book.
book.book Page 2 Thursday, December 9, 2010 3:20 PM Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. ____________________ Information in this publication is subject to change without notice. © 2010 Dell Inc. All rights reserved.
book.book Page 3 Thursday, December 9, 2010 3:20 PM Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . About This Document . . . . . . . . . . . . . . . . . . Inside the Box of the Dell PowerVault MD3600i Series Storage Array. . . . . . . . . . . . . . . 19 . . . . 19 . . . . . . . . . . 20 Dell PowerVault Modular Disk Storage Manager . . . . . . . . . . . . . . . 20 Dell PowerVault Modular Disk Configuration Utility . . . . . . . . . . . . . .
book.book Page 4 Thursday, December 9, 2010 3:20 PM 3 Planning: RAID Controller Modules . RAID Controller Modules . . . . . . . . . . . . . . . . . . . 32 . . . . 34 . . . . . . . . . . . . . . . . 34 RAID Controller Module—Additional Features . Storage Array Thermal Shutdown System Password Reset . . . . . . . . . 34 . . . . . . . . . . . . . . 35 . . . . . . . . . . . . . 35 . . . . . . . . . . . . . . . . . . 35 Cache Functions and Features . Cache Mirroring. Write-Back Cache . . . .
book.book Page 5 Thursday, December 9, 2010 3:20 PM Cycle Time . . . . . . . . . . . . . . . . . . . . . Virtual Disk Operations Limit Disk Group Operations. 44 . . . . . . . . . . . . 45 . . . . . . . . . . . . . . . . . 45 RAID Level Migration . . . . . . . . . . . . . . . . Segment Size Migration . . . . . . . . . . . . . . Virtual Disk Capacity Expansion Disk Group Expansion 45 46 . . . . . . . . . . 46 . . . . . . . . . . . . . . . 46 . . . . . . . . . . . 47 . . . . . . . . . . .
book.book Page 6 Thursday, December 9, 2010 3:20 PM 5 Configuration: Overview User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Array Management Window . . . . . . . . . . . . 63 Configuration: About Your Storage Array . . . . . . . . . . . . . . . . . . . . . 65 Out-of-Band and In-Band Management . Storage Arrays . . . . . . . . 65 . . . . . . . . . . . . . . . . . . . . . . 66 Adding Storage Arrays . . . . . . . . . . . . . . .
book.book Page 7 Thursday, December 9, 2010 3:20 PM Setting the Storage Array RAID Controller Module Clocks . . . . . . . . . . . . . . . 7 Configuration: Using iSCSI . . . . 82 . . . . . . . . . . . 83 Changing the iSCSI Target Authentication . . . . . . . . . . . . 84 . . . . . . . . . . . . . . . . . 84 Entering Mutual Authentication Permissions . Creating CHAP Secrets . . . . . . . . . . . . . . . 85 . . . . . . . . . . . . . . . . 85 Initiator CHAP Secret .
book.book Page 8 Thursday, December 9, 2010 3:20 PM 9 Configuration: About Your Host . . . . . . . Configuring Host Access. . . . . . . . . . . . . . . . . 95 Using the Mappings Tab . . . . . . . . . . . . . . . . . 96 . . . . . . . . . . . . . . . . . . . 97 Defining a Host Removing Host Access. . . . . . . . . . . . . . . . . . 98 Managing Host Groups. . . . . . . . . . . . . . . . . . 99 Creating a Host Group . . . . . . . . . . . . . . . Moving a Host to a Different Host Group .
book.book Page 9 Thursday, December 9, 2010 3:20 PM Choosing an Appropriate Physical Disk Type . . . . . . 117 Physical Disk Security with Self Encrypting Disk . . . . . . . . . . . . . . . . . . . 117 Creating a Security Key. . . . . . . . . . . . . . . 120 Changing a Security Key . . . . . . . . . . . . . . 122 Saving a Security Key . . . . . . . . . . . . . . . 124 Validate Security Key . . . . . . . . . . . . . . . . 125 Unlocking Secure Physical Disks. Erasing Secure Physical Disks .
book.book Page 10 Thursday, December 9, 2010 3:20 PM Disk Group and Virtual Disk Expansion . . . . . . . . 143 Disk Group Expansion . . . . . . . . . . . . . . . 143 Virtual Disk Expansion . . . . . . . . . . . . . . 144 . . . . . . . . . . . . . . . 144 Using Free Capacity. Using Unconfigured Capacity . Disk Group Migration . . . . . . . . . . 144 . . . . . . . . . . . . . . . . . 145 Export Disk Group . . . . . . . . . . . . . . . . . Exporting a Disk Group Import Disk Group 145 . .
book.book Page 11 Thursday, December 9, 2010 3:20 PM Snapshot Repository Capacity. . . . . . . . . . . 166 . . . . . . . . . . . 166 Re-Creating Snapshot Virtual Disks . Disabling a Snapshot Virtual Disk. Preparing Host Servers to Re-Create a Snapshot Virtual Disk . . . . . . . . . . Re-Creating a Snapshot Virtual Disk . . . . . . 167 . . . . . . . . . . 168 12 Configuration: Premium Feature— Virtual Disk Copy . . . . . . . . . . . . . . Creating a Virtual Disk Copy for an MSCS Shared Disk . . .
book.book Page 12 Thursday, December 9, 2010 3:20 PM Stopping a Virtual Disk Copy Recopying a Virtual Disk . . . . . . . . . . . . . . 178 . . . . . . . . . . . . . . . 179 Preparing Host Servers to Recopy a Virtual Disk. . . . . . . . . . . . . . Recopying the Virtual Disk Removing Copy Pairs. . . . . . . . . . . . . 180 . . . . . . . . . . . . . . . . . 181 13 Configuration: Premium Feature— Upgrading to High-Performance-Tier . . . . . . . . . . . . . 183 . . . . . . . 185 . . . . . . .
book.book Page 13 Thursday, December 9, 2010 3:20 PM Downloading Both RAID Controller and NVSRAM Firmware . . . . . . . Downloading Only NVSRAM Firmware . . . . . . . . . 201 . . . . . . . . . 203 . . . . . . . . . . 205 . . . . . . . . . . . . 206 Downloading Physical Disk Firmware Downloading MD1200 Series Expansion Module EMM Firmware . Self-Monitoring Analysis and Reporting Technology (SMART) . Media Errors and Unreadable Sectors 16 Management: Installing Array Components . . . . 198 . .
book.book Page 14 Thursday, December 9, 2010 3:20 PM Installing a RAID Controller Module . . . . . . . Opening the RAID Controller Module . Closing the RAID Controller Module . . . . . . 220 . . . . . . . 221 . . . . 222 Removing the RAID Controller Module Backup Battery Unit . . . . . . . . . . . 222 Installing the RAID Controller Module Backup Battery Unit . . . . . . . . . . . 223 Power Supply/Cooling Fan Module . . . . . . . . . . 224 Removing a Power Supply/Cooling Fan Module. . . .
book.book Page 15 Thursday, December 9, 2010 3:20 PM 19 Troubleshooting: Your Storage Array Software Start-Up Routine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Device Health Conditions . . . . . . . . . . . . . . . . Storage Array Support Data . . . . . . . . . . . . . . . Automatically Collect the Support Bundle Data Retrieving Trace Buffers . 237 237 241 . . . . 241 . . . . . . . . . . . . . . . . 242 . . . . . . . . . . . . . 244 . . . . . . . . . . . . . . . . . .
book.book Page 16 Thursday, December 9, 2010 3:20 PM Recovering From an Unidentified Storage Array Starting or Restarting the Host Context Agent Software . . . 258 . . . . . . . . . . . . . 261 20 Troubleshooting: Your Array . . . . . . . . . 263 Safety First—For you and Your Array . . . . . . . . . 263 . . . 263 . . . . . . . 263 . . . . . . . . 263 . . . . . . . . . . . . . . 264 Troubleshooting Storage Array Startup Failure .
book.book Page 17 Thursday, December 9, 2010 3:20 PM Critical Conditions Noncritical Conditions 21 Getting Help . Index 272 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Contacting Dell 272 . . . . . . . . . . . . . . . . . 273 273 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
book.
book.book Page 19 Thursday, December 9, 2010 3:20 PM 1 Introduction WARNING: See the Safety, Environmental, and Regulatory Information document for important safety information before following any procedures listed in this document. About This Document This document familiarizes you with the functions of the Dell PowerVault MD3600i Series storage array. The document is organized according to the tasks that you must complete after receiving your MD3600i Series storage array.
book.
book.book Page 21 Thursday, December 9, 2010 3:20 PM Other Information You May Need WARNING: See the safety and regulatory information that shipped with your system. Warranty information may be included within this document or as a separate document. NOTE: All the documents, unless specified otherwise, are available at support.dell.com/manuals. • Getting Started Guide provides an overview of setting up and cabling your storage array.
book.
book.book Page 23 Thursday, December 9, 2010 3:20 PM 2 Planning: About Your Storage Array Overview The Dell PowerVault MD3600i Series storage array is designed for high availability, offering redundant access to data storage. It supports single and dual RAID controller configuration. The MD3600i Series storage array provides 1 GBase-T or 10 GBase-T connectivity to the host server and enables access to 64 physical hosts.
book.book Page 24 Thursday, December 9, 2010 3:20 PM Hardware Features Front-Panel Features and Indicators Figure 2-1. Front-Panel Features and Indicators—Dell PowerVault MD3600i 1 2 3 4 5 6 Figure 2-2.
book.book Page 25 Thursday, December 9, 2010 3:20 PM Figure 2-3. Front-Bezel Features and Indicators 1 2 3 Item Indicator, Button, or Connector 1 Enclosure status LED Icon Description The enclosure status LED lights when the enclosure power is on. Lights blue during normal operation. Blinks blue when a host server is identifying the enclosure or when the system identification button is pressed. Lights amber as enclosure boots or is reset.
book.book Page 26 Thursday, December 9, 2010 3:20 PM Item Indicator, Button, or Connector Icon Description 3 Split mode LED This LED should be unlit as the split mode function is not supported by the MD3600i Series storage arrays. 4 System identification button The system identification button on the front control panel can be used to locate a particular enclosure within a rack.
book.book Page 27 Thursday, December 9, 2010 3:20 PM Back-Panel Features and Indicators Figure 2-4.
book.book Page 28 Thursday, December 9, 2010 3:20 PM Hard-Drive Indicator Patterns Figure 2-5.
book.book Page 29 Thursday, December 9, 2010 3:20 PM Hard-Drive Status Indicator Pattern Condition Off The physical disk: • is not yet discovered by the host server • has been spun down for removal • is not supported for the RAID controller module or is not in the physical disk slot NOTE: The drive status indicator remains off until all hard drives are initialized after system power is turned on. Drives are not ready for insertion or removal during this time.
book.book Page 30 Thursday, December 9, 2010 3:20 PM Power Indicator Codes Figure 2-6. Power Indicator Codes 1 2 3 4 5 Item LED Type 1 DC power Icon Description The LED lights green when the DC output voltage is within the limit. If this LED is off, it indicates that the DC output voltage is not within the limit. 2 Power supply/cooling fan fault The LED lights amber when the DC output voltage is not within the limit or a fault with the fan is detected.
book.book Page 31 Thursday, December 9, 2010 3:20 PM 3 Planning: RAID Controller Modules RAID Controller Modules The RAID controller modules provide high-performance, advanced virtual disk configuration, and fault-tolerant disk subsystem management. Each RAID controller module contains 2 GB of cache that is mirrored with the other controller's cache for high availability and is protected by a batterypowered cache offload mechanism.
book.book Page 32 Thursday, December 9, 2010 3:20 PM RAID Controller Module Connectors and Features Figure 3-1. MD3600i Series iSCSI RAID Controller Module 1 6 3 2 7 8 9 10 11 12 13 14 4 15 16 5 17 Item Component Function 1 SAS OUT port Provides SAS connection for cabling to an expansion enclosure. 2 iSCSI IN port 0 Provides host-to-controller iSCSI 1/10 Gbps Ethernet connection. 3 iSCSI IN port 1 Provides host-to-controller iSCSI 1/10 Gbps Ethernet connection.
book.book Page 33 Thursday, December 9, 2010 3:20 PM Item Component Function 8 Controller power LED Lights green when controller is turned on. Off when controller is not turned on. 9 Controller fault LED Lights amber when controller fault detected. Off when controller operating normally. 10 iSCSI IN port activity Lights green when there is no activity on connection. LED Blinks green when there is activity on connection. Off when link is down.
book.book Page 34 Thursday, December 9, 2010 3:20 PM RAID Controller Module—Additional Features Battery Backup Unit Each RAID controller contains a two-cell lithium ion nanopolymer battery backup unit (BBU). It provides power to the RAID controller module in the event of a power outage. For information on removing and installing the BBU, see "RAID Controller Module Backup Battery Unit" on page 222.
book.book Page 35 Thursday, December 9, 2010 3:20 PM System Password Reset To reset a forgotten password, push and hold down the password reset switch for at least 5 seconds. The password is deleted. See Figure 3-1 to locate the password reset switch. The RAID controller module allows you to change the password. For more information about setting your password, see "Setting a Password" on page 71. NOTE: The reset switch can be accessed by using a small object, such as the tip of a pen.
book.book Page 36 Thursday, December 9, 2010 3:20 PM Write-Through Cache In write-through cache, data is written to the physical disk before completion status is returned to the host operating system. Write-through cache is considered more robust than write-back cache, since a power failure is less likely to cause loss of data. The RAID controller automatically switches to write-through if either cache mirroring is disabled or the battery is missing or there is a fault condition.
book.book Page 37 Thursday, December 9, 2010 3:20 PM 4 Planning: MD3600i Series Storage Array Terms and Concepts This chapter describes the storage array concepts, which help in configuring and operating the Dell PowerVault MD3600i Series storage arrays. Physical Disks, Virtual Disks, and Disk Groups Physical disks in your storage array provide the physical storage capacity for your data.
book.book Page 38 Thursday, December 9, 2010 3:20 PM Physical Disks Only Dell supported 6.0-Gbps SAS physical disks are supported in the storage array. If the storage array detects unsupported physical disks, it marks the disk as unsupported and the physical disk becomes unavailable for all operations. NOTE: The MD3600i storage enclosure must contain at least two physical disks for proper operation. This is necessary because the physical disks are used to store configuration information.
book.book Page 39 Thursday, December 9, 2010 3:20 PM Table 4-1. RAID Controller Physical Disk States (continued) Status Mode Description Physical Disk Status LED Pending Failure Assigned, Unassigned, Hot Spare in use, or Hot Spare Standby A Self-Monitoring Analysis and Reporting Technology (SMART) error has been detected on the physical disk in the indicated slot.
book.book Page 40 Thursday, December 9, 2010 3:20 PM 3 Provide host server access. 4 Create mappings to associate the virtual disks with the host servers. NOTE: Host server access must be created before mapping virtual disks. Disk groups are always created in the unconfigured capacity of a storage array. Unconfigured capacity is the available physical disk space not already assigned in the storage array. Virtual disks are created within the free capacity of a disk group.
book.book Page 41 Thursday, December 9, 2010 3:20 PM RAID Levels RAID levels determine the way in which data is written to physical disks. Different RAID levels provide different levels of accessibility, redundancy, and capacity. Using multiple physical disks has the following advantages over using a single physical disk: • Placing data on multiple physical disks (striping) allows input/output (I/O) operations to occur simultaneously and improve performance.
book.book Page 42 Thursday, December 9, 2010 3:20 PM I/O performance is greatly improved by spreading the I/O load across many physical disks. Although it offers the best performance of any RAID level, RAID 0 lacks data redundancy. Choose this option only for non-critical data, because failure of one physical disk results in the loss of all data. Examples of RAID 0 applications include video editing, image editing, prepress applications, or any application that requires high bandwidth.
book.book Page 43 Thursday, December 9, 2010 3:20 PM actual storage. RAID 10 is automatically used when a RAID level of 1 is chosen with four or more physical disks. RAID 10 works well for mediumsized databases or any environment that requires high performance and fault tolerance and moderate-to-medium capacity. Segment Size Disk striping enables data to be written across multiple physical disks. Disk striping enhances performance because striped disks are accessed simultaneously.
book.book Page 44 Thursday, December 9, 2010 3:20 PM Foreground Initialization The storage array supports foreground initialization for virtual disks. All access to the virtual disk is blocked during foreground initialization. During foreground initialization, zeros (0x00) are written to every sector of the virtual disk. The virtual disk is available after foreground initialization is completed.
book.book Page 45 Thursday, December 9, 2010 3:20 PM The storage array tracks the cycle for each disk group independent of other disk groups on the controller and creates a checkpoint. If the media verification operation on a disk group is preempted or blocked by another operation on the disk group, the storage array resumes after the current cycle.
book.book Page 46 Thursday, December 9, 2010 3:20 PM Segment Size Migration Segment size refers to the amount of data (in kilobytes) that the storage array writes on a physical disk in a virtual disk before writing data on the next physical disk. Valid values for the segment size are 8, 16, 32, 64, 128, 256, and 512 KBs. Dynamic segment size migration enables the segment size of a given virtual disk to be changed.
book.book Page 47 Thursday, December 9, 2010 3:20 PM Disk Group Defragmentation Defragmenting consolidates the free capacity in the disk group into one contiguous area. Defragmentation does not change the way in which the data is stored on the virtual disks. Disk Group Operations Limit The maximum number of active, concurrent disk group processes per installed RAID controller module is one.
book.book Page 48 Thursday, December 9, 2010 3:20 PM • Segment size migration • Disk group expansion • Disk group defragmentation. The priority of each of these operations can be changed to address performance requirements of the environment in which the operations are to be executed. NOTE: Setting a high priority level impacts storage array performance. It is not advisable to set priority levels at the maximum level.
book.book Page 49 Thursday, December 9, 2010 3:20 PM array, the MD3600i array does not recognize the migrating metadata and that data is lost. In this case, MD3600i initializes the physical disks and marks them as unconfigured capacity. NOTE: Only disk groups and associated virtual disks with all member physical disks present can be migrated from one storage array to another. It is recommended that you only migrate disk groups that have all their associated member virtual disks in an optimal state.
book.book Page 50 Thursday, December 9, 2010 3:20 PM • Migrating virtual disks to a storage array with no existing physical disks— Turn off the destination storage array, when migrating disk groups or a complete set of physical disks from a storage array to another storage array that has no existing physical disks. After the destination storage array has been turned on and has successfully recognized the newly migrated physical disks, migration operations can continue.
book.book Page 51 Thursday, December 9, 2010 3:20 PM • A unique LUN must be used by a host group or host server to access a virtual disk. • Not every operating system has the same number of LUNs available for use. Host Types A host server is a server that accesses a storage array. Host servers are mapped to the virtual disks and use one or more iSCSI initiator ports. Host servers have the following attributes: • Host name—A name that uniquely identifies the host server.
book.book Page 52 Thursday, December 9, 2010 3:20 PM Snapshot Virtual Disks A snapshot is a point-in-time image of a virtual disk. The snapshot provides an image of the virtual disk at the time the snapshot was created. You create a snapshot so that an application (for example, a backup application) can access the snapshot and read the data while the source virtual disk remains online and user-accessible. When the backup is completed, the snapshot virtual disk is no longer needed.
book.book Page 53 Thursday, December 9, 2010 3:20 PM For details on mapping the snapshot virtual disk to the secondary node, refer to the Dell PowerVault MD3600i and MD3620i Storage Arrays With Microsoft Windows Server Failover Clusters on support.dell.com/manuals.
book.book Page 54 Thursday, December 9, 2010 3:20 PM Virtual Disk Recovery You can use the Edit host server-to-virtual disk mappings feature to recover data from the backup virtual disk. This functionality enables you to unmap the original source virtual disk from its host server, then map the backup virtual disk to the same host server. Ensure that you record the LUN used to provide access to the source virtual disk.
book.book Page 55 Thursday, December 9, 2010 3:20 PM The multi-path software identifies the existence of multiple paths to a virtual disk and establishes a preferred path to that disk. If any component in the preferred path fails, the multi-path software automatically re-routes I/O requests to the alternate path so that the storage array continues to operate without interruption. NOTE: Multi-path software is available on the MD3600i Series resource media.
book.book Page 56 Thursday, December 9, 2010 3:20 PM Ownership can later be modified to balance workload according to actual usage. If virtual disk ownership is not manually balanced, it is possible for one controller to have the majority of the work, while the other controller is idle. Limit the number of virtual disks in a disk group. If multiple virtual disks are in a disk group, consider: • The impact each virtual disk has on other virtual disks in the same disk group.
book.book Page 57 Thursday, December 9, 2010 3:20 PM • Least path weight with subset (Windows operating systems only)—The least queue depth with subset policy is also known as the least I/Os or least requests policy. This policy routes the next I/O request to a data path that has the least outstanding I/O requests queued. For this policy, an I/O request is simply a command in the queue. The type of command or the number of blocks that are associated with the command are not considered.
book.book Page 58 Thursday, December 9, 2010 3:20 PM • RAID Controller modules • Virtual disks • Storage array totals NOTE: By default, all items are selected. b In Polling interval, select how often you want to update the performance statistics. NOTE: For an accurate elapsed time, do not use the Set RAID Controller Module Clocks option while using the Performance Monitor.
book.book Page 59 Thursday, December 9, 2010 3:20 PM The Performance Monitor data provides information about how your storage array is performing. The data is presented in eight columns, which are described in this table. Use this data to make performance tuning decisions for your storage array. Table 4-3.
book.
book.book Page 61 Thursday, December 9, 2010 3:20 PM Configuration: Overview 5 Dell PowerVault Modular Disk Storage Manager (MDSM) online help contains information on the how to use the MDSM application to perform the configuration and management tasks described in this document. You can access online help by clicking Help located at the top right corner of MDSM interface. See the MD3600i and MD3620i Storage Array’s Deployment Guide for information on installing the MDSM.
book.book Page 62 Thursday, December 9, 2010 3:20 PM Enterprise Management Window The EMW provides high-level management of storage arrays. When you start MDSM, the EMW opens. The EMW has the: • Devices tab—Provides information about the storage arrays. • Setup tab—Presents the initial setup tasks that guide you through adding storage arrays and configuring alerts.
book.book Page 63 Thursday, December 9, 2010 3:20 PM • Upgrade firmware on multiple storage arrays concurrently. • Obtain information about the firmware inventory including the version of the RAID controller modules, physical disks, and the enclosure management modules (EMMs) in the storage array. Inheriting the System Settings Use the Inherit System Settings option to import the operating system theme settings into the MDSM.
book.book Page 64 Thursday, December 9, 2010 3:20 PM • Storage partitions • Disk groups and virtual disks • Logical tab—You can view the organization of the storage array by virtual disks, disk groups, free capacity nodes, and any unconfigured capacity for the storage array. • Physical tab—You can view the organization of the storage array by RAID controller modules, physical disks, and other hardware components. • Mappings tab—You can define the hosts, host groups, and host ports.
book.book Page 65 Thursday, December 9, 2010 3:20 PM 6 Configuration: About Your Storage Array Out-of-Band and In-Band Management You can manage a storage array in two ways: • Out-of-band management • In-band management Out-of-Band Management In the out-of-band management method, data is separate from commands and events. Data travels through the host-to-controller interface, while commands and events travel through the management port Ethernet cables.
book.book Page 66 Thursday, December 9, 2010 3:20 PM In-Band Management Using in-band-management, commands, events, and data travel through the host-to-controller interface. Unlike out-of-band management, commands and events are mixed with data. NOTE: For detailed information on setting up in-band and out-of-band management see the Deployment Guide. When you add storage arrays by using this management method, you need to specify only the host name or IP address of the host.
book.book Page 67 Thursday, December 9, 2010 3:20 PM NOTE: Verify that your host or management station network configuration— including station IP address, subnet mask, and default gateway—is correct before adding a new storage array using the Automatic option. NOTE: For Linux, set the default gateway so that broadcast packets are sent to 255.255.255.0. For Red Hat Enterprise Linux, if no gateway exists on the network, set the default gateway to the IP address of the NIC.
book.book Page 68 Thursday, December 9, 2010 3:20 PM • In-band management—Enter a name or an IP address for the Host through which the storage array is attached to the network. NOTE: When adding a storage array using in-band management with iSCSI, a session must first be established between the initiator on the host server and the storage array. For more information, see "Configuration: Using iSCSI" on page 83.
book.book Page 69 Thursday, December 9, 2010 3:20 PM • Configure iSCSI host ports—Configure network parameters for each iSCSI host port automatically or specify the configuration information for each iSCSI host port. • Configure the storage array—Create disk groups, virtual disks, and hot spare physical disks by using the Automatic configuration method or the Manual configuration method. For more information, see the PowerVault Modular Disk Storage Manager online help topics.
book.book Page 70 Thursday, December 9, 2010 3:20 PM Locating Storage Arrays You can use the Blink option to physically locate and identify a storage array. NOTE: If the LEDs from the Blink Storage Array operation do not stop blinking, select Stop All Indications to stop the process manually. To locate the storage array: 1 Select the relevant storage array and: • In the EMW, right-click the appropriate storage array, and select Blink Storage Array.
book.book Page 71 Thursday, December 9, 2010 3:20 PM The Name/Rename Storage Arrays dialog appears. 2 Select the relevant storage array from the Select storage array table. If you do not know the name or physical location of the storage array, click Blink. After locating the storage array, click OK to turn off the LEDs. The name of the storage array appears in the Storage array name. 3 In Storage array name, type the new name of the storage array.
book.book Page 72 Thursday, December 9, 2010 3:20 PM • Select the Setup tab, and then click Set a Storage Array Password. • In the AMW, select the Logical tab, right-click and select Set Password. The Set Password dialog appears. 3 If you are resetting the password, type the Current password. NOTE: If you are setting the password for the first time, leave the Current password blank. 4 Type the New password. 5 Re-type the new password in Confirm new password.
book.book Page 73 Thursday, December 9, 2010 3:20 PM Viewing Storage Array Connections You can use the View Connections option to view the expansion enclosures connected to the RAID controller module. To view the storage array connections: 1 From the toolbar in AMW, select Storage Array View Connections. The :Connections dialog appears. 2 Click the column name to sort the connections according to your preference. 3 Click Close.
book.book Page 74 Thursday, December 9, 2010 3:20 PM Removing Storage Arrays You can remove a storage array from the list of managed arrays if you no longer want to manage it from a specific storage management station. Removing a storage array does not affect the storage array or its data in any way. Removing a storage array simply removes it from the list of storage arrays that appear in the drop-down list in the Array Selector. If a storage array is accidentally removed, it can be added again.
book.book Page 75 Thursday, December 9, 2010 3:20 PM Displaying Failover Alert You can change the failover alert delay for a storage array. The failover alert delay lets you delay the logging of a critical event if the multi-path driver transfers virtual disks to the non-preferred controller. If the multi-path driver transfers the virtual disks back to the preferred controller within the specified delay period, a critical event is not logged.
book.book Page 76 Thursday, December 9, 2010 3:20 PM Changing Expansion Enclosure ID Numbers When an MD1200 series expansion enclosure is connected to an MD3600i Series storage array for the first time, an enclosure ID number is assigned and maintained by the expansion enclosure. This enclosure ID number is also shown in the MDSM and can be changed if required. To change the enclosure ID numbers: 1 In the AMW, select the storage array, and select Storage Array Change Enclosure ID.
book.book Page 77 Thursday, December 9, 2010 3:20 PM Configuring Alert Notifications MDSM can send an alert for any condition on the storage array that requires your attention. Alerts can be sent as e-mail messages or as Simple Network Management Protocol (SNMP) trap messages. You can configure alert notifications either for all the storage arrays or a single storage array. To configure alert notifications for all storage arrays: 1 In the EMW, select the Setup tab. 2 Select Configure Alerts.
book.book Page 78 Thursday, December 9, 2010 3:20 PM • All storage arrays—Select this option to send an e-mail alert about events on all storage arrays. • An individual storage array—Select this option to send an e-mail alert about events that occur on only a specified storage array. These results occur, depending on your selection: • If you selected all storage arrays, the Configure Alerts dialog appears. • If you selected an individual storage array, the Select Storage Array dialog appears.
book.book Page 79 Thursday, December 9, 2010 3:20 PM • Validating an e-mail address—Type the e-mail address in Email address or select the e-mail address in the Configured email addresses area, and click Test. A test e-mail is sent to the selected e-mail address. A dialog with the results of the test and any error appears. 8 For the selected e-mail address, in Information To Send, select: • Event Only—The e-mail alert contains only the event information. This alert type is the default.
book.book Page 80 Thursday, December 9, 2010 3:20 PM Configuring SNMP Alerts To add a management console to the list of addresses configured to receive SNMP alerts: 1 Open the Configure Alerts dialog by performing one of these actions: • In the Tree view or the Table view on the Devices tab in the EMW, select a node, and select Edit Configure Alerts. Go to step 3. • In the Setup tab in the EMW, select Configure Alerts. Go to step 2.
book.book Page 81 Thursday, December 9, 2010 3:20 PM • Deleting an SNMP address—Select the SNMP address in the Configured SNMP addresses area, and click Delete. • Validating an SNMP address—Select the SNMP address in the Configured SNMP addresses area, and click Test. A test message is sent to the SNMP address. A message box with the results of the validation and any error information appears. 4 Click OK. An alert icon appears next to each node in the Tree view for which an alert is set.
book.book Page 82 Thursday, December 9, 2010 3:20 PM Use the following guidelines to adjust the interval: • You can use the default interval. • You can run a learn cycle at any time. • You can set the learn cycle earlier than the currently scheduled time. • You cannot set the learn cycle to start more than seven days later than the currently scheduled time. To change the battery settings perform these steps: 1 In the AMW, select Storage ArrayChange Battery Settings.
book.book Page 83 Thursday, December 9, 2010 3:20 PM Configuration: Using iSCSI 7 Changing the iSCSI Target Authentication To change the iSCSI target authentication: 1 In the AMW, select the Setup tab. 2 Select Manage iSCSI Settings. The Manage iSCSI Settings window is displayed and by default, the Target Authentication tab is selected. To change the authentication settings, select: • None—If you do not require initiator authentication. If you select None, any initiator can access the target.
book.book Page 84 Thursday, December 9, 2010 3:20 PM Entering Mutual Authentication Permissions Mutual authentication or two-way authentication is a way for a client or a user to verify themselves to a host server, and for the host server to validate itself to the user. This validation is accomplished in such a way that both parties are sure of the other’s identity. To add mutual authentication permissions: 1 In the AMW, select the Setup tab. 2 Select Manage iSCSI Settings.
book.book Page 85 Thursday, December 9, 2010 3:20 PM Initiator CHAP Secret The initiator CHAP secret is set on the host using the iSCSI initiator configuration program provided with the host operating system. If you are using the mutual authentication method, you must define the initiator CHAP secret when you set up the host. This must be the same CHAP secret that is defined for the target when defining mutual authentication settings.
book.book Page 86 Thursday, December 9, 2010 3:20 PM Changing the iSCSI Target Identification You cannot change the iSCSI target name, but you can associate an alias with the target for simpler identification. Aliases are useful because the iSCSI target names are not intuitive. You should provide an iSCSI target alias that is meaningful and easy to remember. To change the iSCSI target identification: 1 In the AMW, select the Setup tab. 2 Select Manage iSCSI Settings.
book.book Page 87 Thursday, December 9, 2010 3:20 PM • Select Specify Configuration, and type the IPv4 address to activate the target discovery. • Type the iSNS server IP address in the IPv6 settings area to activate the target discovery. After you manually enter an IP address, you can also click Advanced to configure the customized TCP listening ports. If you do not want to allow discovery sessions that are not named, select the Disallow un-named discovery sessions.
book.book Page 88 Thursday, December 9, 2010 3:20 PM 4 In the Configured Ethernet port speed list, select a network speed for the iSCSI host port. The network speed values in the Configured Ethernet port speed list depend on the maximum speed that the network can support. Only the network speeds that are supported are displayed. All of the host ports on a single controller operate at the same speed. An error is displayed if different speeds are selected for the host ports on the same controller.
book.book Page 89 Thursday, December 9, 2010 3:20 PM Advanced iSCSI Host Ports Settings NOTE: Configuring the advanced iSCSI host ports settings is optional. Use the advanced settings for the individual iSCSI host ports to specify the TCP frame size, the virtual LAN, and the network priority. Table 7-2. Advanced iSCSI Host Port Settings Setting Description Virtual LAN (VLAN) A method of creating independent logical networks within a physical network. Several VLANs can exist within a network.
book.book Page 90 Thursday, December 9, 2010 3:20 PM Viewing or Ending an iSCSI Session You might want to end an iSCSI session for the following reasons: • Unauthorized access—If an initiator is logged on whom you consider to not have access, you can end the iSCSI session. Ending the iSCSI session forces the initiator to log off the storage array. The initiator can log on if None authentication method is available.
book.book Page 91 Thursday, December 9, 2010 3:20 PM Viewing iSCSI Statistics and Setting Baseline Statistics To view iSCSI statistics and set baseline statistics: 1 In the AMW toolbar, select Storage Array iSCSI Statistics. The View iSCSI Statistics window is displayed. 2 Select the iSCSI statistic type you want to view in the iSCSI Statistics Type area.
book.book Page 92 Thursday, December 9, 2010 3:20 PM Edit, Remove, or Rename Host Topology If you give access to the wrong host or the wrong host group, you can remove or edit the host topology. Follow the appropriate procedures given in Table 7-3 to correct the host topology: Table 7-3. Host Topology Actions Desired Action Steps to Complete Action Move a host 1 Click the Mappings tab. Move a host group 2 Select the Host that you want to move, and then click Mappings Move.
book.book Page 93 Thursday, December 9, 2010 3:20 PM Configuration: Event Monitor 8 An event monitor is provided with Dell PowerVault Modular Disk Storage Manager (MDSM). The event monitor runs continuously in the background and monitors activity on the managed storage arrays. If the event monitor detects any critical problems, it can notify a host or remote system using email, Simple Network Management Protocol (SNMP) trap messages, or both.
book.book Page 94 Thursday, December 9, 2010 3:20 PM Enabling or Disabling the Event Monitor You can enable or disable the event monitor at any time. Disable the event monitor if you do not want the system to send alert notifications. If you are running the event monitor on multiple systems, disabling the event monitor on all but one system prevents the sending of duplicate messages.
book.book Page 95 Thursday, December 9, 2010 3:20 PM Configuration: About Your Host 9 Configuring Host Access Dell PowerVault Modular Disk Storage Manager (MDSM) software is comprised of multiple modules. One of these modules is the Host Context Agent, which is installed as part of the MDSM installation and runs continuously in the background. If the Host Context Agent is running on a host, that host and the host ports connected from it to the storage array are automatically detected by MDSM.
book.book Page 96 Thursday, December 9, 2010 3:20 PM The host topology is reconfigurable. You can perform the following tasks: • Create a host and assign an alias or user label. • Add or associate a new host port identifier to a particular host. • Change the host port identifier alias or user label. • Move or associate a host port identifier to a different host. • Replace a host port identifier with a new host port identifier.
book.book Page 97 Thursday, December 9, 2010 3:20 PM Defining a Host You can use the Define Host Wizard in the AMW to define a host for a storage array. Either a known unassociated host port identifier or a new host port identifier can be added. NOTE: A user label must be specified before the host port identifier may be added (the add button is disabled until one is entered). To define a host: 1 In the AMW, select the Mappings tab and select the appropriate storage array.
book.book Page 98 Thursday, December 9, 2010 3:20 PM 7 In Host type, select the relevant operating system for the host. The Host Group Question window is displayed. 8 In this window, you can select: • Yes—this host shares access to the same virtual disks with other hosts. • No—this host does NOT share access to the same virtual disks with other hosts. 9 Click Next. If you select Yes, the Specify Host Group window is displayed. If you select No, see step 11.
book.book Page 99 Thursday, December 9, 2010 3:20 PM Managing Host Groups A host group is a logical entity of two or more hosts that share access to specific virtual disks on the storage array. You create host groups with MDSM. All hosts in a host group must have the same host type (operating system). In addition, all hosts in the host group must have special software, such as clustering software, to manage virtual disk sharing and accessibility.
book.book Page 100 Thursday, December 9, 2010 3:20 PM Removing a Host From a Host Group You can remove a host from the Topology pane on the Mappings tab of the Array Management Window. For more information, see "Removing a Host Group" on page 101. Moving a Host to a Different Host Group To move a host to a different host group: 1 In the AMW, select the Mappings tab, select the host node in the Topology pane. 2 Perform one of these actions: • Select Mappings Move.
book.book Page 101 Thursday, December 9, 2010 3:20 PM Removing a Host Group To remove a host group: 1 In the AMW, select the Mappings tab, select the host node in the Topology pane. 2 Perform one of these actions: • Select Mappings Remove. • Right-click the host node, and select Remove from the pop-up menu. The Remove dialog appears. 3 Click Yes. The selected host group is removed. For more information, see the PowerVault Modular Disk Storage Manager online help topics.
book.book Page 102 Thursday, December 9, 2010 3:20 PM Starting or Stopping the Host Context Agent The Host Context Agent discovers the host topology. The Host Context Agent starts and stops with the host. The topology discovered by the Host Context Agent can be viewed by clicking Configure Host Access (Automatic) in the Configure tab in the MDSM. You must stop and restart the Host Context Agent to see the changes to the host topology if: • A new storage array is attached to the host server.
book.book Page 103 Thursday, December 9, 2010 3:20 PM I/O Data Path Protection You can have multiple host-to- array connections for a host. Ensure that you select all the connections to the array when configuring host access to the storage array. NOTE: See the Deployment Guide for more information on cabling configurations. NOTE: For more information on configuring hosts see "Configuration: About Your Host" on page 95.
book.book Page 104 Thursday, December 9, 2010 3:20 PM Managing Host Port Identifiers You can manage the host port identifiers that are added to the storage array. You can: • Add—Add or associate a new host port identifier to a particular host. • Edit—Change the host port identifier alias or user label. You can move (associate) the host port identifier to a new host. • Replace—Replace a particular host port identifier with another host port identifier.
book.book Page 105 Thursday, December 9, 2010 3:20 PM 5 Select the method to add a host port identifier to the host. You can select: • Add by selecting a known unassociated host port identifier—Select the appropriate host port identifier from the existing list of Known unassociated host port identifiers. • Add by creating a new host port identifier—In New host port identifier, enter the name of the new host port identifier. 6 In User label, enter an alphanumeric name of up to 30 character.
book.
book.book Page 107 Thursday, December 9, 2010 3:20 PM 10 Configuration: Disk Groups and Virtual Disks Creating Disk Groups and Virtual Disks Disk groups are created in the unconfigured capacity of a storage array, and virtual disks are created in the free capacity of a disk group. The maximum number of physical disks supported in a disk group is 30. The hosts attached to the storage array read and write data to the virtual disks.
book.book Page 108 Thursday, December 9, 2010 3:20 PM A disk group should be organized according to its related tasks and subtasks. For example, if you create a disk group for the Accounting Department, you can create virtual disks that match the different types of accounting performed in the department: Accounts Receivable (AR), Accounts Payable (AP), internal billing, and so forth. In this scenario, the AR and AP virtual disks probably need more capacity than the internal billing virtual disk.
book.book Page 109 Thursday, December 9, 2010 3:20 PM 3 Type up to 30-character name of the disk group in Disk group name. 4 Select the appropriate Physical Disk selection choices, you can select: • Automatic, see step 6 • Manual, see step 9 5 Click Next. 6 For automatic configuration, the RAID Level and Capacity window is displayed. 7 Select the appropriate RAID level in Select RAID level. You can select RAID levels 0, 1/10, 6, and 5.
book.book Page 110 Thursday, December 9, 2010 3:20 PM Locating a Disk Group You can physically locate and identify all of the physical disks that comprise a selected disk group. An LED blinks on each physical disk in the disk group. To locate a disk group: 1 In the AMW, select the Logical tab. 2 Select the appropriate disk group and from the toolbar select Disk Group Blink The LEDs for the selected disk group blink. 3 After locating the disk group, click OK. The LEDs stop blinking.
book.book Page 111 Thursday, December 9, 2010 3:20 PM To create virtual disks: 1 Choose one of these methods to start the Create Virtual Disk Wizard: • To create a virtual disk from unconfigured capacity in the storage array—On the Logical tab, select an Unconfigured Capacity node, and select Virtual Disk Create. Alternatively, you can right-click the Unconfigured Capacity node, and select Create Virtual Disk from the pop-up menu.
book.book Page 112 Thursday, December 9, 2010 3:20 PM 5 In Advanced virtual disk parameters, you can select: • Use recommended settings. • Customize settings. 6 If you select Use recommended settings in Advanced virtual disk parameters, click Finish. Otherwise, click Next. 7 In the Customize Advanced Virtual Disk Parameters window, select the appropriate Virtual Disk I/O characteristics type.
book.book Page 113 Thursday, December 9, 2010 3:20 PM 4 Select one or more virtual disks. Move the Select modification priority slider bar to the desired priority. NOTE: To select nonadjacent virtual disks, press click. To select adjacent virtual disks, press click. To select all of the available virtual disks, click Select All. 5 Click OK. A message prompts you to confirm the change in the virtual disk modification priority. 6 Click Yes. 7 Click OK.
book.book Page 114 Thursday, December 9, 2010 3:20 PM To select nonadjacent virtual disks, press click. To select adjacent virtual disks, press click. To select all of the available virtual disks, click Select All. 4 In the Select cache properties area, you can select: • Enable read caching—to enable read caching. • Enable dynamic cache read prefetch—to enable dynamic cache read prefetch. • Enable write caching—to enable write caching.
book.book Page 115 Thursday, December 9, 2010 3:20 PM Changing the Segment Size of a Virtual Disk You can change the segment size on a selected virtual disk. During this operation, I/O performance is affected, but your data remains available. Guidelines to proceed with changing the segment size: • You cannot cancel this operation after it starts. • Do not start this operation unless the disk group is in Optimal status. • MDSM determines the segment size transitions that are allowed.
book.book Page 116 Thursday, December 9, 2010 3:20 PM The segment size modification operation begins. The virtual disk icon in the Logical pane shows an Operation in Progress status while the operation is taking place. NOTE: To view the progress or change the priority of the modification operation, select a virtual disk in the disk group, and select Virtual Disk Change Modification Priority.
book.book Page 117 Thursday, December 9, 2010 3:20 PM The corresponding dynamic cache read prefetch setting and segment size values that are typically well suited for the selected virtual disk I/O characteristic type are populated in the Dynamic cache read prefetch and Segment size fields. NOTE: If you selected the Custom option, select your preferred dynamic cache read prefetch setting (enabled/disabled) and segment size (8 KB to 512 KB). 2 Click OK.
book.book Page 118 Thursday, December 9, 2010 3:20 PM All of the physical disks and RAID controller modules in a storage array share the same security key. The shared security key provides read and write access to the physical disks, while the physical disk encryption key on each physical disk is used to encrypt the data. A security capable physical disk works like any other physical disk until it is security enabled.
book.book Page 119 Thursday, December 9, 2010 3:20 PM • Save Security Key File • Validate Security Key • Unlock Drives NOTE: If you have not created a security key for the storage array, the Create Security Key option is active. If you have created a security key for the storage array, the Create Security Key option is inactive with a check mark to the left. The Change Security Key option, the Save Security Key option, and the Validate Security Key option are now active.
book.book Page 120 Thursday, December 9, 2010 3:20 PM The storage array password protects a storage array from potentially destructive operations by unauthorized users. The storage array password is independent from self encrypting disk, and should not be confused with the pass phrase that is used to protect copies of a security key. However, it is good practice to set a storage array password Creating a Security Key When you create a security key, it is generated by and securely stored by the array.
book.book Page 121 Thursday, December 9, 2010 3:20 PM 4 In New password, enter a string for the storage array password. If you are creating the storage array password for the first time, leave Current password blank. Follow these guidelines for cryptographic strength when you create the storage array password: • The password should be between eight and 30 characters long. • The password should contain at least one uppercase letter. • The password should contain at least one lowercase letter.
book.book Page 122 Thursday, December 9, 2010 3:20 PM The pass phrase that you enter is masked. NOTE: Create Key is active only if the pass phrase meets the above mentioned criterion. 9 In the Confirm pass phrase dialog box, re-enter the exact string that you entered in the Pass phrase dialog box. Make a record of the pass phrase that you entered and the security key identifier that is associated with the pass phrase. You need this information for later secure operations. 10 Click Create Key.
book.book Page 123 Thursday, December 9, 2010 3:20 PM for storage on other media. When you change a security key, you also provide information to create a security key identifier. Changing the security key does not destroy any data. You can change the security key at any time. Before you change the security key, ensure that: • All virtual disks in the storage array are in Optimal status. • In storage arrays with two RAID controller modules, both are present and working normally.
book.book Page 124 Thursday, December 9, 2010 3:20 PM 6 In Confirm pass phrase, re-enter the exact string you entered in Pass phrase. Make a record of the pass phrase you entered and the security key identifier it is associated with. You need this information for later secure operations. 7 Click Change Key. 8 Make a record of the security key identifier and the file name from the Change Security Key Complete dialog, and click OK.
book.book Page 125 Thursday, December 9, 2010 3:20 PM 4 In Confirm pass phrase, re-enter the exact string you entered in Pass phrase. Make a record of the pass phrase you entered. You need it for later secure operations. 5 Click Save. 6 Make a record of the security key identifier and the file name from the Save Security Key Complete dialog, and click OK. Validate Security Key A file in which a security key is stored is validated through the Validate Security Key dialog.
book.book Page 126 Thursday, December 9, 2010 3:20 PM Erasing Secure Physical Disks In the AMW, when you select a security enabled physical disk that is not part of a disk group, the Secure Erase menu item is enabled on the Physical Disk menu. You can use the secure erase procedure to re-provision a physical disk. You can use the Secure Erase option if you want to remove all of the data on the physical disk and reset the physical disk security attributes.
book.book Page 127 Thursday, December 9, 2010 3:20 PM • The availability of enclosure loss protection for a disk group depends on the location of the physical disks that comprise the disk group. To make sure that enclosure loss protection is not affected, you must replace a failed physical disk to initiate the copyback process. See "Enclosure Loss Protection" on page 130.
book.book Page 128 Thursday, December 9, 2010 3:20 PM 8 Select the relevant Physical disks in the Unassigned physical disks area, as hot spares for the selected disk and click OK. 9 To unassign hot spares, in the Hot Spare Coverage window, select physical disks in the Hot spare physical disks area. 10 Review the information about the hot spare coverage in the Details area. 11 Click Unassign. A message prompts you to confirm the operation. 12 Type yes and click OK.
book.book Page 129 Thursday, December 9, 2010 3:20 PM Hot Spare Operation When a physical disk fails, the virtual disk automatically rebuilds using an available hot spare. When a replacement physical disk is installed, data from the hot spare is copied back to the replacement physical disk. This function is called copy back. By default, the RAID controller module automatically configures the number and type of hot spares based on the number and capacity of physical disks in your system.
book.book Page 130 Thursday, December 9, 2010 3:20 PM hot spare physical disk. To make sure that enclosure loss protection is not affected, you must replace a failed physical disk to initiate the copyback process. The virtual disk remains online and accessible while you are replacing the failed physical disk, because the hot spare physical disk is automatically substituted for the failed physical disk. Enclosure Loss Protection Enclosure loss protection is an attribute of a disk group.
book.book Page 131 Thursday, December 9, 2010 3:20 PM Table 10-2. RAID Level Criteria for Enclosure Loss Protection (continued) Criteria for Enclosure Loss Protection RAID level 1 Ensure that each physical disk in a mirrored pair is located in a different expansion enclosure. This enables you to have more than two physical disks in the disk group within the same expansion enclosure.
book.book Page 132 Thursday, December 9, 2010 3:20 PM • Each host has its own LUN address space. MDSM permits the same LUN to be used by different hosts or host groups to access virtual disks in a storage array. • Not every operating system has the same number of LUNs available. • You can define the mappings on the Mappings tab in the Array Management Window. See "Using the Mappings Tab" on page 96.
book.book Page 133 Thursday, December 9, 2010 3:20 PM 4 In Host group or host, select the appropriate host group or host. All defined hosts, host groups, and the default group appear in the list. NOTE: When configuring an iSCSI storage array, including the MD3600i or MD3620i, if a host or a host group is selected that does not have a SAS host bus adapter (SAS HBA) host port defined, a warning dialog appears. 5 In Logical unit number, select a LUN. The supported LUNs are 0 through 255.
book.book Page 134 Thursday, December 9, 2010 3:20 PM • Right-click the virtual disk, and select Change Mapping from the pop-up menu. 3 In Host group or host, select the appropriate host group or host. By default, the drop-down list shows the current host group or the host associated with the selected virtual disk. 4 In Logical unit number, select the appropriate LUN. The drop down list shows only the currently available LUNs that are associated with the selected virtual disk. 5 Click OK.
book.book Page 135 Thursday, December 9, 2010 3:20 PM During a virtual disk copy, the same RAID controller module must own both the source virtual disk and the target virtual disk. Sometimes both virtual disks do not have the same preferred RAID controller module when the virtual disk copy starts. Therefore, the ownership of the target virtual disk is automatically transferred to the preferred RAID controller module of the source virtual disk.
book.book Page 136 Thursday, December 9, 2010 3:20 PM associated source virtual disk. Changing the RAID controller module ownership of a virtual disk changes the preferred RAID controller module ownership of the virtual disk. During a virtual disk copy, the same RAID controller module must own both the source virtual disk and the target virtual disk. Sometimes both virtual disks do not have the same preferred RAID controller module when the virtual disk copy starts.
book.book Page 137 Thursday, December 9, 2010 3:20 PM Changing the RAID Level of a Disk Group Changing the RAID level of a disk group changes the RAID levels of every virtual disk that comprises the disk group. Performance might be slightly affected during the operation. Guidelines to change the RAID level of a disk group: • You cannot cancel this operation after it begins. • The disk group must be in Optimal status before you can perform this operation.
book.book Page 138 Thursday, December 9, 2010 3:20 PM Guidelines when you work with host types with LUN mapping restrictions: • You cannot change a host adapter port to a restricted host type if there are already mappings in the storage partition that would exceed the limit imposed by the restricted host type. • Consider the case of the Default Group that has access to LUNs up to 256 (0 to 255) and a restricted host type is added to the Default Group.
book.book Page 139 Thursday, December 9, 2010 3:20 PM Changing the RAID Controller Module Ownership of a Virtual Disk or a Disk Group You can change the RAID controller module ownership of a virtual disk or a disk group. You can change the RAID controller module ownership of a standard virtual disk or a snapshot repository virtual disk.
book.book Page 140 Thursday, December 9, 2010 3:20 PM d Select the RAID controller module. CAUTION: Possible loss of data access—If you do not use a multi-path driver, shut down any host applications that are currently using the virtual disk. This action prevents application errors when the I/O path changes. e Click Yes. The ownership of the virtual disk is changed. I/O to the virtual disk is now directed through this I/O path. You are finished with this procedure.
book.book Page 141 Thursday, December 9, 2010 3:20 PM Changing the RAID Level of a Disk Group Use the Change RAID Level option to change the RAID level on a selected disk group. Using this option changes the RAID levels of every virtual disk that comprises the disk group. Performance might be slightly affected during the operation. Keep these guidelines in mind when you change the RAID level of a disk group: • You cannot cancel this operation after it begins.
book.book Page 142 Thursday, December 9, 2010 3:20 PM When you choose this type of configuration, all of the hosts must have the same operating system and special software (such as clustering software) to manage virtual disk sharing and accessibility. More than one storage partition is required if: • Specific hosts must access specific virtual disks in the storage array. • Hosts with different operating systems are attached to the same storage array.
book.book Page 143 Thursday, December 9, 2010 3:20 PM Storage partitioning topology is the collection of elements, such as Default Group, host groups, hosts, and host ports shown as nodes in the Topology pane of the Mappings tab in the AMW. For more information, see "Using the Mappings Tab" on page 96. If a storage partitioning topology is not defined, an informational dialog appears each time you select the Mappings tab.
book.book Page 144 Thursday, December 9, 2010 3:20 PM You can also use the Command Line Interface (CLI) on both Windows and Linux hosts to add free capacity to a disk group. See the CLI Guide for more information. After the capacity expansion is completed, additional free capacity is available in the disk group for creation of new virtual disks or expansion of existing virtual disks.
book.book Page 145 Thursday, December 9, 2010 3:20 PM Disk Group Migration Disk group migration allows to you export a disk group so that you can import the disk group to a different storage array. You can also export a disk group so that you can store the data offline. NOTE: During the export process (before the disk group is imported) you lose access to the data on the exported disk group. NOTE: You must export a disk group before you move the disk group or import the disk group.
book.book Page 146 Thursday, December 9, 2010 3:20 PM 4 Locate the disk group, and label the physical disks. 5 Place the disk group offline. 6 Obtain blank physical disk modules or new physical disks. On the target storage array: 1 Verify that the target storage array has available physical disk slots. 2 Verify that the target storage array supports the physical disks that you import. 3 Verify that the target storage array can support the new virtual disks.
book.book Page 147 Thursday, December 9, 2010 3:20 PM The following settings are removed/cleared during the procedure: • Persistent reservations • Host-to-virtual disk mappings • Virtual disk copy pairs • Snapshot virtual disks and snapshot repository virtual disks • Remote mirror pairs • Mirror repositories Non-Importable Components Some components cannot be imported during the import disk group procedure.
book.book Page 148 Thursday, December 9, 2010 3:20 PM • Redundancy mismatches error—The first 10 redundancy mismatches that are found on the virtual disk are reported to the event log. • Unfixable error—Data could not be read and parity or redundancy information could not be used to regenerate the data. For example, redundancy information cannot be used to reconstruct the data on a degraded virtual disk. The error is reported to the event log.
book.book Page 149 Thursday, December 9, 2010 3:20 PM Suspending the Media Scan You cannot perform a media scan while performing another long-running operation on the disk drive such as reconstruction, copy-back, reconfiguration, virtual disk initialization, or immediate availability formatting. If you want to perform another long-running operation, you should suspend the media scan. NOTE: A background media scan is the lowest priority of the long-running operations.
book.
book.book Page 151 Thursday, December 9, 2010 3:20 PM 11 Configuration: Premium Feature— Snapshot Virtual Disks NOTE: If you ordered this feature, you received a Premium Feature Activation card shipped in the same box as your Dell PowerVault MD storage array. Follow the directions on the card to obtain a key file and to enable the feature. NOTE: The snapshot feature allows up to eight snapshots per LUN and 128 per array to be present at the same time.
book.book Page 152 Thursday, December 9, 2010 3:20 PM repository uses less disk space than a full physical copy, because the only data blocks that are stored in the snapshot repository virtual disk are those that have changed since the time of the snapshot.
book.book Page 153 Thursday, December 9, 2010 3:20 PM Creating a Snapshot Virtual Disk Using the Simple Path You can choose the simple path to create a snapshot virtual disk if the disk group of the source virtual disk has the required amount of free space. A snapshot repository virtual disk requires a minimum of 8 MB free capacity. The destination of a snapshot repository virtual disk is determined based on the free capacity available in the disk group.
book.book Page 154 Thursday, December 9, 2010 3:20 PM • Percent Full—When the snapshot repository virtual disk reaches the specified repository full percentage level, the event is logged in the Major Event Log (MEL). The default snapshot repository full percentage level is 50 percent of the source virtual disk.
book.book Page 155 Thursday, December 9, 2010 3:20 PM NOTE: Before you create a new snapshot of a source virtual disk, stop any data access (I/O) activity or suspend data transfer to the source virtual disk to ensure that you capture an accurate snapshot of the source virtual disk. Close all applications, including Windows Internet Explorer, to make sure all I/O activity has stopped.
book.book Page 156 Thursday, December 9, 2010 3:20 PM 9 In the AMW, select the Mappings tab, assign mappings between the snapshot virtual disk and the host that accesses the snapshot virtual disk. NOTE: In some cases, conflicts might result from mapping the same host to both a source virtual disk and its associated snapshot virtual disk. This conflict depends on the host operating system and any virtual disk manager software in use.
book.book Page 157 Thursday, December 9, 2010 3:20 PM – Use free capacity on the same disk group where the source virtual disk resides. – Use free capacity on another disk group. – Use unconfigured capacity and create a new disk group for the snapshot repository virtual disk. – It is recommended placing the snapshot repository virtual disk within the disk group of the source virtual disk.
book.book Page 158 Thursday, December 9, 2010 3:20 PM The destination of a snapshot repository virtual disk is determined based on the free capacity available in the disk group. A snapshot repository virtual disk requires a minimum of 8 MB free capacity. You can choose your preferred creation path—simple or advanced—if the disk group of the source virtual disk has the required amount of free space.
book.book Page 159 Thursday, December 9, 2010 3:20 PM Before creating a snapshot virtual disk, the host server must be in the proper state. To prepare your host server: 1 Stop all I/O activity to the source. 2 Using your Windows system, flush the cache to the source. At the host prompt, type SMrepassist -f and press . For more information, see "SMrepassist Utility" on page 257.
book.book Page 160 Thursday, December 9, 2010 3:20 PM Creating the Snapshot Using the Advanced Path NOTE: Removing the drive letter of the associated virtual disk in Windows or unmounting the virtual drive in Linux helps to guarantee a stable copy of the drive for the Snapshot.
book.book Page 161 Thursday, December 9, 2010 3:20 PM 9 In the Snapshot repository virtual disk parameters area, enter the system behavior when: • The snapshot repository virtual disk is full to the selected percentage level. • The snapshot repository virtual disk is full. 10 Click Next. The Preview window containing the summary of the snapshot virtual disk is displayed. 11 Click Finish. The Completed window is displayed. 12 Click OK.
book.book Page 162 Thursday, December 9, 2010 3:20 PM For example, if you are creating the first snapshot virtual disk for a source virtual disk called Accounting, the default snapshot virtual disk is Accounting-1, and the associated snapshot repository virtual disk default name is Accounting-R1. The default name of the next snapshot virtual disk you create based on Accounting is Accounting-2, with the corresponding snapshot repository virtual disk named as Accounting-R2 by default.
book.book Page 163 Thursday, December 9, 2010 3:20 PM Snapshot Repository Capacity If you receive a warning that the capacity for the snapshot repository virtual disk is approaching its threshold, you can increase the capacity of a snapshot repository virtual disk by using one of the following methods: • Use the free capacity available on the disk group of the snapshot repository virtual disk. • Add unconfigured capacity to the disk group of the snapshot repository virtual disk.
book.book Page 164 Thursday, December 9, 2010 3:20 PM capacity is available, the maximum free space appears in the Increase capacity by. If free capacity does not exist on the disk group, the free space that appears in the Increase capacity by spinner box is 0. You must add physical disks to create free capacity on the disk group.
book.book Page 165 Thursday, December 9, 2010 3:20 PM NOTE: The physical disks that appear have a capacity that is either the same size or larger than the capacity of the physical disks already being used by the disk group. 9 Select either a single physical disk to add or two physical disks to add. 10 Click Add. The Add Physical Disks window closes. 11 Check the Physical Disks to add [enclosure, slot] area to make sure that the correct physical disks have been added.
book.book Page 166 Thursday, December 9, 2010 3:20 PM Re-Creating Snapshot Virtual Disks You can re-create a snapshot virtual disk that you have previously disabled. CAUTION: Possible loss of data redundancy—If the snapshot virtual disk is in Optimal status, it is first disabled prior to being re-created. This action invalidates the current snapshot.
book.book Page 167 Thursday, December 9, 2010 3:20 PM NOTE: If you do not intend to re-create the snapshot virtual disk at a later time, in the Logical pane, select the snapshot virtual disk, and select Virtual DiskDelete to remove it. The associated snapshot repository virtual disk is also removed. Refer to the PowerVault Modular Disk Storage Manager online help topics for more information on removing a snapshot virtual disk.
book.book Page 168 Thursday, December 9, 2010 3:20 PM 3 Click the Summary tab, then click Disk Groups & Virtual Disks to ensure that the snapshot virtual disk is in Optimal or Disabled status. 4 Remove the drive letter(s) of the source and (if mounted) snapshot virtual disk in Windows or unmount the virtual drive(s) in Linux to help guarantee a stable copy of the drive for the Snapshot.
book.book Page 169 Thursday, December 9, 2010 3:20 PM 12 Configuration: Premium Feature— Virtual Disk Copy NOTE: A virtual disk copy overwrites data on the target virtual disk. Before starting a virtual disk copy, ensure that you no longer need the data or back up the data on the target virtual disk. NOTE: If you ordered this feature, you received a Premium Feature Activation card that shipped in the same box as your Dell PowerVault MD storage array.
book.book Page 170 Thursday, December 9, 2010 3:20 PM Reasons to use virtual disk copy include: • Copying data for improved access—As your storage requirements for a virtual disk change, you can use a virtual disk copy to copy data to a virtual disk in a disk group that uses drives with larger capacity within the same storage array. Copying data for larger access capacity enables you to move data to greater capacity physical disks (for example, 61 GB to 146 GB).
book.book Page 171 Thursday, December 9, 2010 3:20 PM Virtual Disk Read/Write Permissions After the virtual disk copy is complete, the target virtual disk automatically becomes read-only to the hosts. The target virtual disk rejects read and write requests while the virtual disk copy operation has a status of Pending or In Progress or if the operation fails before completing the copy.
book.book Page 172 Thursday, December 9, 2010 3:20 PM Virtual Disk Copy Restrictions Before you perform any virtual disk copy tasks, understand and adhere to the restrictions listed in this section. The restrictions apply to the source virtual disk, the target virtual disk, and the storage array. • While a virtual disk copy has a status of In Progress, Pending, or Failed, the source virtual disk is available for read I/O activity only.
book.book Page 173 Thursday, December 9, 2010 3:20 PM journaling file system, any attempt to issue a read request to the source virtual disk might be rejected by the storage array, and an error message might appear. The journaling file system driver issues a write request before it attempts to issue the read request. The storage array rejects the write request, and the read request might not be issued due to the rejected write request.
book.book Page 174 Thursday, December 9, 2010 3:20 PM Create Copy Wizard The Create Copy Wizard guides you through: 1 Selecting a source virtual disk from a list of available virtual disks 2 Selecting a target virtual disk from a list of available virtual disks 3 Setting the copy priority for the virtual disk copy When you have completed the wizard dialogs, the virtual disk copy starts, and data is read from the source virtual disk and written to the target virtual disk.
book.book Page 175 Thursday, December 9, 2010 3:20 PM Failed RAID Controller Module You must manually change RAID controller module ownership to the alternate RAID controller module to allow the virtual disk copy to complete under all of these conditions: • A virtual disk copy has a status of In Progress. • The preferred RAID controller module of the source virtual disk fails. • The ownership transfer does not occur automatically in the failover.
book.book Page 176 Thursday, December 9, 2010 3:20 PM To prevent write-protected error messages from appearing, do not try to access a source virtual disk that is participating in a virtual disk copy while the virtual disk copy has a status of In Progress. Also, make sure that the ReadOnly attribute for the target virtual disk is disabled after the virtual disk copy has completed to prevent error messages from appearing.
book.
book.book Page 178 Thursday, December 9, 2010 3:20 PM 3 Select Change Copy Priority. The Change Copy Priority window is displayed. 4 In the Copy Priority area, select the appropriate copy priority, depending on your system performance needs. NOTE: There are 5 copy priority rates available: lowest, low, medium, high, and highest. If the copy priority is set at the lowest rate, I/O activity is prioritized, and the virtual disk copy takes longer.
book.book Page 179 Thursday, December 9, 2010 3:20 PM Recopying a Virtual Disk You can recopy a virtual disk when you have stopped a virtual disk copy and you want to start it again or when a virtual disk copy has failed. The Recopy option overwrites existing data on the target virtual disk and makes the target virtual disk read-only to hosts. This option fails all snapshot virtual disks associated with the target virtual disk, if any exist.
book.book Page 180 Thursday, December 9, 2010 3:20 PM 4 Remove the drive letter(s) of the source and (if mounted) virtual disk in Windows or unmount the virtual drive(s) in Linux to help guarantee a stable copy of the drive for the virtual disk. If this is not done, the copy operation reports that it has completed successfully, but the copied data is not updated properly. 5 Follow any additional instructions for your operating system.
book.book Page 181 Thursday, December 9, 2010 3:20 PM 5 Select Copy Re-Copy. The Re-Copy window is displayed. 6 Set the copy priority. NOTE: There are five copy priority rates available: lowest, low, medium, high, and highest. If the copy priority is set at the lowest rate, I/O activity is prioritized, and the virtual disk copy takes longer. If the copy priority is set to the highest priority rate, the virtual disk copy is prioritized, but I/O activity for the storage array might be affected.
book.
book.book Page 183 Thursday, December 9, 2010 3:20 PM 13 Configuration: Premium Feature— Upgrading to High-PerformanceTier The High Performance Tier premium feature on an MD3600i Series array increases the performance of the system beyond that of a MD3600i Series array operating at the standard performance level. If this feature is ordered, a Premium Feature Activation card is placed in the box with the storage array.
book.
book.book Page 185 Thursday, December 9, 2010 3:20 PM 14 Configuration: Device Mapper Multipath for Linux Overview The MD3600i Series storage array uses a Linux operating system software framework, known as Device Mapper (DM), to enable multipath capabilities on Linux Host Servers. The DM multipath functionality is provided by a combination of drivers and utilities. This chapter describes how to use those utilities to complete the process of enabling MD3600i Series storage array on a Linux system.
book.book Page 186 Thursday, December 9, 2010 3:20 PM Using DM Multipathing Devices NOTE: Using or modifying any nodes other than the multipathing device nodes can result in array or file system problems, including loss of communication with the array and corruption of the file system. Avoid accessing any device other than the multipathing device.
book.book Page 187 Thursday, December 9, 2010 3:20 PM Using the MDSM software: 1 Map the host server to the MD3600i Series storage array. 2 Create the Virtual Disks. 3 Map newly created arrays to your host server. NOTE: Any arrays configured with MDCU automatically get added to the list of Devices in the PowerVault Modular Disk Storage Manager Enterprise Management Window (EMW).
book.book Page 188 Thursday, December 9, 2010 3:20 PM Scan for Newly Added Virtual Disks The rescan_dm_devs command scans the host server system looking for existing and newly added virtual disks mapped to the host server. # rescan_dm_devs If an array virtual disk (VD) is mapped to the host server at a later time the rescan_dm_devices command must be run again to make the VD a visible LUN to the operating system.
book.book Page 189 Thursday, December 9, 2010 3:20 PM The following is an example of SLES output: mpathb(360080e500017b2f80000c6ca4a1d4ab8) dm-21 DELL,MD32xxi [size=1.0G][features=3 queue_if_no_path pg_init_retries 50][hwhandler=1 rdac][rw] \_ round-robin 0 [prio=6][active] \_ 4:0:0:22 sdx 65:112 [active][ready] \_ round-robin 0 [prio=1][enabled] \_ 6:0:0:22 sdcl 69:144 [active][ghost] where: mpathb is the name of the virtual device created by device mapper. It is located in the /dev/mapper directory.
book.book Page 190 Thursday, December 9, 2010 3:20 PM Add a New Partition to Device Mapper The kpartx command adds the new fdisk partition to the Device Mapper list of usable partitions. See examples below, where mpath is the device node on which the partition was created. # kpartx –a /dev/mapper/mpath If successful, the command does not display an output. To verify success and view exact partition naming, you can use these commands to see the full partition names assigned.
book.book Page 191 Thursday, December 9, 2010 3:20 PM Create a File System on a Device Mapper Partition Use the standard mkfs command to create the file system on the newly created Device Mapper partition. For example: # mkfs –t /dev/mapper/ where is the partition on which the file system is created. Mount a Device Mapper Partition Use the standard mount command to mount the Device Mapper partition, as shown below.
book.book Page 192 Thursday, December 9, 2010 3:20 PM 3 Flush the Device Mapper multipath maps list to remove any old or modified mappings: # multipath –F NOTE: The boot operating system drive may have an entry with the Device Mapper multipathing table. This is not affected by the multipath –F command. However, using #multipath –ll should not show any multipathing devices with model “MD3600i” or “MD3600i”.
book.book Page 193 Thursday, December 9, 2010 3:20 PM Table 14-1. Useful Device Mapper Commands (continued) Command Description rescan_dm_devs Dell provided script. Forces a rescan of the host SCSI bus and aggregates multipathing devices as needed. For use when: • LUNs are dynamically mapped to the hosts. • New targets are added to the host. • Failback of the storage array is required. • For MD3600i Series arrays, iSCSI sessions have to be established for rescan to take effect.
book.book Page 194 Thursday, December 9, 2010 3:20 PM • Failback can be slow when the host system is experiencing heavy I/O. The problem is exacerbated if the host server is also experiencing very high CPU utilization. • The Device Mapper Multipath service can be slow when the host system is experiencing heavy I/O. The problem is exacerbated if the host server is also experiencing very high CPU utilization. • If the root disk is not blacklisted in the multipath.
book.book Page 195 Thursday, December 9, 2010 3:20 PM Question Answer I removed a LUN. But the multipathing mapping is still available. The multipathing device is still available after you remove the LUNs. Run multipath –f to remove the multipathing mapping. For example, if a device related with /dev/dm-1 is deleted, you must run multipath –f /dev/dm-1 to remove /dev/dm-1 from DM mapping table.
book.
book.book Page 197 Thursday, December 9, 2010 3:20 PM 15 Management: Firmware Downloads Downloading RAID Controller and NVSRAM Packages A version number exists for each firmware file. The version number indicates whether the firmware is a major version or a minor version. You can use the Enterprise Management Window (EMW) to download and activate both the major firmware versions and the minor firmware versions.
book.book Page 198 Thursday, December 9, 2010 3:20 PM Downloading Both RAID Controller and NVSRAM Firmware NOTE: I/O to the array can continue while you are upgrading RAID controller and NVSRAM firmware. NOTE: It is recommended that the firmware and NVSRAM be upgraded during a maintenance period when the array is not being used for I/O. NOTE: The RAID enclosure must contain at least two disk drives in order to update the firmware on the controller.
book.book Page 199 Thursday, December 9, 2010 3:20 PM 7 Click Transfer. Keep these guidelines in mind: – If the Transfer button is inactive, ensure that you either select an NVSRAM file or clear the Transfer NVSRAM file with RAID controller module firmware. – If the file selected is not valid or is not compatible with the current storage array configuration, the File Selection Error dialog appears. Click OK to close it, and choose a compatible firmware or NVSRAM file.
book.book Page 200 Thursday, December 9, 2010 3:20 PM 13 Select the file to download. 14 Click OK. 15 If you want to download the NVSRAM file with the RAID controller module firmware, select Download NVSRAM file with firmware in the Select files area. Any attributes of the firmware file appear in the Firmware file information area. The attributes indicate the version of the firmware file. Any attributes of the NVSRAM file appear in the NVSRAM file information area.
book.book Page 201 Thursday, December 9, 2010 3:20 PM Downloading Only NVSRAM Firmware Use the command line interface (CLI) to download and activate NVSRAM to several storage arrays. For more information, see the PowerVault Modular Disk Storage Manager online help topics. To download only NVSRAM firmware: 1 To download the NVSRAM firmware from: • EMW—Go to step 7. • AMW—Go to step 2.
book.book Page 202 Thursday, December 9, 2010 3:20 PM 7 Perform one of these actions: • Select Tools Upgrade RAID Controller Module Firmware. • Select the Setup tab, and click Upgrade RAID Controller Module Firmware. The Upgrade RAID Controller Module Firmware window is displayed. The Storage array pane lists the storage arrays. The Details pane shows the details of the storage array that is selected in the Storage array pane.
book.book Page 203 Thursday, December 9, 2010 3:20 PM 13 Click OK. The Confirm Download dialog appears. 14 Click Yes. The download starts and a progress indicator appears in the Status column of the Upgrade RAID Controller Module Firmware window. Downloading Physical Disk Firmware CAUTION: When updating physical disk firmware, you should stop all I/O activity to the array to prevent data loss. The physical disk firmware controls various features of the physical disk.
book.book Page 204 Thursday, December 9, 2010 3:20 PM • Make sure that the firmware that you download to the physical disks are compatible with the physical disks that you select. • Do not make any configuration changes to the storage array while downloading the firmware. NOTE: Downloads can take several minutes to complete. During a download, the Download Physical Disk - Progress dialog appears. Do not attempt another operation when the Download Physical Disk - Progress dialog appears.
book.book Page 205 Thursday, December 9, 2010 3:20 PM Downloading MD1200 Series Expansion Module EMM Firmware NOTE: Do not make any configuration changes to the storage array while you are downloading the expansion enclosure EMM firmware. Doing so could cause the firmware download to fail, damage the storage array, or cause loss of data accessibility. NOTE: Due to a limitation with Linux, expansion enclosure EMM firmware updates must be performed using out-of-band management only.
book.book Page 206 Thursday, December 9, 2010 3:20 PM 6 Click Yes to continue with the firmware download, NOTE: If you click Stop while a firmware download is in progress, the download-in-progress finishes before the operation stops. The status for the remaining expansion enclosures changes to Canceled. 7 Monitor the progress and completion status of the download to the expansion enclosures.
book.book Page 207 Thursday, December 9, 2010 3:20 PM Media Errors and Unreadable Sectors If the RAID controller detects a media error while accessing data from a physical disk that is a member of a disk group with a redundant RAID level (RAID 1, RAID 5 or RAID 10), the controller tries to recover the data from peer disks in the disk group and uses recovered data to correct the error.
book.
book.
book.book Page 210 Thursday, December 9, 2010 3:20 PM Front Bezel (Optional) Removing the Front Bezel 1 Using the system key, unlock the front bezel (if locked). 2 Lift up the release latch next to the keylock. 3 Rotate the left end of the bezel away from the front panel. 4 Unhook the right end of the bezel and pull the bezel away from the system. Figure 16-1.
book.book Page 211 Thursday, December 9, 2010 3:20 PM Hard Drives SAFETY: Models AMT, E03J, and E04J Models AMT, E03J, and E04J are intended for installation only in restricted access locations as defined in cl 1.2.7.3 of IEC 60950-1:2005. Depending on your configuration, your array either supports up to 24, 2.5inch SAS hard drives or up to 12, 3.5-inch SAS hard drives in internal drive bays. Hard drives are connected to a backplane through hard-drive carriers and can be configured as hot-swappable.
book.book Page 212 Thursday, December 9, 2010 3:20 PM Figure 16-3. Removing and Installing a 2.5-Inch Hard-Drive Blank 1 1 2 drive blank 2 release tab Installing a Drive Blank 1 If installed, remove the front bezel. See "Removing the Front Bezel" on page 210. 2 Insert the drive blank into the drive bay until the blank is fully seated. 3 Close the handle to lock the blank in place. 4 If applicable, replace the front bezel. See "Installing the Front Bezel" on page 210.
book.book Page 213 Thursday, December 9, 2010 3:20 PM 2 From the Modular Disk Storage Manager (MDSM) software, prepare the drive for removal. Wait until the hard-drive indicators on the drive carrier signal that the drive can be removed safely. For more information, see your controller documentation for information about hot-swap drive removal. If the drive has been online, the green activity/fault indicator flashes as the drive is powered down.
book.book Page 214 Thursday, December 9, 2010 3:20 PM Installing a Hard Drive CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 215 Thursday, December 9, 2010 3:20 PM Removing a Hard Drive From a Hard-Drive Carrier Remove the screws from the slide rails on the hard-drive carrier and separate the hard drive from the carrier. See Figure 16-5 for PowerVault MD3600i and Figure 16-6 for PowerVault MD3620i. Figure 16-5. Removing and Installing a Hard Drive Into a 3.
book.book Page 216 Thursday, December 9, 2010 3:20 PM Figure 16-6. Removing and Installing a Hard Drive Into a 2.
book.book Page 217 Thursday, December 9, 2010 3:20 PM Installing a Hard Drive Into a Drive Carrier 1 Insert the hard drive into the hard-drive carrier with the connector end of the drive at the back. See Figure 16-5. 2 Align the screw holes on the hard drive with the back set of holes on the hard-drive carrier. When aligned correctly, the back of the hard drive is flush with the back of the hard-drive carrier. 3 Attach the four screws to secure the hard drive to the hard-drive carrier.
book.book Page 218 Thursday, December 9, 2010 3:20 PM 5 Connect all the power cables to the array. 6 Turn on the array and the host server. Figure 16-7. Removing and Installing a RAID Controller Module Blank 1 1 release latch 2 2 RAID controller module blank Installing a RAID Controller Module Blank To install a RAID controller module blank, align the blank with the RAID controller module bay and insert the blank into the chassis until it clicks into place.
book.book Page 219 Thursday, December 9, 2010 3:20 PM Removing a RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 220 Thursday, December 9, 2010 3:20 PM Installing a RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 221 Thursday, December 9, 2010 3:20 PM Figure 16-9. Opening and Closing the RAID Controller Module 1 1 screws (2) 3 indent 2 3 2 RAID controller module Closing the RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team.
book.book Page 222 Thursday, December 9, 2010 3:20 PM RAID Controller Module Backup Battery Unit Removing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty.
book.book Page 223 Thursday, December 9, 2010 3:20 PM Installing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty.
book.book Page 224 Thursday, December 9, 2010 3:20 PM Power Supply/Cooling Fan Module The array supports two hot-swappable power supply/cooling fan modules. While the array can operate temporarily with one module, both the modules must be present for proper system cooling. CAUTION: A single power supply/cooling fan module can be removed from a powered-on array for a maximum period of five minutes. Beyond that time, the array may automatically shut down to prevent damage.
book.book Page 225 Thursday, December 9, 2010 3:20 PM Figure 16-11.
book.book Page 226 Thursday, December 9, 2010 3:20 PM Installing a Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 227 Thursday, December 9, 2010 3:20 PM Control Panel Removing the Control Panel 1 Turn off the array and host server. 2 Disconnect all the power cables connected to the array. 3 Remove the hard drives from: – slots 0 to 2 in PowerVault MD3600i – slots 0 to 5 in PowerVault MD3620i See "Removing a Hard Drive" on page 212. NOTE: Mark each hard drive with it’s slot position as you remove it.
book.book Page 228 Thursday, December 9, 2010 3:20 PM Figure 16-14. Removing and Installing the Control Panel—PowerVault MD3620i 2 1 1 control panel 2 release pin Installing the Control Panel 1 Align the control panel with the slot on the array. 2 Slide the control panel into the array until: – The release tab clicks into place in PowerVault MD3600i. See Figure 16-13. – The release pin clicks into place in PowerVault MD3620i. See Figure 16-14. 3 Replace the hard drives in their respective slots.
book.book Page 229 Thursday, December 9, 2010 3:20 PM Backplane WARNING: Whenever you need to lift the array, get others to assist you. To avoid injury, do not attempt to lift the array by yourself. CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team.
book.book Page 230 Thursday, December 9, 2010 3:20 PM Figure 16-15.
book.book Page 231 Thursday, December 9, 2010 3:20 PM Figure 16-16. Removing and Installing the Backplane—PowerVault MD3600i 1 2 3 1 screws (5) 3 captive screw 2 backplane Figure 16-17.
book.book Page 232 Thursday, December 9, 2010 3:20 PM Installing the Backplane 1 Align the holes on the backplane with the holes on the array. 2 Tighten the captive screw to secure the backplane to the chassis. See Figure 16-16 for PowerVault MD3600i or Figure 16-17 for PowerVault MD3620i. 3 Replace the screws that secure the backplane to the chassis. See Figure 16-16 for PowerVault MD3600i or Figure 16-17 for PowerVault MD3620i.
book.book Page 233 Thursday, December 9, 2010 3:20 PM 17 Management: Firmware Inventory A storage array is made up of many components, which might include RAID controller modules, physical disks, and enclosure management modules (EMMs). Each of these components contains firmware. Some versions of the firmware are dependent on other versions of firmware. To capture information about all of the firmware versions in the storage array, view the firmware inventory.
book.
book.book Page 235 Thursday, December 9, 2010 3:20 PM 18 Management: System Interfaces Microsoft Services Virtual Disk Service The Microsoft Virtual Disk Service (VDS) is a component of the Windows operating system. The VDS component utilizes third-party vendor specific software modules, known as providers, to access and configure third-party storage resources, such as MD3600i Series storage arrays.
book.book Page 236 Thursday, December 9, 2010 3:20 PM VSS attaches to the service and uses it to coordinate the creation of snapshot virtual disks on the storage array. VSS-initiated snapshot virtual disks can be triggered through backup tools, known as requestors.
book.book Page 237 Thursday, December 9, 2010 3:20 PM 19 Troubleshooting: Your Storage Array Software Start-Up Routine Look and listen during the array’s start-up routine for the indications described in Table 19-1. For a description of the front- and back-panel indicators, see "Planning: About Your Storage Array" on page 23. Table 19-1. Start-Up Routine Indications Look/listen for Action Alert messages. See your storage management documentation.
book.book Page 238 Thursday, December 9, 2010 3:20 PM To launch the AMW, perform one of these actions: • On the Devices tab, in either the Tree view or the Table view, double-click a storage array. Alternatively, you can right-click a storage array and select Manage Storage Array from the pop-up menu. • On the Setup tab, select Manage a Storage Array. After the AMW opens, select the Physical tab to see the components in the storage array. A component that has a problem is indicated by a status icon.
book.book Page 239 Thursday, December 9, 2010 3:20 PM In the Table view, every managed storage array is listed once, regardless of the number of attachments it has in the Tree view. After the storage array has been contacted by MDSM, an icon representing its hardware status appears. Hardware status can be Optimal, Needs Attention, or Fixing.
book.book Page 240 Thursday, December 9, 2010 3:20 PM Table 19-3. Additional Status Icons Status Icon Adding a Storage Array Description The Contacting Storage Array icon is shown in the Tree view and Table view until the current status of each managed storage array is known. The Contacting Storage Array icon is shown in the EMW Status Bar and the AMW Status Bar and the tooltip shows Contacting Storage arrays.
book.book Page 241 Thursday, December 9, 2010 3:20 PM Storage Array Support Data You can gather various types of inventory, status, and performance data that can help troubleshoot any problem with the storage array. All the files are compressed into a single archive in a zipped-file format. You can forward the archive file to your Technical Support representative for troubleshooting and further analysis.
book.book Page 242 Thursday, December 9, 2010 3:20 PM NOTE: Enable only one collect support bundle data to a single client system. Setting multiple systems to collect data may potentially affect the storage array performance. To automatically collect the support bundle data: 1 In the AMW, select Advanced Troubleshooting Support Data Automatic Settings. 2 Select Automatically collect support data for critical events. 3 To change the location of the saved support bundle, click Change.
book.book Page 243 Thursday, December 9, 2010 3:20 PM • The version number for the management application programming interface (API). • The model ID for the RAID controller module board. • The collection status for each RAID controller module. If the status is Failed, the reason for failure is noted, and there is no trace file for the failed RAID controller module. To retrieve the trace buffers: 1 From the AMW, select Advanced Troubleshooting Support Data Retrieve Trace Buffers.
book.book Page 244 Thursday, December 9, 2010 3:20 PM Collecting Physical Disk Data You can use the Collect Physical Disk Data option to collect log sense data from all the physical disks on your storage array. Log sense data consists of statistical information that is maintained by each of the physical disks in your storage array. Your Technical Support representative can use this information to analyze the performance of your physical disks and for troubleshooting problems that might exist.
book.book Page 245 Thursday, December 9, 2010 3:20 PM Event Log You can use the Event Log Viewer to view a detailed list of events that occur in a storage array. The event log is stored on reserved areas on the storage array disks. It records configuration events and storage array component failures. WARNING: Use this option only under the guidance of your Technical Support representative. The event log stores approximately 8000 events before it replaces an event with a new event.
book.book Page 246 Thursday, December 9, 2010 3:20 PM Recovery Guru The Recovery Guru is a component of MDSM that diagnoses critical events on the storage array and recommends step-by-step recovery procedures for problem resolution. In the AMW, to display the Recovery Guru, perform one of these actions: • Click Recovery Guru • In the Support tab, click the Recover from Failure link. • From the Status pane on the Summary tab, click the Storage Array Needs Attention link. .
book.book Page 247 Thursday, December 9, 2010 3:20 PM 2 Perform one of these actions in the Storage Array Profile dialog: • View detailed information—Go to step 3. • Search the storage array profile—Go to step 4. • Save the storage array profile—Go to step 5. • Close the storage array profile—Go to step 6. 3 Select one of the tabs, and use the horizontal scroll bar and the vertical scroll bar to view the storage array profile information.
book.book Page 248 Thursday, December 9, 2010 3:20 PM Viewing the Logical Associations You can use the Associated Logical Elements option to view the logical associations among different virtual disks in a storage array. To view the associations for source virtual disks, snapshot virtual disks, and snapshot repository virtual disks: 1 In the AMW, select the Logical tab. 2 Select View Associated Logical Elements.
book.book Page 249 Thursday, December 9, 2010 3:20 PM Finding Nodes You can use the Find option to search for a particular node on the Logical tab, the Physical tab, or the Mappings tab of the Array Management Window. The search might be based on a particular node name, the RAID level, virtual disk capacity, or specific free capacity nodes.
book.book Page 250 Thursday, December 9, 2010 3:20 PM 7 To search for all Free Capacity nodes with a particular capacity, perform these steps: NOTE: This option is not available when the Search by name option is selected or from the Mappings tab. You must cancel the selection of the Search by name option to use this option. a Select Find all free capacity nodes. b Type the capacity in the GB box.
book.book Page 251 Thursday, December 9, 2010 3:20 PM 2 Select View Go To Snapshot Virtual Disk. The selection jumps to the associated snapshot virtual disk in the Logical pane. 3 Select View Go To Snapshot Repository Virtual Disk. The selection jumps to the associated snapshot repository virtual disk in the Logical pane. 4 Select View Go To Source Virtual Disk. The selection jumps to the associated source virtual disk in the Logical pane. 5 Select View Go To Target Virtual Disk.
book.book Page 252 Thursday, December 9, 2010 3:20 PM • Out-of-band managed storage array—Go to step 6. • In-band managed storage array – Go to step 12. 6 For an out-of-band managed storage array, ensure that the RAID controller modules are network accessible by using the ping command to make sure that the RAID controller module can be reached. Type one of these commands, and press .
book.book Page 253 Thursday, December 9, 2010 3:20 PM If you started the host system before you were connected to the RAID controller module in the storage array, the Host Context Agent software will not be able to detect the RAID controller modules. If this is the case, make sure that the connections are secure, and restart the Host Context Agent software.
book.book Page 254 Thursday, December 9, 2010 3:20 PM Locating a Physical Disk You can use the Locate Physical Disk option to physically locate and identify one or more of the physical disks in an expansion enclosure by activating physical disk LEDs. To locate the physical disk: 1 Select the Physical tab. 2 Select the physical disks that you want to locate. 3 Select Physical Disk Blink Physical Disk. The LEDs on the selected physical disks blink. 4 When you have located the physical disks, click OK.
book.book Page 255 Thursday, December 9, 2010 3:20 PM Locating an Expansion Enclosure You can use the Blink option to physically locate and identify an expansion enclosure in the storage array. The LED activation varies according to the type of expansion enclosure that you have. • If you have an expansion enclosure with a white LED, the Blink Expansion Enclosure operation causes the white LED on the expansion enclosure to come on. The LED does not blink.
book.book Page 256 Thursday, December 9, 2010 3:20 PM Capturing the State Information Use the Troubleshooting Capture State Information option to capture information about the current state of your storage array and save the captured information to a text file. You can then send the captured information to your Technical Support representative for analysis.
book.book Page 257 Thursday, December 9, 2010 3:20 PM SMrepassist Utility SMrepassist (replication assistance) is a host-based utility for Windows platforms. This utility is installed with MDSM. Use this utility before and after you create a virtual disk copy on a Windows operating system to ensure that all the memory-resident data for file systems on the target virtual disk is flushed and that the driver recognizes signatures and file system partitions.
book.book Page 258 Thursday, December 9, 2010 3:20 PM Unidentified Devices An unidentified node or device occurs when MDSM cannot access a new storage array. Causes for this error include network connection problems, the storage array is turned off, or the storage array does not exist. NOTE: Before beginning any recovery procedure, make sure that the Host Context Agent software is installed and running.
book.book Page 259 Thursday, December 9, 2010 3:20 PM b Make sure that the network can access the host by using the ping command in the following syntax: ping . If the network can access the host, continue to step c. If the network cannot access the host, skip to step d. c Remove the host with the unresponsive status from the MDSM, and add that host again. If the host returns to optimal status, you have completed this procedure.
book.book Page 260 Thursday, December 9, 2010 3:20 PM d Make sure that the applicable network configuration tasks have been done (for example, the IP addresses have been assigned to each controller). 5 Make sure that the controller firmware is compatible with MDSM on your management station. If the controller firmware was upgraded, the MDSM might not have access to the storage array. A new version of MDSM might be needed to manage the storage array with the new version of the controller firmware.
book.book Page 261 Thursday, December 9, 2010 3:20 PM Starting or Restarting the Host Context Agent Software The Host Context Agent software module is the software component that resides on the server or management station that communicates with the MD3600i Series storage arrays. The SMagent software automatically starts after you reboot the host. Windows To restart the SMagent software in Windows: 1 Click Start Settings Control Pane Administrative Tools Services.
book.
book.book Page 263 Thursday, December 9, 2010 3:20 PM Troubleshooting: Your Array 20 Safety First—For you and Your Array CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty.
book.book Page 264 Thursday, December 9, 2010 3:20 PM Troubleshooting Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 265 Thursday, December 9, 2010 3:20 PM Troubleshooting Array Cooling Problems CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 266 Thursday, December 9, 2010 3:20 PM c Reseat the EMM module and wait for 30 seconds. See Removing an EMM in the MD1200 and MD1220 Storage Enclosures Hardware Owner's Manual. d Turn on the server. e Check the EMM status LED. f If the LED does not turn green, replace the EMM. If the problem is not resolved, see "Getting Help" on page 273. • If EMM status LED is blinking amber (5 times per sequence), update the firmware to the latest supported firmware on both the EMMs.
book.book Page 267 Thursday, December 9, 2010 3:20 PM wait for up to 5 minutes to check if the LED has turned blue. See "Recovery Guru" on page 246. b If following the recovery guru procedures does not solve the problem, complete the following procedure to further troubleshoot the array. c Turn off the host server as appropriate. d Remove the RAID controller module and verify that the pins on the backplane and the RAID controller module are not bent.
book.book Page 268 Thursday, December 9, 2010 3:20 PM Troubleshooting Hard Drives CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 269 Thursday, December 9, 2010 3:20 PM Troubleshooting Array and Expansion Enclosure Connections 1 Verify that the RAID controller module port link status LED and the RAID controller module status LED are solid green for each port that is connected to a cable. If the LEDs are not solid green, see "Planning: RAID Controller Modules" on page 31. 2 Ensure that all the cables are attached correctly according to expansion enclosure mode you selected.
book.book Page 270 Thursday, December 9, 2010 3:20 PM 2 Remove the following components from the array. See "Management: Installing Array Components" on page 209. • Hard drives • RAID controller modules • Power supply/cooling fan modules • Control panel • Backplane 3 Let the system dry thoroughly for at least 24 hours. 4 Reinstall the components you removed in step 2. 5 Connect all the cables and turn on the array. If the array does not start properly, see "Getting Help" on page 273.
book.book Page 271 Thursday, December 9, 2010 3:20 PM Troubleshooting RAID Controller Modules Conditions Certain events can cause a RAID controller module to fail and/or shut down. Unrecoverable ECC memory or PCI errors, or critical physical conditions can cause lockdown. If your RAID storage array is configured for redundant access and cache mirroring, the surviving controller can normally recover without data loss or shutdown. Typical hard controller failures are detailed in the following sections.
book.book Page 272 Thursday, December 9, 2010 3:20 PM PCI Errors The storage array firmware can detect and only recover from PCI errors when the RAID controller modules are configured for redundancy. If a virtual disk uses cache mirroring, it fails over to its peer RAID controller module, which initiates a flush of the dirty cache.
book.book Page 273 Thursday, December 9, 2010 3:20 PM Getting Help 21 Contacting Dell For customers in the United States, call 800-WWW-DELL (800-999-3355). NOTE: If you do not have an active Internet connection, you can find contact information on your purchase invoice, packing slip, bill, or Dell product catalog. Dell provides several online and telephone-based support and service options. Availability varies by country and product, and some services may not be available in your area.
book.
book.
book.
book.
book.
book.
book.
book.
book.