book.
book.book Page 2 Tuesday, September 27, 2011 3:13 PM Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. ____________________ Information in this publication is subject to change without notice. © 2010–2011 Dell Inc. All rights reserved.
book.book Page 3 Tuesday, September 27, 2011 3:13 PM Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . About This Document . . . . . . . . . . . . . . . . . . Inside the Box of the Dell PowerVault MD3600i Series Storage Array. . . . . . . . . . . . . . . 19 . . . . 19 . . . . . . . . . . 20 Dell PowerVault Modular Disk Storage Manager . . . . . . . . . . . . . . . . . . 20 Dell PowerVault Modular Disk Configuration Utility . . . . . . . . . . . . . . . . . 20 . . . . .
book.book Page 4 Tuesday, September 27, 2011 3:13 PM 3 Planning: RAID Controller Modules . RAID Controller Modules . . . . . . . . . . . . . . . . RAID Controller Module Connectors and Features . . . . . . . . . . . . . . . . . . . . . . . 34 . . . . . . . . . 34 . . . . . . . . . . . . . . 35 . . . . . . . . . . . . . 35 . . . . . . . . . . . . . . . . . . 35 Cache Functions and Features . Write-Back Cache . . . . . . . . . . . . . . . . . Write-Through Cache . . . . . . . . . . . . . . .
book.book Page 5 Tuesday, September 27, 2011 3:13 PM Media Verification Cycle Time . . . . . . . . . . . . . . . . . 44 . . . . . . . . . . . . . . . . . . . . . 44 Virtual Disk Operations Limit Disk Group Operations. . . . . . . . . . . . . 45 . . . . . . . . . . . . . . . . . 45 RAID Level Migration . . . . . . . . . . . . . . . . Segment Size Migration . . . . . . . . . . . . . . Virtual Disk Capacity Expansion Disk Group Expansion 45 46 . . . . . . . . . . 46 . . . . . . . . . . . . .
book.book Page 6 Tuesday, September 27, 2011 3:13 PM 5 Configuration: Overview User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Array Management Window . . . . . . . . . . . . 63 Configuration: About Your Storage Array . . . . . . . . . . . . . . . . . . . . . 67 Out-of-Band and In-Band Management . Storage Arrays . . . . . . . . 67 . . . . . . . . . . . . . . . . . . . . . . 68 Adding Storage Arrays . . . . . . . . . . . . . . .
book.book Page 7 Tuesday, September 27, 2011 3:13 PM Setting the Storage Array RAID Controller Module Clocks . . . . . . . . . . . . . . . 7 Configuration: Using iSCSI . . . . 84 . . . . . . . . . . . 87 Changing the iSCSI Target Authentication . . . . . . . . . . . . 88 . . . . . . . . . . . . . . . . . 88 Entering Mutual Authentication Permissions . Creating CHAP Secrets . . . . . . . . . . . . . . . 89 . . . . . . . . . . . . . . . . 89 Initiator CHAP Secret .
book.book Page 8 Tuesday, September 27, 2011 3:13 PM 9 Configuration: About Your Host . . . . . . . Configuring Host Access. . . . . . . . . . . . . . . . . Using the Mappings Tab . . . . . . . . . . . . . . . . 100 . . . . . . . . . . . . . . . . . . 101 Defining a Host . . . . . . . . . . . . . . . . 102 Managing Host Groups. . . . . . . . . . . . . . . . . 103 . . . . . . . . . . . . . . Moving a Host to a Different Host Group . . . . . . . . . Host Topology . 103 . . . . . . . . . .
book.book Page 9 Tuesday, September 27, 2011 3:13 PM Choosing an Appropriate Physical Disk Type . Physical Disk Security with Self Encrypting Disk . . . . . . . . . . . . . . 121 . . . . . . . . . . . . 121 Creating a Security Key. . . . . . . . . . . . . . . 124 Changing a Security Key . . . . . . . . . . . . . . 126 Saving a Security Key . . . . . . . . . . . . . . . 128 Validate Security Key . . . . . . . . . . . . . . . . 129 Unlocking Secure Physical Disks.
book.book Page 10 Tuesday, September 27, 2011 3:13 PM Storage Partitioning . . . . . . . . . . . . . . . . . . . . . . . . . 148 Disk Group Expansion . . . . . . . . . . . . . . . 148 Virtual Disk Expansion . . . . . . . . . . . . . . 149 . . . . . . . . . . . . . . . 149 Disk Group and Virtual Disk Expansion . Using Free Capacity. Using Unconfigured Capacity . Disk Group Migration . . . . . . . . . . 149 . . . . . . . . . . . . . . . . . 150 Export Disk Group . . . . . . . . . . . . . .
book.book Page 11 Tuesday, September 27, 2011 3:13 PM Creating a Snapshot Virtual Disk Using the Advanced Path . . . . . . . . . . . . About the Advanced Path . . . . . . . . 162 . . . . . . . . . . . . . 162 Preparing Host Servers to Create the Snapshot Using the Advanced Path . Creating the Snapshot Using the Advanced Path . 166 . . . . . . . 167 . . . . . . . . . . . . . 169 Specifying Snapshot Virtual Disk Names . Snapshot Repository Capacity. Disabling a Snapshot Virtual Disk. 172 . .
book.book Page 12 Tuesday, September 27, 2011 3:13 PM Virtual Disk Read/Write Permissions . . . . . . . . . 182 . . . . . . . . . . . . 183 . . . . . . . . . . . . . 184 . . . . . . . . . . . . . . . . . 184 Virtual Disk Copy Restrictions . Creating a Virtual Disk Copy . Before you Begin Virtual Disk Copy and Modification Operations Create Copy Wizard . . . . . . . . . . . . . . 185 . . . . . . . . . . . . . . . 185 Failed Virtual Disk Copy . . . . . . . . . . . . . . . . . . 186 . . . .
book.book Page 13 Tuesday, September 27, 2011 3:13 PM 13 Configuration: Premium Feature— Upgrading to High-Performance-Tier . . . . . . . . . 14 Configuration: Device Mapper Multipath for Linux . . . . . . . . . Overview . . . . . 193 . . . . . . . 195 195 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 . . . . . . . . . . . . . . . . . . . . 196 Using DM Multipathing Devices Prerequisites Device Mapper Configuration Steps . . . . . . 202 . . . . . . . . . . .
book.book Page 14 Tuesday, September 27, 2011 3:13 PM Media Errors and Unreadable Sectors . . . . . . . . 216 . . . . . . . . . . . . 219 Recommended Tools . . . . . . . . . . . . . . . . . . 219 Front Bezel (Optional) . . . . . . . . . . . . . . . . . 220 16 Management: Installing Array Components . . . . . . . . . . . . . . . . . 220 . . . . . . . . . . . . . 220 . . . . . . . . . . . . . . . . . . . . . . 221 Removing the Front Bezel . Installing the Front Bezel Hard Drives .
book.book Page 15 Tuesday, September 27, 2011 3:13 PM Power Supply/Cooling Fan Module . Removing a Power Supply/Cooling Fan Module . . . . . . . . . . . . . . . . . . . . . 234 . . . . . . . . . 236 . . . . . . . . . . . . . . . . . . . . . . 237 Installing a Power Supply/Cooling Fan Module . . . . . . . . . . . . Control Panel. 234 . . . . . . . . . . Removing the Control Panel . . . . . . . . . . . . 237 Installing the Control Panel . . . . . . . . . . . . . 238 . . . . . . . . . . . . .
book.book Page 16 Tuesday, September 27, 2011 3:13 PM Retrieving Trace Buffers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 . . . . . . . . . . . . . . . . . . . . . . . 255 Collecting Physical Disk Data . Event Log . Recovery Guru . . . . . . . . . . . . . . . . . . . . . Storage Array Profile. . . . . . . . . . . . . . . . . . 256 256 Viewing the Logical Associations . . . . . . . . . . . 258 Viewing the Physical Associations . . . . . . . . . . 258 . . . . . . . . . . . .
book.book Page 17 Tuesday, September 27, 2011 3:13 PM Troubleshooting Storage Array Startup Failure . . . . . 273 . . . . . . . . 273 . . . . . . . . . 273 Troubleshooting Loss of Communication Troubleshooting External Connections Troubleshooting Power Supply/Cooling Fan Module. . . . . . . . . . . . . . . . Troubleshooting Array Cooling Problems . Troubleshooting Expansion Enclosure Management Modules . . . . . . . . . . . . . . . . 275 . . . . . . . . . 275 . . . . . . . 276 . . . . . . .
book.book Page 18 Tuesday, September 27, 2011 3:13 PM Index 18 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
book.book Page 19 Tuesday, September 27, 2011 3:13 PM 1 Introduction NOTE: Unless specified, MD3600i Series represents Dell PowerVault MD3600i and Dell PowerVault MD3620i storage arrays. WARNING: See the Safety, Environmental, and Regulatory Information document for important safety information before following any procedures listed in this document. About This Document This document familiarizes you with the functions of the Dell PowerVault MD3600i Series storage array.
book.book Page 20 Tuesday, September 27, 2011 3:13 PM • Mounting rails (2) (optional) • MD3600i Series resource media • Rack Installation Instructions • Getting Started With Your System (provides information on enclosure features, the procedure to set up your enclosure, and technical specifications) MD3600i Series Storage Array The MD3600i Series is a 2U rack-mounted external redundant array of independent disks (RAID) storage array capable of accommodating up to twelve 3.5" or twenty four 2.5" 6.
book.book Page 21 Tuesday, September 27, 2011 3:13 PM Other Information You May Need WARNING: See the safety and regulatory information that shipped with your system. Warranty information may be included within this document or as a separate document. NOTE: All the documents, unless specified otherwise, are available at support.dell.com/manuals. • The Getting Started Guide provides an overview of setting up and cabling your storage array.
book.
book.book Page 23 Tuesday, September 27, 2011 3:13 PM 2 Planning: About Your Storage Array Overview The Dell PowerVault MD3600i Series storage array is designed for high availability, offering redundant access to data storage. It supports single and dual RAID controller configuration. The MD3600i Series storage array provides 1 GBase-T or 10 GBase-T connectivity to the host server and enables access to 64 physical hosts.
book.book Page 24 Tuesday, September 27, 2011 3:13 PM Hardware Features Front-Panel Features and Indicators Figure 2-1. Front-Panel Features and Indicators—Dell PowerVault MD3600i 1 2 3 4 5 6 Figure 2-2.
book.book Page 25 Tuesday, September 27, 2011 3:13 PM Figure 2-3. Front-Bezel Features and Indicators 1 2 3 Item Indicator, Button, or Connector 1 Enclosure status LED Icon Description The enclosure status LED lights when the enclosure power is on. Lights blue during normal operation. Blinks blue when a host server is identifying the enclosure or when the system identification button is pressed. Lights amber as enclosure boots or is reset.
book.book Page 26 Tuesday, September 27, 2011 3:13 PM Item Indicator, Button, or Connector Icon Description 3 Split mode LED This LED must be unlit as the split mode function is not supported by the MD3600i Series storage arrays. 4 System identification button The system identification button on the front control panel can be used to locate a particular enclosure within a rack.
book.book Page 27 Tuesday, September 27, 2011 3:13 PM Back-Panel Features and Indicators Figure 2-4.
book.book Page 28 Tuesday, September 27, 2011 3:13 PM Hard-Drive Indicator Patterns Figure 2-5.
book.book Page 29 Tuesday, September 27, 2011 3:13 PM Hard-Drive Status Indicator Pattern Condition Off The physical disk: • is not yet discovered by the host server • is spun down for removal • is not supported for the RAID controller module or is not in the physical disk slot NOTE: The drive status indicator remains off until all hard drives are initialized after system power is turned on. Drives are not ready for insertion or removal during this time.
book.book Page 30 Tuesday, September 27, 2011 3:13 PM Power Indicator Codes and Features Figure 2-6. Power Indicator Codes and Features 1 2 3 4 5 Item LED Type 1 DC power Icon Description The LED lights green when the DC output voltage is within the limit. If this LED is off, it indicates that the DC output voltage is not within the limit. 2 Power supply/cooling fan fault The LED lights amber when the DC output voltage is not within the limit or a fault with the fan is detected.
book.book Page 31 Tuesday, September 27, 2011 3:13 PM 3 Planning: RAID Controller Modules RAID Controller Modules The RAID controller modules provide high-performance, advanced virtual disk configuration, and fault-tolerant disk subsystem management. Each RAID controller module contains 2 GB of cache that is mirrored with the other controller's cache for high availability and is protected by a batterypowered cache offload mechanism.
book.book Page 32 Tuesday, September 27, 2011 3:13 PM RAID Controller Module Connectors and Features Figure 3-1. MD3600i Series iSCSI RAID Controller Module 1 6 3 2 7 8 9 10 11 12 13 14 4 15 16 5 17 Item Component Function 1 SAS OUT port Provides SAS connection for cabling to an expansion enclosure. 2 iSCSI IN port 0 Provides host-to-controller iSCSI 1/10 Gbps Ethernet connection. 3 iSCSI IN port 1 Provides host-to-controller iSCSI 1/10 Gbps Ethernet connection.
book.book Page 33 Tuesday, September 27, 2011 3:13 PM Item Component Function 8 Controller power LED Lights green when controller is turned on. Off when controller is not turned on. 9 Controller fault LED Lights amber when controller fault detected. Off when controller operating normally. 10 iSCSI IN port activity Lights green when there is no activity on connection. LED Blinks green when there is activity on connection. Off when link is down.
book.book Page 34 Tuesday, September 27, 2011 3:13 PM RAID Controller Module—Additional Features Battery Backup Unit Each RAID controller contains a two-cell Lithium ion nanopolymer battery backup unit (BBU). It provides power to the RAID controller module in the event of a power outage. For information on removing and installing the BBU, see "RAID Controller Module Backup Battery Unit" on page 232.
book.book Page 35 Tuesday, September 27, 2011 3:13 PM System Password Reset To reset a forgotten password, push and hold down the password reset switch for at least 5 seconds. The password is deleted. See Figure 3-1 to locate the password reset switch. The RAID controller module allows you to change the password. For more information about setting your password, see "Setting a Password" on page 73. NOTE: The reset switch can be accessed by using a small object, such as the tip of a pen.
book.book Page 36 Tuesday, September 27, 2011 3:13 PM Write-Through Cache In write-through cache, data is written to the physical disk before completion status is returned to the host operating system. Write-through cache is considered more robust than write-back cache, since a power failure is less likely to cause loss of data. The RAID controller automatically switches to write-through if either cache mirroring is disabled or the battery is missing or there is a fault condition.
book.book Page 37 Tuesday, September 27, 2011 3:13 PM 4 Planning: MD3600i Series Storage Array Terms and Concepts This chapter describes the storage array concepts, which help in configuring and operating the Dell PowerVault MD3600i Series storage arrays. Physical Disks, Virtual Disks, and Disk Groups Physical disks in your storage array provide the physical storage capacity for your data.
book.book Page 38 Tuesday, September 27, 2011 3:13 PM Physical Disks Only Dell supported 6.0-Gbps SAS physical disks are supported in the storage array. If the storage array detects unsupported physical disks, it marks the disk as unsupported and the physical disk becomes unavailable for all operations. NOTE: The MD3600i Series storage enclosure must contain at least two physical disks for proper operation. This is necessary because the physical disks are used to store configuration information.
book.book Page 39 Tuesday, September 27, 2011 3:13 PM Table 4-1. RAID Controller Physical Disk States (continued) Status Mode Description Physical Disk Status LED Pending Failure Assigned, Unassigned, Hot Spare in use, or Hot Spare Standby A Self-Monitoring Analysis and Reporting Technology (SMART) error is detected on the physical disk in the indicated slot.
book.book Page 40 Tuesday, September 27, 2011 3:13 PM 3 Provide host server access. 4 Create mappings to associate the virtual disks with the host servers. NOTE: Host server access must be created before mapping virtual disks. Disk groups are always created in the unconfigured capacity of a storage array. Unconfigured capacity is the available physical disk space not already assigned in the storage array. Virtual disks are created within the free capacity of a disk group.
book.book Page 41 Tuesday, September 27, 2011 3:13 PM RAID Levels RAID levels determine the way in which data is written to physical disks. Different RAID levels provide different levels of accessibility, redundancy, and capacity. Using multiple physical disks has the following advantages over using a single physical disk: • Placing data on multiple physical disks (striping) allows input/output (I/O) operations to occur simultaneously and improve performance.
book.book Page 42 Tuesday, September 27, 2011 3:13 PM I/O performance is greatly improved by spreading the I/O load across many physical disks. Although it offers the best performance of any RAID level, RAID 0 lacks data redundancy. Select this option only for non-critical data, because failure of one physical disk results in the loss of all data. Examples of RAID 0 applications include video editing, image editing, prepress applications, or any application that requires high bandwidth.
book.book Page 43 Tuesday, September 27, 2011 3:13 PM actual storage. RAID 10 is automatically used when a RAID level of 1 is chosen with four or more physical disks. RAID 10 works well for mediumsized databases or any environment that requires high performance and fault tolerance and moderate-to-medium capacity. Segment Size Disk striping enables data to be written across multiple physical disks. Disk striping enhances performance because striped disks are accessed simultaneously.
book.book Page 44 Tuesday, September 27, 2011 3:13 PM Foreground Initialization The storage array supports foreground initialization for virtual disks. All access to the virtual disk is blocked during foreground initialization. During foreground initialization, zeros (0x00) are written to every sector of the virtual disk. The virtual disk is available after foreground initialization is completed.
book.book Page 45 Tuesday, September 27, 2011 3:13 PM The storage array tracks the cycle for each disk group independent of other disk groups on the controller and creates a checkpoint. If the media verification operation on a disk group is preempted or blocked by another operation on the disk group, the storage array resumes after the current cycle.
book.book Page 46 Tuesday, September 27, 2011 3:13 PM Segment Size Migration Segment size refers to the amount of data (in KB) that the storage array writes on a physical disk in a virtual disk before writing data on the next physical disk. Valid values for the segment size are 8 KB, 16 KB, 32 KB, 64 KB, 128 KB, 256 KB, and 512 KB. Dynamic segment size migration enables the segment size of a given virtual disk to be changed.
book.book Page 47 Tuesday, September 27, 2011 3:13 PM Disk Group Defragmentation Defragmenting consolidates the free capacity in the disk group into one contiguous area. Defragmentation does not change the way in which the data is stored on the virtual disks. Disk Group Operations Limit The maximum number of active, concurrent disk group processes per installed RAID controller module is one.
book.book Page 48 Tuesday, September 27, 2011 3:13 PM • Segment size migration • Disk group expansion • Disk group defragmentation The priority of each of these operations can be changed to address performance requirements of the environment in which the operations are to be executed. NOTE: Setting a high priority level impacts storage array performance. It is not advisable to set priority levels at the maximum level.
book.book Page 49 Tuesday, September 27, 2011 3:13 PM recognize the migrating metadata and that data is lost. In this case, MD3600i storage array initializes the physical disks and marks them as unconfigured capacity. NOTE: Only disk groups and associated virtual disks with all member physical disks present can be migrated from one storage array to another. It is recommended that you only migrate disk groups that have all their associated member virtual disks in an optimal state.
book.book Page 50 Tuesday, September 27, 2011 3:13 PM • Migrating virtual disks to a storage array with no existing physical disks— Turn off the destination storage array, when migrating disk groups or a complete set of physical disks from a storage array to another storage array that has no existing physical disks. After the destination storage array is turned on and has successfully recognized the newly migrated physical disks, migration operations can continue.
book.book Page 51 Tuesday, September 27, 2011 3:13 PM Host Types A host server is a server that accesses a storage array. Host servers are mapped to the virtual disks and use one or more iSCSI initiator ports. Host servers have the following attributes: • Host name—A name that uniquely identifies the host server. • Host group (used in Cluster solutions only)—Two or more host servers associated together to share access to the same virtual disks. This host group is a logical entity you can create in MDSM.
book.book Page 52 Tuesday, September 27, 2011 3:13 PM Snapshots are used to recover previous versions of files that have changed since the snapshot was taken. Snapshots are implemented using a copy on write algorithm, which makes a backup copy of data the instant a write occurs to the virtual disk. Data on a virtual disk is copied to the snapshot repository before it is modified. Snapshots can be created instantaneously or can be scheduled and take up less overhead than a full physical copy process.
book.book Page 53 Tuesday, September 27, 2011 3:13 PM • Restore snapshot virtual disk data to the source virtual disk. Virtual disk copy generates a full copy of data from the source virtual disk to the target virtual disk in a storage array and can be performed either online or offline. Source Virtual Disk When you create a virtual disk copy, a copy pair consisting of a source virtual disk and a target virtual disk is created on the same storage array.
book.book Page 54 Tuesday, September 27, 2011 3:13 PM Using Snapshot and Disk Copy Together You can use the Snapshot Virtual Disk and Virtual Disk Copy premium features together to back up data on the same storage array, or to restore the data on the snapshot virtual disk to its original source virtual disk.
book.book Page 55 Tuesday, September 27, 2011 3:13 PM controller module owner of a virtual disk after it is created. If a host is connected to only one RAID controller module, the preferred owner must manually be assigned to the RAID controller module that the host can access.
book.book Page 56 Tuesday, September 27, 2011 3:13 PM Load Balancing A load balance policy is used to determine which path is used to process I/O. Multiple options for setting the load balance policies let you optimize I/O performance when mixed host interfaces are configured.
book.book Page 57 Tuesday, September 27, 2011 3:13 PM Monitoring MD3600i Series System Performance You can use the Performance Monitor to select virtual disks and RAID controller modules to monitor or to change the polling interval. Keep the following guidelines in mind when using the Performance Monitor: • The Performance Monitor does not dynamically update its display if any configuration changes occur while the window is open.
book.book Page 58 Tuesday, September 27, 2011 3:13 PM Each time the polling interval elapses, the Performance Monitor queries the storage array again and updates the statistics in the table. 5 Click Start. Values are displayed for the selected storage arrays in the Performance Monitor data table. The table is updated at the interval specified in the Polling Interval setting. 6 Click Update to force an immediate poll of the storage array. 7 Click Stop to stop monitoring the storage array.
book.book Page 59 Tuesday, September 27, 2011 3:13 PM Table 4-3.
book.
book.book Page 61 Tuesday, September 27, 2011 3:13 PM Configuration: Overview 5 Dell PowerVault Modular Disk Storage Manager (MDSM) online help contains information on how to use the MDSM application to perform the configuration and management tasks described in this document. You can access online help by clicking Help located at the top right corner of MDSM interface. For information on installing the MDSM, see the MD3600i and MD3620i Storage Array’s Deployment Guide at support.dell.com/manuals.
book.book Page 62 Tuesday, September 27, 2011 3:13 PM Enterprise Management Window The EMW provides high-level management of storage arrays. When you start MDSM, the EMW is displayed. The EMW has the: • Devices tab—Provides information about the storage arrays. • Setup tab—Presents the initial setup tasks that guide you through adding storage arrays and configuring alerts.
book.book Page 63 Tuesday, September 27, 2011 3:13 PM • Obtain information about the firmware inventory including the version of the RAID controller modules, physical disks, and the enclosure management modules (EMMs) in the storage array. Inheriting the System Settings Use the Inherit System Settings option to import the operating system theme settings into the MDSM. Importing system theme settings affects features like font type, font size, color, and contrast in the MDSM.
book.book Page 64 Tuesday, September 27, 2011 3:13 PM • Disk groups and virtual disks • Logical tab—You can view the organization of the storage array by virtual disks, disk groups, free capacity nodes, and any unconfigured capacity for the storage array. • Physical tab—You can view the organization of the storage array by RAID controller modules, physical disks, and other hardware components. • Mappings tab—You can define the hosts, host groups, and host ports.
book.
book.
book.book Page 67 Tuesday, September 27, 2011 3:13 PM 6 Configuration: About Your Storage Array Out-of-Band and In-Band Management You can manage a storage array in two ways: • Out-of-band management • In-band management Out-of-Band Management In the out-of-band management method, data is separate from commands and events. Data travels through the host-to-controller interface, while commands and events travel through the management port Ethernet cables.
book.book Page 68 Tuesday, September 27, 2011 3:13 PM In-Band Management Using in-band management, commands, events, and data travel through the host-to-controller interface. Unlike out-of-band management, commands and events are mixed with data. NOTE: For detailed information on setting up in-band and out-of-band management see the Deployment Guide. When you add storage arrays by using this management method, you need to specify only the host name or IP address of the host.
book.book Page 69 Tuesday, September 27, 2011 3:13 PM NOTE: Verify that your host or management station network configuration— including station IP address, subnet mask, and default gateway—is correct before adding a new storage array using the Automatic option. NOTE: For Linux, set the default gateway so that broadcast packets are sent to 255.255.255.0. For Red Hat Enterprise Linux, if no gateway exists on the network, set the default gateway to the IP address of the NIC.
book.book Page 70 Tuesday, September 27, 2011 3:13 PM • In-band management—Enter a name or an IP address for the Host through which the storage array is attached to the network. NOTE: When adding a storage array using in-band management with iSCSI, a session must first be established between the initiator on the host server and the storage array. For more information, see "Configuration: Using iSCSI" on page 87.
book.book Page 71 Tuesday, September 27, 2011 3:13 PM • Configure iSCSI host ports—Configure network parameters for each iSCSI host port automatically or specify the configuration information for each iSCSI host port. • Configure the storage array—Create disk groups, virtual disks, and hot spare physical disks by using the Automatic configuration method or the Manual configuration method. For more information, see the PowerVault Modular Disk Storage Manager online help topics.
book.book Page 72 Tuesday, September 27, 2011 3:13 PM Locating Storage Arrays You can use the Blink option to physically locate and identify a storage array. NOTE: If the LEDs from the Blink Storage Array operation do not stop blinking, select Stop All Indications to stop the process manually. To locate the storage array: 1 Select the relevant storage array and: • In the EMW, right-click the appropriate storage array, and select Blink Storage Array.
book.book Page 73 Tuesday, September 27, 2011 3:13 PM The Name/Rename Storage Arrays dialog is displayed. 2 Select the relevant storage array from the Select storage array table. If you do not know the name or physical location of the storage array, click Blink. After locating the storage array, click OK to turn off the LEDs. The name of the storage array is displayed in the Storage array name. 3 In Storage array name, type the new name of the storage array.
book.book Page 74 Tuesday, September 27, 2011 3:13 PM • Select the Setup tab, and then click Set a Storage Array Password. • In the AMW, select the Logical tab, right-click and select Set Password. The Set Password dialog is displayed. 3 If you are resetting the password, type the Current password. NOTE: If you are setting the password for the first time, leave the Current password blank. 4 Type the New password. 5 Re-type the new password in Confirm new password.
book.book Page 75 Tuesday, September 27, 2011 3:13 PM Viewing Storage Array Connections You can use the View Connections option to view the expansion enclosures connected to the RAID controller module. To view the storage array connections: 1 From the toolbar in AMW, select Storage Array View Connections. The :Connections dialog is displayed. 2 Click the column name to sort the connections according to your preference. 3 Click Close.
book.book Page 76 Tuesday, September 27, 2011 3:13 PM Removing Storage Arrays You can remove a storage array from the list of managed arrays if you no longer want to manage it from a specific storage management station. Removing a storage array does not affect the storage array or its data in any way. Removing a storage array simply removes it from the list of storage arrays that are displayed in the drop-down list in the Array Selector. If a storage array is accidentally removed, it can be added again.
book.book Page 77 Tuesday, September 27, 2011 3:13 PM Displaying Failover Alert You can change the failover alert delay for a storage array. The failover alert delay lets you delay the logging of a critical event if the multi-path driver transfers virtual disks to the non-preferred controller. If the multi-path driver transfers the virtual disks back to the preferred controller within the specified delay period, a critical event is not logged.
book.book Page 78 Tuesday, September 27, 2011 3:13 PM Changing Expansion Enclosure ID Numbers When an MD1200 series expansion enclosure is connected to an MD3600i Series storage array for the first time, an enclosure ID number is assigned and maintained by the expansion enclosure. This enclosure ID number is also shown in the MDSM and can be changed if required. To change the enclosure ID numbers: 1 In the AMW, select the storage array, and select Storage Array Change Enclosure ID.
book.book Page 79 Tuesday, September 27, 2011 3:13 PM Configuring Alert Notifications MDSM can send an alert for any condition on the storage array that requires your attention. Alerts can be sent as e-mail messages or as Simple Network Management Protocol (SNMP) trap messages. You can configure alert notifications either for all the storage arrays or a single storage array. To configure alert notifications for all storage arrays: 1 In the EMW, select the Setup tab. 2 Select Configure Alerts.
book.book Page 80 Tuesday, September 27, 2011 3:13 PM • All storage arrays—Select this option to send an e-mail alert about events on all storage arrays. • An individual storage array—Select this option to send an e-mail alert about events that occur on only a specified storage array. These results occur, depending on your selection: • If you selected all storage arrays, the Configure Alerts dialog is displayed.
book.book Page 81 Tuesday, September 27, 2011 3:13 PM • Validating an e-mail address—Type the e-mail address in Email address or select the e-mail address in the Configured email addresses area, and click Test. A test e-mail is sent to the selected e-mail address. A dialog with the results of the test and any error is displayed. 8 For the selected e-mail address, in Information To Send, select: • Event Only—The e-mail alert contains only the event information. This alert type is the default.
book.book Page 82 Tuesday, September 27, 2011 3:13 PM Configuring SNMP Alerts To add a management console to the list of addresses configured to receive SNMP alerts: 1 Open the Configure Alerts dialog by performing one of these actions: • In the Tree view or the Table view on the Devices tab in the EMW, select a node, and select Edit Configure Alerts. Go to step 3. • In the Setup tab in the EMW, select Configure Alerts. Go to step 2.
book.book Page 83 Tuesday, September 27, 2011 3:13 PM • Replacing an SNMP address—Select the SNMP address in the Configured SNMP addresses area, type the replacement community name in Community name and the trap destination in Trap destination, and click Replace. • Deleting an SNMP address—Select the SNMP address in the Configured SNMP addresses area, and click Delete. • Validating an SNMP address—Select the SNMP address in the Configured SNMP addresses area, and click Test.
book.book Page 84 Tuesday, September 27, 2011 3:13 PM A learn cycle starts automatically when you install a new battery module. Learn cycles for batteries in both RAID controller modules in a duplex system occur simultaneously. Learn cycles are scheduled to start automatically at regular intervals, at the same time and on the same day of the week. The interval between cycles is described in weeks. Use the following guidelines to adjust the interval: • You can use the default interval.
book.book Page 85 Tuesday, September 27, 2011 3:13 PM 1 In the AMW, select Storage Array Synchronize RAID Controller Module Clocks. 2 If a password is set, in the Enter Password dialog, type the current password for the storage array, and click Synchronize. The RAID controller module clocks are synchronized with the storage management station.
book.
book.book Page 87 Tuesday, September 27, 2011 3:13 PM Configuration: Using iSCSI 7 Changing the iSCSI Target Authentication 1 In the AMW, select the Setup tab. 2 Select Manage iSCSI Settings. The Manage iSCSI Settings window is displayed and by default, the Target Authentication tab is selected. To change the authentication settings, select: • None—If you do not require initiator authentication. If you select None, any initiator can access the target.
book.book Page 88 Tuesday, September 27, 2011 3:13 PM Entering Mutual Authentication Permissions Mutual authentication or two-way authentication enables a client or a user to verify themselves to a host server and for the host server to validate itself to the user. This validation is accomplished in such a way that both parties are sure of the other’s identity. To add mutual authentication permissions: 1 In the AMW, select the Setup tab. 2 Select Manage iSCSI Settings.
book.book Page 89 Tuesday, September 27, 2011 3:13 PM Initiator CHAP Secret The initiator CHAP secret is set on the host using the iSCSI initiator configuration program provided with the host operating system. If you are using the mutual authentication method, you must define the initiator CHAP secret when you set up the host. This must be the same CHAP secret that is defined for the target when defining mutual authentication settings.
book.book Page 90 Tuesday, September 27, 2011 3:13 PM Changing the iSCSI Target Identification You cannot change the iSCSI target name, but you can associate an alias with the target for simpler identification. Aliases are useful because the iSCSI target names are not intuitive. Provide an iSCSI target alias that is meaningful and easy to remember. To change the iSCSI target identification: 1 In the AMW, select the Setup tab. 2 Select Manage iSCSI Settings. The Manage iSCSI Settings window is displayed.
book.book Page 91 Tuesday, September 27, 2011 3:13 PM • Select Specify Configuration, and type the IPv4 address to activate the target discovery. • Type the iSNS server IP address in the IPv6 settings area to activate the target discovery. After you manually enter an IP address, you can also click Advanced to configure the customized TCP listening ports. If you do not want to allow discovery sessions that are not named, select the Disallow un-named discovery sessions.
book.book Page 92 Tuesday, September 27, 2011 3:13 PM 4 In the Configured Ethernet port speed list, select a network speed for the iSCSI host port. The network speed values in the Configured Ethernet port speed list depend on the maximum speed that the network can support. Only the network speeds that are supported are displayed. All of the host ports on a single controller operate at the same speed. An error is displayed if different speeds are selected for the host ports on the same controller.
book.book Page 93 Tuesday, September 27, 2011 3:13 PM Advanced iSCSI Host Ports Settings NOTE: Configuring the advanced iSCSI host ports settings is optional. Use the advanced settings for the individual iSCSI host ports to specify the TCP frame size, the virtual LAN, and the network priority. Table 7-2. Advanced iSCSI Host Port Settings Setting Description Virtual LAN (VLAN) A method of creating independent logical networks within a physical network. Several VLANs can exist within a network.
book.book Page 94 Tuesday, September 27, 2011 3:13 PM Viewing or Ending an iSCSI Session You may want to end an iSCSI session for the following reasons: • Unauthorized access—If an initiator whom you consider to not have access is logged on, you can end the iSCSI session. Ending the iSCSI session forces the initiator to log off the storage array. The initiator can log on if None authentication method is available.
book.book Page 95 Tuesday, September 27, 2011 3:13 PM Viewing iSCSI Statistics and Setting Baseline Statistics To view iSCSI statistics and set baseline statistics: 1 In the AMW toolbar, select Storage Array iSCSI Statistics. The View iSCSI Statistics window is displayed. 2 Select the iSCSI statistic type you want to view in the iSCSI Statistics Type area.
book.book Page 96 Tuesday, September 27, 2011 3:13 PM Edit, Remove, or Rename Host Topology If you give access to the wrong host or the wrong host group, you can remove or edit the host topology. Follow the appropriate procedures given in Table 7-3 to correct the host topology: Table 7-3. Host Topology Actions Desired Action Steps Move a host 1 Click the Mappings tab. Move a host group 2 Select the Host that you want to move, and then click Mappings Move.
book.book Page 97 Tuesday, September 27, 2011 3:13 PM Configuration: Event Monitor 8 An event monitor is provided with Dell PowerVault Modular Disk Storage Manager (MDSM). The event monitor runs continuously in the background and monitors activity on the managed storage arrays. If the event monitor detects any critical problems, it can notify a host or remote system using email, Simple Network Management Protocol (SNMP) trap messages, or both.
book.book Page 98 Tuesday, September 27, 2011 3:13 PM Enabling or Disabling the Event Monitor You can enable or disable the event monitor at any time. Disable the event monitor if you do not want the system to send alert notifications. If you are running the event monitor on multiple systems, disabling the event monitor on all but one system prevents the sending of duplicate messages.
book.book Page 99 Tuesday, September 27, 2011 3:13 PM Configuration: About Your Host 9 Configuring Host Access Dell PowerVault Modular Disk Storage Manager (MDSM) software is comprised of multiple modules. One of these modules is the Host Context Agent, which is installed as part of the MDSM installation and runs continuously in the background. If the Host Context Agent is running on a host, the host and the host ports connected from it to the storage array are automatically detected by MDSM.
book.book Page 100 Tuesday, September 27, 2011 3:13 PM The host topology is reconfigurable. You can perform the following tasks: • Create a host and assign an alias or user label. • Add or associate a new host port identifier to a particular host. • Change the host port identifier alias or user label. • Move or associate a host port identifier to a different host. • Replace a host port identifier with a new host port identifier.
book.book Page 101 Tuesday, September 27, 2011 3:13 PM Defining a Host You can use the Define Host Wizard in the AMW to define a host for a storage array. Either a known unassociated host port identifier or a new host port identifier can be added. NOTE: A user label must be specified before the host port identifier may be added (the add button is disabled until one is entered). To define a host: 1 In the AMW, select the Mappings tab and select the appropriate storage array.
book.book Page 102 Tuesday, September 27, 2011 3:13 PM The Specify Host Type window is displayed. 7 In Host type, select the relevant operating system for the host. The Host Group Question window is displayed. 8 In this window, you can select: • Yes—this host shares access to the same virtual disks with other hosts. • No—this host does NOT share access to the same virtual disks with other hosts. 9 Click Next. If you select Yes, the Specify Host Group window is displayed. If you select No, see step 11.
book.book Page 103 Tuesday, September 27, 2011 3:13 PM Managing Host Groups A host group is a logical entity of two or more hosts that share access to specific virtual disks on the storage array. You create host groups with MDSM. All hosts in a host group must have the same host type (operating system). In addition, all hosts in the host group must have special software, such as clustering software, to manage virtual disk sharing and accessibility.
book.book Page 104 Tuesday, September 27, 2011 3:13 PM Removing a Host From a Host Group You can remove a host from the Topology pane on the Mappings tab of the Array Management Window. For more information, see "Removing a Host Group" on page 105. Moving a Host to a Different Host Group To move a host to a different host group: 1 In the AMW, select the Mappings tab, select the host node in the Topology pane. 2 Perform one of these actions: • Select Mappings Move.
book.book Page 105 Tuesday, September 27, 2011 3:13 PM Removing a Host Group To remove a host group: 1 In the AMW, select the Mappings tab, select the host node in the Topology pane. 2 Perform one of these actions: • Select Mappings Remove. • Right-click the host node, and select Remove from the pop-up menu. The Remove dialog is displayed. 3 Click Yes. The selected host group is removed. For more information, see the PowerVault Modular Disk Storage Manager online help topics.
book.book Page 106 Tuesday, September 27, 2011 3:13 PM Starting or Stopping the Host Context Agent The host context agent discovers the host topology and starts and stops with the host. The topology discovered by the Host Context Agent can be viewed by clicking Configure Host Access (Automatic) in the Configure tab in the MDSM. You must stop and restart the Host Context Agent to see the changes to the host topology if: • A new storage array is attached to the host server.
book.book Page 107 Tuesday, September 27, 2011 3:13 PM I/O Data Path Protection You can have multiple host-to-array connections for a host. Ensure that you select all the connections to the array when configuring host access to the storage array. NOTE: See the Deployment Guide for more information on cabling configurations. NOTE: For more information on configuring hosts see "Configuration: About Your Host" on page 99.
book.book Page 108 Tuesday, September 27, 2011 3:13 PM Managing Host Port Identifiers You can manage the host port identifiers that are added to the storage array. You can: • Add—Add or associate a new host port identifier to a particular host. • Edit—Change the host port identifier alias or user label. You can move (associate) the host port identifier to a new host. • Replace—Replace a particular host port identifier with another host port identifier.
book.book Page 109 Tuesday, September 27, 2011 3:13 PM 5 Select the method to add a host port identifier to the host. You can select: • Add by selecting a known unassociated host port identifier—Select the appropriate host port identifier from the existing list of Known unassociated host port identifiers. • Add by creating a new host port identifier—In New host port identifier, enter the name of the new host port identifier. 6 In User label, enter an alphanumeric name of up to 30 character.
book.
book.book Page 111 Tuesday, September 27, 2011 3:13 PM 10 Configuration: Disk Groups and Virtual Disks Creating Disk Groups and Virtual Disks Disk groups are created in the unconfigured capacity of a storage array, and virtual disks are created in the free capacity of a disk group. The maximum number of physical disks supported in a disk group is 30. The hosts attached to the storage array read and write data to the virtual disks.
book.book Page 112 Tuesday, September 27, 2011 3:13 PM A disk group must be organized according to its related tasks and subtasks. For example, if you create a disk group for the Accounting Department, you can create virtual disks that match the different types of accounting transactions performed in the department: Accounts Receivable (AR), Accounts Payable (AP), internal billing, and so forth.
book.book Page 113 Tuesday, September 27, 2011 3:13 PM 3 Type the name of the disk group (up to 30 characters) in Disk group name. 4 Select the appropriate Physical Disk selection choices, you can select: • Automatic, see step • Manual, see step 5 Click Next. For automatic configuration, the RAID Level and Capacity window is displayed. 6 Select the appropriate RAID level in Select RAID level. You can select RAID levels 0, 1/10, 6, and 5.
book.book Page 114 Tuesday, September 27, 2011 3:13 PM Locating a Disk Group You can physically locate and identify all of the physical disks that comprise a selected disk group. An LED blinks on each physical disk in the disk group. To locate a disk group: 1 In the AMW, select the Logical tab. 2 Select the appropriate disk group and from the toolbar select Disk Group Blink. The LEDs for the selected disk group blink. 3 After locating the disk group, click OK. The LEDs stop blinking.
book.book Page 115 Tuesday, September 27, 2011 3:13 PM NOTE: Ensure that you create disk groups before creating virtual disks. To create virtual disks: 1 Choose one of these methods to start the Create Virtual Disk Wizard: • To create a virtual disk from unconfigured capacity in the storage array—On the Logical tab, select an Unconfigured Capacity node, and select Virtual Disk Create. Alternatively, you can right-click the Unconfigured Capacity node, and select Create Virtual Disk from the pop-up menu.
book.book Page 116 Tuesday, September 27, 2011 3:13 PM 5 In Advanced virtual disk parameters, you can select: • Use recommended settings. • Customize settings. 6 If you select Use recommended settings in Advanced virtual disk parameters, click Finish. Otherwise, click Next. 7 In the Customize Advanced Virtual Disk Parameters window, select the appropriate Virtual Disk I/O characteristics type.
book.book Page 117 Tuesday, September 27, 2011 3:13 PM 4 Select one or more virtual disks. Move the Select modification priority slider bar to the desired priority. NOTE: To select nonadjacent virtual disks, press click. To select adjacent virtual disks, press click. To select all of the available virtual disks, click Select All. 5 Click OK. A message prompts you to confirm the change in the virtual disk modification priority. 6 Click Yes. 7 Click OK.
book.book Page 118 Tuesday, September 27, 2011 3:13 PM To select nonadjacent virtual disks, press click. To select adjacent virtual disks, press click. To select all of the available virtual disks, click Select All. 4 In the Select cache properties area, you can select: • Enable read caching—to enable read caching. • Enable dynamic cache read prefetch—to enable dynamic cache read prefetch. • Enable write caching—to enable write caching.
book.book Page 119 Tuesday, September 27, 2011 3:13 PM Changing the Segment Size of a Virtual Disk You can change the segment size on a selected virtual disk. During this operation, I/O performance is affected, but your data remains available. Guidelines to proceed with changing the segment size: • You cannot cancel this operation after it starts. • Do not start this operation unless the disk group is in Optimal status. • MDSM determines the segment size transitions that are allowed.
book.book Page 120 Tuesday, September 27, 2011 3:13 PM The segment size modification operation begins. The virtual disk icon in the Logical pane shows an Operation in Progress status while the operation is taking place. NOTE: To view the progress or change the priority of the modification operation, select a virtual disk in the disk group, and select Virtual Disk Change Modification Priority.
book.book Page 121 Tuesday, September 27, 2011 3:13 PM The corresponding dynamic cache read prefetch setting and segment size values that are typically well suited for the selected virtual disk I/O characteristic type are populated in the Dynamic cache read prefetch field and the Segment size field. NOTE: If you selected the Custom option, select your preferred dynamic cache read prefetch setting (enabled/disabled) and segment size (8 KB to 512 KB). 2 Click OK.
book.book Page 122 Tuesday, September 27, 2011 3:13 PM the physical disks and RAID controller modules in a storage array share the same security key. The shared security key provides read and write access to the physical disks, while the physical disk encryption key on each physical disk is used to encrypt the data. A security capable physical disk works like any other physical disk until it is security enabled.
book.book Page 123 Tuesday, September 27, 2011 3:13 PM • Save Security Key File • Validate Security Key • Unlock Drives NOTE: If you have not created a security key for the storage array, the Create Security Key option is active. If you have created a security key for the storage array, the Create Security Key option is inactive with a check mark to the left. The Change Security Key option, the Save Security Key option, and the Validate Security Key option are now active.
book.book Page 124 Tuesday, September 27, 2011 3:13 PM The storage array password protects a storage array from potentially destructive operations by unauthorized users. The storage array password is independent from self encrypting disk and must not be confused with the pass phrase that is used to protect copies of a security key. It is recommended that you set a storage array password. Creating a Security Key When you create a security key, it is generated by and securely stored by the array.
book.book Page 125 Tuesday, September 27, 2011 3:13 PM 4 In New password, enter a string for the storage array password. If you are creating the storage array password for the first time, leave Current password blank. Follow these guidelines for cryptographic strength when you create the storage array password: • be between 8 and 32 characters long. • contain at least 1 uppercase letter. • contain at least 1 lowercase letter. • contain at least 1 number.
book.book Page 126 Tuesday, September 27, 2011 3:13 PM The pass phrase that you enter is masked. NOTE: Create Key is active only if the pass phrase meets the above mentioned criterion. 9 In the Confirm pass phrase dialog box, re-enter the exact string that you entered in the Pass phrase dialog box. Make a record of the pass phrase that you entered and the security key identifier that is associated with the pass phrase. You need this information for later secure operations. 10 Click Create Key.
book.book Page 127 Tuesday, September 27, 2011 3:13 PM for storage on other media. When you change a security key, you also provide information to create a security key identifier. Changing the security key does not destroy any data. You can change the security key at any time. Before you change the security key, ensure that: • All virtual disks in the storage array are in Optimal status. • In storage arrays with two RAID controller modules, both are present and working normally.
book.book Page 128 Tuesday, September 27, 2011 3:13 PM 6 In Confirm pass phrase, re-enter the exact string you entered in Pass phrase. Make a record of the pass phrase you entered and the security key identifier it is associated with. You need this information for later secure operations. 7 Click Change Key. 8 Make a record of the security key identifier and the file name from the Change Security Key Complete dialog, and click OK.
book.book Page 129 Tuesday, September 27, 2011 3:13 PM 4 In Confirm pass phrase, re-enter the exact string you entered in Pass phrase. Make a record of the pass phrase you entered. You need it for later secure operations. 5 Click Save. 6 Make a record of the security key identifier and the file name from the Save Security Key Complete dialog and click OK. Validate Security Key A file in which a security key is stored is validated through the Validate Security Key dialog.
book.book Page 130 Tuesday, September 27, 2011 3:13 PM Erasing Secure Physical Disks In the AMW, when you select a security enabled physical disk that is not part of a disk group, the Secure Erase menu item is enabled on the Physical Disk menu. You can use the secure erase procedure to re-provision a physical disk. You can use the Secure Erase option if you want to remove all of the data on the physical disk and reset the physical disk security attributes.
book.book Page 131 Tuesday, September 27, 2011 3:13 PM • The availability of enclosure loss protection for a disk group depends on the location of the physical disks that comprise the disk group. To make sure that enclosure loss protection is not affected, you must replace a failed physical disk to initiate the copyback process. See "Enclosure Loss Protection" on page 134.
book.book Page 132 Tuesday, September 27, 2011 3:13 PM 8 Select the relevant physical disks in the Unassigned physical disks area, as hot spares for the selected disk and click OK. 9 To unassign hot spares, in the Hot Spare Coverage window, select the physical disks in the Hot spare physical disks area. 10 Review the information about the hot spare coverage in the Details area. 11 Click Unassign. A message prompts you to confirm the operation. 12 Type yes and click OK.
book.book Page 133 Tuesday, September 27, 2011 3:13 PM Hot Spare Operation When a physical disk fails, the virtual disk automatically rebuilds using an available hot spare. When a replacement physical disk is installed, data from the hot spare is copied back to the replacement physical disk. This function is called copy back. By default, the RAID controller module automatically configures the number and type of hot spares based on the number and capacity of the physical disks in your system.
book.book Page 134 Tuesday, September 27, 2011 3:13 PM spare physical disk. To make sure that enclosure loss protection is not affected, you must replace a failed physical disk to initiate the copyback process. The virtual disk remains online and accessible while you are replacing the failed physical disk, because the hot spare physical disk is automatically substituted for the failed physical disk. Enclosure Loss Protection Enclosure loss protection is an attribute of a disk group.
book.book Page 135 Tuesday, September 27, 2011 3:13 PM Table 10-2. RAID Level Criteria for Enclosure Loss Protection (continued) Criteria for Enclosure Loss Protection RAID level 1 Ensure that each physical disk in a mirrored pair is located in a different expansion enclosure. This enables you to have more than two physical disks in the disk group within the same expansion enclosure.
book.book Page 136 Tuesday, September 27, 2011 3:13 PM • Each host has its own LUN address space. MDSM permits the same LUN to be used by different hosts or host groups to access virtual disks in a storage array. • Not every operating system has the same number of LUNs available. • You can define the mappings on the Mappings tab in the AMW. See "Using the Mappings Tab" on page 100.
book.book Page 137 Tuesday, September 27, 2011 3:13 PM 4 In Host group or host, select the appropriate host group or host. All defined hosts, host groups, and the default group are displayed in the list. NOTE: When configuring an iSCSI storage array, including the MD3600i or MD3620i, if a host or a host group is selected that does not have a SAS host bus adapter (SAS HBA) host port defined, a warning dialog is displayed. 5 In Logical unit number, select a LUN. The supported LUNs are 0 through 255.
book.book Page 138 Tuesday, September 27, 2011 3:13 PM • Select a single virtual disk, and select Mappings Change Mapping. • Right-click the virtual disk, and select Change Mapping from the pop-up menu. 3 In Host group or host, select the appropriate host group or host. By default, the drop-down list shows the current host group or the host associated with the selected virtual disk. 4 In Logical unit number, select the appropriate LUN.
book.book Page 139 Tuesday, September 27, 2011 3:13 PM associated source virtual disk. Changing the RAID controller module ownership of a virtual disk changes the preferred RAID controller module ownership of the virtual disk. During a virtual disk copy, the same RAID controller module must own both the source virtual disk and the target virtual disk. Sometimes both virtual disks do not have the same preferred RAID controller module when the virtual disk copy starts.
book.book Page 140 Tuesday, September 27, 2011 3:13 PM You can change the RAID controller module ownership of a standard virtual disk or a snapshot repository virtual disk. You cannot directly change the RAID controller module ownership of a snapshot virtual disk because the snapshot virtual disk inherits the RAID controller module owner of its associated source virtual disk.
book.book Page 141 Tuesday, September 27, 2011 3:13 PM Changing the RAID Level of a Disk Group Changing the RAID level of a disk group changes the RAID levels of every virtual disk that comprises the disk group. Performance may be slightly affected during the operation. Guidelines to change the RAID level of a disk group: • You cannot cancel this operation after it begins. • The disk group must be in Optimal status before you can perform this operation.
book.book Page 142 Tuesday, September 27, 2011 3:13 PM [size=1.
book.book Page 143 Tuesday, September 27, 2011 3:13 PM • If a new LUN is mapped, the new LUN is detected and given a multipathing device node • If you increased volume capacity, the new capacity is displayed. Restricted Mappings Many hosts are able to map up to 256 LUNs (0 to 255) per storage partition. However, the maximum number of mappings differs because of operating system variables, failover driver issues, and potential data problems. The hosts listed in the table have these mapping restrictions.
book.book Page 144 Tuesday, September 27, 2011 3:13 PM • If there is a host with a restricted host type that is part of a specific storage partition, all of the hosts in that storage partition are limited to the maximum number of LUNs allowed by the restricted host type. • You cannot move a host with a restricted host type into a storage partition that already has LUNs mapped that are greater than what is allowed by the restricted host type.
book.book Page 145 Tuesday, September 27, 2011 3:13 PM disk copy, ownership of the target virtual disk is also changed. Under certain operating system environments, it may be necessary to reconfigure the multipath driver before an I/O path can be used. 1 To change: a The RAID controller module ownership of a virtual disk—Go to step 2. b The RAID controller module ownership of a disk group—Go to step 3.
book.book Page 146 Tuesday, September 27, 2011 3:13 PM CAUTION: Possible loss of data access—Changing ownership at the disk group level causes every virtual disk in that disk group to transfer to the other RAID controller module and use the new I/O path. If you do not want to set every virtual disk to the new path, change ownership at the virtual disk level instead. e Click Yes. The ownership of the disk group is changed. I/O to the disk group is now directed through this I/O path.
book.book Page 147 Tuesday, September 27, 2011 3:13 PM Storage Partitioning A storage partition is a logical entity consisting of one or more virtual disks that can be accessed by a single host or shared among hosts that are part of a host group. The first time you map a virtual disk to a specific host or host group, a storage partition is created. Subsequent virtual disk mappings to that host or host group do not create another storage partition.
book.book Page 148 Tuesday, September 27, 2011 3:13 PM • All mappings are defined. NOTE: You can include a secondary virtual disk in a storage partition. However, any hosts that are mapped to the secondary virtual disk has readonly access until the virtual disk is promoted to a primary virtual disk, or the mirror relationship is removed.
book.book Page 149 Tuesday, September 27, 2011 3:13 PM NOTE: You cannot mix different media types or different interface types within a single disk group or virtual disk. 5 Click Add. A message prompts you to confirm your selection. 6 To add the capacity to the disk group, click Yes. You can also use the Command Line Interface (CLI) on both Windows and Linux hosts to add free capacity to a disk group.
book.book Page 150 Tuesday, September 27, 2011 3:13 PM capacity, in the form of unassigned physical disks to the disk group of the standard virtual disk or the snapshot repository virtual disk. See "Disk Group Expansion" on page 148. For more information, see the PowerVault Modular Disk Storage Manager online help topics. Disk Group Migration Disk group migration allows to you export a disk group so that you can import the disk group to a different storage array.
book.book Page 151 Tuesday, September 27, 2011 3:13 PM Exporting a Disk Group On the source storage array: 1 Save the storage array configuration. 2 Stop all I/O and unmount or disconnect the file systems on the virtual disks in the disk group. 3 Back up the data on the virtual disks in the disk group. 4 Locate the disk group and label the physical disks. 5 Place the disk group offline. 6 Obtain blank physical disk modules or new physical disks.
book.book Page 152 Tuesday, September 27, 2011 3:13 PM 2 Review the Import Report for an overview of the disk group that you are importing. 3 Check for non-importable components. 4 Confirm that you want to proceed with the import procedure. NOTE: Some settings cannot be imported during the import disk group procedure.
book.book Page 153 Tuesday, September 27, 2011 3:13 PM error is reported to the event log. For virtual disks without redundancy protection (RAID level 1, RAID level 5, and RAID level 6 virtual disks), the error is not corrected but is reported to the event log. • Recovered media error—Data could not be read by the physical disk on the first attempt but was successfully read on a subsequent attempt. Data is rewritten to the physical disk and verified and the error is reported to the event log.
book.book Page 154 Tuesday, September 27, 2011 3:13 PM NOTE: A consistency check scans the data blocks in a RAID level 5 virtual disk, or a RAID level 6 virtual disk and checks the consistency information for each block. A consistency check compares data blocks on RAID level 1 mirrored physical disks. RAID level 0 virtual disks have no data consistency. 8 Click OK.
book.book Page 155 Tuesday, September 27, 2011 3:13 PM 11 Configuration: Premium Feature— Snapshot Virtual Disks NOTE: If you ordered this feature, you received a Premium Feature Activation card shipped in the same box as your Dell PowerVault MD storage array. Follow the directions on the card to obtain a key file and to enable the feature. NOTE: The snapshot feature allows up to 16 snapshots per LUN and 256 per array to be present at the same time.
book.book Page 156 Tuesday, September 27, 2011 3:13 PM repository uses less disk space than a full physical copy, because the only data blocks that are stored in the snapshot repository virtual disk are those that have changed since the time of the snapshot.
book.book Page 157 Tuesday, September 27, 2011 3:13 PM Scheduling a Snapshot Virtual Disk When you create a snapshot virtual disk, you can choose whether the snapshot is created immediately or is created according to a schedule that you determine. This schedule can be a one-time snapshot creation or an ongoing snapshot creation that occurs at regularly occurring intervals. If a schedule is not specified, the snapshot virtual disk creation happens immediately upon execution of the command.
book.book Page 158 Tuesday, September 27, 2011 3:13 PM For more information on creating snapshot virtual disk schedules, see the following sections on creating snapshots.
book.book Page 159 Tuesday, September 27, 2011 3:13 PM For more information on scheduling snapshots virtual disks, see the PowerVault Modular Disk Storage Manager online help topics and the CLI Guide. Creating a Snapshot Virtual Disk Using the Simple Path You can choose the simple path to create a snapshot virtual disk if the disk group of the source virtual disk has the required amount of free space. A snapshot repository virtual disk requires a minimum of 8 MB free capacity.
book.book Page 160 Tuesday, September 27, 2011 3:13 PM Using the simple path, the following defaults are used for the other parameters of a snapshot virtual disk: • Capacity Allocation—The snapshot repository virtual disk is created using free capacity on the same disk group where the source virtual disk resides. • Host-to-Virtual Disk Mapping—The default setting is Map now.
book.book Page 161 Tuesday, September 27, 2011 3:13 PM • You cannot create a snapshot of a virtual disk that contains unreadable sectors. • You must satisfy the requirements of your host operating system for creating snapshot virtual disks. Failure to meet the requirements of your host operating system results in an inaccurate snapshot of the source virtual disk or the target virtual disk in a virtual disk copy.
book.book Page 162 Tuesday, September 27, 2011 3:13 PM 8 Enter the snapshot repository virtual disks capacity as a percentage of the source virtual disks capacity and click Next. The Preview window containing the summary of the snapshot virtual disk is displayed. 9 Click Finish. The Completed window is displayed. 10 Click OK. After creating one or more snapshot virtual disks, mount the source virtual disk, and restart the host application using that source virtual disk.
book.book Page 163 Tuesday, September 27, 2011 3:13 PM • Snapshot Virtual Disk Name—A user-specified name that helps you associate the snapshot virtual disk to its corresponding snapshot repository virtual disk and source virtual disk. • Snapshot Repository Virtual Disk Name—A user-specified name that helps you associate the snapshot repository virtual disk to its corresponding snapshot virtual disk and source virtual disk.
book.book Page 164 Tuesday, September 27, 2011 3:13 PM • Schedule—Creates the snapshot virtual disk at a specified time, or according to a regularly occurring interval. If no schedule is specified, the snapshot operation begins immediately. This parameter can also be used to apply a schedule to an existing snapshot virtual disk.
book.book Page 165 Tuesday, September 27, 2011 3:13 PM • You cannot create a snapshot of a virtual disk that contains unreadable sectors. • You must satisfy the requirements of your host operating system for creating snapshot virtual disks. Failure to meet the requirements of your host operating system results in an inaccurate snapshot of the source virtual disk or the target virtual disk in a virtual disk copy.
book.book Page 166 Tuesday, September 27, 2011 3:13 PM If you want to use a snapshot regularly, such as for backups, use the Disable Snapshot and Re-create Snapshot options to reuse the snapshot. Disabling and re-creating snapshots preserves the existing virtual disk-to-host mappings to the snapshot virtual disk.
book.book Page 167 Tuesday, September 27, 2011 3:13 PM 8 In the Snapshot virtual disk parameters area, select the relevant mapping option, you can select: • Automatic • Map later 9 In the Snapshot repository virtual disk parameters area, enter the system behavior when: • The snapshot repository virtual disk is full to the selected percentage level. • The snapshot repository virtual disk is full. 10 Click Next. The Preview window containing the summary of the snapshot virtual disk is displayed.
book.book Page 168 Tuesday, September 27, 2011 3:13 PM The default name for the associated snapshot repository virtual disk that is shown in the Snapshot repository virtual disk field is: —R For example, if you are creating the first snapshot virtual disk for a source virtual disk called Accounting, the default snapshot virtual disk is Accounting-1, and the associated snapshot repository virtual disk default name is Accounting-R1.
book.book Page 169 Tuesday, September 27, 2011 3:13 PM Snapshot Repository Capacity If you receive a warning that the capacity for the snapshot repository virtual disk is approaching its threshold, you can increase the capacity of a snapshot repository virtual disk by using one of the following methods: • Use the free capacity available on the disk group of the snapshot repository virtual disk. • Add unconfigured capacity to the disk group of the snapshot repository virtual disk.
book.book Page 170 Tuesday, September 27, 2011 3:13 PM free capacity is available, the maximum free space is displayed in the Increase capacity by field. If free capacity does not exist on the disk group, the free space that is displayed in the Increase capacity by spinner box is 0. You must add physical disks to create free capacity on the disk group.
book.book Page 171 Tuesday, September 27, 2011 3:13 PM NOTE: The physical disks that are displayed have a capacity that is either the same size or larger than the capacity of the physical disks already being used by the disk group. 9 Select either a single physical disk to add or two physical disks to add. 10 Click Add. The Add Physical Disks window closes. 11 Check the Physical Disks to add [enclosure, slot] area to make sure that the correct physical disks are added.
book.book Page 172 Tuesday, September 27, 2011 3:13 PM Disabling a Snapshot Virtual Disk Disable a snapshot virtual disk if one of the following conditions exists: • You do not need the snapshot now. • You intend to re-create the snapshot at a later time and want to retain the associated snapshot repository virtual disk so that you do not need to create it again. • You want to maximize storage array performance by stopping copy-onwrite activity to the snapshot repository virtual disk.
book.book Page 173 Tuesday, September 27, 2011 3:13 PM Before re-creating a snapshot virtual disk, both the host server and the associated virtual disk you are re-creating have to be in the proper state. To prepare your host server and virtual disk: 1 Stop all I/O activity to the source and snapshot virtual disk (if mounted). 2 Using your Windows system, flush the cache to both the source and the snapshot virtual disk (if mounted).
book.book Page 174 Tuesday, September 27, 2011 3:13 PM NOTE: Failing to follow these additional instructions could create unusable snapshot virtual disks. For more information, see the PowerVault Modular Disk Storage Manager online help topics. • To use this option, the snapshot virtual disk must be either in an Optimal status or Disabled status. • When using this option, the previously configured snapshot name parameters and snapshot repository virtual disk are used.
book.book Page 175 Tuesday, September 27, 2011 3:13 PM • Rolling back a base virtual disk to a snapshot virtual disk does not affect the contents of the snapshot virtual disks. • Only one snapshot rollback operation can be performed at a time. • While a base virtual disk that is undergoing a rollback, you cannot create a new snapshot virtual disks from that base virtual disk.
book.book Page 176 Tuesday, September 27, 2011 3:13 PM Protecting Against a Failed Snapshot Rollback To protect your base virtual disk data, it is recommended that you create a new snapshot virtual disk from the base virtual disk before beginning a rollback operation. If the snapshot rollback fails, use this new snapshot virtual disk to restore your base virtual disk.
book.book Page 177 Tuesday, September 27, 2011 3:13 PM Resuming a Snapshot Rollback If an error occurs during the snapshot rollback and the operation is paused, you can resume the rollback using the following steps: 1 In the AMW, select the Logical tab. 2 Choose one: • Select the snapshot virtual disk, and select Virtual Disk Snapshot Resume Rollback. • Right-click the snapshot virtual disk and select Resume Rollback. The Resume Rollback dialog is displayed. 3 Click OK.
book.
book.book Page 179 Tuesday, September 27, 2011 3:13 PM 12 Configuration: Premium Feature— Virtual Disk Copy NOTE: A virtual disk copy overwrites data on the target virtual disk. Before starting a virtual disk copy, ensure that you no longer need the data or back up the data on the target virtual disk. NOTE: If you ordered this feature, you received a Premium Feature Activation card that shipped in the same box as your Dell PowerVault MD storage array.
book.book Page 180 Tuesday, September 27, 2011 3:13 PM Reasons to use virtual disk copy include: • Copying data for improved access—As your storage requirements for a virtual disk change, you can use a virtual disk copy to copy data to a virtual disk in a disk group that uses drives with larger capacity within the same storage array. Copying data for larger access capacity enables you to move data to greater capacity physical disks (for example, 61 GB to 146 GB).
book.book Page 181 Tuesday, September 27, 2011 3:13 PM formatted with a journaling file system, any attempt to issue a read request to the source virtual disk may be rejected by the storage array RAID controller modules and result in an error message. Make sure that the Read-Only attribute for the target virtual disk is disabled after the virtual disk copy is complete to prevent error messages from being displayed.
book.book Page 182 Tuesday, September 27, 2011 3:13 PM Creating a Virtual Disk Copy for an MSCS Shared Disk To create a virtual disk copy for a Microsoft Cluster Server (MSCS) shared disk, create a snapshot of the virtual disk, and then use the snapshot virtual disk as the source for the virtual disk copy.
book.book Page 183 Tuesday, September 27, 2011 3:13 PM • To enable Read-Only permission, select Change Target Virtual Disk Permissions Enable Read-Only. NOTE: Write requests to the target virtual disk are rejected when the ReadOnly permission is enabled on the target virtual disk. • To disable Read-Only permission, select Change Target Virtual Disk Permissions Disable Read-Only.
book.book Page 184 Tuesday, September 27, 2011 3:13 PM NOTE: The following host preparation sections also apply when using the virtual disk copy feature through the CLI interface. Creating a Virtual Disk Copy CAUTION: Possible loss of data—Source virtual disks that are participating in a virtual disk copy are available for read I/O activity only while a virtual disk copy has a status of In Progress or Pending. Write requests are allowed after the virtual disk copy has completed.
book.book Page 185 Tuesday, September 27, 2011 3:13 PM Virtual Disk Copy and Modification Operations If a modification operation is running on a source virtual disk or a target virtual disk, and the virtual disk copy has a status of In Progress, Pending, or Failed, the virtual disk copy does not take place.
book.book Page 186 Tuesday, September 27, 2011 3:13 PM Preferred RAID Controller Module Ownership During a virtual disk copy, the same RAID controller module must own both the source virtual disk and the target virtual disk. If both virtual disks do not have the same preferred RAID controller module when the virtual disk copy starts, the ownership of the target virtual disk is automatically transferred to the preferred RAID controller module of the source virtual disk.
book.book Page 187 Tuesday, September 27, 2011 3:13 PM A virtual disk copy automatically makes the target virtual disk read-only to hosts. You may want to keep this attribute enabled to preserve the data on the target virtual disk. CAUTION: If you decide not to preserve the data on the target virtual disk after the virtual disk copy has completed, disable the Read-Only attribute for the target virtual disk.
book.book Page 188 Tuesday, September 27, 2011 3:13 PM 9 Type yes and click Finish. NOTE: Operation in Progress icons are displayed on the source virtual disk and the target virtual disk while the virtual disk copy has a status of In Progress or Pending. For more information, see the PowerVault Modular Disk Storage Manager online help topics.
book.book Page 189 Tuesday, September 27, 2011 3:13 PM 2 In the table, select one or more copy pairs. 3 Select Change Copy Priority. The Change Copy Priority window is displayed. 4 In the Copy Priority area, select the appropriate copy priority, depending on your system performance needs. NOTE: There are 5 copy priority rates available: lowest, low, medium, high, and highest. If the copy priority is set at the lowest rate, I/O activity is prioritized and the virtual disk copy takes longer.
book.book Page 190 Tuesday, September 27, 2011 3:13 PM Recopying a Virtual Disk You can recopy a virtual disk when you have stopped a virtual disk copy and you want to start it again or when a virtual disk copy has failed. The Recopy option overwrites existing data on the target virtual disk and makes the target virtual disk read-only to hosts. This option fails all snapshot virtual disks associated with the target virtual disk, if any exist.
book.book Page 191 Tuesday, September 27, 2011 3:13 PM 4 Remove the drive letter(s) of the source and (if mounted) virtual disk in Windows or unmount the virtual drive(s) in Linux to help guarantee a stable copy of the drive for the virtual disk. If this is not done, the copy operation reports that it has completed successfully, but the copied data is not updated properly. 5 Follow any additional instructions for your operating system.
book.book Page 192 Tuesday, September 27, 2011 3:13 PM 5 Select Copy Re-Copy. The Re-Copy window is displayed. 6 Set the copy priority. NOTE: There are 5 copy priority rates available: lowest, low, medium, high, and highest. If the copy priority is set at the lowest rate, I/O activity is prioritized, and the virtual disk copy takes longer. If the copy priority is set to the highest priority rate, the virtual disk copy is prioritized, but I/O activity for the storage array may be affected.
book.book Page 193 Tuesday, September 27, 2011 3:13 PM 13 Configuration: Premium Feature— Upgrading to High-PerformanceTier The High Performance Tier premium feature on an MD3600i Series storage array increases the performance of the system beyond that of a MD3600i Series storage array operating at the standard performance level. If this feature is ordered, a Premium Feature Activation card is placed in the box with the storage array.
book.
book.book Page 195 Tuesday, September 27, 2011 3:13 PM 14 Configuration: Device Mapper Multipath for Linux Overview The MD3600i Series storage array uses a Linux operating system software framework, known as Device Mapper (DM), to enable multipath capabilities on Linux Host Servers. The DM multipath functionality is provided by a combination of drivers and utilities. This chapter describes how to use those utilities to complete the process of enabling MD3600i Series storage array on a Linux system.
book.book Page 196 Tuesday, September 27, 2011 3:13 PM Using DM Multipathing Devices NOTE: Using or modifying any nodes other than the multipathing device nodes can result in array or file system problems, including loss of communication with the array and corruption of the file system. Avoid accessing any device other than the multipathing device.
book.book Page 197 Tuesday, September 27, 2011 3:13 PM Using the MDSM software: 1 Map the host server to the MD3600i Series storage array. 2 Create the Virtual Disks. 3 Map newly created arrays to your host server. NOTE: Any arrays configured with MDCU automatically get added to the list of Devices in the PowerVault Modular Disk Storage Manager Enterprise Management Window (EMW).
book.book Page 198 Tuesday, September 27, 2011 3:13 PM Scan for Newly Added Virtual Disks The rescan_dm_devs command scans the host server system looking for existing and newly added virtual disks mapped to the host server. # rescan_dm_devs If an array virtual disk (VD) is mapped to the host server at a later time, the rescan_dm_devices command must be run again to make the VD a visible LUN to the operating system.
book.book Page 199 Tuesday, September 27, 2011 3:13 PM The following is an example of SLES output: mpathb(360080e500017b2f80000c6ca4a1d4ab8) dm-21 DELL,MD32xxi [size=1.0G][features=3 queue_if_no_path pg_init_retries 50][hwhandler=1 rdac][rw] \_ round-robin 0 [prio=6][active] \_ 4:0:0:22 sdx 65:112 [active][ready] \_ round-robin 0 [prio=1][enabled] \_ 6:0:0:22 sdcl 69:144 [active][ghost] where: mpathb is the name of the virtual device created by device mapper. It is located in the /dev/mapper directory.
book.book Page 200 Tuesday, September 27, 2011 3:13 PM Add a New Partition to Device Mapper The kpartx command adds the new fdisk partition to the Device Mapper list of usable partitions. See examples below, where mpath is the device node on which the partition was created. # kpartx –a /dev/mapper/mpath If successful, the command does not display an output. To verify success and view exact partition naming, you can use these commands to see the full partition names assigned.
book.book Page 201 Tuesday, September 27, 2011 3:13 PM Create a File System on a Device Mapper Partition Use the standard mkfs command to create the file system on the newly created Device Mapper partition. For example: # mkfs –t /dev/mapper/ where is the partition on which the file system is created.
book.book Page 202 Tuesday, September 27, 2011 3:13 PM or blacklist { device { vendor vendor_string model model_string }; NOTE: RedHat version 6.0 and 6.1 users must rebuild the initramfs root file image to include the updated configuration file by running the #dracut -force command. 3 Reboot the host.
book.book Page 203 Tuesday, September 27, 2011 3:13 PM 3 Flush the Device Mapper multipath maps list to remove any old or modified mappings: # multipath –F NOTE: The boot operating system drive may have an entry with the Device Mapper multipathing table. This is not affected by the multipath –F command. However, using #multipath –ll must not show any multipathing devices with model “MD3600i” or “MD3600i”.
book.book Page 204 Tuesday, September 27, 2011 3:13 PM Table 14-1. Useful Device Mapper Commands (continued) Command Description rescan_dm_devs Dell provided script. Forces a rescan of the host SCSI bus and aggregates multipathing devices as needed. For use when: • LUNs are dynamically mapped to the hosts. • New targets are added to the host. • Failback of the storage array is required. • For MD3600i Series arrays, iSCSI sessions have to be established for rescan to take effect.
book.book Page 205 Tuesday, September 27, 2011 3:13 PM • Failback can be slow when the host system is experiencing heavy I/O. The problem is exacerbated if the host server is also experiencing very high processor utilization. • The Device Mapper Multipath service can be slow when the host system is experiencing heavy I/O. The problem is exacerbated if the host server is also experiencing very high processor utilization. • If the root disk is not blacklisted in the multipath.
book.book Page 206 Tuesday, September 27, 2011 3:13 PM Question Answer I removed a LUN. But the multipathing mapping is still available. The multipathing device is still available after you remove the LUNs. Run multipath –f to remove the multipathing mapping. For example, if a device related with /dev/dm-1 is deleted, you must run multipath –f /dev/dm-1 to remove /dev/dm-1 from DM mapping table.
book.book Page 207 Tuesday, September 27, 2011 3:13 PM 15 Management: Firmware Downloads Downloading RAID Controller and NVSRAM Packages A version number exists for each firmware file. The version number indicates whether the firmware is a major version or a minor version. You can use the Enterprise Management Window (EMW) to download and activate both the major firmware versions and the minor firmware versions.
book.book Page 208 Tuesday, September 27, 2011 3:13 PM Downloading Both RAID Controller and NVSRAM Firmware NOTE: I/O to the array can continue while you are upgrading RAID controller and NVSRAM firmware. NOTE: It is recommended that the firmware and NVSRAM be upgraded during a maintenance period when the array is not being used for I/O. NOTE: The RAID enclosure must contain at least two disk drives in order to update the firmware on the controller.
book.book Page 209 Tuesday, September 27, 2011 3:13 PM 7 Click Transfer. Keep these guidelines in mind: – If the Transfer button is inactive, ensure that you either select an NVSRAM file or clear the Transfer NVSRAM file with RAID controller module firmware. – If the file selected is not valid or is not compatible with the current storage array configuration, the File Selection Error dialog is displayed. Click OK to close it, and choose a compatible firmware or NVSRAM file.
book.book Page 210 Tuesday, September 27, 2011 3:13 PM The Select File dialog is displayed. 13 Select the file to download. 14 Click OK. 15 If you want to download the NVSRAM file with the RAID controller module firmware, select Download NVSRAM file with firmware in the Select files area. Attributes of the firmware file are displayed in the Firmware file information area. The attributes indicate the version of the firmware file.
book.book Page 211 Tuesday, September 27, 2011 3:13 PM Downloading Only NVSRAM Firmware Use the command line interface (CLI) to download and activate NVSRAM to several storage arrays. For more information, see the PowerVault Modular Disk Storage Manager online help topics. To download only NVSRAM firmware: 1 To download the NVSRAM firmware from: • EMW—Go to step 7. • AMW—Go to step 2.
book.book Page 212 Tuesday, September 27, 2011 3:13 PM 7 Perform one of these actions: • Select Tools Upgrade RAID Controller Module Firmware. • Select the Setup tab, and click Upgrade RAID Controller Module Firmware. The Upgrade RAID Controller Module Firmware window is displayed. The Storage array pane lists the storage arrays. The Details pane shows the details of the storage array that is selected in the Storage array pane.
book.book Page 213 Tuesday, September 27, 2011 3:13 PM 12 Click OK. The Confirm Download dialog is displayed. 13 Click Yes. The download starts and a progress indicator is displayed in the Status column of the Upgrade RAID Controller Module Firmware window. Downloading Physical Disk Firmware CAUTION: When updating physical disk firmware, you must stop all I/O activity to the array to prevent data loss. The physical disk firmware controls various features of the physical disk.
book.book Page 214 Tuesday, September 27, 2011 3:13 PM • Make sure that the firmware that you download to the physical disks are compatible with the physical disks that you select. • Do not make any configuration changes to the storage array while downloading the firmware. NOTE: Downloads can take several minutes to complete. During a download, the Download Physical Disk - Progress dialog is displayed. Do not attempt another operation when the Download Physical Disk - Progress dialog is displayed.
book.book Page 215 Tuesday, September 27, 2011 3:13 PM Downloading MD1200 Series Expansion Module EMM Firmware NOTE: Due to a limitation with Linux, expansion enclosure EMM firmware updates must be performed using out-of-band management only. Failure to do so may result in the host server becoming unresponsive, and it may require a reboot. You can transfer a downloadable firmware file to the expansion enclosure EMM in the expansion enclosures attached to the storage array.
book.book Page 216 Tuesday, September 27, 2011 3:13 PM NOTE: If you click Stop while a firmware download is in progress, the download-in-progress finishes before the operation stops. The status for the remaining expansion enclosures changes to Canceled. 7 Monitor the progress and completion status of the download to the expansion enclosures. The progress and status of each expansion enclosure that is participating in the download is displayed in the Status column of the Select enclosures table.
book.book Page 217 Tuesday, September 27, 2011 3:13 PM controller encounters an error while accessing a peer disk, it is unable to recover the data and affected sectors are added to the unreadable sector log maintained by the controller. Other conditions under which sectors are added to the unreadable sector log include: • A media error is encountered when trying to access a physical disk that is a member of a non-redundant disk group (RAID 0 or degraded RAID 1, RAID 5 or RAID 10).
book.
book.
book.book Page 220 Tuesday, September 27, 2011 3:13 PM Front Bezel (Optional) Removing the Front Bezel 1 Using the system key, unlock the front bezel (if locked). 2 Lift up the release latch next to the keylock. 3 Rotate the left end of the bezel away from the front panel. 4 Unhook the right end of the bezel and pull the bezel away from the system. Figure 16-1.
book.book Page 221 Tuesday, September 27, 2011 3:13 PM Hard Drives SAFETY: Models AMT, E03J, and E04J Models AMT, E03J, and E04J are intended for installation only in restricted access locations as defined in cl 1.2.7.3 of IEC 60950-1:2005. Depending on your configuration, your array either supports up to twenty four 2.5" SAS hard drives or up to twelve 3.5" SAS hard drives in internal drive bays. Hard drives are connected to a backplane through hard-drive carriers and can be configured as hot-swappable.
book.book Page 222 Tuesday, September 27, 2011 3:13 PM Figure 16-3. Removing and Installing a 2.5" Hard-Drive Blank (MD3620i Only) 1 1 2 hard-drive blank 2 release tab Installing a Hard-Drive Blank 1 If installed, remove the front bezel. See "Removing the Front Bezel" on page 220. 2 Insert the drive blank into the drive bay until the blank is fully seated. 3 Close the handle to lock the blank in place. 4 If applicable, replace the front bezel. See "Installing the Front Bezel" on page 220.
book.book Page 223 Tuesday, September 27, 2011 3:13 PM 2 From the Modular Disk Storage Manager (MDSM) software, prepare the drive for removal. Wait until the hard-drive indicators on the drive carrier signal that the drive can be removed safely. For more information, see your controller documentation for information about hot-swap drive removal. If the drive is online, the green activity/fault indicator flashes as the drive is powered down. When the drive indicators are off, the drive is ready for removal.
book.book Page 224 Tuesday, September 27, 2011 3:13 PM Installing a Hard Drive CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 225 Tuesday, September 27, 2011 3:13 PM Removing a Hard Drive From a Hard-Drive Carrier Remove the screws from the slide rails on the hard-drive carrier and separate the hard drive from the carrier. See Figure 16-5 for PowerVault MD3600i and Figure 16-6 for PowerVault MD3620i. Figure 16-5. Removing and Installing a Hard Drive Into a 3.
book.book Page 226 Tuesday, September 27, 2011 3:13 PM Figure 16-6. Removing and Installing a Hard Drive Into a 2.
book.book Page 227 Tuesday, September 27, 2011 3:13 PM Installing a Hard Drive Into a Hard-Drive Carrier 1 Insert the hard drive into the hard-drive carrier with the connector end of the drive at the back. See Figure 16-5. 2 Align the screw holes on the hard drive with the back set of holes on the hard-drive carrier. When aligned correctly, the back of the hard drive is flush with the back of the hard-drive carrier. 3 Attach the four screws to secure the hard drive to the hard-drive carrier.
book.book Page 228 Tuesday, September 27, 2011 3:13 PM 5 Connect all the power cables to the array. 6 Turn on the array and the host server. Figure 16-7. Removing and Installing a RAID Controller Module Blank 1 1 release latch 2 RAID controller module blank Installing a RAID Controller Module Blank To install a RAID controller module blank: 1 Align the blank with the RAID controller module bay 2 Insert the blank into the chassis until it clicks into place.
book.book Page 229 Tuesday, September 27, 2011 3:13 PM Removing a RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 230 Tuesday, September 27, 2011 3:13 PM Installing a RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 231 Tuesday, September 27, 2011 3:13 PM Figure 16-9. Opening and Closing the RAID Controller Module 1 1 screws (2) 3 indent 2 3 2 RAID controller module Closing the RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team.
book.book Page 232 Tuesday, September 27, 2011 3:13 PM RAID Controller Module Backup Battery Unit Removing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty.
book.book Page 233 Tuesday, September 27, 2011 3:13 PM Installing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty.
book.book Page 234 Tuesday, September 27, 2011 3:13 PM Power Supply/Cooling Fan Module NOTE: Your storage array includes two integrated, hot-swappable power supply/cooling fan modules. The array supports two hot-swappable power supply/cooling fan modules. While the array can operate temporarily with one module, both the modules must be present for proper system cooling. CAUTION: A single power supply/cooling fan module can be removed from a powered-on array for a maximum period of 5 minutes.
book.book Page 235 Tuesday, September 27, 2011 3:13 PM Figure 16-11.
book.book Page 236 Tuesday, September 27, 2011 3:13 PM Installing a Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 237 Tuesday, September 27, 2011 3:13 PM Control Panel Removing the Control Panel 1 Turn off the array and host server. 2 Disconnect all the power cables connected to the array. 3 Remove the hard drives from: – slots 0 to 2 in PowerVault MD3600i – slots 0 to 5 in PowerVault MD3620i See "Removing a Hard Drive" on page 222. NOTE: Mark each hard drive with it’s slot position as you remove it.
book.book Page 238 Tuesday, September 27, 2011 3:13 PM Figure 16-14. Removing and Installing the Control Panel-PowerVault MD3620i 1 2 1 release pin 2 control panel Installing the Control Panel 1 Align the control panel with the slot on the array. 2 Slide the control panel into the array until: – The release tab clicks into place in PowerVault MD3600i. See Figure 16-13. – The release pin clicks into place in PowerVault MD3620i. See Figure 16-14. 3 Replace the hard drives in their respective slots.
book.book Page 239 Tuesday, September 27, 2011 3:13 PM Backplane CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 240 Tuesday, September 27, 2011 3:13 PM Figure 16-15.
book.book Page 241 Tuesday, September 27, 2011 3:13 PM Figure 16-16. Removing and Installing the Backplane-PowerVault MD3600i 1 2 3 1 screws (5) 3 captive screw 2 backplane Figure 16-17.
book.book Page 242 Tuesday, September 27, 2011 3:13 PM Installing the Backplane 1 Align the holes on the backplane with the holes on the array. 2 Tighten the captive screw to secure the backplane to the chassis. See Figure 16-16 for PowerVault MD3600i or Figure 16-17 for PowerVault MD3620i. 3 Replace the screws that secure the backplane to the chassis. See Figure 16-16 for PowerVault MD3600i or Figure 16-17 for PowerVault MD3620i.
book.book Page 243 Tuesday, September 27, 2011 3:13 PM 17 Management: Firmware Inventory A storage array is made up of many components, which may include RAID controller modules, physical disks, and enclosure management modules (EMMs). Each of these components contains firmware. Some versions of the firmware are dependent on other versions of firmware. To capture information about all of the firmware versions in the storage array, view the firmware inventory.
book.
book.book Page 245 Tuesday, September 27, 2011 3:13 PM 18 Management: System Interfaces Microsoft Services Virtual Disk Service The Microsoft Virtual Disk Service (VDS) is a component of the Windows operating system. The VDS component utilizes third-party vendor specific software modules, known as providers, to access and configure third-party storage resources, such as MD3600i Series storage arrays.
book.book Page 246 Tuesday, September 27, 2011 3:13 PM VSS attaches to the service and uses it to coordinate the creation of snapshot virtual disks on the storage array. VSS-initiated snapshot virtual disks can be triggered through backup tools, known as requestors.
book.book Page 247 Tuesday, September 27, 2011 3:13 PM 19 Troubleshooting: Your Storage Array Software Start-Up Routine Look and listen during the array’s start-up routine for the indications described in Table 19-1. For a description of the front- and back-panel indicators, see "Planning: About Your Storage Array" on page 23. Table 19-1. Start-Up Routine Indications Look/listen for Action Alert messages. See your storage management documentation.
book.book Page 248 Tuesday, September 27, 2011 3:13 PM To launch the AMW, perform one of these actions: • On the Devices tab, in either the Tree view or the Table view, double-click a storage array. Alternatively, you can right-click a storage array and select Manage Storage Array from the pop-up menu. • On the Setup tab, select Manage a Storage Array. After the AMW is displayed, select the Physical tab to see the components in the storage array.
book.book Page 249 Tuesday, September 27, 2011 3:13 PM In the Table view, every managed storage array is listed once, regardless of the number of attachments it has in the Tree view. After the storage array is contacted by MDSM, an icon representing its hardware status is displayed. Hardware status can be Optimal, Needs Attention, or Fixing.
book.book Page 250 Tuesday, September 27, 2011 3:13 PM Table 19-3. Additional Status Icons Status Icon Adding a Storage Array Description The Contacting Storage Array icon is shown in the Tree view and Table view until the current status of each managed storage array is known. The Contacting Storage Array icon is shown in the EMW Status Bar and the AMW Status Bar and the tooltip shows Contacting Storage arrays.
book.book Page 251 Tuesday, September 27, 2011 3:13 PM Storage Array Support Data You can gather various types of inventory, status, and performance data that can help troubleshoot any problem with the storage array. All the files are compressed into a single archive in a zipped-file format. You can forward the archive file to your Technical Support representative for troubleshooting and further analysis.
book.book Page 252 Tuesday, September 27, 2011 3:13 PM WARNING: Use this option only under the guidance of your Technical Support representative. NOTE: Enable only one collect support bundle data to a single client system. Setting multiple systems to collect data may potentially affect the storage array performance. To automatically collect the support bundle data: 1 In the AMW, select Advanced Troubleshooting Support Data Automatic Settings.
book.book Page 253 Tuesday, September 27, 2011 3:13 PM • A time stamp. • The version number for the RAID controller module firmware. • The version number for the management application programming interface (API). • The model ID for the RAID controller module board. • The collection status for each RAID controller module. If the status is Failed, the reason for failure is noted, and there is no trace file for the failed RAID controller module.
book.book Page 254 Tuesday, September 27, 2011 3:13 PM Collecting Physical Disk Data You can use the Collect Physical Disk Data option to collect log sense data from all the physical disks on your storage array. Log sense data consists of statistical information that is maintained by each of the physical disks in your storage array. Your Technical Support representative can use this information to analyze the performance of your physical disks and for troubleshooting problems that may exist.
book.book Page 255 Tuesday, September 27, 2011 3:13 PM Event Log You can use the Event Log Viewer to view a detailed list of events that occur in a storage array. The event log is stored on reserved areas on the storage array disks. It records configuration events and storage array component failures. WARNING: Use this option only under the guidance of your Technical Support representative. The event log stores approximately 8000 events before it replaces an event with a new event.
book.book Page 256 Tuesday, September 27, 2011 3:13 PM Recovery Guru The Recovery Guru is a component of MDSM that diagnoses critical events on the storage array and recommends step-by-step recovery procedures to resolve the problems. In the AMW, to display the Recovery Guru, perform one of these actions: • Click Recovery Guru • In the Support tab, click the Recover from Failure link. • From the Status pane on the Summary tab, click the Storage Array Needs Attention link. .
book.book Page 257 Tuesday, September 27, 2011 3:13 PM 2 Perform one of these actions in the Storage Array Profile dialog: • View detailed information—Go to step 3. • Search the storage array profile—Go to step 4. • Save the storage array profile—Go to step 5. • Close the storage array profile—Go to step 6. 3 Select one of the tabs, and use the horizontal scroll bar and the vertical scroll bar to view the storage array profile information.
book.book Page 258 Tuesday, September 27, 2011 3:13 PM Viewing the Logical Associations You can use the Associated Logical Elements option to view the logical associations among different virtual disks in a storage array. To view the associations for source virtual disks, snapshot virtual disks, and snapshot repository virtual disks: 1 In the AMW, select the Logical tab. 2 Select View Associated Logical Elements.
book.book Page 259 Tuesday, September 27, 2011 3:13 PM Finding Nodes You can use the Find option to search for a particular node on the Logical tab, the Physical tab, or the Mappings tab of the AMW. The search may be based on a particular node name, the RAID level, virtual disk capacity, or specific free capacity nodes.
book.book Page 260 Tuesday, September 27, 2011 3:13 PM 7 To search for all Free Capacity nodes with a particular capacity, perform these steps: NOTE: This option is not available when the Search by name option is selected or from the Mappings tab. You must cancel the selection of the Search by name option to use this option. a Select Find all free capacity nodes. b Type the capacity in the GB box.
book.book Page 261 Tuesday, September 27, 2011 3:13 PM 2 Select View Go To Snapshot Virtual Disk. The selection jumps to the associated snapshot virtual disk in the Logical pane. 3 Select View Go To Snapshot Repository Virtual Disk. The selection jumps to the associated snapshot repository virtual disk in the Logical pane. 4 Select View Go To Source Virtual Disk. The selection jumps to the associated source virtual disk in the Logical pane. 5 Select View Go To Target Virtual Disk.
book.book Page 262 Tuesday, September 27, 2011 3:13 PM • Out-of-band managed storage array—Go to step 6. • In-band managed storage array—Go to step 12. 6 For an out-of-band managed storage array, ensure that the RAID controller modules are network accessible by using the ping command to make sure that the RAID controller module can be reached. Type one of these commands, and press .
book.book Page 263 Tuesday, September 27, 2011 3:13 PM If you started the host system before you were connected to the RAID controller module in the storage array, the Host Context Agent software is not able to detect the RAID controller modules. If this is the case, make sure that the connections are secure, and restart the Host Context Agent software.
book.book Page 264 Tuesday, September 27, 2011 3:13 PM Locating a Physical Disk You can use the Locate Physical Disk option to physically locate and identify one or more of the physical disks in an expansion enclosure by activating physical disk LEDs. To locate the physical disk: 1 Select the Physical tab. 2 Select the physical disks that you want to locate. 3 Select Physical Disk Blink Physical Disk. The LEDs on the selected physical disks blink. 4 When you have located the physical disks, click OK.
book.book Page 265 Tuesday, September 27, 2011 3:13 PM Locating an Expansion Enclosure You can use the Blink option to physically locate and identify an expansion enclosure in the storage array. The LED activation varies according to the type of expansion enclosure that you have. • If you have an expansion enclosure with a white LED, the Blink Expansion Enclosure operation causes the white LED on the expansion enclosure to come on. The LED does not blink.
book.book Page 266 Tuesday, September 27, 2011 3:13 PM Capturing the State Information Use the Troubleshooting Capture State Information option to capture information about the current state of your storage array and save the captured information to a text file. You can then send the captured information to your Technical Support representative for analysis.
book.book Page 267 Tuesday, September 27, 2011 3:13 PM SMrepassist Utility SMrepassist (replication assistance) is a host-based utility for Windows platforms. This utility is installed with MDSM. Use this utility before and after you create a virtual disk copy on a Windows operating system to ensure that all the memory-resident data for file systems on the target virtual disk is flushed and that the driver recognizes signatures and file system partitions.
book.book Page 268 Tuesday, September 27, 2011 3:13 PM Unidentified Devices An unidentified node or device occurs when MDSM cannot access a new storage array. Causes for this error include network connection problems, the storage array is turned off, or the storage array does not exist. NOTE: Before beginning any recovery procedure, make sure that the Host Context Agent software is installed and running.
book.book Page 269 Tuesday, September 27, 2011 3:13 PM b Make sure that the network can access the host by using the ping command in the following syntax: ping . If the network can access the host, continue to step c. If the network cannot access the host, go to step d. c Remove the host with the unresponsive status from the MDSM, and add that host again. If the host returns to optimal status, you have completed this procedure.
book.book Page 270 Tuesday, September 27, 2011 3:13 PM d Make sure that the applicable network configuration tasks are done (for example, the IP addresses are assigned to each controller). 5 Make sure that the controller firmware is compatible with MDSM on your management station. If the controller firmware was upgraded, the MDSM may not have access to the storage array. A new version of MDSM may be needed to manage the storage array with the new version of the controller firmware.
book.book Page 271 Tuesday, September 27, 2011 3:13 PM Starting or Restarting the Host Context Agent Software The Host Context Agent software module is the software component that resides on the server or management station that communicates with the MD3600i Series storage arrays. The SMagent software automatically starts after you reboot the host. Windows To restart the SMagent software in Windows: 1 Click Start Settings Control Panel Administrative Tools Services.
book.
book.book Page 273 Tuesday, September 27, 2011 3:13 PM Troubleshooting: Your Array 20 Safety First—For you and Your Array CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty.
book.book Page 274 Tuesday, September 27, 2011 3:13 PM Troubleshooting Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 275 Tuesday, September 27, 2011 3:13 PM Troubleshooting Array Cooling Problems CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 276 Tuesday, September 27, 2011 3:13 PM c Reseat the EMM module and wait for 30 seconds. See "Removing an EMM" in the MD1200 and MD1220 Storage Enclosures Hardware Owner's Manual. d Turn on the server. e Check the EMM status LED. f If the LED does not turn green, replace the EMM. If the problem is not resolved, see "Getting Help" on page 283. • If EMM status LED is blinking amber (5 times per sequence), update the firmware to the latest supported firmware on both the EMMs.
book.book Page 277 Tuesday, September 27, 2011 3:13 PM wait for up to 5 minutes to check if the LED has turned blue. See "Recovery Guru" on page 256. b If following the recovery guru procedures does not solve the problem, complete the following procedure to further troubleshoot the array. c Turn off the host server as appropriate. d Remove the RAID controller module and verify that the pins on the backplane and the RAID controller module are not bent.
book.book Page 278 Tuesday, September 27, 2011 3:13 PM Troubleshooting Hard Drives CAUTION: Many repairs may only be done by a certified service technician. You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 279 Tuesday, September 27, 2011 3:13 PM Troubleshooting Array and Expansion Enclosure Connections 1 Verify that the RAID controller module port link status LED and the RAID controller module status LED are solid green for each port that is connected to a cable. If the LEDs are not solid green, see "Planning: RAID Controller Modules" on page 31. 2 Ensure that all the cables are attached correctly according to expansion enclosure mode you selected.
book.book Page 280 Tuesday, September 27, 2011 3:13 PM 2 Remove the following components from the array. See "Management: Installing Array Components" on page 219. • Hard drives • RAID controller modules • Power supply/cooling fan modules • Control panel • Backplane 3 Let the system dry thoroughly for at least 24 hours. 4 Reinstall the components you removed in step 2. 5 Connect all the cables and turn on the array. If the array does not start properly, see "Getting Help" on page 283.
book.book Page 281 Tuesday, September 27, 2011 3:13 PM Troubleshooting RAID Controller Modules Conditions Certain events can cause a RAID controller module to fail and/or shut down. Unrecoverable ECC memory or PCI errors, or critical physical conditions can cause lockdown. If your RAID storage array is configured for redundant access and cache mirroring, the surviving controller can normally recover without data loss or shutdown. Typical hard controller failures are detailed in the following sections.
book.book Page 282 Tuesday, September 27, 2011 3:13 PM PCI Errors The storage array firmware can detect and only recover from PCI errors when the RAID controller modules are configured for redundancy. If a virtual disk uses cache mirroring, it fails over to its peer RAID controller module, which initiates a flush of the dirty cache.
book.book Page 283 Tuesday, September 27, 2011 3:13 PM Getting Help 21 Contacting Dell For customers in the United States, call 800-WWW-DELL (800-999-3355). NOTE: If you do not have an active Internet connection, you can find contact information on your purchase invoice, packing slip, bill, or Dell product catalog. Dell provides several online and telephone-based support and service options. Availability varies by country and product, and some services may not be available in your area.
book.
book.
book.
book.
book.
book.
book.
book.
book.