Tuesday, June 18, 2013 3:03 PM Item Component Function 20 FCIN port 0 LED 1 / LED 0 Displays link rate and port status per the accompanying host channel LED link/rate table. 21 SAS OUT port link/fault LED Lights green when all four links are connected. Lights amber when one to 3 links are disconnected. Off when all links in the port are disconnected or cable is disconnected. Host Channel LED Link/Rate Indications Below each FC port is a pair of LED indicators.
book.book Page 37 Tuesday, June 18, 2013 3:03 PM Storage Array Thermal Shutdown The system automatically shuts down when system temperature exceeds the safe threshold. The battery backup unit protects against data loss by providing power to offload cache to non-volatile memory in the event of power loss. It is not necessary to shut down any MD1200 Series expansion enclosures attached to the storage array when thermal shutdown occurs.
book.book Page 38 Tuesday, June 18, 2013 3:03 PM Write–Back Cache In write-back cache, write operations result in a completion signal being sent to the host operating system as soon as the cache receives the data to be written. The target physical disk receives the data at a more appropriate time in order to increase controller performance.
book.book Page 39 Tuesday, June 18, 2013 3:03 PM Figure 3-2. Fiber Optic Cable Connection 1 2 1 SFP transceiver 2 Fiber optic cable The RAID expansion ports support SAS expansion connections. Figure 3-3 shows a SAS cable and an SFF-8088 connector. Figure 3-3.
book.book Page 40 Tuesday, June 18, 2013 3:03 PM Interoperability of 2 Gbps, 4 Gbps, and 8 Gbps Devices The FC standard specifies a procedure for speedy auto-detection. If a 4 Gbps port on a switch or device is connected to a 2 Gbps port, it must negotiate down for the link to run at 2 Gbps. If there are two 8 Gbps ports on either end of a link, the negotiation runs the link at 8 Gbps if the link supports the required specifications.
book.book Page 41 Tuesday, June 18, 2013 3:03 PM 4 Planning: MD3600f Series Storage Array Terms and Concepts This chapter explains terms and concepts used for configuration and operation of MD3600f Series storage arrays. Physical Disks, Virtual Disks, and Disk Groups Physical disks in your storage array provide the physical storage capacity for your data.
book.book Page 42 Tuesday, June 18, 2013 3:03 PM Physical Disks Only Dell supported 6.0 Gbps SAS physical disks are supported in the storage array. If the storage array detects unsupported physical disks, it marks the disk as unsupported and the physical disk becomes unavailable for all operations. NOTE: The MD3600f Series storage array must contain at least two physical disks for proper operation. This is necessary because the physical disks are used to store configuration information.
book.book Page 43 Tuesday, June 18, 2013 3:03 PM Table 4-1. RAID Controller Physical Disk States (continued) Status Mode Description Physical Disk Status LED Pending Failure Assigned, Unassigned, Hot Spare in use, or Hot Spare standby A Self-Monitoring Analysis and Reporting Technology (SMART) error is detected on the physical disk in the indicated slot.
book.book Page 44 Tuesday, June 18, 2013 3:03 PM Disk groups are always created in the unconfigured capacity of a storage array. Unconfigured capacity is the available physical disk space not already assigned in the storage array. Virtual disks are created within the free capacity of a disk group. Free capacity is the space in a disk group that has not been assigned to a virtual disk. Virtual Disk States The storage array recognizes the following virtual disk states. Table 4-2.
book.book Page 45 Tuesday, June 18, 2013 3:03 PM RAID Levels RAID levels determine the way in which data is written to physical disks. Different RAID levels provide different levels of accessibility, redundancy, and capacity. Using multiple physical disks has the following advantages over using a single physical disk: • Placing data on multiple physical disks (striping) allows input/output (I/O) operations to occur simultaneously and improve performance.
book.book Page 46 Tuesday, June 18, 2013 3:03 PM RAID 0 RAID 0 uses disk striping to provide high data throughput, especially for large files in an environment that requires no data redundancy. RAID 0 breaks the data down into segments and writes each segment to a separate physical disk. I/O performance is greatly improved by spreading the I/O load across many physical disks. Although it offers the best performance of any RAID level, RAID 0 lacks data redundancy.
book.book Page 47 Tuesday, June 18, 2013 3:03 PM RAID 10 RAID 10, a combination of RAID 1 and RAID 0, uses disk striping across mirrored disks. It provides high data throughput and complete data redundancy. Utilizing an even number of physical disks (four or more) creates a RAID level 10 disk group and/or virtual disk. Because RAID levels 1 and 10 use disk mirroring, half of the capacity of the physical disks is utilized for mirroring.
book.book Page 48 Tuesday, June 18, 2013 3:03 PM Background Initialization The storage array executes a background initialization when the virtual disk is created to establish parity, while allowing full host server access to the virtual disks. Background initialization does not run on RAID 0 virtual disks. The background initialization rate is controlled by MDSM. To change the rate of background initialization, you must stop any existing background initialization.
book.book Page 49 Tuesday, June 18, 2013 3:03 PM Cycle Time The media verification operation runs only on selected disk groups, independent of other disk groups. Cycle time is the time taken to complete verification of the metadata region of the disk group and all virtual disks in the disk group for which media verification is configured. The next cycle for a disk group starts automatically when the current cycle completes.
book.book Page 50 Tuesday, June 18, 2013 3:03 PM Disk Group Operations RAID Level Migration You can migrate from one RAID level to another depending on your requirements. For example, fault-tolerant characteristics can be added to a stripe set (RAID 0) by converting it to a RAID 5 set. MDSM provides information about RAID attributes to assist you in selecting the appropriate RAID level.
book.book Page 51 Tuesday, June 18, 2013 3:03 PM Virtual Disk Capacity Expansion When you configure a virtual disk, you select a capacity based on the amount of data you expect to store. However, you may need to increase the virtual disk capacity for a standard virtual disk by adding free capacity to the disk group. This creates more unused space for new virtual disks or to expand existing virtual disks.
book.book Page 52 Tuesday, June 18, 2013 3:03 PM If a redundant RAID controller module fails with an existing disk group process, the process on the failed controller is transferred to the peer controller. A transferred process is placed in a suspended state if there is an active disk group process on the peer controller. The suspended processes are resumed when the active process on the peer controller completes or is stopped.
book.book Page 53 Tuesday, June 18, 2013 3:03 PM Virtual Disk Migration and Disk Roaming Virtual disk migration is moving a virtual disk or a hot spare from one array to another by detaching the physical disks and re-attaching them to the new array. Disk roaming is moving a physical disk from one slot to another on the same array. Disk Migration You can move virtual disks from one array to another without taking the target array offline.
book.book Page 54 Tuesday, June 18, 2013 3:03 PM Use either of the following methods to move disk groups and virtual disks: • Hot virtual disk migration—Disk migration with the destination storage array power turned on. • Cold virtual disk migration—Disk migration with the destination storage array power turned off. NOTE: To ensure that the migrating disk groups and virtual disks are correctly recognized when the target storage array has an existing physical disk, use hot virtual disk migration.
book.book Page 55 Tuesday, June 18, 2013 3:03 PM • Enabling premium features before migration—Before migrating disk groups and virtual disks, enable the required premium features on the destination storage array. If a disk group is migrated from a MD3600f storage array that has a premium feature enabled and the destination array does not have this feature enabled, an Out of Compliance error message may be generated. Disk Roaming You can move physical disks within an array.
book.book Page 56 Tuesday, June 18, 2013 3:03 PM You can manually configure a host server-to-virtual disk mapping. When you configure host server-to-virtual disk mapping, consider these guidelines: • You can define one host server-to-virtual disk mapping for each virtual disk in the storage array. • Host server-to-virtual disk mappings are shared between RAID controller modules in the storage array. • A unique LUN must be used by a host group or host server to access a virtual disk.
book.book Page 57 Tuesday, June 18, 2013 3:03 PM Snapshot Repository Virtual Disk When you create a snapshot virtual disk, it automatically creates a snapshot repository virtual disk. A snapshot repository is a virtual disk created in the storage array as a resource for a snapshot virtual disk. A snapshot repository virtual disk contains snapshot virtual disk metadata and copy-on-write data for a particular snapshot virtual disk. The repository supports one snapshot only.
book.book Page 58 Tuesday, June 18, 2013 3:03 PM Source Virtual Disk When you create a virtual disk copy, a copy pair consisting of a source virtual disk and a target virtual disk is created on the same storage array. When a virtual disk copy is started, data from the source virtual disk is copied completely to the target virtual disk. Target Virtual Disk When you start a virtual disk copy, the target virtual disk maintains a copy of the data from the source virtual disk.
book.book Page 59 Tuesday, June 18, 2013 3:03 PM Using Snapshot and Disk Copy Together You can use the Snapshot Virtual Disk and Virtual Disk Copy premium features together to back up data on the same storage array, or to restore the data on the snapshot virtual disk to its original source virtual disk.
book.
book.book Page 61 Tuesday, June 18, 2013 3:03 PM • Round robin with subset—The round robin with subset I/O load balance policy routes I/O requests, in rotation, to each available data path to the RAID controller module that owns the virtual disks. This policy treats all paths to the RAID controller module that owns the virtual disk equally for I/O activity. Paths to the secondary RAID controller module are ignored until ownership changes.
book.book Page 62 Tuesday, June 18, 2013 3:03 PM • Using the Performance Monitor to retrieve performance data can affect the normal storage array performance depending on the polling interval that you set. • If the storage array you are monitoring begins in or transitions to an unresponsive state, an informational dialog is displayed. The dialog informs you that the Performance Monitor cannot poll the storage array for performance data.
book.book Page 63 Tuesday, June 18, 2013 3:03 PM 9 Select an appropriate directory. 10 Type a file name in the File name text box. NOTE: The .perf extension is the default. 11 Select a file type from the Files of type list. • Use the Report format (ASCII text) file type to save the data to a report form for viewing or printing. • Use the Comma Delimited Format file type to save the data in a form that can be imported into a commercial spreadsheet application for further analysis.
book.
book.book Page 65 Tuesday, June 18, 2013 3:03 PM Configuration: Overview 5 Dell PowerVault Modular Disk Storage Manager (MDSM) online help contains information on how to use the MDSM application to perform the configuration and management tasks described in this document. You can access online help by selecting Help located at the top right corner of MDSM interface. For information on installing the MDSM, see the MD3600f and MD3620f Storage Array’s Deployment Guide at dell.com/support/manuals.
book.book Page 66 Tuesday, June 18, 2013 3:03 PM Enterprise Management Window The EMW provides high-level management of storage arrays. When you start MDSM, the EMW is displayed. The EMW has these tabs: • Devices tab—Provides information about the storage arrays. • Setup tab—Presents the initial setup tasks that guide you through adding storage arrays and configuring alerts.
book.book Page 67 Tuesday, June 18, 2013 3:03 PM Inheriting the System Settings Use the Inherit System Settings option to import the operating system theme settings into the MDSM. Importing system theme settings affects features like font type, font size, color, and contrast in the MDSM. 1 Open the Inherit System Settings window in one of these ways: • Select ToolsInherit System Settings. • Select the Setup tab and click Inherit System Settings. 2 Select Inherit system settings for color and font.
book.book Page 68 Tuesday, June 18, 2013 3:03 PM • Physical tab—You can view the organization of the storage array by RAID controller modules, physical disks, and other hardware components. • Mappings tab—You can define the hosts, host groups, and host ports. You can change the mappings to grant virtual disk access to host groups and hosts and create storage partitions. • Setup tab—You can complete the initial setup tasks to configure the storage array.
book.book Page 69 Tuesday, June 18, 2013 3:03 PM 6 Configuration: About Your Storage Array You can manage a storage array in two ways: • Out-of-band management • In-band management Out-of-Band Management Using the out-of-band management method, data is separated from commands and events. Data travels through the host-to-controller interface, while commands and events travel through the management port Ethernet cables.
book.book Page 70 Tuesday, June 18, 2013 3:03 PM When you add storage arrays by using this management method, you need to specify only the host name or IP address of the host. After you add the specific host name or IP address, the host-agent software automatically detects any storage arrays that are connected to that host. CAUTION: Some operating systems can be used only as storage management stations.
book.book Page 71 Tuesday, June 18, 2013 3:03 PM Automatic Discovery of Storage Arrays The Automatic Discovery process sends out a broadcast message across the local subnetwork (subnet) and adds any storage array that responds to the message. The Automatic Discovery process finds both in-band and out-ofband storage arrays. NOTE: The Automatic Discovery option and the Re-scan Hosts option in the Enterprise Management Window provide automatic methods to discover managed storage arrays.
book.book Page 72 Tuesday, June 18, 2013 3:03 PM • In the EMW, select the Setup tab, and select Name/Rename Storage Arrays. • In the AMW, select the Setup tab, and select Rename Storage Array. • In the EMW, right-click the icon corresponding to the array and select Rename. Setting Up Your Storage Array A list of initial setup tasks is displayed on the Setup tab in the AMW. The list of initial setup tasks shows you how to set up a storage array.
book.book Page 73 Tuesday, June 18, 2013 3:03 PM • Manually define hosts—Define the hosts and the host port identifiers that are connected to the storage array. Use this option only if the host is not automatically recognized and shown in the Mappings tab. • Configure ethernet management ports—Configure the network parameters for the Ethernet management ports on the RAID controller modules if you are managing the storage array by using the out-of-band management connections.
book.book Page 74 Tuesday, June 18, 2013 3:03 PM To rename a selected storage array: 1 Perform one of these actions: • In the AMW Setup tab, select Rename Storage Array. • In the EMW Devices tab Tree view, select EditRename. • In the EMW Devices tab Table view, select EditRename. • In the EMW Devices tab Tree view, right-click on the desired array icon and select Rename. The Name/Rename Storage Arrays dialog is displayed. 2 Select the relevant storage array from the Select storage array table.
book.book Page 75 Tuesday, June 18, 2013 3:03 PM Setting a Password You can configure each storage array with a password to protect it from unauthorized access. MDSM prompts for the password when an attempt is made to change the storage array configuration, such as, when a virtual disk is created or deleted. View operations do not change the storage array configuration and do not require a password. You can create a new password or change an existing password.
book.book Page 76 Tuesday, June 18, 2013 3:03 PM Password Guidelines Follow these guidelines when you create a password: • Use secure passwords for your storage array. A password must be easy for you to remember but difficult for others to determine. Consider using numbers or special characters in the place of letters, such as a 1 in the place of the letter I, or the at sign (@) in the place of the letter a. • For increased protection, use a long password with at least 15 alphanumeric characters.
book.book Page 77 Tuesday, June 18, 2013 3:03 PM Adding/Editing a Comment to an Existing Storage Array A descriptive comment, with an applicable storage array name, is a helpful identification tool. You can add or edit a comment for a storage array in the EMW only. To add or edit a comment: 1 In the EMW, select the Devices tab and select the relevant managed storage array. 2 Select EditComment. The Edit Comment dialog is displayed. 3 Type a 60-character comment. 4 Click OK.
book.book Page 78 Tuesday, June 18, 2013 3:03 PM Enabling Premium Features You can enable premium features on the storage array. To enable the premium features, you must obtain a feature key file specific to the premium feature that you want to enable from your storage supplier. To enable premium features: 1 From the toolbar in AMW, select Storage ArrayPremium Features. The Premium Features and Feature Pack Information window is displayed. 2 Select the relevant premium feature, and click Enable.
book.book Page 79 Tuesday, June 18, 2013 3:03 PM Changing the Cache Settings on the Storage Array 1 In the AMW, select Storage ArrayChangeCache Settings. The Change Cache Settings window is displayed. 2 Select or enter the percentage of unwritten data in the cache to trigger a cache flush in Start flushing. 3 Select or enter the percentage of unwritten data in the cache to stop a cache flush in progress in Stop flushing. 4 Select the appropriate Cache block size.
book.book Page 80 Tuesday, June 18, 2013 3:03 PM Changing the Enclosure Order in the Physical Pane You can change the order of the RAID controller modules and the expansion enclosures in the Physical pane to match the hardware configuration in your storage array. The Physical pane that initially is displayed is a default view that may not match your storage array. The enclosure order change remains in effect until it is modified again.
book.book Page 81 Tuesday, June 18, 2013 3:03 PM To configure alert notifications for a single storage array: 1 In the EMW, select the Devices tab. 2 Select the relevant storage array, then select EditConfigureAlerts. The Configure Alerts dialog is displayed. To configure e-mail alerts, see "Configuring E–mail Alerts" on page 81. To configure SNMP alerts, see "Configuring SNMP Alerts" on page 83.
book.book Page 82 Tuesday, June 18, 2013 3:03 PM The SMTP mail server is the name of the mail server that forwards the alert e-mails to the configured e-mail addresses. 5 In E-mail sender address, type the valid sender e-mail address. The e-mail address of the sender (the network administrator) is displayed on each e-mail alert sent to the destination.
book.book Page 83 Tuesday, June 18, 2013 3:03 PM 9 For the selected e-mail address, in Frequency, select: • Every event—Sends an alert e-mail whenever an event occurs. This is the default option. • Every x hours—Sends an alert e-mail after the specified time interval if an event occurred during that time interval. You can select this option only if you have selected either Event + Profile or Event + Support in the Information To Send drop down list. 10 Click OK.
book.book Page 84 Tuesday, June 18, 2013 3:03 PM These results occur, depending on your selection: • If you select all storage arrays, the Configure Alerts dialog is displayed. • If you select an individual storage array, the Select Storage Array dialog is displayed. Select the storage array for which you want to receive alert notifications and click OK. The Configure Alerts dialog is displayed. NOTE: If you do not know which storage array to select, click Blink to turn on the LEDs of the storage array.
book.book Page 85 Tuesday, June 18, 2013 3:03 PM Follow these guideline for SNMP alerts: • Any SNMP addresses that you had previously configured are displayed in the Configured SNMP addresses area. • The SNMP Community Name is determined by the system administrator and configured within the management application, such as the Dell Management Console. More information about the Dell Management Console is available at dell.com. • You can configure multiple SNMP addresses before you click OK.
book.book Page 86 Tuesday, June 18, 2013 3:03 PM To change the battery settings perform these steps: 1 In the AMW, select Storage ArrayChangeBattery Settings. The Battery Settings dialog is displayed. 2 In Battery location, select a battery. 3 Check these details about the battery: • Battery status • Battery age • Days until replacement For more information, see the PowerVault Modular Disk Storage Manager online help topics.
book.book Page 87 Tuesday, June 18, 2013 3:03 PM Configuration: Event Monitor 7 An event monitor is provided with Dell PowerVault Modular Disk Storage Manager (MDSM). The event monitor runs continuously in the background and monitors activity on the managed storage arrays. If the event monitor detects any critical problems, it can notify a host or remote system using email, Simple Network Management Protocol (SNMP) trap messages, or both.
book.book Page 88 Tuesday, June 18, 2013 3:03 PM Enabling or Disabling the Event Monitor You can enable or disable the event monitor at any time. Disable the event monitor if you do not want the system to send alert notifications. If you are running the event monitor on multiple systems, disabling the event monitor on all but one system prevents the sending of duplicate messages.
book.book Page 89 Tuesday, June 18, 2013 3:03 PM Configuration: About Your Host 8 Configuring Host Access Dell PowerVault Modular Disk Storage Manager (MDSM) software is comprised of multiple modules. One of these modules is the Host Context Agent. The host context agent is installed as part of the MDSM installation and runs continuously in the background.
book.book Page 90 Tuesday, June 18, 2013 3:03 PM The host topology is reconfigurable. You can perform the following tasks: • Create a host and assign an alias or user label. • Add or associate a new host port identifier to a particular host. • Change the host port identifier alias or user label. • Move or associate a host port identifier to a different host. • Replace a host port identifier with a new host port identifier.
book.book Page 91 Tuesday, June 18, 2013 3:03 PM To define a host: 1 In the AMW, select the Mappings tab and select the appropriate storage array. 2 Perform one of the actions: • Select MappingsDefineHost. • Select the Setup tab, and click Manually Define Hosts. • Select the Mappings tab. Right-click the root node (storage array name), Default Group node, or Host Group node in the Topology pane to which you want to add the host, and select DefineHost from the pop-up menu.
book.book Page 92 Tuesday, June 18, 2013 3:03 PM • No—this host does NOT share access to the same virtual disks with other hosts. 9 Click Next. If you select Yes, the Specify Host Group window is displayed. If you select No, see step 11 10 Enter the name of the host group or select an existing host group and click Next. The Preview window is displayed. 11 Click Finish. Removing Host Access 1 In the AMW, select the Mappings tab, select the host node in the Topology pane.
book.book Page 93 Tuesday, June 18, 2013 3:03 PM Creating a Host Group 1 In the AMW, select the Mappings tab. 2 In the Topology pane, select the storage array or the Default Group. 3 Perform one of the following actions: • Select MappingsDefineHost Group • Right-click the storage array or the Default Group, and select DefineHost Group from the pop-up menu. 4 Type the name of the new host group in Enter new host group name. 5 Select the appropriate hosts in the Select hosts to add area.
book.book Page 94 Tuesday, June 18, 2013 3:03 PM Moving a Host to a Different Host Group 1 In the AMW, select the Mappings tab, select the host node in the Topology pane. 2 Perform one of these actions: • Select MappingsMove. • Right-click the host node, and select Move from the pop-up menu. The Move Host dialog is displayed. 3 In the Select host group, select the host group to which you want to move the host. The Move Host Confirmation dialog is displayed. 4 Click Yes.
book.book Page 95 Tuesday, June 18, 2013 3:03 PM Host Topology Host topology is the organization of hosts, host groups, and host interfaces configured for a storage array. You can view the host topology in the Mappings tab of the AMW. For more information, see "Using the Mappings Tab" on page 90.
book.book Page 96 Tuesday, June 18, 2013 3:03 PM Windows To start or stop the host context agent: 1 Click StartSettingsControl PanelAdministrative Tools Services. or Click StartAdministrative ToolsServices. 2 From the list of services, select Modular Disk Storage Manager Agent. 3 If the host context agent is running, click Action Stop, then wait approximately 5 seconds. 4 Click Action Start. I/O Data Path Protection You can have multiple host-to-array connections for a host.
book.book Page 97 Tuesday, June 18, 2013 3:03 PM For more information on Linux DM, see "Configuration: Device Mapper Multipath for Linux" on page 219. For more information on MPIO, see microsoft.com. NOTE: You must have the multi-path driver installed on the hosts at all times, even in a configuration where there is only one path to the storage system, such as a single port cluster configuration.
book.book Page 98 Tuesday, June 18, 2013 3:03 PM To manage a host port identifier: 1 Perform one of these actions: • Right-click the host in the Topology pane, and select Manage Host Port Identifiers in the pop-up menu. • From the menu bar, select Mappings Manage Host Port Identifiers. The Manage Host Port Identifiers dialog is displayed.
book.book Page 99 Tuesday, June 18, 2013 3:03 PM 8 Select the host port identifier that you would like to manage from the list of host port identifiers in the Host port identifier information area. 9 Perform one of these actions for the selected host port identifier: • To edit the host port identifier—Select the appropriate host port identifier and click Edit, the Edit Host Port Identifier dialog is displayed, update User label and Associated with host and click Save.
book.
book.book Page 101 Tuesday, June 18, 2013 3:03 PM Configuration: Disk Groups and Virtual Disks 9 Creating Disk Groups and Virtual Disks Disk groups are created in the unconfigured capacity of a storage array, and virtual disks are created in the free capacity of a disk group. The maximum number of physical disks supported in a disk group is 30. The hosts attached to the storage array read and write data to the virtual disks.
book.book Page 102 Tuesday, June 18, 2013 3:03 PM A disk group must be organized according to its related tasks and subtasks. For example, if you create a disk group for the Accounting Department, you can create virtual disks that match the different types of accounting transactions performed in the department: Accounts Receivable (AR), Accounts Payable (AP), internal billing, and so forth. In this scenario, the AR and AP virtual disks probably need more capacity than the internal billing virtual disk.
book.book Page 103 Tuesday, June 18, 2013 3:03 PM 3 Type the name of the disk group (up to 30 characters) in Disk group name. 4 Select the appropriate Physical Disk selection choices, you can select: • Automatic, see step 6 • Manual, see step 9 5 Click Next. 6 For Automatic configuration, the RAID Level and Capacity window is displayed. 7 Select the appropriate RAID level in Select RAID level. You can select RAID levels 0, 1/10, 6, and 5.
book.book Page 104 Tuesday, June 18, 2013 3:03 PM Locating a Disk Group You can physically locate and identify all of the physical disks that comprise a selected disk group. An LED blinks on each physical disk in the disk group. To locate a disk group: 1 In the AMW, select the Logical tab. 2 Select the appropriate disk group and from the toolbar select Disk GroupBlink. The LEDs for the selected disk group blink. 3 After locating the disk group, click OK. The LEDs stop blinking.
book.book Page 105 Tuesday, June 18, 2013 3:03 PM NOTE: Ensure that you create disk groups before creating virtual disks. To create virtual disks: 1 Choose one of these methods to start the Create Virtual Disk Wizard: • To create a virtual disk from unconfigured capacity in the storage array—On the Logical tab, select an Unconfigured Capacity node, and select Virtual DiskCreate. Alternatively, you can right-click the Unconfigured Capacity node, and select Create Virtual Disk from the pop-up menu.
book.book Page 106 Tuesday, June 18, 2013 3:03 PM 5 In Advanced virtual disk parameters, you can select: • Use recommended settings. • Customize settings. 6 Click Next. 7 In the Customize Advanced Virtual Disk Parameters window, select the appropriate Virtual Disk I/O characteristics type. You can select: • File system (typical) • Database • Multimedia • Custom NOTE: If you select Custom, you must select an appropriate segment size.
book.book Page 107 Tuesday, June 18, 2013 3:03 PM To change the virtual disk modification priority: 1 In the AMW, select the Logical tab. 2 Select a virtual disk. 3 In the toolbar, select Virtual DiskChangeModification Priority. The Change Modification Priority window is displayed. 4 Select one or more virtual disks. To select nonadjacent virtual disks, press click. To select adjacent virtual disks, press click. To select all of the available virtual disks, click Select All.
book.book Page 108 Tuesday, June 18, 2013 3:03 PM To change the virtual disk cache settings: 1 In the AMW, select the Logical tab and select a virtual disk. 2 In the toolbar, select Virtual DiskChangeCache Settings. The Change Cache Settings window is displayed. 3 Select one or more virtual disks. To select nonadjacent virtual disks, press click. To select adjacent virtual disks, press click. To select all of the available virtual disks, click Select All.
book.book Page 109 Tuesday, June 18, 2013 3:03 PM 5 Click OK. A message prompts you to confirm the change in the virtual disk modification priority. 6 Click Yes. 7 Click OK. Changing the Segment Size of a Virtual Disk You can change the segment size on a selected virtual disk. During this operation, I/O performance is affected, but your data remains available. Guidelines to proceed with changing the segment size: • You cannot cancel this operation after it starts.
book.book Page 110 Tuesday, June 18, 2013 3:03 PM To change the segment size of a virtual disk: 1 In the AMW, select the Logical tab and select a virtual disk. 2 Select Virtual DiskChangeSegment Size. 3 Select the required segment size. A message prompts you to confirm the selected segment size. 4 Click Yes. The segment size modification operation begins. The virtual disk icon in the Logical pane shows an Operation in Progress status while the operation is taking place.
book.book Page 111 Tuesday, June 18, 2013 3:03 PM To change the I/O type: 1 Select from these virtual disk I/O characteristic types, based on your application needs: • File system (typical) • Database • Multimedia • Custom The corresponding dynamic cache read prefetch setting and segment size values that are typically well suited for the selected virtual disk I/O characteristic type are populated in the Dynamic cache read prefetch and Segment size fields.
book.book Page 112 Tuesday, June 18, 2013 3:03 PM Physical Disk Security With Self Encrypting Disk Self encrypting disk (SED) technology prevents unauthorized access to the data on a physical disk that is physically removed from the storage array. The storage array has a security key. Self encrypting disks provide access to data only through an array that has the correct security key. The self encrypting disk or a security capable physical disk encrypts data during writes and decrypts data during reads.
book.book Page 113 Tuesday, June 18, 2013 3:03 PM Table 9-1 shows how to interpret the security status of a disk group. Table 9-1. Interpreting Security Status of a Disk Group Secure Security Capable–Yes Security Capable–No Yes The disk group is composed of all Not applicable. Only SED SED physical disks and is in a physical disks can be in a Secure Secure state. state. No The disk group is composed of all The disk group is not entirely SED physical disks and is in a composed of SED physical disks.
book.book Page 114 Tuesday, June 18, 2013 3:03 PM The Secure Physical Disks option is inactive with a check mark on the left if the disk group is already security enabled. The Create a secure disk group option is displayed in the Create Disk Group Wizard - Disk Group Name and Physical Disk Selection dialog. The Create a secure disk group option is active only when these conditions are met: • A security key is installed in the storage array.
book.book Page 115 Tuesday, June 18, 2013 3:03 PM To create a security key: 1 In the AMW toolbar, select Storage ArrayPhysical Disk Security Create Security Key. The Create Security Key window is displayed. 2 In Security key identifier, enter a string that becomes part of the secure key identifier. You can enter up to 189 alphanumeric characters without spaces, punctuation, or symbols. Additional characters is generated automatically and is appended to the end of the string that you enter.
book.book Page 116 Tuesday, June 18, 2013 3:03 PM After you have created a security key, you can create secure disk groups from security capable physical disks. Creating a secure disk group makes the physical disks in the disk group security-enabled. Security-enabled physical disks enter Security Locked status whenever power is re-applied. They can be unlocked only by a RAID controller module that supplies the correct key during physical disk initialization.
book.book Page 117 Tuesday, June 18, 2013 3:03 PM 3 In Secure key identifier, enter a string that becomes part of the secure key identifier. You may leave the text box blank, or enter up to 189 alphanumeric characters without white space, punctuation, or symbols. Additional characters are generated automatically. 4 Edit the default path by adding a file name to the end of the path or click Browse, navigate to the required folder and enter the name of the file.
book.book Page 118 Tuesday, June 18, 2013 3:03 PM To save the security key for the storage array: 1 In the AMW toolbar, select Storage ArrayPhysical Disk SecuritySave Security Key File. The Save Security Key File - Enter Pass Phrase window is displayed. 2 Edit the default path by adding a file name to the end of the path or click Browse, navigate to the required folder and enter the name of the file. 3 In Pass phrase, enter a string for the pass phrase.
book.book Page 119 Tuesday, June 18, 2013 3:03 PM the appropriate security key must also be imported to the new storage array. Otherwise, the data on the security enabled physical disks that were moved is inaccessible. For more information on validating the security key, see the PowerVault Modular Disk Storage Manager online help topics. Unlocking Secure Physical Disks You can export a security-enabled disk group to move the associated physical disks to a different storage array.
book.book Page 120 Tuesday, June 18, 2013 3:03 PM Configuring Hot Spare Physical Disks Guidelines to configure host spare physical disks: • You can use only unassigned physical disks with Optimal status as hot spare physical disks. • You can unassign only hot spare physical disks with Optimal, or Standby status. You cannot unassign a hot spare physical disk that has the In Use status. A hot spare physical disk has the In Use status when it is in the process of taking over for a failed physical disk.
book.book Page 121 Tuesday, June 18, 2013 3:03 PM • Right-click the physical disk and select Hot Spare Coverage from the pop-up menu. The Hot Spare Physical Disk Options window is displayed. 4 Select the appropriate option, you can select: • View/change current hot spare coverage—to review hot spare coverage and to assign or unassign hot spare physical disks, if necessary. See step 5.
book.book Page 122 Tuesday, June 18, 2013 3:03 PM Hot Spares and Rebuild A valuable strategy to protect data is to assign available physical disks in the storage array as hot spares. A hot spare adds another level of fault tolerance to the storage array. A hot spare is an idle, powered-on, stand-by physical disk ready for immediate use in case of disk failure.
book.book Page 123 Tuesday, June 18, 2013 3:03 PM Hot Spare Drive Protection You can use a hot spare physical disk for additional data protection from physical disk failures that occur in a RAID level 1, or RAID level 5 disk group. If the hot spare physical disk is available when a physical disk fails, the RAID controller module uses redundancy data to reconstruct the data from the failed physical disk to the hot spare physical disk.
book.book Page 124 Tuesday, June 18, 2013 3:03 PM CAUTION: Enclosure loss protection is not guaranteed if a physical disk has already failed in the disk group. In this situation, losing access to an expansion enclosure and consequently another physical disk in the disk group causes a double physical disk failure and loss of data. Enclosure loss protection is achieved when you create a disk group where all of the physical disks that comprise the disk group are located in different expansion enclosures.
book.book Page 125 Tuesday, June 18, 2013 3:03 PM Table 9-2. Criteria for Enclosure Loss Protection (continued) RAID Level Criteria for Enclosure Loss Protection RAID level 1 Ensure that each physical disk in a mirrored pair is located in a different expansion enclosure. This enables you to have more than two physical disks in the disk group within the same expansion enclosure.
book.book Page 126 Tuesday, June 18, 2013 3:03 PM • Not every operating system has the same number of LUNs available. • You can define the mappings on the Mappings tab in the AMW. See "Using the Mappings Tab" on page 90. Creating Host-to-Virtual Disk Mappings Guidelines to define the mappings: • An access virtual disk mapping is not required for an out-of-band storage array.
book.book Page 127 Tuesday, June 18, 2013 3:03 PM 5 In Logical unit number, select a LUN. The supported LUNs are 0 through 255. 6 Select the virtual disk to be mapped in the Virtual Disk area. The Virtual Disk area lists the names and capacity of the virtual disks that are available for mapping based on the selected host group or selected host. 7 Click Add. NOTE: The Add button is inactive until a host group or host, LUN, and virtual disk are selected.
book.book Page 128 Tuesday, June 18, 2013 3:03 PM 4 In Logical unit number, select the appropriate LUN. The drop down list shows only the currently available LUNs that are associated with the selected virtual disk. 5 Click OK. Stop any host applications associated with this virtual disk, and unmount the virtual disk, if applicable, from your operating system. 6 In the Change Mapping dialog, click Yes to confirm the changes. The mapping is checked for validity and is saved.
book.book Page 129 Tuesday, June 18, 2013 3:03 PM ownership of the target virtual disk is restored to its preferred RAID controller module. If ownership of the source virtual disk is changed during the virtual disk copy, ownership of the target virtual disk is also changed. Under certain operating system environments, it may be necessary to reconfigure the multipath driver before an I/O path can be used.
book.book Page 130 Tuesday, June 18, 2013 3:03 PM ownership of the target virtual disk is restored to its preferred RAID controller module. If ownership of the source virtual disk is changed during the virtual disk copy, ownership of the target virtual disk is also changed. Under certain operating system environments, it may be necessary to reconfigure the multipath driver before an I/O path can be used.
book.book Page 131 Tuesday, June 18, 2013 3:03 PM 1 In the AMW, select the Logical tab and select a disk group. 2 Select Disk GroupChangeRAID Level. 3 Select the appropriate RAID level and click Yes to confirm the selection. The RAID level operation begins.
book.book Page 132 Tuesday, June 18, 2013 3:03 PM # echo 1 > /sys/block/sd_x/device/delete where sd_x is the SD node (disk device) returned by the multipath command. Repeat this command for all paths related to this device. For example: #echo 1 > /sys/block/sdf/device/delete #echo 1 > /sys/block/sde/device/delete 5 Remove mapping from MDSM, or delete the LUN if necessary. 6 If you want to map another LUN or increase volume capacity, perform this action from MDSM.
book.book Page 133 Tuesday, June 18, 2013 3:03 PM • You cannot change a host adapter port to a restricted host type if there are already mappings in the storage partition that would exceed the limit imposed by the restricted host type. • Consider the case of the Default Group that has access to LUNs up to 256 (0 to 255) and a restricted host type is added to the Default Group.
book.book Page 134 Tuesday, June 18, 2013 3:03 PM Changing the RAID Controller Module Ownership of a Virtual Disk or a Disk Group You can change the RAID controller module ownership of a virtual disk or a disk group. You can change the RAID controller module ownership of a standard virtual disk or a snapshot repository virtual disk.
book.book Page 135 Tuesday, June 18, 2013 3:03 PM CAUTION: Possible loss of data access—If you do not use a multi-path driver, shut down any host applications that are currently using the virtual disk. This action prevents application errors when the I/O path changes. e Click Yes. The ownership of the virtual disk is changed. I/O to the virtual disk is now directed through this I/O path. You are finished with this procedure.
book.book Page 136 Tuesday, June 18, 2013 3:03 PM Changing the RAID Level of a Disk Group Use the ChangeRAID Level option to change the RAID level on a selected disk group. Using this option changes the RAID levels of every virtual disk that comprises the disk group. Performance may be slightly affected during the operation. Keep these guidelines in mind when you change the RAID level of a disk group: • You cannot cancel this operation after it begins.
book.book Page 137 Tuesday, June 18, 2013 3:03 PM Storage Partitioning A storage partition is a logical entity consisting of one or more virtual disks that can be accessed by a single host or shared among hosts that are part of a host group. The first time you map a virtual disk to a specific host or host group, a storage partition is created. Subsequent virtual disk mappings to that host or host group do not create another storage partition.
book.book Page 138 Tuesday, June 18, 2013 3:03 PM Storage partitioning is unavailable when: • No valid host groups or hosts exist in the Topology pane on the Mappings tab. • No host ports are defined for the host being included in the storage partition. • All mappings are defined. NOTE: You can include a secondary virtual disk in a storage partition.
book.book Page 139 Tuesday, June 18, 2013 3:03 PM NOTE: If the RAID level of the disk group is RAID level 5, or RAID level 6, and the expansion enclosure has enclosure loss protection, Display only physical disks that ensures enclosure loss protection is displayed and is selected by default. 4 in the Available physical disks area, select physical disks up to the allowed maximum number of physical disks.
book.book Page 140 Tuesday, June 18, 2013 3:03 PM Using Unconfigured Capacity You can increase the capacity of a standard virtual disk or a snapshot repository virtual disk using the unconfigured capacity when no free capacity exists on a disk group. An increase is achieved by adding unconfigured capacity, in the form of unassigned physical disks to the disk group of the standard virtual disk or the snapshot repository virtual disk. See "Disk Group Expansion" on page 138.
book.book Page 141 Tuesday, June 18, 2013 3:03 PM Exporting a Disk Group On the source storage array: 1 Save the storage array configuration. 2 Stop all I/O and unmount or disconnect the file systems on the virtual disks in the disk group. 3 Back up the data on the virtual disks in the disk group. 4 Locate the disk group and label the physical disks. 5 Place the disk group offline. 6 Obtain blank physical disk modules or new physical disks.
book.book Page 142 Tuesday, June 18, 2013 3:03 PM Importing a Disk Group NOTE: You must insert all of the physical disks that are part of the disk group into the enclosure before the disk group can be imported. On the target storage array: 1 Insert the exported physical disks into the available physical disk slots. 2 Review the Import Report for an overview of the disk group that you are importing. 3 Check for non-importable components. 4 Confirm that you want to proceed with the import procedure.
book.book Page 143 Tuesday, June 18, 2013 3:03 PM Storage Array Media Scan The media scan is a background operation that examines virtual disks to verify that data is accessible. The process finds media errors before normal read and write activity is disrupted and reports errors to the event log. NOTE: You cannot enable background media scans on a virtual disk comprised of Solid State Disks (SSDs).
book.book Page 144 Tuesday, June 18, 2013 3:03 PM The media scan duration specifies the number of days for which the media scan runs on the selected virtual disks. 5 To disable media scans on an individual virtual disk, select the virtual disk in the Select virtual disks to scan area, and deselect Scan selected virtual disks. 6 To enable media scans on an individual virtual disk, select the virtual disk in the Select virtual disks to scan area, and select Scan selected virtual disks.
book.book Page 145 Tuesday, June 18, 2013 3:03 PM 10 Configuration: Premium Feature— Snapshot Virtual Disks NOTE: If you ordered this feature, you received a Premium Feature Activation card shipped in the same box as your Dell PowerVault MD storage array. Follow the directions on the card to obtain a key file and to enable the feature. NOTE: The snapshot feature allows up to 16 snapshots per LUN and 256 per array to be present at the same time.
book.book Page 146 Tuesday, June 18, 2013 3:03 PM repository uses less disk space than a full physical copy, because the only data blocks that are stored in the snapshot repository virtual disk are those that have changed since the time of the snapshot. When you create a snapshot virtual disk, specify its location, capacity, schedule, and other parameters. You can disable or delete the snapshot virtual disk when it is not required.
book.book Page 147 Tuesday, June 18, 2013 3:03 PM Friday, at a time between the end of the work day and 11PM. Do not select an end date. Apply the same schedule to the second virtual disk, then map the two snapshot virtual disks to your backup host server and perform your regular backup procedures. Remember to unmap the two resulting snapshot virtual disks before the next scheduled snapshot begins.
book.book Page 148 Tuesday, June 18, 2013 3:03 PM Enabling and Disabling Snapshot Schedules A scheduled snapshot operation can be temporarily suspended by disabling the schedule. When a schedule is disabled, the schedule timer continues to run but any scheduled snapshot operation do not occur. Scheduled Snapshot Icons Scheduled snapshots are displayed in the AMW using the following icons. Icon Description The schedule is enabled. Scheduled snapshots occurs. The schedule is disabled.
book.book Page 149 Tuesday, June 18, 2013 3:03 PM About the Simple Path Using the simple path, you can specify: • Snapshot Virtual Disk Name—A user-specified name that helps you associate the snapshot virtual disk to its corresponding snapshot repository virtual disk and source virtual disk. • Snapshot Repository Virtual Disk Name—A user-specified name that helps you associate the snapshot repository virtual disk to its corresponding snapshot virtual disk and source virtual disk.
book.book Page 150 Tuesday, June 18, 2013 3:03 PM Preparing Host Servers to Create the Snapshot Using the Simple Path NOTE: Before using the Snapshot Virtual Disks Premium Feature in a Microsoft Windows clustered configuration, you must first map the snapshot virtual disk to the cluster node that owns the source virtual disk. This ensures that the cluster nodes correctly recognize the snapshot virtual disk.
book.book Page 151 Tuesday, June 18, 2013 3:03 PM NOTE: Removing the drive letter of the associated virtual disk(s) in Windows or unmounting the virtual drive in Linux helps to guarantee a stable copy of the drive for the Snapshot. Before creating a snapshot virtual disk, the host server has to be in the proper state.
book.book Page 152 Tuesday, June 18, 2013 3:03 PM After creating one or more snapshot virtual disks, mount the source virtual disk, and restart the host application using that source virtual disk. 11 In the AMW, select the Mappings tab, assign mappings between the snapshot virtual disk and the host that accesses the snapshot virtual disk. NOTE: In some cases, conflicts may result from mapping the same host to both a source virtual disk and its associated snapshot virtual disk.
book.book Page 153 Tuesday, June 18, 2013 3:03 PM • Capacity Allocation—This parameter allows you to choose where to create the snapshot repository virtual disk. You can allocate capacity by using one of the following methods: – Use free capacity on the same disk group where the source virtual disk resides. – Use free capacity on another disk group. – Use unconfigured capacity and create a new disk group for the snapshot repository virtual disk.
book.book Page 154 Tuesday, June 18, 2013 3:03 PM Preparing Host Servers to Create the Snapshot Using the Advanced Path NOTE: Before using the Snapshot Virtual Disks Premium Feature in a Microsoft Windows clustered configuration, you must first map the snapshot virtual disk to the cluster node that owns the source virtual disk. This ensures that the cluster nodes correctly recognize the snapshot virtual disk.
book.book Page 155 Tuesday, June 18, 2013 3:03 PM • You must satisfy the requirements of your host operating system for creating snapshot virtual disks. Failure to meet the requirements of your host operating system results in an inaccurate snapshot of the source virtual disk or the target virtual disk in a virtual disk copy.
book.book Page 156 Tuesday, June 18, 2013 3:03 PM If you want to use a snapshot regularly, such as for backups, use the Disable Snapshot and Re-create Snapshot options to reuse the snapshot. Disabling and re-creating snapshots preserves the existing virtual disk-to-host mappings to the snapshot virtual disk.
book.book Page 157 Tuesday, June 18, 2013 3:03 PM The Specify Virtual Disk Parameters window is displayed. 9 In the Snapshot virtual disk parameters area, select the relevant mapping option, you can select: • Automatic • Map later 10 In the Snapshot repository virtual disk parameters area, enter the system behavior when: • The snapshot repository virtual disk is full to the selected percentage level. • The snapshot repository virtual disk is full. 11 Click Next.
book.book Page 158 Tuesday, June 18, 2013 3:03 PM where sequence-number is the chronological number of the snapshot relative to the source virtual disk.
book.book Page 159 Tuesday, June 18, 2013 3:03 PM Snapshot Repository Capacity If you receive a warning that the capacity for the snapshot repository virtual disk is approaching its threshold, you can increase the capacity of a snapshot repository virtual disk by using one of the following methods: • Use the free capacity available on the disk group of the snapshot repository virtual disk. • Add unconfigured capacity to the disk group of the snapshot repository virtual disk.
book.book Page 160 Tuesday, June 18, 2013 3:03 PM free capacity is available, the maximum free space is displayed in the Increase capacity by field. If free capacity does not exist on the disk group, the free space that is displayed in the Increase capacity by spinner box is 0. You must add physical disks to create free capacity on the disk group.
book.book Page 161 Tuesday, June 18, 2013 3:03 PM NOTE: The physical disks that is displayed has a capacity that is either the same size or larger than the capacity of the physical disks already being used by the disk group. 9 Select either a single physical disk to add or two physical disks to add. 10 Click Add. The Add Physical Disks window closes. 11 Check the Physical Disks to add [enclosure, slot] area to ensure that the correct physical disks are added.
book.book Page 162 Tuesday, June 18, 2013 3:03 PM Disabling a Snapshot Virtual Disk Disable a snapshot virtual disk if: • You do not need the snapshot now. • You intend to re-create the snapshot at a later time and want to retain the associated snapshot repository virtual disk so that you do not need to create it again. • You want to maximize storage array performance by stopping copy-onwrite activity to the snapshot repository virtual disk.
book.book Page 163 Tuesday, June 18, 2013 3:03 PM Preparing Host Servers to Re-create a Snapshot Virtual Disk NOTE: Before you create a new snapshot of a source virtual disk, stop any data access (I/O) activity or suspend data transfer to the source virtual disk and snapshot virtual disk to ensure that you capture an accurate snapshot of the source virtual disk. Close all applications, including Windows Internet Explorer, to ensure all I/O activity has stopped.
book.book Page 164 Tuesday, June 18, 2013 3:03 PM Re-creating Snapshot Virtual Disks You can re-create a snapshot virtual disk that you have previously disabled. CAUTION: Possible loss of data redundancy – If the snapshot virtual disk is in Optimal status, it is first disabled prior to being re-created. This action invalidates the current snapshot.
book.book Page 165 Tuesday, June 18, 2013 3:03 PM The associated snapshot repository virtual disk must have sufficient capacity to process the rollback operation and the write operations from the host. At most, the snapshot repository virtual disk may need twice the size of the base disk, plus additional metadata space equaling approximately 1/1000th (that is, 0.1%) of the Base volume capacity.
book.book Page 166 Tuesday, June 18, 2013 3:03 PM If an error occurs during the rollback, the operation is paused and the base virtual disk and snapshot virtual disk displays Needs Attention icons. The RAID controller module also logs the event to the Major Event Log (MEL). Follow the Recovery Guru procedure to correct the error and repeat the rollback operation.
book.book Page 167 Tuesday, June 18, 2013 3:03 PM 2 Choose one: • Select the snapshot virtual disk, and select Virtual Disk Snapshot Rollback. • Right-click the snapshot virtual disk and select Rollback. The Confirm Rollback Snapshot Virtual Disk dialog is displayed. 3 In the Select rollback priority area, use the slider bar to set rollback priority. NOTE: If priority is set at the lowest rate, normal data write activity is highest priority and the rollback operation takes longer to complete.
book.book Page 168 Tuesday, June 18, 2013 3:03 PM Canceling a Snapshot Rollback WARNING: Risk of data loss: If you cancel a snapshot rollback in progress, the base virtual disk may remain in an unusable state and the snapshot virtual disk is displayed as failed in the MD storage management software. Therefore, do not cancel a snapshot rollback unless reliable recovery options exist for restoring the content of the base virtual disk. 1 In the array management window, select the Logical tab.
book.book Page 183 Tuesday, June 18, 2013 3:03 PM 12 Configuration: Premium Feature— Upgrading to High–Performance Tier The High Performance Tier premium feature on an MD3600f Series array increases the performance of the system beyond that of an MD3600f Series array operating at the standard performance level. If this feature is ordered, a Premium Feature Activation card is placed in the box with the storage array.
book.
book.book Page 169 Tuesday, June 18, 2013 3:03 PM 11 Configuration: Premium Feature— Virtual Disk Copy NOTE: A virtual disk copy overwrites data on the target virtual disk. Before starting a virtual disk copy, ensure that you no longer need the data or back up the data on the target virtual disk. NOTE: If you ordered this feature, you received a Premium Feature Activation card that shipped in the same box as your Dell PowerVault MD storage array.
book.book Page 170 Tuesday, June 18, 2013 3:03 PM Reasons to use virtual disk copy include: • Copying data for improved access—As your storage requirements for a virtual disk change, you can use a virtual disk copy to copy data to a virtual disk in a disk group that uses drives with larger capacity within the same storage array. Copying data for larger access capacity enables you to move data to greater capacity physical disks (for example, 61 GB to 146 GB).
book.book Page 171 Tuesday, June 18, 2013 3:03 PM formatted with a journaling file system, any attempt to issue a read request to the source virtual disk may be rejected by the storage array RAID controller modules and result in an error message. Make sure that the Read-Only attribute for the target virtual disk is disabled after the virtual disk copy is complete to prevent error messages from being displayed.
book.book Page 172 Tuesday, June 18, 2013 3:03 PM Creating a Virtual Disk Copy for an MSCS Shared Disk To create a virtual disk copy for a Microsoft Cluster Server (MSCS) shared disk, create a snapshot of the virtual disk, and then use the snapshot virtual disk as the source for the virtual disk copy.
book.book Page 173 Tuesday, June 18, 2013 3:03 PM • To enable Read-Only permission, select ChangeTarget Virtual Disk PermissionsEnable Read-Only. NOTE: Write requests to the target virtual disk are rejected when the ReadOnly permission is enabled on the target virtual disk. • To disable Read-Only permission, select ChangeTarget Virtual Disk PermissionsDisable Read-Only.
book.book Page 174 Tuesday, June 18, 2013 3:03 PM NOTE: The following host preparation sections also apply when using the virtual disk copy feature through the CLI interface. Creating a Virtual Disk Copy Source virtual disks that are participating in a virtual disk copy are available for read I/O activity only while a virtual disk copy has a status of In Progress or Pending. Write requests are allowed after the virtual disk copy has completed.
book.book Page 175 Tuesday, June 18, 2013 3:03 PM If 16 virtual disk copies with the status of In Progress exist, any subsequent virtual disk copy has the status Pending, which stays until one of the 16 virtual disk copies complete. Virtual Disk Copy and Modification Operations If a modification operation is running on a source virtual disk or a target virtual disk, and the virtual disk copy has a status of In Progress, Pending, or Failed, the virtual disk copy does not take place.
book.book Page 176 Tuesday, June 18, 2013 3:03 PM When the virtual disk copy fails, a critical event is logged in the Event Log, and a Needs Attention icon is displayed in the AMW. While a virtual disk copy has this status, the host has read-only access to the source virtual disk. Read requests from and write requests to the target virtual disk do not take place until the failure is corrected by using the Recovery Guru.
book.book Page 177 Tuesday, June 18, 2013 3:03 PM Copying the Virtual Disk You can create a virtual disk copy by using the Create Copy Wizard. CAUTION: Possible loss of data access – A virtual disk copy overwrites data on the target virtual disk. A virtual disk copy automatically makes the target virtual disk read-only to hosts. You may want to keep this attribute enabled to preserve the data on the target virtual disk.
book.book Page 178 Tuesday, June 18, 2013 3:03 PM 8 In the Select copy priority area, select the relevant copy priority and click Next. The Confirmation window displays the summary of your selections. 9 Type yes and click Finish. NOTE: The Operation in Progress icon is displayed on the source virtual disk and the target virtual disk while the virtual disk copy has a status of In Progress or Pending.
book.book Page 179 Tuesday, June 18, 2013 3:03 PM The Copy Manager window is displayed. 2 In the table, select one or more copy pairs. 3 Select ChangeCopy Priority. The Change Copy Priority window is displayed. 4 In the Copy priority area, select the appropriate copy priority, depending on your system performance needs. NOTE: There are 5 copy priority rates available: lowest, low, medium, high, and highest.
book.book Page 180 Tuesday, June 18, 2013 3:03 PM The Recopy option overwrites existing data on the target virtual disk and makes the target virtual disk read-only to hosts. This option fails all snapshot virtual disks associated with the target virtual disk, if any exist.
book.book Page 181 Tuesday, June 18, 2013 3:03 PM Re-Copying a Virtual Disk You can use the Copy Manager to create a new virtual disk copy for a selected source virtual disk and a target virtual disk. Use this option when you have stopped a virtual disk copy and want to start it again or when a virtual disk copy has failed or completed. The virtual disk copy starts over from the beginning. • Possible loss of data—The re-copying operation overwrites existing data on the target virtual disk.
book.book Page 182 Tuesday, June 18, 2013 3:03 PM Removing Copy Pairs You can remove one or more virtual disk copies by using the Copy Manager. Any virtual disk copy-related information for the source virtual disk and the target virtual disk is removed from the Virtual Disk Properties dialog and the Storage Array Profile dialogs. When you remove a virtual disk copy from the storage array, the Read-Only attribute for the target virtual disk is also removed.
book.book Page 185 Tuesday, June 18, 2013 3:03 PM 13 Configuration: Premium Feature— Remote Replication The Remote Replication premium feature enables real-time replication of data between two storage arrays in separate locations. Using remote replication, up to 16 replicated virtual disk pairs can be created on a storage array. A replicated virtual disk pair is created from two standard virtual disks, both of which are logical data storage structures created on a storage array.
book.book Page 186 Tuesday, June 18, 2013 3:03 PM Activating Remote Replication NOTE: If you ordered the Remote Replication feature, you received a Premium Feature Activation card in the Dell PowerVault MD storage array shipping box. Follow the directions on the card to install and enable this feature. After the Remote Replication feature is installed following the steps on the Premium Feature Activation card, it must be activated using a wizard-based process.
book.book Page 187 Tuesday, June 18, 2013 3:03 PM Other information about replication repository virtual disks include: • Specifying that replication repository virtual disks be created from unconfigured free capacity on the disk group, or creating a new disk group and its member replication repository virtual disks from unconfigured free capacity on the storage array.
book.book Page 188 Tuesday, June 18, 2013 3:03 PM Before creating a virtual disk pair, verify the following: 1 The Remote Replication premium feature is installed, enabled and activated on the primary and secondary storage arrays. 2 The storage arrays containing the two virtual disks you want to replicate are connected through a Fibre Channel fabric interface. 3 The secondary storage array contains a virtual disk that is equal (or larger) in capacity than the primary virtual disk in the replicated pair.
book.book Page 189 Tuesday, June 18, 2013 3:03 PM Snapshot Virtual Disk With Remote Replication A snapshot virtual disk is a point-in-time image of a virtual disk. In a remote replication, do not mount a snapshot virtual disk on the same server as the primary virtual disk. Virtual Disk Copy With Remote Replication The virtual disk copy premium feature copies data from a source virtual disk to a target virtual disk within the same storage array.
book.book Page 190 Tuesday, June 18, 2013 3:03 PM Required Switch Zoning Configurations NOTE: A limited set of Fibre Channel switches are supported by the storage array. For a complete list of supported switches and their required driver, BIOS and firmware levels, see the Configuring Fibre Channel with the Dell MD3600f-Series Storage Array. Due to potential restrictions at the host level, remote replication configurations must contain Fibre Channel switches.
book.book Page 191 Tuesday, June 18, 2013 3:03 PM Journaling File Systems and Remote Replication When using a journaling file system, you cannot gain read-only access to a remote virtual disk. A journaling file system does not let you mount the remote virtual disk in Windows NTFS. However, you can mount a snapshot of the remote virtual disk, if available.
book.
book.book Page 193 Tuesday, June 18, 2013 3:03 PM 6 In the Select capacity table, select the physical disks and capacities for the new disk group, then click Next. The Preview (Activate Remote Replication) wizard is displayed. 7 Click Finish. The Completed (Activate Remote Replication) message is displayed. 8 Click OK. The Remote Replication premium feature is now active. The Logical pane displays the new disk group and the two replication repository virtual disks.
book.book Page 194 Tuesday, June 18, 2013 3:03 PM Creating a Remote Replication Before creating a remote replication, ensure that all prerequisites are met. See "Prerequisites" on page 191 for more information. 1 Open the AMW of both the local and remote storage array. 2 Verify that the Remote Replication premium feature is activated on both storage arrays. 3 In the AMW of the local storage array, select the Logical tab.
book.book Page 195 Tuesday, June 18, 2013 3:03 PM Selecting the Secondary Virtual Disk CAUTION: Creating a replicated virtual disk pair starts a process between the primary and secondary virtual disks that overwrites all existing data on the secondary virtual disk and set the disk to read-only access.
book.book Page 196 Tuesday, June 18, 2013 3:03 PM also specify whether to use a write consistency group option. A write consistency group ensures that the secondary virtual disk receives write requests in the sequence initiated by the RAID controller module of the primary virtual disk. The secondary virtual disk can also be added to a write consistency group.
book.book Page 197 Tuesday, June 18, 2013 3:03 PM • Manual resynchronization (recommended)—The replicated pair must be manually resynchronized each time communication is restored between unsynchronized replicated virtual disks. 3 Click Next. The Preview (Create Remote Replication) wizard is displayed. Go to "Completing the Remote Replication" on page 197.
book.book Page 198 Tuesday, June 18, 2013 3:03 PM RAID Controller Module Ownership/Preferred Path During a remote replication operation, the RAID controller module that owns the primary virtual disk must correspond to the RAID controller owning the secondary volume on the remote array.
book.book Page 199 Tuesday, June 18, 2013 3:03 PM Viewing the Storage Array Profile The Storage Array Profile displays the most detailed information about the components of a remote replication and the replication repository virtual disks.
book.book Page 200 Tuesday, June 18, 2013 3:03 PM Viewing the Properties Pane The Properties pane is a view-only display of the physical and logical characteristics of a single virtual disk in a replicated pair, or a single replication repository virtual disk. To view the Properties pane: 1 In the AMW, select the Logical tab. 2 Select either the primary or secondary virtual disk of the replicated pair. The Properties pane shows properties for the selected virtual disk.
book.book Page 201 Tuesday, June 18, 2013 3:03 PM Viewing the Physical Components or Logical Elements of the Primary Virtual Disk To view the physical components or logical elements of the primary virtual disk in a remote replication: 1 In the AMW of the storage array that contains the primary virtual disk, select the Logical tab. 2 Right-click the primary virtual disk and either: • View the logical elements of the primary virtual disk by selecting Select ViewAssociated Logical Elements.
book.book Page 202 Tuesday, June 18, 2013 3:03 PM Virtual Disk Status Icons In the Devices tab on the EMW, the following icons depict the status of each virtual disk: Changing Write Mode and Consistency Group Membership Table 13-1.
book.book Page 203 Tuesday, June 18, 2013 3:03 PM The write mode of a remote replication is selected when it is created. However, you can change the write mode in a remote replication at a later time, as well as change the secondary virtual disk's membership in a write consistency group. For more information about write modes and write consistency groups, go to Setting the Write Mode for Creating a Remote Replication online help topic.
book.book Page 204 Tuesday, June 18, 2013 3:03 PM Resynchronizing Virtual Disks There are two resynchronization methods for remote replications: • Manual resynchronization—See "Manually Resynchronizing Virtual Disks" on page 208. • Automatic resynchronization—See "Automatically Resynchronizing Virtual Disks" on page 208. For more information about synchronization and resynchronization in remote replications, see: • "Normally Synchronized Virtual Disks" on page 204.
book.book Page 205 Tuesday, June 18, 2013 3:03 PM The communication between a primary and secondary virtual disks can be suspended or become unsynchronized. If communication between the primary virtual disk and the secondary virtual disk is disrupted: 1 The status of the replicated pair changes to Unsynchronized. 2 A Needs Attention status is displayed for the storage array. 3 Data is written to the primary virtual disk. 4 Write requests to the primary virtual disk are logged.
book.book Page 206 Tuesday, June 18, 2013 3:03 PM • Changing the segment size of a virtual disk • Defragmenting a disk group • Adding free capacity to a disk group • Changing the RAID level of a disk group To change the synchronization priority and method for an existing remote replication: 1 In the AMW of the storage array containing the primary virtual disk of the replicated pair, right-click the Logical tab. 2 Select ChangeSynchronization Settings.
book.book Page 207 Tuesday, June 18, 2013 3:03 PM Unsynchronized Virtual Disks Communication between a primary and secondary virtual disks can be either suspended, or become unsynchronized. If this communication between both virtual disks is disrupted: 1 The status of the replicated pair changes to Unsynchronized. 2 A Needs Attention status is displayed for the storage array. 3 Data is written to the primary virtual disk. 4 Write requests to the primary virtual disk are logged.
book.book Page 208 Tuesday, June 18, 2013 3:03 PM Automatically Resynchronizing Virtual Disks When automatic resynchronization is selected, the RAID controller module owning the primary virtual disk automatically starts resynchronizing the data on the remote replication pair immediately after communication is restored. NOTE: When choosing automatic resynchronization, a possible loss of data can occur if a resynchronization is interrupted in progress.
book.book Page 209 Tuesday, June 18, 2013 3:03 PM Reversing Roles Between the Primary and Secondary Virtual Disks Reversing the roles between the virtual disks promotes the secondary virtual disk to the role of primary virtual disk and demotes the primary virtual disk to the role of secondary virtual.
book.book Page 210 Tuesday, June 18, 2013 3:03 PM Promoting the Secondary Virtual Disk or Demoting the Primary Virtual Disk To promote the secondary virtual disk to the role of primary virtual disk, or demote the primary virtual disk to the role of secondary virtual disk: 1 In the AMW of the storage array that contains the virtual disk you are changing, click the Logical tab. 2 Right-click the virtual disk you are changing.
book.book Page 211 Tuesday, June 18, 2013 3:03 PM Resuming a Remote Replication 1 In the AMW of the storage array with the primary virtual disk, select the Logical tab. 2 In the Logical pane, right-click the primary virtual disk of the replicated pair, then select Resume Replication. The Resume Replicated Pair dialog is displayed. The Replicated pairs table shows all suspended replicated pairs in the local and remote storage arrays. 3 Select one or more replicated pairs.
book.book Page 212 Tuesday, June 18, 2013 3:03 PM After the remote virtual disk replication resumes, data is automatically written to the secondary virtual disk. Only the regions of the primary virtual disk that changed since the replicated pair was suspended are written to the secondary virtual disk.
book.book Page 213 Tuesday, June 18, 2013 3:03 PM Deleting a Virtual Disk From a Replicated Pair in a Storage Array Follow these steps to delete either a primary virtual disk, a secondary virtual disk, or both virtual disks from a replicated pair in a storage array. NOTE: Do not remove a replication relationship to back up a replicated virtual disk.
book.book Page 214 Tuesday, June 18, 2013 3:03 PM Deleting a Secondary Virtual Disk NOTE: Depending on which premium features are enabled on the storage array, deleting a secondary virtual disk may delete all associated virtual disks, resulting in a possible loss of data on those virtual disks. NOTE: You cannot delete a secondary virtual disk while it is synchronizing. When a secondary virtual disk is deleted, the replication relationship is removed and the remote virtual disk replication is destroyed.
book.book Page 215 Tuesday, June 18, 2013 3:03 PM Deleting a Secondary Virtual Disk in a Replicated Pair From a Storage Array 1 Stop all I/O activity on the secondary virtual disk and unmount any file systems on the secondary virtual disk. 2 In the AMW of the storage array that contains the secondary virtual disk, select the Logical tab. 3 In the Logical pane, right-click the secondary virtual disk, then select Delete. The Delete Virtual Disks dialog is displayed.
book.book Page 216 Tuesday, June 18, 2013 3:03 PM To remove remote replication from a storage array: 1 In the AMW of the storage array containing the primary virtual disk, select the Logical tab. 2 In the Logical pane, right-click the primary virtual disk of a replicated pair, then select Remove Replication Relationship. The Remove Replication Relationship dialog is displayed. The Replicated pairs table shows all replicated pairs in both the local and remote storage array.
book.book Page 217 Tuesday, June 18, 2013 3:03 PM Disabling the Remote Replication Premium Feature Before disabling the Remote Replication premium feature, all remote virtual disk replications must are removed on the storage array. See "Disabling the Remote Replication Premium Feature" on page 217. NOTE: To re-enable the Remote Replication premium feature on a storage array after it is disabled, you must either retrieve the premium feature key or obtain a new one from your Dell support representative.
book.
book.book Page 219 Tuesday, June 18, 2013 3:03 PM 14 Configuration: Device Mapper Multipath for Linux Overview The MD3600f Series storage array uses a Linux operating system software framework, known as Device Mapper (DM), to enable multipath capabilities on Linux Host Servers. The DM multipath functionality is provided by a combination of drivers and utilities. This chapter describes how to use those utilities to complete the process of enabling an MD3600f Series storage array on a Linux system.
book.book Page 220 Tuesday, June 18, 2013 3:03 PM Using DM Multipathing Devices NOTE: Using or modifying any nodes other than the multipathing device nodes can result in array or file system problems, including loss of communication with the array and corruption of the file system. Avoid accessing any device other than the multipathing device.
book.book Page 221 Tuesday, June 18, 2013 3:03 PM Device Mapper Configuration Steps To complete the DM multipathing configuration and make the storage available to the Linux host server: 1 Scan for virtual disks. See "Scan for Newly Added Virtual Disks" on page 221. 2 Display the multipath device topology. See "Display the Multipath Device Topology Using the Multipath Command" on page 222. 3 Create a partition on a multipath device node.
book.book Page 222 Tuesday, June 18, 2013 3:03 PM Display the Multipath Device Topology Using the Multipath Command The multipath command adds newly scanned and mapped virtual disks to the Device Mapper tables and creates entries for them in the /dev/mapper directory on the host server. These devices are the same as any other block devices in the host.
book.book Page 223 Tuesday, June 18, 2013 3:03 PM \_ round-robin 0 [prio=1][enabled] \_ 6:0:0:22 sdcl 69:144 [active][ghost where: mpathb is the name of the virtual device created by device mapper. It is located in the /dev/mapper directory.
book.book Page 224 Tuesday, June 18, 2013 3:03 PM The following examples provide information about the general mapping formats: On RHEL hosts, a partition node has the format /dev/mapper/mpathp, where is the alphabetic number for the multipathing device, is the partition number for this device. On SLES 11.x hosts, a partition node has the format /dev/mapper/mpath-part, where is letter(s) assigned to the multipathing device and is the partition number. On SLES 10.
book.book Page 225 Tuesday, June 18, 2013 3:03 PM Blacklist Local Drive in Multi-path Driver If your multipath drivers are connecting to storage area networks (SANs), it may be useful to be able to exclude or "blacklist" certain devices in your /etc/multipath.conf file. Blacklisting prevents the multipath driver from attempting to use those local devices.
book.book Page 226 Tuesday, June 18, 2013 3:03 PM CAUTION: Certain commands, such as lsscsi, displays one or more instances of Universal Xport devices. These device nodes must never be accessed, mounted, or used in any way. Doing so could cause loss of communication to the storage array and possibly cause serious damage to the storage array, potential making data stored on the array inaccessible.
book.book Page 227 Tuesday, June 18, 2013 3:03 PM Limitations and Known Issues • In certain error conditions with the no_path_retry or the queue_if_no_path feature is set, applications may hang. To overcome these conditions the you must enter the following command for each affected multipath device: dmsetup message [device] 0 "fail_if_no_path" where [device] is the multipath device name (for example.
book.book Page 228 Tuesday, June 18, 2013 3:03 PM Troubleshooting Question Answer How can I check if multipathd Run the following command is running? /etc/init.d/multipathd status Why does the multipath –ll command output not show any devices? First verify if the devices are discovered or not. The command #cat /proc/scsi/scsi displays all the devices that are already discovered. Then verify the multipath.conf to ensure that it is updated with proper settings. After this, run multipath.
book.book Page 229 Tuesday, June 18, 2013 3:03 PM 15 Management: Firmware Downloads Downloading RAID Controller and NVSRAM Packages A version number exists for each firmware file. The version number indicates whether the firmware is a major version or a minor version. You can use the Enterprise Management Window (EMW) to download and activate both the major firmware versions and the minor firmware versions.
book.book Page 230 Tuesday, June 18, 2013 3:03 PM Downloading Both RAID Controller and NVSRAM Firmware NOTE: I/O to the array can continue while you are upgrading RAID controller and NVSRAM firmware. NOTE: Dell recommends that the firmware and NVSRAM be upgraded during a maintenance period when the array is not being used for I/O. NOTE: The RAID enclosure must contain at least two disk drives in order to update the firmware on the controller.
book.book Page 231 Tuesday, June 18, 2013 3:03 PM 7 Click Transfer. Keep these guidelines in mind: • If the Transfer button is inactive, ensure that you either select an NVSRAM file or deselect the Transfer NVSRAM file with RAID controller module firmware option. • If the file selected is not valid or is not compatible with the current storage array configuration, the File Selection Error dialog is displayed. Click OK to close it, and choose a compatible firmware or NVSRAM file.
book.book Page 232 Tuesday, June 18, 2013 3:03 PM 12 To locate the directory in which the file to download resides, click Browse in the Select files area. The Select File dialog is displayed. 13 Select the file to download. 14 Click OK. 15 If you want to download the NVSRAM file with the RAID controller module firmware, select Download NVSRAM file with firmware in the Select files area. Attributes of the firmware file are displayed in the Firmware file information area.
book.book Page 233 Tuesday, June 18, 2013 3:03 PM 2 Perform one of these actions: • Select Advanced Maintenance Download RAID Controller Module NVSRAM • Select the Support tab, and click Download Firmware. In Select download task, select Download RAID controller module NVSRAM and click OK. An error message is displayed. Click OK to close it and select a compatible file. 3 To locate the directory in which the file to download resides, click Select File.
book.book Page 234 Tuesday, June 18, 2013 3:03 PM NOTE: The Details pane shows the details of only one storage array at a time. If you select more than one storage array in the Storage array pane, the details of the storage arrays are not shown in the Details pane. 9 Click NVSRAM in the Download area. NOTE: If you select a storage array that cannot be upgraded, the NVSRAM button is disabled. The Download NVSRAM dialog is displayed.
book.book Page 235 Tuesday, June 18, 2013 3:03 PM Downloading Physical Disk Firmware CAUTION: When updating physical disk firmware, you must stop all I/O activity to the array to prevent data loss. The physical disk firmware controls various features of the physical disk. The disk array controller (DAC) uses this type of firmware. Physical disk firmware stores information about the system configuration on an area of the physical disk called DACstore.
book.book Page 236 Tuesday, June 18, 2013 3:03 PM To download Physical Disk Firmware: 1 From the AMW, select Advanced Maintenance Download Physical Disk. The Download Physical Disk - Introduction window is displayed. 2 Click Next. The Download Physical Disk Firmware - Add Packages window is displayed. 3 In the Selected Packages area, click Add. Navigate to the location of the packages and click OK. The selected package is added to the Packages to be transferred area. 4 Click Next.
book.book Page 237 Tuesday, June 18, 2013 3:03 PM Downloading MD1200 Series Expansion Module EMM Firmware NOTE: Due to a limitation with Linux, expansion enclosure EMM firmware updates must be performed using out-of-band management only. Failure to do so may result in the host server becoming unresponsive, and it may require a reboot. You can transfer a downloadable firmware file to the expansion enclosure EMM in the expansion enclosures attached to the storage array.
book.book Page 238 Tuesday, June 18, 2013 3:03 PM NOTE: If you click Stop while a firmware download is in progress, the download-in-progress finishes before the operation stops. The status for the remaining expansion enclosures changes to Canceled. Monitor the progress and completion status of the download to the expansion enclosures. The progress and status of each expansion enclosure that is participating in the download is displayed in the Status column of the Select enclosures table.
book.book Page 239 Tuesday, June 18, 2013 3:03 PM Media Errors and Unreadable Sectors If the RAID controller detects a media error while accessing data from a physical disk that is a member of a disk group with a redundant RAID level (RAID 1, RAID 5 or RAID 10), the controller tries to recover the data from peer disks in the disk group and uses recovered data to correct the error.
book.
book.
book.book Page 242 Tuesday, June 18, 2013 3:03 PM Front Bezel (Optional) Removing the Front Bezel 1 Using the system key, unlock the front bezel (if locked). 2 Lift up the release latch next to the keylock. 3 Rotate the left end of the bezel away from the front panel. 4 Unhook the right end of the bezel and pull the bezel away from the system. Figure 16-1.
book.book Page 243 Tuesday, June 18, 2013 3:03 PM Hard Drives SAFETY: Models AMT, E03J, and E04J Models AMT, E03J, and E04J are intended for installation only in restricted access locations as defined in cl 1.2.7.3 of IEC 60950-1:2005. Depending on your configuration, your array either supports up to twenty four 2.5" SAS hard drives or up to twelve 3.5" SAS hard drives in internal drive bays. Hard drives are connected to a backplane through hard-drive carriers and can be configured as hot-swappable.
book.book Page 244 Tuesday, June 18, 2013 3:03 PM Figure 16-3. Removing and Installing a 2.5" Hard-Drive Blank (MD3620f Only) 1 1 2 hard-drive blank 2 release tab Installing a Hard-Drive Blank 1 If installed, remove the front bezel. See "Removing the Front Bezel" on page 242. 2 Insert the hard-drive blank into the drive bay until the blank is fully seated. 3 Close the handle to lock the blank in place. 4 If applicable, replace the front bezel. See "Installing the Front Bezel" on page 242.
book.book Page 245 Tuesday, June 18, 2013 3:03 PM If the drive is online, the green activity/fault indicator flashes as the drive is powered down. When the drive indicators are off, the drive is ready for removal. 3 Press the release button to open the drive carrier release handle. See Figure 16-4. 4 Slide the hard drive out until it is free of the drive bay. CAUTION: To maintain proper system cooling, all empty hard-drive bays must have drive blanks installed.
book.book Page 246 Tuesday, June 18, 2013 3:03 PM Installing a Hard Drive CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 247 Tuesday, June 18, 2013 3:03 PM Removing a Hard Drive From a Hard-Drive Carrier Remove the screws from the slide rails on the hard-drive carrier and separate the hard drive from the carrier. See Figure 16-5 for PowerVault MD3600f and Figure 16-6 for PowerVault MD3620f. Figure 16-5. Removing and Installing a Hard Drive Into a 3.
book.book Page 248 Tuesday, June 18, 2013 3:03 PM Figure 16-6. Removing and Installing a Hard Drive Into a 2.
book.book Page 249 Tuesday, June 18, 2013 3:03 PM Installing a Hard Drive Into a Hard-Drive Carrier 1 Insert the hard drive into the hard-drive carrier with the connector end of the drive at the back. See Figure 16-5. 2 Align the screw holes on the hard drive with the back set of holes on the hard-drive carrier. When aligned correctly, the back of the hard drive is flush with the back of the hard-drive carrier. 3 Attach the four screws to secure the hard drive to the hard-drive carrier.
book.book Page 250 Tuesday, June 18, 2013 3:03 PM 5 Connect all the power cables to the array. 6 Turn on the array and the host server. Figure 16-7. Removing and Installing a RAID Controller Module Blank 1 1 release latch 2 RAID controller module blank Installing a RAID Controller Module Blank To install a RAID controller module blank: 1 Align the blank with the RAID controller module bay 2 Insert the blank into the chassis until it clicks into place.
book.book Page 251 Tuesday, June 18, 2013 3:03 PM Removing a RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 252 Tuesday, June 18, 2013 3:03 PM Figure 16-8. Removing and Installing a RAID Controller Module 3 2 1 1 RAID controller module 3 release lever 2 release tab Installing a RAID Controller Module WARNING: Fiber optic cables are fragile. Bending, twisting, folding, or pinching fiber optic cables can cause damage to the cables, degraded performance, or loss of data. To prevent damage, do not twist, fold, pinch, or step on the cables.
book.book Page 253 Tuesday, June 18, 2013 3:03 PM 3 Connect all the cables to the RAID controller module. If SFP transceivers and fiber optic cables were present, reinstall them in the correct ports. 4 If applicable, update the firmware for the RAID controller module. For information about the latest firmware, see dell.com/support. Opening the RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician.
book.book Page 254 Tuesday, June 18, 2013 3:03 PM Figure 16-9. Opening and Closing the RAID Controller Module 1 1 screws (2) 3 indent 2 3 2 RAID controller module Closing the RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team.
book.book Page 255 Tuesday, June 18, 2013 3:03 PM RAID Controller Module Backup Battery Unit Removing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty.
book.book Page 256 Tuesday, June 18, 2013 3:03 PM Installing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 257 Tuesday, June 18, 2013 3:03 PM Power Supply/Cooling Fan Module NOTE: Your storage array includes two integrated, hot-swappable power supply/cooling fan modules. The array supports two hot-swappable power supply/cooling fan modules. While the array can operate temporarily with one module, both the modules must be present for proper system cooling. CAUTION: A single power supply/cooling fan module can be removed from a powered-on array for a maximum period of 5 minutes.
book.book Page 258 Tuesday, June 18, 2013 3:03 PM Figure 16-11. Removing and Installing a Power Supply/Cooling Fan Module 1 2 3 1 release tab 3 power supply handle 2 power supply Installing a Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team.
book.book Page 259 Tuesday, June 18, 2013 3:03 PM Figure 16-12. Securing the Power Cable 1 1 restraining strap CAUTION: When connecting the power cable, secure the cable with the velcro strap. NOTE: If the array is powered on, all the power supply LEDs remain off until the AC power cable is connected to the power supply/cooling fan module and the power switch is turned on. 4 Turn on the power supply/cooling fan module. Control Panel Removing the Control Panel 1 Turn off the array and host server.
book.book Page 260 Tuesday, June 18, 2013 3:03 PM 4 Slide the control panel out of the chassis after: – Pushing the release tab toward the front of the array in PowerVault MD3600f. See Figure 16-13. – Pulling the release pin toward the front of the array in PowerVault MD3620f. See Figure 16-14. Figure 16-13.
book.book Page 261 Tuesday, June 18, 2013 3:03 PM Figure 16-14. Removing and Installing the Control Panel-PowerVault MD3620f 1 2 1 release pin 2 control panel Installing the Control Panel 1 Align the control panel with the slot on the array. 2 Slide the control panel into the array until: – The release tab clicks into place in PowerVault MD3600f. See Figure 16-13. – The release pin clicks into place in PowerVault MD3620f. See Figure 16-14. 3 Replace the hard drives in their respective slots.
book.book Page 262 Tuesday, June 18, 2013 3:03 PM Backplane CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 263 Tuesday, June 18, 2013 3:03 PM Figure 16-15.
book.book Page 264 Tuesday, June 18, 2013 3:03 PM Figure 16-16. Removing and Installing the Backplane-PowerVault MD3600f 1 2 3 1 screws (5) 3 captive screw 2 backplane Figure 16-17.
book.book Page 265 Tuesday, June 18, 2013 3:03 PM Installing the Backplane 1 Align the holes on the backplane with the holes on the array. 2 Tighten the captive screw to secure the backplane to the chassis. See Figure 16-16 for PowerVault MD3600f or Figure 16-17 for PowerVault MD3620f. 3 Replace the screws that secure the backplane to the chassis. See Figure 16-16 for PowerVault MD3600f or Figure 16-17 for PowerVault MD3620f.
book.
book.book Page 267 Tuesday, June 18, 2013 3:03 PM 17 Management: Firmware Inventory A storage array is made up of many components, which may include RAID controller modules, physical disks, and enclosure management modules (EMMs). Each of these components contains firmware. Some versions of firmware are dependent on other versions of firmware. To capture information about all of the firmware versions in the storage array, view the firmware inventory.
book.
book.book Page 269 Tuesday, June 18, 2013 3:03 PM 18 Management: System Interfaces Microsoft Services Virtual Disk Service The Microsoft Virtual Disk Service (VDS) is a component of the Windows operating system. The VDS component utilizes third-party vendor specific software modules, known as providers, to access and configure third-party storage resources, such as MD3600f storage arrays.
book.book Page 270 Tuesday, June 18, 2013 3:03 PM VSS attaches to the service and uses it to coordinate the creation of snapshot virtual disks on the storage array. VSS-initiated snapshot virtual disks can be triggered through backup tools, known as requestors.
book.book Page 271 Tuesday, June 18, 2013 3:03 PM 19 Troubleshooting: Your Storage Array Software Start–Up Routine Look and listen during the array’s start-up routine for the indications described in Table 19-1. For a description of the front- and back-panel indicators, see "Planning: About Your Storage Array" on page 25. Table 19-1. Start-Up Routine Indications Look/Listen for Action Alert messages. See your storage management documentation.
book.book Page 272 Tuesday, June 18, 2013 3:03 PM To launch the AMW, perform one of these actions: • On the Devices tab, in either the Tree view or the Table view, double-click a storage array. Alternatively, you can right-click a storage array and select Manage Storage Array from the pop-up menu. • On the Setup tab, select Manage a Storage Array. After the AMW is displayed, select the Physical tab to see the components in the storage array. A component that has a problem is indicated by a status icon.
book.book Page 273 Tuesday, June 18, 2013 3:03 PM In the Table view, every managed storage array is listed once, regardless of the number of attachments it has in the Tree view. After the storage array is contacted by MDSM, an icon representing its hardware status is displayed. Hardware status can be Optimal, Needs Attention, or Fixing.
book.book Page 274 Tuesday, June 18, 2013 3:03 PM Table 19-3. Additional Status Icons Status Icon Adding a Storage Array Description The Contacting Storage Array icon is shown in the Tree view and Table view until the current status of each managed storage array is known. The Contacting Storage Array icon is shown in the EMW Status Bar and the AMW Status Bar and the tooltip shows Contacting Storage arrays.
book.book Page 275 Tuesday, June 18, 2013 3:03 PM 2 Enter a name for the support data file in Specify filename or click Browse to navigate to a previously saved file to overwrite an existing file. The suffix .zip is added automatically to the file if you do not specify a suffix for the file. 3 Enter the Execution summary. 4 Click Start. After all of the support files are gathered, they are archived using the file name that you specified. 5 Click OK.
book.book Page 276 Tuesday, June 18, 2013 3:03 PM Collecting the Physical Disk Data You can use the Collect Physical Disk Data option to collect log sense data from all the physical disks on your storage array. Log sense data consists of statistical information that is maintained by each of the physical disks in your storage array. Your Technical Support representative can use this information to analyze the performance of your physical disks and for troubleshooting problems that may exist.
book.book Page 277 Tuesday, June 18, 2013 3:03 PM Event Log You can use the Event Log Viewer to view a detailed list of events that occur in a storage array. The event log is stored on reserved areas on the storage array disks. It records configuration events and storage array component failures. The event log can be used as a supplementary diagnostic tool to the Recovery Guru for tracing storage array events.
book.book Page 278 Tuesday, June 18, 2013 3:03 PM Recovery Guru The Recovery Guru is a component of MDSM that diagnoses critical events on the storage array and recommends step-by-step recovery procedures to resolve the problems. In the AMW, to display the Recovery Guru, perform one of these actions: • Click Recovery Guru • In the Support tab, click the Recover from Failure link. • From the Status pane on the Summary tab, click the Storage Array Needs Attention link. .
book.book Page 279 Tuesday, June 18, 2013 3:03 PM 2 Perform one of these actions in the Storage Array Profile dialog: • View detailed information—Go to step 3. • Search the storage array profile—Go to step 4. • Save the storage array profile—Go to step 5. • Close the storage array profile—Go to step 6. 3 Select one of the tabs, and use the horizontal scroll bar and the vertical scroll bar to view the storage array profile information.
book.book Page 280 Tuesday, June 18, 2013 3:03 PM e In File Name, type the file name of your choice. To associate the file with a particular software application that is displayed it, specify a file extension, such as .txt. NOTE: The file is saved as ASCII text. f Click Save. 6 To exit the storage array profile, click Close. For more information, see the PowerVault Modular Disk Storage Manager online help topics.
book.book Page 281 Tuesday, June 18, 2013 3:03 PM Viewing the Physical Associations You can use the Associated Physical Components option to view the physical components that are associated with source virtual disks, snapshot virtual disks, snapshot repository virtual disks, disk groups, unconfigured capacity, and free capacity in a storage array. To view the physical associations: 1 In the AMW, select a node in the Logical pane of the Logical tab or in the Topology pane of the Mappings tab.
book.book Page 282 Tuesday, June 18, 2013 3:03 PM To find nodes: 1 In the AMW, select View Find. 2 Based on the type of search, select one of these options, and go to the indicated step: • Search by name—see step 3. • Search by special criteria—see step 4. 3 Type the name of the node to be found in Find Node. See step 8. 4 Based on the search criteria, select one of these options, and go to the indicated step: • Find all virtual disks with RAID level—Go to step 5.
book.book Page 283 Tuesday, June 18, 2013 3:03 PM c Specify that the free capacity to be matched is less than, equal to, or greater than the capacity entered in the GB box. d Go to step 8. 8 Click Find Next. To see every node that matches the criteria, click Find Next repeatedly. If no matches are found, the Search Failed dialog is displayed. Click OK, and re-enter the search criteria. 9 To close the dialog, click Cancel.
book.book Page 284 Tuesday, June 18, 2013 3:03 PM 4 Select View Go To Source Virtual Disk. The selection jumps to the associated source virtual disk in the Logical pane. 5 Select View Go To Target Virtual Disk. NOTE: If the source virtual disk has more than one associated target virtual disk, select the target virtual disk that you want from the list, and click OK. The selection jumps to the associated target virtual disk in the Logical pane.
book.book Page 285 Tuesday, June 18, 2013 3:03 PM 7 If the verification is successful, see step 8, if not, see step 9. 8 Remove the storage array with the Unresponsive status from the EMW, and select Add Storage Array to add the storage array again. 9 If the storage array does not return to Optimal status, check the Ethernet cables to ensure that there is no visible damage and that they are securely connected. 10 Ensure the appropriate network configuration tasks are performed.
book.book Page 286 Tuesday, June 18, 2013 3:03 PM 20 If the problem still exists, make the appropriate host modifications, check with other administrators to see if a firmware upgrade was performed on the RAID controller module from another storage management station. If a firmware upgrade was performed, the EMW on your management station may not be able to locate the new AMW software needed to manage the storage array with the new version of the firmware.
book.book Page 287 Tuesday, June 18, 2013 3:03 PM Locating a Physical Disk You can use the Locate Physical Disk option to physically locate and identify one or more of the physical disks in an expansion enclosure by activating physical disk LEDs. To locate the physical disk: 1 Select the Physical tab. 2 Select the physical disks that you want to locate. 3 Select Physical Disk Blink Physical Disk. The LEDs on the selected physical disks blink. 4 When you have located the physical disks, click OK.
book.book Page 288 Tuesday, June 18, 2013 3:03 PM To locate the expansion enclosure: 1 Select the Physical tab. 2 Select a physical disk in the expansion enclosure that you want to locate. 3 Select Physical Disk Blink Expansion Enclosure. The LED or LEDs on the expansion enclosure or physical disks come on. 4 When you have located the expansion enclosure, click OK. The LEDs stop blinking. (If you have an expansion enclosure with a blue LED, the LED goes off).
book.book Page 289 Tuesday, June 18, 2013 3:03 PM Use the convention filename.dmp for the name of the file. The suffix .dmp is added to the file automatically if you do not specify a suffix for the file. 4 Click Start. NOTE: Each test shows a status of Executing while it is in progress. The test then shows Completed when it successfully finishes. If any of the tests cannot be completed, a status of Failed is displayed in the Execution summary window.
book.book Page 290 Tuesday, June 18, 2013 3:03 PM SMrepassist -f E: NOTE: In Windows, the mount point path is a drive letter. An error message is displayed in the command line when the utility cannot distinguish between the following: • Source virtual disk and snapshot virtual disk (for example, if the snapshot virtual disk is removed). • Standard virtual disk and virtual disk copy (for example, if the virtual disk copy is removed).
book.book Page 291 Tuesday, June 18, 2013 3:03 PM 3 If you have an in-band storage array, use the following procedure. Click Refresh after each step to check the results: a Ensure that the host context agent software is installed and running. If the host is started before it is connected to the controllers in the storage array, the host context agent software is not able to find the controllers. If so, ensure that the connections are tight, and restart the host context agent software.
book.book Page 292 Tuesday, June 18, 2013 3:03 PM b Remove the storage array with the unresponsive status from MDSM, and add that storage array again. If the storage array returns to optimal status, you have completed this procedure. c Examine the ethernet cables to ensure that you cannot see any damage and that they are tightly connected. d Ensure that the applicable network configuration tasks are done (for example, the IP addresses are assigned to each controller).
book.book Page 293 Tuesday, June 18, 2013 3:03 PM Starting or Restarting the Host Context Agent Software The host context agent software module is the software component that resides on the server or management station that communicates with the MD3600f series storage arrays. The SMagent software automatically starts after you reboot the host. Windows To restart the SMagent software in Windows: 1 Click Start Settings Control Panel Administrative Tools Services.
book.book Page 294 Tuesday, June 18, 2013 3:03 PM Copyright (C) 2009-2010 Dell, Inc. All rights reserved.
book.book Page 295 Tuesday, June 18, 2013 3:03 PM Troubleshooting: Your Array 20 Safety First—For You and Your Array CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty.
book.book Page 296 Tuesday, June 18, 2013 3:03 PM Equip yourself with antistatic protection and a replacement small form-factor pluggable (SFP) transceiver before replacing an SFP transceiver in the RAID controller module. Also, see the initial setup information for the enclosure to verify LED definitions. 1 If possible, use the storage management software to create, save, and print a new storage array profile.
book.book Page 297 Tuesday, June 18, 2013 3:03 PM Figure 20-1. Removing an SFP Module 7 Install the new SFP transceiver into the interface port. Ensure that the transceiver is properly seated. 8 Reconnect the fiber optic cable. 9 View the FCIN speed LEDs and the Physical Disk Channel speed LEDs. Based on the LED status, perform one of these actions: • At least one of the FCIN LEDs for each port is on. Go to step 11.
book.book Page 298 Tuesday, June 18, 2013 3:03 PM Troubleshooting External Connections • Verify that the cables are connected to the correct ports before troubleshooting any external devices. To locate the back-panel connectors on your array, see Figure 3-1. • Ensure that all the cables are securely attached to the external connectors on your array. • For information on cabling, see the Dell PowerVault MD3600f Deployment Guide at dell.com/support/manuals.
book.book Page 299 Tuesday, June 18, 2013 3:03 PM CAUTION: Power supply/cooling fan modules are hot-swappable. The array can operate on a single power supply; however both modules must be installed to ensure proper cooling. A single power supply/cooling fan module can be removed from a powered-on array for a maximum period of 5 minutes. Beyond that time, the array may automatically shut down to prevent damage. 2 Reseat the power supply by removing and reinstalling it.
book.book Page 300 Tuesday, June 18, 2013 3:03 PM Troubleshooting Expansion Enclosure Management Modules CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 301 Tuesday, June 18, 2013 3:03 PM d Turn on the server. e Check the link status LED. If the link status LED is not green, replace the cables. If the problem is not resolved, see "Getting Help" on page 309. Troubleshooting RAID Controller Modules CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team.
book.book Page 302 Tuesday, June 18, 2013 3:03 PM • If both LEDs for any given FCIN port are unlit, see "Troubleshooting Array and Expansion Enclosure Connections" on page 303. a Turn off the server, storage arrays, and expansion enclosures. b Reseat the RAID controller module and reconnect cables on the storage array and the server. c Restart the storage array and wait until the array is fully booted. d Turn on the server. e Recheck the LEDs of the affected port(s).
book.book Page 303 Tuesday, June 18, 2013 3:03 PM Troubleshooting Array and Expansion Enclosure Connections 1 Verify that the SAS OUT status LED is green and that for each FCIN port connected to a cable, at least one of the paired LEDs is on. If this is not the case, see "Planning: RAID Controller Modules" on page 33. 2 Ensure that all the cables are attached correctly according to array mode you selected. 3 Turn off the server, storage array, and expansion enclosures.
book.book Page 304 Tuesday, June 18, 2013 3:03 PM Troubleshooting a Wet Storage Array CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 305 Tuesday, June 18, 2013 3:03 PM Troubleshooting a Damaged Array CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 306 Tuesday, June 18, 2013 3:03 PM Troubleshooting RAID Controller Modules Conditions Certain events can cause a RAID controller module to fail and/or shut down. Unrecoverable ECC memory or PCI errors, or critical physical conditions can cause lockdown. If your RAID storage array is configured for redundant access and cache mirroring, the surviving controller can normally recover without data loss or shutdown. Typical controller failures are detailed in the following sections.
book.book Page 307 Tuesday, June 18, 2013 3:03 PM PCI Errors The storage array firmware can detect and only recover from PCI errors when the RAID controller modules are configured for redundancy. If a virtual disk uses cache mirroring, it fails over to its peer RAID controller module, which initiates a flush of the dirty cache.
book.
book.book Page 309 Tuesday, June 18, 2013 3:03 PM Getting Help 21 Locating Your System Service Tag Your system is identified by a unique Express Service Code and Service Tag number. The Express Service Code and Service Tag are found on the front of the system by pulling out the information tag. This information is used by Dell to route support calls to the appropriate personnel. Contacting Dell NOTE: Dell provides several online and telephone-based support and service options.
book.book Page 310 Tuesday, June 18, 2013 3:03 PM Documentation Feedback If you have feedback for this document, write to documentation_feedback@dell.com. Alternatively, you can click on the Feedback link in any of the Dell documentation pages, fill up the form, and click Submit to send your feedback.
book.
book.
book.
book.
book.
book.
book.
book.