DellメーカーMD3600Iの使用説明書/サービス説明書
ページ先へ移動 of 282
Dell PowerV ault MD3600i and MD3620i Storage Array s Owner’ s Manual Regulatory Model: E03J Series and E04J Series Regulatory T ype: E03J0 01 and E04J001 book.
Notes, Cautions, and W arnings NOTE: A NOTE indicates important information that helps you make b etter use of your computer . CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WAR N IN G: A WARNING indicates a potential for property damage, personal injury , or death.
Contents 3 Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . 19 About This Document . . . . . . . . . . . . . . . . . . 19 Inside the Box of the De ll PowerV ault MD36 00i Series Storage Array . . . . . . . . . . . . . . . . . . . 19 MD3600i Series Storage Array .
4 Contents 3 Planning: RAID Controller Modules . . . . 31 RAID Controller Modules . . . . . . . . . . . . . . . . 31 RAID Controller Module Connectors and Features . . . 32 RAID Controller Modul e—Addition al Features . . . . . 34 Battery Backup Unit .
Contents 5 Cycle T ime . . . . . . . . . . . . . . . . . . . . . 44 Virtual Disk Operations Limit . . . . . . . . . . . . 45 Disk Group Operations . . . . . . . . . . . . . . . . . . 45 RAID Level Migration . . . . . . . . . . . . . . . . 45 Segment Size Migration .
6 Contents 5 Configuration: Overview . . . . . . . . . . . . 61 User Interface . . . . . . . . . . . . . . . . . . . . . . 61 Enterprise Management Window . . . . . . . . . 62 Array Management Window . . . . . . . . . . . . 63 6 Configuration: About Y our Storage Array .
Contents 7 Setting the Storage Array RAID Controller Module Clocks . . . . . . . . . . . . . . . . . . . 82 7 Configuration: Using iSCSI . . . . . . . . . . . 83 Changing the iSCSI T arget Authentication . . . . . . . 83 Entering Mutual Aut hentica tion Permissions .
8 Contents 9 Configuration: About Y our Host . . . . . . . 95 Configuring Host Access . . . . . . . . . . . . . . . . . 95 Using the Mappings T ab . . . . . . . . . . . . . . . . . 96 Defining a Host . . . . . . . . . . . . . . . . . . . 97 Removing Host Access .
Contents 9 Choosing an Appropriate Phy sical Disk T ype . . . . . . 117 Phy sical Disk Security with Self Encrypting Disk . . . . . . . . . . . . . . . . . . . 117 Creating a Security Key . . . . . . . . . . . . . . . 120 Changing a Security Key . . .
10 Contents Disk Group and Virtual Disk Expan sion . . . . . . . . 143 Disk Group Expansion . . . . . . . . . . . . . . . 143 Virtual Disk Expa nsion . . . . . . . . . . . . . . 144 Using Free Capacity . . . . . . . . . . . . . . . . 144 Using Unconfigured Capacity .
Contents 11 Snapshot Repository Capacity . . . . . . . . . . . . . . 163 Re-Creating Snapshot Virtual Disks . . . . . . . . . . . 166 Disabling a Snapshot V irtual Disk . . . . . . . . . . . . 166 Preparing Host Servers to Re-Create a Snapshot Virtual Disk .
12 Contents Stopping a Virtual Disk Co py . . . . . . . . . . . . . 178 Recopying a V irtual Disk . . . . . . . . . . . . . . . . 179 Preparing Host Ser vers to Recopy a Virtual Disk . . . . . . . . . . . . . . 179 Recopying the V irtual Disk . . . . .
Contents 13 Downloading Both RAID Controller and NVSRAM Firmware . . . . . . . . . . . . . . . . . 198 Downloading Only NVSRAM Firmware . . . . . . . . . 201 Downloading Phy sical Disk Firmware . . . . . . . . . 203 Downloading MD1200 Series Expansion Module EMM Firmware .
14 Contents Installing a RAID Controller Module . . . . . . . 220 Opening the RAID Controller Module . . . . . . . 220 Closing the RAID Controller Module . . . . . . . 221 RAID Controller Module Backup Battery Unit . . . . . 222 Removing the RAID Controller Module Backup Battery Unit .
Contents 15 19 T roubleshooting: Y our Storage Array Software . . . . . . . . . . . . 237 Start-Up Routine . . . . . . . . . . . . . . . . . . . . . 237 Device Health Conditions . . . . . . . . . . . . . . . . 237 Storage Array Support Data . . . . . .
16 Contents Recovering From an Unidentified Storage Array . . . 258 Starting or Restarting the Host Context Agent Software . . . . . . . . . . . . . 261 20 T roubleshooting: Y our Array . . . . . . . . . 263 Safety First—For you and Y our Array . . .
Contents 17 Critical Conditions . . . . . . . . . . . . . . . . . 272 Noncritical Conditions . . . . . . . . . . . . . . . 272 21 Getting Help . . . . . . . . . . . . . . . . . . . . . . 273 Contacting Dell . . . . . . . . . . . . . . . . . . . . . 273 Index .
18 Contents book.book Page 18 Thursday, December 9, 2010 3:20 PM.
Introduction 19 1 Introduction WAR N IN G: See the Safety, Environmental, and Regulatory Information document for important safety information before following any procedures listed in this document. About This Document This document familiarizes you with the function s of the Dell P owerV ault MD3600i Series storage array .
20 Introduction • Mounting rails (2) (optional) • MD3600i Series res ou r c e m e di a • The rack installation ins tructions included with your rack solution describes how to install your encl o.
Introduction 21 Other Information Y ou May Need WAR N IN G: See the safety and regulatory info rmation that shipped with your sy stem. Warranty information may be in cluded within this document or as a separate document. NOTE: All the documents, unless specifie d otherwise, are available at support.
22 Introduction book.book Page 22 Thursday, December 9, 2010 3:20 PM.
Planning: About Y our Storage Array 23 2 Planning: About Y our Storage Array Overview The Dell P owerV ault MD3600i Series storag e array is des igned for high availability , offering redund ant access to data storage. It supports single and dual R AID controller configuration.
24 Planning: About Y our Storage Array Hardware Features Front-Panel Features and Indicators Figure 2-1. Front-Panel Features and Indicators—Dell PowerV ault MD3600i Figure 2-2. Front-Panel Features and Indicators—Dell PowerV ault MD3620i 1 2 3 5 4 6 1 2 3 4 6 5 book.
Planning: About Y our Storage Array 25 Figure 2-3. Front-Bezel Features and Indicators Item Indicator , Button, or Connector Icon Description 1 Enclosure sta tus LED The encl osure status L ED lights when the enclosure power is on. Lights blue during normal operation.
26 Planning: About Y our Storage Array 3 Split mode LED This LED should be unlit as the split mode function is not supported by the MD3600i Series storage arrays. 4 System identification button The system identification button on the front control panel can be use d to locate a particular enclosure with in a rack.
Planning: About Y our Storage Array 27 Back-Panel Featu res and Indicators Figure 2-4. Back-Panel Features and In dicat ors—Dell PowerV aul t MD3600i Series Storage Array 1 600 W power supply/cooling fan module 2 RAID Controller Module 0 3 RAID Controller Module 1 4 600 W power supply/cooling fan module 1 2 3 4 book.
28 Planning: About Y our Storage Array Hard-Drive Indicator Patterns Figure 2-5. Hard Drive Indicators 1 hard-drive activity indicator (green) 2 hard-drive status indicator (green and amber) 1 2 book.
Planning: About Y our Storage Array 29 Power Supply and Cooling Fan Features The MD3600i Series storage array incl udes two integrat ed, hot-swappable power supply/cooling fan modules. Both modules must be in stalled to ensure proper cooling. Each module contains two se parate cooling fans.
30 Planning: About Y our Storage Array Power Indicator Codes Figure 2-6. Power Indicator Codes Item LED T ype Icon Description 1 DC power The LED lights gr een when the DC output voltage is within the limit. If this LED is off, it indicates that the DC output voltage is not within the limit.
Planning: RAID Controller Modules 31 3 Planning: RAID Controller Modules RAID Controller Modules The R AID controller modules provide high-perform ance, advanced virtual disk co nfigurat ion, and fault-tolera nt disk subsystem management.
32 Planning: RAID Controller Modules RAID Controller Module Connectors and Features Figure 3-1. MD3600i Series i SCSI RAID Controller Module Item Component Function 1 SAS OUT port P rovides SAS connec tion for cabling to an e xpansion enclosu re. 2 iSCSI IN port 0 Provides host-to-controller iSCSI 1/10 Gbps Ethernet connection.
Planning: RAID Controller Modules 33 8 Controller power LED Lights green when controller is turned on. Off when controller is not turned on. 9 Controller fault LED Lights amber when controller fault detected. Off when controller operating normally . 10 iSCSI IN port activity LED Lights gr een when there is no activity on connecti on.
34 Planning: RAID Controller Modules RAID Controller Modu le—Additional Features Battery Backup Unit Each R AID controller contains a two- cell lithium ion nanopolymer battery backup unit (BBU). It provides power to the R AID controller module in the event of a power outage.
Planning: RAID Controller Modules 35 Sy stem Password Reset T o reset a for gotten password, push and hold down the password r eset switch for at least 5 s econds. The passwor d is deleted. See F igur e 3-1 to locate the password r eset switch. The R AID controller module allows yo u to change the password.
36 Planning: RAID Controller Modules Write-Throug h Cache In write-through cach e, data is writ ten to the physical disk before completion status is r eturned to t he host operati ng system. W rite-thro ugh cache is considered mor e robust than write-back cache, since a power failure is less likel y to cause loss of data.
Planning: MD3600i Series Storage Array T erms and Concepts 37 4 Planning: MD3600i Series Storage Array T erms and Concepts This chapter describes the storage arra y concepts, which help in configuring and operating the Dell P owerV ault MD3600i Series sto rage arrays.
38 Planning: MD3600i Series St orage Array T erms and Concepts Phy sical Disks Only Dell supported 6.0-Gbps SAS physica l disks are supporte d in the storage array . If the storage array detects unsuppo rted physical disks, it m arks the disk as unsupported and the physical disk be comes unavailable for all operations.
Planning: MD3600i Series Storage Array T erms and Concepts 39 If a disk drive rebuild fails because of a source drive failur e or because the drive is too small, the MDSM r eports a failure of the phy.
40 Planning: MD3600i Series St orage Array T erms and Concepts 3 P rovide host server acces s. 4 Create mappings to associate the vi rtual di sks with the host serv ers. NOTE: Host server access must be cr eated before mapping virtual disks. Disk groups are always created in the un configured capacity of a storage arra y .
Planning: MD3600i Series Storage Array T erms and Concepts 41 RAID Levels R AID levels determine the way in whic h data is written to physical disks. Different R AID levels provide different le vels of accessibility , redundancy , and capacity .
42 Planning: MD3600i Series St orage Array T erms and Concepts I/O performance is greatly improved by spreading the I/O load across many physical disks.
Planning: MD3600i Series Storage Array T erms and Concepts 43 actual storage. RAID 10 is automatically used when a R AID level of 1 is chosen with four or mor e physical disks. R AID 10 works well for medium- sized databases or any environment that requires high performance and fault tolerance and moderate -to-medium capacity .
44 Planning: MD3600i Series St orage Array T erms and Concepts Foreground Initialization The storage array supports fore ground in itialization for vi rtual disks. All access to the virtual disk is block ed du ring for eground init ialization. During foreground initiali zation, zeros ( 0x00) are written to e very sector of the virtual disk.
Planning: MD3600i Series Storage Array T erms and Concepts 45 The storage array tracks the cycle for ea ch disk group independent of other disk groups on the controller a nd create s a checkpoint.
46 Planning: MD3600i Series St orage Array T erms and Concepts Segment Size Migra tion Segment size refer s to the amount of da ta (in kilobytes) that the storage array writes on a physi cal disk in a virtual disk befor e writing data on the ne xt physical disk.
Planning: MD3600i Series Storage Array T erms and Concepts 47 Disk Group Defragmentation Defragmenting consolida tes the free ca pacity in the disk group into one contiguous area. Defragment ation does not change the way in which the data is stored on the virtual disks.
48 Planning: MD3600i Series St orage Array T erms and Concepts • Segment size migration • Disk group expansion • Disk group defragmentation. The priority of each of these operat ions can be changed to address performance requirements of the environment in whi ch the operations are to be e xecut ed.
Planning: MD3600i Series Storage Array T erms and Concepts 49 array , the MD3600i array does not reco gnize the migrating metadata and that data is lost. In this ca se, MD3600i initialize s the physical disks and ma rks them as unconfigured capacity .
50 Planning: MD3600i Series St orage Array T erms and Concepts • Migrating virtual disks to a storage array with no existing physical disks— T urn off the destination storage array , when migrating disk groups or a complete set of physical disks from a storage arra y to another storage array that has no existing physical disks.
Planning: MD3600i Series Storage Array T erms and Concepts 51 • A unique L UN must be used by a host group or host server to access a virtual disk. • Not every operating system has the sa me number of L UNs available for use. Host T ypes A host server is a server that accesses a storage array .
52 Planning: MD3600i Series St orage Array T erms and Concepts Snapshot Virtual Disks A snapshot is a point-in-time image of a virtual disk. The snapshot provides an image of the virtual disk at the time the snapshot was cr eated.
Planning: MD3600i Series Storage Array T erms and Concepts 53 F o r details on mapping the snapshot virtu al disk to the secondary node, r efer to the Dell P owerV ault MD3 600i and MD3620i Storage A rrays With Microsoft Wi n d ow s S e r v e r F ai l o v e r Clusters on support.
54 Planning: MD3600i Series St orage Array T erms and Concepts Virtual Disk Recovery Y ou can use the Edit host server -to-virt ual disk mappings feature to recover data from the backup virtual disk.
Planning: MD3600i Series Storage Array T erms and Concepts 55 The multi-path software identifies the ex istence of multiple paths to a virtual disk and establishes a pr eferred path to that disk.
56 Planning: MD3600i Series St orage Array T erms and Concepts Ownership can later be mo dified to balance worklo ad according to a ctual usage. If virtual disk ownership is not manually balanced, it is possible for one controller to have the majority of the work, while the other controller is idl e.
Planning: MD3600i Series Storage Array T erms and Concepts 57 • Least path weight with subset (Windows operating systems only)—The least queue depth with subset policy is also known as the le ast I/Os or least requests policy . This policy routes the ne xt I/O request to a data path that has the least outstanding I/O requests queued.
58 Planning: MD3600i Series St orage Array T erms and Concepts • R AID Controller modules •V i r t u a l d i s k s • Storage array totals NOTE: By default, all items are selected. b In P olling inter val , select how often you want to update the performance statistics.
Planning: MD3600i Series Storage Array T erms and Concepts 59 The P erformance Monitor data provides information about how your storage array is performing. The data is presented in eight columns, which are described in this table. Use this data to make perf ormanc e tuning decisions for your storage array .
60 Planning: MD3600i Series St orage Array T erms and Concepts book.book Page 60 Thursday, December 9, 2010 3:20 PM.
Configuration: Overview 61 5 Configuration: Overview Dell P owerV ault Modular Disk Stor age Manager (MDSM) online help contains information on the how to use the MDSM application to perform the configuration and mana gement tasks described in this document.
62 Configuration: Overview Enterprise Mana gement Window The EMW provides high-level manageme nt of storage arrays. When you start MDSM, the EMW opens.
Configuration: Overview 63 • Upgrade firmware on multiple storage arrays concurrently . • Obtain information about the firmware inventory including the version of the RAID controller modules, physical disks, and the enclosure management modules (EMMs) in the storage array .
64 Configuration: Overview • Storage partitions • Disk groups and virtual disks • Log i ca l tab—Y ou ca n view the organization of the storage array by virtual disks, disk grou ps, fr ee capacity nod es, and any unconfigur ed capacity for the storage array .
Configuration: About Y our Storage Array 65 6 Configuration: About Y our Storage Array Out-of-Band and In-Band Management Y ou can manage a storage array in two ways: • Out-of -band management • In-band management Out-of-Band Management In the out-of -band management metho d , data is separate from commands and events.
66 Configuration: About Y our Storage Array In-Band Management Using in-band-management, commands, ev ents, and data travel through the host-to-controller interface. Unlike out-of -band management, commands and events are mixed with data. NOTE: For detailed info rmation on settin g up in-band and out-of-band management see the Deployment Guide .
Configuration: About Y our Storage Array 67 NOTE: V erify that your host or management station network configuration — including station IP address, subnet ma sk, and default gateway—is correct before adding a new storage array using the Automatic option.
68 Configuration: About Y our Storage Array • In-band management —Enter a name or an IP ad dress for the Host through which the storage array is attached to the network. NOTE: When adding a storage array using in-band management with iSCSI, a session must first be established between the initiator on the host server and the storage array .
Configuration: About Y our Storage Array 69 • Configure iSCSI host ports—Configure network parameters for each iSCSI host port automatically or spec ify the configuration information for each iSCSI host port.
70 Configuration: About Y our Storage Array Locating Storag e Array s Y ou can use the Blink option to physically locate and identify a storage array . NOTE: If the LEDs from the Blink Storage Array operation do not stop b linking, select Stop All Indications to stop the process manually .
Configuration: About Y our Storage Array 71 The Name/Rename Storage Arrays dialog appears. 2 Select the relevant storage array from the Select storage array table. If you do not know the name or physical location of the storage array , click Blink . After locating the storage array , click OK to turn off the LEDs.
72 Configuration: About Y our Storage Array • Select the Setup tab, and then click Set a Storage Array P assword . • In the AMW , select the Log i ca l tab, right-cl ick and select Set Pa s s w o r d . The Set P assword dialog appears. 3 If you are r esetting the password, type the Current password .
Configuration: About Y our Storage Array 73 Vi ewing Storage Array Conn ections Y ou can use the V iew Connections option to view the expansion enclosures connected to the R AID controller module. T o view the storage array connections: 1 F rom the toolbar in AMW , select Storage Array Vi e w Connections .
74 Configuration: About Y our Storage Array Removing Storage Array s Y ou can remove a storage array from th e list of manage d arrays if you no longer want to manage it from a sp ecific storage management station. Removing a s torage array do es not affect the storage array or its data in any way .
Configuration: About Y our Storage Array 75 Displaying Failover Alert Y ou can change the failover alert delay for a storage array . The fa ilover alert delay lets you delay the logging of a cr itical event if the multi-path driver transfers virtual disks to the non-preferr e d controller .
76 Configuration: About Y our Storage Array Changing Expansion Enclosure ID Numbers When an MD1200 series ex pansion enclosure is connected to an MD3600i Series storage array for the first time, an en cl os ure ID n um be r i s as si gn ed a nd maintained by the expansion enclosure.
Configuration: About Y our Storage Array 77 Configuring Alert Notifications MDSM can send an alert for an y conditio n on the storage array that requir es your attention. Alerts can be sent as e-mail messages or as Simple Network Management P rotocol (SNMP) trap messages.
78 Configuration: About Y our Storage Array • All storage arrays —Select this option to se nd an e-mail alert about events on all storage arrays. • An individual storage array —Select this option to send an e-mail alert about events that occur on on ly a specified storage array .
Configuration: About Y our Storage Array 79 • V alidating an e-mail address—T ype the e-mail address in Email address or select the e-mail address in the Configured email addresses area, and click Te s t . A test e-mail is sent to the selected e-mail address.
80 Configuration: About Y our Storage Array Configuring SNMP Alerts T o add a management console to th e list of addresses configured to receive SNMP alerts: 1 Open the Configure Alerts dialog by perf.
Configuration: About Y our Storage Array 81 • Deleting an SNMP addr ess—Sele ct the SNMP address in the Configured SNMP addresses area, and click Delete . • V alidating an SNMP address—Select the SNMP address in the Configured SNMP addresses are a, and click Te s t .
82 Configuration: About Y our Storage Array Use the following guidelines to adjust the interval: • Y ou can use the default interval. • Y ou can run a learn cycle at any time. • Y ou can set the learn cycle earlier than the currently scheduled time.
Configuration: Using iSCSI 83 7 Configuration: Using iSCSI Changing the iSCSI T arget Authentication T o change the iSCSI ta rget authentication: 1 In the AMW , select the Setup tab. 2 Select Manage iSCSI Setti ngs . The Manage iSCSI Settings window is displa yed and by def ault, the T arget Authentication tab is selected.
84 Configuration: Using iSCSI Entering Mutual Authentication Permissions Mutual authentication or two-way authen t ication is a way for a client or a user to verify themselves to a host serv er , and for the host server to validate itself to the user .
Configuration: Using iSCSI 85 Initiator CHAP Secret The initiator CHAP se cret is set on the host using the iSCSI initiator configuration program provided with th e host operatin g system. If you are using the mutual authentication meth od, you must define the initiator CHAP secret when you set up the host.
86 Configuration: Using iSCSI Changing the iSCSI T arget Identification Y ou cannot change the iSCSI tar get name, but you can associate an alias with the targ et for simpler identification. Aliases are useful because the iSCSI target names are not intuitive.
Configuration: Using iSCSI 87 • Select Specify Configuration , and type the IPv4 address to activate the target discovery . • T ype the iSNS server IP address in the IPv6 settings area to activate the target discovery . After you manually enter an IP addr ess, you can also click Advanced to configure the customized T CP listening ports.
88 Configuration: Using iSCSI 4 In the Configured Ethernet port speed list, select a network speed for the iSCSI host port. The network speed values in the Configured Ethernet port speed list depend on the maximum speed that the network can support. Only the network speeds that are supported ar e displayed.
Configuration: Using iSCSI 89 Advanced iSCSI Host Ports Settings NOTE: Configuring the advanced iSCSI hos t ports settings is optional. Use the advanced settings for the indivi dual iSCSI host ports to specify the TCP frame size, the virtual LA N, and the network priority .
90 Configuration: Using iSCSI Vi ewing or Ending an iSCSI Session Y ou might want to end an iSCSI session for the following reason s: • Unauthorized access—If an initiator is logged on whom you consider to not have access, you can end the iSCSI session.
Configuration: Using iSCSI 91 V iewing iSCSI Statistics and Setting Baseline Statistics T o view iSCS I statistics an d set baseline statistics: 1 In the AMW toolbar , select Storage Array iSCSI Statistics . The Vi e w i S C S I S t a t i s t i c s window is displayed.
92 Configuration: Using iSCSI Edit, Remove, or Rename Host T opology If you give access to the wrong host or the wrong host group, you can r emove or edit the host topology .
Configuration: Event Monitor 93 8 Configuration: Event Monitor An event monitor is provided with De ll P owerV ault Modular Disk Storage Manager (MDSM). The event monitor runs continuous ly in the background and monitors activity on the managed storage arrays.
94 Configuration: Event Monitor Enabling or Disabli ng the Event Monitor Y ou can enable or dis able the eve nt monitor at any time. Disable the event monitor if you do not want the system to send alert notifications.
Configuration: About Y our Host 95 9 Configuration: About Y our Host Configuring Host Access Dell P owerV ault Modular Disk Stor age Mana ger (MDSM) software is comprised of multiple modules. One of these modules is the Host Context Agent, which is installed as pa rt of the MDSM instal lation and runs continuously in the background.
96 Configuration: About Y our Host The host topology is re configurable. Y ou can perf orm the following tasks: • Create a host and assign an alias or user label. • Add or associate a new h ost port identifier to a particul ar host. • Change the host port ide ntifier alias or user label.
Configuration: About Y our Host 97 Defining a Host Y ou can use the Define Host W izar d in the AMW to define a host for a storage array . Eithe r a known unassoci at ed host port identifier or a new host port identifier can be added.
98 Configuration: About Y our Host 7 In Host type, select the relevant operating system for the host. The Host Group Question window is disp layed. 8 In this window , you can select: • Ye s —this host shares access to the same virtual disks with other hosts.
Configuration: About Y our Host 99 Managing Host Groups A host group is a logical enti ty of two or mor e hosts that shar e access to specific virtual disks on th e storage array . Y ou cr eate host groups with MDSM. All hosts in a host group must have the same ho st type (operating system).
100 Configuration: About Y our Host Removing a Host From a Host Group Y ou can remove a host from the To p o l o g y pane on the Mappings tab of the Array Management W indow .
Configuration: About Y our Host 101 Removing a Host Group T o remove a host group: 1 In the AMW , select the Mappings tab, select the hos t node in the To p o l o g y pane. 2 P erform one of these actions: • Select Mappings Rem o v e . • Right-click the host node, a nd select Rem o v e from the pop-up menu.
102 Configuration: About Y our Host Starting or Stopping the Host Contex t Agent The Host Context Agent discovers the host topology . The Host Context Agent starts and stops with the host. T he topolog y discover ed by the Host Context Agent can be viewed by clicking Configure Host Access (Automat ic) in the Configure tab in the MDSM.
Configuration: About Y our Host 103 I/O Data Path Protection Y ou can have multiple host -to- array connect ions for a host. Ensure that you select all the connections to the arra y when configuring host access to the storage array . NOTE: See the Deployment Guide for more information on cabling configurations.
104 Configuration: About Y our Host Managing Host Port Identifiers Y ou can manage the host port iden tifiers that are added to the storage array . Y ou can: • Add—Add or associa te a new host port iden tifier to a particular host. • Edit—Change the host po rt identifier alias or user label.
Configuration: About Y our Host 105 5 Select the method to add a host port iden tifier to the host. Y ou can select: • Add by selecting a known unassociated host port identifier —Select the appropriate host port identifier from the existing list of Known unassociated host port identifiers .
106 Configuration: About Y our Host book.book Page 106 Thursd ay, December 9, 2010 3:20 PM.
Configuration: Disk Groups and Virtual Disks 107 10 Configuration: Disk Groups and V irtual Disks Creating Disk Groups and V irtual Disks Disk groups ar e cr eated in the unconfig ur ed capacity of a storage array , and virtual disks ar e created in the fr ee ca pacity of a disk group.
108 Configuration: Disk Groups and V irtual Disks A disk group should be organized according to its related tasks and subtasks. F or example, if you create a disk gr oup for the Accounting Department,.
Configuration: Disk Gr oups and V irtual Disks 109 3 T ype u p to 30-character name of th e disk group in Disk group name . 4 Select the appropriate Physical Disk selection choices , you can select: • Automati c , see step 6 • Manual , see step 9 5 Click Next .
110 Configuration: Disk Groups and V irtual Disks Locating a Disk Group Y ou can physically locate and identify al l of the physical disks that comprise a selected dis k group. An LED bl inks on each physical disk in the disk group. T o locate a disk group: 1 In the AMW , select the Log i ca l tab.
Configuration: Disk Gr oups and V irtual Disks 111 T o create virtual disks: 1 Choose one of these methods to start the Create Virtual Disk W izard: • T o cr eate a virtual disk from unconfigured capacity in the storage array—On the Log i c al tab, select an Unconfigured Capacity node, and select Vi r t u a l D i s k Create .
112 Configuration: Disk Groups and V irtual Disks 5 In Advanced virtual disk param eters , you can select: • Use recommended settings . • Customize settings . 6 If you sel ect Use recommended settings in Advanced vir tual disk parameters , click Fi n i s h .
Configuration: Disk Gr oups and V irtual Disks 113 4 Select one or more virtual disks. Move the Select modification priority slider bar to the desir ed priority . NOTE: T o select nonadjacent virtual disks, press <Ctrl> click. T o select adjacent virtual disks, pres s <Shift> click.
114 Configuration: Disk Groups and V irtual Disks T o select nona djacent virtual disks, press <Ctrl> click. T o select adjacent virtual disks, press <Shift> click. T o select all of the available virtual disks , click Select All . 4 In the Select cache properties area, you can select: • Enable read caching —to enable read caching.
Configuration: Disk Gr oups and V irtual Disks 115 Changing the Se gment Size of a V irtual Disk Y ou can change the segment size on a selected virtual disk.
116 Configuration: Disk Groups and V irtual Disks The segment size modification ope ration begins. The virtual disk icon in the Lo gical pane shows an Operation in Progress status while the operation is taking place.
Configuration: Disk Gr oups and V irtual Disks 117 The corresponding dy namic cache read pr efetch setting a nd segment size values that are typically well suited for t he selected virtual disk I/O characteristic type are populated in the Dynamic cache read pr efetch and Segment size fields.
118 Configuration: Disk Groups and V irtual Disks All of the physical disks an d R AID contro ller modules in a storage array share the same security key . The shar ed securi ty key provides r ead and write access to the physical disks, while the physical disk encryption key on each phys ical disk is used to encrypt the data.
Configuration: Disk Gr oups and V irtual Disks 119 •S a v e S e c u r i t y K e y F i l e • V alidate Security K ey •U n l o c k D r i v e s NOTE: If you have not created a security key for the storage array , the Create Security Key option is active.
120 Configuration: Disk Groups and V irtual Disks The storage array password protects a storage array from potentially destructive operations by unauthorized users. The storage a rray password is independent from self encrypting disk, and should not be confused with the pass phrase that is used to protect copies of a security ke y .
Configuration: Disk Gr oups and V irtual Disks 121 4 In New password , enter a string for the storage array password. If you are creating the storage array password for the first time, leave Current password blank.
122 Configuration: Disk Groups and V irtual Disks The pass phrase that you enter is mask ed. NOTE: Create Key is active only if the pass phrase meets the above mentioned criterion. 9 In the Confirm pass phrase dialog box, re-enter the ex act string that you entered in the P ass phrase dialog box.
Configuration: Disk Gr oups and V irtual Disks 123 for storage on other media. When you ch ange a security ke y , you also provide information to create a security k ey iden tifier . Changing the security key does not destroy any data. Y ou can change the securi ty key at any tim e.
124 Configuration: Disk Groups and V irtual Disks 6 In Confirm pass phrase , re-ent er the exact string you enter ed in Pa s s phrase . Ma ke a rec o rd of t h e p a ss p hr a se you entered and the security key identifier it is associa ted with. Y ou need this information for late r secure operations.
Configuration: Disk Gr oups and V irtual Disks 125 4 In Confirm pass phrase , re-enter the e xact string you enter ed in Pa s s phrase . Make a r ecord of the pass phrase you entered.
126 Configuration: Disk Groups and V irtual Disks Erasing Secure Phy sical Disks In the AMW , when you select a security enabled physical disk that is not part of a disk group, the Secure Erase menu item i s enabled on th e Physical Disk menu. Y ou can use the secure erase proc edure to r e-provision a physical disk.
Configuration: Disk Gr oups and V irtual Disks 127 • The availability of en closure loss protection for a disk group depends on the location of the physical disks that comprise the disk gr oup. T o make sure that enclosur e loss protection is not affected, you must replace a failed physical disk to ini tiate the copyback process.
128 Configuration: Disk Groups and V irtual Disks 8 Select the relevant Physical disks in the Unassigned physical disks area, as hot spares for the selected disk and click OK . 9 T o unassign ho t spares, in the Hot Spare Coverage window , select physical disks in the Hot spare physical disks area.
Configuration: Disk Gr oups and V irtual Disks 129 Hot Spare Operation When a physical disk fails, the virt ua l disk automatically rebuilds using an available hot spar e. When a r eplacement phys ical disk is install ed, data from the hot spare is copied back to the repl acement physical disk.
130 Configuration: Disk Groups and V irtual Disks hot spare physical disk. T o make sure that encl osure lo ss protection is not affected, you must replace a failed phy sical disk to initiate the copyback process .
Configuration: Disk Gr oups and V irtual Disks 131 Host-to-V irtual Disk Mapping After you create virtual di sks, you must map them to the host(s) connected to the array . Guidelines to configure ho st-to-virtual disk mapping: • Each virtual disk in the storage array can be mapped to only one host or host group.
132 Configuration: Disk Groups and V irtual Disks • Each host has its ow n L UN address space. MDSM permits the same LUN to be used by diff erent hosts or host groups to access virtu al disks in a storage array . • Not every operating system has the same number of L UNs available.
Configuration: Disk Gr oups and V irtual Disks 133 4 In Host group or host , select the appropriate host group or host. All defined hosts, host groups, and the default group app ear in the list.
134 Configuration: Disk Groups and V irtual Disks • Right-click the virtual disk, and select Change Mapping from the pop-up menu. 3 In Host group or host , select the appropriate host group or host. By default, the drop -dow n list shows the cu rrent host grou p or the host associated with the selected virtual disk.
Configuration: Disk Gr oups and V irtual Disks 135 During a virtual disk copy , the same R A ID controller module must own both the source virtual disk and the tar get virtual disk . Sometimes both virtual disks do not have the same pr eferr e d R AID controller module when the virtual disk copy starts.
136 Configuration: Disk Groups and V irtual Disks associated source vi rtual disk. Chan ging the R AID controller module ownership of a virtual disk changes th e preferred R AID controller module ownership of the virtual disk.
Configuration: Disk Gr oups and V irtual Disks 137 Changing the RAID Level of a Disk Grou p Changing the R AID level of a disk group changes the R AID levels of ever y virtual disk that comprises the disk group. P erformance might be slightly affected during the operation.
138 Configuration: Disk Groups and V irtual Disks Guidelines when you work with host types with L UN mapping restrictions: • Y ou cannot change a host adapter port to a restricted host type if there are already mappings in the storage part ition that would ex ceed the limit imposed by the restricted host type.
Configuration: Disk Gr oups and V irtual Disks 139 Changing the RAID Controller Mod ule Ownership of a Virtu al Disk or a Disk Group Y ou can change the R AID controller modu le ownership of a virtual disk or a disk group. Y ou can change the RAID control ler mo dule ownership of a standard virtual disk or a snapshot r epository virtual disk.
140 Configuration: Disk Groups and V irtual Disks d Select the R AID co ntroller modul e. CAUTION: Possible loss of data access—If you do not use a multi-path driver , shut down any host applications that are currently using the virtual disk. This action prevents application erro rs when the I/O path changes.
Configuration: Disk Gr oups and V irtual Disks 141 Changing the RAID Level of a Disk Group Use the Change RA I D L ev e l option to change the R AID level on a selected disk group. Using this op tion changes the RAID leve ls of every virtual disk that comprises the disk group.
142 Configuration: Disk Groups and V irtual Disks When you choose this type of configur ation, all of the hosts must have the same operatin g system and spe cial softwa r e (such as clustering softwar e) to manage virtual disk sharing and accessib ility .
Configuration: Disk Gr oups and V irtual Disks 143 Storage partitioning topology is the co llection of elements, such as Default Group, host groups, hosts, and host ports shown as nodes in the T opology pane of the Mappings tab in the AMW . F or mor e information, see "Using the Mappings T ab" on page 96.
144 Configuration: Disk Groups and V irtual Disks Y ou can also use the Command Line Interface (CLI) on both W indows and Linux hosts to add free capacity to a disk group.
Configuration: Disk Gr oups and V irtual Disks 145 Disk Group Migration Disk group migration allows to you e xport a disk grou p so that you can import the disk group to a different storage arra y . Y o u can also export a disk group so that you can sto re the data offline.
146 Configuration: Disk Groups and V irtual Disks 4 Locate the disk group, and label the physical disks. 5 Place the disk group offline. 6 Obtain blank ph ysical disk modu les or new physical dis ks. On the target storage array : 1 V erify that the target storage array has available physical disk slots.
Configuration: Disk Gr oups and V irtual Disks 147 The following settings are remove d/cleared during the procedur e: • P ersistent reservations • Host-to-virtual disk mappings • Virtual disk co.
148 Configuration: Disk Groups and V irtual Disks • Redundancy mismatches error—The fi rst 10 redundancy mismatches that are found on the virtual disk are r eported to the event log. • Unfixable error—Data could not be read and parity or r edundancy information could not be used to r egenerate the data.
Configuration: Disk Gr oups and V irtual Disks 149 Suspending the Media Scan Y ou cannot perform a m edia scan whil e performing another long-running operation on the disk drive such as reconstruction, copy-back, reconfig uration, virtual disk initialization, or i mmediate availability formatting.
150 Configuration: Disk Groups and V irtual Disks book.book Page 150 Thursd ay, December 9, 2010 3:20 PM.
Configuration: Premium Featur e—Snapshot V irtual Disks 151 11 Configuration: Premium Feature— Snapshot V irtual Disks NOTE: If you ordered this featur e, you recei ved a Premium Feature Activation card shipped in the same box as your Dell PowerVault MD storage array .
152 Configuration: Premium F eature—Snapshot V irtual Disks repository uses less disk space than a full physical copy , because the only data blocks that ar e stor ed in the snapshot r epository virtua l disk are those that have changed since th e time of the snapshot.
Configuration: Premium Featur e—Snapshot V irtual Disks 153 Creating a Snapshot V irt ual Disk Using the Simple Path Y ou can choose the simple path to create a snapshot virtual disk if the disk group of the source virtual disk has th e required amount of free space.
154 Configuration: Premium F eature—Snapshot V irtual Disks • P ercent F ull—When the snapshot repository virtual disk reaches the specified repository full percentage le vel, the event is logged in the Major Event Log (MEL). Th e default sna pshot repository full percentage level is 50 percent of the source vi rtual disk.
Configuration: Premium Featur e—Snapshot V irtual Disks 155 NOTE: Before you create a new snapshot of a source virtual disk, stop any data access (I/O) activity or suspend data transfer to the source virtual disk to ensu re that you capture an accurate snapshot of the source virtual disk.
156 Configuration: Premium F eature—Snapshot V irtual Disks 9 In the AMW , select the Mappings tab, assign mappings between the snapshot virtual disk and the host that accesses the snapshot virtual disk. NOTE: In some cases, conflicts might result from mapping the same host to both a source virtual disk and its ass ociated snapshot vi rtual disk.
Configuration: Premium Featur e—Snapshot V irtual Disks 157 – Use fr ee capacity on the same disk group where the source virtual disk resides. – Use fr ee capacity on another disk group. – Use unconfigur ed capacity and create a new disk group for the snapshot repository virtual disk.
158 Configuration: Premium F eature—Snapshot V irtual Disks The destination of a snapshot repository virtual disk is determined based on the fr ee capacity avail able in the disk gr oup. A snapshot repository virtual disk requir es a minimum of 8 MB fr ee capa city .
Configuration: Premium Featur e—Snapshot V irtual Disks 159 Before creating a snapshot virtual disk, the host server must be in the proper state. T o prepare your host server : 1 Stop all I/O activity to the source. 2 Using your W indows system, flush the cache to the source.
160 Configuration: Premium F eature—Snapshot V irtual Disks Creating the Snapsho t Using the Advanced Pa th NOTE: Removing the drive letter of the as sociated virtual disk in Windows or unmounting the virtual drive in Linux helps to guarantee a stable copy of the drive for the Snapshot.
Configuration: Premium Featur e—Snapshot V irtual Disks 161 9 In the Snapshot repository virtual disk parameters ar ea, ent er the sy stem behavior when: • The snapshot repository virtual disk is full to the selected percentage level. • The snapshot repository virtual disk is full.
162 Configuration: Premium F eature—Snapshot V irtual Disks F or e xample, if you a re cr eating the fi rst snapshot virtual disk for a source virtual disk called Accounting, the default snapsho t virtual disk is Accounting-1, and the associa ted snapsh ot repository virtual disk default name is Accounting-R1.
Configuration: Premium Featur e—Snapshot V irtual Disks 163 Snapshot Repository Capacity If you r eceive a war ning that the capa ci ty for the snapshot reposit ory virtual disk is approaching its t.
164 Configuration: Premium F eature—Snapshot V irtual Disks capacity is available, the maximum free space appears in the Increase capacity by . If free capacity does not e xist on the disk group, the free space that appears in the Increase capacity by spinner box is 0.
Configuration: Premium Featur e—Snapshot V irtual Disks 165 NOTE: The phy sical disks that appear have a capacity that is either the same size or larger than the capa city of t he phy sical disks already being used by the disk group. 9 Select either a single physical disk to add or two physical disks to add.
166 Configuration: Premium F eature—Snapshot V irtual Disks Re-Creating Snapshot V irtual Disks Y ou can re-create a snapshot virtual disk that you have previously disabled. CAUTION: Possible loss of data redundancy — If the snapshot virtual disk is in Optimal status, it is first disabled p rior to being re-created.
Configuration: Premium Featur e—Snapshot V irtual Disks 167 NOTE: If you do not intend to re-create the snaps hot virtual disk at a later time, in the Logical pane, select the s napshot virtual disk, and select Virtual Disk Delete to remove it.
168 Configuration: Premium F eature—Snapshot V irtual Disks 3 Click the Summary tab, then click Disk Groups & V irtual Disks to ensure that the snapshot virtual disk is in Optimal or Disabled status.
Configuration: Premium Feature—V irtual Disk Copy 169 12 Configuration: Premium Feature— V irtual Disk Copy NOTE: A virtual disk copy overwrit es data on the target virtual disk. Before starting a virtual disk copy , ensure that you no longer need the data or back up the data on the target virtual disk.
170 Configuration: Premium F eature—V irtual Disk Copy Reasons to use virtual disk copy include: • Copying data for improved access—As your storage requirements for a virtual disk change, you can use a virtual disk copy to copy data to a virtual disk in a disk group that uses drives with larger capacity within the same storage array .
Configuration: Premium Feature—V irtual Disk Copy 171 V irtual Disk Read/Write Permissions After the virtual disk copy is complete , the tar get virtual disk automatically be co m es rea d- o nl y t o th e h os t s.
172 Configuration: Premium F eature—V irtual Disk Copy Vi rtual Disk Copy Restrictions Before y ou perform any virtual disk copy tasks, understand and adher e to the restrictions listed in this section. The r estrictions apply to the source virtual disk, the target virtual disk, and the storage array .
Configuration: Premium Feature—V irtual Disk Copy 173 journaling file sy stem , any attempt to issue a read request to the source virtual disk might be rejected by the storage array , and an error message might appear . The journaling file sy st em driver issues a write req uest before it attempts to issu e the read request.
174 Configuration: Premium F eature—V irtual Disk Copy Create Copy Wizard The Create Cop y Wizard guides you th rough: 1 Selecting a source virtual disk from a list of available virtual disks 2 Sele.
Configuration: Premium Feature—V irtual Disk Copy 175 Failed RAID Controller Module Y ou must manually change RAID cont roller module ownership to the alternate RAID controller mo dule to allow t he virtual disk copy to complete under all of these conditions: • A virtual disk copy has a status of In Progr ess.
176 Configuration: Premium F eature—V irtual Disk Copy T o prevent write-protected error messa ges from appearing, do not try to access a source virtual disk that is participating in a virt ual disk copy while the virtual disk copy has a status of In Progr ess.
Configuration: Premium Feature—V irtual Disk Copy 177 Storage Array Performanc e During Virtual Disk Copy The following factors contribute to th e overall performance of the storage array : • I/O .
178 Configuration: Premium F eature—V irtual Disk Copy 3 Select Change Copy P riority . The Change Copy P riority window is displayed. 4 In the Copy Pr iority area, select the appropriate copy priority , depending on your system performance need s.
Configuration: Premium Feature—V irtual Disk Copy 179 Recopying a Vi rtual Disk Y ou can recopy a virtual disk when you have stopped a virtual disk copy and you want to start it again or when a virtual disk copy has failed.
180 Configuration: Premium F eature—V irtual Disk Copy 4 Remove the drive letter(s) of the source and (if mounted) virtual disk in W indows or unmount th e virtual drive(s) in Linux to help guarantee a stable copy of the drive f or the virtual disk.
Configuration: Premium Feature—V irtual Disk Copy 181 5 Select Copy Re- Co py . The Re- Co py window is displayed. 6 Set the copy priority . NOTE: There are five copy priority rates avai lable: lowest, low , medium, high, and highest.
182 Configuration: Premium F eature—V irtual Disk Copy book.book Page 182 Thursd ay, December 9, 2010 3:20 PM.
Configuration: Premium Feature—U pgrading to High-Performance-T ier 183 13 Configuration: Premium Feature— Upgrading to High-Performance- Ti e r The High P erfo rmance Tier pr emium feature on an MD3600i Series array increases the performance of the system beyond that of a M D3600i Series array operating at the standard performance level.
184 Configuration: Premium Feature—Upgrading to High-Performance-T ier book.book Page 184 Thursd ay, December 9, 2010 3:20 PM.
Configuration: Device M apper Multipath for Linux 185 14 Configuration: Device Mapper Multipath for Linux Overview The MD3600i Series s torage array uses a Linux operating syste m softwar e framework, k nown as Device Mappe r (DM), to en able multipath capa bilities on Linux Host Servers.
186 Configuration: Device Mapper Multipath for Linux Using DM Multipathing Devices NOTE: Using or modifying any nodes other than the multipathi ng device nodes can result in array or file sy stem problems, including loss of communication with the array and corruption of the file sy ste m.
Configuration: Device M apper Multipath for Linux 187 Using the MDSM software : 1 Map the host server to the MD3600i Series storage array . 2 Create the V irtual Disks.
188 Configuration: Device Mapper Multipath for Linux Scan for Newly Added Virtual Disks The rescan_dm_devs command scans the host server system looking for existing and newly adde d virtual disks mapped to the host server .
Configuration: Device M apper Multipath for Linux 189 The following is an e xample of SLES o utput: mpathb(360080e500017b2f80000c6ca4a1d4ab8) dm-21 DELL,MD32xxi [size=1.
190 Configuration: Device Mapper Multipath for Linux Add a New Partition to Device Mapper The kpartx command adds the new fdisk partition to the Devic e Mapper list of usable partitions. See exampl es below , wher e mpath<x> is the device node on which the partition was cr eated.
Configuration: Device M apper Multipath for Linux 191 Create a File Sy stem on a Device Mapper Partition Use the standard mkfs command to create the file system on the newly created Device Mapper partition.
192 Configuration: Device Mapper Multipath for Linux 3 Flush the Device Mapper multipath maps list to remove any old or modified mappings: # multipath –F NOTE: The boot operating sy stem drive may have an entry with the Device Mapper multipathing table.
Configuration: Device M apper Multipath for Linux 193 Limitations and Known Issues • In certain error conditions with th e no_path_retry or the queue_if_no_path feature is set, applications may hang.
194 Configuration: Device Mapper Multipath for Linux • F ailback can be slow when the host system is experiencing heavy I/O . The problem is exacerbated if the host serv er is also e xperiencing very high CPU utilization. • The Device Mapper Mu ltipath service can be sl ow when the host system is experiencing heavy I/O .
Configuration: Device M apper Multipath for Linux 195 I remo ved a L UN. But the multipathing mapping is still available. The multipathing device is still available after you rem o ve t he LUN s. Run multipath –f <device node for the delete d LUN> to remove the multipathing mapping.
196 Configuration: Device Mapper Multipath for Linux book.book Page 196 Thursd ay, December 9, 2010 3:20 PM.
Management: Firmware Downloads 197 15 Management: Firmware Downloads Downloading RAID Controller and NVSRAM Packages A version number exists for each firm wa re file. The ver s ion number indicates whether the firmware is a major ver sio n or a minor version.
198 Management: Firmware Downloads Downloading Both RAID Controller and NVSRAM Firmware NOTE: I/O to the array can continue while y ou are upgrading RAID controller and NVSRAM firmware. NOTE: It is recommended that the firmwa re and NVSRAM be upgraded during a maintenance period when the array is not being used for I/O.
Management: Firmware Downloads 199 7 Click Tr a n s f e r . Keep these guidelines in mind: –I f t h e Tr a n s f e r button is inactive, ensure that you either sele ct an N V S RA M f i l e o r c l e a r t h e T r a n s f e r N V S RA M f i l e w i t h R A I D c o n t r o l l e r module firmware.
200 Management: Firmware Downloads 13 Select the file to download. 14 Click OK . 15 If you want to download the NVSR AM file with the R AID control ler module firmware, select Download NVSR AM file with firmware in the Select files are a. An y a tt ri b ute s o f t h e f ir mw are fi le ap pe ar in th e Firm wa re f il e i nf or m at io n area.
Management: Firmware Downloads 201 Downloading Only NVSRAM Firmware Use the com mand line inte rface (CLI ) to download and activate NVSRAM to several storage arrays. F or mor e information, see the P owerV ault Modular Disk Storage Manager online help topics.
202 Management: Firmware Downloads 7 P erform one of these actions: • Select T ools Upgrade R AID Controller Module F irmware . • Select the Setup tab, and click Upgrade RA ID Controller Module Fi r m w a r e . The Upgrade R AID Controller Module F irmware window is displa yed.
Management: Firmware Downloads 203 13 Click OK . The Confirm Download dialog appears. 14 Click Ye s . The download starts and a pro gress indi cator appears in the Status column of the Upgrade R AID Controller Module F irmware window .
204 Management: Firmware Downloads • Mak e sure that the firmware that yo u download to the physical disks ar e compatible with the physic al d isks that you select. • Do not make any configuration changes to the storage array while downloading the firmwa re.
Management: Firmware Downloads 205 Downloading MD1200 Series Expansion Module EMM Firmware NOTE: Do not make any configuration changes to the storage array while you are downloading the expansion enclosure EM M firmware. Doing so could cause the firmware download to fail, damage the storage array , or cause loss of data accessibility .
206 Management: Firmware Downloads 6 Click Ye s to continue with the firmware download, NOTE: If you click Stop while a firmware download is in progress, the download-in-progress finishes before t he operation stops. The status for the remaining expansion enclosures changes to Canceled .
Management: Firmware Downloads 207 Media Errors and Unreadable Sectors If the R AID controller detects a medi a error while accessing data from a physical disk that is a member of a disk group with a .
208 Management: Firmware Downloads book.book Page 208 Thursd ay, December 9, 2010 3:20 PM.
Management: Installing Array Components 209 16 Management: Installing Array Components Recommended T ools Y ou may need the fol lowing items to pe rfor m the procedur es in this section: • Key to the system k eylock •# 2 P h i l l i p s s c r e w d r i v e r •W rist grounding stra p book.
210 Management: Installing Array Components Front Bezel (Optional) Removing the Front Bezel 1 Using the system key , unlock the front bezel (if locked). 2 Lift up the release latch next to the k eylock. 3 Rotate the left end of the be zel away from the front panel.
Management: Installing Array Components 211 Hard Drives SAFETY : Models AMT , E03J, and E04J Models AMT , E03J, and E04J are intended for installation only in r estricted access locations as defined in cl 1.2.7.3 of IEC 60950-1:2005. Depending on your configur ation, your array either supports up to 24, 2.
212 Management: Installing Array Components Figure 16-3. Removing and Installi ng a 2.5-Inch Hard-Drive Blank Installing a Drive Blank 1 If installed, remove the front bezel . See "Removing the F ront Bezel" on page 210. 2 Insert the drive blank into the drive bay until the blank is fully seated .
Management: Installing Array Components 213 2 F rom the Modular Disk Storage Manager (MDSM) software, pr epare the drive for re moval. W ait until the hard-drive indicators on the drive carrier signal that the drive can be removed safely . F or more information, see your controller documentation fo r information about hot-swap drive removal.
214 Management: Installing Array Components Installing a Hard Drive CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou should only perform troubleshooting and simple repairs as authorized in your product documentation, or as dir ected by the online or telephone service and support team.
Management: Installing Array Components 215 Removing a Hard Drive From a Hard-Drive Carrier Remove the screws from the slide rails on the har d-drive carrier and separate the hard drive from the carrier . See F igur e 16-5 for P owerV ault MD3600i and F igur e 16-6 for P owerV ault MD3620i.
216 Management: Installing Array Components Figure 16-6. Removing and Installing a Ha rd Drive Into a 2.5-Inch Drive Carrier 1 screws (4) 2 drive carrier 3 SAS screw hole 4 hard drive 2 1 3 4 book.
Management: Installing Array Components 217 Installing a Hard Drive Into a Drive Carrier 1 Insert the hard drive into the har d-d rive carrier with the connector end of the drive at the back. See F igur e 16-5. 2 Align the screw holes on the hard drive with th e back set of holes on the hard-drive carrier .
218 Management: Installing Array Components 5 Connect all the power cables to the array . 6 T urn on the array and the host server . Figure 16-7. Removing and Installing a RAID Controller Module Blank.
Management: Installing Array Components 219 Removing a RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. Y ou should only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team.
220 Management: Installing Array Components Installing a RAID Controller Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou should only perform troubleshooting and si mple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team.
Management: Installing Array Components 221 Figure 16-9. Opening and Closing the RAID Controller Module Closing the RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician.
222 Management: Installing Array Components RAID Controller Module Backup Battery Unit Removing the RAID Controller Module Backup Battery Uni t CAUTION: Many repairs may only be done by a certified se rvice technician.
Management: Installing Array Components 223 Installing the RAID Controller Module Backup Batt ery Unit CAUTION: Many repairs may only be done by a certified service technician.
224 Management: Installing Array Components Power Supply/Cooling Fan Module The array supports two hot-swappable power supply/cooling fan modules. While the array can operate temporaril y wit h one module, both the modules must be present for proper system cooling.
Management: Installing Array Components 225 Figure 16-11. Removing and Installing a Power Supply/Cooling Fan Module 1 release tab 2 power supply 3 power supply handle 1 3 2 book.
226 Management: Installing Array Components Installing a Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou should only perform troubleshooting and si mple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team.
Management: Installing Array Components 227 Control Panel Removing the Control Panel 1 T u rn off the array and host server . 2 Disconnect all the power cables connected to the array . 3 Remove the hard drives from: – slots 0 to 2 in P owerV ault MD3600i – slots 0 to 5 in P owerV ault MD3620i See "Removing a Hard Drive" on page 212.
228 Management: Installing Array Components Figure 16-14. Removing and Installing t he Control Panel—PowerV ault MD3620i Installing the Contro l Panel 1 Align the control panel with the slot on the array . 2 Slide the control panel into the array until: – The r elease tab clicks into place in P owerV ault MD3600i .
Management: Installing Array Components 229 Backplane WAR N IN G: Whenever you need to lift the array , get others to assist you. T o avoid injury , do not attempt to lift the array by yourself. CAUTION: Many repairs may only be done by a certified service technician.
230 Management: Installing Array Components Figure 16-15. Removing and Installing the RA ID Controller Module /Power Supply Cage 1 RAID controller module /power supply cage 2 screws (6) 1 2 book.
Management: Installing Array Components 231 Figure 16-16. Removing and Installing the Backplane—Power V ault MD3600i Figure 16-17. Removing and Installing the Backplane—Power V ault MD3620i 1 screws (5) 2 backplane 3 captive screw 1 screws (4) 2 backplane 3 captive screw 2 1 3 2 1 3 book.
232 Management: Installing Array Components Installing the Back plane 1 Align the holes on the backpl an e with the holes on the array . 2 Tighten the captive scr ew to secure the backplane to the chassis. See F igur e 16-16 for P owerV ault MD3600i or F igur e 16-17 for P owerV ault MD3620i.
Management: Firmware Inventory 233 17 Management: Firmware Inventory A storage array is made up of many components, which might include R AID controller modules, physical disks, and enclosur e manag ement modules (EMMs). Each of these components cont ains firmware.
234 Management: Firmware Inventory book.book Page 234 Thursd ay, December 9, 2010 3:20 PM.
Management: Sy stem Interfaces 235 18 Management: Sy stem Interfaces Microsoft Services Virtual Di sk Service The Microsoft Virtual Disk Service (VDS) is a component of the W indows operating sys tem.
236 Management: Sy stem Interfaces VSS attaches to the service and uses it to coor dinate the cr eation of snapshot virtual disks on the storag e array . VSS-initiated snap shot virtual disks can be triggered through backup to ols, known as requestors.
T roubleshooting: Y our Storage Array Software 237 19 T roubleshooting: Y our Storage Array Software Start-Up Routine Look and listen during the array’s start-up routine fo r the indications described in T able 19-1. F or a descri ption of the front- and back-panel indicators, see "Planning: About Y o ur Storage Array" on page 23.
238 T roubleshooting: Y our Storage Array Software T o launch the AMW , perform one of these actions: •O n t h e Devices tab, in either the T ree view or the T able view , double-click a storage array . Alternatively , you can right-click a storage array and select Manage Storage Array from the pop-up menu.
T roubleshooting: Y our Storage Array Software 239 In the T able view , every managed storage array is listed once, r egardless of the number of attachments it has in the T r ee view . After the storage array has been contacted by MDSM, an icon repres enting its har dware status appears.
240 T roubleshooting: Y our Storage Array Software In the T ree view , icons can appear in a string to convey more information. F or example, the following string means that the storag e array is optimal, an alert is set for the storage array , and fi rmware is available for download.
T roubleshooting: Y our Storage Array Software 241 Storage Array Support Data Y ou can gather various types of inventor y , status, and performance data that can help troubleshoot any problem with the storage array . All the files ar e compressed into a single archive in a zipped-file forma t.
242 T roubleshooting: Y our Storage Array Software NOTE: Enable only one collect support bundle data to a single client sy stem. Setting multiple sy stems to collect data may potentially affect the storage array performance.
T roubleshooting: Y our Storage Array Software 243 • The version number for the management application programming interface (API). • The model ID for the RA ID controller module board.
244 T roubleshooting: Y our Storage Array Software Collecting Phy sical Disk Data Y ou can use the Collect Physical Disk Data option to collect log sense data from all the physical disks on your storage array . Log sense data consists of statistical information that is maintained by each of the physical disks in your stor age array .
T roubleshooting: Y our Storage Array Software 245 Event Log Y ou can use the Event Log V iewer to view a detailed list of events that occur in a storage array . The event log is stored on reserved ar eas on the storage array disks. It r ecor ds confi guration events and st orage array compone nt failur es.
246 T roubleshooting: Y our Storage Array Software Recovery Guru The Recovery Guru is a component of MD SM that diag noses critical even ts on the storage array and recommends step-by-step recovery procedures for problem re solution. In the AMW , to display the Recovery Guru, perf orm one of these actions: •C l i c k Rec ov er y G u ru .
T roubleshooting: Y our Storage Array Software 247 2 P erform one of these actions in the Storage Array P rofile dialog: • V iew detailed information—Go to step 3. • Search the storage array profile—Go to step 4. • Save the storage array profile—Go to step 5.
248 T roubleshooting: Y our Storage Array Software Vi ewing the Logical Associations Y ou can use the Associated L ogical Elements option to view the logical associations among di fferent virtual disks in a storage array .
T roubleshooting: Y our Storage Array Software 249 Finding Nodes Y ou can use the F ind option to sear ch for a particular node on the Log i ca l tab, the Physical tab, or the Mappings tab of the Array Management W indow . The search might be based on a particular node name, the R AID level, virtual disk capacity , or specific fr ee capacity nodes.
250 T roubleshooting: Y our Storage Array Software 7 T o sea rch for all F ree Capacity nodes with a particu lar capacity , perform these steps: NOTE: This option is not available when the Search by name option is selected or from the Mappings tab. Y ou must cancel the selection of the Search by name option to use this option.
T roubleshooting: Y our Storage Array Software 251 2 Select Vi e w Go T o Snapshot V irtual Disk . The selection jumps to the as sociated snapshot virtual d isk in the L ogical pane. 3 Select Vi e w Go T o Snapshot Repository V irtual Disk .
252 T roubleshooting: Y our Storage Array Software • Out-of -band managed storage array—Go to step 6. • In-band managed storage array – Go to step 12.
T roubleshooting: Y our Storage Array Software 253 If you started the host system before you were connected to the RAID controller module in the storage array , the Host Context Agent softwar e will not be able to detect the RAID co ntroller modules.
254 T roubleshooting: Y our Storage Array Software Locating a Phy sical Disk Y ou can use the Locate Physical Disk op tion to physically locate and identify one or more of the physical disks in an e xpansion enclosure by activating physical disk LEDs.
T roubleshooting: Y our Storage Array Software 255 Locating an Expansion Enclosure Y ou can use the Blink option to physica lly lo cate and i dentify an expansio n enclosure in the storage array . The LED activation varies according t o the type of expansion enclosur e that you have.
256 T roubleshooting: Y our Storage Array Software Capturing the State Information Use the T roubleshooting Capture State Inform ation option to captur e information about the current state of your storage array and save the captured information to a te xt file .
T roubleshooting: Y our Storage Array Software 257 SMrepassist Utility SMrepassist (replication assistance) is a host-based utility for W indows platforms.
258 T roubleshooting: Y our Storage Array Software Unidentified Devices An unidentified node or device occu rs when MDSM cannot access a new storage array . Causes for this error include network connection problems, the storage array is turned off, or the storage array does not e xist.
T roubleshooting: Y our Storage Array Software 259 b Make sur e that the network can access the host by using the ping command in the following syntax: ping <host-name-or-IP-address-of-the-host> . If the network can access the host, co ntinue to step c.
260 T roubleshooting: Y our Storage Array Software d Make sur e that the applicable network configuration tasks have been done (for example, the IP addres ses have been assigned to each controller). 5 Make sur e that the controller firmware is compatible with MDSM on your management station.
T roubleshooting: Y our Storage Array Software 261 Starting or Restarting the Host Context Agent Software The Host Context Agent softwar e modu le is the software component that res ides on the server or manageme nt station that communica tes with the MD3600i Series storage arrays.
262 T roubleshooting: Y our Storage Array Software Checking device /dev/sdb (/dev/sg11): Skipping Checking device <n/a> (/dev/sg3): Activating Checking device <n/a> (/dev/sg4): Activating .
T roubleshooting: Y our Array 263 20 T roubleshooting: Y our Array Safety First—For you and Y our Array CAUTION: Many repairs may only be done by a certified service technician.
264 T roubleshooting: Y our Array T roubleshooting Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou should only perform troubleshooting and simple repairs as authorized in your product documentation, or as dir ected by the online or telephone service and support team.
T roubleshooting: Y our Array 265 T roubleshooting Array Cooling Problems CAUTION: Many repairs may only be done by a certified service technician. Y ou should only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team.
266 T roubleshooting: Y our Array c Reseat the EMM module and wait for 30 seconds. See Removing an EMM in the MD1200 and MD1220 Storage Enclosures Hardware Owner's Manual . d T urn on the server . e Check the EMM status LED. f If the LED does not turn gr een, r eplace the EMM.
T roubleshooting: Y our Array 267 wait for up to 5 minutes to chec k if the LED has turned blue. See "Recovery Guru" on page 246. b If following the recovery guru proc edur es does not solve the problem, complete the following procedure to further troubleshoot the array .
268 T roubleshooting: Y our Array T roubleshooting Hard Drives CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou should only perform troubleshooting and simple repairs as authorized in your product documentation, or as dir ected by the online or telephone service and support team.
T roubleshooting: Y our Array 269 T roubleshooting Array and Expansion Enclosure Connections 1 V erify that th e R AID controller module p ort link status LED and the R AID controller module status LE D are solid gr een for each port that i s connected to a cable.
270 T roubleshooting: Y our Array 2 Remove the following components fr om the array . See "Management: Installing Array Comp onents" on page 209. •H a r d d r i v e s • R AID controller modules • P ower supply/cooling fan modules • Control panel •B a c k p l a n e 3 Let the system dry thoroughly for at least 24 hours.
T roubleshooting: Y our Array 271 T roubleshooting RAID Controller Modules Conditions Certain events can cause a R AID controll er module to fail and/or shut down. Unrecoverable ECC memory or PCI errors , or critical physical conditions can cause lockdown.
272 T roubleshooting: Y our Array PCI Errors The storage array firmware can detect an d only recover from P CI errors whe n the R AID controller modules are configur ed for redundancy . If a virtual disk uses cache mirroring, it fails over to its peer R AID controller module, which initiates a flush of the dirty cache.
Getting Help 273 21 Getting Help Contacting Dell F or customers in the United States, call 8 00- WWW -DELL (800 -999-3355). NOTE: If you do not have an active Inte rnet connection, you can find contact information on your purchase invoice, packing slip, bill, or Dell product catalog.
274 Getting Help book.book Page 274 Thursd ay, December 9, 2010 3:20 PM.
Index 275 Index A Access Virtual Disk, 66 Advanced F eature Using Snapshot and Disk Copy To g e t h e r, 5 4 Advanced F eatures , 51 Snapshot Repository Virtual Disk, 5 2 Snapshot Virtual Disks, 5 1 A.
Index 276 Control P anel Installing, 2 2 0 Removing, 2 1 9 Copy Manager , 173 D Defining a Host, 96 Dell Contacting, 2 6 5 Disk Group Creating, 1 0 6 Expansion, 1 4 1 Export, 1 4 3 E x p o r t i n g ,.
Index 277 F r ee Capacity , 142 F ront Beze l Installing, 2 0 2 Removing, 2 0 2 H Hard Drive Drive Carrier , 2 0 6 Installing, 2 0 6 Removing, 2 0 4 Hard-Drive Indi cator Pa t t e r n s , 2 8 Ha rd wa.
Index 278 MDSM, 20 Media Errors and Unreadable Sectors, 200 Media S can Changing Settings, 1 4 6 Suspending, 1 4 7 Microsoft Virtual Disk Servic e, 2 2 7 V olume Sha dow-Copy Service, 2 2 7 Microsoft .
Index 279 EMM blank, 2 0 9 F r ont Bezel, 2 0 2 Hard Drive, 2 0 4 Hard Drive F rom a Drive Carrier , 2 0 6 P ower Supp ly/cooling F an Module, 2 1 5 Removing Copy P airs, 178 Removing Host Access, 9 8.
Index 280 Recovering from an Unr espons ive Storage Array Condition, 2 4 3 Recovery Guru, 2 3 7 Starting or Restarting the Host-Agent Software, 2 5 2 Start-Up Routine, 2 2 9 Storage Array P rofile, 2 .
Index 281 Vir t u a l D i s k O p e ra t io n s Limit, 45 Virtual Disk Ownership, 55 Vir t u a l D i s k S t a te s , 4 0 Vir t u a l D i s kC o p y Ta r g e t , 5 3 Virtual Disks a nd Disk Groups, 39 book.
282 Index book.book Page 282 Thursd ay, December 9, 2010 3:20 PM.
デバイスDell MD3600Iの購入後に(又は購入する前であっても)重要なポイントは、説明書をよく読むことです。その単純な理由はいくつかあります:
Dell MD3600Iをまだ購入していないなら、この製品の基本情報を理解する良い機会です。まずは上にある説明書の最初のページをご覧ください。そこにはDell MD3600Iの技術情報の概要が記載されているはずです。デバイスがあなたのニーズを満たすかどうかは、ここで確認しましょう。Dell MD3600Iの取扱説明書の次のページをよく読むことにより、製品の全機能やその取り扱いに関する情報を知ることができます。Dell MD3600Iで得られた情報は、きっとあなたの購入の決断を手助けしてくれることでしょう。
Dell MD3600Iを既にお持ちだが、まだ読んでいない場合は、上記の理由によりそれを行うべきです。そうすることにより機能を適切に使用しているか、又はDell MD3600Iの不適切な取り扱いによりその寿命を短くする危険を犯していないかどうかを知ることができます。
ですが、ユーザガイドが果たす重要な役割の一つは、Dell MD3600Iに関する問題の解決を支援することです。そこにはほとんどの場合、トラブルシューティング、すなわちDell MD3600Iデバイスで最もよく起こりうる故障・不良とそれらの対処法についてのアドバイスを見つけることができるはずです。たとえ問題を解決できなかった場合でも、説明書にはカスタマー・サービスセンター又は最寄りのサービスセンターへの問い合わせ先等、次の対処法についての指示があるはずです。