HP 3PAR InForm OS 3.1.1 CLI Administrator's Manual Abstract This manual is for all levels of system and storage administrators. This guide provides instructions for installing the InForm OS CLI and using the CLI to configure and manage HP 3PAR Storage Systems.
© Copyright 2007 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Acknowledgments Microsoft®, Windows®, Windows® XP, and Windows NT® are U.S.
. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and its contributors. 4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. Copyright (c) 1991 The Regents of the University of California. All rights reserved.
The InForm OS uses a Linux gigabit adaptor base driver distributed by Intel under the GNU GPL. The driver has been modified slightly by 3PAR, Inc. and, as modified, is licensed under the GNU GPL. Copyright © 2002, 2003, 3PAR, Inc. A copy of the GNU GPL is available on the CD-ROM provided by 3PAR and may additionally be obtained at http://www.fsf.org/ licenses/gpl.html.
This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com). Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed.
Contents 1 Introduction.............................................................................................14 Audience...............................................................................................................................14 User Interfaces.......................................................................................................................14 Units of Measure......................................................................................................
OpenLDAP Configuration with Simple Binding Over SSL.........................................................38 Configuring Connection Parameters.................................................................................39 Configuring Binding Parameters......................................................................................39 Configuring Group Location Parameters...........................................................................40 Configuring Group-To-Role Mapping Parameters......
5 Managing HP 3PAR Virtual Domains..........................................................62 Overview..............................................................................................................................62 Default Domains.....................................................................................................................62 Creating a Domain.................................................................................................................
Creating a Domain-Specific Host.........................................................................................79 Modifying a Domain-Specific Host.......................................................................................79 Changing a Host’s Domain.................................................................................................80 7 Managing CPGs and Virtual Volumes.........................................................81 Overview.......................................
Creating VLUN Templates in a Specific Domain................................................................99 Moving a Common Provisioning Group to a Domain..............................................................99 8 Managing Virtual Volume Copies.............................................................100 Overview............................................................................................................................100 Virtual Copies..........................................
12 Viewing Statistics and Histograms...........................................................118 Overview............................................................................................................................118 Viewing Statistics..................................................................................................................118 Viewing Statistics for Physical Disks....................................................................................
Registering an SNMP Manager..............................................................................................138 Viewing Registered Managers...........................................................................................139 Removing a Manager.......................................................................................................139 Agent Community Strings..................................................................................................
Contents
Contents 131 Introduction This administrator’s guide provides information for installing the InForm OS CLI, and using the CLI to configure and manage an HP 3PAR Storage System. HP 3PAR Virtual Domains Software requires an HP 3PAR Virtual Domains Software license. Contact your local service provider for technical assistance. Audience This administrator’s guide is for system and storage administrators who monitor and direct system configurations and resource allocation for HP 3PAR Storage Systems.
Table 1 Related documentation (continued) For information about… Read the… System concepts and terminology HP 3PAR InForm OS Concepts Guide Identifying storage system components and detailed alert information HP 3PAR InForm OS Messages and Operator's Guide Using HP 3PAR Remote Copy Software HP 3PAR Remote Copy Software User's Guide nl Using HP 3PAR CIM HP 3PAR CIM API Programming Reference Using HP 3PAR Host Explorer Software HP 3PAR Host Explorer User’s Guide Identifying storage system configur
2 Installing the InForm OS Command Line Interface The purpose of this chapter is to provide instructions for installing and uninstalling the HP 3PAR InForm OS Command Line Interface. CAUTION: If the HP 3PAR Storage System is operating in Common Criteria mode, the CLI and IMC connections must be encrypted. For more information about Common Criteria, see the HP 3PAR InForm OS Common Criteria Administrator’s Reference.
Installation The following sections describe how to install the InForm OS CLI on remote systems running compatible versions of Linux, Solaris, and Windows operating systems. You have a choice between a graphical installation and a command line installation. For graphical installation instructions, see “Graphical Installation on Windows” (page 17). For command-line installation instructions, see “Command-Line Installation on Solaris and Linux” (page 17).
For example, if you are using the Bourne or bash shells and the commands have been installed in /opt/3PAR/inform_cli_/bin, then issue the following commands: $ PATH=$PATH:/opt/3PAR/inform_cli_/bin $ export PATH The is the current release version, for example 3.1.1. Troubleshooting the Installation The InstallAnywhere application creates an error log named install.log in the installation directory.
Scripting Considerations If you have scripts that depend on the location of the binaries for any of the InForm OS CLI commands, you will need to update your scripts or environment variables to point to the latest version of the InForm OS CLI. As an alternative, if you do not need to keep multiple versions of the InForm OS CLI installed, you can change the default install location of the InForm OS CLI to a path of your choosing so that the path stays consistent from release to release.
3 Managing User Accounts and Connections Learning About User Accounts In order to access an HP 3PAR Storage System you must have a user account. Each InForm OS CLI user is assigned a role, and each role is assigned a set of rights. The roles and rights assigned to the CLI user determine which tasks the user can perform with a system. Assign roles to users based on the tasks you intend the users to perform. Eight roles are defined in the InForm OS CLI. See Table 4 (page 20) for a description of each role.
Default User Accounts During the HP 3PAR Storage System’s moment of birth operation, the following InForm OS CLI user accounts are created: • 3paradm is a user account with Super rights. This user account is not used by HP personnel and you can modify or delete this user account. Use the 3paradm user account to create new CLI users. You should change the password of this user. • 3parcim is a user account with Browse rights. This user account is reserved for use by the InForm OS administration tools.
Interface Reference. For more information about user roles and rights, see “Learning About User Accounts” (page 20). • To view a list of the available roles on a system, issue the showrole command. • To view a list of the available rights on a system, issue the showrole -lstrights command. • To view the rights assigned to a specific role, issue the showrole command, where is the name of the role.
NOTE: The first HP 3PAR Storage System user account created must have a role with the right to create additional users. If the first user created has limited rights the ability to configure the system will be restricted. : The _set rights include the right to remove the object. For example, the vvset_set right includes the right to remove virtual volume sets.
To view a list of users, the user roles, and user domain associations issue the showuser command. Refer to the HP 3PAR InForm OS Command Line Interface Reference for details about this command. For more information about domains, see the HP 3PAR InForm OS Concepts Guide. • To display all the users of a system, issue the showuser command. • To display information for a specific user, issue the showuser command, where is the name of the user.
NOTE: Prior to setting a specific domain as a user’s default, the user must previously have been assigned accessibility within that domain. • To set a user’s default domain, issue the setuser -defaultdomain command, where: ◦ is the name of the domain which is being set as the default. ◦ is the name of the user whom you are assigning a default domain. For information about default domains, see the HP 3PAR InForm OS Concepts Guide.
(-) under the Domain column. Otherwise, the domain to which the object belongs appears under the Domain column. • To view a user’s connection to the system, issue the showuserconn command, where: ◦ is the user’s numeric ID. ◦ is the user’s assigned name. ◦ is the user’s IP address. Refer to the HP 3PAR InForm OS Command Line Interface Reference for details about this command.
Active Directory LDAP Configuration with SASL Binding To configure your system to use Active Directory with SASL binding, the following process must be performed (detailed instructions follow): • • • • Configure connection parameters using the following commands: ◦ setauthparam ldap-server ◦ setauthparam ldap-server-hn ◦ setauthparam kerberos-realm Configure binding (authentication) parameters using the following commands: ◦ setauthparam binding sa
1. If not already known, obtain the LDAP server’s host name and Kerberos server information by running the ldapsearch command or using ldp.exe (available as part of the downloadable Windows Support Tools from Microsoft). You must know the LDAP server’s IP address. NOTE: If you do not have access to the ldapsearch command, use the ldp.exe command shown below.
4. Set the Kerberos realm by issuing the setauthparam kerberos-realm command, where is the value displayed by either using the ldapsearch command or ldp.exe in Step 1. NOTE: The value displayed for the default naming context is used later in “Configuring Account Location Parameters” (page 29). Example: % ldapsearch -LLL -x -H ldap://192.168.10.13 -b "" -s base dnsHostName ldapServiceName defaultNamingContext dn: dnsHostName: domaincontroller.3par.
3. 4. 5. Issue the setauthparam account-obj user command. Issue the setauthparam account-name-attr sAMAccount command. Issue the setauthparam memberof-attr memberOf command. NOTE: You must know the user’s password in order to successfully use the checkpassword command. 6. Issue the checkpassword command to obtain information about the user’s group membership(s) from the LDAP server. Example: % ldapsearch -LLL -x -H ldaps://192.168.10.
+ search result: cn: engineering + search result DN: cn=hardware,ou=groups,dc=ldaptest,dc=3par,dc=com + search result: cn: hardware + mapping rule: super mapped to by software + rule match: super mapped to by software + mapping rule: edit mapped to by engineering + rule match: edit mapped to by engineering + mapping rule: browse mapped to by hardware + rule match: browse mapped to by hardware user 3paruser is authenticated and authorized • • The example above corresponds to Step 6, and shows that 3PARuse
3. Issue the checkpassword command to verify that the users have the role(s) you assigned for the desired group(s). Use a member of a specific group to verify the role. Example: system1 cli% setauthparam -f edit-map CN=Software,CN=Users,DC=3par,DC=com system1 cli% setauthparam -f browse-map CN=Eng,CN=Users,DC=3par,DC=com In the example above: • Users belonging to the Software group are configured to have Edit rights within the system.
• (Optional) Set the CA certificate using the following command: ◦ • • setauthparam ladp-ssl-cacert Configure account location parameters using the following commands: ◦ setauthparam accounts-dn ◦ setauthparam account-obj user ◦ setauthparam account-name-attr sAMAccount ◦ setauthparam memberof-attr memberOf ◦ checkpassword Configure group-to-role mapping parameters using the following commands: ◦ setauthparam ◦ checkpassword
3. Set the LDAP server’s host name by issuing the setauthparam ldap-server-hn command, where is the value displayed by either using the ldapsearch command or ldp.exe in Step 1. NOTE: The value displayed for the defaultNamingContext is used later in “Configuring Account Location Parameters” (page 29). Example: % ldapsearch -LLL -x -H ldap://192.168.10.13 -b "" -s base dnsHostName ldapServiceName defaultNamingContext dn: dnsHostName: domaincontroller.3par.
c. d. e. f. g. h. Click Copy to File.... Click Next. Select Base-64 encoded x.5098 format. Click Next. Click Browse... and select a filename for the certificate (ending in the .cer file extension) and a folder in which the certificate will be stored. Click Next and then Finish. Or, use the openssl x509 program. 3. Set the certificate using the setauthparam ladp-ssl-cacert command, where is the name of the certificate you previously located or converted.
The example above corresponds to Step 1, and displays the following: • joadmin is the user name of the NT Windows domain (NTDOM1) administrator searching for group information for user 3PARuser (cn=3PARuser). • dn: CN=3PAR User,OU=Engineering,OU=Users,DC=3par,DC=com displays user locations in the LDAP server directory information tree (DIT).
• ◦ Eng ◦ Golfers In this example, 3PARuser is not yet authenticated or authorized because 3PARuser’s group-to-role mapping has not been configured. Configuring Group-To-Role Mapping Parameters Once you have configured the group location parameters, you must now decide what role you wish to assign the users for a given group. To configure group-to-role mapping: 1.
3. Issue the checkpassword command to verify that the users have the role(s) you assigned for the desired group(s). Use a member of a specific group to verify the role. Example: system1 cli% setauthparam -f edit-map CN=Software,CN=Users,DC=3par,DC=com system1 cli% setauthparam -f browse-map CN=Eng,CN=Users,DC=3par,DC=com In the example above: • Users belonging to the Software group are configured to have Edit rights within the system.
• • Configure group location parameters using the following commands: ◦ setauthparam groups-dn ◦ setauthparam group-object ◦ setauthparam group-name-attr ◦ setauthparam member-attr Configure group-to-role mapping parameters using the following commands: ◦ setauthparam ◦ checkpassword Different schemata can be used for user and group information with OpenLDAP.
3. Issue the setauthparam user-attr command, where is the name of the attribute holding the user’s . Example: system1 cli% setauthparam -f binding simple In the example above, simple binding is specified as the binding mechanism. system1 cli% setauthparam -f user-dn-base ou=people,dc=ldaptest,dc=3par,dc=com In the example above, the base of the user entries in the OpenLDAP server DIT is ou=people,dc=ldaptest,dc=3par,dc=com.
1. Issue the setauthparam command, where: • • 2. is one of the following: ◦ super-map - provides Super user rights within the specified group. ◦ service-map - provides Service user rights within the specified group. ◦ edit-map - provides Edit user rights within the specified group. ◦ browse-map - provides Browse user rights within the specified group. ◦ create-map - provides Create user rights within the specified group.
3. Issue the checkpassword command to verify that the users have the role(s) you assigned for the desired group(s). Use a member of a specific group to verify the role. Example: system1 cli% setauthparam -f super-map software system1 cli% setauthparam -f edit-map engineering system1 cli% setauthparam -f browse-map hardware In the example above: • Users belonging to the software group are configured to have Super rights within the system.
rights within the system, all engineering group members have Edit rights within the system, and all hardware group members have Browse rights within the system. Configuring LDAP Connections on Systems Using Domains LDAP is also available for systems using virtual domains for access control. The configuration process is nearly identical to configuring LDAP on non-Domain systems, with the only difference being an additional authorization step to map a user’s group to a domain.
1. Follow the directions as described in the following sections: a. “Configuring Connection Parameters” (page 27) b. “Configuring Binding Parameters” (page 29) c. “Configuring Account Location Parameters” (page 29) d. “Configuring Group-to-Role Mapping Parameters” (page 31); however, do not issue the checkpassword command. 2. Configure the group-to-domain mapping parameters, as follows: 3.
The example above corresponds to Step 3 and displays the following: • 3PARuser is found to be a member of the Software group with Edit rights. The Software group is mapped to the Software_Group domain. 3PARuser is assigned Edit rights within the Software domain. • 3PARuser is also found to be a member of the Eng group with Browse rights. The Eng group is mapped to the Engineering domain. 3PARuser is assigned Browse rights within the Eng domain.
4 Running the InForm OS Command Line Interface Introduction After installing the CLI as described in “Installing the InForm OS Command Line Interface” (page 16) and setting up a user account (as described in “Managing User Accounts and Connections” (page 20)) a CLI connection requires the following information: • System name or IP address • User name • Password You are prompted as follows when running the CLI: system: user: password: The example above displays the simplest way to connect to the CLI.
NOTE: Global options cannot be specified on the command line for commands issued from a Tcl shell. Global options must be specified before starting a Tcl shell. • You can use environment variables when configuring the CLI. NOTE: Environment variables can only be used if the CLI is set up remotely. Environment variables cannot be used if you are accessing the CLI through SSH. Table 5 Global CLI Options and Environment Variables Global Option Environment Variable Specifies...
Table 5 Global CLI Options and Environment Variables (continued) Global Option Environment Variable Specifies... -nohdtot TPDNOHDTOT that headers and totals are not printed after commands are executed. For additional information, see “Table Headers and Totals” (page 54) -hafter TPDHAFTER the number of lines after which the header is printed again. For additional information, “Table Headers and Totals” (page 54).
When column help is not available, the following message appears: No help for columns of command “”. Using SSL The InForm OS provides a Secure Sockets Layer (SSL) protocol for secure transfer of data between the CLI client and system and is set with either of the following: • The TPDSOCKSSL environment variable. • The -sockssl global option. NOTE: This is the default behavior. TPDSOCKSSL and -sockssl are present for compatibility. The -nosockssl option overrides this behavior.
Setting the TPDSYSNAME Environment Variable on Solaris and Linux • To set the environment variable on Solaris or Linux, see the following system output example. Substitute your system name for and use the correct syntax for your shell. $ TPDSYSNAME= $ export TPDSYSNAME $ cli Setting the TPDSYSNAME Environment Variable on Windows • To set the environment variable in Microsoft Windows for one instance of a Command Prompt window, run set TPDSYSNAME=.
The password file has a single line with your name and an encrypted six character minimum password separated by a space. For example: 3paruser PPTpdJPDHuwnU Additionally, you can also store your password using the setpassword command. Storing your password is useful when you need to: • Establish sessions when using the individual commands. Otherwise, you are prompted for user and password information each time you issue a command.
The TPDCACHEDIR environment variable is set differently in Solaris and Linux, and Windows. Setting the TPDCACHEDIR Environment Variable on Solaris and Linux • To set the TPDCACHEDIR environment variable in Solaris and Linux, see the following system output example. Substitute the name of your cache directory for cache1 and use the correct syntax for your shell.
Once set, data is displayed as shown in the following example: cli% showvv ---Rsvd(MB)--- -(MB)- Id Name Prov Type CopyOf BsId Rd -Detailed_StateAdm Snp Usr VSize_MB 0 admin full base --0 RW normal 0 0 10240 10240 1 par full base VV_01 1 RW normal 128 512 16384 256 2 copy cpvv vcopy VV_02 2 RW normal 0 0 16384 5120 3 vvcp.1.
29 VV5 full base --29 RW normal 96 256 1024 1024 32 VV5.ro snp vcopy VV5 29 RO normal -- --- 1024 17 VV_TeamCPG_1 Dom001 full base --17 RW normal 0 0 2048 2048 18 VV_TeamCPG_2 Dom001 full base --18 RW normal 0 0 2048 2048 8 vvfromcpg2.0 Dom001 full base --8 RW normal 0 0 2048 2048 9 vvfromcpg2.
... 30 V3 31 V3.ro 29 VV5 32 VV5.ro 17 VV_TechPubs_1 Dom001 18 VV_TechPubs_2 Dom001 8 vvfromcpg2.0 Dom001 9 vvfromcpg2.
Setting the TPDFORCE Environment Variable on Windows To set the TPDFORCE environment variable in Windows: 1. Perform Step 1 through Step 4 of the procedure for setting the TPDSOCKSSL environment variable in Windows as described in “Using SSL” (page 49). 2. Enter TPDFORCE in the Variable box. 3. Enter 1 in the Value box. 4. Click OK.
Benefits of Using SSH SSH provides the following benefits: • No InForm OS CLI installation. CLI clients are not required to access and use the CLI (assuming SSH client is installed). • No version matching. The InForm OS CLI and InForm OS versions do not need to match because the CLI does not need to be installed remotely. • Strong encryption. All information exchanged between client machines and systems are encrypted. • Data integrity.
NOTE: See the HP 3PAR InForm OS Command Line Interface Reference for complete information about these commands. Accessing the CLI Using SSH NOTE: The following screen examples display output for UNIX systems. Windows screens are identical, with DOS prompts replacing UNIX prompts. NOTE: A total of 16 connections is allowed at one time. To access the CLI using SSH: 1.
6. Terminate the CLI session by typing exit at the prompt. cli % exit Newly created CLI users can access the CLI by following the instructions as explained earlier, substituting their own user name, system name, and password when prompted. CLI Scripting Through SSH You can use SSH public key authentication to issue CLI commands in scripts. No password is required, however you will need to generate a public/private key pair.
Created directory '/home/usr/user3/.ssh'. Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /home/usr/user3/.ssh/id_dsa. Your public key has been saved in /home/usr/user3/.ssh/id_dsa.pub. The key fingerprint is: 3f:a0:b5:6a:4d:dd:45:76:37:fb:a3:3e:52:44:55:32 user3@3pardata.com The ssh–keygen utility generates two files: id_rsa and id_rsa.pub (or id_dsa and id_dsa.pub). • Generate the key with or without a pass phrase.
6. If you specified a pass phrase when creating the key pair, run ssh-agent and ssh-add to decrypt the key before running your script ( in the following example). $ ssh–agent echo Agent pid 24216 $ ssh–add Enter passphrase for /home/usr/user3/.ssh/id_dsa: ****** Identity added: /home/usr/user3/.ssh/id_dsa (/home/usr/user3/.
5 Managing HP 3PAR Virtual Domains Overview HP 3PAR Virtual Domains Software (domains) allows an administrator to create multiple domains, or spaces, within a system, where each domain is dedicated to a specific application. In effect, using Domains restricts users to a subset of the volumes and hosts in a system and prevents users from exporting virtual volumes to hosts outside of the users’ assigned domains. For more information about Domains, see the HP 3PAR InForm OS Concepts Guide.
For a complete list of options available for the createdomainset command, see the HP 3PAR InForm OS Command Line Interface Reference and InForm OS CLI Help. For additional information about Domains, refer to the HP 3PAR InForm OS Concepts Guide. Viewing Domains From time to time, you may wish to view the domains in your system. Additionally, when managing your domain objects as described in “Managing Domain Objects” (page 64), you may need to view the objects’ domain associations.
form the domain, or moved to another domain before removing the domain. Domain objects include virtual volumes, CPGs, and hosts. • To remove a domain, issue the removedomain command, where is the domain you want to delete. Managing Domain Objects Domain objects can be moved in and out of a domain, or have their domain associations entirely removed. In doing so, all objects related either directly or indirectly to the domain object being managed are also moved or removed.
the domain of any objects associated with the host. If a volume is exported to a host that is a member of a domain set is selected directly or indirectly by the movetodomain command, the move does not propagate to the host or any of the volumes exported to the host if the domain set includes the destination domain of the volume. Virtual domains added to a set inherit the rights of that set.
Removing Virtual Domain Sets • To remove a domain set from the system, or to remove domains from a set, issue the removedomainset command, where: ◦ is the name of the domain set being removed or modified. ◦ are the names of the domains being removed from the domain set. This specifier is optional and it is not required if you are removing the entire set.
6 Managing Ports and Hosts Overview The system sees a host as a set of initiator port World Wide Names (WWNs) or iSCSI Names. Hosts that are physically connected to ports on the system are automatically detected. The Fibre Channel port WWNs and iSCSI port iSCSI Names are displayed in the InForm OS CLI. You can also add new WWNs or iSCSI Names for unestablished host paths and assign them to a host before they are physically connected.
FC Port Settings The InForm OS CLI controlport command is described in detail the HP 3PAR InForm OS Command Line Interface Reference and the CLI Help Pages. Use the controlport command to perform the following tasks. • Set the port’s mode with the config sub-command followed by disk|host|rcfc and the port location in Node:Slot:Port format. To set the port’s mode: 1. Disconnect the cable from the port on the system. 2. Set the port’s mode.
iSCSI Port Settings The InForm OS CLI controliscsiport command is described in detail the HP 3PAR InForm OS Command Line Interface Reference and the CLI Help Pages. Use the controliscsiport command to perform the following tasks: • To set the IP address and netmask of the iSCSI port, use the addr sub-command followed by the IP address and netmask, then the port location in node:slot:port (N:S:P) format.
Active and Inactive Hosts An active host is a host that is connected to a system port and recognized by the InForm OS. Under normal operation, an active host may have a number of volumes exported to it and therefore the host has access to those volumes. An inactive host is a host that is known to the InForm OS but is not recognized as being connected to any system port at the moment.
with an assigned host persona, see section “Creating a Host with an Assigned Host Persona” (page 78). NOTE: There should be at least two paths to each host to facilitate updates to the system. Failure to create at least two host paths may result in unnecessary system downtime. NOTE: See the HP 3PAR Implementation Guide for recommended practices and detailed configuration information about using your specific host devices with the system.
• Add or remove iSCSI CHAP authentication information. • Assign a host persona to a host, see section “Assigning a Host Persona to a Host” (page 78). The following CLI commands are described in detail in the HP 3PAR InForm OS Command Line Interface Reference and the CLI Help Pages. Changing a Host Name • To change a host name, issue the sethost -name command, where: ◦ is the new name you wish to assign to the existing host.
Removing Fibre Channel Path WWNs • To remove a WWN from an existing host, issue the removehost command, where: ◦ is the name of the host being modified. ◦ is the FC path being removed. Removing iSCSI Path iSCSI Names • To remove an iSCSI Name from an existing host, issue the removehost -iscsi command, where: ◦ is the name of the host being modified. ◦ is the iSCSI path being removed.
After you move a host to a new port, you must: • Remove the old host definitions. • Disconnect the host from the system. • Reconnect the host to the new port. To move the host to another system port, you must do the following: 1. Use the InForm OS CLI command servicehost copy to create an inactive host on the system port to which you wish to move the host. The inactive host created with this command is identical to the active host that is to be relocated to this port.
The removehost CLI command is described in detail in the HP 3PAR InForm OS Command Line Interface Reference and the CLI Help Pages. • To completely remove a host definition from your system, issue the removehost [... | ...] command, where: ◦ is the host definition to be removed. ◦ ... is the WWN path or paths to the host to be removed. ◦ ... is the iSCSI path or paths to the host to be removed.
Modifying Host Sets • To change the name of a host set, issue the sethostset command, where: ◦ is the new name of the host set. ◦ is the name of the host set being modified. For a complete list of options available for the sethostset command, see the HP 3PAR InForm OS Command Line Interface Reference and InForm OS CLI Help.
Table 7 (page 77) describes the specific functionality for each host persona number. For a list of supported host operating systems, go to the Single Point of Connectivity Knowledge (SPOCK) websitehttp://spock.corp.hp.com/index.aspx.
Viewing Host Personas • To view a list of all host personas, issue the showhost -listpersona command. Displaying Host Persona Settings • To display the host persona parameters, issue the showhost -persona command, where is the name of the host or hosts.
from the Host Explorer agent is visible for uncreated hosts and assists with host creation and diagnosing host connectivity issues. When a host is created on the system, unassigned WWNs or iSCSI names are presented to the system. Without the Host Explorer agents running on the attached hosts, the system is unable to determine which host the WWN or iSCSI names belongs to and you must manually assign each WWN or iSCSI name to a host.
order to perform this operation. Refer to the HP 3PAR InForm OS Concepts Guide for details about domain restrictions. • • By adding or removing WWNs or iSCSI names. This operation is restricted to Super or Edit rights in the all domain. Refer to the HP 3PAR InForm OS Concepts Guide for details about domain restrictions. See the following for instructions: ◦ “Adding Fiber Channel Path WWNs” (page 72). ◦ “Adding iSCSI Path iSCSI Names” (page 72). ◦ “Removing Fibre Channel Path WWNs” (page 73).
7 Managing CPGs and Virtual Volumes Overview A Common Provisioning Group (CPG) creates a virtual pool of logical disks that allows up to 4,095 virtual volumes to share the CPG's resources and allocate space on demand. Virtual volumes draw their resources from CPGs, and virtual volumes are exported as Logical Unit Numbers (LUNs) to hosts. Virtual volumes are the only data layer visible to hosts.
• Number of CPGs in the system. • Number of volumes associated with those CPGs. • Anticipated growth rate of the volumes associated with the CPGs. CAUTION: Use caution in planning CPGs. The system does not prevent you from setting growth warnings or growth limits that exceed the amount of currently available storage on a system.
Creating a Common Provisioning Group • To create a CPG, issue the createcpg -aw -sdgs -sdgl -sdgw -t command, where: ◦ -aw is the percentage of used snapshot space and administration space that will generate a warning alert. If 0 (default) is specified, alert generation is disabled. ◦ -sdgs is the amount of logical disk storage created during each autogrow operation.
Setting Snapshot Space Usage Warnings • To set or modify the space usage warning for a CPG, issue the setcpg -sdgw command, where: ◦ -sdgw is the space limit for logical disk space before a warning alert is generated. If 0 (default) is specified, no warning limit it enforced. ◦ is the name of the CPG being created.
Virtual volumes have three separate data components: • User space is the area of the volume that corresponds to the logical disk regions in the CPG available to the host. The user space contains the user data and is exported as a LUN to the host. • Snapshot space, also known as copy space, is the area of the volume that corresponds to logical disk regions in the CPG containing copies of user data that changed since a snapshot of the volume was created. The snapshot space contains the copy data.
Virtual Volume CLI Commands Use the following CLI commands to manage fully-provisioned virtual volumes and Thinly-Provisioned Virtual Volumes (TPVVs): • showvv - display virtual volumes in the system. • createvv - create virtual volumes. • setvv - modify existing volumes. • growvv - increase the size of existing virtual volumes. • freespace - frees snapshot space from a virtual volume. • removevv - remove virtual volumes from the system.
Creating Fully-Provisioned Virtual Volumes A fully-provisioned virtual volume has a set amount of user space that is allocated for user data. The virtual volume’s snapshot space is allocated on demand. • To create a group of fully-provisioned virtual volumes, issue the createvv -cnt -snp_cpg command, where: ◦ is the number of virtual volumes to create with the designated properties.
Modifying Virtual Volumes Existing virtual volumes can be modified to use a new name, draw space from a different CPG, set allocation warnings, or to use new policies. • To modify a volume to draw its snapshot space and administration space from a different CPG, issue the setvv -snp_cpg -usr_cpg command, where: ◦ is the name of the CPG from which the modified volume will draw its snapshot space and administration space.
1. 2. 3. 4. Refer to the HP 3PAR InForm OS Concepts Guide for assessment and preparation considerations. After determining to proceed with converting your volumes, prepare the volumes for conversion to the new TPVV by removing unnecessary data. Perform clean-up tasks on the source volume by: • Emptying trash cans. • Archiving unused files. • Shrinking databases. • Deleting temporary files. Use a host application to write zeros to the allocated but unused volume space.
Virtual volumes added to a set inherit the rights of that set. For example, If a group of virtual volumes is exported to a host and a new virtual volume is added to the virtual volume set, the new virtual volume is visible to the host as soon as it is added to the virtual volume set. The opposite is also true. If a virtual volume is removed from a set, all the rights of that virtual volume set are revoked for the removed virtual volume.
Freeing Virtual Volume Snapshot Space • To free unused snapshot administration and snapshot data space from a virtual volume that is not in use by the system, issue the freespace or freespace command, where: ◦ is the name(s) of the virtual volume(s) from which snapshot space is to be made available. ◦ is the name of the pattern from which snapshot space is to be made available from all volumes matching that pattern name.
• If both of the retention time and expiration time are specified, the retention time cannot be greater than the expiration time. • The retention time can be set in hours or days. The minimum retention time is 1 hour and the maximum retention time is 43800 hours (1,825 days or 5 years). The default is 336 hours (14 days). The vvMaxRetentionTime system parameter determines the maximum retention. This parameter can be set with the setsys command.
Validating and Repairing Virtual Volumes • To verify virtual volumes are valid and repair virtual volumes corrupted by an uncontrolled system shutdown, issue the checkvv -y|-n command, where: ◦ -y|-n specifies that if validity errors are found they are to be corrected (-y), or left unmodified (-n). If this option is not specified, errors are not corrected. ◦ is the name(s) of the virtual volume(s) to be validated and repaired.
Creating a Host Sees or Host Set VLUN Template • To create a host sees or host set VLUN template, issue the createvlun |set: |set: command, where: ◦ is the name of the virtual volume being exported to the host. ◦ is the name of the virtual volume set being exported to the host. ◦ is the LUN where the virtual volume is to be exported, expressed as an integer from 0 through 16383.
that template. Removing all VLUNs for a host stops the host from accessing any volumes.
Removing a Host Sees or Host Set VLUN Template • To remove a host sees VLUN template and all active VLUNs associated with it, issue the removevlun |set: |set: command, where: ◦ is the name of the virtual volume. ◦ is the name of the virtual volume set. ◦ is the LUN for the virtual volume, expressed as an integer from 0 through 16383. ◦ is the name of the host. This option creates a host sees VLUN template.
NOTE: Virtual domains require the HP 3PAR Virtual Domains Software license. Contact your HP sales representative for details. Creating a Common Provisioning Group in a Domain If you are using virtual domains, you can create domain-specific CPGs which are accessible by only those users with rights to that domain. You must be a Super or Edit user in the all domain in order to create a domain CPG. For information about CPGs and virtual domains, refer to the HP 3PAR InForm OS Concepts Guide.
For instructions on creating domain CPGs, see “Moving a Common Provisioning Group to a Domain” (page 99). For more information about virtual domains, see the HP 3PAR InForm OS Concepts Guide. • To create a virtual volume within a domain, issue the createvv command, where: ◦ is the name of the CPG from which the created virtual volume’s user space is drawn. ◦ is the name of the virtual volume being created.
Creating VLUN Templates in the All Domain You can create host sees, matched set, and port presents VLUN templates if you are a Super or Edit user belonging to the all domain. For instructions on creating each type, see “Creating a Host Sees or Host Set VLUN Template” (page 94), “Creating a Port Presents VLUN Template” (page 94), and “Creating a Matched Set VLUN Template” (page 94).
8 Managing Virtual Volume Copies Overview There are two types of copies that can be created from virtual volumes: virtual copies and physical copies. • A virtual copy is a snapshot of an original or base volume. A virtual copy only records the changes to the original virtual volume. • A physical copy is a complete duplicate of all the data from a base volume to a destination volume. For more information about virtual copies, see the HP 3PAR InForm OS Concepts Guide.
system configuration, go to the Single Point of Connectivity Knowledge (SPOCK) website http://spock.corp.hp.com/index.aspx. • To create a virtual copy, or snapshot, of a virtual volume or a virtual volume set, issue the createsv -ro |set: command, where: ◦ -ro specifies that the snapshot being created is read-only. ◦ is the name of the snapshot being created. ◦ is the name of the virtual volume being copied.
If you are using HP 3PAR Remote Copy Software, you can optionally promote the virtual copy if the base volume is in a Remote Copy group. See the HP 3PAR InForm OS Command Line Interface Reference for detailed information about the promotesv command. For details about Remote Copy, see the HP 3PAR Remote Copy Software User's Guide. Modifying a Virtual Copy Any existing virtual copy can be modified to have a new name, new allocation warnings and limits, and adhere to new policies.
You can use the InForm OS CLI to perform the following physical copy tasks: • Create • Resynchronize • Promote For additional information about the rules governing physical copies, see the HP 3PAR InForm OS Concepts Guide. NOTE: If you create a TPVV copy of a fully-provisioned virtual volume, you cannot create a fully-provisioned copy of that TPVV at a later time. A fully-provisioned virtual volume cannot be converted to a TPVV, then converted back to a CPVV.
Creating a Group of Physical Copies The InForm OS CLI also allows for the creation of consistent group physical copies of a list of virtual volumes. A maximum group size of 100 virtual volumes is recommended for making a group of physical copies.
When you resynchronize a physical copy, the system copies changes from one volume in the physical copy pair to the other. • To resynchronize a physical copy, issue the createvvcopy -r command, where -r is the volume to be resynchronized with its parent volume. The snapshot is retained for quick resynchronizing and the parent-copy relationship is also retained.
Moving Snapshots Snapshots can be moved in or out of a domain using the movetodomain command. This action is restricted to Super users in the all domain. NOTE: If a snapshot is moved in or out of a domain, the snapshot’s base volume is also moved. For further instructions see “Moving Domain Objects to Another Domain” (page 64).
9 Creating and Applying Templates Overview You can use the InForm OS CLI to create templates that enable you to apply a set of parameters that automatically create logical disks, virtual volumes, or Common Provisioning Groups with the same or similar characteristics. The following general rules apply to templates: • A property can either be included in a template or not included. Properties are virtual volume, logical disk, or common provisioning group attributes such as set size.
Creating Virtual Volumes and Logical Disks Using a Template • To create a virtual volume and its underlying logical disks using a template, issue the createvv -templ command, where: ◦ is the name of the template being applied to the creation of the volume and logical disks. ◦ is the user-designated name of the virtual volume being created. ◦ is the size of the user volume.
Viewing Template Parameters Before modifying a template it may be helpful to view the template’s existing parameters. • To view a template’s current parameters, issue the showtemplate command. If name of the template you wish to modify is unknown, you can alternately display templates in the system filtered by object type.
10 Monitoring System and Physical Disk Capacity Overview The InForm OS CLI provides commands to show the amount of used space and available space in a system. The commands allow you to review space usage information at the system level and for each physical disk. Use the following CLI commands to review space usage information: • showpd - displays configuration information about the physical disks in the system. • showspare - displays information about spare chunklets in the system.
As shown in the example above, system capacity is displayed in MBs. The first line displays the system’s total capacity, which is the sum of the allocated space (Allocated), free space (Free), and failed space (Failed). • The allocated space includes the following: ◦ all base volumes and the volumes’ user, copy, and administration spaces. ◦ provisioned groups and volumes and their used and unused copy and administration spaces. ◦ unmapped volumes.
10 0:9:2 FC normal 139520 22272 8704 108544 0 0 11 0:9:3 FC normal 139520 12800 8704 118016 0 0 12 1:0:0 NL normal 7150008 22528 8704 108288 0 0 13 1:0:1 NL normal 7150008 13056 8704 117760 0 0 14 1:0:2 NL normal 7150008 2272 _8704 108544 0 0 15 1:0:3 NL _normal 7150008 3056 _8704 117760 0 0 16 1:9:0 FC normal 139520 22272 8704 108544 0 0 17 1:9:1 FC normal 139520 13056 8704 117760 0 0 18 1:9:2 FC degraded 139520 22016 8704 108800 0 0 19 1:9:3 FC normal 139520 13056 8704 117760 0 0 -------------------------
NOTE: The output for the command listed below is displayed in the same format as the showpd -space command output example in “Determining Total Physical Disk Capacity” (page 111). • To display the capacity information for a single physical disk, issue the showpd -space command, where is the physical disk whose capacity information is shown. Spare Chunklets Some chunklets are identified as spares when the system is first set up at installation.
• 114 Usage. Shows whether the spare chunklet is in use by a logical disk. Values can be ◦ available. The chunklet is available for use as a spare. ◦ ld. The chunklet is in use by a logical disk. ◦ relsrc. Relocation source. The data has been moved to another chunklet. ◦ reltgt. Relocation target. The data in the chunklet has been moved from another spare chunklet. ◦ abtrel. Abort relocation. The system is aborting the chunklet relocation operation. ◦ cmprel. Completing relocation.
11 Managing Events and Alerts Overview The system tracks system events internally. Some of these events require action on the part of the system administrator, so they trigger alerts that are displayed for the administrator. Events are logs created by the system which allow you to view the day-to-day health of your system. Alerts are generated by the system when a system event requires immediate operator action/attention.
“Common Provisioning Groups” (page 81). For details about CPG creation precautions, refer to the HP 3PAR InForm OS Concepts Guide. • Limits for virtual volumes capable of allocating space on demand are also user-configurable and can trigger alerts. For information about on-demand virtual volume space allocation, refer to the HP 3PAR InForm OS Concepts Guide.
Viewing the Event Log • To view the events log, simply issue the showeventlog command. The showeventlog display can be refined to include only events occurring before or after a specified time, within a specified time period, and that match a specified pattern. For complete information on the events log’s display options, see the HP 3PAR InForm OS Command Line Interface Reference.
12 Viewing Statistics and Histograms Overview The InForm OS CLI allows you to view aspects of system performance over time. You can view statistics for the performance of VLUNs, virtual volumes, ports, physical disks, data cache memory, and CPU usage using variations of the stat command. In addition, the InForm OS CLI provides service time and I/O size histograms for system resources such as chunklets, logical and physical disks, ports, VLUNs, and virtual volumes.
Viewing Port Statistics • To view port statistics, issue the statport command. By default, only statistics for data transfers are displayed. You can optionally display statistics for control transfers or both data and control transfers by issuing the statport -ctl or statport -both command, respectively. Data output can be further refined to display only port statistics from: ◦ specific nodes. ◦ specific PCI slots. ◦ specific ports. ◦ host-connected (target) ports.
You can use additional filters to refine the data output. Refer to the InForm OS Command Line Reference for complete details about statvv and statrcvv command options and for sample command data output. Viewing Statistics for Data Cache Memory • To view data cache memory statistics, issue the statcmp command. By default, data cache memory statistics are displayed by node. You can optionally display data cache memory statistics by virtual volume by issue the statcmp -v command.
Viewing Histograms for Chunklets NOTE: The setstatch command must be issued to enable statistics collection on chunklets before chunklet histogram data can be viewed. • To view histogram data for chunklets, issue the histch command. Several filters are provided to refine the data output to display only data from specific chunklets and logical disks. Additional filters are provided to customize the way the histogram data is displayed.
Viewing Histograms for Ports • To view histogram data for ports, issue the histport command. By default, only histogram data for data transfers are displayed. You can optionally display histogram data for control transfers or both data and control transfers by issuing the histport -ctl or histport -both command, respectively. Histogram data output can be further refined to display only port data from: ◦ specific nodes. ◦ specific PCI slots. ◦ specific port slots. ◦ host-connected (target) ports.
13 Managing Tasks Overview Some system operations with long running times can be managed as system tasks and initiated at scheduled times. The larger your system, the longer some CLI command operations take to complete. With the task manager you can pause, cancel, or remove tasks running on the system. The System Scheduler allows you to create, modify, and remove schedules for initiating tasks.
Table 9 Task Manager Commands (continued) Command Description settask Set the priority of a running task. showtask Display information about tasks on the system. starttask Start a CLI command that runs as a background task. waittask Ask the CLI to wait for a task to complete before proceeding. For a complete list of options available for the CLI task manager commands, see the HP 3PAR InForm OS Command Line Interface Reference and InForm OS CLI Help.
Detailed status: (...) The columns in the example above are identified as follows: • Id - The task ID for the displayed task. • Type - The task type. Task types are explained in “Task Types” (page 127). • Name - The name of the system object that is being operated on. When there are multiple objects, those objects are not identified individually but as a group (for example, multiple lds or multiple cpgs). • Status - The task state. Task states are as follows: ◦ done.
For a complete list of options available for the settask command, see the HP 3PAR InForm OS Command Line Interface Reference and InForm OS CLI Help. Waiting for a Task You can use the task ID and the waittask command to ask the system to wait for a task to complete before returning a command prompt. This prevents you from running too many tasks at once. If you use the waittask -v option the command displays detailed task status as the task executes, and then return after it completes.
Removing a Task The removetask command only works on completed, failed, and cancelled tasks. Information about a task remains on the system unless it is manually removed using the removetask command and the task ID. For example: cli% removetask 454 Remove the following tasks? 454 select q=quit y=yes n=no: y The specified task ID and any information associated with it are removed from the system.
Table 10 Task Types by Operation and Command (continued) Task Type Operation Commands Description (Feature or Product) remote_copy_sync Remote copy volume synchronization (Remote Copy). startrcopygroup Starts a remote copy volume group and synchronizes the primary and secondary groups. remote_copy_sync Remote copy volume synchronization (Remote Copy). syncrcopy Synchronizes remote copy volume groups. tune_vv Tuning virtual volumes (Dynamic Optimization).
background_command The background_command task type tracks commands initiated by the starttask CLI command. The background_command task type has only one phase and one step. • See the background_command task type in Table 10 (page 127) for a list of the commands that can be run by the starttask command. • See “Starting a Task” (page 124) for more information about the starttask command. compact_cpg The compact_cpg task type tracks the operations of the compactcpg command.
copy volume groups using the command. Restarting remote copy volume groups using the startrcopygroup command can also initiate a remote copy synchronization on the system. However, note that with periodic mode volume groups the startrcopygroup command will only initiate synchronization the first time that it is issued for that volume group.
For more information about the tunevv command, see “Performance Tuning” (page 144). NOTE: The tune_vv task type and tunevv CLI command require the HP 3PAR Dynamic Optimization Software license. tune_vv_restart The tune_vv_restart task type is used to track tunevv restart operations performed with the System Tuner tunevv restart command. The tunevv restart command enables you to resume a failed or cancelled tunevv operation.
The following examples shows how to start, cancel, and then rollback a tunevv operation on virtual volume testvol: cli% tunevv -t r5 -ha mag testvol Task 3 started. cli% canceltask 1 Are you sure you want to cancel task 3? select q=quit y=yes n=no: y cli% tunevv -rollback testvol Task 4 started. Note that the tune_vv_rollback task is a new task and takes a new task ID number. You cannot start a tune_vv_rollback task for a tunevv operation that completed successfully.
• Internode balance analysis. • Intranode balance analysis. For more information about the tunesys command, see “Performance Tuning” (page 144). NOTE: A dirty disk is a disk with chunklets that are determined to be out of balance during the analysis phase. A clean disk is a disk with balanced chunklets. NOTE: The tunesys command waits for chunklet cleaning between tuning operations in order to maximize the amount of space available for the next tuning operation.
CLI housekeeping tasks and commands: • The move_back_chunklet runs the moverelocpd command. • The remove_expired_vvs runs the removevv command. The system_task task type has only one phase and one step. System Scheduler The System Scheduler allows you to create, modify, and remove schedules for initiating system operations with long running times. With the System Scheduler commands you can schedule specific CLI commands to run at regularly scheduled intervals, or to run once at a specified time.
command by users with Super rights. The following task manager commands can be used on CLI command operations initiated by the System Scheduler with the task type scheduled_task: • showtask • waittask • removetask For more information about the task manager commands, see “Task Manager Commands” (page 123). Displaying Scheduled Tasks • To display all scheduled user and system tasks, issue the showsched-all command.
Scheduling Tasks • To create a scheduled task, issue the createsched command, where: ◦ is the name of the CLI command to be initiated. The CLI command must be one of the commands listed in Table 12 (page 134). ◦ is a crontab-style argument that specifies when the CLI command is initiated.
Removing Scheduled Tasks • To remove scheduled tasks, issue the removesched | command, where: ◦ is the name of the schedule to remove. ◦ is the name of the pattern according to which schedules are removed. For a complete list of options available for the removesched command, see the HP 3PAR InForm OS Command Line Interface Reference and InForm OS CLI Help.
14 Using the InForm OS SNMP Infrastructure Overview In addition to managing the system with the InForm OS CLI, the HP 3PAR InForm OS includes a Simple Network Management Protocol (SNMP) agent that allows you to perform some basic management functions via network management software running on a management station. These SNMP management functions require that you have SNMP management software not provided by HP (refer to Chapter 15, SNMP, in the HP 3PAR InForm OS Concepts Guide for information about SNMP).
To register the manager with the agent, use the addsnmpmgr command followed by the manager’s IP address. If you need to use one of the following options, enter it after the command and before the IP address. • -p - Specifies the port number where the manager receives traps. The default port 162. • -pw - Specifies the manager’s access password, if the manager has one.
Testing SNMP Managers • To send a test trap to all SNMP managers displayed with the showsnmpmgr command, issue the checksnmp command. The CLI displays the IP addresses of the tested mangers. For details about the test trap sent by the checksnmp command, see the HP 3PAR InForm OS Command Line Interface Reference and InForm OS CLI Help. Creating SNMPv3 Users To create SNMPv3 users you must have Super role user rights, or any role granted the snmpuser_create right.
15 Using mySnapshot Overview This chapter describes how to use the mySnapshot utility. The mySnapshot utility enables safe and easy copy and provisioning access to non-storage professionals such as DBAs, software developers, and test engineers working with systems. Users can safely and easily restore their own copies of test data in seconds without relying on the storage administrator.
Replacing Virtual Volume Snapshots A user with the appropriate rights set (see “Setting Administrative Rights” (page 141)) can use the updatevv command to replace a copy of a test database. CAUTION: It may be necessary to unmount the filesystem(s) on the host before replacing snapshots with mySnapshot. In replacing snapshots, the system automatically removes volume exports. Some hosts may not react gracefully when volume exports are unexpectedly removed.
• testuser1 is a user with updatevv rights for volume test.rw1 See “Setting Administrative Rights” (page 141) for instructions on setting rights for replacing a read-write snapshots. • When test.rw1 needs to be restored, testuser1 unmounts the filesystem on the host and then issues the following InForm OS CLI command to replace test copy test.rw1 with a new copy: cli% updatevv test.rw1 This command removes test.rw1 and replaces it with a new snapshot of test.ro1. This new volume is also called test.rw1.
16 Performance Tuning Analyzing and Tuning a System The tunesys command analyzes your entire system and automatically corrects space usage imbalances in the system. Virtual volume and physical disk capacity are analyzed and rebalanced for optimal performance. Access to the virtual volumes is not interrupted during the system tuning operations.
NOTE: You must have an HP 3PAR Dynamic Optimization Software license to use the tunesys command. NOTE: Running the tunesys command does not eliminate the need to run the tunepd command. The tunesys command performs space based balancing. The tunepd command performs service time and I/O based balancing. NOTE: The tunesys command verifies that logical disks associated with a CPG have the same characteristics as the CPG.
2. Change the layout of the volume by issuing the tunevv usr_cpg command, where: • usr_cpg is the name of the CPG created previously in Step 1, indicating the user space of the new CPG will be used. • is the volume you are modifying. • is the volume you are modifying.
2. Change the TPVV’s RAID type by issuing the tunevv usr_cpg command, where: • usr_cpg is the name of the CPG created previously in Step 1. • is the TPVV whose RAID type you are changing. Fully-Provisioned Virtual Volumes To change the RAID type of a fully-provisioned virtual volume, perform the following: 1. Create a new CPG with the RAID type to which you wish to change the volume. See “Creating a Common Provisioning Group” (page 83) for instructions. 2.
Changing Virtual Volume Parameters Thinly-Provisioned Virtual Volumes To change the parameters of a TPVV, perform the following: 1. Create a new CPG with the parameters you wish to apply to the volume. See “Creating a Common Provisioning Group” (page 83) for instructions. 2. Issue the tunevv usr_cpg command, where: • usr_cpg is the name of the CPG created previously in Step 1. • is the TPVV you are modifying.
Restarting a Volume Modification Task Restarting a tunevv task restarts a task that was previously interrupted. You may choose to restart a tunevv task if the operation was interrupted because of: • User-initiated cancellation of a task. • Component failure. • To restart a tunevv task, issue the tunevv restart command.
Compacting Logical Disks Reclaim unused Logical Disk (LD) space with the compactcpg command. When multiple identical virtual volumes are created as a result of a single volume creation operation, the underlying logical disks that support those volumes are shared by the volume group. If several of the members of that volume group are later deleted, the underlying logical disks may become less efficient in the usage of space.
A Mapping Roles and Rights In this appendix • “3PAR AO Role” (page 151) • “3PAR RM Role” (page 151) • “Basic Edit Role” (page 152) • “Browse Role” (page 154) • “Create Role” (page 154) • “Edit Role” (page 155) • “Service Role” (page 157) • “Super Role” (page 158) 3PAR AO Role Table 13 3PAR AO Rights Right Description of Right cpg_compact Consolidate space in a Common Provisioning Group. password_checkown Check a user's own password. password_setown Set a user's own password.
Table 14 3PAR RM Rights (continued) Right Description of Right sshkey_remove Remove users public SSH keys. sshkey_set Set the public SSH key for a user. sv_create Create a virtual copy volume. sv_promote Promote a virtual copy volume. sv_remove Remove virtual copy of a volume. sv_set Set properties of a virtual copy of a volume. task_start Run commands in the background. user_setown Set a user's own properties. vlun_create Export a virtual volume as a SCSI LUN.
Table 15 Edit Rights (continued) Right Description of Right password_setown Set a user's own password. rcopy_start Start the remote copy service. rcopy_stop Stop the remote copy service. rcopy_sync Synchronize remote copy groups. rcopygroup_create Create a remote copy group. rcopygroup_remove Remove a remote copy group. rcopygroup_set Set remote copy group properties. rcopygroup_start Start remote copy group. rcopygroup_stop Stop a remote copy group.
Table 15 Edit Rights (continued) Right Description of Right vvset_create Create a virtual volume set. vvset_set Set virtual volume set properties. Browse Role Table 16 Browse Rights Right Description of Right password_checkown Check a user's own password. password_setown Set a user's own password. sshkey_remove Remove users public SSH keys. sshkey_set Set the public SSH key for a user. user_setown Set a user's own properties.
Edit Role Table 18 Edit Rights Right Description of Right ch_move Move chunklets from one physical disk to another. ch_movetospare Move chunklets from a physical disk to spare space. cpg_compact Consolidate space in a Common Provisioning Group. cpg_create Create Common Provision Group. cpg_set Set Common Provision Group properties. domain_moveto Move objects in or out of a domain. domainset_annotate Annotate the comment of a domain set. domainset_create Create a domain set.
Table 18 Edit Rights (continued) 156 Right Description of Right rcopytarget_create Create a remote copy target. rcopytarget_dismiss Dismiss a remote copy target from a group. rcopytarget_remove Remove a remote copy target. rcopytarget_set Set remote copy target properties. rcopyvv_admit Add a volume to a remote copy volume group. rcopyvv_dismiss Dismiss a virtual volume from a remote copy group. reg_move Move virtual volume regions between logical disks.
Service Role Table 19 Service Rights Right Description of Right alert_remove Remove alerts. alert_set Set alert properties. battery_set Set battery properties. cage_locate Locate a drive cage. cage_set Set cage properties. cage_upgrade Upgrade cage firmware. ch_move Move chunklets from one physical disk to another. ch_movetospare Move chunklets from a physical disk to spare space. cim_set Set CIM server properties. cim_start Starts the CIM server.
Table 19 Service Rights (continued) Right Description of Right sched_setany Set any user scheduled task properties. sched_setown Set a user's own scheduled task properties. spare_create Create spare chunklet. sshkey_remove Remove users public SSH keys. sshkey_set Set the public SSH key for a user. sys_locate Locate a system by blinking its LEDs. sys_set Set System Properties. sys_shutdown Shutdown the system. task_start Run commands in the background.
Table 20 Super Rights (continued) Right Description of Right domainset_set Set domain set properties. groupsv_create Create a virtual volume group. groupvvcopy_create Create a physical copy volume group. health_check Check the current health of the system. host_create Create a host. host_remove Remove a host. host_service Service a host. host_set Set host properties. hostset_annotate Annotate the comment of a host set. hostset_create Create paths to a system host set.
Table 20 Super Rights (continued) Right Description of Right rcopy_stop Stop the remote copy service. rcopy_sync Synchronize remote copy groups. rcopygroup_create Create a remote copy group. rcopygroup_remove Remove a remote copy group. rcopygroup_set Set remote copy group properties. rcopygroup_start Start remote copy group. rcopygroup_stop Stop a remote copy group. rcopylink_admit Add remote copy links. rcopylink_dismiss Dismiss remote copy links.
Table 20 Super Rights (continued) Right Description of Right task_cancel Cancel a task. task_remove Remove a task. task_set Edit tasks. task_start Run commands in the background. template_create Create a template for a VV, CPG, or LD. template_remove Remove template for a VV, CPG, or LD. template_set Set template properties. user_create Create a user. user_remove Remove a user. user_setany Set any user properties. user_setown Set a user's own properties.
B Mapping Rights and CLI Commands In this appendix • “Mapping Rights and CLI Commands” (page 162) Mapping Rights and CLI Commands Table 21 Required Rights for CLI Commands 162 Right CLI Commands alert_remove removealert alert_set setalert authparam_set setauthparam battery_set setbattery cage_locate locatecage cage_set setcage cage_upgrade upgradecage ch_move movech ch_movetospare movechtospare cim_set setcim cim_start startcim cpg_compact compactcpg cpg_create createcpg cpg_
Table 21 Required Rights for CLI Commands (continued) Right CLI Commands hostset_create createhostset hostset_set sethostset, removehostset ld_compact compactld ld_create createald createld ld_remove removeld ld_start startld mag_control controlmag mag_service servicemag node_locate locatenode node_service servicenode node_set setnode node_shutdown shutdownnode password_checkany checkpassword password_checkown checkpassword password_setany setpassword password_setown setpass
Table 21 Required Rights for CLI Commands (continued) Right CLI Commands rcopytarget_admit admitrcopytarget rcopytarget_create creatercopytarget rcopytarget_dismiss dismissrcopytarget rcopytarget_remove removercopytarget rcopytarget_set setrcopytarget rcopyvv_admit admitrcopyvv rcopyvv_dismiss dismissrcopyvv reg_move movereg sched_create createsched sched_remove removesched sched_setany setsched sched_setown setsched snapspace_update updatesnapspace snmpmgr_add addsnmpmgr snmpm
Table 21 Required Rights for CLI Commands (continued) Right CLI Commands user_setany setuser user_setown setuser useracl_set setuseracl userconn_remove removeuserconn vlun_create createvlun vlun_remove removevlun vv_admit admitvv vv_check checkvv vv_create createaldvv createavv createtpvv createvv vv_grow growaldvv growavv growtpvv growvv vv_import importvv vv_remove removevv vv_set setvv vv_start startvv vv_tune tunealdvv tunevv tunetpvv vv_update updatevv vvcopy_create c
A accessing the CLI, 58 Active Directory LDAP configuration using simple binding over SSL, 32 active VLUNs, 93 adding and replacing template parameters, 109 adding users to domains, 24 addsnmpmgr command, 139 advisories, conventions, 15 agents passwords, commands for, 139 registering with addsnmpmgr command, 139 alerts removing, 115 setting states, 115 triggered by events, 115 viewing, 115 when spare and free chunklets are used up, 113 applying templates, 107 assigning host paths, 70 audience for this guide
F Fibre Channel adapter ports setting parameters, 67 creating a host path, 71 free chunklets, defined, 113 freeing domain VV space, 98 freeing virtual volume snapshot space, 91 freespace command, 91 Full Copy resynchronizing physical copies, 104 G generating a key pair, 59 Global option referencing stored passwords, 51 Global options in effect until, 46 with individual commands, 46 growing domain VVs, 98 growing virtual volumes, 88 growth increment considerations, 81 H Help displaying CLI information, 56
removing domain objects, 64 removing tasks, 127 removing template parameters, 109 removing templates, 109 removing the default domain, 25 removing VLUN templates, 94 replacing and restoring copies, 141 replacing read-only snapshots, 142 replacing snapshots, 142 reserved user names, 57 resynchronizing physical copies, 104 rolling back a virtual copy, 101 S scripting, 19 scripting with SSH, 59 service support level for ports, setting, 68 setcpg command, 83 sethost command, 72 setpassword for storing password
virtual volumes exporting, 93 growing, 88 resynchronizing physical copy, 104 snapshot space, 91 unexporting, 94 VLUN histograms, viewing, 122 VLUN template host sees, 93 matched set, 93 port presents, 93 removing, 94 types, 93 169