HP X1000 and X3000 Network Storage System User Guide SWX image version 1.6.
Legal and notice information © Copyright 2010, 2010 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice.
Contents 1 Installing and configuring the storage system ....................................... 13 Setup overview ......................................................................................................................... Determine an access method ............................................................................................... Check kit contents .....................................................................................................................
Physical storage elements .................................................................................................... Arrays ........................................................................................................................ Fault tolerance ............................................................................................................. Online spares .............................................................................................................
Managing shadow copies from the storage system desktop ..................................................... Shadow Copies for Shared Folders ....................................................................................... SMB shadow copies .................................................................................................... NFS shadow copies ..................................................................................................... Recovery of files or folders ..............
Renaming the local area connection icons ...................................................................... 96 Verifying connectivity and name resolution ...................................................................... 96 Verifying domain membership ....................................................................................... 96 Setting up a cluster account .......................................................................................... 96 About the Quorum disk ................
Managing disks after a restoration ............................................................................................ 114 9 Support and other resources ............................................................ 115 Contacting HP ........................................................................................................................ Subscription service ..........................................................................................................
Hungarian recycling notice ................................................................................................ Italian recycling notice ...................................................................................................... Latvian recycling notice ..................................................................................................... Lithuanian recycling notice .................................................................................................
Figures 1 HP X1400 and X3400 front panel components .......................................................... 23 2 HP X1400 and X3400 front panel LEDs ..................................................................... 24 3 HP X1400 and X3400 rear panel components ........................................................... 24 4 HP X1400 and X3400 rear panel LEDs ..................................................................... 25 5 HP X1500 front panel components .....................................
32 Select User or Group dialog box ............................................................................... 80 33 Auditing Entry dialog box for folder name NTFS Test ................................................... 81 34 Advanced Security Settings dialog box, Owner tab ..................................................... 82 35 Storage system cluster diagram ................................................................................. 88 36 Cluster concepts diagram ............................
Tables 1 HP Configuration Assistant options ............................................................................ 17 2 Storage system RAID configurations ........................................................................... 20 3 HP X1400 and X3400 front panel LED descriptions ..................................................... 24 4 HP X1400 and X3400 rear panel LED descriptions ..................................................... 25 5 HP X1500 front panel LEDs and buttons descriptions ......
1 Installing and configuring the storage system Setup overview The HP StorageWorks X1000 Network Storage System comes preinstalled with the Microsoft Windows® Storage Server™ 2008 Standard x64 Edition operating system with Microsoft iSCSI Software Target and HP Automated Storage Manager (HP ASM) included.
Check kit contents Remove the contents, making sure you have all the components listed below. If components are missing, contact HP technical support.
IMPORTANT: Only the direct attach and remote management access methods can be used to install the storage system. After the storage system installation process is complete and the system's IP address has been assigned, you can then additionally use the remote browser and remote desktop methods to access the storage system. • Direct attach — Connect a monitor, keyboard, and mouse directly to the storage system.
1. Power on the system by pushing the power button on the front panel. If using iLO 2, click Momentary Press on the Power Management page to power on the server, then click Launch on the Status Summary page to open the iLO 2 Integrated Remote Console and complete the installation process. The storage system starts and displays an HP Network Storage System installation screen. The storage system installation process takes approximately 10–15 minutes.
The HP Configuration Assistant guides you through configuring system settings with the following options: Table 1 HP Configuration Assistant options HP Configuration Assistant Section Configuration settings Provide Computer Information Set time zone, Configure networking, Provide computer name and domain Update This Server Enable automatic updating and feedback, Download and install updates Customize This Server Add roles, Add features, Enable Remote Desktop, Configure Windows Firewall Configure HP
Additional access methods After the storage system installation process is complete and the system's IP address has been assigned, you can then additionally use the remote browser, Remote Desktop, and Telnet methods to access the storage system. Using the remote browser method The storage system ships with DHCP enabled on the network port. If the server is placed on a DHCP-enabled network and the IP address or server name is known, the server can be accessed through a client running Internet Explorer 5.
allows only two concurrent sessions. Leaving a session running takes up one license and can affect other users. If two sessions are running, additional users will be denied access. To connect the storage system to a network using the Remote Desktop method 1. On the PC client, select Start > Run. At Open, type mstsc, then click OK. 2. Enter the IP address of the storage system in the Computer box and click Connect. 3. Log on to the storage system with the administrator user name and password.
If the Operating System volume is customized and the System Recovery DVD is run at a later time, the System Recovery process will maintain the custom settings as long as the above criteria are met (RAID level other than RAID 0 and OS logical drive size of 60 GB or higher) and the OS volume is labeled System. If the storage system arrays are deleted and the System Recovery DVD is run, the System Recovery process will configure the storage system using the factory default settings listed in the table below.
Server model Logical Disk 1 • Operating System Volume HP StorageWorks X3800 Network Storage Gateway (all models) • RAID 1+0 • Physical Drives 0–1 NOTE: In the HP Array Configuration Utility (ACU), logical disks are labeled 1 and 2. In Microsoft Disk Manager, logical disks are displayed as 0 and 1. For HP Smart Array configuration information, see http://h18004.www1.hp.com/products/servers/proliantstorage/arraycontrollers/.
Installing and configuring the storage system
2 Storage system component identification This chapter provides illustrations of the storage system hardware components. NOTE: The keyboard, mouse, and monitor are used only for the direct attached method of accessing the server. They are not provided with your storage system.
Figure 2 HP X1400 and X3400 front panel LEDs . Table 3 HP X1400 and X3400 front panel LED descriptions Item / Description Status Green = System health is normal. 1. Internal health LED Amber = System health is degraded. Red = System health is critical. Off = System health is normal (when in standby mode). 2. NIC 1 link/activity LED 3. NIC 2 link/activity LED 4. Drive activity LED Green = Network link exists. Flashing green = Network link and activity exist. Off = No network link exists.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. Power cord connector Mouse connector 10/100/1000 NIC 1 connector/shared iLO 2 management port 10/100/1000 NIC 2 connector Serial connector Low profile PCIe slot cover (x16 slot open) Full-sized PCIe slot (occupied by Smart Array P212 controller) Dedicated iLO 2 management port (this port is optional and must be purchased separately) Video connector USB connectors (2) Keyboard connector Figure 4 HP X1400 and X3400 rear panel LEDs .
Figure 5 HP X1500 front panel components . 1. 2. 3. 4. 5. Optical drive USB connectors (2) Standard hard drive bays (4) Expansion hard drive bays (4) Media bays (2) Figure 6 HP X1500 front panel LEDs and buttons . Table 5 HP X1500 front panel LEDs and buttons descriptions Item Description 1 System health LED 26 Storage system component identification Status Green = System health is normal. Amber = System health is degraded.
Item Description 2 NIC 1 link/activity LED Status Green or flashing green = Activity exists. Off = No activity exists. If power is off, view the LEDs on the RJ-45 connector. Green or flashing green = Activity exists. 3 Off = No activity exists. NIC 2 link/activity LED If power is off, view the LEDs on the RJ-45 connector. Green = Drive activity is normal. 4 Drive activity LED 5 Power On/Stand by button and system power LED Off = No drive activity exists. Green = Power is on.
Figure 8 HP X1500 rear panel components . 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16.
Figure 9 HP X1500 rear panel LEDs and buttons . Table 6 HP X1500 rear panel LEDs and buttons descriptions Item Description Status Blue = Activated 1 UID button/LED Flashing = System is being managed remotely. Off = Deactivated 2 NIC/iLO 2 activity 3 NIC/iLO 2 link Green or flashing green = Activity exists. Off = No activity exists. Green = Link exists. Off = No link exists.
Figure 10 HP X1600 front panel components and LEDs . Table 7 HP X1600 front panel component and LED descriptions Item / Description Status 1 — 12. Twelve (12) 3.5” (LFF) hot plug SATA / SAS hard drive bays (25 bays for SFF models) See “SAS and SATA hard drive LED combinations” on page 35 for HDD LED status descriptions. 13. Front USB ports (2) N/A Green = Normal (system on) 14.
Figure 11 HP X1600 rear panel components . Some X1600 Network Storage System models include two 2.5” Small Form Factor (SFF) SAS / SATA hot plug hard drives in the rear of the unit that are configured for the operating system. This allows for the use of up to twelve hard drives on the front of the unit to be configured for storage. Other HP X1600 Network Storage System models do not include rear hot plug hard drives. See the HP X1600 Network Storage System QuickSpecs for more information. Go to http://www.
Figure 12 HP X1800 and X3800 front panel components . 1. 2. Quick release levers (2) Systems Insight Display NOTE: See “Systems Insight Display LEDs” on page 36 and “Systems Insight Display LED combinations” on page 38 for LED status information. 3. Eight (8) 2.5” SFF SAS / SATA hot plug hard drive bays (X3800 models) All X1800 models include sixteen (16) 2.5” SFF SAS / SATA hot plug hard drive bays NOTE: See “SAS and SATA hard drive LED combinations” on page 35 for HDD LED status descriptions. 4. 5.
Figure 13 HP X1800 and X3800 front panel LEDs and buttons . Table 8 HP X1800 and X3800 front panel LED and button descriptions Item / Description Status Blue = Activated 1. UID LED and button Flashing blue = System being remotely managed Off = Deactivated Green = Normal 2. System health LED Amber = System degraded Red = System critical To identify components in degraded or critical state, see 3.
2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. PCIe slot 6 PCIe slot 4 PCIe slot 2 PCIe slot 3 PCIe slot 1 (occupied by Smart Array controller with external SAS ports for expandability) Power supply 2 (standard) Power supply 1 (standard) USB connectors (2) Video connector NIC 1 connector NIC 2 connector Mouse connector Keyboard connector Serial connector iLO 2 connector NIC 3 connector 18. NIC 4 connector Figure 15 HP X1800 and X3800 rear panel LEDs and buttons .
Item / Description Status Green = Network activity Flashing green = Network activity 3. NIC/iLO 2 activity LED Off = No network activity Green = Network link 4. NIC/iLO 2 link LED Off = No network link SAS and SATA hard drive LEDs The following figure shows SAS/SATA hard drive LEDs. These LEDs are located on all HP ProLiant hot plug hard drives. Figure 16 SAS/SATA hard drive LEDs . Table 10 SAS and SATA hard drive LED combinations 1. Fault/UID LED (amber/blue) 2.
1. Fault/UID LED (amber/blue) 2. Online/activity LED (green) Status Flashing regularly (1 Hz) Do not remove the drive. Removing a drive may terminate the current operation and cause data loss. The drive is part of an array that is undergoing capacity expansion or stripe migration, but a predictive failure alert has been received for this drive. To minimize the risk of data loss, do not replace the drive until the expansion or migration is complete.
Figure 17 Systems Insight Display LEDs . Table 11 Systems Insight Display LED descriptions Item / Description Status Green = Network link Flashing green = Network link and activity 1. NIC link/activity LED 2. Power cap Off = No link to network. If the power is off, view the rear panel RJ-45 LEDs for status (see “HP X1800 Network Storage System and X3800 Network Storage Gateway rear panel LEDs and buttons” on page 34).
Systems Insight Display LED combinations When the internal health LED on the front panel illuminates either amber or red, the server is experiencing a health event. Combinations of illuminated system LEDs and the internal health LED indicate system status. Table 12 Systems Insight Display LEDs and internal health LED combinations Systems Insight Display LED and color Internal health LED color Status One or more of the following conditions may exist: • Processor in socket X has failed.
Systems Insight Display LED and color Overtemperature (amber) Riser interlock (amber) Internal health LED color Status Amber The Health Driver has detected a cautionary temperature level. Red The server has detected a hardware critical temperature level. Red PCI riser cage is not seated. Amber One fan has failed or is removed. Red Two or more fans have failed or are removed.
Storage system component identification
3 Administration tools HP StorageWorks X1000 and X3000 Network Storage Systems include several administration tools to simplify storage system management tasks. HP StorageWorks X1000 Network Storage Systems include the HP Automated Storage Manager (ASM) in addition to HP storage utilities and Microsoft® Windows® Storage Server 2008 administration tools.
Remote Desktop for Administration does not require the purchase of special licenses for client computers that access the server. It is not necessary to install Terminal Server Licensing when using Remote Desktop for Administration. You can use Remote Desktop for Administration to log on to the server remotely with any of the following features: • Remote Desktop Connection • Remote Web Administration • Windows Server Remote Administration Applet For more information, see the Windows Storage Server 2008 Help.
services domain, you can use Active Directory Application Mode and Active Directory Lightweight Data Services; both of these services are installed in your system at the factory. Microsoft Services for NFS can also use any RFC 2307 compliant Lightweight Directory Access Protocol (LDAP) service or an existing Windows Server 2003R2 User Name Mapping server to provide username mapping services. For more information, see the Windows Storage Server 2008 Help.
Script execution You can configure ADLDS by executing the nfs-adam-config.js script that is located in the c:\hpnas\components\ADLDS directory. Executing the script with no command line options will display a help dialog. The following is a typical command line: nfs-adam-config.
SIS consists of two primary components that together maintain a database of file signatures. These components include: • Groveler service - The Groveler service scans the hard-disk volumes on a server for duplicate copies of files. If the service locates duplicate copies of files, the information about the duplicates is sent to the Single Instance Storage Filter. The Groveler service runs as a user-level service.
Print Management provides details such as the queue status, printer name, driver name, and server name. You can also set custom views by using the Print Management filtering capability. For example, you can create a view that displays only printers in a particular error state. You can also configure Print Management to send e-mail notifications or run scripts when a printer or print server needs attention.
4 Storage management overview This chapter provides an overview of some of the components that make up the storage structure of the storage system. Storage management elements Storage is divided into four major divisions: • Physical storage elements • Logical storage elements • File system elements • File sharing elements Each of these elements is composed of the previous level's elements. Storage management example Figure 18 depicts many of the storage elements that one would find on a storage device.
Figure 18 Storage management process example . Physical storage elements The lowest level of storage management occurs at the physical drive level. Minimally, choosing the best disk carving strategy includes the following policies: • Analyze current corporate and departmental structure. • Analyze the current file server structure and environment. • Plan properly to ensure the best configuration and use of storage. • Determine the desired priority of fault tolerance, performance, and storage capacity.
• Include the appropriate number of physical drives in the arrays to create logical storage elements of desired sizes. Arrays See Figure 19. With an array controller installed in the system, the capacity of several physical drives (P1–P3) can be logically combined into one or more logical units (L1) called arrays. When this is done, the read/write heads of all the constituent physical drives are active simultaneously, dramatically reducing the overall time required for data transfer.
Fault tolerance Drive failure, although rare, is potentially catastrophic. For example, using simple striping as shown in Figure 20, failure of any hard drive leads to failure of all logical drives in the same array, and hence to data loss. To protect against data loss from hard drive failure, storage systems should be configured with fault tolerance. HP recommends adhering to RAID 5 configurations.
It is important to note that a LUN may span all physical drives within a storage controller subsystem, but cannot span multiple storage controller subsystems. Figure 21 Two arrays (A1, A2) and five logical drives (L1 through L5) spread over five physical drives . NOTE: This type of configuration may not apply to all storage systems and serves only as an example. Through the use of basic disks, you can create primary partitions or extended partitions. Partitions can only encompass one LUN.
dynamic disks is unavailable. There could be a potential for data loss depending on the nature of the failed LUN. Volumes are created out of the dynamic disks, and can be expanded on the fly to extend over multiple dynamic disks if they are spanned volumes. However, after a type of volume is selected, it cannot be altered. For example, a spanning volume cannot be altered to a mirrored volume without deleting and recreating the volume, unless it is a simple volume.
Shadow copies should not replace the current backup, archive, or business recovery system, but they can help to simplify restore procedures. For example, shadow copies cannot protect against data loss due to media failures; however, recovering data from shadow copies can reduce the number of times needed to restore data from tape. Using storage elements The last step in creating the element is determining its drive letter or mount point and formatting the element.
For additional information, refer to the Management CD in the HP ProLiant Essentials Foundation Pack or the HP SIM website (http://www.hp.com/go/hpsim). Management Agents Management Agents provide the information to enable fault, performance, and configuration management. The agents allow easy manageability of the server through HP SIM software, and thirdparty SNMP management platforms. Management Agents are installed with every SmartStart assisted installation or can be installed through the HP PSP.
5 File server management This chapter begins by identifying file services in Windows Storage Server 2008. The remainder of the chapter describes the many tasks and utilities that play a role in file server management. File services features in Windows Storage Server 2008 Storage Manager for SANs The Storage Manager for SANs (also called Simple SAN) snap-in enables you to create and manage the LUNs that are used to allocate space on storage arrays.
File services management Information about the storage system in a SAN environment is provided in the HP StorageWorks SAN Manuals page located on the HP web site at www.hp.com/go/SDGManuals. Configuring data storage HP StorageWorks X1000 and X3000 Network Storage Systems are configured only for the operating system. The administrator must configure data storage for the storage system. Configuring additional data storage involves creating arrays, logical disks, and volumes.
Array management utilities Storage devices for RAID arrays and LUNs are created and managed using the array management utilities mentioned previously. For HP Smart Arrays use the ACU. NOTE: The ACU is used to configure and manage array-based storage. Software RAID-based storage systems use Microsoft Disk Manager to manage storage. You need administrator or root privileges to run the ACU.
• A single array can contain multiple logical drives of varying RAID settings. • Extending and expanding arrays and logical drives is supported. The HP Array Configuration Utility User Guide is available for download at http://www.hp.com/ support/manuals. Disk Management utility The Disk Management tool is a system utility for managing hard disks and the volumes, or partitions, that they contain.
Scheduling defragmentation Defragmentation is the process of analyzing local volumes and consolidating fragmented files and folders so that each occupies a single, contiguous space on the volume. This improves file system performance. Because defragmentation consolidates files and folders, it also consolidates the free space on a volume. This reduces the likelihood that new files will be fragmented. Defragmentation for a volume can be scheduled to occur automatically at convenient times.
per-user basis. It is also possible to specify whether or not to log an event when users exceed either their quota warning level or their quota limit. When enabling disk quotas for a volume, volume usage is automatically tracked from that point forward, but existing volume users have no disk quotas applied to them. Apply disk quotas to existing volume users by adding new quota entries on the Quota Entries page.
Extending storage using Windows Storage Utilities Volume extension grows the storage space of a logical drive. During this process, the administrator adds new storage space to an existing logical drive on the same array, usually after the array has been expanded. An administrator may have gained this new storage space by either expansion or by deleting another logical drive on the same array. Unlike drive expansion, the operating system must be aware of changes to the logical drive size.
Expand logical drive This option in the ACU increases the storage capacity of a logical drive by adding unused space on an array to the logical drive on the same array. The unused space is obtained either by expanding an array or by deleting another logical drive on the same array.
• How frequently will shadow copies be made? Identifying the volume Shadow copies are taken for a complete volume, but not for a specific directory. Shadow copies work best when the server stores user files, such as documents, spreadsheets, presentations, graphics, or database files. NOTE: Shadow copies should not be used to provide access to previous versions of application or e-mail databases.
NOTE: Regardless of the volume space that is allocated for shadow copies, there is a maximum of 64 shadow copies for any volume. When the 65th shadow copy is taken, the oldest shadow copy is purged. The minimum amount of storage space that can be specified is 350 megabytes (MB). The default storage size is 10 percent of the source volume (the volume being copied).
Shadow copies and drive defragmentation When running Disk Defragmenter on a volume with shadow copies activated, all or some of the shadow copies may be lost, starting with the oldest shadow copies. If defragmenting volumes on which shadow copies are enabled, use a cluster (or allocation unit) size of 16 KB or larger. Using this allocation unit size reduces the number of copy outs occurring on the snapshot.
Figure 22 System administrator view of Shadow Copies for Shared Folders . The shadow copy cache file The default shadow copy settings allocate 10 percent of the source volume being copied (with a minimum of 350 MB), and store the shadow copies on the same volume as the original volume. (See Figure 23). The cache file is located in a hidden protected directory titled “System Volume Information” off of the root of each volume for which shadow copy is enabled.
Figure 24 Shadow copies stored on a separate volume . The main advantage to storing shadow copies on a separate volume is ease of management and performance. Shadow copies on a source volume must be continually monitored and can consume space designated for file sharing. Setting the limit too high takes up valuable storage space. Setting the limit too low can cause shadow copies to be purged too soon, or not created at all.
NOTE: After the first shadow copy is created, it cannot be relocated. Relocate the cache file by altering the cache file location under Properties prior to enabling shadow copy. See “Viewing shadow copy properties” on page 68. Viewing a list of shadow copies To view a list of shadow copies on a volume: 1. Access Disk Management. 2. Select the volume or logical drive, then right-click on it. 3. Select Properties. 4. Select Shadow Copies tab.
CAUTION: Use caution when reducing the size limit for all shadow copies. When the size is set to less than the total size currently used for all shadow copies, enough shadow copies are deleted to reduce the total size to the new limit. A shadow copy cannot be recovered after it has been deleted. Redirecting shadow copies to an alternate volume IMPORTANT: Shadow copies must be initially disabled on the volume before redirecting to an alternate volume.
Managing shadow copies from the storage system desktop To access shadow copies from the storage system desktop: The storage system desktop can be accessed by using Remote Desktop to manage shadow copies. 1. On the storage system desktop, double-click My Computer. 2. Right-click the volume name, and select Properties. 3. Click the Shadow Copies tab. See Figure 25. Figure 25 Accessing shadow copies from My Computer .
NOTE: Shadow Copies for Shared Folders clients are not available for HTTP, FTP, AppleTalk, or NetWare shares. Consequently, users of these protocols cannot use Shadow Copies for Shared Folders to independently retrieve previous versions of their files. However, administrators can take advantage of Shadow Copies for Shared Folders to restore files for these users.
Figure 26 Client GUI . When users view a network folder hosted on the storage system for which shadow copies are enabled, old versions (prior to the snapshot) of a file or directory are available. Viewing the properties of the file or folder presents users with the folder or file history—a list of read-only, point-in-time copies of the file or folder contents that users can then open and explore like any other file or folder.
.@GMT-2003.04.29-04:00:00 Access to NFS shadow copy pseudo-subdirectories is governed by normal access-control mechanisms using the permissions stored in the file system. Users can access only those shadow copies to which they have read access at the time the shadow copy is taken. To prevent users from modifying shadow copies, all pseudo-subdirectories are marked read-only, regardless of the user's ownership or access rights, or the permissions set on the original files.
Figure 27 Recovering a deleted file or folder . Recovering an overwritten or corrupted file Recovering an overwritten or corrupted file is easier than recovering a deleted file because the file itself can be right-clicked instead of the folder. To recover an overwritten or corrupted file: 1. Right-click the overwritten or corrupted file, and then click Properties. 2. Click Previous Versions. 3. To view the old version, click View. To copy the old version to another location, click Copy...
Backup and shadow copies Shadow copies are only available on the network via the client application, and only at a file or folder level as opposed to the entire volume. Hence, the standard backup associated with a volume backup will not work to back up the previous versions of the file system. To answer this particular issue, shadow copies are available for backup in two situations.
NOTE: Select servers can be deployed in a clustered or non-clustered configuration. This section discusses share setup for a non-clustered deployment. Folder management Volumes and folders on any system are used to organize data. Regardless of system size, systematic structuring and naming conventions of volumes and folders eases the administrative burden.
2. Click Properties, and then click the Security tab. Figure 28 Properties dialog box, Security tab . Several options are available on the Security tab: • To add users and groups to the permissions list, click Add. Follow the dialog box instructions. • To remove users and groups from the permissions list, highlight the desired user or group, and then click Remove. • The center section of the Security tab lists permission levels.
3. To modify ownership of files, or to modify individual file access level permissions, click Advanced. Figure 29 illustrates the properties available on the Advanced Security Settings dialog box. Figure 29 Advanced Security settings dialog box, Permissions tab . Other functionality available in the Advanced Security Settings dialog box is illustrated in Figure 29 and includes: • Add a new user or group—Click Add, and then follow the dialog box instructions. • Remove a user or group— Click Remove.
4. Enable or disable permissions by selecting the Allow box to enable permission or the Deny box to disable permission. If neither box is selected, permission is automatically disabled. Figure 30 illustrates the Edit screen and some of the permissions. Figure 30 User or group Permission Entry dialog box . Another area of the Advanced Security Settings is the Auditing tab. Auditing allows you to set rules for the auditing of access, or attempted access, to files or folders.
Figure 31 Advanced Security Settings dialog box, Auditing tab . 5. Click Add to display the Select User or Group dialog box. Figure 32 Select User or Group dialog box . NOTE: Click Advanced to search for users or groups. 6. 80 Select the user or group.
7. Click OK. The Auditing Entry dialog box is displayed. Figure 33 Auditing Entry dialog box for folder name NTFS Test . 8. Select the desired Successful and Failed audits for the user or group. 9. Click OK. NOTE: Auditing must be enabled to configure this information. Use the local Computer Policy Editor to configure the audit policy on the storage system. The Owner tab allows taking ownership of files.
Figure 34 Advanced Security Settings dialog box, Owner tab . The current owner of the file or folder is listed at the top of the screen. To take ownership: 1. Click the appropriate user or group in the Change owner to list. 2. If it is also necessary to take ownership of subfolders and files, enable the Replace owner on subcontainers and objects box. 3. Click OK. Share management There are several ways to set up and manage shares.
The content of shares should be carefully chosen to avoid two common pitfalls: either having too many shares of a very specific nature, or of having very few shares of a generic nature. For example, shares for general use are easier to set up in the beginning, but can cause problems later. Frequently, a better approach is to create separate shares with a specific purpose or group of users in mind. However, creating too many shares also has its drawbacks.
• Standard shares are shares that do not end in a $ character. Standard shares are listed whenever a CIFS client browses for available shares on a CIFS server. The storage system supports both administrative and standard CIFS shares. To create an administrative share, end the share name with the $ character when setting up the share. Do not type a $ character at the end of the share name when creating a standard share. Managing shares Shares can be managed using Server Manager.
File screening management On the File Screening Management node of the File Server Resource Manager snap-in, you can perform the following tasks: • Create file screens to control the types of files that users can save and to send notifications when users attempt to save blocked files. • Define file screening templates that can be easily applied to new volumes or folders and that can be used across an organization. • Create file screening exceptions that extend the flexibility of the file screening rules.
For more information, and to download the utility, see the StorageWorks L&TT web site at http:// h18006.www1.hp.com/products/storageworks/ltt. Antivirus The server should be secured by installing the appropriate antivirus software.
6 Cluster administration HP StorageWorks X3000 Network Storage Systems support clustering; HP StorageWorks X1000 Network Storage Systems do not. One important feature of HP StorageWorks X3000 Network Storage System models is that they can operate as a single node or as a cluster. This chapter discusses cluster installation and cluster management issues.
Figure 35 Storage system cluster diagram . Cluster terms and components Nodes The most basic parts of a cluster are the servers, referred to as nodes. A server node is any individual server in a cluster, or a member of the cluster. Resources Hardware and software components that are managed by the cluster service are called cluster resources. Cluster resources have three defining characteristics: • They can be brought online and taken offline. • They can be managed in a cluster.
• • • • CIFS file share resources NFS file share resources FTP file share resources iSCSI resources Cluster groups Cluster resources are placed together in cluster groups. Groups are the basic unit of failover between nodes. Resources do not fail over individually; they fail over with the group in which they are contained. Virtual servers A virtual server is a cluster group that consists of a static IP Address resource and a Network Name resource. Several virtual servers can be created.
• Storing the most current version of the cluster database • Guaranteeing that only one set of active communicating nodes is allowed to operate as a cluster Cluster concepts Figure 36 illustrates a typical cluster configuration with the corresponding storage elements. The diagram progresses from the physical disks to the file shares, showing the relationship between both the cluster elements and the physical devices underlying them.
3. Physical Disk resources are created for each basic disk inside Failover Cluster Management. 4. Directories and folders are created on assigned drives. 5. Cluster components (virtual servers, file shares) are created, organized in groups, and placed within the folders using Failover Cluster Management exclusively. Hierarchy of cluster resource components Figure 36 depicts the cluster resource hierarchy as follows: • Physical Disk resources are placed in a cluster group and relate to the basic disk.
• Storage planning • Network planning • Protocol planning Storage planning For clustering, a basic disk must be designated for the cluster and configured as the Quorum disk. Additional basic disks are presented to each cluster node for data storage as physical disk resources. The physical disk resources are required for the basic disks to successfully work in a cluster environment, protecting it from simultaneous access from each node.
• The private cluster interconnect or “heartbeat” crossover cable connects to one of the network ports on each cluster node. In more than two node deployments, a private VLAN on a switch or hub is required for the cluster interconnect. • The public client network subnet connects to the remaining network ports on each cluster node. The cluster node names and virtual server names have IP addresses residing on these subnets.
Before beginning installation Confirm that the following specifications have been met before proceeding: • The Quorum disk has been created from shared storage and is at least 50 MB. (500 MB is recommended.) Additional LUNs may also be presented for use as shared disk resources. • Cluster configurations should be deployed with dual data paths for high availability. Dual data paths from each node enable a path failure to occur that does not force the failover of the node.
• All partitions on the disks must be formatted as NTFS. Cluster installation During the installation process, nodes are shut down and rebooted. These steps guarantee that the data on disks that are attached to the shared storage bus is not lost or corrupted. This can happen when multiple nodes try to simultaneously write to the same disk that is not yet protected by the cluster software. Use Table 16 to determine which nodes and storage devices should be presented during each step.
Configuring the public network adapter While the public network adapter's IP address can be automatically obtained if a DHCP server is available, this is not recommended for cluster nodes. HP strongly recommends setting static IP addresses for all network adapters in the cluster, both private and public. If IP addresses are obtained though DHCP, access to cluster nodes could become unavailable if the DHCP server goes down.
Configuring shared disks Use the Windows Disk Management utility to configure additional shared disk resources. Verify that all shared disks are formatted as NTFS and are designated as Basic. Additional shared disk resources are automatically added into the cluster as physical disk resources during the installation of cluster services. Verifying disk access and functionality Write a file to each shared disk resource to verify functionality.
CAUTION: Presenting other LUNs to the non-clustered system could lead to data corruption. Geographically dispersed clusters Cluster nodes can be geographically dispersed to provide an additional layer of fault tolerance. Geographically dispersed clusters are also referred to as stretched clusters. The following rules must be followed with geographically dispersed clusters: • A network connection with latency of 500 milliseconds or less ensures that cluster consistency can be maintained.
Node-based cluster groups Creating only one resource group and one virtual server for each node facilitates group and resource administration. This setup allows administrators to include all file share resources under one group. Clients access all of the resources owned by one node through a virtual server name. In node-based cluster groups, each group has its own network name and IP address. The administrator decides on which node to place each physical disk resource.
4. Assign ownership of the file share resources to the resource groups. a. b. c. Divide ownership of the file share resource between the resource groups, which are in turn distributed between the virtual servers, for effective load balancing. Verify that the physical disk resource for this file share is also included in this group. Verify that the resources are dependent on the virtual servers and physical disk resources from which the file share was created.
Non cluster aware file sharing protocols Services for Macintosh (SFM), File and Print Services for NetWare, HTTP file sharing protocols are not cluster aware and will experience service interruption if installed on a clustered resource during failover events of the resource. Service interruptions will be similar to those experienced during a server outage. Data that has not been saved to disk prior to the outage will experience data loss.
Creating NFS share resources To create an NFS share resource, see “MSNFS administration on a server cluster” on page 102. Shadow copies in a cluster It is recommended that the location of the cache file be placed on a separate disk from the original data. In this case, a physical disk resource for the cache file disk should be created in the same cluster group as the intended Shadow Copy resource and the volume for which snapshots will be enabled.
• • • • • • • • • • • Use the appropriate tool to manage Network File System (NFS) share cluster resources. Avoid conflicting share names. Ensure the availability of audit logs. Move file shares or take them offline before stopping Server for NFS. Take resources offline before modifying. Administer Server for NFS only from computers in a trusted domain. Restart the Server for NFS service after the cluster service restarts. Choose the appropriate sharing mode.
6. To add a printer to the virtual server: a. b. c. d. e. f. g. h. i. j. k. l. Double-click the printers and faxes icon. Right-click the new screen, and then click add printer. A wizard starts. Click create a new port, and then click Next. Enter the IP address of the network printer. Update the Port Name if desired, click Next, and then click Finish. Select the appropriate driver, and then click Next. If presented with a dialog to replace the driver present, click keep the driver, and then click Next.
Restarting one cluster node CAUTION: Restarting a cluster node should be done only after confirming that the other node(s) in the cluster are functioning normally. Adequate warning should be given to users connected to resources of the node being restarted. Attached connections can be viewed through Server Manager on the storage system Desktop using Terminal Services. From Server Manager, select File Sharing > Shared Folders > Sessions.
Powering up the cluster The power up process for the storage system cluster is more complex than it is for a single node because extra care must be taken with the storage subsystem. The sequence of the power up steps is critical. Improper power up procedures can cause corruption and loss of data. CAUTION: Do not power up the cluster nodes without first powering up the storage subsystem, and verifying it is operating normally.
7 Troubleshooting, servicing, and maintenance Troubleshooting the storage system The “Support and troubleshooting” task at the HP Support & Drivers web site (http://www.hp.com/ go/support) can be used to troubleshoot problems with the storage system.
• CCAT (Computer Crash Analysis Tool) • SEA (System Event Analyzer) If you have a warranty or service contract with HP you are entitled to these tools free of charge. You must, however, upgrade the tools at least once a year because the software expires after one year. For more information about WEBES, see http://h18023.www1.hp.com/support/svctools/webes/. To install WEBES on your storage system, run the setup executable located in the C:\hpnas\ Components\WEBES folder.
Workarounds for common issues The following list documents common issues related to HP StorageWorks X1000 and X3000 Network Storage Systems and their recommended workarounds. For issues and workarounds specific to a particular product release, see the HP X1000 and X3000 Network Storage System Release Notes or HP Automated Storage Manager Release Notes for your product version.
Troubleshooting, servicing, and maintenance
8 System recovery This chapter describes how to use the System Recovery DVD that is provided with your storage system. The System Recovery DVD The HP StorageWorks Storage System Recovery DVD that is provided with your storage system allows you to install an image or recover from a catastrophic failure. At any later time, you may boot from the DVD and restore the server to the factory condition. This allows you to recover the system if all other means to boot the server fail.
3. Click Restore Factory Image. The upgrade process completes with little user intervention required. The server automatically reboots more than once. IMPORTANT: Do not interrupt the upgrade process. When the upgrade process nears completion, the Windows Storage Server 2008 desktop displays the following message: The user's password must be changed before logging on the first time. Log on to the storage system by establishing an Administrator password: 4. Click OK. 5.
11. Enter format fs=fat32 quick. NOTE: If your USB Flash Drive does not support the FAT32 file system, format the drive as NTFS instead. Omitting the quick parameter lengthens the format time considerably. 12. Enter active to mark the partition as active. 13. Enter assign letter= to assign a drive letter to the USB drive. For example, assign letter=U. 14. Insert the System Recovery DVD provided with the system. 15.
5. Type an Administrator password in the New password box. 6. Re-type the Administrator password in the Confirm password box. 7. Click the blue arrow next to the Confirm password box. 8. Click OK. After the Administrator password has been set, the storage system completes the recovery process. 9. Remove the USB Flash drive from the X Series system or client PC. Managing disks after a restoration After a system has been restored, drive letters may be assigned to the wrong volume.
9 Support and other resources Contacting HP For worldwide technical support information, see the HP support website: http://www.hp.
Convention Monospace, italic text Monospace, bold text Element • Code variables • Command variables Emphasized monospace text WARNING! Indicates that failure to follow directions could result in bodily harm or death. CAUTION: Indicates that failure to follow directions could result in damage to equipment or data. IMPORTANT: Provides clarifying information or specific instructions. NOTE: Provides additional information. TIP: Provides helpful hints and shortcuts.
Customer self repair HP customer self repair (CSR) programs allow you to repair your StorageWorks product. If a CSR part needs replacing, HP ships the part directly to you so that you can install it at your convenience. Some parts do not qualify for CSR. Your HP-authorized service provider will determine whether a repair can be accomplished by CSR. For more information about CSR, contact your local service provider, or see the CSR website: http://www.hp.
Support and other resources
A Regulatory compliance notices This section contains regulatory notices for the HP ______________________. Regulatory compliance identification numbers For the purpose of regulatory compliance certifications and identification, this product has been assigned a unique regulatory model number. The regulatory model number can be found on the product nameplate label, along with all required approval markings and information.
of this equipment in a residential area is likely to cause harmful interference, in which case the user will be required to correct the interference at personal expense. Class B equipment This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Class B equipment This Class B digital apparatus meets all requirements of the Canadian Interference-Causing Equipment Regulations. Cet appareil numérique de la class B respecte toutes les exigences du Règlement sur le matériel brouilleur du Canada.
Japanese power cord statement Korean notices Class A equipment Class B equipment Taiwanese notices BSMI Class A notice 122 Regulatory compliance notices
Taiwan battery recycle statement Turkish recycling notice Türkiye Cumhuriyeti: EEE Yönetmeliğine Uygundur HP X1000 and X3000 Network Storage System User Guide 123
Laser compliance notices English laser notice This device may contain a laser that is classified as a Class 1 Laser Product in accordance with U.S. FDA regulations and the IEC 60825-1. The product does not emit hazardous laser radiation. WARNING! Use of controls or adjustments or performance of procedures other than those specified herein or in the laser product's installation guide may result in hazardous radiation exposure.
French laser notice German laser notice Italian laser notice HP X1000 and X3000 Network Storage System User Guide 125
Japanese laser notice Spanish laser notice Recycling notices English recycling notice Disposal of waste equipment by users in private household in the European Union This symbol means do not dispose of your product with your other household waste. Instead, you should protect human health and the environment by handing over your waste equipment to a designated collection point for the recycling of waste electrical and electronic equipment.
Bulgarian recycling notice Този символ върху продукта или опаковката му показва, че продуктът не трябва да се изхвърля заедно с другите битови отпадъци. Вместо това, трябва да предпазите човешкото здраве и околната среда, като предадете отпадъчното оборудване в предназначен за събирането му пункт за рециклиране на неизползваемо електрическо и електронно борудване. За допълнителна информация се свържете с фирмата по чистота, чиито услуги използвате.
Estonian recycling notice Äravisatavate seadmete likvideerimine Euroopa Liidu eramajapidamistes See märk näitab, et seadet ei tohi visata olmeprügi hulka. Inimeste tervise ja keskkonna säästmise nimel tuleb äravisatav toode tuua elektriliste ja elektrooniliste seadmete käitlemisega egelevasse kogumispunkti. Küsimuste korral pöörduge kohaliku prügikäitlusettevõtte poole.
Greek recycling notice μ Αυτό το σύμβολο σημαίνει ότι δεν πρέπει να απορρίψετε το προϊόν με τα λοιπά οικιακά απορρίμματα. Αντίθετα, πρέπει να προστατέψετε την ανθρώπινη υγεία και το περιβάλλον παραδίδοντας τον άχρηστο εξοπλισμό σας σε εξουσιοδοτημένο σημείο συλλογής για την ανακύκλωση άχρηστου ηλεκτρικού και ηλεκτρονικού εξοπλισμού. Για περισσότερες πληροφορίες, επικοινωνήστε με την υπηρεσία απόρριψης απορριμμάτων της περιοχής σας.
Lithuanian recycling notice Nolietotu iek rtu izn cin šanas noteikumi lietot jiem Eiropas Savien bas priv taj s m jsaimniec b s Šis simbols norāda, ka ierīci nedrīkst utilizēt kopā ar citiem mājsaimniecības atkritumiem. Jums jārūpējas par cilvēku veselības un vides aizsardzību, nododot lietoto aprīkojumu otrreizējai pārstrādei īpašā lietotu elektrisko un elektronisko ierīču savākšanas punktā. Lai iegūtu plašāku informāciju, lūdzu, sazinieties ar savu mājsaimniecības atkritumu likvidēšanas dienestu.
Slovak recycling notice Likvidácia vyradených zariadení používate mi v domácnostiach v Európskej únii Tento symbol znamená, že tento produkt sa nemá likvidovať s ostatným domovým odpadom. Namiesto toho by ste mali chrániť ľudské zdravie a životné prostredie odovzdaním odpadového zariadenia na zbernom mieste, ktoré je určené na recykláciu odpadových elektrických a elektronických zariadení. Ďalšie informácie získate od spoločnosti zaoberajúcej sa likvidáciou domového odpadu.
Bulgarian recycling notice Czech recycling notice Danish recycling notice 132 Regulatory compliance notices
Dutch recycling notice Estonian recycling notice Finnish recycling notice HP X1000 and X3000 Network Storage System User Guide 133
French recycling notice German recycling notice Greek recycling notice 134 Regulatory compliance notices
Hungarian recycling notice Italian recycling notice Latvian recycling notice HP X1000 and X3000 Network Storage System User Guide 135
Lithuanian recycling notice Polish recycling notice Portuguese recycling notice 136 Regulatory compliance notices
Romanian recycling notice Slovak recycling notice Spanish recycling notice HP X1000 and X3000 Network Storage System User Guide 137
Swedish recycling notice Battery replacement notices Dutch battery notice 138 Regulatory compliance notices
French battery notice German battery notice HP X1000 and X3000 Network Storage System User Guide 139
Italian battery notice Japanese battery notice 140 Regulatory compliance notices
Spanish battery notice HP X1000 and X3000 Network Storage System User Guide 141
Regulatory compliance notices
Index A access rights, managing, 100 Accessing the storage system Remote Desktop method, Accessing the storage system remote browser method, 18 ACL, defining, 83 Active Directory Lightweight Directory Services (ADLDS), ActiveX enabling, 18 Array Configuration Utility, array controller, purpose, arrays, defined, 49 Automated Storage Manager (ASM), 41 B backup, with shadow copies, basic disks, basic disks, 51, 52 battery replacement notices, boot sequence, 21 C cache file, shadow copies, 66 Canadian notice,
data striping, 49 Declaration of Conformity, default storage settings, disk access, verifying, 97 Disk Management extending volumes, 61 Disposal of waste equipment, European Union, document conventions, 115 documentation providing feedback, domain membership, verifying, dual data paths, dynamic disks clustering, dynamic disks spanning multiple LUNs, G E installation, cluster, preparing for, IP address resource, 91 European Union notice, expanding storage Array Configuration Utility, Command View EVA, ex
NFS share resource, node, server, 88 O online spares, 50 P partitions extended, 51 primary, 51 permissions file level, 76 list adding users and groups, removing users and groups, modifying, 78 resetting, 78 physical disk resources, physical configuration, 19 physical storage elements, 48 planning network, 92 network access method, 13 protocol, 93 storage, 92 power on server, 15 Print Management, 45 printer spooler, creating in a cluster, private network adapter, configuring, protocols non cluster aware, 1
shadow copies, 52 backups, 75 cache file, defragmentation, 65 described, 62 disabling, 69 file or folder recovery, 73 managing, 65 mounted drives, 65 on NFS shares, on SMB shares, 71 planning, 62 redirecting, 69 scheduling, 68 viewing list, 68 Shadow Copies for Shared Folders, 70 Share and Storage Management, 42 share management, 82 shared disks, configuring, shares administrative, 84 managing, 82 standard, 84 Single Instance Storage, Single Instance Storage (SIS), 44 storage configurations, 19 storage mana