book.
book.book Page 2 Monday, June 21, 2010 11:00 AM Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. ____________________ Information in this document is subject to change without notice. © 2010 Dell Inc. All rights reserved.
book.book Page 3 Monday, June 21, 2010 11:00 AM Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . About This Document . . . . . . . . . . . . . . . . . . Inside the box of the Dell PowerVault MD3200 Series Storage Array . . . . . 18 . . . . . . . . . . 18 . . . . . . . . . . . 18 . . . . . . . . . . . . 19 Dell PowerVault Modular Disk Storage Manager . . . . . . . 2 Planning: About Your Storage Array . Overview . . . . 21 . . . . . . . . . . . . . . . . . . . . . . . .
book.book Page 4 Monday, June 21, 2010 11:00 AM RAID Controller Module Connectors and Features . . . 30 . . . . 32 . . . . . . . . . . . . . . . . 32 RAID Controller Module—Additional Features . Battery Backup Unit Storage Array Thermal Shutdown System Password Reset . . . . . . . . . 33 . . . . . . . . . . . . . . 33 Cache Functions and Features . Cache Mirroring. . . . . . . . . . . . . . 34 . . . . . . . . . . . . . . . . . . 34 Write-Back Cache . . . . . . . . . . . . . . . . .
book.book Page 5 Monday, June 21, 2010 11:00 AM Virtual Disk Operations Limit Disk Group Operations. . . . . . . . . . . . . 43 . . . . . . . . . . . . . . . . . 43 RAID Level Migration . . . . . . . . . . . . . . . . Segment Size Migration . . . . . . . . . . . . . . Virtual Disk Capacity Expansion Disk Group Expansion 43 43 . . . . . . . . . . 44 . . . . . . . . . . . . . . . 44 Disk Group Defragmentation . Disk Group Operations Limit . . . . . . . . . . . 45 . . . . . . . . . . . .
book.book Page 6 Monday, June 21, 2010 11:00 AM 5 Configuration: Overview User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 Array Management Window . . . . . . . . . . . . 61 Configuration: About Your Storage Array . . . . . . . . . . . . . . . . . . . . . 63 Out-of-Band and In-Band Management . Storage Arrays . . . . . . . . 63 . . . . . . . . . . . . . . . . . . . . . . 64 Adding Storage Arrays . . . . . . . . . . . . . . .
book.book Page 7 Monday, June 21, 2010 11:00 AM Setting the Storage Array RAID Controlle r Module Clocks . . . . . . . . . . . . . 7 Configuration: Event Monitor . . . . . 79 . . . . . . . . . 81 Enabling or Disabling the Event Monitor . . . . . . . . 82 . . . . . . . . . . . . . . . . . . . . . . 82 . . . . . . . . . . . . . . . . . . . . . . . . 82 Windows Linux 8 Configuration: About Your Host . . . . . . . . 83 Configuring Host Access . . . . . . . . . . . . . . . .
book.book Page 8 Monday, June 21, 2010 11:00 AM Locating a Disk Group . . . . . . . . . . . . . . . 96 Creating Virtual Disks . . . . . . . . . . . . . . . . 96 Changing the Virtual Disk Modification Priority . . . . . . . . . . . . . . . . . . . . . . . Changing the Virtual Disk Cache Settings . . . . . Changing the Segment Size of a Virtual Disk . Changing the I/O Type. 101 . . . . . . . . . . . . . . 102 . . . . 103 . . . . . 104 Creating a Security Key . . . . . . . . . . . . . .
book.book Page 9 Monday, June 21, 2010 11:00 AM Restricted Mappings. 122 . . . . . . . . . . . . . . . . . . Changing the RAID Controller Module Ownership of a Virtual Disk or a Disk Group . . . . . . . . . . 124 Changing the RAID Level of a Disk Group . Storage Partitioning . . . . . . . . 125 . . . . . . . . . . . . . . . . . . 126 . . . . . . . . 128 Disk Group Expansion . . . . . . . . . . . . . . . 128 Virtual Disk Expansion . . . . . . . . . . . . . . . 129 . . . . . . . . . . . . . .
book.book Page 10 Monday, June 21, 2010 11:00 AM About the Advanced Path. . . . . . . . . . . . . Preparing Host Servers to Create the Snapshot Using the Advanced Path Creating the Snapshot Using the Advanced Path . . . . . . . . . . . . . . . 141 . . . . . . . . 143 Specifying Snapshot Virtual Disk Names . Snapshot Repository Capacity . . . . . . . 145 . . . . . . . . . . . . 146 . . . . . . . . . 149 . . . . . . . . . . 150 Re-creating Snapshot Virtual Disks .
book.book Page 11 Monday, June 21, 2010 11:00 AM Copy Manager Copying the Virtual Disk . Setting Copy Priority . . . . . . . . 160 . . . . . . . . . . . . . . . . . . 161 Stopping a Virtual Disk Copy Recopying a Virtual Disk . . . . . . . . . . . . . . 161 . . . . . . . . . . . . . . . . 162 Preparing Host Servers to Recopy a Virtual Disk . . . . . . . . . . . . . . . . . . . . 162 . . . . . . . . . . . . . 163 . . . . . . . . . . . . . . . . . .
book.book Page 12 Monday, June 21, 2010 11:00 AM 14 Management: Firmware Downloads Downloading RAID Controller and NVSRAM Packages . . . . . . . . . . . . . . . . . . . . . . 177 . . . . . 177 Downloading Both RAID Controller and NVSRAM Firmware . . . . . . . . . . . . . . . . . . . . . . . . 178 . . . . . . . 180 . . . . . . . . 183 Downloading Only NVSRAM Firmware . Downloading Physical Disk Firmware Downloading MD1200 Series Expansion Module EMM Firmware . . . . . . . . . . . . . . . . . .
book.book Page 13 Monday, June 21, 2010 11:00 AM RAID Controller Module . 197 . . . . . . . . . . . . . . . . Removing a RAID Controller Module Blank . . . . 197 Installing a RAID Controller Module Blank . . . . . 198 . . . . . . . 199 . . . . . . . . 200 Removing a RAID Controller Module . Installing a RAID Controller Module Opening the RAID Controller Module Closing the RAID Controller Module . . . . . . . 200 . . . . . . . . 201 RAID Controller Module Backup Battery Unit 202 . . . .
book.book Page 14 Monday, June 21, 2010 11:00 AM Virtual Disk Service . . . . . . . . . . . . . . . . Volume Shadow-Copy Service . . . . . . . . . . 18 Troubleshooting: Your Storage Array Software . . . . . . . . . . . . Start-Up Routine 217 . . . . . . . . . . . . . . . . . . . . 217 . . . . . . . . . . . . . . . Storage Array Support Data . . . . . . . . . . . . . . 220 221 . . . . . . . . . . 222 . . . . . . . . . . . . . . . . . . . . . . . 222 Collecting the Physical Disk Data .
book.book Page 15 Monday, June 21, 2010 11:00 AM Unidentified Devices 236 . . . . . . . . . . . . . . . . . . . . . . 236 . . . . . . . . 239 Recovering From an Unidentified Storage Array Starting or Restarting the Host Context Agent Software . . . . . . . . . . . . . 19 Troubleshooting: Your Array Safety First—For you and Your Array . . . . . . . . . . . . . . . . . . . Troubleshooting Storage Array Startup Failure . Troubleshooting External Connections 241 . . . . . . . . 241 . . . . . . .
book.book Page 16 Monday, June 21, 2010 11:00 AM PCI Errors . . . . . . . . . . . . . . . . . . . . . Critical Conditions. . . . . . . . . . . . . . . . . Noncritical Conditions 20 Getting Help . 16 250 . . . . . . . . . . . . . . 251 . . . . . . . . . . . . . . . . . . . . . 253 Contacting Dell . Index 250 . . . . . . . . . . . . . . . . . . . . 253 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
book.book Page 17 Monday, June 21, 2010 11:00 AM 1 Introduction See the Safety, Environmental, and Regulatory Information document for important safety information before following any procedures listed in this document. About This Document This guide familiarizes you with the functions of the MD3200 Series storage array. The guide is organized according to the tasks that you must complete after receiving your Dell™ PowerVault™ MD3200 Series storage array.
book.book Page 18 Monday, June 21, 2010 11:00 AM Inside the box of the Dell PowerVault MD3200 Series Storage Array Unless specified MD3200 Series represents Dell PowerVault MD3200 and Dell PowerVault MD3220.
book.book Page 19 Monday, June 21, 2010 11:00 AM Other Information you May Need WARNING: See the safety and regulatory information that shipped with your system. Warranty information may be included within this document or as a separate document. • Getting Started Guide provides an overview of setting up and cabling your storage array. • Deployment Guide provides installation and configuration instructions for both software and hardware.
book.
book.book Page 21 Monday, June 21, 2010 11:00 AM 2 Planning: About Your Storage Array Overview The MD3200 Series storage array is designed for high availability, offering redundant access to data storage. It features support for both single and dual RAID controller configuration. The Dell™ PowerVault™ MD3200 Series storage array provides 6.0-Gbps SAS connectivity to the host server and enables access for up to 8 non-redundant servers or 4 redundant servers.
book.book Page 22 Monday, June 21, 2010 11:00 AM Hardware Features Front-Panel Features and Indicators Figure 2-1. Front-Panel Features and Indicators—Dell™ PowerVault™ MD3200 1 2 3 4 5 6 Figure 2-2.
book.book Page 23 Monday, June 21, 2010 11:00 AM Figure 2-3. Front-Bezel Features and Indicators 1 2 3 Item Indicator, Button, or Connector 1 Enclosure status LED Icon Description The enclosure status LED lights when the enclosure power is on. Lights blue during normal operation. Blinks blue when a host server is identifying the enclosure or when the system identification button is pressed. Lights amber as enclosure boots or is reset.
book.book Page 24 Monday, June 21, 2010 11:00 AM Item Indicator, Button, or Connector Icon Description 3 Split mode LED This LED should be unlit as the split mode function is not supported by the MD3200 Series Storage Arrays. 4 System identification button The system identification button on the front control panel can be used to locate a particular enclosure within a rack.
book.book Page 25 Monday, June 21, 2010 11:00 AM Back Panel Features and Indicators Figure 2-4.
book.book Page 26 Monday, June 21, 2010 11:00 AM Hard-Drive Indicator Patterns Figure 2-5.
book.book Page 27 Monday, June 21, 2010 11:00 AM Drive-Status Indicator Pattern Condition Off The physical disk is: • not yet discovered by the host server • has been spun down for removal • not supported for the RAID controller module or is not in the physical disk slot NOTE: The drive status indicator remains off until all hard drives are initialized after system power is turned on. Drives are not ready for insertion or removal during this time.
book.book Page 28 Monday, June 21, 2010 11:00 AM Power Indicator Codes Figure 2-6. Power Indicator Codes 1 2 3 4 5 Item LED Type 1 DC power Icon Description The LED lights green when the DC output voltage is within the limit. If this LED is off, it indicates that the DC output voltage are not within the limit. 2 Power supply/cooling fan fault The LED lights amber when the DC output voltage is not within the limit or a fault with the fan is detected.
book.book Page 29 Monday, June 21, 2010 11:00 AM 3 Planning: RAID Controller Modules RAID Controller Modules The RAID controller modules provide high-performance, advanced virtual disk configuration, and fault-tolerant disk subsystem management. Each RAID controller module contains 2 GB of cache that is mirrored with the other controller's cache for high availability and is protected by a batterypowered cache offload mechanism.
book.book Page 30 Monday, June 21, 2010 11:00 AM RAID Controller Module Connectors and Features Figure 3-1. MD3200 Series SAS RAID Controller Module 1 8 2 9 3 10 11 4 5 12 13 14 15 16 17 6 18 19 7 20 21 Item Component Function 1 SAS OUT port Provides SAS connection for cabling to a downchain expansion enclosure. 2 SAS IN port 0 Provides host-to-controller SAS connection. 3 SAS IN port 1 Provides host-to-controller SAS connection.
book.book Page 31 Monday, June 21, 2010 11:00 AM Item Component Function 9 Controller power Lights green when controller power is on. LED Off when controller is not powered. 10 SAS IN 0 port link/fault LED Lights green when all four links are connected. Lights amber when one to three links are disconnected. Off when all links in the port are disconnected or cable is disconnected. 11 Controller fault LED Lights amber when controller fault detected.
book.book Page 32 Monday, June 21, 2010 11:00 AM Item Component Function 18 SAS IN 3 port link/fault LED Lights green when all four links are connected. Lights amber when one to three links are disconnected. Off when all links in the port are disconnected or cable is disconnected. 19 Management port speed LED Lights green when ethernet connection is operating at 1000 Mbps. Lights amber when ethernet connection is operating at 100 Mbps.
book.book Page 33 Monday, June 21, 2010 11:00 AM Storage Array Thermal Shutdown The system automatically shuts down when system temperature exceeds the safe threshold. The battery backup unit protects against data loss by providing power to offload cache to non-volatile memory in the event of power loss. It is not necessary to shut down any MD1200 Series expansion enclosures attached to the storage array when thermal shutdown occurs.
book.book Page 34 Monday, June 21, 2010 11:00 AM Cache Functions and Features Cache Mirroring Cache mirroring function copies accepted host-write data from the primary controller to the partner controller. This action ensures that host-write data is safely mirrored to the partner controller before successful completion status is returned to the host. If a controller fails, the surviving controller safely retains all mirrored data. Cache mirroring is enabled by default.
book.book Page 35 Monday, June 21, 2010 11:00 AM 4 Planning: MD3200 Series Storage Array Terms and Concepts This chapter explains terms and concepts used for configuration and operation of MD3200 Series Storage Arrays. Physical Disks, Virtual Disks, and Disk Groups Physical disks in your storage array provide the physical storage capacity for your data.
book.book Page 36 Monday, June 21, 2010 11:00 AM Physical Disks Only Dell™ supported 6.0-Gbps SAS physical disks are supported in the storage array. If the storage array detects unsupported physical disks, it marks the disk as unsupported and the physical disk becomes unavailable for all operations. NOTE: The MD3200 Series array must contain at least two physical disks for proper operation. This is necessary because the physical disks are used to store configuration information.
book.book Page 37 Monday, June 21, 2010 11:00 AM Table 4-1. RAID Controller Physical Disk States (continued) Status Mode Description Physical Disk Status LED Pending Failure Assigned, Unassigned, Hot Spare in use, or Hot Spare standby A Self-Monitoring Analysis and Reporting Technology (SMART) error has been detected on the physical disk in the indicated slot.
book.book Page 38 Monday, June 21, 2010 11:00 AM 3 Provide host server access. 4 Create mappings to associate the virtual disks with the host servers. NOTE: Host server access must be created before mapping virtual disks. Disk groups are always created in the unconfigured capacity of a storage array. Unconfigured capacity is the available physical disk space not already assigned in the storage array. Virtual disks are created within the free capacity of a disk group.
book.book Page 39 Monday, June 21, 2010 11:00 AM Using multiple physical disks has the following advantages over using a single physical disk: • Placing data on multiple physical disks (striping) allows input/output (I/O) operations to occur simultaneously and improve performance. • Storing redundant data on multiple physical disks using mirroring or parity supports reconstruction of lost data if an error occurs, even if that error is the failure of a physical disk.
book.book Page 40 Monday, June 21, 2010 11:00 AM RAID 1 RAID 1 uses disk mirroring so that data written to one physical disk is simultaneously written to another physical disk. This RAID level offers fast performance and the best data availability, but also the highest disk overhead. RAID 1 is recommended for small databases or other applications that do not require large capacity for example accounting, payroll, or financial applications. RAID 1 provides full data redundancy.
book.book Page 41 Monday, June 21, 2010 11:00 AM Segment Size Disk striping enables data to be written across multiple physical disks. Disk striping enhances performance because striped disks are accessed simultaneously. The segment size or stripe element size specifies the size of data in a stripe written to a single disk. The MD3200 Series array supports stripe element sizes of 8, 16, 32, 64, 128, 256, and 512 KB. The default stripe element size is 128 KB.
book.book Page 42 Monday, June 21, 2010 11:00 AM Consistency Check A consistency check verifies the correctness of data in a redundant array (RAID levels 1, 5, 6, and 10). For example, in a system with parity, checking consistency involves computing the data on one physical disk and comparing the results to the contents of the parity physical disk. A consistency check is similar to a background initialization.
book.book Page 43 Monday, June 21, 2010 11:00 AM Virtual Disk Operations Limit The maximum number of active, concurrent virtual disk processes per RAID controller module installed in the storage array is four. This limit is applied to the following virtual disk processes: • Background initialization • Foreground initialization • Consistency check • Rebuild • Copy back.
book.book Page 44 Monday, June 21, 2010 11:00 AM Dynamic segment size migration enables the segment size of a given virtual disk to be changed. A default segment size is set when the virtual disk is created, based on such factors as the RAID level and expected usage. You can change the default value (128 KB) if segment size usage does not match your needs.
book.book Page 45 Monday, June 21, 2010 11:00 AM Disk Group Defragmentation Defragmenting consolidates the free capacity in the disk group into one contiguous area. Defragmentation does not change the way in which the data is stored on the virtual disks. Disk Group Operations Limit The maximum number of active, concurrent disk group processes per installed RAID controller module is one.
book.book Page 46 Monday, June 21, 2010 11:00 AM • Segment size migration • Disk group expansion • Disk group defragmentation. The priority of each of these operations can be changed to address performance requirements of the environment in which the operations are to be executed. NOTE: Setting a high priority level impacts storage array performance. It is not advisable to set priority levels at the maximum level.
book.book Page 47 Monday, June 21, 2010 11:00 AM the MD3200 array does not recognize the migrating metadata and that data is lost. In this case, the MD3200 initializes the physical disks and mark them as unconfigured capacity. NOTE: Only disk groups and associated virtual disks with all member physical disks present can be migrated from one storage array to another. it is recommended that you only migrate disk groups that have all their associated member virtual disks in an optimal state.
book.book Page 48 Monday, June 21, 2010 11:00 AM • Migrating virtual disks to a storage array with no existing physical disks— Turn off the destination storage array, when migrating disk groups or a complete set of physical disks from a storage array to another storage array that has no existing physical disks. After the destination storage array has been turned on and has successfully recognized the newly migrated physical disks, migration operations can continue.
book.book Page 49 Monday, June 21, 2010 11:00 AM Host Server-to-Virtual Disk Mapping The host server attached to a storage array accesses various virtual disks on the storage array through its host ports. Specific virtual disk-to-LUN mappings to an individual host server can be defined. In addition, the host server can be part of a host group that shares access to one or more virtual disks. You can manually configure a host server-to-virtual disk mapping.
book.book Page 50 Monday, June 21, 2010 11:00 AM online and user-accessible. When the backup is completed, the snapshot virtual disk is no longer needed. You can create up to four snapshots per virtual disk. Snapshots are used to recover previous versions of files that have changed since the snapshot was taken. Snapshots are implemented using a copy-onwrite algorithm, which makes a backup copy of data the instant an error occurs.
book.book Page 51 Monday, June 21, 2010 11:00 AM Virtual Disk Copy Virtual disk copy is a premium feature you can use to: • Back up data • Copy data from disk groups that use smaller-capacity physical disks to disk groups using greater capacity physical disks • Restore snapshot virtual disk data to the source virtual disk. Virtual disk copy generates a full copy of data from the source virtual disk to the target virtual disk in a storage array.
book.book Page 52 Monday, June 21, 2010 11:00 AM Ensure that you record the LUN used to provide access to the source virtual disk. You need this information when you define a host server-to-virtual disk mapping for the target (backup) virtual disk. Also, be sure to stop all I/O activity to the source virtual disk before beginning the virtual disk recovery procedure.
book.book Page 53 Monday, June 21, 2010 11:00 AM Preferred and Alternate Controllers and Paths A preferred controller is a RAID controller module designated as the owner of a virtual disk or disk group. The preferred controller is automatically selected by MDSM when a virtual disk is created. You can change the preferred RAID controller module owner of a virtual disk after it is created.
book.book Page 54 Monday, June 21, 2010 11:00 AM Load Balancing A load balance policy is used to determine which path is used to process I/O. Multiple options for setting the load balance policies lets you optimize I/O performance when mixed host interfaces are configured.
book.book Page 55 Monday, June 21, 2010 11:00 AM Monitoring MD3200 Series System Performance You can use the Performance Monitor to select virtual disks and RAID controller modules to monitor or to change the polling interval. Keep these guidelines in mind when using the Performance Monitor: • The Performance Monitor does not dynamically update its display if any configuration changes occur while the window is open. You must close the Performance Monitor window and reopen it for the changes to appear.
book.book Page 56 Monday, June 21, 2010 11:00 AM 5 Click Start. Values appear for the selected storage arrays in the Performance Monitor data table. The table is updated at the interval specified in the Polling Interval setting. 6 Click Update to force an immediate poll of the storage array. 7 Click Stop to stop monitoring the storage array. 8 Click Save As on the Performance Monitor main dialog to save the currently displayed performance statistics. 9 Select an appropriate directory.
book.book Page 57 Monday, June 21, 2010 11:00 AM Table 4-3. Performance Monitor Table Description Column Headings Description Current KB/second Snapshot of throughput value per second (1KB = 1024 bytes). Maximum KB/second Maximum recorded throughput value from last start time. Current IO/second Snapshot of IO’s per second (IOP = Input/output per second or one completed I/O transaction). Maximum IO/second Maximum recorded IOP from last start time. For more information, see the online help topics.
book.
book.book Page 59 Monday, June 21, 2010 11:00 AM Configuration: Overview 5 Dell™ PowerVault™ Modular Disk Storage Manager (MDSM) online help contains information on the how to use the MDSM application to perform the configuration and management tasks described in this document. You can access online help by selecting Help located at the top right corner of MDSM interface. See the MD3200 and MD3220 Storage Array’s Deployment Guide Deployment Guide for information on installing the MDSM.
book.book Page 60 Monday, June 21, 2010 11:00 AM Enterprise Management Window The EMW provides high-level management of storage arrays. When you start MDSM, the EMW opens. The EMW has these tabs: • Devices tab—Provides information about the storage arrays. • Setup tab—Presents the initial setup tasks that guide you through adding storage arrays and configuring alerts.
book.book Page 61 Monday, June 21, 2010 11:00 AM Inheriting the System Settings Use the Inherit System Settings option to import the operating system theme settings into the MDSM. Importing system theme settings affects such features as font type, font size, color, and contrast in the MDSM. 1 Open the Inherit System Settings window in one of these ways: • Select Tools Inherit System Settings. • Select the Setup tab, and click Inherit System Settings.
book.book Page 62 Monday, June 21, 2010 11:00 AM • Physical tab—You can view the organization of the storage array by RAID controller modules, physical disks, and other hardware components. • Mappings tab—You can define the hosts, host groups, and host ports. You can change the mappings to grant virtual disk access to host groups and hosts and create storage partitions. • Setup tab—You can complete the initial setup tasks to configure the storage array.
book.book Page 63 Monday, June 21, 2010 11:00 AM 6 Configuration: About Your Storage Array Out-of-Band and In-Band Management You can manage a storage array in two ways: • Out-of-band management • In-band management Out-of-Band Management Using the out-of-band management method, data is separate from commands and events. Data travels through the host-to-controller interface, while commands and events travel through the management port Ethernet cables.
book.book Page 64 Monday, June 21, 2010 11:00 AM In-Band Management Using in-band management, commands, events, and data travel through the host-to-controller interface. Unlike out-of-band management, commands and events are mixed with data. NOTE: For detailed information on setting up in-band and out-of-band management see the Deployment Guide. When you add storage arrays by using this management method, you need to specify only the host name or IP address of the host.
book.book Page 65 Monday, June 21, 2010 11:00 AM NOTE: For Linux, set the default gateway so that broadcast packets are sent to 255.255.255.0. For Red Hat® Enterprise Linux®, if no gateway exists on the network, set the default gateway to the IP address of the NIC. NOTE: MDSM uses TCP/UDP port 2463 for communication to the MD Storage Array.
book.book Page 66 Monday, June 21, 2010 11:00 AM NOTE: The host agent must be restarted before in-band management communication can be established. See "Starting or Restarting the Host Context Agent Software" on page 239. 3 Click Add. 4 Use one of these methods to name a storage array: • In the EMW, select the Setup tab, and select Name/Rename Storage Arrays. • In the AMW, select the Setup tab, and select Rename Storage Array.
book.book Page 67 Monday, June 21, 2010 11:00 AM • Save Configuration—Save the configuration parameters in a file that you can use to restore the configuration, or reuse the configuration on another storage array. For more information, see the PowerVault Modular Disk Storage Manager online help topics.
book.book Page 68 Monday, June 21, 2010 11:00 AM A confirmation message is displayed. 4 Click OK. Naming or Renaming Storage Arrays Each storage array should be assigned a unique up to 30-character alphanumeric name. A name can consist of letters, numbers, and the special characters underscore (_), dash (–), and pound sign (#). No other special characters are allowed. To rename a selected storage array: 1 Perform one of these actions: • In the AMW Setup tab, select Rename Storage Array.
book.book Page 69 Monday, June 21, 2010 11:00 AM Setting a Password You can configure each storage array with a password to protect it from unauthorized access. MDSM prompts for the password when an attempt is made to change the storage array configuration, such as, when a virtual disk is created or deleted. View operations do not change the storage array configuration and do not require a password. You can create a new password or change an existing password.
book.book Page 70 Monday, June 21, 2010 11:00 AM Password Guidelines Follow these guidelines when you create a password: • Use secure passwords for your storage array. A password should be easy for you to remember but difficult for others to determine. Consider using numbers or special characters in the place of letters, such as a 1 in the place of the letter I, or the at sign (@) in the place of the letter a. • For increased protection, use a long password with at least 15 alphanumeric characters.
book.book Page 71 Monday, June 21, 2010 11:00 AM Adding/Editing a Comment to an Existing Storage Array A descriptive comment, with an applicable storage array name, is a helpful identification tool. You can add or edit a comment for a storage array in the EMW only. To add or edit a comment: 1 In the EMW, select the Devices tab and select the relevant managed storage array. 2 Select Edit Comment. The Edit Comment dialog is displayed. 3 Type the 60-character comment. 4 Click OK.
book.book Page 72 Monday, June 21, 2010 11:00 AM Enabling Premium Features You can enable premium features on the storage array. To enable the premium features, you must obtain a feature key file specific to the premium feature that you want to enable from your storage supplier. To enable premium features: 1 From the toolbar in AMW, select Storage Array Premium Features. The Premium Features and Feature Pack Information window is displayed. 2 Select the relevant premium feature, and click Enable.
book.book Page 73 Monday, June 21, 2010 11:00 AM Changing the Cache Settings on the Storage Array To change the storage array cache settings: 1 In the AMW, select Storage Array Change Cache Settings. The Change Cache Settings window is displayed. 2 Select or enter the percentage of unwritten data in the cache to trigger a cache flush in Start flushing. 3 Select or enter the percentage of unwritten data in the cache to stop a cache flush in progress in Stop flushing.
book.book Page 74 Monday, June 21, 2010 11:00 AM To change the enclosure order in the physical pane: 1 In the AMW, select Storage Array Change Enclosure Order. 2 From the enclosures list, select the enclosure you want to move and click either Up or Down to move the enclosure to the new position. 3 Click OK. 4 If you have set a password for the selected storage array, the Enter Password dialog appears. Type the current password for the storage array. 5 Click OK.
book.book Page 75 Monday, June 21, 2010 11:00 AM Configuring E-mail Alerts For more information on configuring alert notifications, see "Configuring Alert Notifications" on page 74. To configure e-mail alerts: 1 Open the Configure Alerts dialog by performing one of these actions: • In the Tree view or the Table view on the Devices tab in the EMW, select a node, and then select Edit Configure Alerts. Go to step 3. • In the Setup tab in the EMW, select Configure Alerts. Go to step 2.
book.book Page 76 Monday, June 21, 2010 11:00 AM NOTE: Including the contact information in the e-mail alert is optional. 7 Select the e-mail tab to configure the e-mail destinations. • Adding an e-mail address—In e-mail address, type the e-mail address, and click Add. • Replacing an e-mail address—In the Configured E-mail addresses area, select the e-mail address to be replaced, type the replacement email address in E-mail address, and click Replace.
book.book Page 77 Monday, June 21, 2010 11:00 AM • You must provide a SMTP mail server name and an e-mail sender address for the e-mail addresses to work. • The e-mail addresses that you had previously configured appear in the Configured e-mail addresses area. • You must use fully qualified e-mail addresses, for example, name@mycompany.com. • You can configure multiple e-mail addresses before you click OK.
book.book Page 78 Monday, June 21, 2010 11:00 AM NOTE: The community name is an American Standard Code for Information Interchange (ASCII) string that identifies a known set of network management stations and is set by the network administrator. The default community name is the string “public”.The trap destination is the IP address or the host name of a computer running an SNMP management application. An example of a SNMP enabled management application is the Dell Management Console. Please see dell.
book.book Page 79 Monday, June 21, 2010 11:00 AM The learn cycle completes the following operations: • Discharges the battery to a predetermined threshold • Charges the battery back to full capacity A learn cycle starts automatically when you install a new battery module. Learn cycles for batteries in both RAID controller modules in a duplex system occur simultaneously. Learn cycles are scheduled to start automatically at regular intervals, at the same time and on the same day of the week.
book.book Page 80 Monday, June 21, 2010 11:00 AM written by the RAID controller modules to the Event Log match the event timestamps written to host log files. The RAID controller modules remain available during synchronization. To synchronize the RAID controller module clocks with the storage management station: 1 In the AMW, select Storage Array Synchronize RAID Controller Module Clocks.
book.book Page 81 Monday, June 21, 2010 11:00 AM Configuration: Event Monitor 7 An event monitor is provided with Dell™ PowerVault™ Modular Disk Storage Manager (MDSM). The event monitor runs continuously in the background and monitors activity on the managed storage arrays. If the event monitor detects any critical problems, it can notify a host or remote system using email, Simple Network Management Protocol (SNMP) trap messages, or both.
book.book Page 82 Monday, June 21, 2010 11:00 AM Enabling or Disabling the Event Monitor You can enable or disable the event monitor at any time. Disable the event monitor if you do not want the system to send alert notifications. If you are running the event monitor on multiple systems, disabling the event monitor on all but one system prevents the sending of duplicate messages.
book.book Page 83 Monday, June 21, 2010 11:00 AM Configuration: About Your Host 8 Configuring Host Access Modular Disk Storage Manager (MDSM) software is comprised of multiple modules. One of these modules is the Host Context Agent. The host context agent is installed as part of the MDSM installation and runs continuously in the background.
book.book Page 84 Monday, June 21, 2010 11:00 AM • Change the host port identifier alias or user label. • Move or associate a host port identifier to a different host. • Replace a host port identifier with a new host port identifier. • Manually activate an inactive host port so that the port can gain access to host specific or host group specific LUN mappings. • Set the host port type to another type. • Move a host from one host group to another host group.
book.book Page 85 Monday, June 21, 2010 11:00 AM • Select the Mappings tab. Right-click the root node (storage array name), Default Group node, or Host Group node in the Topology pane to which you want to add the host, and select Define Host from the pop-up menu. The Specify Host Name window is displayed. 3 In Host name, enter an up to 30 character alphanumeric name. 4 Select the relevant option in Do you plan to use the storage partitions in the this storage array? and click Next.
book.book Page 86 Monday, June 21, 2010 11:00 AM The Preview window is displayed. 11 Click Finish. Removing Host Access To remove host access: 1 In the AMW, select the Mappings tab, select the host node in the Topology pane. 2 Perform one of these actions: • Select Mappings Remove. • Right-click the host node, and select Remove from the pop-up menu. The Remove confirmation dialog appears. 3 Type yes. 4 Click OK. For more information, see the PowerVault Modular Disk Storage Manager online help topics.
book.book Page 87 Monday, June 21, 2010 11:00 AM • Right-click the storage array or the Default Group, and select Define Host Group from the pop-up menu. 4 Type the name of the new host group in Enter new host group name. 5 Select the appropriate hosts in the Select hosts to add area. 6 Click Add. NOTE: To remove hosts, select the hosts in the Hosts in group area, and click Remove. 7 Click OK. The host group is added to the storage array.
book.book Page 88 Monday, June 21, 2010 11:00 AM 4 Click Yes. The host is moved to the selected host group with the following mappings: • The host retains the specific virtual disk mappings assigned to it. • The host inherits the virtual disk mappings assigned to the host group to which it is moved. • The host loses the virtual disk mappings assigned to the host group from which it was moved.
book.book Page 89 Monday, June 21, 2010 11:00 AM • Changing a host type MDSM automatically detects these changes for any host running the host agent software. Starting or Stopping the Host Context Agent The host context agent discovers the host topology. The host context agent starts and stops with the host. The topology discovered by the host context agent can be viewed by clicking Configure Host Access (Automatic) in the Configure tab in the MDSM.
book.book Page 90 Monday, June 21, 2010 11:00 AM 3 If the host context agent is running, click Action Stop, then wait approximately 5 seconds. 4 Click Action Start. I/O Data Path Protection You can have multiple host-to-array connections for a host. Ensure that you select all the connections to the array when configuring host access to the storage array. NOTE: See the Deployment Guide for more information on cabling configurations.
book.book Page 91 Monday, June 21, 2010 11:00 AM Managing Host Port Identifiers You can manage the host port identifiers that are added to the storage array. You can: • Add—Add or associate a new host port identifier to a particular host. • Edit—Change the host port identifier alias or user label. You can move (associate) the host port identifier to a new host. • Replace—Replace a particular host port identifier with another host port identifier.
book.book Page 92 Monday, June 21, 2010 11:00 AM 5 Select the method to add a host port identifier to the host. You can select: • Add by selecting a know unassociated host port identifier—Select the appropriate host port identifier from the existing list of Known unassociated host port identifiers. • Add by creating a new host port identifier—In New host port identifier, enter the name of the new host port identifier. 6 In User label, enter up to 30 character alphanumeric name.
book.book Page 93 Monday, June 21, 2010 11:00 AM Configuration: Disk Groups and Virtual Disks 9 Creating Disk Groups and Virtual Disks Disk groups are created in the unconfigured capacity of a storage array, and virtual disks are created in the free capacity of a disk group. The maximum number of physical disks supported in a disk group is 30. The hosts attached to the storage array read and write data to the virtual disks.
book.book Page 94 Monday, June 21, 2010 11:00 AM A disk group should be organized according to its related tasks and subtasks. For example, if you create a disk group for the Accounting Department, you can create virtual disks that match the different types of accounting performed in the department: Accounts Receivable (AR), Accounts Payable (AP), internal billing, and so forth. In this scenario, the AR and AP virtual disks probably need more capacity than the internal billing virtual disk.
book.book Page 95 Monday, June 21, 2010 11:00 AM 3 Type up to 30-character name of the disk group in Disk group name. 4 Select the appropriate Physical Disk selection choices, you can select: • Automatic, see step 6 • Manual, see step 9 5 Click Next. 6 For Automatic configuration, The RAID Level and Capacity window is displayed. 7 Select the appropriate RAID level in Select RAID level. You can select RAID levels 0, 1/10, 6, and 5.
book.book Page 96 Monday, June 21, 2010 11:00 AM Locating a Disk Group You can physically locate and identify all of the physical disks that comprise a selected disk group. An LED blinks on each physical disk in the disk group. To locate a disk group: 1 In the AMW, select the Logical tab. 2 Select the appropriate disk group and from the toolbar select Disk Group Blink The LEDs for the selected disk group blink. 3 After locating the disk group, click OK. The LEDs stop blinking.
book.book Page 97 Monday, June 21, 2010 11:00 AM To create virtual disks: 1 Choose one of these methods to start the Create Virtual Disk Wizard: • To create a virtual disk from unconfigured capacity in the storage array—On the Logical tab, select an Unconfigured Capacity node, and select Virtual Disk Create. Alternatively, you can right-click the Unconfigured Capacity node, and select Create Virtual Disk from the pop-up menu.
book.book Page 98 Monday, June 21, 2010 11:00 AM 5 In Advanced virtual disk parameters, you can select: • Use recommended settings. • Customize settings. 6 Click Next. 7 In the Customize Advanced Virtual Disk Parameters window, select the appropriate Virtual Disk I/O characteristics type. You can select: • File system (typical) • Database • Multimedia • Custom NOTE: If you select Custom, you must select an appropriate segment size.
book.book Page 99 Monday, June 21, 2010 11:00 AM To change the virtual disk modification priority: 1 In the AMW, select the Logical tab. 2 Select a virtual disk. 3 In the toolbar, select Virtual Disk Change Modification Priority. The Change Modification Priority window is displayed. 4 Select one or more virtual disks. To select nonadjacent virtual disks, press click. To select adjacent virtual disks, press click. To select all of the available virtual disks, click Select All.
book.book Page 100 Monday, June 21, 2010 11:00 AM To change the virtual disk cache settings: 1 In the AMW, select the Logical tab and select a virtual disk 2 In the toolbar, select Virtual Disk Change Cache Settings. The Change Cache Settings window is displayed. 3 Select one or more virtual disks. To select nonadjacent virtual disks, press click. To select adjacent virtual disks, press click. To select all of the available virtual disks, click Select All.
book.book Page 101 Monday, June 21, 2010 11:00 AM 5 Click OK. A message prompts you to confirm the change in the virtual disk modification priority. 6 Click Yes. 7 Click OK. Changing the Segment Size of a Virtual Disk You can change the segment size on a selected virtual disk. During this operation, I/O performance is affected, but your data remains available. Guidelines to proceed with changing the segment size: • You cannot cancel this operation after it starts.
book.book Page 102 Monday, June 21, 2010 11:00 AM To change the segment size of a virtual disk: 1 In the AMW, select the Logical tab and select a virtual disk. 2 Select Virtual Disk Change Segment Size. 3 Select the required segment size. A message prompts you to confirm the selected segment size. 4 Click Yes. The segment size modification operation begins. The virtual disk icon in the Logical pane shows an Operation in Progress status while the operation is taking place.
book.book Page 103 Monday, June 21, 2010 11:00 AM To change the I/O type: 1 Select from these virtual disk I/O characteristic types, based on your application needs: • File system (typical) • Database • Multimedia • Custom The corresponding dynamic cache read prefetch setting and segment size values that are typically well suited for the selected virtual disk I/O characteristic type are populated in the Dynamic cache read prefetch and Segment size fields.
book.book Page 104 Monday, June 21, 2010 11:00 AM Physical Disk Security with Self Encrypting Disk Self encrypting disk (SED) technology prevents unauthorized access to the data on a physical disk that is physically removed from the storage array. The storage array has a security key. Self encrypting disks provide access to data only through an array that has the correct security key. The self encrypting disk or a security capable physical disk encrypts data during writes and decrypts data during reads.
book.book Page 105 Monday, June 21, 2010 11:00 AM The following table shows how to interpret the security status of a disk group Table 9-1. Interpretation of Security Status of Disk Group Secure Security Capable - Yes Security Capable - No Yes The disk group is composed of all Not applicable. Only SED SED physical disks and is in a physical disks can be in a Secure Secure state. state.
book.book Page 106 Monday, June 21, 2010 11:00 AM The Create a secure disk group option appears in the Create Disk Group Wizard - Disk Group Name and Physical Disk Selection dialog. The Create a secure disk group option is active only when these conditions are met: • A security key is installed in the storage array. • At least one security capable physical disk is installed in the storage array. • All of the physical disks that you selected on the Physical tab are security capable physical disks.
book.book Page 107 Monday, June 21, 2010 11:00 AM To create a security key: 1 In the AMW toolbar, select Storage ArrayPhysical Disk Security Create Security Key. The Create Security Key window is displayed. 2 Enter a string that becomes part of the secure key identifier, in Security key identifier. You can enter up to 189 alphanumeric characters without spaces, punctuation, or symbols. Additional characters is generated automatically and is appended to the end of the string that you enter.
book.book Page 108 Monday, June 21, 2010 11:00 AM After you have created a security key, you can create secure disk groups from security capable physical disks. Creating a secure disk group makes the physical disks in the disk group security-enabled. Security-enabled physical disks enter Security Locked status whenever power is re-applied. They can be unlocked only by a RAID controller module that supplies the correct key during physical disk initialization.
book.book Page 109 Monday, June 21, 2010 11:00 AM 3 In Secure key identifier, enter a string that becomes part of the secure key identifier. You may leave the text box blank, or enter up to 189 alphanumeric characters without white space, punctuation, or symbols. Additional characters are generated automatically. 4 Edit the default path by adding a file name to the end of the path or Click Browse, navigate to the required folder and enter the name of the file.
book.book Page 110 Monday, June 21, 2010 11:00 AM To save the security key for the storage array, 1 In the AMW toolbar, select Storage ArrayPhysical Disk Security Save Security Key File. The Save Security Key File - Enter Pass Phrase window is displayed. 2 Edit the default path by adding a file name to the end of the path or Click Browse, navigate to the required folder and enter the name of the file. 3 In Pass phrase, enter a string for the pass phrase.
book.book Page 111 Monday, June 21, 2010 11:00 AM You must supply the security key from a security key file that was saved on the original storage array. You must provide the pass phrase that was used to encrypt the security key file to extract the security key from this file. For more information, see the PowerVault Modular Disk Storage Manager online help topics.
book.book Page 112 Monday, June 21, 2010 11:00 AM • If there are secure disk groups and security capable disk groups in the storage array, the hot spare physical disk must match the security capability of the disk group. • Hot spare physical disks must have capacities equal to or larger than the used capacity on the physical disks that they are protecting. • The availability of enclosure loss protection for a disk group depends on the location of the physical disks that comprise the disk group.
book.book Page 113 Monday, June 21, 2010 11:00 AM 5 To assign hot spares, in the Hot Spare Coverage window, select a disk group in the Hot spare coverage area. 6 Review the information about the hot spare coverage in the Details area. 7 Click Assign. The Assign Hot Spare window is displayed. 8 Select the relevant Physical disks in the Unassigned physical disks area, as hot spares for the selected disk and click OK.
book.book Page 114 Monday, June 21, 2010 11:00 AM Hot Spare Operation When a physical disk fails, the virtual disk automatically rebuilds using an available hot spare. When a replacement physical disk is installed, data from the hot spare is copied back to the replacement physical disk. This function is called copy back. By default, the RAID controller module automatically configures the number and type of hot spares based on the number and capacity of physical disks in your system.
book.book Page 115 Monday, June 21, 2010 11:00 AM hot spare physical disk. To make sure that enclosure loss protection is not affected, you must replace a failed physical disk to initiate the copyback process. The virtual disk remains online and accessible while you are replacing the failed physical disk, because the hot spare physical disk is automatically substituted for the failed physical disk. Enclosure Loss Protection Enclosure loss protection is an attribute of a disk group.
book.book Page 116 Monday, June 21, 2010 11:00 AM Table 9-2. Criteria for Enclosure Loss Protection (continued) RAID Level Criteria for Enclosure Loss Protection RAID level 1 Ensure that each physical disk in a mirrored pair is located in a different expansion enclosure. This enables you to have more than two physical disks in the disk group within the same expansion enclosure.
book.book Page 117 Monday, June 21, 2010 11:00 AM • Each host has its own LUN address space. MDSM permits the same LUN to be used by different hosts or host groups to access virtual disks in a storage array. • Not every operating system has the same number of LUNs available. • You can define the mappings on the Mappings tab in the Array Management Window. See "Using the Mappings Tab" on page 84.
book.book Page 118 Monday, June 21, 2010 11:00 AM 4 In Host group or host, select the appropriate host group or host. All defined hosts, host groups, and the default group appear in the list. NOTE: When configuring an iSCSI storage array, including the MD3200 or MD3220, if a host or a host group is selected that does not have a SAS host bus adapter (SAS HBA) host port defined, a warning dialog appears. 5 In Logical unit number, select a LUN. The supported LUNs are 0 through 255.
book.book Page 119 Monday, June 21, 2010 11:00 AM 2 In the Defined Mappings pane, perform one of these actions: • Select a single virtual disk, and select Mappings Change Mapping. • Right-click the virtual disk, and select Change Mapping from the pop-up menu. 3 In Host group or host, select the appropriate host group or host. By default, the drop-down list shows the current host group or the host associated with the selected virtual disk. 4 In Logical unit number, select the appropriate LUN.
book.book Page 120 Monday, June 21, 2010 11:00 AM snapshot virtual disk inherits the RAID controller module owner of its associated source virtual disk. Changing the RAID controller module ownership of a virtual disk changes the preferred RAID controller module ownership of the virtual disk. During a virtual disk copy, the same RAID controller module must own both the source virtual disk and the target virtual disk.
book.book Page 121 Monday, June 21, 2010 11:00 AM Changing the RAID Controller Module Ownership of a Disk Group You can change the RAID controller module ownership of a a disk group. You can change the RAID controller module ownership of a standard virtual disk or a snapshot repository virtual disk. You cannot directly change the RAID controller module ownership of a snapshot virtual disk because the snapshot virtual disk inherits the RAID controller module owner of its associated source virtual disk.
book.book Page 122 Monday, June 21, 2010 11:00 AM Changing the RAID Level of a Disk Group Changing the RAID level of a disk group changes the RAID levels of every virtual disk that comprises the disk group. Performance might be slightly affected during the operation. Guidelines to change the RAID level of a disk group: • You cannot cancel this operation after it begins. • The disk group must be in Optimal status before you can perform this operation.
book.book Page 123 Monday, June 21, 2010 11:00 AM • You cannot change a host adapter port to a restricted host type if there are already mappings in the storage partition that would exceed the limit imposed by the restricted host type. • Consider the case of the Default Group that has access to LUNs up to 256 (0 to 255) and a restricted host type is added to the Default Group.
book.book Page 124 Monday, June 21, 2010 11:00 AM Changing the RAID Controller Module Ownership of a Virtual Disk or a Disk Group You can change the RAID controller module ownership of a virtual disk or a disk group. You can change the RAID controller module ownership of a standard virtual disk or a snapshot repository virtual disk.
book.book Page 125 Monday, June 21, 2010 11:00 AM d Select the RAID controller module. CAUTION: Possible loss of data access – If you do not use a multi-path driver, shut down any host applications that are currently using the virtual disk. This action prevents application errors when the I/O path changes. e Click Yes. The ownership of the virtual disk is changed. I/O to the virtual disk is now directed through this I/O path. You are finished with this procedure.
book.book Page 126 Monday, June 21, 2010 11:00 AM Keep these guidelines in mind when you change the RAID level of a disk group: • You cannot cancel this operation after it begins. • The disk group must be in Optimal status before you can perform this operation. • Your data remains available during this operation. • If you do not have enough capacity in the disk group to convert to the new RAID level, an error message appears, and the operation does not continue.
book.book Page 127 Monday, June 21, 2010 11:00 AM More than one storage partition is required if: • Specific hosts must access specific virtual disks in the storage array. • Hosts with different operating systems are attached to the same storage array. In this case, a storage partition is created for each host type. You can use the Storage Partitioning Wizard to define a single storage partition.
book.book Page 128 Monday, June 21, 2010 11:00 AM Disk Group and Virtual Disk Expansion Adding free capacity to a disk group is achieved by adding unconfigured capacity on the array to the disk group. Data is accessible on disk groups, virtual disks, and physical disks throughout the entire modification operation. The additional free capacity can then be used to perform a virtual disk expansion on a standard or snapshot repository virtual disk.
book.book Page 129 Monday, June 21, 2010 11:00 AM Virtual Disk Expansion Virtual disk expansion is a dynamic modification operation that increases the capacity of standard virtual disks. NOTE: Snapshot repository virtual disks can be expanded from the CLI or from MDSM. All other virtual disk types are expandable only from the CLI. If you receive a warning that the snapshot repository virtual disk is becoming full, you may expand the snapshot repository virtual disk from MDSM.
book.book Page 130 Monday, June 21, 2010 11:00 AM Disk Group Migration Disk group migration allows to you export a disk group so that you can import the disk group to a different storage array. You can also export a disk group so that you can store the data offline. NOTE: During the export process (before the disk group is imported) you lose access to the data on the exported disk group. NOTE: You must export a disk group before you move the disk group or import the disk group.
book.book Page 131 Monday, June 21, 2010 11:00 AM 4 Locate the disk group, and label the physical disks. 5 Place the disk group offline. 6 Obtain blank physical disk modules or new physical disks. On the target storage array: 1 Verify that the target storage array has available physical disk slots. 2 Verify that the target storage array supports the physical disks that you import. 3 Verify that the target storage array can support the new virtual disks.
book.book Page 132 Monday, June 21, 2010 11:00 AM The following settings are removed/cleared during the procedure: • Persistent reservations • Host-to-virtual disk mappings • Virtual disk copy pairs • Snapshot virtual disks and snapshot repository virtual disks • Remote mirror pairs • Mirror repositories Non-Importable Components Some components cannot be imported during the import disk group procedure.
book.book Page 133 Monday, June 21, 2010 11:00 AM • Redundancy mismatches error—The first 10 redundancy mismatches that are found on the virtual disk are reported to the event log. • Unfixable error—Data could not be read and parity or redundancy information could not be used to regenerate the data. For example, redundancy information cannot be used to reconstruct the data on a degraded virtual disk. The error is reported to the event log.
book.book Page 134 Monday, June 21, 2010 11:00 AM Suspending the Media Scan You cannot perform a media scan while performing another long-running operation on the disk drive such as reconstruction, copy-back, reconfiguration, virtual disk initialization, or immediate availability formatting. If you want to perform another long-running operation, you should suspend the media scan. NOTE: A background media scan is the lowest priority of the long-running operations.
book.book Page 135 Monday, June 21, 2010 11:00 AM 10 Configuration: Premium Feature— Snapshot Virtual Disks NOTE: If you ordered this feature, you received a Premium Feature Activation card shipped in the same box as your Dell PowerVault MD storage array. Follow the directions on the card to obtain a key file and to enable the feature. NOTE: The snapshot feature allows up to eight snapshots per LUN and 128 per array to be present at the same time.
book.book Page 136 Monday, June 21, 2010 11:00 AM repository uses less disk space than a full physical copy, because the only data blocks that are stored in the snapshot repository virtual disk are those that have changed since the time of the snapshot. When you create a snapshot virtual disk, you specify its location, capacity, and other parameters. You can disable or delete the snapshot virtual disk when it is not required.
book.book Page 137 Monday, June 21, 2010 11:00 AM About the Simple Path Using the simple path, you can specify: • Snapshot Virtual Disk Name—A user-specified name that helps you associate the snapshot virtual disk to its corresponding snapshot repository virtual disk and source virtual disk. • Snapshot Repository Virtual Disk Name—A user-specified name that helps you associate the snapshot repository virtual disk to its corresponding snapshot virtual disk and source virtual disk.
book.book Page 138 Monday, June 21, 2010 11:00 AM NOTE: For details on mapping the snapshot virtual disk to the secondary node, refer to the Dell™ PowerVault™ MD3200 and MD3220 Storage Arrays With Microsoft® Windows Server® Failover Clusters on support.dell.com/manuals. NOTE: You can create concurrent snapshots of a source virtual disk on both the source disk group and on another disk group.
book.book Page 139 Monday, June 21, 2010 11:00 AM The Create Snapshot Virtual Disk Wizard - Introduction dialog appears. 4 Select Simple (Recommended), and click Next. The Specify Names window is displayed. 5 Enter the Snapshot virtual disk name and the Snapshot repository virtual disk name and click Next. The Specify Snapshot Repository Capacity window is displayed. 6 Enter the snapshot repository virtual disks capacity as a percentage of the source virtual disks capacity and click Next.
book.book Page 140 Monday, June 21, 2010 11:00 AM Creating a Snapshot Virtual Disk Using the Advanced Path About the Advanced Path Use the advanced path to choose whether to place the snapshot repository virtual disk on free capacity or unconfigured capacity and to change the snapshot repository virtual disk parameters. You can select the advanced path regardless of whether you use free capacity or unconfigured capacity for the snapshot virtual disk.
book.book Page 141 Monday, June 21, 2010 11:00 AM • Percent Full—When the snapshot repository virtual disk reaches the userspecified repository full percentage level, the event is logged in the Major Event Log (MEL). The default snapshot repository full percentage level is 50% of the source virtual disk. • Snapshot Repository Virtual Disk Full Conditions—Choose whether to fail writes to the source virtual disk or fail the snapshot virtual disk when the snapshot repository virtual disk becomes full.
book.book Page 142 Monday, June 21, 2010 11:00 AM Before creating a Snapshot Virtual Disk: • The following types of virtual disks are not valid source virtual disks: snapshot repository virtual disks, snapshot virtual disks, target virtual disks that are participating in a virtual disk copy. NOTE: Virtual Disk Copy is an Advanced (Premium) feature. • You cannot create a snapshot of a virtual disk that contains unreadable sectors.
book.book Page 143 Monday, June 21, 2010 11:00 AM 4 Follow any additional instructions for your operating system. Failure to follow these additional instructions can create unusable snapshot virtual disks. NOTE: If your operating system requires additional instructions, you can find those instructions in your operating system documentation. After your host server has been prepared, see "Creating a Snapshot Virtual Disk Using the Advanced Path" on page 140 to create the snapshot using the advanced path.
book.book Page 144 Monday, June 21, 2010 11:00 AM 6 In the Capacity allocation area, select: • Free capacity on same disk group as base (recommended) • Free capacity on different disk group • Unconfigured capacity (create new disk group) 7 Enter the snapshot repository virtual disks capacity as a percentage of the source virtual disks capacity and click Next. The Specify Virtual Disk Parameters window is displayed.
book.book Page 145 Monday, June 21, 2010 11:00 AM Specifying Snapshot Virtual Disk Names Choose a name that helps you associate the snapshot virtual disk and snapshot repository virtual disk with its corresponding source virtual disk.
book.book Page 146 Monday, June 21, 2010 11:00 AM characters, the default names for the snapshot and its associated snapshot repository virtual disk use the source virtual disk name truncated enough to add the sequence string. For example, for Host Software Engineering Group GR-1, the default snapshot name is Host Software Engineering GR1, and the default repository name would be Host Software Engineering GR-R1.
book.book Page 147 Monday, June 21, 2010 11:00 AM To expand the snapshot repository virtual disk from MDSM: 1 In the AMW, select the Logical tab. 2 Select the snapshot repository virtual disk for which you want to increase the capacity. 3 Select Virtual Disk Increase Capacity. NOTE: If no free capacity or unconfigured capacity is available, the Increase Capacity option is disabled. The Increase Snapshot Repository Capacity window displays the Virtual disk attributes.
book.book Page 148 Monday, June 21, 2010 11:00 AM 7 If unassigned physical disks are not available, do you have empty slots in the expansion enclosures? • Yes, there are empty slots—Insert new physical disks by using the information in the initial setup guide for your expansion enclosure. Go to step 9. • No, there are no empty slots—Install another expansion enclosure and additional physical disks.
book.book Page 149 Monday, June 21, 2010 11:00 AM A new Free Capacity node is created and shown in the Logical tab if these conditions exist: • A Free Capacity node did not exist prior to the addition of capacity. • Not all of the capacity that is added is used to increase the capacity of the snapshot repository virtual disk.
book.book Page 150 Monday, June 21, 2010 11:00 AM Disabling a Snapshot Virtual Disk Disable a snapshot virtual disk if one of the following conditions exists: • You do not need the snapshot now. • You intend to re-create the snapshot at a later time and want to retain the associated snapshot repository virtual disk so that you do not need to create it again. • You want to maximize storage array performance by stopping copy-onwrite activity to the snapshot repository virtual disk.
book.book Page 151 Monday, June 21, 2010 11:00 AM Preparing Host Servers to Re-create a Snapshot Virtual Disk NOTE: Before you create a new snapshot of a source virtual disk, stop any data access (I/O) activity or suspend data transfer to the source virtual disk and snapshot virtual disk to ensure that you capture an accurate snapshot of the source virtual disk. Close all applications, including Windows Internet Explorer, to make sure all I/O activity has stopped.
book.book Page 152 Monday, June 21, 2010 11:00 AM Re-creating a Snapshot Virtual Disk After first preparing the host server(s), re-create a snapshot virtual disk. For more information, see "Preparing Host Servers to Create the Snapshot Using the Simple Path" on page 137 or "Preparing Host Servers to Create the Snapshot Using the Advanced Path" on page 141. To recreate a snapshot virtual disk: NOTE: This action invalidates the current snapshot.
book.book Page 153 Monday, June 21, 2010 11:00 AM 11 Configuration: Premium Feature— Virtual Disk Copy NOTE: A virtual disk copy overwrites data on the target virtual disk. Before starting a virtual disk copy, ensure that you no longer need the data or back up the data on the target virtual disk. NOTE: If you ordered this feature, you received a Premium Feature Activation card that shipped in the same box as your Dell PowerVault MD storage array.
book.book Page 154 Monday, June 21, 2010 11:00 AM Reasons to use virtual disk copy include: • Copying data for improved access—As your storage requirements for a virtual disk change, you can use a virtual disk copy to copy data to a virtual disk in a disk group that uses drives with larger capacity within the same storage array. Copying data for larger access capacity enables you to move data to greater capacity physical disks (for example, 61 GB to 146 GB).
book.book Page 155 Monday, June 21, 2010 11:00 AM Virtual Disk Read/Write Permissions After the virtual disk copy is complete, the target virtual disk automatically becomes read-only to the hosts. The target virtual disk rejects read and write requests while the virtual disk copy operation has a status of Pending or In Progress or if the operation fails before completing the copy.
book.book Page 156 Monday, June 21, 2010 11:00 AM • A virtual disk can be selected as a target virtual disk for only one virtual disk copy at a time. • A virtual disk copy for any virtual disk cannot be mounted on the same host as the source virtual disk. • Windows does not allow a drive letter to be assigned to a virtual disk copy. • A virtual disk with a Failed status cannot be used as a source virtual disk or target virtual disk.
book.book Page 157 Monday, June 21, 2010 11:00 AM The Virtual Disk Copy premium feature includes these items: • The Create Copy Wizard, which assists in creating a virtual disk copy • The Copy Manager, which monitors virtual disk copies after they have been created Before you Begin A virtual disk copy fails all snapshot virtual disks that are associated with the target virtual disk, if any exist.
book.book Page 158 Monday, June 21, 2010 11:00 AM Operation in Progress icons appear on the source virtual disk and the target virtual disk while the virtual disk copy has a status of In Progress or Pending. Failed Virtual Disk Copy A virtual disk copy can fail due to these conditions: • A read error from the source virtual disk • A write error to the target virtual disk • A failure in the storage array that affects the source virtual disk or the target virtual disk.
book.book Page 159 Monday, June 21, 2010 11:00 AM Copy Manager After you create a virtual disk copy by using the Create Copy Wizard, you can monitor the virtual disk copy through the Copy Manager. From the Copy Manager, a virtual disk copy may be re-copied, stopped, or removed. You can also modify the attributes, such as the copy priority and the target virtual disk Read-Only attribute. You can view the status of a virtual disk copy in the Copy Manager.
book.book Page 160 Monday, June 21, 2010 11:00 AM 5 In the Select source virtual disk are, select the appropriate virtual disk and click Next. The Select Target Virtual Disk and Copy Priority window is displayed. 6 In the Select target virtual disk area, select the appropriate virtual disk 7 In the Select copy priority area, select the relevant copy priority and click Next. The Preview window displays the summary of your selections. 8 Type yes, and click Finish.
book.book Page 161 Monday, June 21, 2010 11:00 AM Setting Copy Priority You can use the Copy Manager to select the rate at which a virtual disk copy completes for a selected copy pair. You can change the copy priority for a copy pair at any of these times: • Before the virtual disk copy begins • While the virtual disk copy has a status of In Progress • When you re-create a virtual disk copy To set copy priority: 1 In the AMW, select Virtual Disk Copy Copy Manager.
book.book Page 162 Monday, June 21, 2010 11:00 AM To stop a virtual disk copy, complete the following steps: 1 In the AMW, select Virtual Disk Copy Copy Manager. The Copy Manager window is displayed. 2 Select the copy pair in the table. 3 Select Copy Stop. 4 Click Yes. Recopying a Virtual Disk You can recopy a virtual disk when you have stopped a virtual disk copy and you want to start it again or when a virtual disk copy has failed.
book.book Page 163 Monday, June 21, 2010 11:00 AM 3 Click the Summary tab, then click Disk Groups & Virtual Disks to ensure that the virtual disk is in Optimal or Disabled status. 4 Remove the drive letter(s) of the source and (if mounted) virtual disk in Windows or unmount the virtual drive(s) in Linux to help guarantee a stable copy of the drive for the virtual disk. If this is not done, the copy operation reports that it has completed successfully, but the copied data is not is not updated properly.
book.book Page 164 Monday, June 21, 2010 11:00 AM 4 Select the copy pair in the table. 5 Select Copy Re-Copy. The Re-Copy window is displayed. 6 Set the copy priority. NOTE: There are five copy priority rates available: lowest, low, medium, high, and highest. If the copy priority is set at the lowest rate, I/O activity is prioritized, and the virtual disk copy takes longer.
book.book Page 165 Monday, June 21, 2010 11:00 AM 12 Configuration: Premium Feature— Upgrading to High-PerformanceTier The High Performance Tier premium feature on a MD3200 Series array increases the performance of the system beyond that of a MD3200 Series array operating at the standard performance level. If this feature is ordered, a Premium Feature Activation card is placed in the box with the storage array.
book.
book.book Page 167 Monday, June 21, 2010 11:00 AM 13 Configuration: Device Mapper Multipath for Linux Overview The MD3200 Series storage array uses a Linux operating system software framework, known as Device Mapper (DM), to enable multipath capabilities on Linux Host Servers. The DM multipath functionality is provided by a combination of drivers and utilities. This chapter describes how to use those utilities to complete the process of enabling MD3200 Series storage array on a Linux system.
book.book Page 168 Monday, June 21, 2010 11:00 AM Using DM Multipathing Devices NOTE: Using or modifying any nodes other than the multipathing device nodes can result in array or file system problems, including loss of communication with the array and corruption of the file system. Avoid accessing any device other than the multipathing device.
book.book Page 169 Monday, June 21, 2010 11:00 AM Device Mapper Configuration Steps To complete the DM multipathing configuration and make the storage available to the Linux host server: 1 Scan for virtual disks. See "Scan for Newly Added Virtual Disks" on page 169. 2 Display the multipath device topology. See "Display the Multipath Device Topology Using the Multipath Command" on page 169. 3 Create a partition on a multipath device node.
book.book Page 170 Monday, June 21, 2010 11:00 AM # multipath –ll The output should be similar to this example, which shows the output for one mapped virtual disk. mpath1 (3600a0b80005ab177000017544a8d6b92) dm-0 DELL, MD32xx [size=5.
book.book Page 171 Monday, June 21, 2010 11:00 AM DELL is the vendor of the device MD3200 is the model of the device Sdx is the physical path to the owning controller for the device Sdcl is the physical path to the non-owning controller for the device Create a New fdisk Partition on a Multipath Device Node The fdisk command allows you to create partition space for a file system on the newly scanned and mapped virtual disks that have been presented to Device Mapper.
book.book Page 172 Monday, June 21, 2010 11:00 AM On SLES 11.x hosts, a partition node has the format /dev/mapper/mpath-part, where is letter(s) assigned to the multipathing device and is the partition number. On SLES 10.3 hosts, a partition node has the format /dev/mapper/mpath_part, where is the letter(s) assigned to the multipathing device and is the partition number.
book.book Page 173 Monday, June 21, 2010 11:00 AM CAUTION: Certain commands, such as lsscsi, displays one or more instances of Universal Xport devices. These device nodes must never be accessed, mounted, or used in any way. Doing so could cause loss of communication to the storage array and possibly cause serious damage to the storage array, potential making data stored on the array inaccessible.
book.book Page 174 Monday, June 21, 2010 11:00 AM Limitations and Known Issues • In certain error conditions with the no_path_retry or the queue_if_no_path feature is set, applications may hang. To overcome these conditions the you must enter the following command for each affected multipath device: dmsetup message [device] 0 "fail_if_no_path" where [device] is the multipath device name (for example.
book.book Page 175 Monday, June 21, 2010 11:00 AM Troubleshooting Question Answer How can I check if multipathd Run the following command is running? /etc/init.d/multipathd status Why does the multipath –ll command output not show any devices? First verify if the devices are discovered or not. The command #cat /proc/scsi/scsi displays all the devices that are already discovered. Then verify the multipath.conf to ensure that it is been updated with proper settings. After this, run multipath.
book.
book.book Page 177 Monday, June 21, 2010 11:00 AM 14 Management: Firmware Downloads Downloading RAID Controller and NVSRAM Packages A version number exists for each firmware file. The version number indicates whether the firmware is a major version or a minor version. You can use the Enterprise Management Window (EMW) to download and activate both the major firmware versions and the minor firmware versions.
book.book Page 178 Monday, June 21, 2010 11:00 AM Downloading Both RAID Controller and NVSRAM Firmware NOTE: I/O to the array can continue while you are upgrading RAID controller and NVSRAM firmware. NOTE: Dell recommends that the firmware and NVSRAM be upgraded during a maintenance period when the array is not being used for I/O. NOTE: The RAID enclosure must contain at least two disk drives in order to update the firmware on the controller.
book.book Page 179 Monday, June 21, 2010 11:00 AM 7 Click Transfer. Keep these guidelines in mind: – If the Transfer button is inactive, ensure that you either select an NVSRAM file or deselect the Transfer NVSRAM file with RAID controller module firmware option. – If the file selected is not valid or is not compatible with the current storage array configuration, the File Selection Error dialog appears. Click OK to close it, and choose a compatible firmware or NVSRAM file.
book.book Page 180 Monday, June 21, 2010 11:00 AM 12 To locate the directory in which the file to download resides, click Browse in the Select files area. The Select File dialog appears. 13 Select the file to download. 14 Click OK. 15 If you want to download the NVSRAM file with the RAID controller module firmware, select Download NVSRAM file with firmware in the Select files area. Any attributes of the firmware file appear in the Firmware file information area.
book.book Page 181 Monday, June 21, 2010 11:00 AM 2 Select Advanced Maintenance Download RAID Controller Module NVSRAM or Select the Support tab, and click Download Firmware. In Select download task, select Download RAID controller module NVSRAM and click OK. An error message appears. Click OK to close it, and select a compatible file. 3 To locate the directory in which the file to download resides, click Select File. 4 Select the file to download in the File selection area, and click OK.
book.book Page 182 Monday, June 21, 2010 11:00 AM 8 In the Storage array pane, select the storage array for which you want to download the NVSRAM firmware. You can select more than one storage array. NOTE: The Details pane shows the details of only one storage array at a time. If you select more than one storage array in the Storage array pane, the details of the storage arrays are not shown in the Details pane. 9 Click NVSRAM in the Download area.
book.book Page 183 Monday, June 21, 2010 11:00 AM Downloading Physical Disk Firmware CAUTION: When updating physical disk firmware, you should stop all I/O activity to the array to prevent data loss. The physical disk firmware controls various features of the physical disk. The disk array controller (DAC) uses this type of firmware. Physical disk firmware stores information about the system configuration on an area of the physical disk called DACstore.
book.book Page 184 Monday, June 21, 2010 11:00 AM To download Physical Disk Firmware: 1 From the AMW, select Advanced Maintenance Download Physical Disk. The Download Physical Disk - Introduction window appears. 2 Click Next. The Download Physical Disk Firmware - Add Packages window is displayed. 3 In the Selected Packages area, click Add. Navigate to the location of the packages and click OK. The selected package is added to the Packages to be transferred area. 4 Click Next.
book.book Page 185 Monday, June 21, 2010 11:00 AM Downloading MD1200 Series Expansion Module EMM Firmware NOTE: Do not make any configuration changes to the storage array while you are downloading the expansion enclosure EMM firmware. Doing so could cause the firmware download to fail, damage the storage array, or cause loss of data accessibility. NOTE: Due to a limitation with Linux, expansion enclosure EMM firmware updates must be performed using out-of-band management only.
book.book Page 186 Monday, June 21, 2010 11:00 AM 6 Click Yes to continue with the firmware download, NOTE: If you click Stop while a firmware download is in progress, the download-in-progress finishes before the operation stops. The status for the remaining expansion enclosures changes to Canceled. 7 Monitor the progress and completion status of the download to the expansion enclosures.
book.book Page 187 Monday, June 21, 2010 11:00 AM Media Errors and Unreadable Sectors If the RAID controller detects a media error while accessing data from a physical disk that is a member of a disk group with a redundant RAID level (RAID 1, RAID 5 or RAID 10), the controller tries to recover the data from peer disks in the disk group and uses recovered data to correct the error.
book.
book.
book.book Page 190 Monday, June 21, 2010 11:00 AM Front Bezel (Optional) Removing the Front Bezel 1 Using the system key, unlock the front bezel (if locked). 2 Lift up the release latch next to the keylock. 3 Rotate the left end of the bezel away from the front panel. 4 Unhook the right end of the bezel and pull the bezel away from the system. Figure 15-1.
book.book Page 191 Monday, June 21, 2010 11:00 AM Hard Drives SAFETY: Models AMT, E03J, and E04J Models AMT, E03J, and E04J are intended for installation only in restricted access locations as defined in cl 1.2.7.3 of IEC 60950-1:2005. Depending on your configuration, your array either supports up to 24 2.5-inch SAS hard drives or up to 12 3.5-inch SAS hard drives in internal drive bays. Hard drives are connected to a backplane through hard-drive carriers and can be configured as hot-swappable.
book.book Page 192 Monday, June 21, 2010 11:00 AM Figure 15-3. Removing and Installing a 2.5-Inch Hard-Drive Blank 1 1 2 drive blank 2 release tab Installing a Drive Blank 1 If installed, remove the front bezel. See "Removing the Front Bezel" on page 190. 2 Insert the drive blank into the drive bay until the blank is fully seated. 3 Close the handle to lock the blank in place. 4 If applicable, replace the front bezel. See "Installing the Front Bezel" on page 190.
book.book Page 193 Monday, June 21, 2010 11:00 AM 2 From the Modular Disk Storage Manager (MDSM) software, prepare the drive for removal. Wait until the hard-drive indicators on the drive carrier signal that the drive can be removed safely. For more information, see your controller documentation for information about hot-swap drive removal. If the drive has been online, the green activity/fault indicator flashes as the drive is powered down.
book.book Page 194 Monday, June 21, 2010 11:00 AM Installing a Hard Drive CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 195 Monday, June 21, 2010 11:00 AM Removing a Hard Drive From a Hard-Drive Carrier Remove the screws from the slide rails on the hard-drive carrier and separate the hard drive from the carrier. See Figure 15-5 for PowerVault MD3200 and Figure 15-6 for PowerVault MD3220. Figure 15-5. Removing and Installing a Hard Drive Into a 3.
book.book Page 196 Monday, June 21, 2010 11:00 AM Figure 15-6. Removing and Installing a Hard Drive Into a 2.
book.book Page 197 Monday, June 21, 2010 11:00 AM Installing a Hard Drive Into a Drive Carrier 1 Insert the hard drive into the hard-drive carrier with the connector end of the drive at the back. See Figure 15-5. 2 Align the screw holes on the hard drive with the back set of holes on the hard-drive carrier. When aligned correctly, the back of the hard drive is flush with the back of the hard-drive carrier. 3 Attach the four screws to secure the hard drive to the hard-drive carrier.
book.book Page 198 Monday, June 21, 2010 11:00 AM 5 Connect all the power cables to the array. 6 Turn on the array and the host server. Figure 15-7. Removing and Installing a RAID controller module Blank 1 1 release latch 2 2 RAID controller module blank Installing a RAID Controller Module Blank To install a RAID controller module blank, align the blank with the RAID controller module bay and insert the blank into the chassis until it clicks into place.
book.book Page 199 Monday, June 21, 2010 11:00 AM Removing a RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 200 Monday, June 21, 2010 11:00 AM Installing a RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 201 Monday, June 21, 2010 11:00 AM Figure 15-9. Opening and Closing the RAID Controller Module 1 1 screws (2) 3 indent 2 3 2 RAID controller module Closing the RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team.
book.book Page 202 Monday, June 21, 2010 11:00 AM RAID Controller Module Backup Battery Unit Removing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty.
book.book Page 203 Monday, June 21, 2010 11:00 AM Installing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 204 Monday, June 21, 2010 11:00 AM Power Supply/Cooling Fan Module The array supports two hot-swappable power supply/cooling fan modules. While the array can operate temporarily with one module, both the modules must be present for proper system cooling. CAUTION: A single power supply/cooling fan module can be removed from a powered-on array for a maximum period of five minutes. Beyond that time, the array may automatically shut down to prevent damage.
book.book Page 205 Monday, June 21, 2010 11:00 AM Figure 15-11. Removing and Installing a Power Supply/Cooling Fan Module 1 2 3 1 release tab 3 power supply handle 2 power supply Installing a Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team.
book.book Page 206 Monday, June 21, 2010 11:00 AM 2 Connect the power cable to the power supply/cooling fan module and plug the cable into a power outlet. 3 Secure the power cable using the Velcro strap. See Figure 15-12. Figure 15-12. Securing the Power Cable 1 1 Velcro strap CAUTION: When connecting the power cable, secure the cable with the Velcro strap.
book.book Page 207 Monday, June 21, 2010 11:00 AM 3 Remove the hard drives from: – slots 0 to 2 in PowerVault MD3200 – slots 0 to 5 in PowerVault MD3220 See "Removing a Hard Drive" on page 192. NOTE: Mark each hard drive with it’s slot position as you remove it. 4 Slide the control panel out of the chassis after: – Pushing the release tab toward the front of the array in PowerVault MD3200. See Figure 15-13. – Pulling the release pin toward the front of the array in PowerVault MD3220.
book.book Page 208 Monday, June 21, 2010 11:00 AM Figure 15-14. Removing and Installing the Control Panel—PowerVault MD3220 2 1 1 control panel 2 release pin Installing the Control Panel 1 Align the control panel with the slot on the array. 2 Slide the control panel into the array until: – The release tab clicks into place in PowerVault MD3200. See Figure 15-13. – The release pin clicks into place in PowerVault MD3220. See Figure 15-14. 3 Replace the hard drives in their respective slots.
book.book Page 209 Monday, June 21, 2010 11:00 AM Backplane WARNING: Whenever you need to lift the array, get others to assist you. To avoid injury, do not attempt to lift the array by yourself. CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team.
book.book Page 210 Monday, June 21, 2010 11:00 AM Figure 15-15.
book.book Page 211 Monday, June 21, 2010 11:00 AM Figure 15-16. Removing and Installing the Backplane—PowerVault MD3200 1 2 3 1 screws (5) 3 captive screw 2 backplane Figure 15-17.
book.book Page 212 Monday, June 21, 2010 11:00 AM Installing the Backplane 1 Align the holes on the backplane with the holes on the array. 2 Tighten the captive screw to secure the backplane to the chassis. See Figure 15-16 for PowerVault MD3200 or Figure 15-17 for PowerVault MD3220. 3 Replace the screws that secure the backplane to the chassis. See Figure 15-16 for PowerVault MD3200 or Figure 15-17 for PowerVault MD3220.
book.book Page 213 Monday, June 21, 2010 11:00 AM 16 Management: Firmware Inventory A storage array is made up of many components, which might include RAID controller modules, physical disks, and enclosure management modules (EMMs). Each of these components contains firmware. Some versions of firmware are dependent on other versions of firmware. To capture information about all of the firmware versions in the storage array, view the firmware inventory.
book.
book.book Page 215 Monday, June 21, 2010 11:00 AM 17 Management: System Interfaces Microsoft Services Virtual Disk Service The Microsoft® Virtual Disk Service (VDS) is a component of the Windows® operating system. The VDS component utilizes third-part vendor specific software modules, known as providers, to access and configure third-party storage resources, such as MD3200i storage arrays.
book.book Page 216 Monday, June 21, 2010 11:00 AM VSS attaches to the service and uses it to coordinate the creation of snapshot virtual disks on the storage array. VSS-initiated snapshot virtual disks can be triggered through backup tools, known as requestors.
book.book Page 217 Monday, June 21, 2010 11:00 AM 18 Troubleshooting: Your Storage Array Software Start-Up Routine Look and listen during the array’s start-up routine for the indications described in Table 18-1. For a description of the front- and back-panel indicators, see "Planning: About Your Storage Array" on page 21. Table 18-1. Start-Up Routine Indications Look/listen for Action Alert messages. See your storage management documentation.
book.book Page 218 Monday, June 21, 2010 11:00 AM To launch the AMW, perform one of these actions: • On the Devices tab, in either the Tree view or the Table view, double-click a storage array. Alternatively, you can right-click a storage array and select Manage Storage Array from the pop-up menu. • On the Setup tab, select Manage a Storage Array. After the AMW opens, select the Physical tab to see the components in the storage array. A component that has a problem is indicated by a status icon.
book.book Page 219 Monday, June 21, 2010 11:00 AM In the Table view, every managed storage array is listed once, regardless of the number of attachments it has in the Tree view. After the storage array has been contacted by MDSM, an icon representing its hardware status appears. Hardware status can be Optimal, Needs Attention, or Fixing.
book.book Page 220 Monday, June 21, 2010 11:00 AM Table 18-3. Additional Status Icons Status Icon Adding a Storage Array Description The Contacting Storage Array icon is shown in the Tree view and Table view until the current status of each managed storage array is known. The Contacting Storage Array icon is shown in the EMW Status Bar and the AMW Status Bar and the tooltip shows Contacting Storage arrays.
book.book Page 221 Monday, June 21, 2010 11:00 AM 2 Enter a name for the support data file in Specify filename or click Browse to navigate to a previously saved file to overwrite an existing file. The suffix .zip is added automatically to the file if you do not specify a suffix for the file. 3 Enter the Execution summary. 4 Click Start. After all of the support files have been gathered, they are archived using the file name that you specified. 5 Click OK.
book.book Page 222 Monday, June 21, 2010 11:00 AM Collecting the Physical Disk Data You can use the Collect Physical Disk Data option to collect log sense data from all the physical disks on your storage array. Log sense data consists of statistical information that is maintained by each of the physical disks in your storage array. Your Technical Support representative can use this information to analyze the performance of your physical disks and for troubleshooting problems that might exist.
book.book Page 223 Monday, June 21, 2010 11:00 AM The event log window shows two types of event views: • Summary view—Shows an event summary in a table form. • Detail view—Shows details about a selected event. To view the event log: 1 In the AMW, select Advanced Troubleshooting View Event Log. The Event Log is displayed. By default, the summary view is displayed. 2 To view the details of each selected log entry, select View details.
book.book Page 224 Monday, June 21, 2010 11:00 AM You can detect a problem using the following indicators: • Non-Optimal status icons • Alert notification messages that are sent to the appropriate destinations • Hardware indicator lights The status icons return to Optimal status as problems are resolved. Storage Array Profile The storage array profile provides a description of all of the components and properties of the storage array.
book.book Page 225 Monday, June 21, 2010 11:00 AM 4 To search the storage array profile, perform these steps: a Click . b Type the term that you want to search for in the Find text box. If the term is located on the current tab, the term is highlighted in the storage array profile information. NOTE: The search is limited to the current tab. If you want to search for the term in other tabs, select the tab and click the Find button again.
book.book Page 226 Monday, June 21, 2010 11:00 AM Viewing the Logical Associations You can use the Associated Logical Elements option to view the logical associations among different virtual disks in a storage array. To view the associations for source virtual disks, snapshot virtual disks, and snapshot repository virtual disks: 1 In the AMW, select the Logical tab or in the Topology pane of the Mappings tab. 2 Select View Associated Logical Elements.
book.book Page 227 Monday, June 21, 2010 11:00 AM Finding Nodes You can use the Find option to search for a particular node on the Logical tab, the Physical tab, or the Mappings tab of the Array Management Window. The search might be based on a particular node name, the RAID level, virtual disk capacity, or specific free capacity nodes.
book.book Page 228 Monday, June 21, 2010 11:00 AM 6 To search for all nodes based on their virtual disk capacity, perform these steps: a Select Find all virtual disks with capacity. b Type the capacity in the GB box. c Specify that the capacity to be matched is less than, equal to, or greater than the capacity entered in the GB box. d Go to step 8.
book.book Page 229 Monday, June 21, 2010 11:00 AM 1 On the Logical tab of the AMW, select one of these virtual disks, and go to the indicated step: • Snapshot virtual disk—Go to step 2. • Snapshot repository virtual disk—Go to step 3. • Source virtual disk—Go to step 4. • Target virtual disk—Go to step 5. 2 Select View Go To Snapshot Virtual Disk. The selection jumps to the associated snapshot virtual disk in the Logical pane. 3 Select View Go To Snapshot Repository Virtual Disk.
book.book Page 230 Monday, June 21, 2010 11:00 AM To recover from an unresponsive storage array: 1 Check the Tree View in the EMW to see if all storage arrays are unresponsive. 2 If any storage arrays are unresponsive, check the storage management station network connection to make sure that it can reach the network. 3 Ensure that the RAID controller modules are installed and that there is power to the storage array. 4 If there a problem with the storage array, correct the problem.
book.book Page 231 Monday, June 21, 2010 11:00 AM 12 For an in-band managed storage array, make sure that the host is network accessible by using the ping command to verify that the host can be reached. Type one of these commands, and press Enter. • ping • ping 13 If the verification successful, see step 14, if not, step 15. 14 Remove the host with the Unresponsive status from the EMW, and select Add Storage Array to add the host again.
book.book Page 232 Monday, June 21, 2010 11:00 AM 22 Determine if there is an excessive amount of network traffic to one or more RAID controller modules. This problem is self-correcting because the EMW software periodically retries to establish communication with the RAID controller modules in the storage array. If the storage array was unresponsive and a subsequent try to connect to the storage array succeeds, the storage array becomes responsive.
book.book Page 233 Monday, June 21, 2010 11:00 AM 4 When you have located the physical disks, click OK. The LEDs stop blinking. If any other blink operations (Blink Disk Group, Blink Storage Array, Blink Physical Disk Ports, or Blink Expansion Enclosure) are currently being invoked from another storage management station, these LEDs also stop blinking. 5 In the rare case that the LEDs on the physical disks do not stop blinking, in the AMW, select Storage Array Blink Stop All Indications.
book.book Page 234 Monday, June 21, 2010 11:00 AM 5 In the rare case that the LEDs on the expansion enclosure do not stop blinking, from the Array Management Window, select Storage Array Blink Stop All Indications. If the LEDs successfully stop blinking, a confirmation message appears. 6 Click OK. Capturing the State Information Use the Troubleshooting Capture State Information option to capture information about the current state of your storage array and save the captured information to a text file.
book.book Page 235 Monday, June 21, 2010 11:00 AM NOTE: Refer to the PowerVault Modular Disk Storage Manager online help topics for more information on troubleshooting, and recovering from failures. SMrepassist Utility SMrepassist (replication assistance) is a host-based utility for Windows platforms. This utility is installed with MDSM.
book.book Page 236 Monday, June 21, 2010 11:00 AM Unidentified Devices An unidentified node or device occurs when MDSM cannot access a new storage array. Causes for this error include network connection problems, the storage array is turned off, or the storage array does not exist. NOTE: Before beginning any recovery procedure, make sure that the host context agent software is installed and running.
book.book Page 237 Monday, June 21, 2010 11:00 AM b Make sure that the network can access the host by using the ping command in the following syntax: ping . If the network can access the host, continue to step c. If the network cannot access the host, skip to step d. c Remove the host with the unresponsive status from the MDSM, and add that host again. If the host returns to optimal status, you have completed this procedure.
book.book Page 238 Monday, June 21, 2010 11:00 AM c Examine the ethernet cables to make sure that you cannot see any damage and that they are tightly connected. d Make sure that the applicable network configuration tasks have been done (for example, the IP addresses have been assigned to each controller). 5 Make sure that the controller firmware is compatible with MDSM on your management station. If the controller firmware was upgraded, the MDSM might not have access to the storage array.
book.book Page 239 Monday, June 21, 2010 11:00 AM Starting or Restarting the Host Context Agent Software The host context agent software module is the software component that resides on the server or management station that communicates with the MD3200 series storage arrays. The SMagent software automatically starts after you reboot the host. Windows To restart the SMagent software in Windows: 1 Click Start Settings Control Pane Administrative Tools Services.
book.book Page 240 Monday, June 21, 2010 11:00 AM After the program completes the startup process, text similar to the following messages is displayed: Modular Disk Storage Manager Agent, Version 90.02.A6.14 Built Wed Feb 03 06:17:50 CST 2010 Copyright (C) 2009-2010 Dell, Inc. All rights reserved.
book.book Page 241 Monday, June 21, 2010 11:00 AM Troubleshooting: Your Array 19 Safety First—For you and Your Array CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty.
book.book Page 242 Monday, June 21, 2010 11:00 AM Troubleshooting Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 243 Monday, June 21, 2010 11:00 AM Troubleshooting Array Cooling Problems CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 244 Monday, June 21, 2010 11:00 AM c Reseat the EMM module and wait for 30 seconds. See Removing an EMM in the MD1200 and MD1220 Storage Enclosures Hardware Owner's Manual. d Turn on the server. e Check the EMM status LED. f If the LED does not turn Green, replace the EMM. If the problem is not resolved, see "Getting Help" on page 253. • If EMM status LED is blinking amber (5 times per sequence), update the firmware to the latest supported firmware on both the EMMs.
book.book Page 245 Monday, June 21, 2010 11:00 AM • If the array status LED is solid or blinking amber: a In the AMW, select the Summary tab, and click on Storage Array needs attention. Follow the listed procedures in the recovery guru(s) and wait for up to 5 minutes to check if the LED has turned blue. See "Recovery Guru" on page 223. b If following the recovery guru procedures does not solve the problem, complete the following procedure to further troubleshoot the array.
book.book Page 246 Monday, June 21, 2010 11:00 AM Troubleshooting Hard Drives CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 247 Monday, June 21, 2010 11:00 AM Troubleshooting Array and Expansion Enclosure Connections 1 Verify that the RAID controller module port link status LED and the RAID controller module status LED are solid green for each port that is connected to a cable. If the LEDs are not solid green, see "Planning: RAID Controller Modules" on page 29. 2 Ensure that all the cables are attached correctly according to array mode you selected. 3 Turn off the server, storage array, and expansion enclosures.
book.book Page 248 Monday, June 21, 2010 11:00 AM Troubleshooting a Wet Storage Array CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 249 Monday, June 21, 2010 11:00 AM Troubleshooting a Damaged Array CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 250 Monday, June 21, 2010 11:00 AM Invalid Storage Array The RAID controller module is supported only in a Dell-supported storage array. Upon installation in the storage array, the controller performs a set of validation checks. The array status LED is lit with a steady amber color while the RAID controller module completes these initial tests and the controllers are booted successfully. If the RAID controller module detects a non-Dell supported storage array, the controller aborts startup.
book.book Page 251 Monday, June 21, 2010 11:00 AM • Backplane/power supply failure • Two or more temperature sensors are unreadable • Failure to detect or unable to communicate with peer port NOTE: If both RAID controller modules fail simultaneously, the enclosure cannot issue critical or noncritical event alarms for any enclosure component. When the enclosure is under critical condition, its enclosure status LED blinks amber.
book.
book.book Page 253 Monday, June 21, 2010 11:00 AM Getting Help 20 Contacting Dell For customers in the United States, call 800-WWW-DELL (800-999-3355). NOTE: If you do not have an active Internet connection, you can find contact information on your purchase invoice, packing slip, bill, or Dell product catalog. Dell provides several online and telephone-based support and service options. Availability varies by country and product, and some services may not be available in your area.
book.
book.
book.
book.
book.
book.
book.