book.
book.book Page 2 Wednesday, May 26, 2010 2:14 PM Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. ____________________ Information in this document is subject to change without notice. © 2010 Dell Inc. All rights reserved.
book.book Page 3 Wednesday, May 26, 2010 2:14 PM Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . About This Document . . . . . . . . . . . . . . . . . . Inside the box of the Dell PowerVault MD3200i Series Storage Array. . . . . . . . . . . . . . . 19 . . . . 19 . . . . . . . . . . . . . 20 . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Dell PowerVault Modular Disk Configuration Utility 20 Dell PowerVault MD3200i Series Storage Array . . .
book.book Page 4 Wednesday, May 26, 2010 2:14 PM 3 Planning: RAID Controller Modules . RAID Controller Modules . . . . . . . . . . . . . . . . . . . RAID Controller Module Connectors and Features 32 . . . . 34 . . . . . . . . . . . . . . . . 34 Storage Array Thermal Shutdown System Password Reset . . . . . . . . . 34 . . . . . . . . . . . . . . 35 Cache Functions and Features . Cache Mirroring. . . . . . . . . . . . . . 35 . . . . . . . . . . . . . . . . . . 35 Write-Back Cache . . . .
book.book Page 5 Wednesday, May 26, 2010 2:14 PM Consistency Check . . . . . . . . . . . . . . . . . 43 Media Verification . . . . . . . . . . . . . . . . . 44 . . . . . . . . . . . . . . . . . . . . . 44 Cycle Time Virtual Disk Operations Limit Disk Group Operations. . . . . . . . . . . . . 44 . . . . . . . . . . . . . . . . . 45 RAID Level Migration . . . . . . . . . . . . . . . . Segment Size Migration . . . . . . . . . . . . . .
book.book Page 6 Wednesday, May 26, 2010 2:14 PM 5 Configuration: Overview User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 . . . . . . . . . . . . 61 Configuration: About Your Storage Array . . . . . . . . . . . . . . . . . . . . . 63 Out-of-Band and In-Band Management . Storage Arrays . . . . . . . . 63 . . . . . . . . . . . . . . . . . . . . . . 64 Adding Storage Arrays . . . . . . . . . . . . . . .
book.book Page 7 Wednesday, May 26, 2010 2:14 PM Setting the Storage Array RAID Controller Module Clocks. 7 . . . . . . . . . . . . . Configuration: Using iSCSI . . . . . . . . . . . Changing the iSCSI Target Authentication . . . . . . . 81 82 . . . . . . . . . . . . . . . . . 82 . . . . . . . . . . . . . . . 83 . . . . . . . . . . . . . . . . 83 Initiator CHAP Secret . Target CHAP Secret Valid Characters for CHAP Secrets Changing the iSCSI Target Identification . . . . . . . . 83 . . . .
book.book Page 8 Wednesday, May 26, 2010 2:14 PM 9 Configuration: About Your Host . . . . . . . 93 Configuring Host Access. . . . . . . . . . . . . . . . . 93 Using the Mappings Tab . . . . . . . . . . . . . . . . . 94 . . . . . . . . . . . . . . . . . . . 94 Defining a Host Removing Host Access. . . . . . . . . . . . . . . . . . 96 Managing Host Groups. . . . . . . . . . . . . . . . . . 96 Creating a Host Group . . . . . . . . . . . . . . . Moving a Host to a Different Host Group .
book.book Page 9 Wednesday, May 26, 2010 2:14 PM Creating a Security Key. . . . . . . . . . . . . . . 116 Changing a Security Key . . . . . . . . . . . . . . 117 . . . . . . . . . . . . . . . 119 Saving a Security Key Unlocking Secure Physical Disks. Erasing Secure Physical Disks . . . . . . . . . . 120 . . . . . . . . . . 120 . . . . . . . . . 121 . . . . . . . . . . . . . . 123 . . . . . . . . . . . . . . . . . 123 Configuring Hot Spare Physical Disks Hot Spares and Rebuild.
book.book Page 10 Wednesday, May 26, 2010 2:14 PM Using Unconfigured Capacity . Disk Group Migration . . . . . . . . . . 138 . . . . . . . . . . . . . . . . . 139 Export Disk Group . . . . . . . . . . . . . . . . . Exporting a Disk Group Import Disk Group 139 . . . . . . . . . . . . . . 140 . . . . . . . . . . . . . . . . . . . 140 Importing a Disk Group . . . . . . . . . . . . . . 140 Storage Array Media Scan . . . . . . . . . . . . . . . 141 . . . . . . . . . 142 . . . . . . . . . .
book.book Page 11 Wednesday, May 26, 2010 2:14 PM Disabling a Snapshot Virtual Disk. Re-creating a Snapshot Virtual Disk . . . . . . . 160 . . . . . . . . . . 161 12 Configuration: Premium Feature— Virtual Disk Copy . . . . . . . . . . . . . . Creating a Virtual Disk Copy for an MSCS Shared Disk . . . . . . 163 164 . . . . . . . . . 165 . . . . . . . . . . . . . 165 . . . . . . . . . . . . . . 166 . . . . . . . . . . . . . . . . . 167 Virtual Disk Copy Restrictions .
book.book Page 12 Wednesday, May 26, 2010 2:14 PM Preparing Host Servers to Recopy a Virtual Disk . . . . . . . . . . . . . . . 172 Recopying the Virtual Disk . . . . . . . . . . . . 173 . . . . . . . . . . . . . . . . . 174 Removing Copy Pairs. 13 Configuration: Premium Feature—Upgrading to High-Performance-Tier . . . . . . . . . . . 175 14 Configuration: Device Mapper Multipath for Linux . . . . . . . . . Overview . . . . . . . . 177 . . . . . . . . . . . . . . . . . . . . . . .
book.book Page 13 Wednesday, May 26, 2010 2:14 PM Downloading MD1200 Series Expansion Module EMM Firmware . . . . . . . . . Self-Monitoring Analysis and Reporting Technology (SMART) . . . . . . . . . 194 . . . . . . . . . . . . 196 Media Errors and Unreadable Sectors 16 Management: Installing Array Components . . . . 196 . . . . . . . . . . . . . . . . . . . . . 197 Recommended Tools . . . . . . . . . . . . . . . . . . . 197 Front Bezel (Optional) . . . . . . . . . . . . . . . . . .
book.book Page 14 Wednesday, May 26, 2010 2:14 PM Removing the RAID Controller Module Backup Battery Unit . . . . . . . . . . . 210 Installing the RAID Controller Module Backup Battery Unit . . . . . . . . . . . 211 Power Supply/Cooling Fan Module . . . . . . . . . . 211 Removing a Power Supply/Cooling Fan Module . . . . . . . . . . . . . . . . . . . . 211 . . . . . . . . 214 . . . . . . . . . . . . . . . . . . . . . 215 Installing a Power Supply/Cooling Fan Module . . . . . . . . . . . .
book.book Page 15 Wednesday, May 26, 2010 2:14 PM Device Health Conditions . . . . . . . . . . . . . . . . Storage Array Support Data . . . . . . . . . . . . . . . Automatically Collect the Support Bundle Data 229 . . . . 229 . . . . . . . . . . . 230 . . . . . . . . . . . . . . . . . . . . . . . . 231 Collecting the Physical Disk Data . Event Log . 225 Recovery Guru . . . . . . . . . . . . . . . . . . . . . . Storage Array Profile . . . . . . . . . . . . . . . . . .
book.book Page 16 Wednesday, May 26, 2010 2:14 PM 20 Troubleshooting: Your Array . . . . . . . . . 249 Safety First—For you and Your Array . . . . . . . . . 249 Troubleshooting Storage Array Startup Failure . . . . 249 . . . . . . . 249 . . . . . . . . 249 Troubleshooting Loss of Communication Troubleshooting External Connections Troubleshooting Power Supply/Cooling Fan Module . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting Array Cooling Problems .
book.book Page 17 Wednesday, May 26, 2010 2:14 PM 21 Getting Help . . . . . . . . . . . . . . . . . . . . . . Contacting Dell Index 259 259 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
book.
book.book Page 19 Wednesday, May 26, 2010 2:14 PM 1 Introduction See the Safety, Environmental, and Regulatory Information document for important safety information before following any procedures listed in this document. About This Document This guide familiarizes you with the functions of the MD3200i Series storage array. The guide is organized according to the tasks that you must complete after receiving your Dell™ PowerVault™ MD3200i Series storage array.
book.book Page 20 Wednesday, May 26, 2010 2:14 PM • Mounting rails (2) (optional) • Dell PowerVault MD3200i Series resource media • The Rack Installation Instructions included with your rack solution describes how to install your enclosure into a rack. • Getting Started With Your System provides an overview of enclosure features, setting up your enclosure, and technical specifications.
book.book Page 21 Wednesday, May 26, 2010 2:14 PM • Deployment Guide provides installation and configuration instructions for both software and hardware. • Storage Manager CLI Guide provides information about using the command line interface (CLI). • Resource media contains all system management tools. • Systems Support Matrix provides information on supported software and hardware for MD systems. The document is available at support.dell.com/manuals.
book.
book.book Page 23 Wednesday, May 26, 2010 2:14 PM 2 Planning: About Your Storage Array Overview The MD3200i Series storage array is designed for high availability, offering redundant access to data storage. It features support for both single and dual RAID controller configuration. The Dell™ PowerVault™ MD3200i storage array provides 1.0-Gbps 1000 BaseT connectivity to the host server and enables access to 32 physical hosts.
book.book Page 24 Wednesday, May 26, 2010 2:14 PM Hardware Features Front-Panel Features and Indicators Figure 2-1. Front-Panel Features and Indicators—Dell™ PowerVault™ MD3200i 1 2 3 4 5 6 Figure 2-2.
book.book Page 25 Wednesday, May 26, 2010 2:14 PM Figure 2-3. Front-Bezel Features and Indicators 1 2 3 Item Indicator, Button, or Connector 1 Enclosure status LED Icon Description The enclosure status LED lights when the enclosure power is on. Lights blue during normal operation. Blinks blue when a host server is identifying the enclosure or when the system identification button is pressed. Lights amber as enclosure boots or is reset.
book.book Page 26 Wednesday, May 26, 2010 2:14 PM Item Indicator, Button, or Connector Icon Description 3 Split mode LED This LED should be unlit as the split mode function is not supported by the MD3200i Series Storage Arrays. 4 System identification button The system identification button on the front control panel can be used to locate a particular enclosure within a rack.
book.book Page 27 Wednesday, May 26, 2010 2:14 PM Back Panel Features and Indicators Figure 2-4.
book.book Page 28 Wednesday, May 26, 2010 2:14 PM Hard-Drive Indicator Patterns Figure 2-5.
book.book Page 29 Wednesday, May 26, 2010 2:14 PM Drive-Status Indicator Pattern Condition Off The physical disk is: • not yet discovered by the host server • has been spun down for removal • not supported for the RAID controller module or is not in the physical disk slot NOTE: The drive status indicator remains off until all hard drives are initialized after system power is turned on. Drives are not ready for insertion or removal during this time.
book.book Page 30 Wednesday, May 26, 2010 2:14 PM Power Indicator Codes Figure 2-6. Power Indicator Codes 1 2 3 4 5 Item LED Type 1 DC power Icon Description The LED lights green when the DC output voltage is within the limit. If this LED is off, it indicates that the DC output voltage are not within the limit. 2 Power supply/cooling fan fault The LED lights amber when the DC output voltage is not within the limit or a fault with the fan is detected.
book.book Page 31 Wednesday, May 26, 2010 2:14 PM 3 Planning: RAID Controller Modules RAID Controller Modules The RAID controller modules provide high-performance, advanced virtual disk configuration, and fault-tolerant disk subsystem management. Each RAID controller module contains 2 GB of cache that is mirrored with the other controller's cache for high availability and is protected by a batterypowered cache offload mechanism.
book.book Page 32 Wednesday, May 26, 2010 2:14 PM RAID Controller Module Connectors and Features Figure 3-1. MD3200i Series iSCSI RAID Controller Module 1 8 3 2 9 10 11 4 5 12 13 14 15 16 6 17 7 18 19 Item Component Function 1 SAS OUT port Provides SAS connection for cabling to an expansion enclosure. 2 iSCSI IN port 0 Provides host-to-controller iSCSI 1Gbps Ethernet connection. 3 iSCSI IN port 1 Provides host-to-controller iSCSI 1Gbps Ethernet connection.
book.book Page 33 Wednesday, May 26, 2010 2:14 PM Item Component Function 8 SAS OUT port link/fault LED Lights green when all four links are connected. Lights amber when one to three links are disconnected. Off when all links in the port are disconnected or cable is disconnected. 9 iSCSI IN port link LED Lights green when ethernet connection at 1Gbps established. Off when there is no link. 10 Controller power LED Lights green when controller is turned on. Off when controller is not turned on.
book.book Page 34 Wednesday, May 26, 2010 2:14 PM Item Component Function 18 Management port speed LED Lights green when ethernet connection is operating at 1000 Mbps. Lights amber when ethernet connection is operating at 100 Mbps. Off when ethernet connection is operating at 10 Mbps or is not active. 19 Management port activity LED Lights green when ethernet connection is active. Off when ethernet connection is not active.
book.book Page 35 Wednesday, May 26, 2010 2:14 PM Table 3-1. Shutdown Threshold Type Threshold Temperature Exceeding Event Description Nominal failure threshold A critical event is set Maximum failure threshold Shutdown of the system power supplies occurs within three minutes Shutdown threshold Shutdown of the system power supplies occurs within five seconds System Password Reset The storage array system password can be reset if it is forgotten.
book.book Page 36 Wednesday, May 26, 2010 2:14 PM mirrored to the cache of the second controller before completion status is issued to the host initiator. Write-Back Cache is enabled by default unless cache mirroring is disabled. Write-Through Cache In write-through cache, data is written to the physical disk before completion status is returned to the host operating system. Write-through cache is considered more robust than write-back cache, since a power failure is less likely to cause loss of data.
book.book Page 37 Wednesday, May 26, 2010 2:14 PM 4 Planning: MD3200i Series Storage Array Terms and Concepts This chapter explains terms and concepts used for configuration and operation of MD3200i Series storage arrays. Physical Disks, Virtual Disks, and Disk Groups Physical disks in your storage array provide the physical storage capacity for your data.
book.book Page 38 Wednesday, May 26, 2010 2:14 PM NOTE: The MD3200i storage enclosure must contain at least two physical disks for proper operation. This is necessary because the physical disks are used to store configuration information. Physical Disk States The storage array recognizes the physical disk states. Mode and status of physical disks are reported in the MDSM application. Possible values for mode and status or described in Table 4-1. Table 4-1.
book.book Page 39 Wednesday, May 26, 2010 2:14 PM Table 4-1. RAID Controller Physical Disk States (continued) Status Mode Offline Not applicable The physical disk has either been spun Flashing Green down or had a rebuild aborted by user (3000 ms), Amber request. (3000 ms), and off(3000ms) Identify Assigned, The physical disk is being identified.
book.book Page 40 Wednesday, May 26, 2010 2:14 PM Disk groups are always created in the unconfigured capacity of a storage array. Unconfigured capacity is the available physical disk space not already assigned in the storage array. Virtual disks are created within the free capacity of a disk group. Free capacity is the space in a disk group that has not been assigned to a virtual disk. Virtual Disk States The storage array recognizes the following virtual disk states. Table 4-2.
book.book Page 41 Wednesday, May 26, 2010 2:14 PM Each RAID level provides different performance and protection. You should select a RAID level based on the type of application, access, fault tolerance, and data you are storing. The storage array supports RAID levels 0, 1, 5, 6, and 10. The maximum number of physical disks that can be used in a disk group depends on the RAID level: • 96 for RAID 0, 1 and 10 • 30 for RAID 5 and 6.
book.book Page 42 Wednesday, May 26, 2010 2:14 PM RAID 1 is recommended for small databases or other applications that do not require large capacity for example accounting, payroll, or financial applications. RAID 1 provides full data redundancy. RAID 5 RAID 5 uses parity and striping data across all physical disks (distributed parity) to provide high data throughput and data redundancy, especially for small random access.
book.book Page 43 Wednesday, May 26, 2010 2:14 PM The segment size or stripe element size specifies the size of data in a stripe written to a single disk. The storage array supports stripe element sizes of 8, 16, 32, 64, 128, 256, and 512 KB. The default stripe element size is 128 KB. Stripe width, or depth, refers to the number of disks involved in an array where striping is implemented. For example, a four-disk group with disk striping has a stripe width of four.
book.book Page 44 Wednesday, May 26, 2010 2:14 PM A consistency check is similar to a background initialization. The difference is that background initialization cannot be started or stopped manually, while consistency check can. NOTE: Dell recommends that you run data consistency checks on a redundant array at least once a month. This allows detection and automatic replacement of unreadable sectors.
book.book Page 45 Wednesday, May 26, 2010 2:14 PM • Foreground initialization • Consistency check • Rebuild • Copy back. If a redundant RAID controller module fails with existing virtual disk processes, the processes on the failed controller are transferred to the peer controller. A transferred process is placed in a suspended state if there are four active processes on the peer controller.
book.book Page 46 Wednesday, May 26, 2010 2:14 PM • If I/O activity stretches beyond the segment size, you can increase it to reduce the number of disks required for a single I/O. Using a single physical disk for a single request frees disks to service other requests, especially when you have multiple users accessing a database or storage environment.
book.book Page 47 Wednesday, May 26, 2010 2:14 PM • Virtual disk RAID level migration • Segment size migration • Virtual disk capacity expansion • Disk group expansion • Disk group defragmentation. If a redundant RAID controller module fails with an existing disk group process, the process on the failed controller is transferred to the peer controller. A transferred process is placed in a suspended state if there is an active disk group process on the peer controller.
book.book Page 48 Wednesday, May 26, 2010 2:14 PM NOTE: Setting a high priority level impacts storage array performance. It is not advisable to set priority levels at the maximum level. Priority should also be assessed in terms of impact to host server access and time to complete an operation. For example, the longer a rebuild of a degraded virtual disk takes, the greater the risk for potential secondary disk failure.
book.book Page 49 Wednesday, May 26, 2010 2:14 PM Use either of the following methods to move disk groups and virtual disks: • Hot virtual disk migration—Disk migration with the destination storage array power turned on. • Cold virtual disk migration—Disk migration with the destination storage array power turned off. NOTE: To ensure that the migrating disk groups and virtual disks are correctly recognized when the target storage array has an existing physical disk, use hot virtual disk migration.
book.book Page 50 Wednesday, May 26, 2010 2:14 PM • Enabling premium features before migration—Before migrating disk groups and virtual disks, enable the required premium features on the destination storage array. If a disk group is migrated from a MD3200i storage array that has a premium feature enabled and the destination array does not have this feature enabled, an Out of Compliance error message can be generated. Disk Roaming You can move physical disks within an array.
book.book Page 51 Wednesday, May 26, 2010 2:14 PM • Host server-to-virtual disk mappings are shared between RAID controller modules in the storage array. • A unique LUN must be used by a host group or host server to access a virtual disk. • Not every operating system has the same number of LUNs available for use. Host Types A host server is a server that accesses a storage array. Host servers are mapped to the virtual disks and use one or more iSCSI initiator ports.
book.book Page 52 Wednesday, May 26, 2010 2:14 PM Snapshot Repository Virtual Disk When you create a snapshot virtual disk, it automatically creates a snapshot repository virtual disk. A snapshot repository is a virtual disk created in the storage array as a resource for a snapshot virtual disk. A snapshot repository virtual disk contains snapshot virtual disk metadata and copy-on-write data for a particular snapshot virtual disk. The repository supports one snapshot only.
book.book Page 53 Wednesday, May 26, 2010 2:14 PM Source Virtual Disk When you create a virtual disk copy, a copy pair consisting of a source virtual disk and a target virtual disk is created on the same storage array. When a virtual disk copy is started, data from the source virtual disk is copied completely to the target virtual disk. Target Virtual Disk When you start a virtual disk copy, the target virtual disk maintains a copy of the data from the source virtual disk.
book.book Page 54 Wednesday, May 26, 2010 2:14 PM You can copy data from a virtual disk in one of two ways: • By taking a point-in-time snapshot of the data • By copying the data to another virtual disk using a virtual disk copy You can select a snapshot virtual disk as the source virtual disk for a virtual disk copy. This configuration is one of the best ways you can apply the snapshot virtual disk feature, since it enables complete backups without any impact to the storage array I/O.
book.book Page 55 Wednesday, May 26, 2010 2:14 PM • Physically removed • Updating firmware • Involved in an event that caused failover to the alternate controller Paths used by the preferred RAID controller module to access either the disks or the host server are called the preferred paths; redundant paths are called the alternate paths.
book.book Page 56 Wednesday, May 26, 2010 2:14 PM paths to the RAID controller module that owns the virtual disk equally for I/O activity. Paths to the secondary RAID controller module are ignored until ownership changes. The basic assumption for the round-robin policy is that the data paths are equal. With mixed host support, the data paths might have different bandwidths or different data transfer speeds.
book.book Page 57 Wednesday, May 26, 2010 2:14 PM • If the storage array you are monitoring begins in or transitions to an unresponsive state, an informational dialog appears. The dialog informs you that the Performance Monitor cannot poll the storage array for performance data. To monitor the performance of the arrays: 1 Open MDSM and select the appropriate storage array. 2 Open the Array Management Window (AMW) for the selected storage array 3 In the AMW, select Storage Array Monitor Performance.
book.book Page 58 Wednesday, May 26, 2010 2:14 PM 10 Type a file name in the File name text box. NOTE: The .perf extension is the default. 11 Select a file type from the Files of type list. • Use the Report format (ASCII text) file type if you want to save the data to a report form for viewing or printing. • Use the Comma Delimited Format file type if you want to save the data in a form that can be imported into a commercial spreadsheet application for further analysis.
book.book Page 59 Wednesday, May 26, 2010 2:14 PM Configuration: Overview 5 Dell™ PowerVault™ Modular Disk Storage Manager (MDSM) online help contains information on the how to use the MDSM application to perform the configuration and management tasks described in this document. You can access online help by clicking Help located at the top right corner of MDSM interface. See the MD3200i and MD3220i Storage Array’s Deployment Guide for information on installing the MDSM.
book.book Page 60 Wednesday, May 26, 2010 2:14 PM Enterprise Management Window The EMW provides high-level management of storage arrays. When you start MDSM, the EMW opens. The EMW has these tabs: • Devices tab—Provides information about the storage arrays. • Setup tab—Presents the initial setup tasks that guide you through adding storage arrays and configuring alerts.
book.book Page 61 Wednesday, May 26, 2010 2:14 PM Inheriting the System Settings Use the Inherit System Settings option to import the operating system theme settings into the MDSM. Importing system theme settings affects such features as font type, font size, color, and contrast in the MDSM. 1 Open the Inherit System Settings window in one of these ways: • Select Tools Inherit System Settings. • Select the Setup tab, and click Inherit System Settings.
book.book Page 62 Wednesday, May 26, 2010 2:14 PM • Logical tab—You can view the organization of the storage array by virtual disks, disk groups, free capacity nodes, and any unconfigured capacity for the storage array. • Physical tab—You can view the organization of the storage array by RAID controller modules, physical disks, and other hardware components. • Mappings tab—You can define the hosts, host groups, and host ports.
book.book Page 63 Wednesday, May 26, 2010 2:14 PM 6 Configuration: About Your Storage Array Out-of-Band and In-Band Management You can manage a storage array in two ways: • Out-of-band management • In-band management Out-of-Band Management Using the out-of-band management method, data is separate from commands and events. Data travels through the host-to-controller interface, while commands and events travel through the management port Ethernet cables.
book.book Page 64 Wednesday, May 26, 2010 2:14 PM In-Band Management Using in-band-management, commands, events, and data travel through the host-to-controller interface. Unlike out-of-band management, commands and events are mixed with data. NOTE: For detailed information on setting up in-band and out-of-band management see the Deployment Guide. When you add storage arrays by using this management method, you need to specify only the host name or IP address of the host.
book.book Page 65 Wednesday, May 26, 2010 2:14 PM NOTE: For Linux, set the default gateway so that broadcast packets are sent to 255.255.255.0. For Red Hat® Enterprise Linux®, if no gateway exists on the network, set the default gateway to the IP address of the NIC. NOTE: MDSM uses TCP/UDP port 2463 for communication to the MD Storage Array.
book.book Page 66 Wednesday, May 26, 2010 2:14 PM NOTE: When adding a storage array using in-band management with iSCSI, a session must first be established between the initiator on the host server and the storage array. For more information, see "Configuration: Using iSCSI" on page 81. NOTE: The host agent must be restarted before in-band management communication can be established. See "Starting or Restarting the Host Context Agent Software" on page 246. 3 Click Add.
book.book Page 67 Wednesday, May 26, 2010 2:14 PM • Configure the storage array—Create disk groups, virtual disks, and hot spare physical disks by using the Automatic configuration method or the Manual configuration method. For more information, see the PowerVault Modular Disk Storage Manager online help topics. • Map virtual disks—Map virtual disks to hosts or host groups.
book.book Page 68 Wednesday, May 26, 2010 2:14 PM • In the AMW, select Storage ArrayBlinkStorage Array. The LEDs blink on the physical disks in the storage array. 2 After locating the storage array, click OK. The LEDs stop blinking. 3 If the LEDs do not stop blinking, select Storage ArrayBlink Stop All Indications. A confirmation message is displayed. 4 Click OK. Naming or Renaming Storage Arrays Each storage array should be assigned a unique up to 30-character alphanumeric name.
book.book Page 69 Wednesday, May 26, 2010 2:14 PM 5 Click Yes. The new storage array name appears in the Select storage array table. 6 Repeat step 2 through step 4 to name or rename additional storage arrays. NOTE: Avoid arbitrary names or names that might lose meaning in the future. Setting a Password You can configure each storage array with a password to protect it from unauthorized access.
book.book Page 70 Wednesday, May 26, 2010 2:14 PM 6 Click OK. NOTE: You are not prompted for a password when you attempt to change the storage array configuration in the current management session. Password Guidelines Follow these guidelines when you create a password: • Use secure passwords for your storage array. A password should be easy for you to remember but difficult for others to determine.
book.book Page 71 Wednesday, May 26, 2010 2:14 PM Adding/Editing a Comment to an Existing Storage Array A descriptive comment, with an applicable storage array name, is a helpful identification tool. You can add or edit a comment for a storage array in the EMW only. To add or edit a comment: 1 In the EMW, select the Devices tab and select the relevant managed storage array. 2 Select Edit Comment. The Edit Comment dialog is displayed. 3 Type the 60-character comment. 4 Click OK.
book.book Page 72 Wednesday, May 26, 2010 2:14 PM Enabling Premium Features You can enable premium features on the storage array. To enable the premium features, you must obtain a feature key file specific to the premium feature that you want to enable from your storage supplier. To enable premium features: 1 From the toolbar in AMW, select Storage Array Premium Features. The Premium Features and Feature Pack Information window is displayed. 2 Select the relevant premium feature, and click Enable.
book.book Page 73 Wednesday, May 26, 2010 2:14 PM 2 Select or enter the percentage of unwritten data in the cache to trigger a cache flush in Start flushing. 3 Select or enter the percentage of unwritten data in the cache to stop a cache flush in progress in Stop flushing. 4 Select the appropriate Cache block size. A smaller cache size is a good choice for file-system use or databaseapplication use. A larger cache size is a good choice for applications that generate sequential I/O, such as multimedia.
book.book Page 74 Wednesday, May 26, 2010 2:14 PM 3 Click OK. 4 If you have set a password for the selected storage array, the Enter Password dialog appears. Type the current password for the storage array. 5 Click OK. Configuring Alert Notifications MDSM can send an alert for any condition on the storage array that requires your attention. Alerts can be sent as e-mail messages or as Simple Network Management Protocol (SNMP) trap messages.
book.book Page 75 Wednesday, May 26, 2010 2:14 PM • In the Tree view or the Table view on the Devices tab in the EMW, select a node, and then select Edit Configure Alerts. Go to step 3. • In the Setup tab in the EMW, select Configure Alerts. Go to step 2. 2 Select one of the following radio buttons to specify an alert level: • All storage arrays—Select this option to send an alert e-mail about events on all storage arrays.
book.book Page 76 Wednesday, May 26, 2010 2:14 PM • Replacing an e-mail address—In the Configured email addresses area, select the e-mail address to be replaced, type the replacement e-mail address in Email address, and click Replace. • Deleting an e-mail address—In the Configured email addresses area, select the e-mail address, and click Delete. • Validating an e-mail address—Type the e-mail address in Email address or select the e-mail address in the Configured email addresses area, and click Test.
book.book Page 77 Wednesday, May 26, 2010 2:14 PM • You must use fully qualified e-mail addresses, for example, name@mycompany.com. • You can configure multiple e-mail addresses before you click OK. Configuring SNMP Alerts To add a management console to the list of addresses configured to receive SNMP alerts: 1 Open the Configure Alerts dialog by performing one of these actions: • In the Tree view or the Table view on the Devices tab in the EMW, select a node, and select Edit Configure Alerts.
book.book Page 78 Wednesday, May 26, 2010 2:14 PM • Replacing an SNMP address—Select the SNMP address in the Configured SNMP addresses area, type the replacement community name in Community name and the trap destination in Trap destination, and click Replace. • Deleting an SNMP address—Select the SNMP address in the Configured SNMP addresses area, and click Delete. • Validating an SNMP address—Select the SNMP address in the Configured SNMP addresses area, and click Test.
book.book Page 79 Wednesday, May 26, 2010 2:14 PM A learn cycle starts automatically when you install a new battery module. Learn cycles for batteries in both RAID controller modules in a duplex system occur simultaneously. Learn cycles are scheduled to start automatically at regular intervals, at the same time and on the same day of the week. The interval between cycles is described in weeks. Use the following guidelines to adjust the interval: • You can use the default interval.
book.book Page 80 Wednesday, May 26, 2010 2:14 PM 1 In the AMW, select Storage Array Synchronize RAID Controller Module Clocks. 2 If a password is set, in the Enter Password dialog, type the current password for the storage array, and click Synchronize. The RAID controller module clocks are synchronized with the storage management station.
book.book Page 81 Wednesday, May 26, 2010 2:14 PM Configuration: Using iSCSI 7 Changing the iSCSI Target Authentication To change the iSCSI target authentication: 1 In the AMW, select the Setup tab. 2 Select Manage iSCSI Settings. The Manage iSCSI Settings window is displayed and by default, the Target Authentication tab is selected. To change the authentication settings, select: • None—If you do not require initiator authentication. If you select the None, any initiator can access the target.
book.book Page 82 Wednesday, May 26, 2010 2:14 PM Entering Mutual Authentication Permissions Mutual authentication or two-way authentication is a way for a client or a user to verify themselves to a host server, and for the host server to validate itself to the user. This validation is accomplished in such a way that both parties are sure of the other’s identity. To add mutual authentication permissions: 1 In the AMW, select the Setup tab. 2 Select Manage iSCSI Settings.
book.book Page 83 Wednesday, May 26, 2010 2:14 PM Initiator CHAP Secret The initiator CHAP secret is set on the host using the iSCSI initiator configuration program provided with the host operating system. If you are using the mutual authentication method, you must define the initiator CHAP secret when you set up the host. This must be the same CHAP secret that is defined for the target when defining mutual authentication settings.
book.book Page 84 Wednesday, May 26, 2010 2:14 PM Changing the iSCSI Target Identification You cannot change the iSCSI target name, but you can associate an alias with the target for simpler identification. Aliases are useful because the iSCSI target names are not intuitive. You should provide an iSCSI target alias that is meaningful and easy to remember. To change the iSCSI target identification: 1 In the AMW, select the Setup tab. 2 Select Manage iSCSI Settings.
book.book Page 85 Wednesday, May 26, 2010 2:14 PM • Select Specify Configuration, and type the IPv4 address to activate the target discovery. • Type the iSNS server IP address in the IPv6 settings area to activate the target discovery. After you manually enter an IP address, you can also click Advanced to configure the customized TCP listening ports. If you do not want to allow discovery sessions that are not named, select the Disallow un-named discovery sessions.
book.book Page 86 Wednesday, May 26, 2010 2:14 PM 4 To use the IPv4 settings for the iSCSI host port, select Enable IPv4 and select the IPv4 Settings tab. 5 To use the IPv6 settings for the iSCSI host port, select Enable IPv6 and select the IPv6 Settings tab. 6 To configure the IPv4 and IPv6 settings: • To automatically configure the settings, select Obtain configuration automatically. This option is selected by default. • To manually configure the settings, select Specify configuration.
book.book Page 87 Wednesday, May 26, 2010 2:14 PM Advanced iSCSI Host Ports Settings NOTE: Configuring the advanced iSCSI host ports settings is optional. Use the advanced settings for the individual iSCSI host ports to specify the TCP frame size, the virtual LAN, and the network priority. Table 7-2. Advanced iSCSI Host Port Settings Setting Description Virtual LAN (VLAN) A method of creating independent logical networks within a physical network. Several VLANs can exist within a network.
book.book Page 88 Wednesday, May 26, 2010 2:14 PM Viewing or Ending an iSCSI Session You might want to end an iSCSI session for the following reasons: • Unauthorized access—If an initiator is logged on whom you consider to not have access, you can end the iSCSI session. Ending the iSCSI session forces the initiator to log off the storage array. The initiator can log on if None authentication method is available.
book.book Page 89 Wednesday, May 26, 2010 2:14 PM Viewing iSCSI Statistics and Setting Baseline Statistics To view iSCSI statistics and set baseline statistics: 1 In the AMW toolbar, select Storage Array iSCSI Statistics. The View iSCSI Statistics window is displayed. 2 Select the iSCSI statistic type you want to view in the iSCSI Statistics Type area.
book.book Page 90 Wednesday, May 26, 2010 2:14 PM Edit, Remove, or Rename Host Topology If you give access to the wrong host or the wrong host group, you can remove or edit the host topology. To correct the host topology: Table 7-3. Host Topology Actions Desired Action Steps to Complete Action Move a host. 1 Click the Mappings tab. Move a host group. 2 Select the Host that you want to move, and then click Mappings Move. 3 Select a host group to move the host to and click OK.
book.book Page 91 Wednesday, May 26, 2010 2:14 PM Configuration: Event Monitor 8 An event monitor is provided with Dell™ PowerVault™ Modular Disk Storage Manager (MDSM). The event monitor runs continuously in the background and monitors activity on the managed storage arrays. If the event monitor detects any critical problems, it can notify a host or remote system using email, Simple Network Management Protocol (SNMP) trap messages, or both.
book.book Page 92 Wednesday, May 26, 2010 2:14 PM NOTE: It is recommended that you configure the event monitor to start by default on a management station that runs 24 hours a day. Windows To enable or disable the event monitor: 1 Click Start Settings Control Panel Administrative Tools Services. or Click Start Administrative Tools Services. 2 From the list of services, select Modular Disk Storage Manager Event Monitor. 3 Select Action Properties.
book.book Page 93 Wednesday, May 26, 2010 2:14 PM Configuration: About Your Host 9 Configuring Host Access Modular Disk Storage Manager (MDSM) software is comprised of multiple modules. One of these modules is the Host Context Agent. The host context agent is installed as part of the MDSM installation and runs continuously in the background.
book.book Page 94 Wednesday, May 26, 2010 2:14 PM • Create a host and assign an alias or user label. • Add or associate a new host port identifier to a particular host. • Change the host port identifier alias or user label. • Move or associate a host port identifier to a different host. • Replace a host port identifier with a new host port identifier. • Manually activate an inactive host port so that the port can gain access to host specific or host group specific LUN mappings.
book.book Page 95 Wednesday, May 26, 2010 2:14 PM • Select the Mappings tab. Right-click the root node (storage array name), Default Group node, or Host Group node in the Topology pane to which you want to add the host, and select Define Host from the pop-up menu. The Specify Host Name window is displayed. 3 In Host name, enter an up to 30 character alphanumeric name. 4 Select the relevant option in Do you plan to use the storage partitions in the this storage array? and click Next.
book.book Page 96 Wednesday, May 26, 2010 2:14 PM The Preview window is displayed. 11 Click Finish. Removing Host Access To remove host access: 1 In the AMW, select the Mappings tab, select the host node in the Topology pane. 2 Perform one of these actions: • Select Mappings Remove. • Right-click the host node, and select Remove from the pop-up menu. The Remove confirmation dialog appears. 3 Type yes. 4 Click OK.
book.book Page 97 Wednesday, May 26, 2010 2:14 PM • Right-click the storage array or the Default Group, and select Define Host Group from the pop-up menu. 4 Type the name of the new host group in Enter new host group name. 5 Select the appropriate hosts in the Select hosts to add area. 6 Click Add. NOTE: To remove hosts, select the hosts in the Hosts in group area, and click Remove. 7 Click OK. The host group is added to the storage array.
book.book Page 98 Wednesday, May 26, 2010 2:14 PM 4 Click Yes. The host is moved to the selected host group with the following mappings: • The host retains the specific virtual disk mappings assigned to it. • The host inherits the virtual disk mappings assigned to the host group to which it is moved. • The host loses the virtual disk mappings assigned to the host group from which it was moved.
book.book Page 99 Wednesday, May 26, 2010 2:14 PM • Changing a host type MDSM automatically detects these changes for any host running the host agent software. Starting or Stopping the Host Context Agent The host context agent discovers the host topology. The host context agent starts and stops with the host. The topology discovered by the host context agent can be viewed by clicking Configure Host Access (Automatic) in the Configure tab in the MDSM.
book.book Page 100 Wednesday, May 26, 2010 2:14 PM 4 Click Action Start. I/O Data Path Protection You can have multiple host-to- array connections for a host. Ensure that you select all the connections to the array when configuring host access to the storage array. NOTE: See the Deployment Guide for more information on cabling configurations. NOTE: For more information on configuring hosts see "Configuration: About Your Host" on page 93.
book.book Page 101 Wednesday, May 26, 2010 2:14 PM Managing Host Port Identifiers You can manage the host port identifiers that are added to the storage array. You can: • Add—Add or associate a new host port identifier to a particular host. • Edit—Change the host port identifier alias or user label. You can move (associate) the host port identifier to a new host. • Replace—Replace a particular host port identifier with another host port identifier.
book.book Page 102 Wednesday, May 26, 2010 2:14 PM • Add by creating a new host port identifier—In New host port identifier, enter the name of the new host port identifier. 6 In User label, enter up to 30 character alphanumeric name. 7 In Associated with host, select the appropriate host or host group. 8 Select the host port identifier that you would like to manage from the list of host port identifiers in the Host port identifier information area.
book.book Page 103 Wednesday, May 26, 2010 2:14 PM 10 Configuration: Disk Groups and Virtual Disks Creating Disk Groups and Virtual Disks Disk groups are created in the unconfigured capacity of a storage array, and virtual disks are created in the free capacity of a disk group. The maximum number of physical disks supported in a disk group is 30. The hosts attached to the storage array read and write data to the virtual disks.
book.book Page 104 Wednesday, May 26, 2010 2:14 PM A disk group should be organized according to its related tasks and subtasks. For example, if you create a disk group for the Accounting Department, you can create virtual disks that match the different types of accounting performed in the department: Accounts Receivable (AR), Accounts Payable (AP), internal billing, and so forth. In this scenario, the AR and AP virtual disks probably need more capacity than the internal billing virtual disk.
book.book Page 105 Wednesday, May 26, 2010 2:14 PM 3 Type up to 30-character name of the disk group in Disk group name. 4 Select the appropriate Physical Disk selection choices, you can select: • Automatic, see step 6 • Manual, see step 9 5 Click Next. 6 For Automatic configuration, The RAID Level and Capacity window is displayed. 7 Select the appropriate RAID level in Select RAID level. You can select RAID levels 0, 1/10, 6, and 5.
book.book Page 106 Wednesday, May 26, 2010 2:14 PM Locating a Disk Group You can physically locate and identify all of the physical disks that comprise a selected disk group. An LED blinks on each physical disk in the disk group. To locate a disk group: 1 In the AMW, select the Logical tab. 2 Select the appropriate disk group and from the toolbar select Disk Group Blink The LEDs for the selected disk group blink. 3 After locating the disk group, click OK. The LEDs stop blinking.
book.book Page 107 Wednesday, May 26, 2010 2:14 PM To create virtual disks: 1 Choose one of these methods to start the Create Virtual Disk Wizard: • To create a virtual disk from unconfigured capacity in the storage array—On the Logical tab, select an Unconfigured Capacity node, and select Virtual Disk Create. Alternatively, you can right-click the Unconfigured Capacity node, and select Create Virtual Disk from the pop-up menu.
book.book Page 108 Wednesday, May 26, 2010 2:14 PM • Customize settings. 6 Click Next. 7 In the Customize Advanced Virtual Disk Parameters window, select the appropriate Virtual Disk I/O characteristics type. You can select: • File system (typical) • Database • Multimedia • Custom NOTE: If you select Custom, you must select an appropriate segment size. 8 Select the appropriate Preferred RAID controller module ownership and click Next. The Specify Virtual Disk-to-LUN Mapping window is displayed.
book.book Page 109 Wednesday, May 26, 2010 2:14 PM 3 In the toolbar, select Virtual Disk Change Modification Priority. The Change Modification Priority window is displayed. 4 Select one or more virtual disks. To select nonadjacent virtual disks, press click. To select adjacent virtual disks, press click. To select all of the available virtual disks, click Select All. Move the Select modification priority slider bar to the desired priority. 5 Click OK.
book.book Page 110 Wednesday, May 26, 2010 2:14 PM The Change Cache Settings window is displayed. 3 Select one or more virtual disks. To select nonadjacent virtual disks, press click. To select adjacent virtual disks, press click. To select all of the available virtual disks, click Select All. 4 In the Select cache properties area, you can select: • Enable read caching—to enable read caching. • Enable dynamic cache read prefetch—to enable dynamic cache read prefetch.
book.book Page 111 Wednesday, May 26, 2010 2:14 PM Changing the Segment Size of a Virtual Disk You can change the segment size on a selected virtual disk. During this operation, I/O performance is affected, but your data remains available. Guidelines to proceed with changing the segment size: • You cannot cancel this operation after it starts. • Do not start this operation unless the disk group is in Optimal status. • MDSM determines the segment size transitions that are allowed.
book.book Page 112 Wednesday, May 26, 2010 2:14 PM The segment size modification operation begins. The virtual disk icon in the Logical pane shows an Operation in Progress status while the operation is taking place. NOTE: To view the progress or change the priority of the modification operation, select a virtual disk in the disk group, and select Virtual Disk Change Modification Priority.
book.book Page 113 Wednesday, May 26, 2010 2:14 PM NOTE: If you selected the Custom option, select your preferred dynamic cache read prefetch setting (enabled/disabled) and segment size (8KB to 512KB). 2 Click OK. Choosing an Appropriate Physical Disk Type You can create disk groups and virtual disks in the storage array. You must select the capacity that you want to allocate for the virtual disk from either unconfigured capacity or free capacity available in the storage array.
book.book Page 114 Wednesday, May 26, 2010 2:14 PM Whenever the power is turned off and turned on again, all of the securityenabled physical disks change to a security locked state. In this state, the data is inaccessible until the correct security key is provided by a RAID controller module. You can view the self encrypting disk status of any physical disk in the storage array from the Physical Disk Properties dialog.
book.book Page 115 Wednesday, May 26, 2010 2:14 PM NOTE: If you have not created a security key for the storage array, the Create Security Key option is active. If you have created a security key for the storage array, the Create Security Key option is inactive with a check mark to the left. The Change Security Key option, the Save Security Key option, and the Validate Security Key option are now active. The Secure Physical Disks option appears in the Disk Group menu.
book.book Page 116 Wednesday, May 26, 2010 2:14 PM Creating a Security Key When you create a security key, it is generated by and securely stored by the array. You cannot read or view the security key. A copy of the security key must be kept on some other storage medium for backup in case of system failure or for transfer to another storage array. A pass phrase that you provide is used to encrypt and decrypt the security key for storage on other media.
book.book Page 117 Wednesday, May 26, 2010 2:14 PM The pass phrase that you enter is masked. NOTE: Create Key is active only if the pass phrase meets the above mentioned criterion. 5 In Confirm pass phrase, re-enter the exact string that you entered in Pass phrase. Make a record of the pass phrase that you entered and the security key identifier that is associated with the pass phrase. You need this information for later secure operations. 6 Click Create Key.
book.book Page 118 Wednesday, May 26, 2010 2:14 PM To change the security key: 1 In the AMW toolbar, select Storage ArrayPhysical Disk Security Change Security Key. The Confirm Change Security Key window is displayed. 2 Type yes in the text field, and click OK. The Change Security Key window is displayed. 3 In Secure key identifier, enter a string that become part of the secure key identifier.
book.book Page 119 Wednesday, May 26, 2010 2:14 PM Saving a Security Key You save an externally storable copy of the security key when the security key is first created and each time it is changed. You can create additional storable copies at any time. To save a new copy of the security key, you must provide a pass phrase. The pass phrase you choose does not need to match the pass phrase used when the security key was created or last changed.
book.book Page 120 Wednesday, May 26, 2010 2:14 PM Unlocking Secure Physical Disks You can export a security-enabled disk group to move the associated physical disks to a different storage array. After you install those physical disks in the new storage array, you must unlock the physical disks before data can be read from or written to the physical disks. To unlock the physical disks, you must supply the security key from the original storage array.
book.book Page 121 Wednesday, May 26, 2010 2:14 PM Configuring Hot Spare Physical Disks Guidelines to configure host spare physical disks: • You can use only unassigned physical disks with Optimal status as hot spare physical disks. • You can unassign only hot spare physical disks with Optimal, or Standby status. You cannot unassign a hot spare physical disk that has the In Use status. A hot spare physical disk has the In Use status when it is in the process of taking over for a failed physical disk.
book.book Page 122 Wednesday, May 26, 2010 2:14 PM • Right-click the physical disk and select Hot Spare Coverage from the pop-up menu. The Hot Spare Physical Disk Options window is displayed. 4 Select the appropriate option, you can select: • View/change current hot spare coverage—to review hot spare coverage and to assign or unassign hot spare physical disks, if necessary. See step 5.
book.book Page 123 Wednesday, May 26, 2010 2:14 PM Hot Spares and Rebuild A valuable strategy to protect data is to assign available physical disks in the storage array as hot spares. A hot spare adds another level of fault tolerance to the storage array. A hot spare is an idle, powered-on, stand-by physical disk ready for immediate use in case of disk failure.
book.book Page 124 Wednesday, May 26, 2010 2:14 PM the failed physical disk to the hot spare physical disk. When you have physically replaced the failed physical disk, a copyback operation occurs from the hot spare physical disk to the replaced physical disk. If there are secure disk groups and security capable disk groups in the storage array, the hot spare physical disk must match the security capability of the disk group.
book.book Page 125 Wednesday, May 26, 2010 2:14 PM Enclosure loss protection is achieved when you create a disk group where all of the physical disks that comprise the disk group are located in different expansion enclosures. This distinction depends on the RAID level. If you choose to create a disk group by using the Automatic method, the software attempts to choose physical disks that provide enclosure loss protection.
book.book Page 126 Wednesday, May 26, 2010 2:14 PM Host-to-Virtual Disk Mapping After you create virtual disks, you must map them to the host(s) connected to the array. Guidelines to configure host-to-virtual disk mapping: • Each virtual disk in the storage array can be mapped to only one host or host group. • Host-to-virtual disk mappings are shared between controllers in the storage array. • A unique LUN must be used by a host group or host to access a virtual disk.
book.book Page 127 Wednesday, May 26, 2010 2:14 PM 1 In the AMW, select the Mappings tab. 2 In the Topology pane, select: • Default Group • Undefined mappings node • Individual defined mapping • Host group • Host 3 In the toolbar, select Mappings Define Additional Mapping. The Define Additional Mapping window is displayed. 4 In Host group or host, select the appropriate host group or host. All defined hosts, host groups, and the default group appear in the list.
book.book Page 128 Wednesday, May 26, 2010 2:14 PM Modifying and Removing Host-to-Virtual Disk Mapping You can modify or remove a host-to-virtual disk mapping for several reasons, such as an incorrect mapping or reconfiguration of the storage array. Modifying or removing a host-to-virtual disk mapping applies to both hosts and host groups.
book.book Page 129 Wednesday, May 26, 2010 2:14 PM 8 Restart the host applications. Changing Controller Ownership of the Virtual Disk If the host has a single data-path to the MD storage array, the virtual disk must be owned by the controller to which the host is connected. You must configure this storage array before you start I/O operations and after the virtual disk is created. You can change the RAID controller module ownership of a standard virtual disk or a snapshot repository virtual disk.
book.book Page 130 Wednesday, May 26, 2010 2:14 PM 3 Perform one of these actions: • Select Mappings Remove. • Right-click the virtual disk, and select Remove Mapping from the pop-up menu. 4 Click Yes to remove the mapping. Changing the RAID Controller Module Ownership of a Disk Group You can change the RAID controller module ownership of a a disk group. You can change the RAID controller module ownership of a standard virtual disk or a snapshot repository virtual disk.
book.book Page 131 Wednesday, May 26, 2010 2:14 PM The ownership of the disk group is changed. I/O to the disk group is now directed through this I/O path. You are finished with this procedure. NOTE: The disk group might not use the new I/O path until the multi-path driver reconfigures and recognizes the new path. This action usually takes less than five minutes.
book.book Page 132 Wednesday, May 26, 2010 2:14 PM Restricted Mappings Many hosts are able to map up to 256 logical unit numbers (LUNs) (0 to 255) per storage partition. However, the maximum number of mappings differs because of operating system variables, failover driver issues, and potential data problems. The hosts listed in the table have these mapping restrictions.
book.book Page 133 Wednesday, May 26, 2010 2:14 PM • You cannot move a host with a restricted host type into a storage partition that already has LUNs mapped that are greater than what is allowed by the restricted host type. For example, if you have a restricted host type that allows only LUNs up to 31, you cannot move that restricted host type into a storage partition that has LUNs greater than 31 already mapped. The Default Group on the Mappings tab has a default host type.
book.book Page 134 Wednesday, May 26, 2010 2:14 PM 1 Do you want to change the RAID controller module ownership of a virtual disk or a disk group? • Change the RAID controller module ownership of a virtual disk – Go to step 2. • Change the RAID controller module ownership of a disk group – Go to step 3. 2 To change the RAID controller module ownership of a virtual disk, perform these steps: a Select the Logical tab. b Select the virtual disk.
book.book Page 135 Wednesday, May 26, 2010 2:14 PM CAUTION: Possible loss of data access– Changing ownership at the disk group level causes every virtual disk in that disk group to transfer to the other RAID controller module and use the new I/O path. If you do not want to set every virtual disk to the new path, change ownership at the virtual disk level instead. e Click Yes. The ownership of the disk group is changed. I/O to the disk group is now directed through this I/O path.
book.book Page 136 Wednesday, May 26, 2010 2:14 PM Storage Partitioning A storage partition is a logical entity consisting of one or more virtual disks that can be accessed by a single host or shared among hosts that are part of a host group. The first time you map a virtual disk to a specific host or host group, a storage partition is created. Subsequent virtual disk mappings to that host or host group do not create another storage partition.
book.book Page 137 Wednesday, May 26, 2010 2:14 PM NOTE: You can include a secondary virtual disk in a storage partition. However, any hosts that are mapped to the secondary virtual disk has read-only access until the virtual disk is promoted to a primary virtual disk, or the mirror relationship is removed. Storage partitioning topology is the collection of elements, such as Default Group, host groups, hosts, and host ports shown as nodes in the Topology pane of the Mappings tab in the AMW.
book.book Page 138 Wednesday, May 26, 2010 2:14 PM 5 Click Add. A message prompts you to confirm your selection. 6 To add the capacity to the disk group, click Yes. You can also use the Command Line Interface (CLI) on both Windows and Linux hosts to add free capacity to a disk group. See the CLI Guide for more information. After the capacity expansion is completed, additional free capacity is available in the disk group for creation of new virtual disks or expansion of existing virtual disks.
book.book Page 139 Wednesday, May 26, 2010 2:14 PM For more information, see the PowerVault Modular Disk Storage Manager online help topics. Disk Group Migration Disk group migration allows to you export a disk group so that you can import the disk group to a different storage array. You can also export a disk group so that you can store the data offline. NOTE: During the export process (before the disk group is imported) you lose access to the data on the exported disk group.
book.book Page 140 Wednesday, May 26, 2010 2:14 PM 2 Stop all I/O, and unmount or disconnect the file systems on the virtual disks in the disk group. 3 Back up the data on the virtual disks in the disk group. 4 Locate the disk group, and label the physical disks. 5 Place the disk group offline. 6 Obtain blank physical disk modules or new physical disks. On the target storage array: 1 Verify that the target storage array has available physical disk slots.
book.book Page 141 Wednesday, May 26, 2010 2:14 PM NOTE: Some settings cannot be imported during the import disk group procedure. The following settings are removed/cleared during the procedure: • Persistent reservations • Host-to-virtual disk mappings • Virtual disk copy pairs • Snapshot virtual disks and snapshot repository virtual disks • Remote mirror pairs • Mirror repositories Non-Importable Components Some components cannot be imported during the import disk group procedure.
book.book Page 142 Wednesday, May 26, 2010 2:14 PM • Recovered media error—Data could not be read by the physical disk on the first attempt but was successfully read on a subsequent attempt. Data is rewritten to the physical disk and verified and the error is reported to the event log. • Redundancy mismatches error—The first 10 redundancy mismatches that are found on the virtual disk are reported to the event log.
book.book Page 143 Wednesday, May 26, 2010 2:14 PM 8 Click OK. Suspending the Media Scan You cannot perform a media scan while performing another long-running operation on the disk drive such as reconstruction, copy-back, reconfiguration, virtual disk initialization, or immediate availability formatting. If you want to perform another long-running operation, you should suspend the media scan. NOTE: A background media scan is the lowest priority of the long-running operations.
book.
book.book Page 145 Wednesday, May 26, 2010 2:14 PM 11 Configuration: Premium Feature— Snapshot Virtual Disks NOTE: If you ordered this feature, you received a Premium Feature Activation card shipped in the same box as your Dell PowerVault MD storage array. Follow the directions on the card to obtain a key file and to enable the feature. NOTE: The snapshot feature allows up to eight snapshots per LUN and 128 per array to be present at the same time.
book.book Page 146 Wednesday, May 26, 2010 2:14 PM repository uses less disk space than a full physical copy, because the only data blocks that are stored in the snapshot repository virtual disk are those that have changed since the time of the snapshot. When you create a snapshot virtual disk, you specify its location, capacity, and other parameters. You can disable or delete the snapshot virtual disk when it is not required.
book.book Page 147 Wednesday, May 26, 2010 2:14 PM • Snapshot Repository Virtual Disk Name—A user-specified name that helps you associate the snapshot repository virtual disk to its corresponding snapshot virtual disk and source virtual disk. • Snapshot Repository Virtual Disk Capacity—The snapshot repository virtual disk capacity is expressed as a percentage of the source virtual disk capacity. The maximum percentage allowed is 120 percent.
book.book Page 148 Wednesday, May 26, 2010 2:14 PM • Snapshot repository virtual disks • Snapshot virtual disks • Target virtual disks that are participating in a virtual disk copy. NOTE: Virtual Disk Copy is an Advanced (Premium) feature. • You cannot create a snapshot of a virtual disk that contains unreadable sectors. • You must satisfy the requirements of your host operating system for creating snapshot virtual disks.
book.book Page 149 Wednesday, May 26, 2010 2:14 PM 6 Enter the snapshot repository virtual disks capacity as a percentage of the source virtual disks capacity and click Next. The Preview window containing the summary of the snapshot virtual disk is displayed. 7 Click Finish. The Completed window is displayed. 8 Click OK. After creating one or more snapshot virtual disks, mount the source virtual disk, and restart the host application using that source virtual disk.
book.book Page 150 Wednesday, May 26, 2010 2:14 PM 150 • Snapshot Virtual Disk Name—A user-specified name that helps you associate the snapshot virtual disk to its corresponding snapshot repository virtual disk and source virtual disk. • Snapshot Repository Virtual Disk Name—A user-specified name that helps you associate the snapshot repository virtual disk to its corresponding snapshot virtual disk and source virtual disk.
book.book Page 151 Wednesday, May 26, 2010 2:14 PM Preparing Host Servers to Create the Snapshot Using the Advanced Path NOTE: Before using the Snapshot Virtual Disks Premium Feature in a Microsoft® Windows® clustered configuration, you must first map the snapshot virtual disk to the cluster node that owns the source virtual disk. This ensures that the cluster nodes correctly recognize the snapshot virtual disk.
book.book Page 152 Wednesday, May 26, 2010 2:14 PM • You must satisfy the requirements of your host operating system for creating snapshot virtual disks. Failure to meet the requirements of your host operating system results in an inaccurate snapshot of the source virtual disk or the target virtual disk in a virtual disk copy.
book.book Page 153 Wednesday, May 26, 2010 2:14 PM If you want to use a snapshot regularly, such as for backups, use the Disable Snapshot and Re-create Snapshot options to reuse the snapshot. Disabling and re-creating snapshots preserves the existing virtual disk-to-host mappings to the snapshot virtual disk.
book.book Page 154 Wednesday, May 26, 2010 2:14 PM 8 In the Snapshot virtual disk parameters area, select the relevant mapping option, you can select: • Automatic • Map later with Storage Partition 9 In the Snapshot repository virtual disk parameters area, enter the system behavior when: • The snapshot repository virtual disk is full to the selected percentage level. • The snapshot repository virtual disk is full. 10 Click Next.
book.book Page 155 Wednesday, May 26, 2010 2:14 PM The default name for the associated snapshot repository virtual disk that is shown in the Snapshot repository virtual disk field is: —R For example, if you are creating the first snapshot virtual disk for a source virtual disk called Accounting, the default snapshot virtual disk is Accounting-1, and the associated snapshot repository virtual disk default name is Accounting-R1.
book.book Page 156 Wednesday, May 26, 2010 2:14 PM Snapshot Repository Capacity If you receive a warning that the capacity for the snapshot repository virtual disk is approaching its threshold, you can increase the capacity of a snapshot repository virtual disk by using one of the following methods: • Use the free capacity available on the disk group of the snapshot repository virtual disk. • Add unconfigured capacity to the disk group of the snapshot repository virtual disk.
book.book Page 157 Wednesday, May 26, 2010 2:14 PM capacity is available, the maximum free space appears in the Increase capacity by. If free capacity does not exist on the disk group, the free space that appears in the Increase capacity by spinner box is 0. You must add physical disks to create free capacity on the disk group.
book.book Page 158 Wednesday, May 26, 2010 2:14 PM NOTE: The physical disks that appear has a capacity that is either the same size or larger than the capacity of the physical disks already being used by the disk group. 9 Select either a single physical disk to add or two physical disks to add. 10 Click Add. The Add Physical Disks window closes. 11 Check the Physical Disks to add [enclosure, slot] area to make sure that the correct physical disks have been added.
book.book Page 159 Wednesday, May 26, 2010 2:14 PM Re-creating Snapshot Virtual Disks You can re-create a snapshot virtual disk that you have previously disabled. CAUTION: Possible loss of data redundancy – If the snapshot virtual disk is in Optimal status, it is first disabled prior to being re-created. This action invalidates the current snapshot.
book.book Page 160 Wednesday, May 26, 2010 2:14 PM NOTE: If you do not intend to re-create the snapshot virtual disk at a later time, in the Logical pane, select the snapshot virtual disk, and select Virtual DiskDelete to remove it. The associated snapshot repository virtual disk is also removed. Refer to the PowerVault Modular Disk Storage Manager online help topics for more information on removing a snapshot virtual disk.
book.book Page 161 Wednesday, May 26, 2010 2:14 PM 3 Click the Summary tab, then click Disk Groups & Virtual Disks to ensure that the snapshot virtual disk is in Optimal or Disabled status. 4 Remove the drive letter(s) of the source and (if mounted) snapshot virtual disk in Windows or unmount the virtual drive(s) in Linux to help guarantee a stable copy of the drive for the Snapshot.
book.
book.book Page 163 Wednesday, May 26, 2010 2:14 PM 12 Configuration: Premium Feature— Virtual Disk Copy NOTE: A virtual disk copy overwrites data on the target virtual disk. Before starting a virtual disk copy, ensure that you no longer need the data or back up the data on the target virtual disk. NOTE: If you ordered this feature, you received a Premium Feature Activation card that shipped in the same box as your Dell PowerVault MD storage array.
book.book Page 164 Wednesday, May 26, 2010 2:14 PM • Copying data for improved access—As your storage requirements for a virtual disk change, you can use a virtual disk copy to copy data to a virtual disk in a disk group that uses drives with larger capacity within the same storage array. Copying data for larger access capacity enables you to move data to greater capacity physical disks (for example, 61 GB to 146 GB).
book.book Page 165 Wednesday, May 26, 2010 2:14 PM Virtual Disk Read/Write Permissions After the virtual disk copy is complete, the target virtual disk automatically becomes read-only to the hosts. The target virtual disk rejects read and write requests while the virtual disk copy operation has a status of Pending or In Progress or if the operation fails before completing the copy.
book.book Page 166 Wednesday, May 26, 2010 2:14 PM • A virtual disk can be selected as a target virtual disk for only one virtual disk copy at a time. • A virtual disk copy for any virtual disk cannot be mounted on the same host as the source virtual disk. • Windows does not allow a drive letter to be assigned to a virtual disk copy. • A virtual disk with a Failed status cannot be used as a source virtual disk or target virtual disk.
book.book Page 167 Wednesday, May 26, 2010 2:14 PM • The Create Copy Wizard, which assists in creating a virtual disk copy • The Copy Manager, which monitors virtual disk copies after they have been created Before you Begin A virtual disk copy fails all snapshot virtual disks that are associated with the target virtual disk, if any exist.
book.book Page 168 Wednesday, May 26, 2010 2:14 PM Failed Virtual Disk Copy A virtual disk copy can fail due to these conditions: • A read error from the source virtual disk • A write error to the target virtual disk • A failure in the storage array that affects the source virtual disk or the target virtual disk. When the virtual disk copy fails, a critical event is logged in the Event Log, and a Needs Attention icon appears in the Array Management Window.
book.book Page 169 Wednesday, May 26, 2010 2:14 PM Copy Manager After you create a virtual disk copy by using the Create Copy Wizard, you can monitor the virtual disk copy through the Copy Manager. From the Copy Manager, a virtual disk copy may be re-copied, stopped, or removed. You can also modify the attributes, such as the copy priority and the target virtual disk Read-Only attribute. You can view the status of a virtual disk copy in the Copy Manager.
book.book Page 170 Wednesday, May 26, 2010 2:14 PM 5 In the Select source virtual disk are, select the appropriate virtual disk and click Next. The Select Target Virtual Disk and Copy Priority window is displayed. 6 In the Select target virtual disk area, select the appropriate virtual disk 7 In the Select copy priority area, select the relevant copy priority and click Next. The Preview window displays the summary of your selections. 8 Type yes, and click Finish.
book.book Page 171 Wednesday, May 26, 2010 2:14 PM • Before the virtual disk copy begins • While the virtual disk copy has a status of In Progress • When you re-create a virtual disk copy To set copy priority: 1 In the AMW, select Virtual Disk Copy Copy Manager. The Copy Manager window is displayed. 2 In the table, select one or more copy pairs. 3 Select Change Copy Priority. The Change Copy Priority window is displayed.
book.book Page 172 Wednesday, May 26, 2010 2:14 PM Recopying a Virtual Disk You can recopy a virtual disk when you have stopped a virtual disk copy and you want to start it again or when a virtual disk copy has failed. The Recopy option overwrites existing data on the target virtual disk and makes the target virtual disk read-only to hosts. This option fails all snapshot virtual disks associated with the target virtual disk, if any exist.
book.book Page 173 Wednesday, May 26, 2010 2:14 PM 5 Follow any additional instructions for your operating system. Failure to follow these additional instructions can create unusable virtual disk copies. NOTE: If your operating system requires additional instructions, you can find those instructions in your operating system documentation. Recopying the Virtual Disk You can use the Copy Manager to create a new virtual disk copy for a selected source virtual disk and a target virtual disk.
book.book Page 174 Wednesday, May 26, 2010 2:14 PM NOTE: There are five copy priority rates available: lowest, low, medium, high, and highest. If the copy priority is set at the lowest rate, I/O activity is prioritized, and the virtual disk copy takes longer. If the copy priority is set to the highest priority rate, the virtual disk copy is prioritized, but I/O activity for the storage array might be affected. Removing Copy Pairs You can remove one or more virtual disk copies by using the Copy Manager.
book.book Page 175 Wednesday, May 26, 2010 2:14 PM 13 Configuration: Premium Feature— Upgrading to High-PerformanceTier The High Performance Tier premium feature on an MD3200i Series array increases the performance of the system beyond that of a MD3200i Series array operating at the standard performance level. If this feature is ordered, a Premium Feature Activation card is placed in the box with the storage array.
book.
book.book Page 177 Wednesday, May 26, 2010 2:14 PM 14 Configuration: Device Mapper Multipath for Linux Overview The MD3200i Series storage array uses a Linux operating system software framework, known as Device Mapper (DM), to enable multipath capabilities on Linux Host Servers. The DM multipath functionality is provided by a combination of drivers and utilities. This chapter describes how to use those utilities to complete the process of enabling MD3200i Series storage array on a Linux system.
book.book Page 178 Wednesday, May 26, 2010 2:14 PM Using DM Multipathing Devices NOTE: Using or modifying any nodes other than the multipathing device nodes can result in array or file system problems, including loss of communication with the array and corruption of the file system. Avoid accessing any device other than the multipathing device.
book.book Page 179 Wednesday, May 26, 2010 2:14 PM NOTE: Any arrays configured with MDCU automatically adds to the list of Devices in the PowerVault Modular Disk Storage Manager Enterprise Management Window (EMW). Device Mapper Configuration Steps To complete the DM multipathing configuration and make storage available to the Linux host server: 1 Scan for virtual disks. See "Scan for newly added Virtual Disks" on page 179. 2 Display the multipath device topology.
book.book Page 180 Wednesday, May 26, 2010 2:14 PM Display the multipath device topology using the multipath command The multipath command adds newly scanned and mapped virtual disks to the Device Mapper tables and creates entries for them in the /dev/mapper directory on the host server. These devices are the same as any other block devices in the host. To list all the multipath devices run the following command.
book.book Page 181 Wednesday, May 26, 2010 2:14 PM \_ round-robin 0 [prio=1][enabled] \_ 6:0:0:22 sdcl 69:144 [active][ghost] where: mpathb is the name of the virtual device created by device mapper. It is located in the /dev/mapper directory.
book.book Page 182 Wednesday, May 26, 2010 2:14 PM # ls Below are some examples of the general mapping formats: On RHEL hosts a partition node has the format /dev/mapper/mpathp, where is the alphabetic number for the multipathing device, is the partition number for this device. On SLES 11.x hosts a partition node has the format /dev/mapper/mpath-part, where is letter(s) assigned to the multipathing device and is the partition number. On SLES 10.
book.book Page 183 Wednesday, May 26, 2010 2:14 PM NOTE: To ensure data integrity protection, reboot a Linux host server attached to an MD3200i Series storage array using the procedure given below. Linux Host Server Reboot Best Practices Its is recommended that you follow the procedures shown below when rebooting your Linux host server using Device Mapper multipathing with an MD3200i Series storage array.
book.book Page 184 Wednesday, May 26, 2010 2:14 PM Only multipathing device nodes and partition nodes created using the directions provided above should be mounted or in any way accessed by the host system or its users. Table 14-1.
book.book Page 185 Wednesday, May 26, 2010 2:14 PM • I/O may hang when a Device Mapper device is deleted before the volume is unmounted. • If the scsi_dh_rdac module is not included in initrd, slower device discovery may be seen and the syslog may become populated with buffer I/O error messages. • I/O may hang if the host server or storage array is rebooted while I/O is active. All I/O to the storage array should be stopped before shutting down or rebooting the host server or storage array.
book.book Page 186 Wednesday, May 26, 2010 2:14 PM Question Answer Why does the multipath –ll command output not show any devices? First verify if the devices are discovered or not. The command #cat /proc/scsi/scsi displays all the devices that are already discovered. Then verify the multipath.conf to ensure that it is been updated with proper settings. After this, run multipath. Then run multipath –ll, the new devices should show up. Why is a newly-mapped LUN not Run rescan_dm_devs in any directory.
book.book Page 187 Wednesday, May 26, 2010 2:14 PM 15 Management: Firmware Downloads Downloading RAID Controller and NVSRAM Packages A version number exists for each firmware file. The version number indicates whether the firmware is a major version or a minor version. You can use the Enterprise Management Window (EMW) to download and activate both the major firmware versions and the minor firmware versions.
book.book Page 188 Wednesday, May 26, 2010 2:14 PM Downloading Both RAID Controller and NVSRAM Firmware NOTE: I/O to the array can continue while you are upgrading RAID controller and NVSRAM firmware. NOTE: Dell recommends that the firmware and NVSRAM be upgraded during a maintenance period when the array is not being used for I/O. NOTE: The RAID enclosure must contain at least two disk drives in order to update the firmware on the controller.
book.book Page 189 Wednesday, May 26, 2010 2:14 PM 7 Click Transfer. Keep these guidelines in mind: – If the Transfer button is inactive, ensure that you either select an NVSRAM file or cleared the Transfer NVSRAM file with RAID controller module firmware. – If the file selected is not valid or is not compatible with the current storage array configuration, the File Selection Error dialog appears. Click OK to close it, and choose a compatible firmware or NVSRAM file.
book.book Page 190 Wednesday, May 26, 2010 2:14 PM The Select File dialog appears. 13 Select the file to download. 14 Click OK. 15 If you want to download the NVSRAM file with the RAID controller module firmware, select Download NVSRAM file with firmware in the Select files area. Any attributes of the firmware file appear in the Firmware file information area. The attributes indicate the version of the firmware file. Any attributes of the NVSRAM file appear in the NVSRAM file information area.
book.book Page 191 Wednesday, May 26, 2010 2:14 PM 2 Select Advanced Maintenance Download RAID Controller Module NVSRAM or Select the Support tab, and click Download Firmware. In Select download task, select Download RAID controller module NVSRAM and click OK. An error message appears. Click OK to close it, and select a compatible file. 3 To locate the directory in which the file to download resides, click Select File. 4 Select the file to download in the File selection area, and click OK.
book.book Page 192 Wednesday, May 26, 2010 2:14 PM NOTE: The Details pane shows the details of only one storage array at a time. If you select more than one storage array in the Storage array pane, the details of the storage arrays are not shown in the Details pane. 9 Click NVSRAM in the Download area. NOTE: If you select a storage array that cannot be upgraded, the NVSRAM button is disabled. The Download NVSRAM dialog appears.
book.book Page 193 Wednesday, May 26, 2010 2:14 PM disk called DACstore. DACstore and the physical disk firmware enable easier reconfiguration and migration of the physical disks. The physical disk firmware performs these functions: • The physical disk firmware records the location of the physical disk in an expansion enclosure.
book.book Page 194 Wednesday, May 26, 2010 2:14 PM 3 In the Selected Packages area, click Add. Navigate to the location of the packages and click OK. The selected package is added to the Packages to be transferred area. 4 Click Next. The Download Physical Disk Firmware - Select Physical Disks window is displayed. 5 In the Compatible Physical Disks tab, select the appropriate physical disks or Select all the physical disks. The Confirm Download dialog is displayed. 6 Type yes and click OK.
book.book Page 195 Wednesday, May 26, 2010 2:14 PM CAUTION: Risk of making expansion enclosure EMM unusable – Do not make any configuration changes to the storage array while downloading expansion enclosure EMM firmware. Doing so could cause the firmware download to fail and make the selected expansion enclosure unusable. 1 Perform one of these actions: • In the AMW, select Advanced Maintenance Download EMM Firmware. • Select the Support tab, and click Download Firmware.
book.book Page 196 Wednesday, May 26, 2010 2:14 PM • The download succeeded—The statuses of all the expansion enclosures show Complete. You can close the Download environmental (EMM) Card Firmware dialog by clicking Close. The expansion enclosure EMM cards are now operating with the new firmware. • The download failed—The status of one expansion enclosure shows Failed, and the remainder of the expansion enclosures show Canceled.
book.
book.book Page 198 Wednesday, May 26, 2010 2:14 PM Front Bezel (Optional) Removing the Front Bezel 1 Using the system key, unlock the front bezel (if locked). 2 Lift up the release latch next to the keylock. 3 Rotate the left end of the bezel away from the front panel. 4 Unhook the right end of the bezel and pull the bezel away from the system. Figure 16-1.
book.book Page 199 Wednesday, May 26, 2010 2:14 PM Hard Drives SAFETY: Models AMT, E03J, and E04J Models AMT, E03J, and E04J are intended for installation only in restricted access locations as defined in cl 1.2.7.3 of IEC 60950-1:2005. Depending on your configuration, your array either supports up to 24 2.5-inch SAS hard drives or up to 12 3.5-inch SAS hard drives in internal drive bays. Hard drives are connected to a backplane through hard-drive carriers and can be configured as hot-swappable.
book.book Page 200 Wednesday, May 26, 2010 2:14 PM Figure 16-3. Removing and Installing a 2.5-Inch Hard-Drive Blank 1 1 2 drive blank 2 release tab Installing a Drive Blank 1 If installed, remove the front bezel. See "Removing the Front Bezel" on page 198. 2 Insert the drive blank into the drive bay until the blank is fully seated. 3 Close the handle to lock the blank in place. 4 If applicable, replace the front bezel. See "Installing the Front Bezel" on page 198.
book.book Page 201 Wednesday, May 26, 2010 2:14 PM 2 From the Modular Disk Storage Manager (MDSM) software, prepare the drive for removal. Wait until the hard-drive indicators on the drive carrier signal that the drive can be removed safely. For more information, see your controller documentation for information about hot-swap drive removal. If the drive has been online, the green activity/fault indicator flashes as the drive is powered down.
book.book Page 202 Wednesday, May 26, 2010 2:14 PM Installing a Hard Drive CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 203 Wednesday, May 26, 2010 2:14 PM Figure 16-5. Removing and Installing a Hard Drive Into a 3.
book.book Page 204 Wednesday, May 26, 2010 2:14 PM Figure 16-6. Removing and Installing a Hard Drive Into a 2.
book.book Page 205 Wednesday, May 26, 2010 2:14 PM Installing a Hard Drive Into a Drive Carrier 1 Insert the hard drive into the hard-drive carrier with the connector end of the drive at the back. See Figure 16-5. 2 Align the screw holes on the hard drive with the back set of holes on the hard-drive carrier. When aligned correctly, the back of the hard drive is flush with the back of the hard-drive carrier. 3 Attach the four screws to secure the hard drive to the hard-drive carrier.
book.book Page 206 Wednesday, May 26, 2010 2:14 PM 5 Connect all the power cables to the array. 6 Turn on the array and the host server. Figure 16-7. Removing and Installing a RAID controller module Blank 1 1 release latch 2 2 RAID controller module blank Installing a RAID Controller Module Blank To install a RAID controller module blank, align the blank with the RAID controller module bay and insert the blank into the chassis until it clicks into place.
book.book Page 207 Wednesday, May 26, 2010 2:14 PM Removing a RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 208 Wednesday, May 26, 2010 2:14 PM Installing a RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 209 Wednesday, May 26, 2010 2:14 PM Figure 16-9. Opening and Closing the RAID Controller Module 1 1 screws (2) 3 indent 2 3 2 RAID controller module Closing the RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team.
book.book Page 210 Wednesday, May 26, 2010 2:14 PM RAID Controller Module Backup Battery Unit Removing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty.
book.book Page 211 Wednesday, May 26, 2010 2:14 PM 1 backup battery unit 2 screw Installing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty.
book.book Page 212 Wednesday, May 26, 2010 2:14 PM support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product. NOTE: If you remove a fully functioning power supply/cooling fan module, the fan speed in the remaining module increases significantly to provide adequate cooling. The fan speed decreases gradually when a new power supply/cooling fan module is installed.
book.book Page 213 Wednesday, May 26, 2010 2:14 PM Figure 16-11.
book.book Page 214 Wednesday, May 26, 2010 2:14 PM Installing a Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 215 Wednesday, May 26, 2010 2:14 PM Control Panel Removing the Control Panel 1 Turn off the array and host server. 2 Disconnect all the power cables connected to the array. 3 Remove the hard drives from: – slots 0 to 2 in PowerVault MD3200i – slots 0 to 5 in PowerVault MD3220i See "Removing a Hard Drive" on page 200. NOTE: Mark each hard drive with it’s slot position as you remove it.
book.book Page 216 Wednesday, May 26, 2010 2:14 PM Figure 16-14. Removing and Installing the Control Panel—PowerVault MD3220i 2 1 1 control panel 2 release pin Installing the Control Panel 1 Align the control panel with the slot on the array. 2 Slide the control panel into the array until: – The release tab clicks into place in PowerVault MD3200i. See Figure 16-13. – The release pin clicks into place in PowerVault MD3220i. See Figure 16-14. 3 Replace the hard drives in their respective slots.
book.book Page 217 Wednesday, May 26, 2010 2:14 PM Backplane WARNING: Whenever you need to lift the array, get others to assist you. To avoid injury, do not attempt to lift the array by yourself. CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team.
book.book Page 218 Wednesday, May 26, 2010 2:14 PM Figure 16-15.
book.book Page 219 Wednesday, May 26, 2010 2:14 PM Figure 16-16. Removing and Installing the Backplane—PowerVault MD3200i 1 2 3 1 screws (5) 3 captive screw 2 backplane Figure 16-17.
book.book Page 220 Wednesday, May 26, 2010 2:14 PM Installing the Backplane 1 Align the holes on the backplane with the holes on the array. 2 Tighten the captive screw to secure the backplane to the chassis. See Figure 16-16 for PowerVault MD3200i or Figure 16-17 for PowerVault MD3220i. 3 Replace the screws that secure the backplane to the chassis. See Figure 16-16 for PowerVault MD3200i or Figure 16-17 for PowerVault MD3220i.
book.book Page 221 Wednesday, May 26, 2010 2:14 PM 17 Management: Firmware Inventory A storage array is made up of many components, which might include RAID controller modules, physical disks, and enclosure management modules (EMMs). Each of these components contains firmware. Some versions of firmware are dependent on other versions of firmware. To capture information about all of the firmware versions in the storage array, view the firmware inventory.
book.
book.book Page 223 Wednesday, May 26, 2010 2:14 PM 18 Management: System Interfaces Microsoft Services Virtual Disk Service The Microsoft® Virtual Disk Service (VDS) is a component of the Windows® operating system. The VDS component utilizes third-part vendor specific software modules, known as providers, to access and configure third-party storage resources, such as MD3200i storage arrays.
book.book Page 224 Wednesday, May 26, 2010 2:14 PM VSS attaches to the service and uses it to coordinate the creation of snapshot virtual disks on the storage array. VSS-initiated snapshot virtual disks can be triggered through backup tools, known as requestors.
book.book Page 225 Wednesday, May 26, 2010 2:14 PM 19 Troubleshooting: Your Storage Array Software Start-Up Routine Look and listen during the array’s start-up routine for the indications described in Table 19-1. For a description of the front- and back-panel indicators, see "Planning: About Your Storage Array" on page 23. Table 19-1. Start-Up Routine Indications Look/listen for Action Alert messages. See your storage management documentation.
book.book Page 226 Wednesday, May 26, 2010 2:14 PM • On the Devices tab, in either the Tree view or the Table view, double-click a storage array. Alternatively, you can right-click a storage array and select Manage Storage Array from the pop-up menu. • On the Setup tab, select Manage a Storage Array. After the AMW opens, select the Physical tab to see the components in the storage array. A component that has a problem is indicated by a status icon.
book.book Page 227 Wednesday, May 26, 2010 2:14 PM Hardware status can be Optimal, Needs Attention, or Fixing. If, however, all of the network management connections from the storage management station to the storage array shown in the Tree view are Unresponsive, the storage array status is represented as Unresponsive.
book.book Page 228 Wednesday, May 26, 2010 2:14 PM Table 19-3. Additional Status Icons Status Icon Description Unsupported Alerts with a Needs Upgrade Status Setting an alert on a s storage array with a Needs Upgrade status is not supported. In this case, the storage array shows both a Needs Upgrade status and an Unsupported Alerts icon in the Tree view. The Unsupported Alerts icon indicates that the storage array cannot be monitored.
book.book Page 229 Wednesday, May 26, 2010 2:14 PM NOTE: MDSM may take a few minutes to update a status change to Unresponsive or from Unresponsive. A status change from or to Unresponsive depends on the network link to the storage array. All other status change updates faster. Storage Array Support Data You can gather various types of inventory, status, and performance data that can help troubleshoot any problem with the storage array.
book.book Page 230 Wednesday, May 26, 2010 2:14 PM WARNING: Use this option only under the guidance of your Technical Support representative. To automatically collect the support bundle data: 1 In the AMW, select Advanced Troubleshooting Support Data Automatic Settings. 2 Select Automatically collect support data for critical events. 3 To change the location of the saved support bundle, click Change. The Change Folder Location window is displayed, navigate to the relevant folder and click OK.
book.book Page 231 Wednesday, May 26, 2010 2:14 PM The physical disk data collection is completed and saved at the location that you entered. 4 Click OK. Event Log You can use the Event Log Viewer to view a detailed list of events that occur in a storage array. The event log is stored on reserved areas on the storage array disks. It records configuration events and storage array component failures. WARNING: Use this option only under the guidance of your Technical Support representative.
book.book Page 232 Wednesday, May 26, 2010 2:14 PM Recovery Guru The Recovery Guru is a component of MDSM that diagnoses critical events on the storage array and recommends step-by-step recovery procedures for problem resolution. In the AMW, to display the Recovery Guru, perform one of these actions: • Click Recovery Guru • In the Support tab, click the Recover from Failure link. • From the Status pane on the Summary tab, click the Storage Array Needs Attention link. .
book.book Page 233 Wednesday, May 26, 2010 2:14 PM • View detailed information – Go to step 3. • Search the storage array profile – Go to step 4. • Save the storage array profile – Go to step 5. • Close the storage array profile – Go to step 6. 3 Select one of the tabs, and use the horizontal scroll bar and the vertical scroll bar to view the storage array profile information.
book.book Page 234 Wednesday, May 26, 2010 2:14 PM For more information, see the PowerVault Modular Disk Storage Manager online help topics. Viewing the Logical Associations You can use the Associated Logical Elements option to view the logical associations among different virtual disks in a storage array. To view the associations for source virtual disks, snapshot virtual disks, and snapshot repository virtual disks: 1 In the AMW, select the Logical tab or in the Topology pane of the Mappings tab.
book.book Page 235 Wednesday, May 26, 2010 2:14 PM The View Associated Physical Components dialog appears with blue dots next to the physical components that are associated with the selected node. 3 To close the View Associated Physical Components dialog, click Close. Finding Nodes You can use the Find option to search for a particular node on the Logical tab, the Physical tab, or the Mappings tab of the Array Management Window.
book.book Page 236 Wednesday, May 26, 2010 2:14 PM 6 To search for all nodes based on their virtual disk capacity, perform these steps: a Select Find all virtual disks with capacity. b Type the capacity in the GB box. c Specify that the capacity to be matched is less than, equal to, or greater than the capacity entered in the GB box. d Go to step 8.
book.book Page 237 Wednesday, May 26, 2010 2:14 PM 1 On the Logical tab of the AMW, select one of these virtual disks, and go to the indicated step: • Snapshot virtual disk—Go to step 2. • Snapshot repository virtual disk—Go to step 3. • Source virtual disk—Go to step 4. • Target virtual disk—Go to step 5. 2 Select View Go To Snapshot Virtual Disk. The selection jumps to the associated snapshot virtual disk in the Logical pane. 3 Select View Go To Snapshot Repository Virtual Disk.
book.book Page 238 Wednesday, May 26, 2010 2:14 PM 2 If any storage arrays are unresponsive, check the storage management station network connection to make sure that it can reach the network. 3 Ensure that the RAID controller modules are installed and that there is power to the storage array. 4 If there a problem with the storage array, correct the problem. 5 Perform one of these actions, depending on how your storage array is managed: • Out-of-band managed storage array—Go to step 6.
book.book Page 239 Wednesday, May 26, 2010 2:14 PM 14 Remove the host with the Unresponsive status from the EMW, and select Add Storage Array to add the host again. 15 If the host does not return to Optimal status, go to step 16. 16 Ensure that the host is turned on and operational and that the host adapters have been installed. 17 Check all external cables and switches or hubs to make sure that no visible damage exists and that they are securely connected.
book.book Page 240 Wednesday, May 26, 2010 2:14 PM (TCP/IP) connections that can be made to the RAID controller module before it stops responding to subsequent connection attempts. The type of management operations being performed and the number of management sessions taking place together determine the number of TCP/IP connections made to a RAID controller module.
book.book Page 241 Wednesday, May 26, 2010 2:14 PM Locating an Expansion Enclosure You can use the Blink option to physically locate and identify an expansion enclosure in the storage array. The LED activation varies according to the type of expansion enclosure that you have. • If you have an expansion enclosure with a white LED, the Blink Expansion Enclosure operation causes the white LED on the expansion enclosure to come on. The LED does not blink.
book.book Page 242 Wednesday, May 26, 2010 2:14 PM Capturing the State Information Use the Troubleshooting Capture State Information option to capture information about the current state of your storage array and save the captured information to a text file. You can then send the captured information to your Technical Support representative for analysis.
book.book Page 243 Wednesday, May 26, 2010 2:14 PM SMrepassist Utility SMrepassist (replication assistance) is a host-based utility for Windows platforms. This utility is installed with MDSM. Use this utility before and after you create a virtual disk copy on a Windows operating system to ensure that all the memory-resident data for file systems on the target virtual disk is flushed and that the driver recognizes signatures and file system partitions.
book.book Page 244 Wednesday, May 26, 2010 2:14 PM Unidentified Devices An unidentified node or device occurs when MDSM cannot access a new storage array. Causes for this error include network connection problems, the storage array is turned off, or the storage array does not exist. NOTE: Before beginning any recovery procedure, make sure that the host context agent software is installed and running.
book.book Page 245 Wednesday, May 26, 2010 2:14 PM ping . If the network can access the host, continue to step c. If the network cannot access the host, skip to step d. c Remove the host with the unresponsive status from the MDSM, and add that host again. If the host returns to optimal status, you have completed this procedure. d Make sure that the power to the host is turned on and that the host is operational.
book.book Page 246 Wednesday, May 26, 2010 2:14 PM 5 Make sure that the controller firmware is compatible with MDSM on your management station. If the controller firmware was upgraded, the MDSM might not have access to the storage array. A new version of MDSM might be needed to manage the storage array with the new version of the controller firmware. If this problem exists, see the Dell support website at support.dell.com. 6 Look to see if there is too much network traffic to one or more controllers.
book.book Page 247 Wednesday, May 26, 2010 2:14 PM or Click Start Administrative Tools Services. 2 In the Services dialog, select Modular Disk Storage Manager Agent. 3 If the modular disk storage manager agent is running, click Action Stop, then wait approximately 5 seconds. 4 Click Action Start. Linux To start or restart the host context agent software in Linux, enter the following command at the prompt: SMagent start The SMagent software might take a little time to initialize.
book.
book.book Page 249 Wednesday, May 26, 2010 2:14 PM Troubleshooting: Your Array 20 Safety First—For you and Your Array CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty.
book.book Page 250 Wednesday, May 26, 2010 2:14 PM Troubleshooting Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 251 Wednesday, May 26, 2010 2:14 PM Troubleshooting Array Cooling Problems CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 252 Wednesday, May 26, 2010 2:14 PM c Reseat the EMM module and wait for 30 seconds. See Removing an EMM in the MD1200 and MD1220 Storage Enclosures Hardware Owner's Manual. d Turn on the server. e Check the EMM status LED. f If the LED does not turn Green, replace the EMM. If the problem is not resolved, see "Getting Help" on page 259. • If EMM status LED is blinking amber (5 times per sequence), update the firmware to the latest supported firmware on both the EMMs.
book.book Page 253 Wednesday, May 26, 2010 2:14 PM Troubleshooting RAID Controller Modules CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 254 Wednesday, May 26, 2010 2:14 PM e Check the link status LED. If the link status LED is not green, replace the cables. If the problem is not resolved, see "Getting Help" on page 259. Troubleshooting Hard Drives CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team.
book.book Page 255 Wednesday, May 26, 2010 2:14 PM Troubleshooting Array and Expansion Enclosure Connections 1 Verify that the RAID controller module port link status LED and the RAID controller module status LED are solid green for each port that is connected to a cable. If the LEDs are not solid green, see "Planning: RAID Controller Modules" on page 31. 2 Ensure that all the cables are attached correctly according to expansion enclosure mode you selected.
book.book Page 256 Wednesday, May 26, 2010 2:14 PM • Hard drives • RAID controller modules • Power supply/cooling fan modules • Control panel • Backplane 3 Let the system dry thoroughly for at least 24 hours. 4 Reinstall the components you removed in step 2. 5 Connect all the cables and turn on the array. If the array does not start properly, see "Getting Help" on page 259. Troubleshooting a Damaged Array CAUTION: Many repairs may only be done by a certified service technician.
book.book Page 257 Wednesday, May 26, 2010 2:14 PM Troubleshooting RAID Controller Modules Conditions Certain events can cause a RAID controller module to fail and/or shut down. Unrecoverable ECC memory or PCI errors, or critical physical conditions can cause lockdown. If your RAID storage array is configured for redundant access and cache mirroring, the surviving controller can normally recover without data loss or shutdown. Typical hard controller failures are detailed in the following sections.
book.book Page 258 Wednesday, May 26, 2010 2:14 PM PCI Errors The storage array firmware can detect and only recover from PCI errors when the RAID controller modules are configured for redundancy. If a virtual disk uses cache mirroring, it fails over to its peer RAID controller module, which initiates a flush of the dirty cache.
book.book Page 259 Wednesday, May 26, 2010 2:14 PM Getting Help 21 Contacting Dell For customers in the United States, call 800-WWW-DELL (800-999-3355). NOTE: If you do not have an active Internet connection, you can find contact information on your purchase invoice, packing slip, bill, or Dell product catalog. Dell provides several online and telephone-based support and service options. Availability varies by country and product, and some services may not be available in your area.
book.
book.
book.
book.
book.
book.
book.
book.
book.