iSCSI STORAGE DETAILED USER’S MANUAL v1.
Preface - About This Manual This manual is the introduction of Sans Digital EliteRAID Series and TowerRAID Series iSCSI and it aims to help users know the operations of the disk array system easily. Information contained in this manual has been reviewed for accuracy, but not for product warranty because of the various environments/OS/settings, Information and specification will be changed without further notice. For any update information, please visit www.sansdigital.com.
Table of Contents Chapter 1 1.1 1.2 1.3 1.4 RAID introduction ..................................................................................................5 Features............................................................................................................................................... 5 Terminology ....................................................................................................................................... 5 RAID levels .................................
3.9 Logout................................................................................................................................................53 Chapter 4 4.1 4.2 4.3 4.4 4.5 Advanced operation .............................................................................................54 Rebuild...............................................................................................................................................54 RG migration..........................................
Chapter 1 RAID introduction 1.1 Features Sans Digital EliteRAID and TowerRAID Series iSCSI storage is a high-performance RAID.
PD The Physical Disk belongs to the member disk of one specific RAID group. RD Raid Group. A collection of removable media. One RG consists of a set of VDs and owns one RAID level attribute. VD Virtual Disk. Each RD could be divided into several VDs. The VDs from one RG have the same RAID level, but may have different volume capacity. CV Cache Volume. Controller uses onboard memory as cache. All RAM (except for the part which is occupied by the controller) can be used as cache.
DG DeGraded mode. Not all of the array’s member disks are functioning, but the array is able to respond to application read and write requests to its virtual disks. SCSI Small Computer Systems Interface. SAS Serial Attached SCSI. iSCSI Internet Small Computer Systems Interface. SAS Serial Attached SCSI. FC Fibre Channel. S.M.A.R.T. Self-Monitoring Analysis and Reporting Technology. WWN World Wide Name. HBA Host Bus Adapter. SAF-TE SCSI Accessed Fault-Tolerant Enclosures.
RAID 3 Striping with parity on the dedicated disk. RAID 3 needs at least three hard drives. RAID 5 Striping with interspersed parity over the member disks. RAID 3 needs at least three hard drives. RAID 6 2-dimensional parity protection over the member disks. RAID 6 needs at least four hard drives. RAID 0+1 Mirroring of the member RAID 0 volumes. RAID 0+1 needs at least four hard drives. RAID 10 Striping over the member RAID 1 volumes. RAID 10 needs at least four hard drives.
Figure 1.4.1 This is the volume structure of Sans Digital designed. It describes the relationship of RAID components. One RG (RAID group) consists of a set of VDs (Virtual disk) and owns one RAID level attribute. Each RG can be divided into several VDs. The VDs in one RG share the same RAID level, but may have different volume capacity. Each VD will be associated with one specific CV (Cache Volume) to execute the data transaction. Each CV can have different cache memory size by user’s modification/setting.
Chapter 2 Getting started 2.1 Before starting Before starting, prepare the following items. 1. 2. 3. 4. 5. 6. 7. 8. 9. 2.2 Check “Certification list” in Appendix A to confirm the hardware setting is fully supported. Read the latest release note before upgrading. Release note accompany with release firmware. A server with a NIC or iSCSI HBA. CAT 5e, or CAT 6 network cables for management port and iSCSI data ports. Recommend CAT 6 cables for best performance. Prepare storage system configuration plan.
Host 2 (initiator) iSCSI HBA Host 1 (initiator) NIC IP SAN iSCSI device 1 (target) iSCSI device 2 (target) Figure 2.2.1 The host side needs an iSCSI initiator. The initiator is a driver which handles the SCSI traffic over iSCSI. The initiator can be software or hardware (HBA). Please refer to the certification list of iSCSI HBA(s) in Appendix A.
2.3 Management methods There are three management methods to manage EliteRAID and TowerRAID iSCSI Series, describe in the following: 2.3.1 Web GUI EliteRAID and TowerRAID iSCSI Series support graphic user interface to manage the system. Make sure the LAN cable is connected. The default setting of management port IP is DHCP. The IP address could be located by using the included RAID Finder Software. Type the management port IP in the web browser.
2.4 Enclosure Status 2.4.1 System buzzer The system buzzer features are listed below: 1. 2. 3. 2.4.2 The system buzzer alarms 1 second when system boots up successfully. The system buzzer alarms continuously when there is error occurred. The alarm will be stopped after error resolved or be muted. The alarm will be muted automatically when the error is resolved. E.g., when RAID 5 is degraded and alarm rings immediately, user changes/adds one physical disk for rebuilding.
Chapter 3 Web GUI guideline 3.1 Web GUI hierarchy The below table is the hierarchy of web GUI.
3.2 Login EliteRAID and TowerRAID iSCSI Series supports graphic user interface (GUI) to operate the system. Be sure to connect the LAN cable. The default IP setting is DHCP; open the browser and enter: http://192.168.1.1 (Default IP address.) Click any function at the first time; it will pop up a dialog for authentication. Login name: admin Default password: 0000 After login, you can choose the functions which lists on the left side of window to make configuration. Figure 3.2.
3.3 Quick install It is easy to use “Quick install” to create a volume. It uses whole physical disks to create a RG; the system will calculate maximum spaces on RAID levels 0/1/3/5/6/0+1. “Quick install” will occupy all residual RG space for one VD, and it has no space for snapshot and spare. If snapshot is needed, please create volumes by manual, and refer to section 4.4 for more detail.
3.4 System configuration “System configuration” is designed for setting up the “System setting”, “IP address”, “Login setting”, “Mail setting”, and “Notification setting”. Figure 3.4.1 3.4.1 System setting “System setting” can set system name and date. Default “System name” composed of model name and serial number of this system, e.g.: P210C-a00001. Figure 3.4.1.
3.4.2 IP address “IP address” can change IP address for remote administration usage. There are 2 options, DHCP (Get IP address from DHCP server) or static IP. The default setting is DHCP. User can change the HTTP, HTTPS, and SSH port number when the default port number is not allowed on host/server. Figure 3.4.2.1 3.4.3 Login setting “Login setting” can set single admin, auto logout time and Admin/User password. The single admin can prevent multiple users access the same controller at the same time. 1.
Figure 3.4.3.1 Check “Change admin password” or “Change user password” to change admin or user password. The maximum length of password is 12 characters. 3.4.4 Mail setting “Mail setting” can enter at most 3 mail addresses for receiving the event notification. Some mail servers would check “Mail-from address” and need authentication for anti-spam. Please fill the necessary fields and click “Send test mail” to test whether email functions are available.
Figure 3.4.4.1 3.4.5 Notification setting “Notification setting” can set up SNMP trap for alerting via SNMP, pop-up message via Windows messenger (not MSN), alert via syslog protocol, and event log filter.
Figure 3.4.5.1 “SNMP” allows up to 3 SNMP trap addresses. Default community setting is “public”. User can choose the event log levels and default setting only enables INFO event log in SNMP. There are many SNMP tools. The following web sites are for your reference: SNMPc: http://www.snmpc.com/ Net-SNMP: http://net-snmp.sourceforge.
There are some syslog server tools. The following web sites are for your reference: WinSyslog: http://www.winsyslog.com/ Kiwi Syslog Daemon: http://www.kiwisyslog.com/ Most UNIX systems build in syslog daemon. “Event log filter” setting can enable event level on “Pop up events” and “LCM”. 3.5 iSCSI configuration “iSCSI configuration” is designed for setting up the “Entity Property”, “NIC”, “Node”, “Session”, and “CHAP account”. Figure 3.5.1 3.5.
Figure 3.5.2.2 (Figure 3.5.2.2: ER104I+(B), ER208I+(B), ER316I+B and TR8I-B, there are 2 iSCSI data ports. Each of them is set to static IP.) IP settings: User can change IP address by moving mouse to the gray button of LAN port, click “IP settings for iSCSI ports”. There are 2 selections, DHCP (Get IP address from DHCP server) or static IP. Figure 3.5.2.4 Default gateway: Default gateway can be changed by moving mouse to the gray button of LAN port, click “Become default gateway”.
Trunking: defines the use of multiple iSCSI data ports in parallel to increase the link speed beyond the limits of any single port. LACP: The Link Aggregation Control Protocol (LACP) is part of IEEE specification 802.3ad that allows bundling several physical ports together to form a single logical channel. LACP allows a network switch to negotiate an automatic bundle by sending LACP packets to the peer. The advantages of LACP are (1) increases the bandwidth. (2) failover when link status fails on a port.
Figure 3.5.2.8 For example, LAN1 and LAN2 are set as Trunking mode. LAN3 and LAN4 are set as LACP mode. To remove Trunking / LACP setting, checking the gray button of LAN port, click “Delete link aggregation”. Then it will pop up a message to confirm. 3.5.3 Node Single-node / Multi-node: “Node” can view the target name for iSCSI initiator. ER104I+(B), ER208I+(B), ER316I+B and TR8I-B supports single-node. The node name ER104I+(B), ER208I+(B), ER316I+B and TR8I-B exists by default and can not be changed.
2. Select “CHAP”. Figure 3.5.3.4 3. Click “ ”. Figure 3.5.3.5 4. 5. 6. Go to “/ iSCSI configuration / CHAP account” page to create CHAP account. Please refer to next section for more detail. Mouse moves to the gray button of “Auth” column, click “User”. Select CHAP user(s) which will be used. It’s a multi option; it can be one or more. If choosing none, CHAP can not work. Figure 3.5.3.6 7. 8. Click “ ”. In “Change Authenticate” page, select “None” to disable CHAP.
Figure 3.5.3.8 4. 5. Go to “/ iSCSI configuration / CHAP account” page to create CHAP account. Please refer to next section for more detail. In “Authenticate” page, select “None” to disable CHAP. Tips After setting CHAP, the initiator in host/server should be set the same CHAP account. Otherwise, user cannot login. 3.5.4 Session “Session” can display iSCSI session and connection information, including the following items: 1. 2. 3. 4.
Figure 3.5.5.3 3. Click “ ”. Figure 3.5.5.4 (Figure 3.5.5.4: ER104I+(B), ER208I+(B), ER316I+B and TR8I-B, create a CHAP account named “chap1”.) 4. 3.6 Click “Delete” to delete CHAP account. Volume configuration “Volume configuration” is designed for setting up the volume configuration which includes “Volume create wizard”, “Physical disk”, “RAID group”, “Virtual disk”, “Snapshot”, and “Logical unit”. Figure 3.6.1 3.6.1 Volume create wizard “Volume create wizard” has a smarter policy.
1. 2. Biggest capacity of RAID level for user to choose and, The fewest disk number for RAID level / volume size. E.g., user chooses RAID 5 and the controller has 12*200G + 4*80G HDDs inserted. If we use all 16 HDDs for a RAID 5, and then the maximum size of volume is 1200G (80G*15). By the wizard, we do smarter check and find out the most efficient way of using HDDs. The wizard only uses 200G HDDs (Volume size is 200G*11=2200G), the volume size is bigger and fully uses HDD capacity.
Step 3: Decide VD size. User can enter a number less or equal to the default number. Then click “ ”. Figure 3.6.1.3 Step 4: Confirm page. Click “ created. ” if all setups are correct. Then a VD will be Done. You can start to use the system now. Figure 3.6.1.4 (Figure 3.6.1.4: A RAID 0 Virtual disk with the VD name “QUICK13573”, named by system itself, with the total available volume size 1862GB.) 3.6.2 Physical disk “Physical disk” can view the status of hard drives in the system.
Step 2: Maybe it has some RGs which can be set dedicate spare disk, select which one will be added, then click “ ”. Figure 3.6.2.2 Done. View “Physical disk” page. Figure 3.6.2.3 (Figure 3.6.2.3: Physical disks of slot 1,2,3 are created for a RG named “RG-R5”. Slot 4 is set as dedicated spare disk of RG named “RG-R5”. The others are free disks.) • PD column description: Slot The position of hard drives. The button next to the number of slot shows the functions which can be executed.
“Missing” Æ the hard drive has already joined a RG but not plugged into the disk tray of current system. Health The health of hard drive. “Good” Æ the hard drive is good. “Failed” Æ the hard drive is failed. “Error Alert” Æ S.M.A.R.T. error alert. “Read Errors” Æ the hard drive has unrecoverable read errors. Usage “RD” Æ RAID Disk. This hard drive has been set to RAID. “FR” Æ FRee disk. This hard drive is free for use. “DS” Æ Dedicated Spare.
Write cache options: “Enabled” Æ Enable disk write cache. “Disabled” Æ Disable disk write cache. Standby options: “Disabled” Æ Disable spindown. “30 sec / 1 min / 5 min / 30 min” Æ Enable hard drive auto spindown to save power in the period of time. More information 3.6.3 Show hard drive detail information. RAID group “RAID group” can view the status of each RAID group. The following is an example to create a RG. Step “ 1: Click “ ”, enter “Name”, choose ” to select PD. Then click “ ”.
Figure 3.6.3.2 (Figure 3.6.3.2: There is a RAID 0 with 4 physical disks, named “RG-R0”, total size is 135GB. Another is a RAID 5 with 3 physical disks, named “RG-R5”.) Done. View “RAID group” page. • RG column description: No. Number of RAID group. The button next to the No. shows the functions which can be executed. Name RAID group name. Total(GB) Total capacity of this RAID group. Free(GB) Free capacity of this RAID group. #PD The number of physical disks in RAID group.
“Good” Æ the RAID group is good. “Failed” Æ the hard drive is failed. “Degraded” Æ the RAID group is not completed. The reason could be lack of one disk or disk failure. • RAID The RAID level of the RAID group. Enclosure RG locates on local or JBOD enclosure. RG operations description: Create Create a RAID group. Migrate Migrate a RAID group. Please refer to next chapter for more detail. Activate Activate a RAID group; it can be executed when RG status is offline.
Figure 3.6.4.1 Step 2: Confirm page. Click “ ” if all setups are correct. Figure 3.6.4.2 (Figure 3.6.4.2: Create a VD named “VD-01”, related to “RG-R0”, size is 30GB. The other VD is named “VD-02”, initializing to 12%.) Done. View “Virtual disk” page. • VD column description: No. Number of this Virtual disk. The button next to the VD No.
functions which can be executed. Name Virtual disk name. Size(GB) Total capacity of the Virtual disk. Right “WT” Æ Write Through. “WB” Æ Write Back. “RO” Æ Read Only. Priority “HI” Æ HIgh priority. “MD” Æ MiD priority. “LO” Æ LOw priority. Bg rate Background task priority. “4 / 3 / 2 / 1 / 0” Æ Default value is 4. The higher number the background priority of a VD has, the more background I/O will be scheduled to execute. Status The status of Virtual disk. “Online” Æ the Virtual disk is online.
• Snapshot (MB) The Virtual disk size that used for snapshot. The number means “Used snapshot space” / “Total snapshot space”. The unit is in megabytes (MB). #Snapshot Number of snapshot(s) that Virtual disk is taken. RG name The Virtual disk is related to the RG name VD operations description: Extend Extend a Virtual disk capacity. Scrub Scrub a Virtual disk. It’s a parity regeneration. It supports RAID 3 / 5 / 6 / 30 / 50 / 60 only. Delete Delete a Virtual disk.
3.6.5 Take snapshot Take a snapshot on the Virtual disk. Auto snapshot Set auto snapshot on the Virtual disk. List snapshot List all snapshot VD related to the Virtual disk. More information Show Virtual disk detail information. Snapshot (ER316I+B only) “Snapshot” can view the status of snapshot. Please refer to next chapter for more detail about snapshot concept. The following is an example to take a snapshot. Step 1: Create snapshot space.
Step 4: Export the snapshot VD. Mouse moves to the gray button next to the Snapshot VD number; click “Export”. Enter a capacity for snapshot VD. If size is zero, the exported snapshot VD will be read only. Otherwise, the exported snapshot VD can be read/written, and the size will be the maximum capacity to read/write. Figure 3.6.5.4 Figure 3.6.5.5 (Figure 3.6.5.5: This is the list of “VD-01”. There are two snapshots in “VD-01”.
Created time • 3.6.6 Snapshot VD created time. Snapshot operations description: Export / Unexport Export / unexport the snapshot VD. Rollback Rollback the snapshot VD to the original. Delete Delete the snapshot VD. Attach Attach to a LUN. Detach Detach to a LUN. List LUN List attached LUN(s). Logical unit “Logical unit” can view the status of attached logical unit number of each VD. User can attach LUN by clicking the “ ”.
(Figure 3.6.6.2: ER104I+, ER208I+, and TR8I, VD-01 is attached to LUN 0 and every host can access. VD02 is attached to LUN 1 and only initiator note which is named “iqn.1991-05.com.microsoft:demo” can access. The other models do not display “Target” column.) • LUN operations description: Attach Attach a logical unit number to a Virtual disk. Detach Detach a logical unit number from a Virtual disk. The matching rules of access control are inspected from top to bottom in sequence.
5. Done. A RG has been created. Figure 3.6.7.2 (Figure 3.6.7.2: Creating a RAID 5 with 3 physical disks, named “RG-R5”. The total size is 931GB. Because there is no related VD, free size still remains 931GB.) Step 2: Create VD (Virtual disk). To create a data user volume, please follow the procedures. Figure 3.6.7.3 5. Select “/ Volume configuration / Virtual disk”. 6. 7. ”. Click “ Input a VD name, choose a RG Name and enter a size of VD; decide the stripe high, block 8. 9.
1. In “/ Volume configuration / Virtual disk”, mouse moves to the gray button next to the VD number; click “Attach LUN”. 2. In “/ Volume configuration / Logical unit”, click “ ”. The procedures are as follows: Figure 3.6.7.5 1. 2. 3. Select a VD. Input “Host” name, which is a FC node name for access control, or fill-in wildcard “*”, which means every host can access to this volume. Choose LUN and permission, then click “ Done. ”. Figure 3.6.7.6 (Figure 3.5.8.6: VD-R5-1 is attached to LUN 0.
Figure 3.6.7.7 (Figure 3.5.8.7: Slot 4 is set as global spare disk.) Step 5: Done. They can be used as disks. Delete VDs, RG, please follow the steps listed below. Step 6: Detach LUN from VD. In “/ Volume configuration / Logical unit”, Figure 3.6.7.8 1. 2. 3. Mouse moves to the gray button next to the LUN; click “Detach”. There will pop up a confirmation page. Choose “OK”. Done. Step 7: Delete VD (Virtual disk). To delete the Virtual disk, please follow the procedures: 1. 2. 3.
To delete the RAID group, please follow the procedures: 1. 2. 3. 4. 5. Select “/ Volume configuration / RAID group”. Select a RG which is no VD related on this RG, otherwise the VD(s) on this RG must be deleted first. Mouse moves to the gray button next to the RG number click “Delete”. There will pop up a confirmation page, click “OK”. Done. The RG has been deleted. Tips The action of deleting one RG will succeed only when all of the related VD(s) are deleted in this RG.
3.7.1 SES configuration SES represents SCSI Enclosure Services, one of the enclosure management standards. “SES configuration” can enable or disable the management of SES. Figure 3.7.1.1 (Figure 3.6.1.1: Enable SES in LUN 0, and can be accessed from every host) The SES client software is available at the following web site: SANtools: http://www.santools.com/ 3.7.2 Hardware monitor “Hardware monitor” can view the information of current voltage and temperature. Figure 3.7.2.
For better protection and avoiding single short period of high temperature triggering auto shutdown, controllers use multiple condition judgments for auto shutdown, below are the details of when the Auto shutdown will be triggered. 1. 2. 3. 3.7.3 There are 3 sensors placed on controllers for temperature checking, they are on core processor, PCI-X bridge, and daughter board. controller will check each sensor for every 30 seconds.
3.7.4 UPS “UPS” can set up UPS (Uninterruptible Power Supply). Figure 3.7.4.1 Currently, the system only supports and communicates with smart-UPS of APC (American Power Conversion Corp.) UPS. Please review the details from the website: http://www.apc.com/. First, connect the system and APC UPS via RS-232 for communication. Then set up the shutdown values when power is failed. UPS in other companies can work well, but they have no such communication feature. UPS Type Select UPS Type.
“Maintenance” allows the operation of system functions which include “System information” to show the system version, “Upgrade” to the latest firmware, “Reset to factory default” to reset all controller configuration values to factory settings, “Import and export” to import and export all controller configuration, “Event log” to view system event log to record critical events, and “Reboot and shutdown” to either reboot or shutdown the system. Figure 3.8.1 3.8.
Tips Please contact with tech@sansdigital.com for latest firmware. 3.8.3 Reset to factory default “Reset to factory default” allows user to reset controller to factory default setting. Figure 3.8.3.1 Reset to default value, the password is: 1234, and IP address to default DHCP. Default IP address: 192.168.10.50 (DHCP) Default subnet mask: 255.255.255.0 Default gateway: 192.168.10.254 3.8.
3.8.5 Event log “Event log” can view the event messages. Check the checkbox of INFO, WARNING, and ERROR to choose the level of display event log. Clicking “ ” button will save the whole event log as a text file with file name “log-ModelName-SerialNumber-Date-Time.txt” (e.g., log-F200C” button will clear event log. Click a00001-20080501-120000.txt). Click ” “ ” button will stop alarm if system alerts. Figure 3.8.5.
3.9 Logout For security reason, “Logout” allows users logout when no user is operating the system. Re-login the system; please enter username and password again.
Chapter 4 Advanced operation 4.1 Rebuild If one physical disk of the RG which is set as protected RAID level (e.g.: RAID 3, RAID 5, or RAID 6) is FAILED or has been unplugged/removed, then the status of RG is changed to degraded mode, the system will search/detect spare disk to rebuild the degraded RG to a complete one. It will detect dedicated spare disk as rebuild disk first, then global spare disk. EliteRAID and TowerRAID iSCSI Seriess support Auto-Rebuild.
N-way mirror Extension to RAID 1 level. It has N copies of the disk. N-way mirror allows N-1 hard drives failure or unplugging. RAID 3 Striping with parity on the dedicated disk. RAID 3 allows one hard drive failure or unplugging. RAID 5 Striping with interspersed parity over the member disks. RAID 5 allows one hard drive failure or unplugging. RAID 6 2-dimensional parity protection over the member disks. RAID 6 allows two hard drives failure or unplugging.
Figure 4.2.1 4. Double check the setting of RAID level and RAID PD slot. If there is no problem, click 5. “ “. Finally a confirmation page shows the detail of RAID information. If there is no problem, click 6. “ to start migration. System also pops up a message of “ “Warning: power lost during migration may cause damage of data!” to give user warning. When the power is abnormally off during the migration, the data is in high risk.
Caution RG Migration cannot be executed during rebuild or VD extension. 4.3 VD Extension To extend VD size, please follow the procedures. 1. 2. 3. Select “/ Volume configuration / Virtual disk”. Mouse moves to the gray button next to the VD number; click “Extend”. Change the size. The size must be larger than the original, and then click “ “ to start extension. Figure 4.3.1 4. Extension starts.
4. 5. Mouse moves to the gray button next to the RG number; click “Activate”. Done. Disk roaming has some constraints as described in the followings: 1. 2. 4.5 Check the firmware of two systems first. It is better that both systems have the same firmware version or newer. All physical disks of related RG should be moved from system-1 to system-2 together. The configuration of both RG and VD will be kept but LUN configuration will be cleared in order to avoid conflict with system-2.
Appendix A. Certification list • iSCSI Initiator (Software) OS Microsoft Windows Software/Release Number Microsoft iSCSI Software Initiator Release v2.07 System Requirements: 1. Windows 2000 Server with SP4 2. Windows Server 2003 with SP2 3. Windows Server 2003 R2 with SP2 4. Windows Server 2008 The iSCSI Initiators are different for different Linux Kernels. Linux 1. 2. 3. Mac For Red Hat Enterprise Linux 3 (Kernel 2.4), install linux-iscsi3.6.3.tar For Red Hat Enterprise Linux 4 (Kernel 2.
• GbE Switch Vendor Model Dell Dell Dell HP B. PowerConnect 5324 PowerConnect 2724 PowerConnect 2708 ProCurve 1800-24G Event notifications • PD events Level INFO WARNING ERROR • Disk inserted Disk removed HDD failure Description Disk is inserted into system. Disk is removed from system. Disk is disabled. HW events Level WARNING ERROR INFO INFO INFO • Type Type ECC error ECC error ECC info ECC info SCSI info Description Single-bit ECC error is detected.
ERROR ERROR • INFO WARNING ERROR ERROR Voltage critical Voltage critical shutdown UPS info UPS error UPS error UPS error WARNING SMART T.E.C. WARNING SMART failure RMS events Level • System voltages failed!!! System voltages failed!!! The system will do the auto shutdown immediately. UPS detection succeeded. UPS detection failed. AC loss for the system is detected. UPS Power Low!!! The system will do the auto shutdown immediately. Disk S.M.A.R.T.
INFO INFO INFO INFO INFO INFO INFO INFO WARNING WARNING WARNING ERROR ERROR WARNING WARNING ERROR ERROR INFO INFO WARNING WARNING WARNING WARNING INFO INFO INFO INFO • VD scrubbing started VD scrubbing finished RG migration started RG migration finished RG activated RG deactivated VD rewrite started VD rewrite finished VD rewrite failed RG degraded VD degraded RG failed VD failed Recoverable read error occurred Recoverable write error occurred Unrecoverable read error occurred Unrecoverable write error occ
WARNING • Snapshot quota reached iSCSI events Level • Type INFO INFO iSCSI login succeeds iSCSI login rejected INFO iSCSI logout Description iSCSI login from succeeds. iSCSI login from was rejected, reason [] iSCSI logout from was received, reason []. Battery backup events Level • The quota assigned to snapshot is reached.
• C. System maintenance events Level Type INFO INFO INFO INFO WARNING System shutdown System reboot FW upgrade start FW upgrade success FW upgrade failure Description System shutdown. System reboot. Firmware upgrade start. Firmware upgrade success. Firmware upgrade failure. Known issues 1. Microsoft MPIO driver is not supported on Windows XP and Windows 2000 Professional. Workaround solution: Using Windows Server 2008/2003, Windows 2000 server to run MPIO.