book.
book.book Page 2 Wednesday, June 8, 2011 5:01 PM Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. ____________________ Information in this publication is subject to change without notice. © 2011 Dell Inc. All rights reserved.
book.book Page 3 Wednesday, June 8, 2011 5:01 PM Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . About This Document . . . . . . . . . . . . . . . . . . Inside the Box of the Dell PowerVault MD3600f Series Storage Array. . . . . . . . . . . . . . . 20 Dell PowerVault MD3600f Series Storage Array . . . . . . . . . . . . . . . . 20 Dell PowerVault Modular Disk Storage Manager . . . . . . . . . . . . . . . 20 . . . . . . . . . . . . Planning: About Your Storage Array .
book.book Page 4 Wednesday, June 8, 2011 5:01 PM RAID Controller Module Connectors and Features Host Channel LED Link/Rate Indications . . . 32 . . . . . . . . 34 . . . . 34 . . . . . . . . . . . . . . . . 34 RAID Controller Module—Additional Features . Battery Backup Unit Storage Array Thermal Shutdown System Password Reset . . . . . . . . . 35 . . . . . . . . . . . . . . 35 . . . . . . . . . . . . . 35 . . . . . . . . . . . . . . . . . . 35 Cache Functions and Features .
book.book Page 5 Wednesday, June 8, 2011 5:01 PM Virtual Disk Initialization . . . . . . . . . . . . . . Background Initialization . 45 . . . . . . . . . . . . . 46 . . . . . . . . . . . . . . 46 Consistency Check . . . . . . . . . . . . . . . . . 46 Media Verification . . . . . . . . . . . . . . . . . 46 . . . . . . . . . . . . . . . . . . . . . 47 Foreground Initialization Cycle Time Virtual Disk Operations Limit Disk Group Operations. . . . . . . . . . . . . 47 . . . . . . . . . . .
book.book Page 6 Wednesday, June 8, 2011 5:01 PM Load Balancing. . . . . . . . . . . . . . . . . . . . . . Monitoring MD3600f Series System Performance 5 Configuration: Overview User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 . . . . . . . . . . . . . . . . 67 . . . . . . . . 67 . . . . . . . . . . . . . . . . . . . . . . 68 Adding Storage Arrays . . . . . . . . . . . . . . . Setting Up Your Storage Array Locating Storage Arrays Setting a Password . .
book.book Page 7 Wednesday, June 8, 2011 5:01 PM Configuring E–mail Alerts. . . . . . . . . . . . . . 79 Configuring SNMP Alerts . . . . . . . . . . . . . . 81 . . . . . . . . . . . . . . . . . . . . . 83 Battery Settings Setting the Storage Array RAID Controller Module Clocks . . . . . . . . . . . . . . . 7 Configuration: Event Monitor . . . . 84 . . . . . . . . . 85 Enabling or Disabling the Event Monitor . . . . . . . . 86 . . . . . . . . . . . . . . . . . . . . . . 86 . . . . . . .
book.book Page 8 Wednesday, June 8, 2011 5:01 PM 9 Configuration: Disk Groups and Virtual Disks . . . . . . . . . . . . . . . . . . . Creating Disk Groups and Virtual Disks . Creating Disk Groups . . . . . . . . . . . . . . . . . . . . . . . 100 . . . . . . . . . . . . . . 102 Creating Virtual Disks . . . . . . . . . . . . . . . 102 . . . . . . . . . . . . Changing the Virtual Disk Cache Settings . . . . Changing the Segment Size of a Virtual Disk . Changing the I/O Type. 104 105 . .
book.book Page 9 Wednesday, June 8, 2011 5:01 PM Removing Host-to-Virtual Disk Mapping . Changing the RAID Controller Module Ownership of a Disk Group . . . . . . . . . . . . 128 . . . . . . 128 Changing the RAID Level of a Disk Group Restricted Mappings. . . . . . 129 . . . . . . . . . . . . . . . . . . 130 Changing the RAID Controller Module Ownership of a Virtual Disk or a Disk Group . . . . 131 . . . . . . . 133 . . . . . . . . . . . . . . . . . .
book.book Page 10 Wednesday, June 8, 2011 5:01 PM Preparing Host Servers to Create the Snapshot Using the Simple Path . . . . . . . . . 145 . . . . . . . . . . . 148 . . . . . . . . . . . . 148 Creating a Snapshot Virtual Disk Using the Advanced Path . . . . About the Advanced Path. Preparing Host Servers to Create the Snapshot Using the Advanced Path . Creating the Snapshot Using the Advanced Path . . . . . . . 149 . . . . . . . . . . . . 151 . . . . . . 153 . . . . . . . . . . . .
book.book Page 11 Wednesday, June 8, 2011 5:01 PM Failed Virtual Disk Copy. . . . . . 167 . . . . . . . . . . . . . 167 . . . . . . . . . . . . . . . . . . . . . . 167 Preferred RAID Controller Module Ownership Failed RAID Controller Module Copy Manager 166 . . . . . . . . . . . . . . Copying the Virtual Disk . Storage Array Performance During Virtual Disk Copy . Setting Copy Priority . 168 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 . . . . . . . . . . . . . . . . . .
book.book Page 12 Wednesday, June 8, 2011 5:01 PM Primary and Secondary Virtual Disk Pairs . . . . 179 Using Remote Replication With Other Features . . . . . . . . . . . . . . . 180 Storage Partitioning With Remote Replication . . . . . . . . . . . . . . . . 180 Snapshot Virtual Disk With Remote Replication . . . . . . . . . . . . . . . . 181 Virtual Disk Copy With Remote Replication Virtual Disk Expansion With Remote Replication . . . . . . . . 181 . . . . . . . . . . .
book.book Page 13 Wednesday, June 8, 2011 5:01 PM Viewing the Properties Pane . . . . . . . . . . . . Viewing Logical Elements of the Secondary Virtual Disk . . . . . . . . . . . . . . . Viewing the Physical Components or Logical Elements of the Primary Virtual Disk . Virtual Disk Status Icons 192 192 . . . 193 . . . . . . . . . . . . . . 194 Changing Write Mode and Consistency Group Membership . . . . . . . . . . . Resynchronizing Virtual Disks . . . . . . 194 . . . . . . . . . . .
book.book Page 14 Wednesday, June 8, 2011 5:01 PM Disabling the Remote Replication Premium Feature . . . . . . . . . . . . . . . . . 14 Configuration: Device Mapper Multipath for Linux . . . . . . . . . Overview . . . . . . . . 211 . . . . . . . . . . . . . . . . . . . . . . . 211 Using DM Multipathing Devices. Prerequisites . . . . . . . . . . . 212 . . . . . . . . . . . . . . . . . . . 212 Device Mapper Configuration Steps . . . . . . . 213 . . . . . . . . . . . . 218 . . . . . . . . . .
book.book Page 15 Wednesday, June 8, 2011 5:01 PM Removing a RAID Controller Module Blank . . . . 229 Installing a RAID Controller Module Blank . . . . . 230 . . . . . . . 231 . . . . . . . . 232 Removing a RAID Controller Module . Installing a RAID Controller Module Opening the RAID Controller Module Closing the RAID Controller Module . . . . . . . 233 . . . . . . . . 234 . . . . . 235 Removing the RAID Controller Module Backup Battery Unit . . . . . . . . . . . .
book.book Page 16 Wednesday, June 8, 2011 5:01 PM Downloading Physical Disk Firmware . . . . . . . . Downloading MD1200 Series Expansion Module EMM Firmware . . . . . . . . . . . . . . . . 255 Self-Monitoring Analysis and Reporting Technology (SMART) . . . . . . . . . . . . . . . . . . 256 . . . . . . . . 257 Media Errors and Unreadable Sectors 17 Management: Firmware Inventory Viewing the Firmware Inventory . . . . 259 . . . . . . . . . . . 259 18 Management: System Interfaces .
book.book Page 17 Wednesday, June 8, 2011 5:01 PM Storage Array Profile 270 . . . . . . . . . . . . . . . . . . Viewing the Logical Associations. . . . . . . . . . . . 272 Viewing the Physical Associations . . . . . . . . . . . 273 . . . . . . . . . . . . . . . . . . . . . . 273 . . . . . . . . . . . . . . . . . . . . . . . 275 Finding Nodes Using Go To Recovering From an Unresponsive Storage Array Condition . . . . . . Locating a Physical Disk. . . . . . . . . . . . 276 . . . . . . . . .
book.book Page 18 Wednesday, June 8, 2011 5:01 PM Troubleshooting Power Supply/Cooling Fan Module . . . . . . . . . . . . . . Troubleshooting Array Cooling Problems . Troubleshooting Expansion Enclosure Management Modules . . . . . . 293 . . . . . . . . . . . 294 . . . . . . 295 . . . . . . . . . . . . . 296 Troubleshooting RAID Controller Modules Troubleshooting Hard Drives Troubleshooting Array and Expansion Enclosure Connections . . . . . . . . . . Troubleshooting a Wet Storage Array .
book.book Page 19 Wednesday, June 8, 2011 5:01 PM 1 Introduction NOTE: Throughout the document, Dell PowerVault MD3600f series storage array refers to both Dell PowerVault MD3600f and Dell PowerVault MD3620f. See the Safety, Environmental, and Regulatory Information document for important safety information before following any procedures listed in this document. About This Document This guide familiarizes you with the functions of the MD3600f Series storage array.
book.book Page 20 Wednesday, June 8, 2011 5:01 PM Inside the Box of the Dell PowerVault MD3600f Series Storage Array Unless specified, MD3600f Series represents Dell PowerVault MD3600f and Dell PowerVault MD3620f.
book.book Page 21 Wednesday, June 8, 2011 5:01 PM Other Information You May Need WARNING: See the safety and regulatory information that shipped with your system. Warranty information may be included within this document or as a separate document. • Getting Started Guide provides an overview of setting up and cabling your storage array. • Deployment Guide provides installation and configuration instructions for both software and hardware.
book.
book.book Page 23 Wednesday, June 8, 2011 5:01 PM 2 Planning: About Your Storage Array Overview The MD3600f Series storage array is designed for high availability, offering redundant access to data storage. It’s features support for both single and dual RAID controller configuration. The Dell PowerVault MD3600f Series storage array provides Fibre Channel (FC) connectivity to the host server and enables access for up to eight nonredundant servers or four redundant servers.
book.book Page 24 Wednesday, June 8, 2011 5:01 PM Hardware Features Front-Panel Features and Indicators Figure 2-1. Front-Panel Features and Indicators—Dell PowerVault MD3600f 1 2 3 4 5 6 Figure 2-2.
book.book Page 25 Wednesday, June 8, 2011 5:01 PM Figure 2-3. Front-Bezel Features and Indicators 1 2 3 Item Indicator, Button, or Connector 1 Enclosure status LED Icon Description The enclosure status LED lights when the enclosure power is on. Lights blue during normal operation. Blinks blue when a host server is identifying the enclosure or when the system identification button is pressed. Lights amber as enclosure boots or is reset.
book.book Page 26 Wednesday, June 8, 2011 5:01 PM Item Indicator, Button, or Connector Icon Description 3 Split mode LED This LED should be unlit as the split mode function is not supported by the MD3600f Series Storage Arrays. 4 System identification button The system identification button on the front control panel can be used to locate a particular enclosure within a rack.
book.book Page 27 Wednesday, June 8, 2011 5:01 PM Back Panel Features and Indicators Figure 2-4.
book.book Page 28 Wednesday, June 8, 2011 5:01 PM Hard–Drive Indicator Patterns Figure 2-5.
book.book Page 29 Wednesday, June 8, 2011 5:01 PM Drive-Status Indicator Pattern Condition Off The physical disk is: • not yet discovered by the host server • has been spun down for removal • not supported for the RAID controller module or is not in the physical disk slot NOTE: The drive status indicator remains off until all hard drives are initialized after system power is turned on. Drives are not ready for insertion or removal during this time.
book.book Page 30 Wednesday, June 8, 2011 5:01 PM Power Indicator Codes Figure 2-6. Power Indicator Codes 1 2 3 4 5 Item LED Type 1 DC power Icon Description The LED lights green when the DC output voltage is within the limit. If this LED is off, it indicates that the DC output voltage are not within the limit. 2 Power supply/cooling fan fault The LED lights amber when the DC output voltage is not within the limit or a fault with the fan is detected.
book.book Page 31 Wednesday, June 8, 2011 5:01 PM 3 Planning: RAID Controller Modules RAID Controller Modules The RAID controller modules provide high-performance, advanced virtual disk configuration, and fault-tolerant disk subsystem management. Each RAID controller module contains 2 GB of cache that is mirrored with the other controller's cache for high availability and is protected by a batterypowered cache offload mechanism.
book.book Page 32 Wednesday, June 8, 2011 5:01 PM RAID Controller Module Connectors and Features Figure 3-1. MD3600f Series Fibre Channel RAID Controller Module 3 2 1 21 20 4 19 18 17 16 15 14 13 5 12 7 6 11 10 9 8 Item Component Function 1 SAS OUT port Provides SAS connection for cabling to a downchain expansion enclosure. 2 FCIN port 0 Provides host-to-controller FC connection. 3 FCIN port 1 Provides host-to-controller FC connection.
book.book Page 33 Wednesday, June 8, 2011 5:01 PM Item Component Function 9 Management port Ethernet connector Provides a 100/1000 Mbps Ethernet connection for out-ofband management of the enclosure. 10 Management port speed LED Lights green when Ethernet connection is operating at 1000 Mbps. Lights amber when Ethernet connection is operating at 100 Mbps. Off when Ethernet connection is operating at 10 Mbps or is not active. 11 Password reset switch Activating this switch resets the password.
book.book Page 34 Wednesday, June 8, 2011 5:01 PM Item Component Function 20 FCIN port 0 LED 1 / LED 0 Displays link rate and port status per the accompanying host channel LED link/rate table. 21 SAS OUT port link/fault LED Lights green when all four links are connected. Lights amber when one to three links are disconnected. Off when all links in the port are disconnected or cable is disconnected. Host Channel LED Link/Rate Indications Below each FC port is a pair of LED indicators.
book.book Page 35 Wednesday, June 8, 2011 5:01 PM Storage Array Thermal Shutdown The system automatically shuts down when system temperature exceeds the safe threshold. The battery backup unit protects against data loss by providing power to offload cache to non-volatile memory in the event of power loss. It is not necessary to shut down any MD1200 Series expansion enclosures attached to the storage array when thermal shutdown occurs.
book.book Page 36 Wednesday, June 8, 2011 5:01 PM Write–Back Cache In write-back cache, write operations result in a completion signal being sent to the host operating system as soon as the cache receives the data to be written. The target physical disk receives the data at a more appropriate time in order to increase controller performance.
book.book Page 37 Wednesday, June 8, 2011 5:01 PM Figure 3-2. Fiber Optic Cable Connection 1 2 1 SFP transceiver 2 Fiber optic cable The RAID expansion ports support SAS expansion connections. Figure 3-3 shows a SAS cable and an SFF-8088 connector. Figure 3-3.
book.book Page 38 Wednesday, June 8, 2011 5:01 PM Interoperability of 2 Gbps, 4 Gbps, and 8 Gbps Devices The FC standard specifies a procedure for speedy auto-detection. If a 4 Gbps port on a switch or device is connected to a 2 Gbps port, it must negotiate down for the link to run at 2 Gbps. If there are two 8 Gbps ports on either end of a link, the negotiation runs the link at 8 Gbps if the link supports the required specifications.
book.book Page 39 Wednesday, June 8, 2011 5:01 PM 4 Planning: MD3600f Series Storage Array Terms and Concepts This chapter explains terms and concepts used for configuration and operation of MD3600f Series storage arrays. Physical Disks, Virtual Disks, and Disk Groups Physical disks in your storage array provide the physical storage capacity for your data.
book.book Page 40 Wednesday, June 8, 2011 5:01 PM Physical Disks Only Dell supported 6.0 Gbps SAS physical disks are supported in the storage array. If the storage array detects unsupported physical disks, it marks the disk as unsupported and the physical disk becomes unavailable for all operations. NOTE: The MD3600f Series array must contain at least two physical disks for proper operation. This is necessary because the physical disks are used to store configuration information.
book.book Page 41 Wednesday, June 8, 2011 5:01 PM Table 4-1. RAID Controller Physical Disk States (continued) Status Mode Description Physical Disk Status LED Pending Failure Assigned, Unassigned, Hot Spare in use, or Hot Spare standby A Self-Monitoring Analysis and Reporting Technology (SMART) error has been detected on the physical disk in the indicated slot.
book.book Page 42 Wednesday, June 8, 2011 5:01 PM Disk groups are always created in the unconfigured capacity of a storage array. Unconfigured capacity is the available physical disk space not already assigned in the storage array. Virtual disks are created within the free capacity of a disk group. Free capacity is the space in a disk group that has not been assigned to a virtual disk. Virtual Disk States The storage array recognizes the following virtual disk states. Table 4-2.
book.book Page 43 Wednesday, June 8, 2011 5:01 PM RAID Levels RAID levels determine the way in which data is written to physical disks. Different RAID levels provide different levels of accessibility, redundancy, and capacity. Using multiple physical disks has the following advantages over using a single physical disk: • Placing data on multiple physical disks (striping) allows input/output (I/O) operations to occur simultaneously and improve performance.
book.book Page 44 Wednesday, June 8, 2011 5:01 PM RAID 0 RAID 0 uses disk striping to provide high data throughput, especially for large files in an environment that requires no data redundancy. RAID 0 breaks the data down into segments and writes each segment to a separate physical disk. I/O performance is greatly improved by spreading the I/O load across many physical disks. Although it offers the best performance of any RAID level, RAID 0 lacks data redundancy.
book.book Page 45 Wednesday, June 8, 2011 5:01 PM RAID 10 RAID 10, a combination of RAID 1 and RAID 0, uses disk striping across mirrored disks. It provides high data throughput and complete data redundancy. Utilizing an even number of physical disks (four or more) creates a RAID level 10 disk group and/or virtual disk. Because RAID levels 1 and 10 use disk mirroring, half of the capacity of the physical disks is utilized for mirroring.
book.book Page 46 Wednesday, June 8, 2011 5:01 PM Background Initialization The storage array executes a background initialization when the virtual disk is created to establish parity, while allowing full host server access to the virtual disks. Background initialization does not run on RAID 0 virtual disks. The background initialization rate is controlled by MDSM. To change the rate of background initialization, you must stop any existing background initialization.
book.book Page 47 Wednesday, June 8, 2011 5:01 PM Cycle Time The media verification operation runs only on selected disk groups, independent of other disk groups. Cycle time is the time taken to complete verification of the metadata region of the disk group and all virtual disks in the disk group for which media verification is configured. The next cycle for a disk group starts automatically when the current cycle completes.
book.book Page 48 Wednesday, June 8, 2011 5:01 PM Disk Group Operations RAID Level Migration You can migrate from one RAID level to another depending on your requirements. For example, fault-tolerant characteristics can be added to a stripe set (RAID 0) by converting it to a RAID 5 set. MDSM provides information about RAID attributes to assist you in selecting the appropriate RAID level.
book.book Page 49 Wednesday, June 8, 2011 5:01 PM Virtual Disk Capacity Expansion When you configure a virtual disk, you select a capacity based on the amount of data you expect to store. However, you may need to increase the virtual disk capacity for a standard virtual disk by adding free capacity to the disk group. This creates more unused space for new virtual disks or to expand existing virtual disks.
book.book Page 50 Wednesday, June 8, 2011 5:01 PM If a redundant RAID controller module fails with an existing disk group process, the process on the failed controller is transferred to the peer controller. A transferred process is placed in a suspended state if there is an active disk group process on the peer controller. The suspended processes are resumed when the active process on the peer controller completes or is stopped.
book.book Page 51 Wednesday, June 8, 2011 5:01 PM Virtual Disk Migration and Disk Roaming Virtual disk migration is moving a virtual disk or a hot spare from one array to another by detaching the physical disks and re-attaching them to the new array. Disk roaming is moving a physical disk from one slot to another on the same array. Disk Migration You can move virtual disks from one array to another without taking the target array offline.
book.book Page 52 Wednesday, June 8, 2011 5:01 PM Use either of the following methods to move disk groups and virtual disks: • Hot virtual disk migration—Disk migration with the destination storage array power turned on. • Cold virtual disk migration—Disk migration with the destination storage array power turned off. NOTE: To ensure that the migrating disk groups and virtual disks are correctly recognized when the target storage array has an existing physical disk, use hot virtual disk migration.
book.book Page 53 Wednesday, June 8, 2011 5:01 PM • Enabling premium features before migration—Before migrating disk groups and virtual disks, enable the required premium features on the destination storage array. If a disk group is migrated from a MD3600f storage array that has a premium feature enabled and the destination array does not have this feature enabled, an Out of Compliance error message can be generated. Disk Roaming You can move physical disks within an array.
book.book Page 54 Wednesday, June 8, 2011 5:01 PM You can manually configure a host server-to-virtual disk mapping. When you configure host server-to-virtual disk mapping, consider these guidelines: • You can define one host server-to-virtual disk mapping for each virtual disk in the storage array. • Host server-to-virtual disk mappings are shared between RAID controller modules in the storage array. • A unique LUN must be used by a host group or host server to access a virtual disk.
book.book Page 55 Wednesday, June 8, 2011 5:01 PM Snapshot Repository Virtual Disk When you create a snapshot virtual disk, it automatically creates a snapshot repository virtual disk. A snapshot repository is a virtual disk created in the storage array as a resource for a snapshot virtual disk. A snapshot repository virtual disk contains snapshot virtual disk metadata and copy-on-write data for a particular snapshot virtual disk. The repository supports one snapshot only.
book.book Page 56 Wednesday, June 8, 2011 5:01 PM Source Virtual Disk When you create a virtual disk copy, a copy pair consisting of a source virtual disk and a target virtual disk is created on the same storage array. When a virtual disk copy is started, data from the source virtual disk is copied completely to the target virtual disk. Target Virtual Disk When you start a virtual disk copy, the target virtual disk maintains a copy of the data from the source virtual disk.
book.book Page 57 Wednesday, June 8, 2011 5:01 PM Using Snapshot and Disk Copy Together You can use the Snapshot Virtual Disk and Virtual Disk Copy premium features together to back up data on the same storage array, or to restore the data on the snapshot virtual disk to its original source virtual disk.
book.
book.book Page 59 Wednesday, June 8, 2011 5:01 PM • Round robin with subset—The round robin with subset I/O load balance policy routes I/O requests, in rotation, to each available data path to the RAID controller module that owns the virtual disks. This policy treats all paths to the RAID controller module that owns the virtual disk equally for I/O activity. Paths to the secondary RAID controller module are ignored until ownership changes.
book.book Page 60 Wednesday, June 8, 2011 5:01 PM • Using the Performance Monitor to retrieve performance data can affect the normal storage array performance depending on the polling interval that you set. • If the storage array you are monitoring begins in or transitions to an unresponsive state, an informational dialog appears. The dialog informs you that the Performance Monitor cannot poll the storage array for performance data.
book.book Page 61 Wednesday, June 8, 2011 5:01 PM 9 Select an appropriate directory. 10 Type a file name in the File name text box. NOTE: The .perf extension is the default. 11 Select a file type from the Files of type list. • Use the Report format (ASCII text) file type to save the data to a report form for viewing or printing. • Use the Comma Delimited Format file type to save the data in a form that can be imported into a commercial spreadsheet application for further analysis.
book.
book.book Page 63 Wednesday, June 8, 2011 5:01 PM Configuration: Overview 5 Dell PowerVault Modular Disk Storage Manager (MDSM) online help contains information on the how to use the MDSM application to perform the configuration and management tasks described in this document. You can access online help by selecting Help located at the top right corner of MDSM interface. See the MD3600f and MD3620f Storage Array’s Deployment Guide for information on installing the MDSM.
book.book Page 64 Wednesday, June 8, 2011 5:01 PM Enterprise Management Window The EMW provides high-level management of storage arrays. When you start MDSM, the EMW opens. The EMW has these tabs: • Devices tab—Provides information about the storage arrays. • Setup tab—Presents the initial setup tasks that guide you through adding storage arrays and configuring alerts.
book.book Page 65 Wednesday, June 8, 2011 5:01 PM Inheriting the System Settings Use the Inherit System Settings option to import the operating system theme settings into the MDSM. Importing system theme settings affects such features as font type, font size, color, and contrast in the MDSM. 1 Open the Inherit System Settings window in one of these ways: • Select ToolsInherit System Settings. • Select the Setup tab, and click Inherit System Settings.
book.book Page 66 Wednesday, June 8, 2011 5:01 PM • Physical tab—You can view the organization of the storage array by RAID controller modules, physical disks, and other hardware components. • Mappings tab—You can define the hosts, host groups, and host ports. You can change the mappings to grant virtual disk access to host groups and hosts and create storage partitions. • Setup tab—You can complete the initial setup tasks to configure the storage array.
book.book Page 67 Wednesday, June 8, 2011 5:01 PM 6 Configuration: About Your Storage Array Out–of–Band and In–Band Management You can manage a storage array in two ways: • Out-of-band management • In-band management Out-of-Band Management Using the out-of-band management method, data is separated from commands and events. Data travels through the host-to-controller interface, while commands and events travel through the management port Ethernet cables.
book.book Page 68 Wednesday, June 8, 2011 5:01 PM In-Band Management Using in-band management, commands, events, and data travel through the host-to-controller interface. Unlike out-of-band management, commands and events are mixed with data. NOTE: For detailed information on setting up in-band and out-of-band management see the Deployment Guide. When you add storage arrays by using this management method, you need to specify only the host name or IP address of the host.
book.book Page 69 Wednesday, June 8, 2011 5:01 PM NOTE: For Linux, set the default gateway so that broadcast packets are sent to 255.255.255.0. For Red Hat Enterprise Linux, if no gateway exists on the network, set the default gateway to the IP address of the NIC. NOTE: MDSM uses TCP/UDP port 2463 for communication to the MD Storage Array.
book.book Page 70 Wednesday, June 8, 2011 5:01 PM NOTE: The host agent must be restarted before in-band management communication can be established. See "Starting or Restarting the Host Context Agent Software" on page 285. 3 Click Add. 4 Use one of these methods to name a storage array: • In the EMW, select the Setup tab, and select Name/Rename Storage Arrays. • In the AMW, select the Setup tab, and select Rename Storage Array.
book.book Page 71 Wednesday, June 8, 2011 5:01 PM • Save Configuration—Save the configuration parameters in a file that you can use to restore the configuration, or reuse the configuration on another storage array. For more information, see the PowerVault Modular Disk Storage Manager online help topics.
book.book Page 72 Wednesday, June 8, 2011 5:01 PM Naming or Renaming Storage Arrays Each storage array should be assigned a unique up to 30-character alphanumeric name. A name can consist of letters, numbers, and the special characters underscore (_), dash (–), and pound sign (#). No other special characters are allowed. To rename a selected storage array: 1 Perform one of these actions: • In the AMW Setup tab, select Rename Storage Array. • In the EMW Devices tab Tree view, select EditRename.
book.book Page 73 Wednesday, June 8, 2011 5:01 PM Setting a Password You can configure each storage array with a password to protect it from unauthorized access. MDSM prompts for the password when an attempt is made to change the storage array configuration, such as, when a virtual disk is created or deleted. View operations do not change the storage array configuration and do not require a password. You can create a new password or change an existing password.
book.book Page 74 Wednesday, June 8, 2011 5:01 PM Password Guidelines Follow these guidelines when you create a password: • Use secure passwords for your storage array. A password should be easy for you to remember but difficult for others to determine. Consider using numbers or special characters in the place of letters, such as a 1 in the place of the letter I, or the at sign (@) in the place of the letter a. • For increased protection, use a long password with at least 15 alphanumeric characters.
book.book Page 75 Wednesday, June 8, 2011 5:01 PM Adding/Editing a Comment to an Existing Storage Array A descriptive comment, with an applicable storage array name, is a helpful identification tool. You can add or edit a comment for a storage array in the EMW only. To add or edit a comment: 1 In the EMW, select the Devices tab and select the relevant managed storage array. 2 Select EditComment. The Edit Comment dialog is displayed. 3 Type the 60-character comment. 4 Click OK.
book.book Page 76 Wednesday, June 8, 2011 5:01 PM Enabling Premium Features You can enable premium features on the storage array. To enable the premium features, you must obtain a feature key file specific to the premium feature that you want to enable from your storage supplier. To enable premium features: 1 From the toolbar in AMW, select Storage ArrayPremium Features. The Premium Features and Feature Pack Information window is displayed. 2 Select the relevant premium feature, and click Enable.
book.book Page 77 Wednesday, June 8, 2011 5:01 PM Changing the Cache Settings on the Storage Array 1 In the AMW, select Storage ArrayChangeCache Settings. The Change Cache Settings window is displayed. 2 Select or enter the percentage of unwritten data in the cache to trigger a cache flush in Start flushing. 3 Select or enter the percentage of unwritten data in the cache to stop a cache flush in progress in Stop flushing. 4 Select the appropriate Cache block size.
book.book Page 78 Wednesday, June 8, 2011 5:01 PM Changing the Enclosure Order in the Physical Pane You can change the order of the RAID controller modules and the expansion enclosures in the Physical pane to match the hardware configuration in your storage array. The Physical pane that initially appears is a default view that may not match your storage array. The enclosure order change remains in effect until it is modified again.
book.book Page 79 Wednesday, June 8, 2011 5:01 PM To configure alert notifications for a single storage array: 1 In the EMW, select the Devices tab. 2 Select the relevant storage array, then select EditConfigureAlerts. The Configure Alerts dialog is displayed. To configure e-mail alerts, see "Configuring E–mail Alerts" on page 79. To configure SNMP alerts, see "Configuring SNMP Alerts" on page 81.
book.book Page 80 Wednesday, June 8, 2011 5:01 PM 5 In E-mail sender address, type the e-mail sender address. Use a valid email address. The e-mail address of the sender (the network administrator) appears on each e-mail alert sent to the destination. 6 To include the contact information of the sender in the e-mail alert, select Include contact information with the alerts, and type the contact information. NOTE: Including the contact information in the e-mail alert is optional.
book.book Page 81 Wednesday, June 8, 2011 5:01 PM 9 For the selected e-mail address, in Frequency, select: • Every event—Sends an alert e-mail whenever an event occurs. This is the default option. • Every x hours—Sends an alert e-mail after the specified time interval if an event occurred during that time interval. You can select this option only if you have selected either Event + Profile or Event + Support in the Information To Send drop down list. 10 Click OK.
book.book Page 82 Wednesday, June 8, 2011 5:01 PM These results occur, depending on your selection: • If you select all storage arrays, the Configure Alerts dialog appears. • If you select an individual storage array, the Select Storage Array dialog appears. Select the storage array for which you want to receive alert notifications and click OK. The Configure Alerts dialog appears. NOTE: If you do not know which storage array to select, click Blink to turn on the LEDs of the storage array.
book.book Page 83 Wednesday, June 8, 2011 5:01 PM Follow these guideline for SNMP alerts: • Any SNMP addresses that you had previously configured appear in the Configured SNMP addresses area. • The SNMP Community Name is determined by the system administrator and configured within the a management application, such as the Dell Management Console. More information about the Dell Management Console is available at dell.com. • You can configure multiple SNMP addresses before you click OK.
book.book Page 84 Wednesday, June 8, 2011 5:01 PM To change the battery settings perform these steps: 1 In the AMW, select Storage ArrayChangeBattery Settings. The Battery Settings dialog opens. 2 In Battery location, select a battery. 3 Check these details about the battery: • Battery status • Battery age • Days until replacement For more information, see the PowerVault Modular Disk Storage Manager online help topics.
book.book Page 85 Wednesday, June 8, 2011 5:01 PM Configuration: Event Monitor 7 An event monitor is provided with Dell PowerVault Modular Disk Storage Manager (MDSM). The event monitor runs continuously in the background and monitors activity on the managed storage arrays. If the event monitor detects any critical problems, it can notify a host or remote system using email, Simple Network Management Protocol (SNMP) trap messages, or both.
book.book Page 86 Wednesday, June 8, 2011 5:01 PM Enabling or Disabling the Event Monitor You can enable or disable the event monitor at any time. Disable the event monitor if you do not want the system to send alert notifications. If you are running the event monitor on multiple systems, disabling the event monitor on all but one system prevents the sending of duplicate messages.
book.book Page 87 Wednesday, June 8, 2011 5:01 PM Configuration: About Your Host 8 Configuring Host Access Dell PowerVault Modular Disk Storage Manager (MDSM) software is comprised of multiple modules. One of these modules is the Host Context Agent. The host context agent is installed as part of the MDSM installation and runs continuously in the background.
book.book Page 88 Wednesday, June 8, 2011 5:01 PM The host topology is reconfigurable. You can perform the following tasks: • Create a host and assign an alias or user label. • Add or associate a new host port identifier to a particular host. • Change the host port identifier alias or user label. • Move or associate a host port identifier to a different host. • Replace a host port identifier with a new host port identifier.
book.book Page 89 Wednesday, June 8, 2011 5:01 PM To define a host: 1 In the AMW, select the Mappings tab and select the appropriate storage array. 2 Perform one of the actions: • Select MappingsDefineHost. • Select the Setup tab, and click Manually Define Hosts. • Select the Mappings tab. Right-click the root node (storage array name), Default Group node, or Host Group node in the Topology pane to which you want to add the host, and select DefineHost from the pop-up menu.
book.book Page 90 Wednesday, June 8, 2011 5:01 PM 9 Click Next. If you select Yes, the Specify Host Group window is displayed. If you select No, see step 11 10 Enter the name of the host group or select an existing host group and click Next. The Preview window is displayed. 11 Click Finish. Removing Host Access 1 In the AMW, select the Mappings tab, select the host node in the Topology pane. 2 Perform one of these actions: • Select MappingsRemove.
book.book Page 91 Wednesday, June 8, 2011 5:01 PM Creating a Host Group 1 In the AMW, select the Mappings tab. 2 In the Topology pane, select the storage array or the Default Group. 3 Perform one of the following actions: • Select MappingsDefineHost Group • Right-click the storage array or the Default Group, and select DefineHost Group from the pop-up menu. 4 Type the name of the new host group in Enter new host group name. 5 Select the appropriate hosts in the Select hosts to add area.
book.book Page 92 Wednesday, June 8, 2011 5:01 PM Moving a Host to a Different Host Group 1 In the AMW, select the Mappings tab, select the host node in the Topology pane. 2 Perform one of these actions: • Select MappingsMove. • Right-click the host node, and select Move from the pop-up menu. The Move Host dialog appears. 3 In the Select host group, select the host group to which you want to move the host. The Move Host Confirmation dialog appears. 4 Click Yes.
book.book Page 93 Wednesday, June 8, 2011 5:01 PM Host Topology Host topology is the organization of hosts, host groups, and host interfaces configured for a storage array. You can view the host topology in the Mappings tab of the AMW. For more information, see "Using the Mappings Tab" on page 88.
book.book Page 94 Wednesday, June 8, 2011 5:01 PM Windows To start or stop the host context agent: 1 Click StartSettingsControl PanelAdministrative Tools Services. or Click StartAdministrative ToolsServices. 2 From the list of services, select Modular Disk Storage Manager Agent. 3 If the host context agent is running, click Action Stop, then wait approximately 5 seconds. 4 Click Action Start. I/O Data Path Protection You can have multiple host-to-array connections for a host.
book.book Page 95 Wednesday, June 8, 2011 5:01 PM For more information on Linux DM please see "Configuration: Device Mapper Multipath for Linux" on page 211. For more information on MPIO please see microsoft.com. NOTE: You should have the multi-path driver installed on the hosts at all times, even in a configuration where there is only one path to the storage system, such as a single port cluster configuration.
book.book Page 96 Wednesday, June 8, 2011 5:01 PM To manage a host port identifier: 1 Perform one of these actions: • Right-click the host in the Topology pane, and select Manage Host Port Identifiers in the pop-up menu. • From the menu bar, select Mappings Manage Host Port Identifiers. The Manage Host Port Identifiers dialog is displayed.
book.book Page 97 Wednesday, June 8, 2011 5:01 PM 8 Select the host port identifier that you would like to manage from the list of host port identifiers in the Host port identifier information area. 9 Perform one of these actions for the selected host port identifier: • To edit the host port identifier—Select the appropriate host port identifier and click Edit, the Edit Host Port Identifier dialog appears, update User label and Associated with host and click Save.
book.
book.book Page 99 Wednesday, June 8, 2011 5:01 PM Configuration: Disk Groups and Virtual Disks 9 Creating Disk Groups and Virtual Disks Disk groups are created in the unconfigured capacity of a storage array, and virtual disks are created in the free capacity of a disk group. The maximum number of physical disks supported in a disk group is 30. The hosts attached to the storage array read and write data to the virtual disks.
book.book Page 100 Wednesday, June 8, 2011 5:01 PM A disk group should be organized according to its related tasks and subtasks. For example, if you create a disk group for the Accounting Department, you can create virtual disks that match the different types of accounting performed in the department: Accounts Receivable (AR), Accounts Payable (AP), internal billing, and so forth. In this scenario, the AR and AP virtual disks probably need more capacity than the internal billing virtual disk.
book.book Page 101 Wednesday, June 8, 2011 5:01 PM 3 Type up to a 30–character name of the disk group in Disk group name. 4 Select the appropriate Physical Disk selection choices, you can select: • Automatic, see step 6 • Manual, see step 9 5 Click Next. 6 For Automatic configuration, The RAID Level and Capacity window is displayed. 7 Select the appropriate RAID level in Select RAID level. You can select RAID levels 0, 1/10, 6, and 5.
book.book Page 102 Wednesday, June 8, 2011 5:01 PM Locating a Disk Group You can physically locate and identify all of the physical disks that comprise a selected disk group. An LED blinks on each physical disk in the disk group. To locate a disk group: 1 In the AMW, select the Logical tab. 2 Select the appropriate disk group and from the toolbar select Disk GroupBlink The LEDs for the selected disk group blink. 3 After locating the disk group, click OK. The LEDs stop blinking.
book.book Page 103 Wednesday, June 8, 2011 5:01 PM To create virtual disks: 1 Choose one of these methods to start the Create Virtual Disk Wizard: • To create a virtual disk from unconfigured capacity in the storage array—On the Logical tab, select an Unconfigured Capacity node, and select Virtual DiskCreate. Alternatively, you can right-click the Unconfigured Capacity node, and select Create Virtual Disk from the pop-up menu.
book.book Page 104 Wednesday, June 8, 2011 5:01 PM 5 In Advanced virtual disk parameters, you can select: • Use recommended settings. • Customize settings. 6 Click Next. 7 In the Customize Advanced Virtual Disk Parameters window, select the appropriate Virtual Disk I/O characteristics type. You can select: • File system (typical) • Database • Multimedia • Custom NOTE: If you select Custom, you must select an appropriate segment size.
book.book Page 105 Wednesday, June 8, 2011 5:01 PM To change the virtual disk modification priority: 1 In the AMW, select the Logical tab. 2 Select a virtual disk. 3 In the toolbar, select Virtual DiskChangeModification Priority. The Change Modification Priority window is displayed. 4 Select one or more virtual disks. To select nonadjacent virtual disks, press click. To select adjacent virtual disks, press click. To select all of the available virtual disks, click Select All.
book.book Page 106 Wednesday, June 8, 2011 5:01 PM To change the virtual disk cache settings: 1 In the AMW, select the Logical tab and select a virtual disk 2 In the toolbar, select Virtual DiskChangeCache Settings. The Change Cache Settings window is displayed. 3 Select one or more virtual disks. To select nonadjacent virtual disks, press click. To select adjacent virtual disks, press click. To select all of the available virtual disks, click Select All.
book.book Page 107 Wednesday, June 8, 2011 5:01 PM 5 Click OK. A message prompts you to confirm the change in the virtual disk modification priority. 6 Click Yes. 7 Click OK. Changing the Segment Size of a Virtual Disk You can change the segment size on a selected virtual disk. During this operation, I/O performance is affected, but your data remains available. Guidelines to proceed with changing the segment size: • You cannot cancel this operation after it starts.
book.book Page 108 Wednesday, June 8, 2011 5:01 PM To change the segment size of a virtual disk: 1 In the AMW, select the Logical tab and select a virtual disk. 2 Select Virtual DiskChangeSegment Size. 3 Select the required segment size. A message prompts you to confirm the selected segment size. 4 Click Yes. The segment size modification operation begins. The virtual disk icon in the Logical pane shows an Operation in Progress status while the operation is taking place.
book.book Page 109 Wednesday, June 8, 2011 5:01 PM To change the I/O type: 1 Select from these virtual disk I/O characteristic types, based on your application needs: • File system (typical) • Database • Multimedia • Custom The corresponding dynamic cache read prefetch setting and segment size values that are typically well suited for the selected virtual disk I/O characteristic type are populated in the Dynamic cache read prefetch and Segment size fields.
book.book Page 110 Wednesday, June 8, 2011 5:01 PM Physical Disk Security With Self Encrypting Disk Self encrypting disk (SED) technology prevents unauthorized access to the data on a physical disk that is physically removed from the storage array. The storage array has a security key. Self encrypting disks provide access to data only through an array that has the correct security key. The self encrypting disk or a security capable physical disk encrypts data during writes and decrypts data during reads.
book.book Page 111 Wednesday, June 8, 2011 5:01 PM The following table shows how to interpret the security status of a disk group: Table 9-1. Interpretation of Security Status of Disk Group Secure Security Capable–Yes Security Capable–No Yes The disk group is composed of all Not applicable. Only SED SED physical disks and is in a physical disks can be in a Secure Secure state. state.
book.book Page 112 Wednesday, June 8, 2011 5:01 PM The Secure Physical Disks option is inactive with a check mark to the left if the disk group is already security enabled. The Create a secure disk group option appears in the Create Disk Group Wizard - Disk Group Name and Physical Disk Selection dialog. The Create a secure disk group option is active only when these conditions are met: • A security key is installed in the storage array.
book.book Page 113 Wednesday, June 8, 2011 5:01 PM To create a security key: 1 In the AMW toolbar, select Storage ArrayPhysical Disk Security Create Security Key. The Create Security Key window is displayed. 2 In Security key identifier, enter a string that becomes part of the secure key identifier. You can enter up to 189 alphanumeric characters without spaces, punctuation, or symbols. Additional characters is generated automatically and is appended to the end of the string that you enter.
book.book Page 114 Wednesday, June 8, 2011 5:01 PM After you have created a security key, you can create secure disk groups from security capable physical disks. Creating a secure disk group makes the physical disks in the disk group security-enabled. Security-enabled physical disks enter Security Locked status whenever power is re-applied. They can be unlocked only by a RAID controller module that supplies the correct key during physical disk initialization.
book.book Page 115 Wednesday, June 8, 2011 5:01 PM 3 In Secure key identifier, enter a string that becomes part of the secure key identifier. You may leave the text box blank, or enter up to 189 alphanumeric characters without white space, punctuation, or symbols. Additional characters are generated automatically. 4 Edit the default path by adding a file name to the end of the path or Click Browse, navigate to the required folder and enter the name of the file.
book.book Page 116 Wednesday, June 8, 2011 5:01 PM To save the security key for the storage array: 1 In the AMW toolbar, select Storage ArrayPhysical Disk SecuritySave Security Key File. The Save Security Key File - Enter Pass Phrase window is displayed. 2 Edit the default path by adding a file name to the end of the path or Click Browse, navigate to the required folder and enter the name of the file. 3 In Pass phrase, enter a string for the pass phrase.
book.book Page 117 Wednesday, June 8, 2011 5:01 PM Unlocking Secure Physical Disks You can export a security-enabled disk group to move the associated physical disks to a different storage array. After you install those physical disks in the new storage array, you must unlock the physical disks before data can be read from or written to the physical disks. To unlock the physical disks, you must supply the security key from the original storage array.
book.book Page 118 Wednesday, June 8, 2011 5:01 PM Configuring Hot Spare Physical Disks Guidelines to configure host spare physical disks: • You can use only unassigned physical disks with Optimal status as hot spare physical disks. • You can unassign only hot spare physical disks with Optimal, or Standby status. You cannot unassign a hot spare physical disk that has the In Use status. A hot spare physical disk has the In Use status when it is in the process of taking over for a failed physical disk.
book.book Page 119 Wednesday, June 8, 2011 5:01 PM • Right-click the physical disk and select Hot Spare Coverage from the pop-up menu. The Hot Spare Physical Disk Options window is displayed. 4 Select the appropriate option, you can select: • View/change current hot spare coverage—to review hot spare coverage and to assign or unassign hot spare physical disks, if necessary. See step 5.
book.book Page 120 Wednesday, June 8, 2011 5:01 PM Hot Spares and Rebuild A valuable strategy to protect data is to assign available physical disks in the storage array as hot spares. A hot spare adds another level of fault tolerance to the storage array. A hot spare is an idle, powered-on, stand-by physical disk ready for immediate use in case of disk failure.
book.book Page 121 Wednesday, June 8, 2011 5:01 PM Hot Spare Drive Protection You can use a hot spare physical disk for additional data protection from physical disk failures that occur in a RAID Level 1, or RAID Level 5 disk group. If the hot spare physical disk is available when a physical disk fails, the RAID controller module uses redundancy data to reconstruct the data from the failed physical disk to the hot spare physical disk.
book.book Page 122 Wednesday, June 8, 2011 5:01 PM CAUTION: Enclosure loss protection is not guaranteed if a physical disk has already failed in the disk group. In this situation, losing access to an expansion enclosure and consequently another physical disk in the disk group causes a double physical disk failure and loss of data. Enclosure loss protection is achieved when you create a disk group where all of the physical disks that comprise the disk group are located in different expansion enclosures.
book.book Page 123 Wednesday, June 8, 2011 5:01 PM Table 9-2. Criteria for Enclosure Loss Protection (continued) RAID Level Criteria for Enclosure Loss Protection RAID level 1 Ensure that each physical disk in a mirrored pair is located in a different expansion enclosure. This enables you to have more than two physical disks in the disk group within the same expansion enclosure.
book.book Page 124 Wednesday, June 8, 2011 5:01 PM Host-to-Virtual Disk Mapping After you create virtual disks, you must map them to the host(s) connected to the array. Guidelines to configure host-to-virtual disk mapping: • Each virtual disk in the storage array can be mapped to only one host or host group. • Host-to-virtual disk mappings are shared between controllers in the storage array. • A unique LUN must be used by a host group or host to access a virtual disk.
book.book Page 125 Wednesday, June 8, 2011 5:01 PM To create host to virtual disk mappings: 1 In the AMW, select the Mappings tab. 2 In the Topology pane, select: • Default Group • Undefined mappings node • Individual defined mapping • Host group • Host 3 In the toolbar, select MappingsDefineAdditional Mapping. The Define Additional Mapping window is displayed. 4 In Host group or host, select the appropriate host group or host.
book.book Page 126 Wednesday, June 8, 2011 5:01 PM Modifying and Removing Host-to-Virtual Disk Mapping You can modify or remove a host-to-virtual disk mapping for several reasons, such as an incorrect mapping or reconfiguration of the storage array. Modifying or removing a host-to-virtual disk mapping applies to both hosts and host groups.
book.book Page 127 Wednesday, June 8, 2011 5:01 PM 7 If configuring a Linux host, run the rescan_dm_devs utility on the host, and remount the virtual disk if required. This utility is installed on the host as part of the MDSM install process. 8 Restart the host applications. Changing Controller Ownership of the Virtual Disk If the host has a single data-path to the MD storage array, the virtual disk must be owned by the controller to which the host is connected.
book.book Page 128 Wednesday, June 8, 2011 5:01 PM Removing Host-to-Virtual Disk Mapping 1 In the AMW, select the Mapping tab. 2 Select a virtual disk from the Defined Mappings pane. 3 Perform one of these actions: • Select MappingsRemove. • Right-click the virtual disk, and select Remove Mapping from the pop-up menu. 4 Click Yes to remove the mapping. Changing the RAID Controller Module Ownership of a Disk Group You can change the RAID controller module ownership of a a disk group.
book.book Page 129 Wednesday, June 8, 2011 5:01 PM To change the RAID controller module ownership of a disk group: 1 In the AMW, select the Logical tab and select a disk group. 2 Select Disk GroupChangeOwnership/Preferred Path. 3 Select the appropriate RAID controller module slot and click Yes to confirm the selection.
book.book Page 130 Wednesday, June 8, 2011 5:01 PM Restricted Mappings Many hosts are able to map up to 256 logical unit numbers (LUNs) (0 to 255) per storage partition. However, the maximum number of mappings differs because of operating system variables, failover driver issues, and potential data problems. The hosts listed in the Table 9-3 have these mapping restrictions.
book.book Page 131 Wednesday, June 8, 2011 5:01 PM • If there is a host with a restricted host type that is part of a specific storage partition, all of the hosts in that storage partition are limited to the maximum number of LUNs allowed by the restricted host type. • You cannot move a host with a restricted host type into a storage partition that already has LUNs mapped that are greater than what is allowed by the restricted host type.
book.book Page 132 Wednesday, June 8, 2011 5:01 PM disk copy, ownership of the target virtual disk is also changed. Under certain operating system environments, it might be necessary to reconfigure the multi-path driver before an I/O path can be used.
book.book Page 133 Wednesday, June 8, 2011 5:01 PM CAUTION: Possible loss of data access– Changing ownership at the disk group level causes every virtual disk in that disk group to transfer to the other RAID controller module and use the new I/O path. If you do not want to set every virtual disk to the new path, change ownership at the virtual disk level instead. 6 Click Yes. The ownership of the disk group is changed. I/O to the disk group is now directed through this I/O path.
book.book Page 134 Wednesday, June 8, 2011 5:01 PM 4 Select the RAID level (RAID Level 0, RAID Level 1, RAID Level 5, or RAID Level 6). The currently selected option is designated with a dot. 5 Click Yes. The RAID level operation begins. Storage Partitioning A storage partition is a logical entity consisting of one or more virtual disks that can be accessed by a single host or shared among hosts that are part of a host group.
book.book Page 135 Wednesday, June 8, 2011 5:01 PM Storage partitioning is unavailable when: • No valid host groups or hosts exist in the Topology pane on the Mappings tab. • No host ports are defined for the host being included in the storage partition. • All mappings are defined. NOTE: You can include a secondary virtual disk in a storage partition.
book.book Page 136 Wednesday, June 8, 2011 5:01 PM NOTE: If the RAID level of the disk group is RAID Level 5, or RAID Level 6, and the expansion enclosure has enclosure loss protection, Display only physical disks that will ensure enclosure loss protection appears and is selected by default. 4 in the Available physical disks area, select physical disks up to the allowed maximum number of physical disks.
book.book Page 137 Wednesday, June 8, 2011 5:01 PM Using Unconfigured Capacity You can increase the capacity of a standard virtual disk or a snapshot repository virtual disk using the unconfigured capacity when no free capacity exists on a disk group. An increase is achieved by adding unconfigured capacity, in the form of unassigned physical disks, to the disk group of the standard virtual disk or the snapshot repository virtual disk. See "Disk Group Expansion" on page 135.
book.book Page 138 Wednesday, June 8, 2011 5:01 PM Exporting a Disk Group On the source storage array: 1 Save the storage array configuration. 2 Stop all I/O, and unmount or disconnect the file systems on the virtual disks in the disk group. 3 Back up the data on the virtual disks in the disk group. 4 Locate the disk group, and label the physical disks. 5 Place the disk group offline. 6 Obtain blank physical disk modules or new physical disks.
book.book Page 139 Wednesday, June 8, 2011 5:01 PM 2 Review the Import Report for an overview of the disk group that you are importing. 3 Check for non-importable components. 4 Confirm that you want to proceed with the import procedure. NOTE: Some settings cannot be imported during the import disk group procedure.
book.book Page 140 Wednesday, June 8, 2011 5:01 PM Errors discovered by the media scan include: • Unrecovered media error—Data could not be read on the first attempt or on any subsequent attempts. For virtual disks with redundancy protection, data is reconstructed, rewritten to the physical disk, and verified and the error is reported to the event log. For virtual disks without redundancy protection (RAID 1, RAID 5, and RAID 6 virtual disks), the error is not corrected but is reported to the event log.
book.book Page 141 Wednesday, June 8, 2011 5:01 PM 7 To enable or disable the consistency check, select either With consistency check or Without consistency check. NOTE: A consistency check scans the data blocks in a RAID Level 5 virtual disk, or a RAID Level 6 virtual disk and checks the consistency information for each block. A consistency check compares data blocks on RAID Level 1 replicated physical disks. RAID Level 0 virtual disks have no data consistency. 8 Click OK.
book.
book.book Page 143 Wednesday, June 8, 2011 5:01 PM 10 Configuration: Premium Feature— Snapshot Virtual Disks NOTE: If you ordered this feature, you received a Premium Feature Activation card shipped in the same box as your Dell PowerVault MD storage array. Follow the directions on the card to obtain a key file and to enable the feature. NOTE: The snapshot feature allows up to eight snapshots per LUN and 128 per array to be present at the same time.
book.book Page 144 Wednesday, June 8, 2011 5:01 PM After the snapshot repository virtual disk is created, I/O write requests to the source virtual disk resume. Before a data block on the source virtual disk is modified, the contents of the block to be modified are copied to the snapshot repository virtual disk for safekeeping. Because the snapshot repository virtual disk stores copies of the original data in those data blocks, further changes to those data blocks write only to the source virtual disk.
book.book Page 145 Wednesday, June 8, 2011 5:01 PM About the Simple Path Using the simple path, you can specify: • Snapshot Virtual Disk Name—A user-specified name that helps you associate the snapshot virtual disk to its corresponding snapshot repository virtual disk and source virtual disk. • Snapshot Repository Virtual Disk Name—A user-specified name that helps you associate the snapshot repository virtual disk to its corresponding snapshot virtual disk and source virtual disk.
book.book Page 146 Wednesday, June 8, 2011 5:01 PM NOTE: For details on mapping the snapshot virtual disk to the secondary node, see the Dell PowerVault MD3200 and MD3220 Storage Arrays With Microsoft Windows Server Failover Clusters on support.dell.com/manuals. NOTE: You can create concurrent snapshots of a source virtual disk on both the source disk group and on another disk group.
book.book Page 147 Wednesday, June 8, 2011 5:01 PM 3 Select Virtual DiskSnapshotCreate. or Right-click the source virtual disk and select Create Snapshot Virtual Disk from the pop-up menu. The Create Snapshot Virtual Disk Wizard - Introduction dialog appears. 4 Select Simple (Recommended), and click Next. The Specify Names window is displayed. 5 Enter the Snapshot virtual disk name and the Snapshot repository virtual disk name and click Next.
book.book Page 148 Wednesday, June 8, 2011 5:01 PM Creating a Snapshot Virtual Disk Using the Advanced Path About the Advanced Path Use the advanced path to choose whether to place the snapshot repository virtual disk on free capacity or unconfigured capacity and to change the snapshot repository virtual disk parameters. You can select the advanced path regardless of whether you use free capacity or unconfigured capacity for the snapshot virtual disk.
book.book Page 149 Wednesday, June 8, 2011 5:01 PM • Percent Full—When the snapshot repository virtual disk reaches the userspecified repository full percentage level, the event is logged in the Major Event Log (MEL). The default snapshot repository full percentage level is 50% of the source virtual disk. • Snapshot Repository Virtual Disk Full Conditions—Choose whether to fail writes to the source virtual disk or fail the snapshot virtual disk when the snapshot repository virtual disk becomes full.
book.book Page 150 Wednesday, June 8, 2011 5:01 PM Remember the following guidelines before creating a Snapshot Virtual Disk: • The following types of virtual disks are not valid source virtual disks: – Snapshot repository virtual disks. – Snapshot virtual disks. – Replication repository virtual disks. – Target virtual disks that are participating in a virtual disk copy. NOTE: Virtual Disk Copy is an Advanced (Premium) feature.
book.book Page 151 Wednesday, June 8, 2011 5:01 PM 3 Remove the drive letter(s) of the source in Windows or unmount the virtual drive(s) in Linux to help guarantee a stable copy of the drive for the Snapshot. If this is not done, the snapshot operation reports that it has completed successfully, but the snapshot data is not updated properly. NOTE: Verify that the virtual disk has a status of Optimal or Disabled by clicking the Summary tab and then clicking Disk Groups & Virtual Disks.
book.book Page 152 Wednesday, June 8, 2011 5:01 PM 5 Select Advanced, and click Next. The Specify Names window is displayed. 6 Enter the Snapshot visual disk name and the Snapshot repository virtual disk name and click Next. The Allocate Capacity window is displayed.
book.book Page 153 Wednesday, June 8, 2011 5:01 PM 15 To register the snapshot virtual disk with the host operating system, run the host-based hot_add utility. 16 To associate the mapping between the storage array name and the virtual disk name, run the host-based SMdevices utility. Specifying Snapshot Virtual Disk Names Choose a name that helps you associate the snapshot virtual disk and snapshot repository virtual disk with its corresponding source virtual disk.
book.book Page 154 Wednesday, June 8, 2011 5:01 PM • You must choose a unique name for the snapshot virtual disk and the snapshot repository virtual disks, or an error message is displayed. • Names are limited to 30 characters. After you reach this limit in either the snapshot virtual disk name or the Snapshot repository virtual disk name fields, you can no longer type in the field.
book.book Page 155 Wednesday, June 8, 2011 5:01 PM To expand the snapshot repository virtual disk: 1 In the AMW, select the Logical tab. 2 Select the snapshot repository virtual disk for which you want to increase the capacity. 3 Select Virtual DiskIncrease Capacity. NOTE: If no free capacity or unconfigured capacity is available, the Increase Capacity option is disabled. The Increase Snapshot Repository Capacity window displays the Virtual disk attributes.
book.book Page 156 Wednesday, June 8, 2011 5:01 PM 7 If unassigned physical disks are not available, do you have empty slots in the expansion enclosures? • Yes, there are empty slots—Insert new physical disks by using the information in the initial setup guide for your expansion enclosure. Go to step 9. • No, there are no empty slots—Install another expansion enclosure and additional physical disks.
book.book Page 157 Wednesday, June 8, 2011 5:01 PM A new Free Capacity node is created and shown in the Logical tab if these conditions exist: • A Free Capacity node did not exist prior to the addition of capacity. • Not all of the capacity that is added is used to increase the capacity of the snapshot repository virtual disk.
book.book Page 158 Wednesday, June 8, 2011 5:01 PM Disabling a Snapshot Virtual Disk Disable a snapshot virtual disk if: • You do not need the snapshot now. • You intend to re-create the snapshot at a later time and want to retain the associated snapshot repository virtual disk so that you do not need to create it again. • You want to maximize storage array performance by stopping copy-onwrite activity to the snapshot repository virtual disk.
book.book Page 159 Wednesday, June 8, 2011 5:01 PM Preparing Host Servers to Re-create a Snapshot Virtual Disk NOTE: Before you create a new snapshot of a source virtual disk, stop any data access (I/O) activity or suspend data transfer to the source virtual disk and snapshot virtual disk to ensure that you capture an accurate snapshot of the source virtual disk. Close all applications, including Windows Internet Explorer, to ensure all I/O activity has stopped.
book.book Page 160 Wednesday, June 8, 2011 5:01 PM Re-creating a Snapshot Virtual Disk After first preparing the host server(s), re-create a snapshot virtual disk. For more information, see "Preparing Host Servers to Create the Snapshot Using the Simple Path" on page 145 or "Preparing Host Servers to Create the Snapshot Using the Advanced Path" on page 149. To recreate a snapshot virtual disk: NOTE: This action invalidates the current snapshot.
book.book Page 161 Wednesday, June 8, 2011 5:01 PM 11 Configuration: Premium Feature— Virtual Disk Copy NOTE: A virtual disk copy overwrites data on the target virtual disk. Before starting a virtual disk copy, ensure that you no longer need the data or back up the data on the target virtual disk. NOTE: If you ordered this feature, you received a Premium Feature Activation card that shipped in the same box as your Dell PowerVault MD storage array.
book.book Page 162 Wednesday, June 8, 2011 5:01 PM Reasons to use virtual disk copy include: • Copying data for improved access—As your storage requirements for a virtual disk change, you can use a virtual disk copy to copy data to a virtual disk in a disk group that uses drives with larger capacity within the same storage array. Copying data for larger access capacity enables you to move data to greater capacity physical disks (for example, 61 GB to 146 GB).
book.book Page 163 Wednesday, June 8, 2011 5:01 PM NOTE: When creating a snapshot virtual disk, map the snapshot virtual disk to only one node in the cluster. Mapping the snapshot virtual disk to the host group or both nodes in the cluster may cause data corruption by allowing both nodes to concurrently access data. Virtual Disk Read/Write Permissions After the virtual disk copy is complete, the target virtual disk automatically becomes read-only to the hosts.
book.book Page 164 Wednesday, June 8, 2011 5:01 PM Virtual Disk Copy Restrictions Before you perform any virtual disk copy tasks, understand and adhere to the restrictions listed in this section. The restrictions apply to the source virtual disk, the target virtual disk, and the storage array. • While a virtual disk copy has a status of In Progress, Pending, or Failed, the source virtual disk is available for read I/O activity only.
book.book Page 165 Wednesday, June 8, 2011 5:01 PM Creating a Virtual Disk Copy Source virtual disks that are participating in a virtual disk copy are available for read I/O activity only while a virtual disk copy has a status of In Progress or Pending. Write requests are allowed after the virtual disk copy has completed.
book.book Page 166 Wednesday, June 8, 2011 5:01 PM Virtual Disk Copy and Modification Operations If a modification operation is running on a source virtual disk or a target virtual disk, and the virtual disk copy has a status of In Progress, Pending, or Failed, the virtual disk copy does not take place.
book.book Page 167 Wednesday, June 8, 2011 5:01 PM Preferred RAID Controller Module Ownership During a virtual disk copy, the same RAID controller module must own both the source virtual disk and the target virtual disk. If both virtual disks do not have the same preferred RAID controller module when the virtual disk copy starts, the ownership of the target virtual disk is automatically transferred to the preferred RAID controller module of the source virtual disk.
book.book Page 168 Wednesday, June 8, 2011 5:01 PM Copying the Virtual Disk You can create a virtual disk copy by using the Create Copy Wizard. CAUTION: Possible loss of data access – A virtual disk copy overwrites data on the target virtual disk. A virtual disk copy automatically makes the target virtual disk read-only to hosts. You might want to keep this attribute enabled to preserve the data on the target virtual disk.
book.
book.book Page 170 Wednesday, June 8, 2011 5:01 PM 3 Select ChangeCopy Priority. The Change Copy Priority window is displayed. 4 In the Copy priority area, select the appropriate copy priority, depending on your system performance needs. NOTE: There are five copy priority rates available: lowest, low, medium, high, and highest. If the copy priority is set at the lowest rate, I/O activity is prioritized, and the virtual disk copy takes longer.
book.book Page 171 Wednesday, June 8, 2011 5:01 PM Preparing Host Servers to Recopy a Virtual Disk NOTE: Before you create a new copy of a source virtual disk, stop any data access (I/O) activity or suspend data transfer to the source virtual disk (and, if applicable, the target disk) to ensure that you capture an accurate point-in-time image of the source virtual disk. Close all applications, including Windows Internet Explorer, to ensure all I/O activity has stopped.
book.book Page 172 Wednesday, June 8, 2011 5:01 PM Recopying the Virtual Disk You can use the Copy Manager to create a new virtual disk copy for a selected source virtual disk and a target virtual disk. Use this option when you have stopped a virtual disk copy and want to start it again or when a virtual disk copy has failed or completed. The virtual disk copy starts over from the beginning. • Possible loss of data—The re-copying operation overwrites existing data on the target virtual disk.
book.book Page 173 Wednesday, June 8, 2011 5:01 PM Removing Copy Pairs You can remove one or more virtual disk copies by using the Copy Manager. Any virtual disk copy-related information for the source virtual disk and the target virtual disk is removed from the Virtual Disk Properties dialog and the Storage Array Profile dialogs. When you remove a virtual disk copy from the storage array, the Read-Only attribute for the target virtual disk is also removed.
book.
book.book Page 175 Wednesday, June 8, 2011 5:01 PM 12 Configuration: Premium Feature— Upgrading to High–Performance Tier The High Performance Tier premium feature on an MD3600f Series array increases the performance of the system beyond that of an MD3600f Series array operating at the standard performance level. If this feature is ordered, a Premium Feature Activation card is placed in the box with the storage array.
book.
book.book Page 177 Wednesday, June 8, 2011 5:01 PM 13 Configuration: Premium Feature— Remote Replication The Remote Replication premium feature enables real-time replication of data between two storage arrays in separate locations. Using remote replication, up to 16 replicated virtual disk pairs can be created on a storage array. A replicated virtual disk pair is created from two standard virtual disks, both of which are logical data storage structures created on a storage array.
book.book Page 178 Wednesday, June 8, 2011 5:01 PM Activating Remote Replication NOTE: If you ordered the Remote Replication feature, you received a Premium Feature Activation card in the Dell PowerVault MD storage array shipping box. Follow the directions on the card to install and enable this feature. After the Remote Replication feature has been installed following the steps on the Premium Feature Activation card, it must be activated using a wizardbased process.
book.book Page 179 Wednesday, June 8, 2011 5:01 PM Other information about replication repository virtual disks include: • Specifying that replication repository virtual disks be created from unconfigured free capacity on the disk group, or creating a new disk group and its member replication repository virtual disks from unconfigured free capacity on the storage array.
book.book Page 180 Wednesday, June 8, 2011 5:01 PM Before creating a virtual disk pair, verify the following: 1 The Remote Replication premium feature has been installed, enabled and activated on the primary and secondary storage arrays. 2 The storage arrays containing the two virtual disks you want to replicate are connected through a Fibre Channel fabric interface.
book.book Page 181 Wednesday, June 8, 2011 5:01 PM Snapshot Virtual Disk With Remote Replication A snapshot virtual disk is a point-in-time image of a virtual disk. In a remote replication, do not mount a snapshot virtual disk on the same server as the primary virtual disk. Virtual Disk Copy With Remote Replication The virtual disk copy premium feature copies data from a source virtual disk to a target virtual disk within the same storage array.
book.book Page 182 Wednesday, June 8, 2011 5:01 PM Required Switch Zoning Configurations NOTE: A limited set of Fibre Channel switches are supported by the storage array. For a complete list of supported switches and their required driver, BIOS and firmware levels, see the Configuring Fibre Channel with the Dell MD3600f-Series Storage Array. Due to potential restrictions at the host level, remote replication configurations must contain Fibre Channel switches.
book.book Page 183 Wednesday, June 8, 2011 5:01 PM Journaling File Systems and Remote Replication When using a journaling file system, you cannot gain read-only access to a remote virtual disk. A journaling file system does not let you mount the remote virtual disk in Windows NTFS. However, you can mount a snapshot of the remote virtual disk, if available.
book.
book.book Page 185 Wednesday, June 8, 2011 5:01 PM 6 In the Select capacity table, select the physical disks and capacities for the new disk group, then click Next. The Preview (Activate Remote Replication) wizard is displayed. 7 Click Finish. The Completed (Activate Remote Replication) message is displayed. 8 Click OK. The Remote Replication premium feature is now active. The Logical pane displays the new disk group and the two replication repository virtual disks.
book.book Page 186 Wednesday, June 8, 2011 5:01 PM Creating a Remote Replication Before creating a remote replication, ensure that all prerequisites are met. See "Prerequisites" on page 183 for more information. 1 Open the AMW of both the local and remote storage array. 2 Verify that the Remote Replication premium feature has been activated on both storage arrays. 3 In the AMW of the local storage array, select the Logical tab.
book.book Page 187 Wednesday, June 8, 2011 5:01 PM Selecting the Secondary Virtual Disk CAUTION: Creating a replicated virtual disk pair starts a process between the primary and secondary virtual disks that overwrites all existing data on the secondary virtual disk and set the disk to read-only access.
book.book Page 188 Wednesday, June 8, 2011 5:01 PM also specify whether to use a write consistency group option. A write consistency group ensures that the secondary virtual disk receives write requests in the sequence initiated by the RAID controller module of the primary virtual disk. The secondary virtual disk can also be added to a write consistency group.
book.book Page 189 Wednesday, June 8, 2011 5:01 PM • Manual resynchronization (recommended)—The replicated pair must be manually resynchronized each time communication is restored between unsynchronized replicated virtual disks. 3 Click Next. The Preview (Create Remote Replication) wizard is displayed. Go to "Completing the Remote Replication" on page 189.
book.book Page 190 Wednesday, June 8, 2011 5:01 PM RAID Controller Module Ownership/Preferred Path During a remote replication operation, the RAID controller module that owns the primary virtual disk must correspond to the RAID controller owning the secondary volume on the remote array.
book.book Page 191 Wednesday, June 8, 2011 5:01 PM Viewing the Storage Array Profile The Storage Array Profile displays the most detailed information about the components of a remote replication and the replication repository virtual disks.
book.book Page 192 Wednesday, June 8, 2011 5:01 PM Viewing the Properties Pane The Properties pane is a view-only display of the physical and logical characteristics of a single virtual disk in a replicated pair, or a single replication repository virtual disk. To view the Properties pane: 1 In the AMW, select the Logical tab. 2 Select either the primary or secondary virtual disk of the replicated pair. The Properties pane shows properties for the selected virtual disk.
book.book Page 193 Wednesday, June 8, 2011 5:01 PM Viewing the Physical Components or Logical Elements of the Primary Virtual Disk To view the physical components or logical elements of the primary virtual disk in a remote replication: 1 In the AMW of the storage array that contains t he primary virtual disk, select the Logical tab. 2 Right-click the primary virtual disk and either: • View the logical elements of the primary virtual disk by selecting Select ViewAssociated Logical Elements.
book.book Page 194 Wednesday, June 8, 2011 5:01 PM Virtual Disk Status Icons In the Devices tab on the EMW, the following icons depict the status of each virtual disk: Changing Write Mode and Consistency Group Membership Table 13-1.
book.book Page 195 Wednesday, June 8, 2011 5:01 PM The write mode of a remote replication is selected when it is created. However, you can change the write mode in a remote replication at a later time, as well as change the secondary virtual disk's membership in a write consistency group. For more information about write modes and write consistency groups, go to Setting the Write Mode for Creating a Remote Replication online help topic.
book.book Page 196 Wednesday, June 8, 2011 5:01 PM Resynchronizing Virtual Disks There are two resynchronization methods for remote replications: • Manual resynchronization—See "Manually Resynchronizing Virtual Disks" on page 200. • Automatic resynchronization—See "Automatically Resynchronizing Virtual Disks" on page 200. For more information about synchronization and resynchronization in remote replications, see: • "Normally Synchronized Virtual Disks" on page 196.
book.book Page 197 Wednesday, June 8, 2011 5:01 PM The communication between a primary and secondary virtual disks can be suspended or become unsynchronized. If communication between the primary virtual disk and the secondary virtual disk is disrupted: 1 The status of the replicated pair changes to Unsynchronized. 2 A Needs Attention status is displayed for the storage array. 3 Data is written to the primary virtual disk. 4 Write requests to the primary virtual disk are logged.
book.book Page 198 Wednesday, June 8, 2011 5:01 PM • Changing the segment size of a virtual disk • Defragmenting a disk group • Adding free capacity to a disk group • Changing the RAID level of a disk group To change the synchronization priority and method for an existing remote replication: 1 In the AMW of the storage array containing the primary virtual disk of the replicated pair, right-click the Logical tab. 2 Select ChangeSynchronization Settings.
book.book Page 199 Wednesday, June 8, 2011 5:01 PM Unsynchronized Virtual Disks Communication between a primary and secondary virtual disks can be either suspended, or become unsynchronized. If this communication between both virtual disks is disrupted: 1 The status of the replicated pair changes to Unsynchronized. 2 A Needs Attention status is displayed for the storage array. 3 Data is written to the primary virtual disk. 4 Write requests to the primary virtual disk are logged.
book.book Page 200 Wednesday, June 8, 2011 5:01 PM Automatically Resynchronizing Virtual Disks When automatic resynchronization is selected, the RAID controller module owning the primary virtual disk automatically starts resynchronizing the data on the remote replication pair immediately after communication is restored. NOTE: When choosing automatic resynchronization, a possible loss of data can occur if a resynchronization is interrupted in progress.
book.book Page 201 Wednesday, June 8, 2011 5:01 PM Reversing Roles Between the Primary and Secondary Virtual Disks Reversing the roles between the virtual disks promotes the secondary virtual disk to the role of primary virtual disk and demotes the primary virtual disk to the role of secondary virtual.
book.book Page 202 Wednesday, June 8, 2011 5:01 PM Promoting the Secondary Virtual Disk or Demoting the Primary Virtual Disk To promote the secondary virtual disk to the role of primary virtual disk, or demote the primary virtual disk to the role of secondary virtual disk: 1 In the AMW of the storage array that contains the virtual disk you are changing, click the Logical tab. 2 Right-click the virtual disk you are changing.
book.book Page 203 Wednesday, June 8, 2011 5:01 PM Resuming a Remote Replication 1 In the AMW of the storage array with the primary virtual disk, select the Logical tab. 2 In the Logical pane, right-click the primary virtual disk of the replicated pair, then select Resume Replication. The Resume Replicated Pair dialog is displayed. The Replicated pairs table shows all suspended replicated pairs in the local and remote storage arrays. 3 Select one or more replicated pairs.
book.book Page 204 Wednesday, June 8, 2011 5:01 PM After the remote virtual disk replication resumes, data is automatically written to the secondary virtual disk. Only the regions of the primary virtual disk that changed since the replicated pair was suspended are written to the secondary virtual disk.
book.book Page 205 Wednesday, June 8, 2011 5:01 PM Deleting a Virtual Disk From a Replicated Pair in a Storage Array Follow these steps to delete either a primary virtual disk, a secondary virtual disk, or both virtual disks from a replicated pair in a storage array. NOTE: Do not remove a replication relationship to back up a replicated virtual disk.
book.book Page 206 Wednesday, June 8, 2011 5:01 PM Deleting a Secondary Virtual Disk NOTE: Depending on which premium features are enabled on the storage array, deleting a secondary virtual disk might delete all associated virtual disks, resulting in a possible loss of data on those virtual disks. NOTE: You cannot delete a secondary virtual disk while it is synchronizing. When a secondary virtual disk is deleted, the replication relationship is removed and the remote virtual disk replication is destroyed.
book.book Page 207 Wednesday, June 8, 2011 5:01 PM Deleting a Secondary Virtual Disk in a Replicated Pair From a Storage Array 1 Stop all I/O activity on the secondary virtual disk and unmount any file systems on the secondary virtual disk. 2 In the AMW of the storage array that contains the secondary virtual disk, select the Logical tab. 3 In the Logical pane, right-click the secondary virtual disk, then select Delete. The Delete Virtual Disks dialog is displayed.
book.book Page 208 Wednesday, June 8, 2011 5:01 PM To remove remote replication from a storage array: 1 In the AMW of the storage array containing the primary virtual disk, select the Logical tab. 2 In the Logical pane, right-click the primary virtual disk of a replicated pair, then select Remove Replication Relationship. The Remove Replication Relationship dialog is displayed. The Replicated pairs table shows all replicated pairs in both the local and remote storage array.
book.book Page 209 Wednesday, June 8, 2011 5:01 PM Disabling the Remote Replication Premium Feature Before disabling the Remote Replication premium feature, all remote virtual disk replications must have been removed on the storage array. See "Disabling the Remote Replication Premium Feature" on page 209.
book.
book.book Page 211 Wednesday, June 8, 2011 5:01 PM 14 Configuration: Device Mapper Multipath for Linux Overview The MD3600f Series storage array uses a Linux operating system software framework, known as Device Mapper (DM), to enable multipath capabilities on Linux Host Servers. The DM multipath functionality is provided by a combination of drivers and utilities. This chapter describes how to use those utilities to complete the process of enabling an MD3600f Series storage array on a Linux system.
book.book Page 212 Wednesday, June 8, 2011 5:01 PM Using DM Multipathing Devices NOTE: Using or modifying any nodes other than the multipathing device nodes can result in array or file system problems, including loss of communication with the array and corruption of the file system. Avoid accessing any device other than the multipathing device.
book.book Page 213 Wednesday, June 8, 2011 5:01 PM Device Mapper Configuration Steps To complete the DM multipathing configuration and make the storage available to the Linux host server: 1 Scan for virtual disks. See "Scan for Newly Added Virtual Disks" on page 213. 2 Display the multipath device topology. See "Display the Multipath Device Topology Using the Multipath Command" on page 214. 3 Create a partition on a multipath device node.
book.book Page 214 Wednesday, June 8, 2011 5:01 PM Display the Multipath Device Topology Using the Multipath Command The multipath command adds newly scanned and mapped virtual disks to the Device Mapper tables and creates entries for them in the /dev/mapper directory on the host server. These devices are the same as any other block devices in the host. To list all the multipath devices run the following command.
book.book Page 215 Wednesday, June 8, 2011 5:01 PM \_ round-robin 0 [prio=1][enabled] \_ 6:0:0:22 sdcl 69:144 [active][ghost where: mpathb is the name of the virtual device created by device mapper. It is located in the /dev/mapper directory.
book.book Page 216 Wednesday, June 8, 2011 5:01 PM The following examples provide information about the general mapping formats: On RHEL hosts, a partition node has the format /dev/mapper/mpathp, where is the alphabetic number for the multipathing device, is the partition number for this device. On SLES 11.x hosts, a partition node has the format /dev/mapper/mpath-part, where is letter(s) assigned to the multipathing device and is the partition number. On SLES 10.
book.book Page 217 Wednesday, June 8, 2011 5:01 PM Important Information About Special Partitions When using Device Mapper with the MD3600f Series array, all physical disks are assigned a disk device node. This includes a special device type used for in-band management of the MD3600f Series array, known as the Access Disk or Universal Xport device. CAUTION: Certain commands, such as lsscsi, displays one or more instances of Universal Xport devices.
book.book Page 218 Wednesday, June 8, 2011 5:01 PM Limitations and Known Issues • In certain error conditions with the no_path_retry or the queue_if_no_path feature is set, applications may hang. To overcome these conditions the you must enter the following command for each affected multipath device: dmsetup message [device] 0 "fail_if_no_path" where [device] is the multipath device name (for example.
book.book Page 219 Wednesday, June 8, 2011 5:01 PM Troubleshooting Question Answer How can I check if multipathd Run the following command is running? /etc/init.d/multipathd status Why does the multipath –ll command output not show any devices? First verify if the devices are discovered or not. The command #cat /proc/scsi/scsi displays all the devices that are already discovered. Then verify the multipath.conf to ensure that it is been updated with proper settings. After this, run multipath.
book.
book.
book.book Page 222 Wednesday, June 8, 2011 5:01 PM Front Bezel (Optional) Removing the Front Bezel 1 Using the system key, unlock the front bezel (if locked). 2 Lift up the release latch next to the keylock. 3 Rotate the left end of the bezel away from the front panel. 4 Unhook the right end of the bezel and pull the bezel away from the system. Figure 15-1.
book.book Page 223 Wednesday, June 8, 2011 5:01 PM Hard Drives SAFETY: Models AMT, E03J, and E04J Models AMT, E03J, and E04J are intended for installation only in restricted access locations as defined in cl 1.2.7.3 of IEC 60950-1:2005. Depending on your configuration, your array either supports up to 24 2.5-inch SAS hard drives or up to 12 3.5" SAS hard drives in internal drive bays. Hard drives are connected to a backplane through hard-drive carriers and can be configured as hot-swappable.
book.book Page 224 Wednesday, June 8, 2011 5:01 PM Figure 15-3. Removing and Installing a 2.5-Inch Hard-Drive Blank 1 1 2 drive blank 2 release tab Installing a Drive Blank 1 If installed, remove the front bezel. See "Removing the Front Bezel" on page 222. 2 Insert the drive blank into the drive bay until the blank is fully seated. 3 Close the handle to lock the blank in place. 4 If applicable, replace the front bezel. See "Installing the Front Bezel" on page 222.
book.book Page 225 Wednesday, June 8, 2011 5:01 PM If the drive has been online, the green activity/fault indicator flashes as the drive is powered down. When the drive indicators are off, the drive is ready for removal. 3 Press the release button to open the drive carrier release handle. See Figure 15-4. 4 Slide the hard drive out until it is free of the drive bay. CAUTION: To maintain proper system cooling, all empty hard-drive bays must have drive blanks installed.
book.book Page 226 Wednesday, June 8, 2011 5:01 PM Installing a Hard Drive CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 227 Wednesday, June 8, 2011 5:01 PM Removing a Hard Drive From a Hard-Drive Carrier Remove the screws from the slide rails on the hard-drive carrier and separate the hard drive from the carrier. See Figure 15-5 for PowerVault MD3600f and Figure 15-6 for PowerVault MD3620f. Figure 15-5. Removing and Installing a Hard Drive Into a 3.
book.book Page 228 Wednesday, June 8, 2011 5:01 PM Figure 15-6. Removing and Installing a Hard Drive Into a 2.
book.book Page 229 Wednesday, June 8, 2011 5:01 PM Installing a Hard Drive Into a Drive Carrier 1 Insert the hard drive into the hard-drive carrier with the connector end of the drive at the back. See Figure 15-5. 2 Align the screw holes on the hard drive with the back set of holes on the hard-drive carrier. When aligned correctly, the back of the hard drive is flush with the back of the hard-drive carrier. 3 Attach the four screws to secure the hard drive to the hard-drive carrier.
book.book Page 230 Wednesday, June 8, 2011 5:01 PM 5 Connect all the power cables to the array. 6 Turn on the array and the host server. Figure 15-7. Removing and Installing a RAID controller module Blank 1 1 release latch 2 2 RAID controller module blank Installing a RAID Controller Module Blank To install a RAID controller module blank, align the blank with the RAID controller module bay and insert the blank into the chassis until it clicks into place.
book.book Page 231 Wednesday, June 8, 2011 5:01 PM Removing a RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 232 Wednesday, June 8, 2011 5:01 PM Figure 15-8. Removing and Installing a RAID controller module 3 2 1 1 RAID controller module 3 release lever 2 release tab Installing a RAID Controller Module WARNING: Fiber optic cables are fragile. Bending, twisting, folding, or pinching fiber optic cables can cause damage to the cables, degraded performance, or loss of data. To prevent damage, do not twist, fold, pinch, or step on the cables.
book.book Page 233 Wednesday, June 8, 2011 5:01 PM 3 Connect all the cables to the RAID controller module. If SFP transceivers and fiber optic cables were present, reinstall them in the correct ports. 4 If applicable, update the firmware for the RAID controller module. For information about the latest firmware, see the Dell Support website at support.dell.com. Opening the RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician.
book.book Page 234 Wednesday, June 8, 2011 5:01 PM Figure 15-9. Opening and Closing the RAID Controller Module 1 1 screws (2) 3 indent 2 3 2 RAID controller module Closing the RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team.
book.book Page 235 Wednesday, June 8, 2011 5:01 PM RAID Controller Module Backup Battery Unit Removing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty.
book.book Page 236 Wednesday, June 8, 2011 5:01 PM Installing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 237 Wednesday, June 8, 2011 5:01 PM Power Supply/Cooling Fan Module The array supports two hot-swappable power supply/cooling fan modules. While the array can operate temporarily with one module, both the modules must be present for proper system cooling. CAUTION: A single power supply/cooling fan module can be removed from a powered-on array for a maximum period of five minutes. Beyond that time, the array may automatically shut down to prevent damage.
book.book Page 238 Wednesday, June 8, 2011 5:01 PM Figure 15-11. Removing and Installing a Power Supply/Cooling Fan Module 1 2 3 1 release tab 3 power supply handle 2 power supply Installing a Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team.
book.book Page 239 Wednesday, June 8, 2011 5:01 PM Figure 15-12. Securing the Power Cable 1 1 velcro strap CAUTION: When connecting the power cable, secure the cable with the velcro strap. NOTE: If the array is powered on, all the power supply LEDs remain off until the AC power cable is connected to the power supply/cooling fan module and the power switch is turned on. 4 Turn on the power supply/cooling fan module. Control Panel Removing the Control Panel 1 Turn off the array and host server.
book.book Page 240 Wednesday, June 8, 2011 5:01 PM 4 Slide the control panel out of the chassis after: – Pushing the release tab toward the front of the array in PowerVault MD3600f. See Figure 15-13. – Pulling the release pin toward the front of the array in PowerVault MD3620f. See Figure 15-14. Figure 15-13.
book.book Page 241 Wednesday, June 8, 2011 5:01 PM Figure 15-14. Removing and Installing the Control Panel—PowerVault MD3620f 2 1 1 control panel 2 release pin Installing the Control Panel 1 Align the control panel with the slot on the array. 2 Slide the control panel into the array until: – The release tab clicks into place in PowerVault MD3600f. See Figure 15-13. – The release pin clicks into place in PowerVault MD3620f. See Figure 15-14. 3 Replace the hard drives in their respective slots.
book.book Page 242 Wednesday, June 8, 2011 5:01 PM Backplane WARNING: Whenever you need to lift the array, get others to assist you. To avoid injury, do not attempt to lift the array by yourself. CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team.
book.book Page 243 Wednesday, June 8, 2011 5:01 PM Figure 15-15.
book.book Page 244 Wednesday, June 8, 2011 5:01 PM Figure 15-16. Removing and Installing the Backplane—PowerVault MD3600f 1 2 3 1 screws (5) 3 captive screw 2 backplane Figure 15-17.
book.book Page 245 Wednesday, June 8, 2011 5:01 PM Installing the Backplane 1 Align the holes on the backplane with the holes on the array. 2 Tighten the captive screw to secure the backplane to the chassis. See Figure 15-16 for PowerVault MD3600f or Figure 15-17 for PowerVault MD3620f. 3 Replace the screws that secure the backplane to the chassis. See Figure 15-16 for PowerVault MD3600f or Figure 15-17 for PowerVault MD3620f.
book.
book.book Page 247 Wednesday, June 8, 2011 5:01 PM 16 Management: Firmware Downloads Downloading RAID Controller and NVSRAM Packages A version number exists for each firmware file. The version number indicates whether the firmware is a major version or a minor version. You can use the Enterprise Management Window (EMW) to download and activate both the major firmware versions and the minor firmware versions.
book.book Page 248 Wednesday, June 8, 2011 5:01 PM Downloading Both RAID Controller and NVSRAM Firmware NOTE: I/O to the array can continue while you are upgrading RAID controller and NVSRAM firmware. NOTE: Dell recommends that the firmware and NVSRAM be upgraded during a maintenance period when the array is not being used for I/O. NOTE: The RAID enclosure must contain at least two disk drives in order to update the firmware on the controller.
book.book Page 249 Wednesday, June 8, 2011 5:01 PM 7 Click Transfer. Keep these guidelines in mind: • If the Transfer button is inactive, ensure that you either select an NVSRAM file or deselect the Transfer NVSRAM file with RAID controller module firmware option. • If the file selected is not valid or is not compatible with the current storage array configuration, the File Selection Error dialog appears. Click OK to close it, and choose a compatible firmware or NVSRAM file.
book.book Page 250 Wednesday, June 8, 2011 5:01 PM 12 To locate the directory in which the file to download resides, click Browse in the Select files area. The Select File dialog appears. 13 Select the file to download. 14 Click OK. 15 If you want to download the NVSRAM file with the RAID controller module firmware, select Download NVSRAM file with firmware in the Select files area. Any attributes of the firmware file appear in the Firmware file information area.
book.book Page 251 Wednesday, June 8, 2011 5:01 PM 2 Perform one of these actions: • Select Advanced Maintenance Download RAID Controller Module NVSRAM • Select the Support tab, and click Download Firmware. In Select download task, select Download RAID controller module NVSRAM and click OK. An error message appears. 3 Click OK to close it, and select a compatible file. 4 To locate the directory in which the file to download resides, click Select File.
book.book Page 252 Wednesday, June 8, 2011 5:01 PM NOTE: The Details pane shows the details of only one storage array at a time. If you select more than one storage array in the Storage array pane, the details of the storage arrays are not shown in the Details pane. 10 Click NVSRAM in the Download area. NOTE: If you select a storage array that cannot be upgraded, the NVSRAM button is disabled. The Download NVSRAM dialog is displayed.
book.book Page 253 Wednesday, June 8, 2011 5:01 PM Downloading Physical Disk Firmware CAUTION: When updating physical disk firmware, you should stop all I/O activity to the array to prevent data loss. The physical disk firmware controls various features of the physical disk. The disk array controller (DAC) uses this type of firmware. Physical disk firmware stores information about the system configuration on an area of the physical disk called DACstore.
book.book Page 254 Wednesday, June 8, 2011 5:01 PM To download Physical Disk Firmware: 1 From the AMW, select Advanced Maintenance Download Physical Disk. The Download Physical Disk - Introduction window appears. 2 Click Next. The Download Physical Disk Firmware - Add Packages window is displayed. 3 In the Selected Packages area, click Add. Navigate to the location of the packages and click OK. The selected package is added to the Packages to be transferred area. 4 Click Next.
book.book Page 255 Wednesday, June 8, 2011 5:01 PM Downloading MD1200 Series Expansion Module EMM Firmware NOTE: Do not make any configuration changes to the storage array while you are downloading the expansion enclosure EMM firmware. Doing so could cause the firmware download to fail, damage the storage array, or cause loss of data accessibility. NOTE: Due to a limitation with Linux, expansion enclosure EMM firmware updates must be performed using out-of-band management only.
book.book Page 256 Wednesday, June 8, 2011 5:01 PM 5 Click Start. 6 Click Yes to continue with the firmware download. NOTE: If you click Stop while a firmware download is in progress, the download-in-progress finishes before the operation stops. The status for the remaining expansion enclosures changes to Canceled. Monitor the progress and completion status of the download to the expansion enclosures.
book.book Page 257 Wednesday, June 8, 2011 5:01 PM Media Errors and Unreadable Sectors If the RAID controller detects a media error while accessing data from a physical disk that is a member of a disk group with a redundant RAID level (RAID 1, RAID 5 or RAID 10), the controller tries to recover the data from peer disks in the disk group and uses recovered data to correct the error.
book.
book.book Page 259 Wednesday, June 8, 2011 5:01 PM 17 Management: Firmware Inventory A storage array is made up of many components, which might include RAID controller modules, physical disks, and enclosure management modules (EMMs). Each of these components contains firmware. Some versions of firmware are dependent on other versions of firmware. To capture information about all of the firmware versions in the storage array, view the firmware inventory.
book.
book.book Page 261 Wednesday, June 8, 2011 5:01 PM 18 Management: System Interfaces Microsoft Services Virtual Disk Service The Microsoft Virtual Disk Service (VDS) is a component of the Windows operating system. The VDS component utilizes third-part vendor specific software modules, known as providers, to access and configure third-party storage resources, such as MD3600f storage arrays.
book.book Page 262 Wednesday, June 8, 2011 5:01 PM VSS attaches to the service and uses it to coordinate the creation of snapshot virtual disks on the storage array. VSS-initiated snapshot virtual disks can be triggered through backup tools, known as requestors.
book.book Page 263 Wednesday, June 8, 2011 5:01 PM 19 Troubleshooting: Your Storage Array Software Start–Up Routine Look and listen during the array’s start-up routine for the indications described in Table 19-1. For a description of the front- and back-panel indicators, see "Planning: About Your Storage Array" on page 23. Table 19-1. Start-Up Routine Indications Look/listen for Action Alert messages. See your storage management documentation.
book.book Page 264 Wednesday, June 8, 2011 5:01 PM To launch the AMW, perform one of these actions: • On the Devices tab, in either the Tree view or the Table view, double-click a storage array. Alternatively, you can right-click a storage array and select Manage Storage Array from the pop-up menu. • On the Setup tab, select Manage a Storage Array. After the AMW opens, select the Physical tab to see the components in the storage array. A component that has a problem is indicated by a status icon.
book.book Page 265 Wednesday, June 8, 2011 5:01 PM In the Table view, every managed storage array is listed once, regardless of the number of attachments it has in the Tree view. After the storage array has been contacted by MDSM, an icon representing its hardware status appears. Hardware status can be Optimal, Needs Attention, or Fixing.
book.book Page 266 Wednesday, June 8, 2011 5:01 PM Table 19-3. Additional Status Icons Status Icon Adding a Storage Array Description The Contacting Storage Array icon is shown in the Tree view and Table view until the current status of each managed storage array is known. The Contacting Storage Array icon is shown in the EMW Status Bar and the AMW Status Bar and the tooltip shows Contacting Storage arrays.
book.book Page 267 Wednesday, June 8, 2011 5:01 PM 2 Enter a name for the support data file in Specify filename or click Browse to navigate to a previously saved file to overwrite an existing file. The suffix .zip is added automatically to the file if you do not specify a suffix for the file. 3 Enter the Execution summary. 4 Click Start. After all of the support files have been gathered, they are archived using the file name that you specified. 5 Click OK.
book.book Page 268 Wednesday, June 8, 2011 5:01 PM Collecting the Physical Disk Data You can use the Collect Physical Disk Data option to collect log sense data from all the physical disks on your storage array. Log sense data consists of statistical information that is maintained by each of the physical disks in your storage array. Your Technical Support representative can use this information to analyze the performance of your physical disks and for troubleshooting problems that might exist.
book.book Page 269 Wednesday, June 8, 2011 5:01 PM Event Log You can use the Event Log Viewer to view a detailed list of events that occur in a storage array. The event log is stored on reserved areas on the storage array disks. It records configuration events and storage array component failures. The event log can be used as a supplementary diagnostic tool to the Recovery Guru for tracing storage array events.
book.book Page 270 Wednesday, June 8, 2011 5:01 PM Recovery Guru The Recovery Guru is a component of MDSM that diagnoses critical events on the storage array and recommends step-by-step recovery procedures for problem resolution. In the AMW, to display the Recovery Guru, perform one of these actions: • Click Recovery Guru • In the Support tab, click the Recover from Failure link. • From the Status pane on the Summary tab, click the Storage Array Needs Attention link. .
book.book Page 271 Wednesday, June 8, 2011 5:01 PM 2 Perform one of these actions in the Storage Array Profile dialog: • View detailed information—Go to step 3. • Search the storage array profile—Go to step 4. • Save the storage array profile—Go to step 5. • Close the storage array profile—Go to step 6. 3 Select one of the tabs, and use the horizontal scroll bar and the vertical scroll bar to view the storage array profile information.
book.book Page 272 Wednesday, June 8, 2011 5:01 PM e In File Name, type the file name of your choice. To associate the file with a particular software application that opens it, specify a file extension, such as .txt. NOTE: The file is saved as ASCII text. f Click Save. 6 To exit the storage array profile, click Close. For more information, see the PowerVault Modular Disk Storage Manager online help topics.
book.book Page 273 Wednesday, June 8, 2011 5:01 PM Viewing the Physical Associations You can use the Associated Physical Components option to view the physical components that are associated with source virtual disks, snapshot virtual disks, snapshot repository virtual disks, disk groups, unconfigured capacity, and free capacity in a storage array. To view the physical associations: 1 In the AMW, select a node in the Logical pane of the Logical tab or in the Topology pane of the Mappings tab.
book.book Page 274 Wednesday, June 8, 2011 5:01 PM To find nodes: 1 In the AMW, select View Find. 2 Based on the type of search, select one of these options, and go to the indicated step: • Search by name—see step 3. • Search by special criteria—see step 4. 3 Type the name of the node to be found in the Find node text box. See step 8. 4 Based on the search criteria, select one of these options, and go to the indicated step: • Find all virtual disks with RAID level—Go to step 5.
book.book Page 275 Wednesday, June 8, 2011 5:01 PM c Specify that the free capacity to be matched is less than, equal to, or greater than the capacity entered in the GB box. d Go to step 8. 8 Click Find Next. To see every node that matches the criteria, click Find Next repeatedly. If no matches are found, the Search Failed dialog appears. Click OK, and reenter the search criteria. 9 To close the dialog, click Cancel.
book.book Page 276 Wednesday, June 8, 2011 5:01 PM 4 Select View Go To Source Virtual Disk. The selection jumps to the associated source virtual disk in the Logical pane. 5 Select View Go To Target Virtual Disk. NOTE: If the source virtual disk has more than one associated target virtual disk, select the target virtual disk that you want from the list, and click OK. The selection jumps to the associated target virtual disk in the Logical pane.
book.book Page 277 Wednesday, June 8, 2011 5:01 PM 7 If the verification is successful, see step 8, if not, see step 9. 8 Remove the storage array with the Unresponsive status from the EMW, and select Add Storage Array to add the storage array again. 9 If the storage array does not return to Optimal status, check the Ethernet cables to ensure that there is no visible damage and that they are securely connected. 10 Ensure the appropriate network configuration tasks have been performed.
book.book Page 278 Wednesday, June 8, 2011 5:01 PM 20 If the problem still exists, make the appropriate host modifications, check with other administrators to see if a firmware upgrade was performed on the RAID controller module from another storage management station. If a firmware upgrade was performed, the EMW on your management station might not be able to locate the new AMW software needed to manage the storage array with the new version of the firmware.
book.book Page 279 Wednesday, June 8, 2011 5:01 PM Locating a Physical Disk You can use the Locate Physical Disk option to physically locate and identify one or more of the physical disks in an expansion enclosure by activating physical disk LEDs. To locate the physical disk: 1 Select the Physical tab. 2 Select the physical disks that you want to locate. 3 Select Physical Disk Blink Physical Disk. The LEDs on the selected physical disks blink. 4 When you have located the physical disks, click OK.
book.book Page 280 Wednesday, June 8, 2011 5:01 PM To locate the expansion enclosure: 1 Select the Physical tab. 2 Select a physical disk in the expansion enclosure that you want to locate. 3 Select Physical Disk Blink Expansion Enclosure. The LED or LEDs on the expansion enclosure or physical disks come on. 4 When you have located the expansion enclosure, click OK. The LEDs stop blinking. (If you have an expansion enclosure with a blue LED, the LED goes off).
book.book Page 281 Wednesday, June 8, 2011 5:01 PM Use the convention filename.dmp for the name of the file. The suffix .dmp is added to the file automatically if you do not specify a suffix for the file. 4 Click Start. NOTE: Each test shows a status of Executing while it is in progress. The test then shows Completed when it successfully finishes. If any of the tests cannot be completed, a status of Failed appears in the Execution summary window.
book.book Page 282 Wednesday, June 8, 2011 5:01 PM NOTE: In Windows, the mount point path is a drive letter. An error message appears in the command line when the utility cannot distinguish between the following: • Source virtual disk and snapshot virtual disk (for example, if the snapshot virtual disk has been removed). • Standard virtual disk and virtual disk copy (for example, if the virtual disk copy has been removed).
book.book Page 283 Wednesday, June 8, 2011 5:01 PM a Ensure that the host context agent software is installed and running. If the host is started before it is connected to the controllers in the storage array, the host context agent software will not be able to find the controllers. If so, ensure that the connections are tight, and restart the host context agent software.
book.book Page 284 Wednesday, June 8, 2011 5:01 PM If the storage array returns to optimal status, you have completed this procedure. c Examine the ethernet cables to ensure that you cannot see any damage and that they are tightly connected. d Ensure that the applicable network configuration tasks have been done (for example, the IP addresses have been assigned to each controller). 5 Ensure that the controller firmware is compatible with MDSM on your management station.
book.book Page 285 Wednesday, June 8, 2011 5:01 PM Starting or Restarting the Host Context Agent Software The host context agent software module is the software component that resides on the server or management station that communicates with the MD3600f series storage arrays. The SMagent software automatically starts after you reboot the host. Windows To restart the SMagent software in Windows: 1 Click Start Settings Control Pane Administrative Tools Services.
book.book Page 286 Wednesday, June 8, 2011 5:01 PM Copyright (C) 2009-2010 Dell, Inc. All rights reserved.
book.
book.
book.book Page 289 Wednesday, June 8, 2011 5:01 PM Troubleshooting: Your Array 20 Safety First—For You and Your Array CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty.
book.book Page 290 Wednesday, June 8, 2011 5:01 PM 1 If possible, use the storage management software to create, save, and print a new storage array profile. 2 If the Recovery Guru directed you to replace a failed RAID controller module, go to step 3, else run the Recovery Guru to identify the failed component. 3 Unpack the new SFP transceiver. NOTE: Ensure that the SFP transceiver is replaced by the same type.
book.book Page 291 Wednesday, June 8, 2011 5:01 PM Figure 20-1. Removing an SFP Module 7 Install the new SFP transceiver into the interface port. Ensure that the transceiver is properly seated. 8 Reconnect the fiber optic cable. 9 View the FCIN speed LEDs and the Physical Disk Channel speed LEDs. Based on the LED status, perform one of these actions: • At least one of the FCIN LEDs for each port is on. Go to step 11.
book.book Page 292 Wednesday, June 8, 2011 5:01 PM Troubleshooting External Connections • Verify that the cables are connected to the correct ports before troubleshooting any external devices. For the location of the back-panel connectors on your array, see Figure 3-1. • Ensure that all the cables are securely attached to the external connectors on your array. • For information on cabling, see the Dell PowerVault MD3600f Deployment Guide.
book.book Page 293 Wednesday, June 8, 2011 5:01 PM CAUTION: Power supply/cooling fan modules are hot-swappable. The array can operate on a single power supply; however both modules must be installed to ensure proper cooling. A single power supply/cooling fan module can be removed from a powered-on array for a maximum period of five minutes. Beyond that time, the array may automatically shut down to prevent damage. 2 Reseat the power supply by removing and reinstalling it.
book.book Page 294 Wednesday, June 8, 2011 5:01 PM Troubleshooting Expansion Enclosure Management Modules CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 295 Wednesday, June 8, 2011 5:01 PM d Turn on the server. e Check the link status LED. If the link status LED is not green, replace the cables. If the problem is not resolved, see "Getting Help" on page 303. Troubleshooting RAID Controller Modules CAUTION: Many repairs may only be done by a certified service technician.
book.book Page 296 Wednesday, June 8, 2011 5:01 PM • If both LEDs for any given FCIN port are unlit, see "Troubleshooting Array and Expansion Enclosure Connections" on page 297. a Turn off the server, storage arrays, and expansion enclosures. b Reseat the RAID controller module and reconnect cables on the storage array and the server. c Restart the storage array and wait until the array is fully booted. d Turn on the server. e Recheck the LEDs of the affected port(s).
book.book Page 297 Wednesday, June 8, 2011 5:01 PM Troubleshooting Array and Expansion Enclosure Connections 1 Verify that the SAS OUT status LED is green and that for each FCIN port connected to a cable, at least one of the paired LEDs is on. If this is not the case, see "Planning: RAID Controller Modules" on page 31. 2 Ensure that all the cables are attached correctly according to array mode you selected. 3 Turn off the server, storage array, and expansion enclosures.
book.book Page 298 Wednesday, June 8, 2011 5:01 PM Troubleshooting a Wet Storage Array CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 299 Wednesday, June 8, 2011 5:01 PM Troubleshooting a Damaged Array CAUTION: Many repairs may only be done by a certified service technician. You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
book.book Page 300 Wednesday, June 8, 2011 5:01 PM Troubleshooting RAID Controller Modules Conditions Certain events can cause a RAID controller module to fail and/or shut down. Unrecoverable ECC memory or PCI errors, or critical physical conditions can cause lockdown. If your RAID storage array is configured for redundant access and cache mirroring, the surviving controller can normally recover without data loss or shutdown. Typical controller failures are detailed in the following sections.
book.book Page 301 Wednesday, June 8, 2011 5:01 PM PCI Errors The storage array firmware can detect and only recover from PCI errors when the RAID controller modules are configured for redundancy. If a virtual disk uses cache mirroring, it fails over to its peer RAID controller module, which initiates a flush of the dirty cache.
book.
book.book Page 303 Wednesday, June 8, 2011 5:01 PM Getting Help 21 Contacting Dell For customers in the United States, call 800-WWW-DELL (800-999-3355). NOTE: If you do not have an active Internet connection, you can find contact information on your purchase invoice, packing slip, bill, or Dell product catalog. Dell provides several online and telephone-based support and service options. Availability varies by country and product, and some services may not be available in your area.
book.
book.
book.
book.
book.
book.
book.
book.
book.