Gebruiksaanwijzing /service van het product PowerVault MD3200i van de fabrikant Dell
Ga naar pagina of 282
Dell PowerV ault MD3200i and MD3220i Storage Array s Owner’ s Manual Regulatory Model: E03J Series and E04J Series Regulatory T ype: E03J001 and E04J001 book.
Notes, Cautions, and W arnings NOTE: A NOTE indicates important information that helps you make better use of your computer . CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followe d. WA RN I N G : A W ARNING indicates a potential for property damage, personal injury , or death.
Contents 3 Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . 19 About This Document . . . . . . . . . . . . . . . . . . 19 Inside the box of the Dell PowerV ault MD3200i Series Storage Array . . . . . . . . . . . . . 19 MD3200i Series Storage Array .
4 Contents 3 Planning: RAID Controller Modules . . . . 31 RAID Controller Modules . . . . . . . . . . . . . . . . 31 RAID Controller Module Connectors and Features . . . . . . . . . . . . . . . . . . . . . . . 32 RAID Controller Modul e— Additional Features .
Contents 5 Foreground Initialization . . . . . . . . . . . . . . 43 Consistency Check . . . . . . . . . . . . . . . . . 44 Media V erification . . . . . . . . . . . . . . . . . 44 Cycle T ime . . . . . . . . . . . . . . . . . . . . . 44 V irtual Disk Operations Limit .
6 Contents Monitoring MD3200i Series Sy stem Performance . . . . . . . . . . . . . . . . . . . . . . . 57 5 Configuration: Overview . . . . . . . . . . . . 61 User Interface . . . . . . . . . . . . . . . . . . . . . . 61 Enterprise Management Window .
Contents 7 Configuring E-mail Alerts . . . . . . . . . . . . . . 76 Configuring SNMP Alerts . . . . . . . . . . . . . . 79 Battery Settings . . . . . . . . . . . . . . . . . . . . . 80 Setting the Storage Array RAID Controller Module Clocks . . . . . .
8 Contents Linux . . . . . . . . . . . . . . . . . . . . . . . . . 94 9 Configuration: About Y our Host . . . . . . . 95 Configuring Host Access . . . . . . . . . . . . . . . . . 95 Using the Mappings T ab . . . . . . . . . . . . . . . . . 96 Defining a Host .
Contents 9 Changing the I/O T y pe . . . . . . . . . . . . . . . 114 Choosing an Appropriate Phy sical Disk T ype . . . . . . 115 Phy sical Disk Security with Self Encrypting Disk . . . . . . . . . . . . . . . . . . . . . 115 Creating a Security Key .
10 Contents Changing the RAID Level of a Disk Group . . . . . . . 139 Storage Partitioning . . . . . . . . . . . . . . . . . . 140 Disk Group and V irtual Disk Expansion . . . . . . . . 141 Disk Group Expansion . . . . . . . . . . . . . . . 141 V irtual Disk Expansion .
Contents 11 Preparing Host Servers to Create the Snapshot Using the Simple Path . . . . . . . . . . 153 Creating a Snapshot V irtual Disk Using the Advanced Path . . . . . . . . . . . . . . . . . . . . 15 6 About the Advanced Path . . . . . . . . . . .
12 Contents Online Copy . . . . . . . . . . . . . . . . . . . . 175 Creating a V irtual Disk Copy for an MSCS Shared Disk . . . . . . . . . . . . . . . . . . . 176 Virtual Disk Read/W rite Permissions . . . . . . . . . 176 Virtual Disk Copy Restrictions .
Contents 13 13 Configuration: Premium Feature —Upgrading to High-Performance-T ier . . . . . . . . . . . . . 187 14 Configuration: Device Mapper Multipath for Linux . . . . . . . . . . . . . . . . 189 Overview . . . . . . . . . . . . . . . . . . . .
14 Contents Media Errors and Unreadable Sectors . . . . . . . . 210 16 Management: Installing Array Components . . . . . . . . . . . . . . . . . . . . . . 211 Recommended T ools . . . . . . . . . . . . . . . . . . 211 Front Bezel (Optional) . . . . . .
Contents 15 Power Supply/Cooling Fan Module . . . . . . . . . . . 225 Removing a Power Supply/Cooling Fan Module . . . . . . . . . . . . . . . . . . . . . 225 Installing a Power Supply/Cooling Fan Module . . . . . . . . . . . . . . . . . . . . . 228 Control Panel .
16 Contents Collecting the Phy sical Disk Data . . . . . . . . . . . 244 Event Log . . . . . . . . . . . . . . . . . . . . . . . . 244 Recovery Guru . . . . . . . . . . . . . . . . . . . . . 245 Storage Array Profile . . . . . . . . . . . . . . . . . .
Contents 17 T roubleshooting Loss of Communication . . . . . . . . 263 T roubleshooting External Connections . . . . . . . . . 263 T roubleshooting Power Supply/Cooling Fan Module . . . . . . . . . . . . . . . . . . . . . . . . 264 T roubleshooting Array Cooling Problems .
18 Contents book.book Page 18 Saturday, September 24, 2011 9:06 AM.
Introduction 19 1 Introduction NOTE: Unless specified, MD3200i Series represents Dell PowerV ault MD3200i and Dell PowerV ault MD3220i storage array s. WA RN I N G : See the Safety , Environmental, and Regulatory Information document for important safety information before following any procedures listed in this document.
20 Introduction • Mounting rails (2) (optional) • MD3200i Series res ou r c e me d i a • Rack Installation Instructions . • Getting Started W ith Y our System (provides an overview of enclosure features, setting up your enclosu r e, and technical specifications).
Introduction 21 •T h e Deployment Guide provides installation and configuration instructions fo r b o t h s o f t wa re a n d h a rd w a re. •T h e Storage Manager CLI Guide provides information about using the command line interface (CLI). • The Resource media con tains all system management tools.
22 Introduction book.book Page 22 Saturday, September 24, 2011 9:06 AM.
Planning: About Y our Storage Array 23 2 Planning: About Y our Storage Array Overview The MD3200i Series storage array is designe d for high availabil ity , offe ring r edundant access to d ata st orage. It fe atures support for both single and dual R AID controller configuration.
24 Planning: About Y our Storage Array Hardware Features Front-Panel Feature s and Indica tors Figure 2-1. Front-Panel Features and Indicators—Dell PowerV ault MD3200i Figure 2-2. Front-Panel Features and Indicators—Dell PowerV ault MD3220i 1 2 3 5 4 6 1 2 3 4 6 5 book.
Planning: About Y our Storage Array 25 Figure 2-3. Front-Bezel Features and Indicators Item Indicator , Button, or Connector Icon Descript ion 1 Enclosu re status LED The encl osure stat us LED lights when the enclosur e power is on. Lights blue during normal operation.
26 Planning: About Y our Storage Array 3 Split mode LED This LED must be unlit as the sp lit mode function is not support ed by the MD3200i Series Storage Arrays. 4 System identi fication button The system identification button on the front control panel can be u sed to locate a particula r enclosur e within a rack.
Planning: About Y our Storage Array 27 Back Pane l Features and Indic ators Figure 2-4. Back-Panel Features and In di cators—Dell PowerV ault MD3200i Series 1 600 W power supply/cooling fan module 2 RAID Controller Module 0 3 RAID Controller Module 1 4 600 W power supply/cooling fan module 1 23 4 book.
28 Planning: About Y our Storage Array Hard-Drive Indicator Patterns Figure 2-5. Hard Drive Indicators 1 hard-drive activity indicator (green) 2 hard-drive status indicator (green and amber) 1 2 book.
Planning: About Y our Storage Array 29 Power Supply and Cooling Fan Features The MD3200i Series storage array incl udes two integrat ed, hot-swappable power supply/cooling fan modules. Both modules must be in stalled to ensure proper cooli ng. The syst em requi res a t least one of the cooling f ans to function to avoid overheating.
30 Planning: About Y our Storage Array Power Indicator Codes and Features Figure 2-6. Power Indicator Codes and Features Item LED T ype Icon Description 1 DC power The LED lights gr een when the DC output voltage is within the limit. If this LED is off, it indicat es that the DC output voltage ar e not within the limit.
Planning: RAID Controller Modules 31 3 Planning: RAID Controller Modules RAID Controller Modules The R AID controller modules provi de high-performance, ad vanced virtual disk c onfigurat ion, an d fault-t olera nt disk subsystem managemen t.
32 Planning: RAID Controller Modules RAID Controller Module Connectors and Features Figure 3-1. MD3200i Series i SCSI R AID Controller Module Item Component Function 1 SAS OUT port P rovides SAS connec tion for cabling to an e xpansion enclo sure. 2 iSCSI IN port 0 P rovides host-to-controller iSCSI 1Gbps Ethernet connection.
Planning: RAID Controller Modules 33 8S A S O U T p o r t link/fault L ED Lights gr een when all four links are connect ed. Lights amber when one to 3 links are disconnected. Off when all links in the port ar e disconnected o r cable is discon nected.
34 Planning: RAID Controller Modules RAID Controller Modu le—Additional Features Battery Backup Unit Each R AID controller contains a two- cell Lithium ion nanopolymer battery backup unit (BBU). It provides power to the R AID controller module in the event of a power outage.
Planning: RAID Controller Modules 35 Sy stem Password Re set The storage array system password can be r eset if it is forgotten. T o r eset the password, push and hold down the pa ssword r eset switch for at least 5 seconds. The password is deleted. See F igur e 3-1 to locate the password r eset switch.
36 Planning: RAID Controller Modules mirrored to the cache of the second co ntroller befor e completion status is issued to the host initiator . W rite-Back Cache is enabled by default unless cache mirroring is disabled.
Planning: MD3200i Series Storage Array T erms and Concepts 37 4 Planning: MD3200i Series Storage Array T erms and Concepts This chapter e xplains terms and co ncepts used for configuration and operation of MD3 200i Se ries storage arrays.
38 Planning: MD3200i Series St orage Array T erms and Concepts NOTE: The MD3200i Series storage enclosure must contain at least two phy sical disks for proper operation. This is neces sary because the phy sical disks are used to store configuration information.
Planning: MD3200i Series Storage Array T erms and Concepts 39 If a disk drive rebuild fails because of a source drive failur e or because the drive is too small, the MDSM r eports a failur e of the ph.
40 Planning: MD3200i Series St orage Array T erms and Concepts Disk groups are always created in the un configured capacity of a storage array . Unconfigured capacity is the availa ble physical disk space not already assigned in the stor age array . Virtual disks ar e cr eated within the fr ee ca pacity of a disk group.
Planning: MD3200i Series Storage Array T erms and Concepts 41 Each R AID level provide s differ ent performance and protection. Y ou must select a R AID level based on the type of application, access, fault tolerance, and data you are storing. The storage array supports RAID levels 0, 1, 5, 6, an d 10.
42 Planning: MD3200i Series St orage Array T erms and Concepts is rec ommended for small databases or ot her applications that do not r equire lar ge capacity . R AID 1 provides full data redundancy . F or e xample accounting, payroll, or financial applications.
Planning: MD3200i Series Storage Array T erms and Concepts 43 The segment si ze or stripe eleme nt size specifies the size of data in a stripe written to a single disk. The storage ar ray supports stripe element sizes of 8 KB, 16 KB, 32 KB, 64 KB, 128 KB, 2 56 KB, and 512 KB.
44 Planning: MD3200i Series St orage Array T erms and Concepts Consistency Check A consistency check verifies the corr ectness of data in a r edundant array (R AID levels 1, 5, 6, and 10).
Planning: MD3200i Series Storage Array T erms and Concepts 45 V irtual Disk Operations Limit The maximum number of active, concurre nt virtual disk processes per RAID controller module installed in the storage array is four .
46 Planning: MD3200i Series St orage Array T erms and Concepts When consideri ng a segment-s ize change, two scenari os illustrate di fferent approaches to the limitations: • If I/O activity stretches beyond the segment size, you can incr ease it to reduce the number of disks required for a single I/O .
Planning: MD3200i Series Storage Array T erms and Concepts 47 Disk Group Operations Limit The maximum number of active, conc urrent disk group processes per i n s ta l l e d RA I D c o n t r o l l er m o d u l e i s o n e.
48 Planning: MD3200i Series St orage Array T erms and Concepts The priority of each of these operations can be chan ged to address performance requirements of the environm ent in which the ope rations are to be e xecut ed. NOTE: Setting a high priority level impact s storage array performance.
Planning: MD3200i Series Storage Array T erms and Concepts 49 NOTE: Only disk groups and associated virtual disks with all mem ber phy sical disks present can be migrated from one storage a rray to another . It is recommended th at you only migrate disk groups that have all their associat ed member virtual disks in an optimal state.
50 Planning: MD3200i Series St orage Array T erms and Concepts that has no existing physical dis ks. After the destina tion storage array is turned on and has succ essfully r eco gnized the newly mi grated physical disks, migration operations ca n continue.
Planning: MD3200i Series Storage Array T erms and Concepts 51 Host Server -to-Virtual Disk Mapping The host server attached to a storag e array accesses various virtual disks on the storage array through its host ports. Specific virtual disk -to-L UN mappings to an individual host server can be defined.
52 Planning: MD3200i Series St orage Array T erms and Concepts online and user -accessible. W hen the backup is completed, the snapshot virtual disk is no longer needed. Y o u can create up to four snapshots per virtual disk. Snapshots ar e used to r ecover pr evious versions of files that have changed since the sna pshot was tak en.
Planning: MD3200i Series Storage Array T erms and Concepts 53 V irtual Disk Co py V irtual disk copy is a premium feature to : •B a c k u p d a t a • Copy data from disk groups that use sm aller -capacity physical disks to di sk groups using greater capacity physical disks • Restore snapshot vir tual disk data to the source virtual disk.
54 Planning: MD3200i Series St orage Array T erms and Concepts Virtual Disk Recovery Y ou can use the Edit host server -to-virt u al disk mappings featur e to re cover data from the backup virtual disk.
Planning: MD3200i Series Storage Array T erms and Concepts 55 The multi-path software identifies the ex istence of multiple paths to a virtual disk and establishes a pr eferred path to that disk.
56 Planning: MD3200i Series St orage Array T erms and Concepts Ownership can later be mo dified to balance worklo ad according to actual usage. If virtual disk ownership is not manually balanced, it is possible for one controller to have the majority of the work, while t he other controller is idle.
Planning: MD3200i Series Storage Array T erms and Concepts 57 • Le ast path weight with subset (W in dows operating systems only)—The least queue depth with subset policy is also known as the le ast I/Os or least requests policy . This policy routes the ne xt I/O re quest to a data path that has the least outstanding I/O requests queued.
58 Planning: MD3200i Series St orage Array T erms and Concepts • R AID Controller modules •V i r t u a l d i s k s • Storage array totals NOTE: By default, all items are selected. b In P olling interval , select how often you want to upd ate the performance statistics.
Planning: MD3200i Series Storage Array T erms and Concepts 59 The P erformance Monitor data provides information about how your storage array is performing. The data is presented in eight columns, which are described in this table. U se this data to make performanc e tuning decisions for your storage array .
60 Planning: MD3200i Series St orage Array T erms and Concepts book.book Page 60 Saturday, September 24, 2011 9:06 AM.
Configuration: Overview 61 5 Configuration: Overview Dell P owerV ault Modular Disk Stor age Manager (MDSM) online help contains information on how to use the MDSM application to perform the configuration and management tasks de scribed in this document.
62 Configuration: Overview Enterprise M anagement Windo w The EMW provides high-level manage ment of storage arrays. When you start MDSM, the EMW is displayed.
Configuration: Overview 63 Inheriting the Sy stem Settings Use the Inherit Syst em Settings option to im port the operating system theme settings into the MDSM . Importing system them e settings affects features lik e font type, font size, color , and contrast in the MDSM.
64 Configuration: Overview • Logical tab—Y ou can view the or ganiza tion of the storage array by virtual disks, disk groups, fr ee capacity nodes, and a ny unconfigur ed capacity for the storage array .
Configuration: About Y our Storage Array 65 6 Configuration: About Y our Storage Array Out-of-Band and In-Band Management Y ou can manage a storage array in two ways: • Out-of -b and management • In-band ma nagement Out-of-Band Management Using the out-of -band managem ent method, data is separate from commands and events.
66 Configuration: About Y our Storage Array In-Band Management Using in-band management, commands, events, and data travel through the host-to-controller interface. Unlik e out-of -band management, comm ands and events are mix ed with data. NOTE: For detailed information on settin g up in-band and out-of-band management see the Deployment Guide.
Configuration: About Y our Storage Array 67 NOTE: For Linux, set the default gateway so that broadcast packets are sent to 255.255.25 5.0. For Red Hat Enterp rise Linux, if n o gateway exists on the network, set the default gateway to the IP address of the NIC.
68 Configuration: About Y our Storage Array NOTE: When adding a storage array using in-band management with iSCSI, a session must first be established between the initiator on the host server and the storage array . For more information, see "Configuration: Using iSCSI" on page 83.
Configuration: About Y our Storage Array 69 • Configur e the storage array—Create disk groups, virtual disks, and hot spare physical disks by using the A u tomatic configuration method or the Manual configuration method. F o r more information, see the Po w e r V a u l t Modular Disk Storage Manager online help topics.
70 Configuration: About Y our Storage Array • In the AMW , select Storage Array Blink Storage Array . The LEDs bli nk on the physical disks in th e storage ar ray . 2 After locating the storage array , click OK . The LEDs stop b linking.
Configuration: About Y our Storage Array 71 5 Click Ye s . The new storage a rray name is displa yed in the Select storage array table. 6 Repeat step 2 through step 4 to name or r ename additional storage arrays. NOTE: A void arbitrary names or names that may lose meaning in the future.
72 Configuration: About Y our Storage Array 6 Click OK . NOTE: Y ou are not prompted for a password when you attempt to change the storage array configuration in the current management session. Password Guidelines F ollow these guidelines when you cr eate a password: • Use secure passwor ds for your storage array .
Configuration: About Y our Storage Array 73 Adding/Editi ng a Comment to an E xisting Storage Array A descriptive comment, with an applic a ble storage array name, is a he lpful identification tool. Y o u can add or edit a comment for a storage array in the EMW only .
74 Configuration: About Y our Storage Array Enabling Premium Features Y ou can enable pr emium features on the storage array . T o enable the premium features, you must obtain a feature k ey file specific to the pr emium feature that you want to enable from your storage supplier .
Configuration: About Y our Storage Array 75 2 Select or enter the percentage of unwr itten data in the cache to trigger a cache fl ush in Start flushing . 3 Select or enter the percentage of un written data in the cache to stop a cache fl ush in progress in Stop flush ing .
76 Configuration: About Y our Storage Array 3 Click OK . If you have set a password for the selected storage array , the Enter Pa s s w o r d dialog is dis played.
Configuration: About Y our Storage Array 77 T o configur e e-mail alerts: 1 Open the Configure Alerts dialog by performing one of these actions: • In the T r ee view or the T able view on the Devices tab in the EMW , select a node, and then se lect Edit Configure Alerts .
78 Configuration: About Y our Storage Array • Adding an e-mail address—In Email address , type the e-mail address, and c lick Add . • Replacing an e-ma il address—In the Configured email addresses area, select the e-mail address to be r e placed, type the replacement e-mail address in Email address , and cl ick Rep l a ce .
Configuration: About Y our Storage Array 79 • The e-mail addresses that you had p reviously configur ed are displayed in the Configured e-mail addr esses ar ea. • Y ou must use fully qualified e- mail addresses, for e xample, name@mycompany .com. • Y ou can con figure multiple e-mail addresses before you click OK .
80 Configuration: About Y our Storage Array NOTE: The community name is an American Standa rd Code for Information Interchange (ASCII) string that ide ntifi es a known set of network management stations and is set by the network administrator . The default community name is the string “public”.
Configuration: About Y our Storage Array 81 The learn cycle completes the follo wing operations: • Dischar ges the battery to a pr edetermined threshold • Char ges the battery back to full capacity A learn cycle starts automatically wh en you install a new battery module.
82 Configuration: About Y our Storage Array written by the RAID controll er modu les to the Event L og match the event timestamps written to host log files.
Configuration: Using iSCSI 83 7 Configuration: Using iSCSI Changing the iSCSI T arget Authentication 1 In the AMW , select the Setup tab. 2 Select Manage iSCS I Settings . The Manage iSCSI Sett ings window is dis played and b y default, the T arget Authentication tab is selected.
84 Configuration: Using iSCSI Entering Mutual Authentication Permissions Mutual authentication or two-way authenti cation enables a client o r a user to verify themselves to a host server and fo r the host server to validate itself to the user . This validation is accomplishe d in such a way that both parties ar e sure of the other ’s ide ntity .
Configuration: Using iSCSI 85 Initiator CHAP Secret The initiator CH AP secret is set on the host using the iSCSI ini tiator configuration program provided with th e host o perating system. If you are using the mutual authentication meth od, you must def ine the initiator CHAP secret when you set up the host.
86 Configuration: Using iSCSI Changing the iSCSI T arget Identification Y ou cannot change the iSCSI tar get name, but you can associate an a lias with the tar get for simpler identification. Aliases ar e useful because the iSCSI targ et names are not intuitive.
Configuration: Using iSCSI 87 • Select Specify Configuration , and type the IPv4 address to activate the targ et discovery . • T ype the iSNS server IP address in the IPv6 settings area to activate the targ et discovery . After you manually enter an IP address, you can also click Advanced to configure the customized TCP listening ports.
88 Configuration: Using iSCSI 4 T o use the IPv4 settings for the iSCSI host port, select Enable IPv4 and select the IPv4 Settings tab. 5 T o use the IPv6 settings for the iSCSI host port, select Enable IPv6 and select the IPv6 Settings tab.
Configuration: Using iSCSI 89 Advanced iSCSI Host Ports Settings NOTE: Configuring the advanced iSCSI hos t ports settings is optional. Use the advanced settings for the indivi dual iSCSI host ports to specify the TCP frame size, the virtual LA N, and the network priority .
90 Configuration: Using iSCSI V iewing or Ending an iSCSI Session Y ou may want to end an iSCSI se ssion for the following reasons: • Unauthorized acces s—If an initiator whom you consi der to not have access is logged on , you can en d the iSCSI session.
Configuration: Using iSCSI 91 V iewing iSCSI Statistics and Setting Baseline Statistics T o view iSCSI statis tics an d set baseline statistics: 1 In the AMW toolbar , select Storage Array iSCSI Statistics . The Vi e w i S C S I S t a t i s t i c s window is displayed.
92 Configuration: Using iSCSI Edit, Remove, or Rename Host T opology If you give access to the wro ng host or the wrong host group, you can r e move or edit the host topology . T o correct t he host topology : F or more inform ation about Host, Ho st Groups, and Host T opology , see "Configuration : About Y o ur Host" on page 95.
Configuration: Event Monitor 93 8 Configuration: Event Monitor An event monitor is provided with De ll P owerV ault Modular Disk Stor age Manager (MDSM). The event monitor runs continuous ly in the background and monitors activity on the managed storage arrays.
94 Configuration: Event Monitor Windows T o enable or disa ble the event monitor: 1 Click Start Administrative T ools Ser vices . or Click Start Settings Control P anel Administrative T ools Services . 2 F rom the list of services, select Modular Disk Storage Ma nager Event Monitor .
Configuration: About Y our Host 95 9 Configuration: About Y our Host Configuring Host Access Modular Disk Storage Manager (MDSM) software is comprised o f multiple modules. One of thes e modules is the Host Conte xt Agent. The host conte xt agent is installed as part of the MD SM installation and runs continuously in the background.
96 Configuration: About Y our Host • Cr eate a host and assign an alias or user label. • Add or associate a ne w host port id entifier to a particular h ost. • Change the host p ort identifier alia s or user la bel. • Move or associate a host port identifier to a differ en t host.
Configuration: About Y our Host 97 • Select the Mappings tab. Right-click the root node (storage array name), Default Group node, or Host Group node in the To p o l o g y pane to which you wan t to add the host, and select Define Host from the pop-up menu.
98 Configuration: About Y our Host The Pr e v i e w window is displayed. 11 Click Fi n i s h . Removing Host Access T o r emove host access: 1 In the AMW , select the Mappings tab, select the host node in the To p o l o g y pane. 2 P erform one of these actions: • Select Mappings Rem o v e .
Configuration: About Y our Host 99 • Right-click the storage array or the Default Group, and sele ct Define Host Group from the pop-up menu. 4 T ype the name of the new host group in Enter new host group name . 5 Select the appropriate hos ts in the Select hosts to add ar ea.
100 Configuration: About Y our Host 4 Click Ye s . The host is moved to the selected ho st group with the following mappings: • The host r etains the specific virt ual disk mappings assi gned to it. • The hos t inherits the virtu al disk mappings assigned to the host group to which it is moved.
Configuration: About Y our Host 101 • Changing a host type MDSM automatically detect s these changes for any host running the host agent software. Starting or S topping the Host Co ntext Agent The host context agent discovers the host topology and starts and stops with the host.
102 Configuration: About Y our Host 4 Click Action Start . I/O Data Path Protection Y ou can have multiple host-to-array co nnections for a host. Ensur e that you select all the connections to the array when configuring ho st access to the storage array .
Configuration: About Y our Host 103 Managing Host Port Identifiers Y ou can manage the h ost port identifiers tha t are added to the storag e array . Y ou can: • Add—Add or as sociate a new host p ort identifier to a particular host. • Edit—Change the host port identifier al ias or user label .
104 Configuration: About Y our Host • Add by creating a new host port identifier —In New host po rt identifier , enter the name of the new host port identifier . 6 In User label , enter up to 30 character alphanumeric name. 7 In Associated with host , select the approp riate host or host group.
Configuration: Disk Groups and Virtua l Disks 105 10 Configuration: Disk Groups and V irtual Disks Creating Disk Groups and V irtual Disks Disk groups ar e created in the unconfi g ured capacity of a storage array , and virtual disks ar e created in the fr ee capacity of a disk group.
106 Configuration: Disk Groups and V irtual Disks A disk group must be organized accor ding to its related tasks and subtasks. F or example, if you cr eate a disk gr oup for the Accounting Department,.
Configuration: Disk Gr oups and V irtual Disks 107 3 T ype the name of the disk group (up to 30 characters) in Disk group name . 4 Select the appropriate Physical Disk selection choices , you can select: • A utomatic , see step 6 • Manual , see step 9 5 Click Next .
108 Configuration: Disk Groups and V irtual Disks Locating a Disk Group Y ou can physically locate and identify al l of the physical disks that comprise a selected disk group. An LED blinks on each physical disk in the disk gro up. T o locate a disk group: 1 In the AMW , select the Lo gi c al tab.
Configuration: Disk Gr oups and V irtual Disks 109 NOTE: Ensure that you create disk gr oups before creating virtual disks. T o cr eate virtual disks: 1 Choose one of these methods to start the Create.
110 Configuration: Disk Groups and V irtual Disks • Use recommended settings . • Customize settings . 6 Click Next . 7 In the Customize Advanced V irtual Disk P arameters window , sel ect the appropriate Virtual Disk I/O characteristics type.
Configuration: Disk Gr oups and V irtual Disks 111 2 Select a virtual disk. 3 In the toolbar , sele ct Vi r t u a l D i s k Change Modification P riority . The Change Modi fication P riority window is displayed. 4 Select one or more virtual disks.
112 Configuration: Disk Groups and V irtual Disks 2 In the toolbar , select Vi r t u a l D i s k Change Cache Settings . The Change Cache Settings window is displayed. 3 Select one or more virtual disks. T o select nonadjacent virtual disks, press <Ctrl> click.
Configuration: Disk Gr oups and V irtual Disks 113 7 Click OK . Changing the Segment Size of a Virtual Disk Y ou can change the segme nt size on a selected virtual disk. During this operation, I/O performance is affect ed, but you r data remains avai lable.
114 Configuration: Disk Groups and V irtual Disks The segment size modification operation begins. The virtual disk icon in the Lo g i ca l pane shows an Operation in P rogre ss s tatus while the operation is taking place.
Configuration: Disk Gr oups and V irtual Disks 115 NOTE: If you selected the Custom option, select your preferred dynamic cache read prefetch se tting (enabled/disabl ed) and segment size (8 KB to 512 KB). 2 Click OK . Choosing an Appropriate Phy sical Disk T ype Y ou can cr eate disk groups and virtual disks in the storage array .
116 Configuration: Disk Groups and V irtual Disks Whenever the power is turned off and turned on again, all of the security- enabled phys ical disks chang e to a se curity locked s tate. In t his state, the data is inaccessible until the corr ect security k ey is provided by a R AID controller module.
Configuration: Disk Gr oups and V irtual Disks 117 NOTE: If you have not created a security key for the storage array , the Create Security Key option is active. If you have creat ed a security key for the storag e array , the Create Security Key option is inactive with a check mark to the left.
118 Configuration: Disk Groups and V irtual Disks Creating a Security Key When you create a security key , it is generated by and secur ely stored by the array .
Configuration: Disk Gr oups and V irtual Disks 119 The pass phrase that you enter is mask ed. NOTE: Create Key is active only if the pass phrase meets the above mentioned criterion. 5 In Confirm p ass phrase , re-enter the e xact string that you entered in Pa s s phrase .
120 Configuration: Disk Groups and V irtual Disks T o change the security k ey : 1 In the AMW toolbar , select Storage Array Physical Disk Security Change Security K ey . The Confirm Change Security K ey window is d isplayed. 2 Ty p e yes in the text field, and click OK .
Configuration: Disk Gr oups and V irtual Disks 121 Saving a Security Key Y ou save an externally storable copy of the security key when the security key is first creat ed and each time it is changed. Y ou can create additional storable copies at any ti me.
122 Configuration: Disk Groups and V irtual Disks V alidate Security Key A file in which a security key is stor ed is validated through the Va l i d a t e Securi ty K ey dialog. T o transfer , archiv e, or back up the security k ey , the R AID controller module firmwar e encrypts (or wraps) the security key and stor es it in a file.
Configuration: Disk Gr oups and V irtual Disks 123 Befor e you complete this option, mak e sure that the physical disk that you have selected is the corr ect physical di sk.
124 Configuration: Disk Groups and V irtual Disks T o assign or unassi gn hot spar e physical disks: 1 In the AMW , select the Physical tab. 2 Select one or mor e physical disks. 3 P erform one of these actions: • Select Physical disk Hot Spare Coverage .
Configuration: Disk Gr oups and V irtual Disks 125 12 Ty p e yes and click OK . Hot Spares and Rebuild A valuable strategy to protect data is to assign available physica l disks in the storage array as hot spares. A hot spar e a dds another level of fault tolerance to the storage array .
126 Configuration: Disk Groups and V irtual Disks Hot Spare Drive Protection Y ou can use a hot spare physical disk fo r additional data protection from physical disk failur es that occur in a R AID level 1, or R AID level 5 disk group.
Configuration: Disk Gr oups and V irtual Disks 127 CAUTION: Enclosure loss protection is not guar anteed if a phy sical disk has already failed in the disk group. In this situation, losing access to an expansion enclosure and consequently another phy sical disk in the disk group causes a double phy sical disk failure and loss of data.
128 Configuration: Disk Groups and V irtual Disks Host-to-V irtual Disk Mapping After you cr eate virtual disks, you must map them to the host(s) connected to the array . Guidelines to configur e ho st-to-virtual disk mapping: • Each virtual disk in the storage array can be mapped to only one host or host group .
Configuration: Disk Gr oups and V irtual Disks 129 • Each host has its own L UN address space. MDSM permits the same L UN to be used by dif ferent hosts or host groups to a ccess virtual disk s in a storage array . • Not every operating system has the same number of L UNs availa ble.
130 Configuration: Disk Groups and V irtual Disks All defined hosts, host g roups, and the d efault group is d isplayed in the list. NOTE: When configuring an iSCSI storage array , including the MD320.
Configuration: Disk Gr oups and V irtual Disks 131 • Right-click th e virtual disk, an d select Change Mapping from the pop-up menu. 3 In Host group or host, select the appropriate host group or host. By default, the d rop-down list shows the curr ent host group or the host associated with the selected virtual disk.
132 Configuration: Disk Groups and V irtual Disks During a virtual disk copy , the same R AID controlle r module must own both the source virtual disk and the target virtual disk. Some times both virtual disks do no t have the same preferr e d R AID controller module when the virtual disk copy starts.
Configuration: Disk Gr oups and V irtual Disks 133 associated source virtual disk. Ch an ging the R AID controller module ownership of a virtual di sk changes the preferr ed R AID controller module ownership of the virtual disk.
134 Configuration: Disk Groups and V irtual Disks • The disk group must be in Optimal status befor e you can perform this operation. • Y our data remains available during this operation. • If you do not have enough capacity in the disk group to convert to the new R AID level, an error message is displayed, and the operation does not continue.
Configuration: Disk Gr oups and V irtual Disks 135 In this example, the mpath6 device contains two paths: -- /dev/sdf at Host 1, Channel 0, Target 0, LUN 2 --/dev/sde at Host 0, Channel 0, Target 0, L.
136 Configuration: Disk Groups and V irtual Disks Restricted Mappings Many hosts are able to map up to 256 lo gical unit num bers (L UNs) (0 to 255) per storage partition. However , the maximum number of mappings differs because of operatin g system variables, failov er driver issues, and potential data problems.
Configuration: Disk Gr oups and V irtual Disks 137 • Y ou cannot move a host with a r estricted host type into a storage partition that already has L UNs mapped that ar e greater than what is allowed by the restricted host type.
138 Configuration: Disk Groups and V irtual Disks a Change the RAID controller module ownership of a virtual disk—Go to step 2. b Change the RAID controller module ownership of a disk group—Go to step 3. 2 T o change the R AID controller module ownership of a virtual disk, perform these steps: a Select the Lo gi ca l tab.
Configuration: Disk Gr oups and V irtual Disks 139 e Click Ye s . The ownership of the disk group is changed. I/O to the disk group is now directed through this I/O path. Y ou are finished with this procedur e. NOTE: The disk group may not use the new I/O path until the multi-path driver reconfigures and recognizes the new path.
140 Configuration: Disk Groups and V irtual Disks Storage Partitioning A storage partiti on is a logical e ntity co nsisting of one or more virtual disks that can be accessed by a si ngle host or shared among hosts that are part of a host group. The first time you map a virtu al disk to a specific host or host group, a storage partition is created.
Configuration: Disk Gr oups and V irtual Disks 141 NOTE: Y ou can include a secondary virtual di sk in a storag e partition. However , any hosts that are mapped to the secondary virtual disk has read-only access until the virtual disk is promoted to a primary virtual disk, or the mirror relationship is removed.
142 Configuration: Disk Groups and V irtual Disks 5 Click Add . A message prompts you to confirm your se lection. 6 T o add the capacity to the disk group, click Ye s . Y ou can also use the Command Line Interface (CLI) on both W indows and Linux hosts to add free capacity to a disk group.
Configuration: Disk Gr oups and V irtual Disks 143 F or more information, see the P owerV ault Modular Disk Storage Manager online help topics. Disk Group Migration Disk group migration allows to you e xport a disk grou p so that you can import the disk group to a different storage arra y .
144 Configuration: Disk Groups and V irtual Disks 2 Stop all I/O and unmount or dis connect the fil e systems on th e virtual disks in th e disk group . 3 Back up the data on the virt ual disks in the disk group. 4 L ocate the disk group and label the physic al disks.
Configuration: Disk Gr oups and V irtual Disks 145 NOTE: Some settings cannot be import ed during the import disk group procedure. The following settings are remove d/cleared during the procedure: •.
146 Configuration: Disk Groups and V irtual Disks • Recover ed media error—Data could not be re a d b y t h e p h y s i c a l d i s k o n t h e first attempt but was successfully r ead on a subsequent attempt. Data is rewritten to the physical disk and veri fied and the error is reported to the event log.
Configuration: Disk Gr oups and V irtual Disks 147 8 Click OK . Suspendi ng the Media S can Y ou cannot perform a media scan whil e performing another long-running operation on the disk drive such as reconstruction, copy-back, r econfiguration, virtual di sk initialization, or immediate availabil ity formatting.
148 Configuration: Disk Groups and V irtual Disks book.book Page 148 Saturday, Sep tember 24, 2011 9:06 AM.
Configuration: Premium Featur e—Sna pshot Virtual Disks 149 11 Configuration: Premium Feature— Snapshot V irtual Disks NOTE: If you order ed this feature, you recei ved a Premium Feature Activation card shipped in the same box as your Dell PowerV ault MD storage array .
150 Configuration: Premium F eature—Snapshot V irtual Disks repository uses less disk space than a full physical copy , because the only data blocks that ar e stor ed in the snapshot r epository vi rtual disk are those th at have changed sinc e the time of the snapshot.
Configuration: Premium Featur e—Sna pshot Virtual Disks 151 T o implement this backup, select the fi rst virtual disk and create a back up schedule that runs once a day , Monday through F riday , at a time between the end of the work day and 11PM. Do not select an end date.
152 Configuration: Premium F eature—Snapshot V irtual Disks Enabling and D isabling Snapshot Sche dules A scheduled snapshot operation can be temporarily suspended by disabling the schedule. When a schedule is disa bled, the schedule time r continue s to run but any scheduled snapshot operation do not occur .
Configuration: Premium Featur e—Sna pshot Virtual Disks 153 About the Simple Path Using the sim ple path, you can specify : • Snapshot Virtual Disk Name—A us er -s pecified name that hel ps you associate the snapshot virtual d isk to its corr esponding snap shot re pository virtual disk and source virtual disk.
154 Configuration: Premium F eature—Snapshot V irtual Disks NOTE: Mapping the sn apshot virtual disk to the node that does not own the source virtual disk before the Snaps hot enabling process is co mpleted can result in the operating sy stem mis-identifying the snapshot virtual disk.
Configuration: Premium Featur e—Sna pshot Virtual Disks 155 2 In the AMW , select the Log ic al tab and select a valid source virtual disk. 3 Select Vi r t u a l D i s k Snapshot Create . Alternatively , you can rig ht- click the sou rce virtual disk and select Create Snapshot Virtual Disk from the pop-up menu.
156 Configuration: Premium F eature—Snapshot V irtual Disks 13 T o associate the mapping between the storage array name and th e virtual disk name, r un the host-ba sed SMdevices utility . NOTE: If your operating sy stem requires add it ional instru ctions, you can find those instructions in your ope rating sy stem documentation.
Configuration: Premium Featur e—Sna pshot Virtual Disks 157 – Dell recommends placing the snapsh ot repository virtual disk within the disk group of the source virtual disk.
158 Configuration: Premium F eature—Snapshot V irtual Disks The destination of a snapshot repository virtual disk is determined based on the fr ee capacity a vailable in the dis k gr oup. A snapshot repository virtual disk requir es a minimum 8 MB of fr ee capa city .
Configuration: Premium Featur e—Sna pshot Virtual Disks 159 2 Using your W ind ows system, fl ush the cache to th e source. At th e host prompt, type SMrepassist -f <filename-identifier> and press <Enter>. F or more information, see "SMrepassist Utility" on page 257.
160 Configuration: Premium F eature—Snapshot V irtual Disks 3 Select Vi r t u a l D i s k Snapshot Create . Alternatively , you can right- click the source virtual dis k and select Create Snapshot V irtual Disk from the pop-up menu . The Create Snapshot V irtual Disk Wizard - Introduction dialog is displayed.
Configuration: Premium Featur e—Sna pshot Virtual Disks 161 12 Click OK . 13 In the Mappings tab, assign mappings between the snapshot vir tual disk and the host that accesses the snapshot virtual disk. 14 T o r egister the snapshot virtual disk with the host operating system, run the host-based hot_add utility .
162 Configuration: Premium F eature—Snapshot V irtual Disks • The next available sequence numbe r is based on th e number of existing snapshots of a source virtual disk. If you delete a sn apshot virtual disk , its sequence number becom es available again.
Configuration: Premium Featur e—Sna pshot Virtual Disks 163 NOTE: Y ou can add a maximum of two phy sical disks at one time to increase snapshot repository virtual disk capacity . T o e xpand the snapshot r epository virtual disk from MDSM: 1 In the AMW , select the Log ic al tab.
164 Configuration: Premium F eature—Snapshot V irtual Disks 7 If unassigned physical disks are not available, do you have empty s lots in the e xpansion enclosures? • Y e s, there ar e empty slots—Insert new physical disks by using the information in the initial setup guid e f or your expansion enclosure.
Configuration: Premium Featur e—Sna pshot Virtual Disks 165 • Not all of the capacity that is added is used to incr ease the capacity of the snapshot repository virtual disk.
166 Configuration: Premium F eature—Snapshot V irtual Disks Preparing Host Servers to Re-create a Snapsho t Virtua l Disk NOTE: Before you create a new snapshot of a sour ce virtual disk, stop any d.
Configuration: Premium Featur e—Sna pshot Virtual Disks 167 Re-creating Snapshot V irtual Disks Y ou can r e-create a snapsh ot virtual disk that you have previously disabled. CAUTION: Possible loss of data redundancy – If the snapshot virtual disk is in Optima l status, it is fi rst disabled prior to being re-cr eated.
168 Configuration: Premium F eature—Snapshot V irtual Disks The associated snapshot r epository virtu al disk must have sufficient capacity to process the rollback operation and th e write operati ons from the ho st.
Configuration: Premium Featur e—Sna pshot Virtual Disks 169 If an error occurs during the rollback , the operation is paused and the base virtual disk and snapshot virtual di sk displays Ne eds Attention icons. The R AID controller module also logs th e event to the Major Event Log (MEL).
170 Configuration: Premium F eature—Snapshot V irtual Disks 2 Choose one: • Select the snapshot virtual disk, and select Vi r t u a l D i s k Snapshot Rollb ack . • Right-click the snapshot virtual disk and select Rol l b ac k . The Confirm R ollback Snapshot V irtual Disk dialog is dis played.
Configuration: Premium Featur e—Sna pshot Virtual Disks 171 Canceling a Sna pshot Rollback WA RN I N G : Risk of data loss: If you cancel a snapshot rollback in progr ess, the base virtual disk may remain in an unusabl e state and the snapshot virtual disk is displayed as failed in the MD stor age management software.
172 Configuration: Premium F eature—Snapshot V irtual Disks book.book Page 172 Saturday, Sep tember 24, 2011 9:06 AM.
Configuration: Premium Feature—V irtual Disk Copy 173 12 Configuration: Premium Feature— V irtual Disk Copy NOTE: A virtual disk cop y overwrit es data on the target virtual disk. Before starting a virtual disk copy , ensure that you no longer need the data or back up the data on the target virtual disk.
174 Configuration: Premium F eature—V irtual Disk Copy • Copying data for improved access—As your storage requir ements for a virtual disk change, you can use a virtual disk copy to copy data to a virtual disk in a d isk group tha t uses drives with larger capacity within the same storage array .
Configuration: Premium Feature—V irtual Disk Copy 175 the source virtual disk may be rejected by the storage array R A ID controller modules and result in an erro r message. M ake sur e tha t the Read-Only attribute for the target virtual disk is di sabled after the virtual disk copy is complete to pr event error me ssage s from being displayed.
176 Configuration: Premium F eature—V irtual Disk Copy Creating a V irtual Disk Copy for an MSCS Shared Disk T o cr eate a virtual disk copy for a Mi cros oft Cluster Server (MSCS) shar ed disk, create a snapshot of the virtual disk, and then use the snapshot virtual disk as the source for the virtual disk copy .
Configuration: Premium Feature—V irtual Disk Copy 177 • T o enable Read-Only permission, sel ect Change Ta r g e t V i r t u a l D i s k Pe r m i s s i o n s Enable R ead-Only . NOTE: Write requests to the target virt ual disk are rejected when the Read- Only permission is enabled on the target virtual disk.
178 Configuration: Premium F eature—V irtual Disk Copy Creating a V irtual Disk Copy CAUTION: Possible loss of data – Source virt ual disks that are participating in a virtual disk copy are available for read I/ O activity only while a virtual disk copy has a status of In Progress or Pending.
Configuration: Premium Feature—V irtual Disk Copy 179 V irtual Disk Co py and Modificati on Operations If a modifi cation operation is running on a source virtual disk or a target virtual disk, and the virtual disk copy ha s a status o f In P rogress , P ending, or F ailed, the virtual disk copy does not take place.
180 Configuration: Premium F eature—V irtual Disk Copy Preferred RAID Contro ller Module Ownership During a virtual disk copy , the same R AID controlle r module must own both the source virtual disk and the target vi rtual disk.
Configuration: Premium Feature—V irtual Disk Copy 181 A virtual di sk copy autom atically makes the target virtual disk read-only t o hosts. Y o u may want to k eep this attribut e enabled to pr eserve the data on the target virtual disk.
182 Configuration: Premium F eature—V irtual Disk Copy 9 Ty p e yes and clic k Fi n i s h . NOTE: Operation in Progress icons are displa yed on the source virtual disk and the target virtual disk while t he virtual disk copy has a stat us of In Progress or Pending.
Configuration: Premium Feature—V irtual Disk Copy 183 2 In the table, select one or more copy pairs. 3 Select Change Copy P r iority . The Change C opy P riority window is dis played. 4 In the Copy priority area, select the appropriate copy priority , depending on your system performance needs.
184 Configuration: Premium F eature—V irtual Disk Copy Preparing Host Servers to Recopy a V irtual Disk NOTE: Before you create a new copy of a source virtual disk, stop any data access (I/O) activi.
Configuration: Premium Feature—V irtual Disk Copy 185 Re-Copying a V irtual Disk Y ou can use the Copy Manager to create a new virtual disk copy for a selected source virtual disk and a tar get virtual disk. Use th is option when you have stopped a virtual disk copy and want to start it again or when a virtual disk copy has failed or completed.
186 Configuration: Premium F eature—V irtual Disk Copy Removing Copy Pairs Y ou can remove one or more virtual disk copies by using the Copy Manager .
Configuration: Premium Feature—U pgrading to High- Performance-T ier 187 13 Configuration: Premium Feature— Upgrading to High-Performance- Ti e r The High P erformance Tier pr emium feature on an MD3200i Series array increases the performance of the system beyond that o f a MD3200i Series array operating at the standa rd performance le vel.
188 Configuration: Premium Feature—Upgrading to High-Performance-T ier book.book Page 188 Saturday, Sep tember 24, 2011 9:06 AM.
Configuration: Device M apper Multipath for Linux 189 14 Configuration: Device Mapper Multipath for Linux Overview The MD3200i Seri es storage ar ray uses a Li nux operating sy stem softwar e framework , known as Device Mapper (DM), to enable multipath capabilities on Linux Host Servers.
190 Configuration: Device Mapper Multipath for Linux Using DM Multipathing Devices NOTE: Using or modifyin g any nodes other than the multipathi ng device nodes can result in array or file sy stem problems, including loss of communication with the array and corruption of the file sy ste m.
Configuration: Device M apper Multipath for Linux 191 NOTE: Any array s configured with MDCU automa tically adds to the list of Devices in the PowerV ault Modular Disk Storage Manager Enterprise Ma nagement Window (EMW).
192 Configuration: Device Mapper Multipath for Linux Display the multipath device topology using the multipath comman d The multipath command adds newly sca nned and mapped virtual disks to the Device Mapper tables an d creates entries for them in the /dev/mapper dir ectory on the host server .
Configuration: Device M apper Multipath for Linux 193 _ round-robin 0 [prio=1][enabled] _ 6:0:0:22 sdcl 69:144 [active][ghost] where: mpathb is the name of the virtual device cr eated by device mapper .
194 Configuration: Device Mapper Multipath for Linux # ls The followi ng are some examples of the general mapping formats: On RHEL hosts ,a partit ion node has the form at /dev/mapper/mpath<x>p<y>, where <x> is the alphabetic number for the multipathing device, <y> is the partition number for this device.
Configuration: Device M apper Multipath for Linux 195 Blacklist Local Drive in Multi-path Driver If your multipath drivers are connecting to storage ar ea networks (SANs), it may be useful to be able to ex clude or "b lacklist" certain devices in your /etc/m ultipa th.
196 Configuration: Device Mapper Multipath for Linux 2 Stop the Device Mapper multipath service # /etc/init.d/multipathd stop 3 Flush the Device Mapper multipa th maps list to r emove any old or modified mappings # multipath –F NOTE: The boot operating sy stem drive may have an entry with the Device Mapper multipathing table.
Configuration: Device M apper Multipath for Linux 197 Limitations and Known Issues • In certain error conditions with the no_path_retry or the queue_if_no_path feature is set, applications may hang.
198 Configuration: Device Mapper Multipath for Linux • After a failed path is r estored on an MD3600i S eries array , failback does not occur automatically because the driver cannot auto-detect devices without a forced rescan. R un the command rescan_dm_devs to force a rescan of the host server .
Configuration: Device M apper Multipath for Linux 199 I re moved a L UN. But the multipathing mapping is still ther e. The multi pathing device is still there aft er you re mo v e t h e LU N s. Run multipath –f <device node for the delete d LUN> to remove the multipathing mapping.
200 Configuration: Device Mapper Multipath for Linux book.book Page 200 Saturday, Sep tember 24, 2011 9:06 AM.
Management: Firmware Downloads 201 15 Management: Firmware Downloads Downloading RAID Controller and NVSRAM Packages A version number exists for each firm ware file. Th e vers ion num ber indicates whether the firmware is a major versio n or a m inor version.
202 Management: Firmware Downloads Downloading Both RAID Controller and NVSRAM Firmware NOTE: I/O to the array can continue while y ou are upgrading RAID controller and NVSRAM firmware. NOTE: Dell recommends that the firmware and NVSRAM be upgraded during a maintenance period when the array is not being used for I/O.
Management: Firmware Downloads 203 7 Click Tr a n s f e r . K eep these guidelines in mind: –I f t h e Tr a n s f e r button is inactive, e nsure that you either select an NVSR AM file or cl eared the T ransfer NVSR AM file with RAID controller module firmwar e.
204 Management: Firmware Downloads The Select F ile dialog is displ ayed. 13 Select the file to download. 14 Click OK . 15 If you want to downloa d the NVSR AM file with the R AID controller module firmwar e, select Download NVSR AM file with firmware in the Select files ar ea.
Management: Firmware Downloads 205 2 Select Advanced Maintenance Download RA I D C o n t r o l l e r Module NVSRAM or Select the Support tab, and click Download F irmware . In Select download task , select Download R AID controller module NVSRAM and click OK .
206 Management: Firmware Downloads NOTE: The Details pane shows the details of only one storage array at a time. If you select more than one storage array in the Storage array pane, th e details of the storage array s are not shown in the Detai ls pane.
Management: Firmware Downloads 207 disk called DA Cstore. D ACstor e and the physical disk firmware enable easier r econfiguration and migr ation of the physical disks.
208 Management: Firmware Downloads 4 Navigate to the location of the packages and click OK . The selected package is added to the P ackages to be transferred area. 5 Click Next . The Download Physical Disk F irmware - Select Physical Disks window is displayed.
Management: Firmware Downloads 209 •I n t h e A M W , s e l e c t Advanced Maintenance Download EMM F irmware . • Select the Support tab, and click Download F irmware . In the dialog that is displayed, select the EMM firmware , and click OK .
210 Management: Firmware Downloads • The download fail ed—The status of one expansion enclosure shows F ailed and the remainder o f the ex pansion enclosur es show Canceled. Mak e sure that the new firmwar e file is compatible befor e attempting another firmware download.
Management: Installing Array Compone nts 211 16 Management: Installing Array Components Recommended T ools Y ou may need the f ollowing items to pe rform the procedur es in this section: • K ey to the system keylock •# 2 P h i l l i p s s c r e w d r i v e r •W rist grounding stra p book.
212 Management: Installing Array Componen ts Front Bezel (Optional) Removing the Front Bezel 1 Using the system key , unlock the front bezel (if lock ed). 2 Lift up the r elease latch next to the keylock. 3 Rotate the left end of the be zel away from the front panel.
Management: Installing Array Compone nts 213 Hard Drives SAFETY : Models AMT , E03J, and E04J Models AMT , E03J, and E04J ar e intended for installation only in restricted access locations as defined in cl 1.2.7.3 of IEC 60950-1:2005. Depending on your configur ation, your array either supports up to twenty f o u r 2 .
214 Management: Installing Array Componen ts Figure 16-3. Removing and Installing a 2. 5" Hard-Drive Blank (MD3220i Only) Installing a Hard -Drive Blank 1 If installed, r emove the front bezel . See "Removing the F ront Bezel" on page 212.
Management: Installing Array Compone nts 215 2 F rom the Modular Disk Storage Manager (MDSM) software, pr epare the drive for r emoval. W ait until the har d-drive indicators on the drive carrier signal that the drive can be r emoved safely . F or more information, see your controller d ocumentation fo r information about hot-swap drive removal.
216 Management: Installing Array Componen ts Installing a Hard Drive CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troublesh ooting and simple repairs as authorized in your product documentation, or as dir ected by the online or telephone service and support team.
Management: Installing Array Compone nts 217 Figure 16-5. Removing and Installing a Hard Drive Into a 3.5" Hard-Drive Carrier 1 screws (4) 2 hard drive 3 SAS screw hole 4 hard-drive carrie r 2 4 1 3 book.
218 Management: Installing Array Componen ts Figure 16-6. Removing and Installing a Hard Drive Into a 2.5" Hard-Drive Carrier 1 screws (4) 2 hard drive 3 SAS screw hole 4 hard-drive carrier 4 1 3 2 book.
Management: Installing Array Compone nts 219 Installing a Hard Drive Into a Hard-Drive Carrier 1 Insert the hard dr ive into the hard-d rive carrier with the connector end of the drive at the back. See F igure 16-5. 2 Align the screw holes on the hard drive with the back set of holes on the hard-drive carrier .
220 Management: Installing Array Componen ts 5 Connect all the power cables to the array . 6 T urn on the array and the host server . Figure 16-7. Removing and Installing a RAID Controller Module Blan.
Management: Installing Array Compone nts 221 Removing a RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team.
222 Management: Installing Array Componen ts Installing a RAID Controller Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or teleph one service and support team.
Management: Installing Array Compone nts 223 Figure 16-9. Opening and Closing the RAID Controller Module Closing the RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician.
224 Management: Installing Array Componen ts RAID Controller Module Backup Battery Unit Removing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified se rvice technician.
Management: Installing Array Compone nts 225 Installing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by th e online or telephone service and support team.
226 Management: Installing Array Componen ts support team. Damage due to servicing tha t is not authorized by Dell is not covered by your warranty . Read and follow the safe ty instructions t hat came with the product.
Management: Installing Array Compone nts 227 Figure 16-11. Removing and Installing a Power Supply/Cooling Fan Module 1 release tab 2 power supply 3 power supply handle 1 3 2 book.
228 Management: Installing Array Componen ts Installing a Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or teleph one service and support team.
Management: Installing Array Compone nts 229 Control Panel Removing the Control Panel 1 T urn off the array a nd host server . 2 Disconnect all the power cables connected to the array .
230 Management: Installing Array Componen ts Figure 16-14. Removing and Installing t he Control Panel-PowerV ault MD3220i Installing the Co ntrol Panel 1 Align the control panel with the slot on the ar ray . 2 Slide the control panel into the array until: – The release tab clicks into place in P owerV ault MD3200i .
Management: Installing Array Compone nts 231 Backplane CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team.
232 Management: Installing Array Componen ts Figure 16-15. Removing and Installing the RA ID Controller Module/Power Supply Cage 1 screws (6) 2 RAID controller module/power supply cage 2 1 book.
Management: Installing Array Compone nts 233 Figure 16-16. Removing and Installing the Backplane-PowerV ault MD3200i Figure 16-17. Removing and Installing the Backplane-PowerV ault MD3220i 1 screws (5) 2 backplane 3 captive sc rew 1 screws (4) 2 backplane 3 captive sc rew 2 1 3 2 1 3 book.
234 Management: Installing Array Componen ts Installing the Ba ckplane 1 Align the hol es on the back plan e with the holes on the array . 2 Tighten the captive scr ew to secur e the backplane to the chassis. See F igure 16-1 6 for P owerV ault MD3200i or F igure 16-17 for P owerV ault MD3220i.
Management: Firmware Inventory 235 17 Management: Firmware Inventory A storage array is made up of many components, which may include R AID controller modules, physical disks, and enclo sur e management modules (EMMs). Each of these components co ntains firmware.
236 Management: Firmware Inventory book.book Page 236 Saturday, Sep tember 24, 2011 9:06 AM.
Management: Sy stem Interfaces 237 18 Management: Sy stem Interfaces Microsoft Services V irtual Disk Service The Microsoft V irtual Disk Service (VDS) is a component of the W indows operatin g system.
238 Management: Sy stem Interfaces VSS attaches to the service and uses it to coor dinate the cr eation of snapshot virtual disks on the storag e array . VSS-initiated snap shot virtual disks c an be triggere d through backup to ols, known as requestors.
T roubleshooting: Y our Storage Array Software 239 19 T roubleshooting: Y our Storage Array Software Start-Up Routine L ook and listen during t he array ’s start-up routine fo r the indications described in T able 19-1. F o r a descri ption of the front- and back-panel indicators, see "Planning: About Y o ur Storage Array" on page 23.
240 T roubleshooting: Y our Storage Array Software •O n t h e Devices tab, in either the T r ee view or the T able view , double-click a storage array . Alternatively , you can right-click a storage array and select Manage Storage Array from the pop-up men u.
T roubleshooting: Y our Storage Array Software 241 In the T a ble view , every managed storage array is listed once, r egardless of the number of attachment s it has in the T ree view . After the storage array is contacted by MDSM, an icon representing i ts h a rd wa re s t a tu s i s d i sp l a ye d .
242 T roubleshooting: Y our Storage Array Software NOTE: MDSM may take a few minutes to update a status change to Unresponsive or from Unresponsive. A status change from or to Unresponsive depends on th e network link to the storage array . All other status change updates faster .
T roubleshooting: Y our Storage Array Software 243 2 Enter a name for the support data file in Specify filename or click Browse to navigate to a previously saved file to overwrite an existing file. The suffix .zip is added automatically to the file if you do not specify a suffix for the fil e.
244 T roubleshooting: Y our Storage Array Software Collecting the Phy sical Disk Data Y ou can use the Collect Physical Disk Da ta optio n to colle ct log sens e data from all the physical disks on your storage array . L og sense data consists of statistical informat ion that is mainta ined by each of the physical disks in your stor age array .
T roubleshooting: Y our Storage Array Software 245 The event log window shows two types of event views: • Summary view—Shows an even t summary in a table form. • Detail view—Shows details about a selected event. T o view the event log: 1 In the AMW , select Advanced T roubleshooting V iew Event L og .
246 T roubleshooting: Y our Storage Array Software • Alert notification messages that ar e sent to the appropriate de stinations • Hardwar e indicator lights The status icons r eturn to Optimal status as problems are resolved.
T roubleshooting: Y our Storage Array Software 247 b T ype the term that you want to search for in the Fi n d text box. If the term is located on the current tab, the term is highlighted in the storage array profile information. NOTE: The search is limited to the current tab.
248 T roubleshooting: Y our Storage Array Software 2 Select Vi e w Associated Logical Elements . Alternatively , you can right- click the virtual d isk to open a pop-up me nu and select Vi e w Associated L ogical Elements .
T roubleshooting: Y our Storage Array Software 249 • The node name and the R AID level • The node name and the virtual disk capacity T o find nodes: 1 In the AMW , select Vi e w Fi n d . 2 Based on the type of se arch, select one of these options, and go to the indicated s tep: • Search by name – see step 3.
250 T roubleshooting: Y our Storage Array Software b T ype the capacity in the GB box. c Specify that the fr ee capacity to be matched is less than, equal to , or greater than the capacity entered in the GB box. d Go to step 8. 8 Click Fi n d N e x t .
T roubleshooting: Y our Storage Array Software 251 4 Select Vi e w Go T o Source V irtual Disk . The selection jumps to the associated source virtual disk in the Lo gi c a l pane.
252 T roubleshooting: Y our Storage Array Software • ping <host-name> • ping <RAID controller module-IP -address> 7 If the ver ification is successful, see step 8, if not, see step 9. 8 Remove the storage array with the Unresponsive status from the EMW , and s elect Add Storage Array to add the storage array again.
T roubleshooting: Y our Storage Array Software 253 19 If you have recently replaced or added the RAID controller module, restart the host conte xt agent software so that the new R AID controller module is rec o g n i z e d .
254 T roubleshooting: Y our Storage Array Software T o locate the physical disk: 1 Select the Physical tab. 2 Select the physica l disks that you want to locate. 3 Select Physical Disk Blink Physical Disk . The LEDs on the selected physical disks blink.
T roubleshooting: Y our Storage Array Software 255 Locating an Expansion Enclosure Y ou can use the Blink option to physica lly loc ate and i dentify a n expansion enclosure in the storage array . The LED activation varies accor ding to the type of e xpansion enclosure that you have.
256 T roubleshooting: Y our Storage Array Software Capturing the State Information Use the T roubleshootin g Capture State Information option to captur e information about the curr ent state of your stor age array and save the captured information to a te xt file .
T roubleshooting: Y our Storage Array Software 257 SMrepassist Utility SMrepassist (r eplication ass istance) is a host-based utility for W indows platforms.
258 T roubleshooting: Y our Storage Array Software Unidentified Devices An unidentified node or device occu rs when MDSM cannot access a new storage array . Causes for this error include network connection problems, the storage array is turned off, or the storage array does not e xist.
T roubleshooting: Y our Storage Array Software 259 ping <host-name-or-IP-address-of-the-host> . If the network can access the host, co ntinue to step c. If the n etwork cannot access the hos t, go to st ep d. c Remove the host with the unr espon sive status from the MDSM, and add that host again.
260 T roubleshooting: Y our Storage Array Software 5 Mak e sure that the controller firmware is compatible with MDSM on your management station. If the controller firmware was upgraded, the MDSM may not have access to the storage arr ay .
T roubleshooting: Y our Storage Array Software 261 or Click Start Administrative T ools Ser vices . 2 In the Ser vices dialog , select Modular Disk Storage Manager Agent . 3 If the modular disk storage ma nager agent is running, click Action Stop and wait approxim ately 5 seconds.
262 T roubleshooting: Y our Storage Array Software book.book Page 262 Saturday, Sep tember 24, 2011 9:06 AM.
T roubleshooting: Y our Array 263 20 T roubleshooting: Y our Array Safety First—For you and Y our Array CAUTION: Many repairs may only be done by a certified service technician.
264 T roubleshooting: Y our Array T roubleshooting Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troublesh ooting and simple repairs as authorized in your product documentation, or as dir ected by the online or telephone service and support team.
T roubleshooting: Y our Array 265 T roubleshooting Array Cooling Problems CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team.
266 T roubleshooting: Y our Array c Reseat the EMM module and wai t for 30 seconds. See "Removing an EMM" in the MD1200 and MD 1220 Storage Enclosures Hardwar e Owner's Manual . d T urn on the server . e Check the EMM status LED. f If the LED does not turn Gr een, replace the EMM.
T roubleshooting: Y our Array 267 T roubleshooting RAID Controller Modules CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team.
268 T roubleshooting: Y our Array e Check the link status LED. If the link sta tus LED is not gr een, replace the cables. If the problem is not r esolved, see "Getting Help" on page 273. T roubleshooting Hard Drives CAUTION: Many repairs may only be done by a certified se rvice technician.
T roubleshooting: Y our Array 269 T roubleshooting Array and Expansion Enclosure Connections 1 V erify that the RAID controller module po rt link status LED and the R AID controller module status LED are solid green for each port that is connected to a cable.
270 T roubleshooting: Y our Array •H a r d d r i v e s • RAID controller modules • P ower supply/cooling fan modules • Control panel •B a c k p l a n e 3 L et the system dry thoroughly for at least 24 hours. 4 Reinstall the components you removed in step 2.
T roubleshooting: Y our Array 271 T roubleshooting RAID Controller Modules Conditions Certain events can cause a R AID controll er module to fail and/or shut down. Unre coverable ECC m emory or PCI errors , or critical physical conditions can cause lockdown.
272 T roubleshooting: Y our Array PCI Errors The storage array firmware can detect an d only recover from PCI erro rs when the R AID controller modules ar e configur ed for redundancy . If a virtual disk uses cache mirroring , it fails over to its peer R AID controller module, which initiates a flush of the dirty cache.
Getting Help 273 21 Getting Help Contacting Dell F or cus tomers in the United States , call 800- WWW -DELL (800-9 99-3355). NOTE: If you do not have an active Inte rnet connection, you can find contact information on your purchase invoice, packing slip, bill, or Dell product catalog.
274 Getting Help book.book Page 274 Saturday, Sep tember 24, 2011 9:06 AM.
Index 275 Index A Access Virtual Disk, 66 Advanced F eatur e Using Snaps hot and Disk Copy To g e t h e r , 5 4 Advanced F eatur es, 50 Snapshot Repository Virtual Disk, 5 2 Snapshot Virtual Disks, 5 .
Index 276 contacting Dell, 273 control panel installing, 2 3 0 re m o v i n g , 2 2 9 Copy Manager , 180 D Defining a Host, 96 Dell contacting, 2 7 3 Disk Group Creating, 1 0 6 Expansion, 1 4 1 Export.
Index 277 F ree Capa city , 142 front bezel installing, 2 1 2 re m o v i n g , 2 1 2 H hard drive drive carrier , 2 1 6 installing, 2 1 6 re m o v i n g , 2 1 4 Har d-Drive Indicator Pa t t e r n s , .
Index 278 Media Errors and Unreadable Sectors, 210 Medi a Scan Changing setti ngs, 1 4 6 Suspending, 1 4 7 Microsoft Virtual Disk Serv ice, 2 3 7 V olume Shadow-Cop y Service, 2 3 7 Microsoft Services.
Index 279 front bezel, 2 1 2 hard drive, 2 1 4 har d drive from a drive carrier , 2 1 6 power supply/cooling fan module, 2 2 5 Removing Copy P airs, 186 Removing Host Access, 98 Restricted Mappings, 1.
Index 280 Starting or Restarting the Host-Agent Softw are, 2 6 0 Start-Up Routine, 2 3 9 Storag e Array P rofile, 2 4 6 Storage Array Support Data, 2 4 2 Unidentified De vices, 2 5 8 Vi ew in g t h e .
Index 281 Vi r t u a l D i s k O p e r a t i o n s Limit, 45 V irtual Disk Ownership, 55 Vi r t u a l D i s k S t a t e s , 4 0 Vi r t u a l D i s k C o p y Ta r g e t , 5 3 V irtual Disks and Disk Groups, 39 book.
282 Index book.book Page 282 Saturday, Sep tember 24, 2011 9:06 AM.
Een belangrijk punt na aankoop van elk apparaat Dell PowerVault MD3200i (of zelfs voordat je het koopt) is om de handleiding te lezen. Dit moeten wij doen vanwege een paar simpele redenen:
Als u nog geen Dell PowerVault MD3200i heb gekocht dan nu is een goed moment om kennis te maken met de basisgegevens van het product. Eerst kijk dan naar de eerste pagina\'s van de handleiding, die je hierboven vindt. Je moet daar de belangrijkste technische gegevens Dell PowerVault MD3200i vinden. Op dit manier kan je controleren of het apparaat aan jouw behoeften voldoet. Op de volgende pagina's van de handleiding Dell PowerVault MD3200i leer je over alle kenmerken van het product en krijg je informatie over de werking. De informatie die je over Dell PowerVault MD3200i krijgt, zal je zeker helpen om een besluit over de aankoop te nemen.
In een situatie waarin je al een beziter van Dell PowerVault MD3200i bent, maar toch heb je de instructies niet gelezen, moet je het doen voor de hierboven beschreven redenen. Je zult dan weten of je goed de alle beschikbare functies heb gebruikt, en of je fouten heb gemaakt die het leven van de Dell PowerVault MD3200i kunnen verkorten.
Maar de belangrijkste taak van de handleiding is om de gebruiker bij het oplossen van problemen te helpen met Dell PowerVault MD3200i . Bijna altijd, zal je daar het vinden Troubleshooting met de meest voorkomende storingen en defecten #MANUAl# samen met de instructies over hun opplosinge. Zelfs als je zelf niet kan om het probleem op te lossen, zal de instructie je de weg wijzen naar verdere andere procedure, bijv. door contact met de klantenservice of het dichtstbijzijnde servicecentrum.