DellメーカーPOWERVAULT MD3620Iの使用説明書/サービス説明書
ページ先へ移動 of 292
Dell PowerV ault MD3600i and MD3620i Storage Array s Owner’ s Manual Regulatory Model: E03J Series and E04J Series Regulatory T ype: E03J001 and E04J001 book.
Notes, Cautions, and W arnings NOTE: A NOTE indicates important information that helps you make better use of your computer . CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followe d. WA RN I N G : A W ARNING indicates a potential for property damage, personal injury , or death.
Contents 3 Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . 19 About This Document . . . . . . . . . . . . . . . . . . 19 Inside the Box of the De ll PowerV ault MD3600i Series Storage Array . . . . . . . . . . . . . . . . . . . 19 MD3600i Series Storage Array .
4 Contents 3 Planning: RAID Controller Modules . . . . 31 RAID Controller Modules . . . . . . . . . . . . . . . . 31 RAID Controller Module Connectors and Features . . . . . . . . . . . . . . . . . . . . . . . 32 RAID Controller Modul e— Additional Features .
Contents 5 Media V erification . . . . . . . . . . . . . . . . . 44 Cycle T ime . . . . . . . . . . . . . . . . . . . . . 44 V irtual Disk Operations Limit . . . . . . . . . . . . 45 Disk Group Operations . . . . . . . . . . . . . . . . . . 45 RAID Level Migration .
6 Contents 5 Configuration: Overview . . . . . . . . . . . . 61 User Interface . . . . . . . . . . . . . . . . . . . . . . 61 Enterprise Management Window . . . . . . . . . 62 Array Management Window . . . . . . . . . . . . 63 6 Configuration: About Y our Storage Array .
Contents 7 Setting the Storage Array RAID Controller Module Clocks . . . . . . . . . . . . . . . . . . . 84 7 Configuration: Using iSCSI . . . . . . . . . . . 87 Changing the iSCSI T arget Authentication . . . . . . . 87 Entering Mutual Aut hen tication Permissions .
8 Contents 9 Configuration: About Y our Host . . . . . . . 99 Configuring Host Access . . . . . . . . . . . . . . . . . 99 Using the Mappings T ab . . . . . . . . . . . . . . . . 100 Defining a Host . . . . . . . . . . . . . . . . . . 101 Removing Host Access .
Contents 9 Choosing an Appropriate Phy sical Disk T ype . . . . . . 121 Phy sical Disk S ecurity with Self Encrypting Disk . . . . . . . . . . . . . . . . . . . . . 121 Creating a Security Key . . . . . . . . . . . . . . . 124 Changing a Security Key .
10 Contents Storage Partitioning . . . . . . . . . . . . . . . . . . 147 Disk Group and V irtual Disk Expansion . . . . . . . . 148 Disk Group Expansion . . . . . . . . . . . . . . . 148 V irtual Disk Expansion . . . . . . . . . . . . . . 149 Using Free Capacity .
Contents 11 Creating a Snapshot V irtual Disk Using the Advanced Path . . . . . . . . . . . . . . . . . . . . 162 About the Advanced Path . . . . . . . . . . . . . 162 Preparing Host Servers to Create the Snapshot Using the Advanced Path . . . . . . .
12 Contents Virtual Disk Read/W rite Permissions . . . . . . . . . 182 Virtual Disk Copy Restrictions . . . . . . . . . . . . . 183 Creating a V irtual Disk Copy . . . . . . . . . . . . . . 184 Before you Be gin . . . . . . . . . . . . . . . . . 184 V irtual Disk Copy and Modification Operations .
Contents 13 13 Configuration: Premium Feature— Upgrading to High-Performance-T ier . . . . . . . . . . . . . 193 14 Configuration: Device Mapper Multipath for Linux . . . . . . . . . . . . . . . . 195 Overview . . . . . . . . . . . . . . . . . . . .
14 Contents Media Errors and Unreadable Sectors . . . . . . . . 216 16 Management: Installing Array Components . . . . . . . . . . . . . . . . . 219 Recommended T ools . . . . . . . . . . . . . . . . . . 219 Front Bezel (Optional) . . . . . . . . . . .
Contents 15 Power Supply/Cooling Fan Module . . . . . . . . . . . 234 Removing a Power Supply/Cooling Fan Module . . . . . . . . . . . . . . . . . . . . . 234 Installing a Power Supply/Cooling Fan Module . . . . . . . . . . . . . . . . . . . . . 236 Control Panel .
16 Contents Retrieving T race Buffers . . . . . . . . . . . . . . . . 252 Collecting Phy sical Disk Data . . . . . . . . . . . . . 254 Event Log . . . . . . . . . . . . . . . . . . . . . . . . 255 Recovery Guru . . . . . . . . . . . . . . . . . . . . .
Contents 17 T roubleshooting Storage Array Startup Failure . . . . . 273 T roubleshooting Loss of Communication . . . . . . . . 273 T roubleshooting External Connections . . . . . . . . . 273 T roubleshooting Power Supply/Cooling Fan Module . . . . . .
18 Contents Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 book.book Page 18 Tu esday, September 27, 2011 3 :13 PM.
Introduction 19 1 Introduction NOTE: Unless specified, MD3600i Series represents Dell PowerV ault MD3600i and Dell PowerV ault MD3620i storage array s. WA RN I N G : See the Safety , Environmental, and Regulatory Information document for important safety information before following any procedures listed in this document.
20 Introduction • Mounting rails (2) (optional) • MD3600i Series res o u r c e m e d ia • Rack Installation Instructions • Getting Started W ith Y our System (provides information on enclosure.
Introduction 21 Other Information Y ou May Need WA RN I N G : See the safety and regulatory info rmation that shipped with your sy stem. Warranty information may be in cluded within this document or as a separate document. NOTE: All the documents, unless spe cifie d otherwise, are available at support.
22 Introduction book.book Page 22 Tu esday, September 27, 2011 3 :13 PM.
Planning: About Y our Storage Array 23 2 Planning: About Y our Storage Array Overview The Dell P o werV ault MD3600i Series stor age array is des igned for high availability , offering r edund ant access to data storage. It supports sin gle and dual R AID controller configuration.
24 Planning: About Y our Storage Array Hardware Features Front-Panel Feature s and Indica tors Figure 2-1. Front-Panel Features and Indicators—Dell PowerV ault MD3600i Figure 2-2. Front-Panel Features and Indicators—Dell PowerV ault MD3620i 1 2 3 5 4 6 1 2 3 4 6 5 book.
Planning: About Y our Storage Array 25 Figure 2-3. Front-Bezel Features and Indicators Item Indicator , Button, or Connector Icon Descript ion 1 Enclosu re status LED The encl osure stat us LED lights when t he enclosur e power is on. Lights blue during normal operation.
26 Planning: About Y our Storage Array 3 Split mode LED This LED must be unlit as the sp lit mode function is not support ed by the MD3600i Series storage arrays. 4 System identi fication button The system identification button on the front control panel can be u sed to locate a particula r enclosur e within a rack.
Planning: About Y our Storage Array 27 Back-Panel Features and Indic ators Figure 2-4. Back-Panel Features and In dicat ors—Dell PowerV aul t MD3600i Series Storage Array 1 600 W power supply/cooling fan module 2 RAID Controller Module 0 3 RAID Controller Module 1 4 600 W power supply/cooling fan module 1 2 3 4 book.
28 Planning: About Y our Storage Array Hard-Drive Indicator Patterns Figure 2-5. Hard Drive Indicators 1 hard-drive activity indicator (green) 2 hard-drive status indicator (green and amber) 1 2 book.
Planning: About Y our Storage Array 29 Power Supply and Cooling Fan Features The MD3600i Series storage array incl udes two integrat ed, hot-swappable power supply/cooling fan modules. Both modules must be in stalled to ensure proper cooli ng. The syst em requi res a t least one of the cooling f ans to function to avoid overheating.
30 Planning: About Y our Storage Array Power Indicator Codes and Features Figure 2-6. Power Indicator Codes and Features Item LED T y pe Icon Description 1 DC power The LED lights gr een when the DC output voltage is within the limit. If this LED is off, it indicat es that the DC output voltage is not within the limit.
Planning: RAID Controller Modules 31 3 Planning: RAID Controller Modules RAID Controller Modules The R AID controller modules provi de high-performance, ad vanced virtual disk c onfigurat ion, an d fault-t olera nt disk subsystem managemen t.
32 Planning: RAID Controller Modules RAID Controller Module Connectors and Features Figure 3-1. MD3600i Series i SCSI R AID Controller Module Item Component Function 1 SAS OUT port P rovides SAS connec tion for cabling to an e xpansion enclo sure. 2 iSCSI IN port 0 P rovides host-to-controller iSCSI 1/10 Gbps Ethernet connection.
Planning: RAID Controller Modules 33 8 Controller power LED L ights gr een when controller is turned on. Off when controller is not turned on. 9 Controller fault LED Lights amber when controller fault detected. Off when controller operating normally .
34 Planning: RAID Controller Modules RAID Controller Modu le—Additional Features Battery Backup Unit Each R AID controller contains a two- cell Lithium ion nanopolymer battery backup unit (BBU). It provides power to the R AID controller module in the event of a power outage.
Planning: RAID Controller Modules 35 Sy stem Password Re set T o re set a forgotten passwor d, push and hold down the password r eset switch for at le ast 5 seconds. The passwo rd is deleted. See F igure 3-1 to locate the password r eset switch. The R AID controller module allo ws yo u to change the passwor d.
36 Planning: RAID Controller Modules Write-Thro ugh Cache In write-through ca che, data is written to the physical disk before completion status is r e turned to t he host operati ng system. W rite-thro ugh cache is considered mor e robust than write-back cache, since a power failur e is less lik ely to cause loss of data.
Planning: MD3600i Series Storage Array T erms and Concepts 37 4 Planning: MD3600i Series Storage Array T erms and Concepts This chapter describes the storage arra y concepts, which help in configuring and operating the Dell P owerV ault M D3600i Series storage arrays.
38 Planning: MD3600i Series St orage Array T erms and Concepts Phy sical Disks Only Dell supported 6.0-Gbps SAS physica l disks are supporte d in the storage array . If the storage array detects un suppo rted physical disks, it marks the disk as unsupported and the physical disk be comes unavailable for all op erations.
Planning: MD3600i Series Storage Array T erms and Concepts 39 If a disk drive rebuild fails because of a source drive failur e or because the drive is too small, the MDSM r eports a failur e of the ph.
40 Planning: MD3600i Series St orage Array T erms and Concepts 3 P rovide host server ac cess. 4 Cr eate mappings to associate the vi rtual di sks with the host s ervers. NOTE: Host server access must be cr eated before mapping virtual disks. Disk groups are always created in the un configured capacity of a storage array .
Planning: MD3600i Series Storage Array T erms and Concepts 41 RAID Levels R AID levels determine the way in whic h data is written to physical disks. Different R AID levels provide different le vels of accessibility , r edundancy , and capacity .
42 Planning: MD3600i Series St orage Array T erms and Concepts I/O performance is greatly improved by spreading the I/O load across many physica l disks. Althoug h it o ffers the bes t perform ance o f any RAID level , R AID 0 lacks data re dundancy .
Planning: MD3600i Series Storage Array T erms and Concepts 43 actual storage. R AID 10 is automatically use d when a R AID level of 1 is chosen with four or mor e physical disks. RAID 10 wor ks well for medium- sized databases or any environment that requir es high performance and fault tolerance and moderate -to-medium capacity .
44 Planning: MD3600i Series St orage Array T erms and Concepts Foreground Initialization The storage array supports for eground in itializatio n for virtual disks. All access to the virtual disk is block ed du ring for eground init ialization. During foreground initia lization, zeros (0x 00) are written t o every se ctor of th e virtual disk.
Planning: MD3600i Series Storage Array T erms and Concepts 45 The storage array tracks the cycle for ea ch disk group independent of other disk groups on the controller and crea tes a checkpoint.
46 Planning: MD3600i Series St orage Array T erms and Concepts Segment Size M igration Segment size r efers to the amount of data (in KB) that the st orage array writes on a physical disk in a virtual disk be fore writ ing data on the ne xt physical disk.
Planning: MD3600i Series Storage Array T erms and Concepts 47 Disk Group Defragmentation Defragmenting consol idates the fr ee ca pacity in the disk group into one contiguous area. Defragment ation does not change the way in which the data is stored on the virtual disks.
48 Planning: MD3600i Series St orage Array T erms and Concepts • Segment size migration • Disk group e xpansion • Disk group defragmentation The priority of each of these operations can be chan ged to address performance requirements of the environm ent in which the oper ations are to be e xecut ed.
Planning: MD3600i Series Storage Array T erms and Concepts 49 r ecognize the migrating metadata and that data is lost. In this case, MD3600i storage array initializes the physical disks and marks them as unconfigured capacity .
50 Planning: MD3600i Series St orage Array T erms and Concepts • Migrating virtual disks to a storage array with no existing physical disks— T urn off the destination storage array , when migrating disk groups or a complete set of physical disks from a stor age array to another storage array that has no existing physical dis ks.
Planning: MD3600i Series Storage Array T erms and Concepts 51 Host T ypes A host server is a server that accesses a storage arra y . Host servers are mapped to the virtu al disks and use one or more iSCSI initi ator ports. Host servers have the following attributes: • Host name—A name that uniquely identifie s the host server .
52 Planning: MD3600i Series St orage Array T erms and Concepts Snapshots ar e used to r ecover pr evious versions of files that have changed since the sna pshot was tak en. Snapsh ots ar e implemented using a copy on write algorithm, which m ak es a backup copy of data the instant a wri te occurs to the virtual disk.
Planning: MD3600i Series Storage Array T erms and Concepts 53 • Restore snapshot vir tual disk data to the source virtual disk. V irtual disk copy gene rates a full copy of data from the source virtual disk to the targ et virtual disk in a storage arra y and can be performe d ei ther online or offline.
54 Planning: MD3600i Series St orage Array T erms and Concepts Using Snapsh ot and Disk Copy T ogether Y ou can use the Snapshot Virtual Di sk and Virtual Disk Copy pr emium features together to back up data on th e same storage array , or to restor e the data on the snapshot virtual disk to its original source virtual disk.
Planning: MD3600i Series Storage Array T erms and Concepts 55 controller module owner of a virtual disk after it is cr eated. If a host is connected to only one R AID controller module, th e preferr ed owner must manually be assigne d to the R AID contro ller module that the host can access.
56 Planning: MD3600i Series St orage Array T erms and Concepts Load Balancing A load balance policy is us ed to determine which path is used to process I/O . Multiple options for sett ing the load balance policies le t you optimize I/O performance when mixed host interfaces are configur ed.
Planning: MD3600i Series Storage Array T erms and Concepts 57 Monitoring MD3600i Seri es Sy stem Performance Y ou can use the P erformance Monitor to select virtua l disks and R AID controller modules to monitor or to change the polling interval.
58 Planning: MD3600i Series St orage Array T erms and Concepts Each time the polling interval elapses, the P erformance Monitor queries the storage array again and upda tes the statistics in the table. 5 Click Start . V alues are displayed for the selected stor age arrays in the P erformance Monitor data table.
Planning: MD3600i Series Storage Array T erms and Concepts 59 T able 4-3. Performance Monitor T able Description F or more information, see the online help topics .
60 Planning: MD3600i Series St orage Array T erms and Concepts book.book Page 60 Tu esday, September 27, 2011 3 :13 PM.
Configuration: Overview 61 5 Configuration: Overview Dell P owerV ault Modular Disk Stor age Manager (MDSM) online help contains information on how to use the MDSM application to perform the configuration and management tasks de scribed in this document.
62 Configuration: Overview Enterprise M anagement Windo w The EMW provides high-level manage ment of storage arrays. When you start MDSM, the EMW is displayed.
Configuration: Overview 63 • Obtain information about the firmware inventory including the version of the R AID controller modules, physical disks, a nd the enclosure management modules (EMMs) in the storage array .
64 Configuration: Overview • Disk groups and virtual disks • Lo gi c al tab—Y ou ca n view the organization of the storage array by virtual disks, disk groups, fr ee capacity nodes, and a ny unconfigur ed capacity for the storage array .
Configuration: Overview 65 book.book Page 65 Tu esday, September 27, 2011 3 :13 PM.
66 Configuration: Overview book.book Page 66 Tu esday, September 27, 2011 3 :13 PM.
Configuration: About Y our Storage Array 67 6 Configuration: About Y our Storage Array Out-of-Band and In-Band Management Y ou can manage a storage array in two ways: • Out-of -b and management • In-band ma nagement Out-of-Band Management In the out-of -band management me thod , data is separate from commands and events.
68 Configuration: About Y our Storage Array In-Band Management Using in-band management, commands, events, and data travel through the host-to-controller interface. Unlik e out-of -band management, comm ands and events are mix ed with data. NOTE: For detailed information on settin g up in-band and out-of-band management see the Deployment Guide.
Configuration: About Y our Storage Array 69 NOTE: V erify that your host or management station network configuration— including station IP address, subnet ma sk, and default gateway—is correct before adding a new storage array using the Automatic option.
70 Configuration: About Y our Storage Array • In-band managem ent —Enter a name or an IP address for the Host through which the storage array is attached to the network. NOTE: When adding a storage array using in-band management with iSCSI, a session must first be established between the initiator on the host server and the storage array .
Configuration: About Y our Storage Array 71 • Configure iSCSI host ports—Configure network parameters for each iSCSI host port automatically or spec ify the configuration information for each iSCSI host port.
72 Configuration: About Y our Storage Array Locating Sto rage Array s Y ou can use the Blink option to physically locate and identify a storage array . NOTE: If the LEDs from the Blink Storage Array operation do not stop blinking, select Stop All Indications to stop the process manually .
Configuration: About Y our Storage Array 73 The Name/Rename Storage Arrays dialog is displ ayed. 2 Select the r elevant storage array from the Select storage array table. If you do not know the name or physical location of the storage array , click Blink .
74 Configuration: About Y our Storage Array • Select the Setup tab, and then click Set a Storage Array P assword . • In the AMW , select the Lo gi c al tab, right-cl ick and select Set Pa s s w o r d . The Set P assword dialog is displ ayed. 3 If you are r esetting the password, type the Current password .
Configuration: About Y our Storage Array 75 V iewing Storage Array Connections Y ou can use the V iew Connections option to view the expansion enclosur es connected to the R AID controller module. T o view the storage array connections: 1 F rom the toolbar in AMW , select Storage Array Vi e w Connections .
76 Configuration: About Y our Storage Array Removing Storag e Array s Y ou can remove a storage array from th e list of managed arrays if you no longer want to manage it from a sp ec ific storage management station. Removing a storage array do es not affect the storage array or its data in any way .
Configuration: About Y our Storage Array 77 Displaying Fail over Alert Y ou can change the failover alert delay for a storage array . The failov er alert delay lets you delay the logging of a cr itical event if the multi-path driv er transfers virtual disks to the non-preferr e d controller .
78 Configuration: About Y our Storage Array Changing Expa nsion Enclosure ID Nu mbers When an MD12 00 series ex pansion enclosur e is connected to an MD3600i Series storage array for the first time, an en c l os u re I D n u mb e r i s a s si g ne d a nd maintained by the expansion enclosur e.
Configuration: About Y our Storage Array 79 Configuring Alert Notifications MDSM can send an alert for any conditio n on the storage array that r e quires your attention. Alerts can be sent as e-mail messages or as Simple Networ k Management P rotocol (S NMP) trap message s.
80 Configuration: About Y our Storage Array • All storage arrays —Select this option to se nd an e-mail alert about events on all storage arrays. • An individual storage array —Select this option to send an e-mail alert about events that occur on on ly a specified storage a rray .
Configuration: About Y our Storage Array 81 • V alidating an e-ma il address—T ype the e-mail address in Email address or select the e-mail address in the Configured email addresses area, and click Te s t . A test e-mail is sent to the sele cted e-mail address.
82 Configuration: About Y our Storage Array Configuring SNMP Alerts T o add a management console to the list of addresses configured to receive SNMP alerts: 1 Open the Configure Alerts dialog by perfo.
Configuration: About Y our Storage Array 83 • Replacing an SNMP addr ess—Se lect the SNMP address in the Configured SNMP addresses area, type the r eplacement community name in Community name and the trap destination in Tr a p destination , and click Rep l a ce .
84 Configuration: About Y our Storage Array A learn cycle starts automatically wh en you install a new battery m odule. L earn cycles for batteries in both R AID control ler modules in a duplex s ystem occur simultaneously . L earn cycles are scheduled to start auto matically at regul ar intervals, at the same time and on the sa me day of the week.
Configuration: About Y our Storage Array 85 1 In the AMW , select Storage Array Synchronize R AID Controller Module Clocks . 2 If a password is set, in the Enter P assword dialog, type the current password for the storage array , and click Synchronize .
86 Configuration: About Y our Storage Array book.book Page 86 Tu esday, September 27, 2011 3 :13 PM.
Configuration: Using iSCSI 87 7 Configuration: Using iSCSI Changing the iSCSI T arget Authentication 1 In the AMW , select the Setup tab. 2 Select Manage iSCS I Settings . The Manage iSCSI Sett ings window is dis played and b y default, the T arget Authentication tab is selected.
88 Configuration: Using iSCSI Entering Mutual Authentication Permissions Mutual authentication or two-way authenti cation enables a client o r a user to verify themselves to a host server and fo r the host server to validate itself to the user . This validation is accomplished in such a way that both parties ar e sure of the other ’s ide ntity .
Configuration: Using iSCSI 89 Initiator CHAP Secret The initiator CH AP secret is set on the host using the iSCSI init iator configuration program provided with th e host o perating system. If you are using the mutual authentication meth od, you must def ine the initiator CHAP secret when you set up the host.
90 Configuration: Using iSCSI Changing the iSCSI T arget Identification Y ou cannot change the iSCSI tar get name, but you can associate an a lias with the tar get for simpler identification. Aliases ar e useful because the iSCSI targ et names are not intuitive.
Configuration: Using iSCSI 91 • Select Specify Configuration , and type the IPv4 address to activate the targ et discovery . • T ype the iSNS server IP address in the IPv6 settings area to activate the targ et discovery . After you manually enter an IP address, you can also click Advanced to configure the customized TCP listening ports.
92 Configuration: Using iSCSI 4 In the Configured Ethernet port speed list, select a network speed for the iSCSI host port. The network speed values in t he Configured Ethernet port speed list depend on the maximum speed that the network can support. Only the network speeds that ar e supported are displayed.
Configuration: Using iSCSI 93 Advanced iSCSI Host Ports Settings NOTE: Configuring the advanced iSCSI hos t ports settings is optional. Use the advanced settings for the indivi dual iSCSI host ports to specify the TCP frame size, the virtual LA N, and the network priority .
94 Configuration: Using iSCSI V iewing or Ending an iSCSI Session Y ou may want to end an iSCSI se ssion for the following reasons: • Unauthorized acces s—If an initiator whom you consi der to not have access is logged on , you can en d the iSCSI session.
Configuration: Using iSCSI 95 V iewing iSCSI Statistics and Setting Baseline Statistics T o view iSCSI statis tics an d set baseline statistics: 1 In the AMW toolbar , select Storage Array iSCSI Statistics . The Vi e w i S C S I S t a t i s t i c s window is displayed.
96 Configuration: Using iSCSI Edit, Remove, or Rename Host T opology If you give access to the wro ng host or the wrong host group, you can r e move or edit the host topology .
Configuration: Event Monitor 97 8 Configuration: Event Monitor An event monitor is provided with De ll P owerV ault Modular Disk Sto rage Manager (MDSM). The event monitor runs continuous ly in the background and monitors activity on the managed storage arrays.
98 Configuration: Event Monitor Enabling or Disabli ng the Event Monitor Y ou can enable or disable the event monitor at any time. Disable the event monitor if you do not want the system to send alert notifications.
Configuration: About Y our Host 99 9 Configuration: About Y our Host Configuring Host Access Dell P owerV ault Modular Disk Stor age Manage r (MDSM) software is comprised of multiple modules. One of these modules is the Host Cont ext Agent, which is installe d as part of the MDSM insta l lation and runs continuously in the background.
100 Configuration: About Y our Host The host topology is re configurable. Y ou can perf orm the following tasks: • Cr eate a host and assign an alias or user label. • Add or associate a ne w host port id entifier to a particular h ost. • Change the host p ort identifier alia s or user label.
Configuration: About Y our Host 101 Defining a Host Y ou can use the Define Host W izard in the AMW to define a host for a storage array . Either a known unass ociat ed host port identifier or a new host port identifier can be added.
102 Configuration: About Y our Host The Specify Host T ype window is displayed. 7 In Host type, select the relevant operatin g system for the host. The Host Group Question window is d isplayed. 8 In this window , you ca n select: • Ye s —this host shares access to the same virtual d isks with other hosts.
Configuration: About Y our Host 103 Managing Host Groups A host gro up is a logical entity of two or mor e hosts that shar e access to specific virtual disks on th e storage array . Y ou cr eate host groups with MDSM. All hosts in a host group must have the sam e host type (opera ting system).
104 Configuration: About Y our Host Removing a Host From a Host Group Y ou can remove a host from the To p o l o g y pane on the Mappings tab of the Array Management Wi ndow . F o r more informatio n, see "Rem oving a Hos t Group" on page 105.
Configuration: About Y our Host 105 Removing a Host Group T o r emove a host group: 1 In the AMW , select the Mappings tab, select the host node in the To p o l o g y pane. 2 P erform one of these actions: • Select Mappings Re m o v e . • Right-click the host node, a nd select Re m o v e from the pop-up menu .
106 Configuration: About Y our Host Starting or Stopping the Host Con text Agent The host context agent discovers the host topology and starts and stops with the host. The topolog y discover ed by the Host Context Agent can be viewed by clic king Configure Host Access (A utomatic) in the Configure tab in the MDSM.
Configuration: About Y our Host 107 I/O Data Path Protection Y ou can have multiple host-to-array co nnections for a host. Ensu r e that you select all the connections to the arra y when configuring host access to the storage array . NOTE: See the Deployment Guide for more information on cabling configurations.
108 Configuration: About Y our Host Managing Host Port Identifiers Y ou can m anage the host port identifiers that are added to the storage array . Y ou can: • Add—Add or ass ociate a new hos t port identifier to a p articular host. • Edit—Change the ho st port identifier ali as or us er label.
Configuration: About Y our Host 109 5 Select the method to add a host port identifier to the host. Y ou can select: • Add by selecting a known unassociated host port identifier —Select the appropriate host port identifier from the existing list of Known unassociated host port iden tifiers.
110 Configuration: About Y our Host book.book Page 110 Tuesday, September 27, 2011 3:13 PM.
Configuration: Disk Groups and Virtua l Disks 111 10 Configuration: Disk Groups and V irtual Disks Creating Disk Groups and V irtual Disks Disk groups ar e created in the unconfi g ured capacity of a storage array , and virtual disks ar e created in the fr ee capacity of a disk group.
112 Configuration: Disk Groups and V irtual Disks A disk group must be organized accor ding to its related tasks and subtasks. F or example, if you cr eate a disk gr oup for the Accounting Department,.
Configuration: Disk Gr oups and V irtual Disks 113 3 T ype the name of the disk group (up to 30 characters) in Disk group name . 4 Select the appropriate Physical Disk selection choices , you can select: • A utomatic , see step • Manual , see step 5 Click Next .
114 Configuration: Disk Groups and V irtual Disks Locating a Disk Group Y ou can physically locate and identify al l of the physical disks that comprise a selected disk group. An LED blinks on each physical disk in the disk gro up. T o locate a disk group: 1 In the AMW , select the Lo gi c al tab.
Configuration: Disk Gr oups and V irtual Disks 115 NOTE: Ensure that you create disk gr oups before creating virtual disks. T o cr eate virtual disks: 1 Choose one of these methods to start the Create.
116 Configuration: Disk Groups and V irtual Disks 5 In Advanced virtual disk parameters , you can select: • Use recommended settings . • Customize settings . 6 If you s elect Use recommended settings in Advanced v irtual disk parameters , click Fi n i s h .
Configuration: Disk Gr oups and V irtual Disks 117 4 Select one or more virtual disks. Move the Select modification priority slider bar to the desir ed priority . NOTE: T o select nonadjacent virtual disks, press <Ctrl> click. T o select adjacent virtu al disks, pres s <Shift> click.
118 Configuration: Disk Groups and V irtual Disks T o select nonadjacent virtual disks, press <Ctrl> click. T o s elect adjacent virtual disks, p r ess <Shi ft> click.
Configuration: Disk Gr oups and V irtual Disks 119 Changing the Segment Size of a Virtual Disk Y ou can change the segme nt size on a selected virtual disk.
120 Configuration: Disk Groups and V irtual Disks The segment size modification operation begins. The virtual disk icon in the Lo g i ca l pane shows an Operation in P rogre ss s tatus while the operation is taking place.
Configuration: Disk Gr oups and V irtual Disks 121 The corr esponding dynamic cache read pr efetch se tting and segment siz e values that are typically well suited for the selected virtual disk I/O characteristic type are populated in the Dynamic cache read prefetch field and the Segment size field .
122 Configuration: Disk Groups and V irtual Disks the physical disks and R AID controller modules in a storage array sh are the same security k ey . The shared securit y key provides r ead and write access to the physical disks , while the physical disk encryption key on each physical disk is used to encrypt the data.
Configuration: Disk Gr oups and V irtual Disks 123 •S a v e S e c u r i t y K e y F i l e • V alidate Security K ey •U n l o c k D r i v e s NOTE: If you have not created a security key for the storage array , the Create Security Key option is active.
124 Configuration: Disk Groups and V irtual Disks The storage array password protects a storage array from potentially destructive operations by unauthorized users. The stora ge array passwo r d is independent from self encrypting disk and must not be confused with the pass phrase tha t is used to protect copies o f a security k ey .
Configuration: Disk Gr oups and V irtual Disks 125 4 In New password , enter a string f or the storage array password. If you are creating the storage array password for the first time, leave Current password blank.
126 Configuration: Disk Groups and V irtual Disks The pass phrase that you enter is mask ed. NOTE: Create Key is active only if the pass phrase meets the above mentioned criterion. 9 In the Confirm pass phrase dialog box, re-enter the e xact string that you entered in the P ass phra se dialog box.
Configuration: Disk Gr oups and V irtual Disks 127 for storage on other media. When you ch ange a security key , you also provide information to create a security k ey iden tifier . Changing the security k ey does not destroy any data. Y ou can change the secu rity key at an y time.
128 Configuration: Disk Groups and V irtual Disks 6 In Confirm pass phrase , r e-enter the exact strin g you entere d in Pa s s phrase . M a ke a re c ord of t h e p a s s p h r a se you enter ed and the security k ey identifier it is associated with.
Configuration: Disk Gr oups and V irtual Disks 129 4 In Confirm p ass phrase , re-enter the e xact string you enter ed in Pa s s phrase . Mak e a record of the pass phrase you entered.
130 Configuration: Disk Groups and V irtual Disks Erasing Secure Phy sical Disks In the AMW , when you select a security enabled physical disk that is not part of a disk group, the Secure Erase menu it em is enabled on t he Physical Dis k menu. Y ou can use the secure erase proc edure to r e-provision a physical disk.
Configuration: Disk Gr oups and V irtual Disks 131 • The availabili ty of enclos ur e los s protection for a disk group depends on the location of the physical disks that comprise the disk group. T o make sure that enclosur e loss protection is not affected, you must replace a failed physical disk to initiate the copyback process.
132 Configuration: Disk Groups and V irtual Disks 8 Select the relevant physical disks i n the Unassigned physical disks area, as hot spar es for the selected disk and click OK . 9 T o unassi gn hot spares, in the Hot Spare Coverage window , select the physical disks in the Hot spare physical disks area.
Configuration: Disk Gr oups and V irtual Disks 133 Hot Spare Op eration When a physical disk fails , the virtua l disk automatically rebuilds using an available hot spa re. When a r eplacem ent physical disk is install ed, data from the hot spare is copied back to the repl acement physical disk.
134 Configuration: Disk Groups and V irtual Disks spare physical disk. T o make sur e that enclosur e loss protection is not affected, you must re place a failed phy sical disk to initiate the copyback proce ss.
Configuration: Disk Gr oups and V irtual Disks 135 Host-to-V irtual Disk Mapping After you creat e virtual di sks, you must map them to the host(s) connected to the array . Guidelines to configure ho st-to-virtual disk mapping: • Each virtual disk in the storage array can be mapped to only one host or host group.
136 Configuration: Disk Groups and V irtual Disks • Each host has i ts own L UN address space. MDSM permits t he same L UN to be used b y different hosts or host grou ps to access virtual d isks in a storage array . • Not every operating system has the same number of L UNs available.
Configuration: Disk Gr oups and V irtual Disks 137 4 In Host group or host , select the approp riate host group or hos t. All defined hosts, host groups, and the defau lt group are displayed in the list.
138 Configuration: Disk Groups and V irtual Disks • Select a s ingle virtual disk , and select Mappings Change Mapping . • Right-click the virtual disk, and select Change Mapping from the pop-up menu. 3 In Host group or host , select the appropriate host group or host.
Configuration: Disk Gr oups and V irtual Disks 139 associated source virtual disk. Ch an ging the R AID controller module ownership of a virtual di sk changes the preferr ed R AID controller module ownership of the virtual disk.
140 Configuration: Disk Groups and V irtual Disks Y ou can change the R AID controller modu le ownership of a standar d virtual disk or a snapshot repository virtual disk.
Configuration: Disk Gr oups and V irtual Disks 141 Changing the RAID Level of a Disk Grou p Changing the R AID level of a disk group chang es the RAI D levels of every virtual disk that comprises the disk group. P erformance m ay be slightly affected during the operation.
142 Configuration: Disk Groups and V irtual Disks [size=1.6T][features=3 queue_if_no_path pg_init_retries 50][hwhandler=1 rdac] _ round-robin 0 [prio=6][active] _ 1:0:0:2 sdf 8:80 [active][ready] _ ro.
Configuration: Disk Gr oups and V irtual Disks 143 • If a new L UN is mapped, the new L U N is detected and given a multi- pathing device node • If you increased volume capacity , the new capacity is displayed. Restricted Mappings Many hosts ar e able to map up to 256 L U Ns (0 to 255) per storage partition.
144 Configuration: Disk Groups and V irtual Disks • I f t h e re i s a h o s t w i th a res t ri c t ed h o st ty p e th a t i s p ar t of a sp e c if i c s t o ra g e partition, all of the hosts in that storage partition are limited to the maximum number of L UNs allowed by the re stricted host type.
Configuration: Disk Gr oups and V irtual Disks 145 disk c opy , ownership of the tar get virtual disk is al so changed. Under certain operating system environments, it may be necessar y to r econfigur e the multi- path driver befor e an I/O path can be used.
146 Configuration: Disk Groups and V irtual Disks CAUTION: Possible loss of data access—Changing ownership at the disk group level causes every virtual disk in that disk group to transfer to the other RAID controller module and use the new I/O path.
Configuration: Disk Gr oups and V irtual Disks 147 Storage Partitioning A storage partition is a logi cal entit y consisting of one or mor e virtual disks that can be accessed by a single host or shar ed among ho sts that are part of a host group.
148 Configuration: Disk Groups and V irtual Disks • All mappings are defined. NOTE: Y ou can include a secondary virtual disk in a storage partition. However , any hosts that are mapped to the secondary virtual disk has read- only access until the virtual disk is promot ed to a primary virtual disk, or the mirror relati onship is removed.
Configuration: Disk Gr oups and V irtual Disks 149 NOTE: Y ou cannot mix different media types or diff erent interface types within a single disk group or virtual disk. 5 Click Add . A message promp ts you to confirm you r selection. 6 T o add the capacity to the disk group, click Ye s .
150 Configuration: Disk Groups and V irtual Disks capacity , in the form of unassigned phys ical disks to the dis k group of the standard virtual disk or the snapshot re pository virtual disk. See "Disk Group Expansion" on page 148. F or more inform ation, see the P owerV ault Modular Disk Storage Manager online help topic s.
Configuration: Disk Gr oups and V irtual Disks 151 Exporting a Disk Grou p On the source storage array: 1 Save the storage array configuration. 2 Stop all I/O and u nmount or disconnect the fi le systems on the virtu al disks in the disk group. 3 Back up the data on the virt ual d isks in the dis k group.
152 Configuration: Disk Groups and V irtual Disks 2 Review the Import Report for an overview of the disk group that you ar e impo rting . 3 Check for non-importable components. 4 Confirm that you want to proceed with the import procedure. NOTE: Some settings cannot be imported during the import disk group procedure.
Configuration: Disk Gr oups and V irtual Disks 153 error is reported to the event log. F or virtual disks without redundancy protection (R AID level 1, RAID level 5, and R AID level 6 virtual disks), the error is not corrected but is r eported to the event log.
154 Configuration: Disk Groups and V irtual Disks NOTE: A consistency check scans the data bl ocks in a RAID level 5 virtual disk, or a RAID level 6 virtual disk and checks the consistency information for each block. A consistency check compares data blo cks on RAID level 1 mirrored phy sical disks.
Configuration: Premium Featur e—Sna pshot Virtual Disks 155 11 Configuration: Premium Feature— Snapshot V irtual Disks NOTE: If you order ed this feature, you recei ved a Premium Feature Activation card shipped in the same box as your Dell PowerV ault MD storage array .
156 Configuration: Premium F eature—Snapshot V irtual Disks repository uses less disk space than a full physical copy , because the only data blocks that ar e stor ed in the snapshot r epository vi rtual disk are those th at have changed sinc e the time of the snapshot.
Configuration: Premium Featur e—Sna pshot Virtual Disks 157 Scheduling a Snapshot V irtual Disk When you cr eate a snapshot virtual disk, you can choose whether the snapshot is created immediately or is cr eated according to a schedule that you determine.
158 Configuration: Premium F eature—Snapshot V irtual Disks F or more informat ion on creating snap sh ot virtual disk sche dules, see the following sections on creating snapshots.
Configuration: Premium Featur e—Sna pshot Virtual Disks 159 F o r mor e information on sche duling snapshots virtual disks, see the P owerV ault Modular Disk Storage Manager online help topics and the CLI Guide .
160 Configuration: Premium F eature—Snapshot V irtual Disks Using the simple path, the following de faults ar e used for the other parameters of a snapshot virtual disk: • Capacity Allocation—T he snapshot repository vir tual disk is created using fr ee capacity on the same disk group wher e the source virtual disk resides.
Configuration: Premium Featur e—Sna pshot Virtual Disks 161 • Y ou cannot create a snapshot of a vir tual disk that contains unreadable sectors. • Y ou must satisfy the r equirements of your host o perating system for creating snapshot virtual disks.
162 Configuration: Premium F eature—Snapshot V irtual Disks 8 Enter the snapshot repository virtual di sks capacity as a percentage of the source virtual disk s capacity and click Next . The Pr e v i e w window containin g the summary of th e snapshot vir tual disk is displ ayed.
Configuration: Premium Featur e—Sna pshot Virtual Disks 163 • Snapshot Virtual Disk Name—A us er -s pecified name that hel ps you associate the snapshot virtual d isk to its corr esponding snap shot re pository virtual disk and source virtual disk.
164 Configuration: Premium F eature—Snapshot V irtual Disks • Schedule—Cr eates the snapshot virt ual dis k at a specified time, or accord ing to a regularly occurring interv al. If no schedule is specified, the snapshot operation begins i mmediately .
Configuration: Premium Featur e—Sna pshot Virtual Disks 165 • Y ou cannot create a snapshot of a vir tual disk that contains unreadable sectors. • Y ou must satisfy the r equirements of your host o perating system for creating snapshot virtual disks.
166 Configuration: Premium F eature—Snapshot V irtual Disks If you want to use a snapshot regu larly , such as for backups, use the Disable Snaps hot and Re -c r e at e S n a ps h o t options to r euse the snapshot.
Configuration: Premium Featur e—Sna pshot Virtual Disks 167 8 In the Snapshot virtual disk parameters area, select the relevant mapping option, you can select: • A utomatic • Map later 9 In the .
168 Configuration: Premium F eature—Snapshot V irtual Disks The default name for the associated snap shot r epository virtual disk that is shown in the Snapshot reposito ry virtual disk field is: &l.
Configuration: Premium Featur e—Sna pshot Virtual Disks 169 Snapshot Repository Capacity If you r eceive a warning that the ca paci ty for the snapshot r epository virtual disk is approaching its th.
170 Configuration: Premium F eature—Snapshot V irtual Disks free capacity is available, the maximum free space is displayed in the Increase capacity by field. If free capacity does not e xist on th e disk group, the fr ee space that is displayed in the Incr ease capacity by spinner box is 0.
Configuration: Premium Featur e—Sna pshot Virtual Disks 171 NOTE: The phy sical disks that are displayed have a capacity that is either the same size or larger than the capacity of the phy sical disks already being used by the disk group. 9 Select either a single physical disk to add or two physical disks to add.
172 Configuration: Premium F eature—Snapshot V irtual Disks Disabling a Snapshot V irtual Disk Disable a snapshot virtual disk if on e of the following conditions exists: • Y ou do not need the snapshot now .
Configuration: Premium Featur e—Sna pshot Virtual Disks 173 Before r e-creating a snapshot virtual disk, both the host server and the associated virtual disk you are r e-creat ing have to be in the proper state. T o prepar e your host server and virtual disk: 1 Stop all I/O activity to the source an d snapshot vi rtual disk (if mounted).
174 Configuration: Premium F eature—Snapshot V irtual Disks NOTE: Failing to follow these additional instructions could create unusable snapshot virtual disks. For more information, see the PowerV ault Modular Disk Storage Manager online help topics.
Configuration: Premium Featur e—Sna pshot Virtual Disks 175 • Rolling back a ba se virtual disk to a snaps hot virtual disk d oes not affect the contents of the snapshot virtual disks. • Only one snaps hot rollback ope ration can be perf ormed at a time.
176 Configuration: Premium F eature—Snapshot V irtual Disks Protecting Against a Failed Snapshot Rollback T o protect your base virtual disk data , it is r ecommended that you cr eate a new snapshot virtual disk from the ba se virtu al disk be fore beginning a rollback operation.
Configuration: Premium Featur e—Sna pshot Virtual Disks 177 Resuming a Sn apshot Rollback If an error occurs during the snapshot rollback and the operation is paused, you can re sume the rollback using the following steps: 1 In the AMW , select the Log ic al tab.
178 Configuration: Premium F eature—Snapshot V irtual Disks book.book Page 178 Tuesday, September 27, 2011 3:13 PM.
Configuration: Premium Feature—V irtual Disk Copy 179 12 Configuration: Premium Feature— V irtual Disk Copy NOTE: A virtual disk cop y overwrit es data on the target virtual disk. Before starting a virtual disk copy , ensure that you no longer need the data or back up the data on the target virtual disk.
180 Configuration: Premium F eature—V irtual Disk Copy Reasons to use virtual disk copy include: • Copying data for improved access—As your storage requir ements for a virtual disk change, you can use a virtual disk copy to copy data to a virtual disk in a d isk group that uses drives with larger capacity within the same storage array .
Configuration: Premium Feature—V irtual Disk Copy 181 formatted with a journaling file system, any attempt to issue a read r e quest to the source virtual disk may be rejected by the storage array R A ID controller modules and result in an erro r message.
182 Configuration: Premium F eature—V irtual Disk Copy Creating a V irtual Disk Copy for an MSCS Shared Disk T o cr eate a virtual disk copy for a Mi cros oft Cluster Server (MSCS) shar ed disk, create a snapshot of the virtual disk, and then use the snapshot virtual disk as the source for the virtual disk copy .
Configuration: Premium Feature—V irtual Disk Copy 183 • T o enable Read-Only permission, sel ect Change Ta r g e t V i r t u a l D i s k Pe r m i s s i o n s Enable R ead-Only . NOTE: Write requests to the target virt ual disk are rejected when the Read- Only permission is enabled on the target virtual disk.
184 Configuration: Premium F eature—V irtual Disk Copy NOTE: The following host preparation sectio ns also apply when using the virtual disk copy feature through the CLI interface.
Configuration: Premium Feature—V irtual Disk Copy 185 V irtual Disk Co py and Modificati on Operations If a modifi cation operation is running on a source virtual disk or a target virtual disk, and the virtual disk copy ha s a status o f In P rogress , P ending, or F ailed, the virtual disk copy does not take place.
186 Configuration: Premium F eature—V irtual Disk Copy Preferred RAID Contro ller Module Ownership During a virtual disk copy , the same R AID controlle r module must own both the source virtual disk and the target vi rtual disk.
Configuration: Premium Feature—V irtual Disk Copy 187 A virtual di sk copy autom atically m akes the target virtual disk read-only to hosts. Y o u may want to k eep this attribut e enabled to pr eserve the data on the target virtual disk.
188 Configuration: Premium F eature—V irtual Disk Copy 9 Ty p e yes and clic k Fi n i s h . NOTE: Operation in Progress icons are displa yed on the source virtual disk and the target virtual disk while t he virtual disk copy has a stat us of In Progress or Pending.
Configuration: Premium Feature—V irtual Disk Copy 189 2 In the table, select one or more copy pairs. 3 Select Change Copy P r iority . The Change C opy P riority window is dis played. 4 In the Copy P riority ar ea, select the appropriate copy priority , depending on your system performance needs.
190 Configuration: Premium F eature—V irtual Disk Copy Recopying a V irtual Disk Y ou can recopy a virtual disk when you have stopped a virtu al disk copy and you want to start it a gain or when a virtual disk copy has failed.
Configuration: Premium Feature—V irtual Disk Copy 191 4 Remove the drive letter(s) of th e source and (if mounted ) virtual disk in W indows or un mount the virtual drive(s) in Linux to help guarantee a stable copy of the drive for the virtual d isk.
192 Configuration: Premium F eature—V irtual Disk Copy 5 Select Copy Re - C o p y . The Re- C op y window is displayed. 6 Set the copy priority .
Configuration: Premium Feature—U pgrading to High- Performance-T ier 193 13 Configuration: Premium Feature— Upgrading to High-Performance- Ti e r The High P erformance Tier pr emium feat ure on an.
194 Configuration: Premium Feature—Upgrading to High-Performance-T ier book.book Page 194 Tuesday, September 27, 2011 3:13 PM.
Configuration: Device M apper Multipath for Linux 195 14 Configuration: Device Mapper Multipath for Linux Overview The MD3600i Seri es storage ar ray uses a Li nux operating sy stem softwar e framework , known as Device Mapper (DM), to enable multipath capabilities on Linux Host Servers.
196 Configuration: Device Mapper Multipath for Linux Using DM Multipathing Devices NOTE: Using or modifyin g any nodes other than the multipathi ng device nodes can result in array or file sy stem problems, including loss of communication with the array and corruption of the file sy ste m.
Configuration: Device M apper Multipath for Linux 197 Using the MDSM softwar e: 1 Map the host server to the MD3600i Series storage array . 2 Create the V irtual Disks.
198 Configuration: Device Mapper Multipath for Linux Scan for Newly Added Virtual Disks The rescan_dm_devs command scans the hos t server system looking for existing and newly adde d virtual disks mapped to the host server .
Configuration: Device M apper Multipath for Linux 199 The followi ng is an e xample of SL ES output: mpathb(360080e500017b2f80000c6ca4a1d4ab8) dm-21 DELL,MD32xxi [size=1.
200 Configuration: Device Mapper Multipath for Linux Add a New Partition to Device Mapper The kpartx command adds the new fdisk partition to the Device Mapper list of usable partitions. See e xamples below , where mpath<x> is the device node on which the partition was cr eated.
Configuration: Device M apper Multipath for Linux 201 Create a File Sy stem on a Device Mapper Partition Use the standard mkfs command to cr eate the file system on the newly cr eated Device Mapper partition.
202 Configuration: Device Mapper Multipath for Linux or blacklist { device { vendor vendor_string model model_string }; NOTE: RedHat version 6.0 and 6.1 users must rebuild the initramfs root file image to include the updated configuration file by running the #dracut -force command.
Configuration: Device M apper Multipath for Linux 203 3 Flush the Device Mapper multipath maps list to remove any old or modified mappings: # multipath –F NOTE: The boot operating sy stem drive may have an entry with the Device Mapper multipathing table.
204 Configuration: Device Mapper Multipath for Linux Limitations and Known Issues • In certain error conditions with the no_path_retry or the queue_if_no_path feature is set, applications may hang.
Configuration: Device M apper Multipath for Linux 205 • F ailback can be slow when the host sy stem is ex periencing heavy I/O . The problem is exacerbated if the host server is also e xperiencing very high processor utilization. • The Device Mapper Mult ipath service can be slow when the host system is e xperiencing heavy I/O .
206 Configuration: Device Mapper Multipath for Linux I removed a L UN. But the multipathing mapping is still available. The multipathing device is still available after you re mo v e t he LUN s . Run multipath –f <device node for the delet ed LUN> to remove the multipathing mapping.
Management: Firmware Downloads 207 15 Management: Firmware Downloads Downloading RAID Controller and NVSRAM Packages A version number exists for each firm ware file. Th e vers ion num ber indicates whether the firmware is a major versio n or a m inor version.
208 Management: Firmware Downloads Downloading Both RAID Controller and NVSRAM Firmware NOTE: I/O to the array can continue while y ou are upgrading RAID controller and NVSRAM firmware. NOTE: It is recommended that the firmwa re and NVSRAM be upgraded during a maintenance period when the array is not being used for I/O.
Management: Firmware Downloads 209 7 Click Tr a n s f e r . K eep these guidelines in mind: –I f t h e Tr a n s f e r button is inactive, e nsure that you either select an N V S RA M f i l e o r c l e a r t h e T r a n s f e r N V S R A M f i l e w i t h R A I D c o n t r o l l e r module firmwar e.
210 Management: Firmware Downloads The Select F ile dialog is displ ayed. 13 Select the file to download. 14 Click OK . 15 If you want to downloa d the NVSR AM file with the R AID controller module firmwar e, select Download NVSR AM file with firmware in the Select files ar ea.
Management: Firmware Downloads 211 Downloading Only NVSRAM Firmware Use the c ommand li ne interf ace (CLI ) to download and activate NVSRAM to several storage arrays. F or mor e information, see the P owerV ault Modular Dis k Storage Manager online help topics.
212 Management: Firmware Downloads 7 P erform one of these actions: • Select T ools Upgrade R AID Controller Module F irmware . • Select the Setup tab, and click Upgrade R AID Controller Module Fi r m w a r e . The Upgrade R AID Controller Module F irmware window is displayed.
Management: Firmware Downloads 213 12 Click OK . The Confirm Download dialog is displayed. 13 Click Ye s . The download starts and a progr ess in dicator is displayed in the Status column of the Upgrade R AID Contro lle r Module F irmwa re window .
214 Management: Firmware Downloads • Mak e sure that the firmware that yo u downlo ad to the physical disks are compatible with the physic al disks that you select. • Do not make any configuration changes to the storage array while downloadin g the firmware.
Management: Firmware Downloads 215 Downloading MD1200 Series Expansion Module EMM Firmware NOTE: Due to a limitation with Linux, expansion enclosure EM M firmware updates must be performed using out-of-band management only . Failure to do so may result in the host server becoming unrespons ive, and it ma y require a reboot.
216 Management: Firmware Downloads NOTE: If you click Stop while a firmware download is in progress, the download-in-progress finishes before t he operation stops. The sta tus for the remaining expansion enclosures changes to Canceled . 7 Monitor the progress and completion status of the download to the expansion enclosures.
Management: Firmware Downloads 217 controller encounters an e rror while accessing a peer disk, it is unable to r ecover the data and affected sectors ar e added to the unreadable sector log maintained by the controlle r .
218 Management: Firmware Downloads book.book Page 218 Tuesday, September 27, 2011 3:13 PM.
Management: Installing Array Compone nts 219 16 Management: Installing Array Components Recommended T ools Y ou may need the f ollowing items to pe rform the procedur es in this section: • K ey to the system keylock •# 2 P h i l l i p s s c r e w d r i v e r •W rist grounding stra p book.
220 Management: Installing Array Componen ts Front Bezel (Optional) Removing the Front Bezel 1 Using the system key , unlock the front bezel (if locked). 2 Lift up the r elease latch next to the keylock. 3 Rotate the left end of the be zel away from the front panel.
Management: Installing Array Compone nts 221 Hard Drives SAFETY : Models AMT , E03J, and E04J Models AMT , E03J, and E04J ar e intended for installation only in restricted access locations as defined in cl 1.2.7.3 of IEC 60950-1:2005. Depending on your configur ation, your array either supports up to twenty f o u r 2 .
222 Management: Installing Array Componen ts Figure 16-3. Removing and Installing a 2. 5" Hard-Drive Blank (MD3620i Only) Installing a Hard -Drive Blank 1 If installed, r emove the front bezel . See "Removing the F ront Bezel" on page 220.
Management: Installing Array Compone nts 223 2 F rom the Modular Disk Storage Manager (MDSM) software, pr epare the drive for r emoval. W ait until the hard-drive indicators on the drive carrier signal that the drive can be r emoved safely . F or more information, see your controller d ocumentation fo r information about hot-swap drive removal.
224 Management: Installing Array Componen ts Installing a Hard Drive CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troublesh ooting and simple repairs as authorized in your product documentation, or as dir ected by the online or telephone service and support team.
Management: Installing Array Compone nts 225 Removing a Hard Drive From a Hard-Drive Carrier Remove the scre ws from the slide rails on the har d-drive carrier and separate the har d drive from the carrier . See F igure 16-5 for P owerV ault MD3600i and F igure 16 -6 for P owerV ault MD3620i.
226 Management: Installing Array Componen ts Figure 16-6. Removing and Installing a Hard Drive Into a 2.5" Hard-Drive Carrier 1 screws (4) 2 hard-drive carrier 3 SAS screw hole 4 hard drive 4 1 3 2 book.
Management: Installing Array Compone nts 227 Installing a Hard Drive Into a Hard-Drive Carrier 1 Insert the hard dr ive into the hard -d rive carrier with the connector end of the drive at the back. See F igure 16-5. 2 Align the screw holes on the hard drive with the back set of holes on the hard-drive carrier .
228 Management: Installing Array Componen ts 5 Connect all the power cables to the array . 6 T urn on the array and the host server . Figure 16-7. Removing and Installing a RAID Controller Module Blan.
Management: Installing Array Compone nts 229 Removing a RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team.
230 Management: Installing Array Componen ts Installing a RAID Controller Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or teleph one service and support team.
Management: Installing Array Compone nts 231 Figure 16-9. Opening and Closing the RAID Controller Module Closing the RAID Controller Module CAUTION: Many repairs may only be done by a certified service technician.
232 Management: Installing Array Componen ts RAID Controller Module Backup Battery Unit Removing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified se rvice technician.
Management: Installing Array Compone nts 233 Installing the RAID Controller Module Backup Battery Unit CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by th e online or telephone service and support team.
234 Management: Installing Array Componen ts Power Supply/Cooling Fan Module NOTE: Y our storage array includes two integrated, hot-swappable power supply/cooling fan modules.
Management: Installing Array Compone nts 235 Figure 16-11. Removing and Installing a Power Supply/Cooling Fan Module 1 release tab 2 power supply 3 power supply handle 1 3 2 book.
236 Management: Installing Array Componen ts Installing a Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or teleph one service and support team.
Management: Installing Array Compone nts 237 Control Panel Removing the Control Panel 1 T urn off the array and host server . 2 Disconnect all the power cables connected to the array .
238 Management: Installing Array Componen ts Figure 16-14. Removing and Installing t he Control Panel-PowerV ault MD3620i Installing the Co ntrol Panel 1 Align the control panel with the slot on the ar ray . 2 Slide the control panel into the array until: – The release tab clicks into place in P owerV ault MD3600i .
Management: Installing Array Compone nts 239 Backplane CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team.
240 Management: Installing Array Componen ts Figure 16-15. Removing and Installing the RA ID Controller Module/Power Supply Cage 1 screws (6) 2 RAID controller module/power supply cage 2 1 book.
Management: Installing Array Compone nts 241 Figure 16-16. Removing and Installing the Backplane-PowerV ault MD3600i Figure 16-17. Removing and Installing the Backplane-PowerV ault MD3620i 1 screws (5) 2 backplane 3 captive sc rew 1 screws (4) 2 backplane 3 captive sc rew 2 1 3 2 1 3 book.
242 Management: Installing Array Componen ts Installing the Ba ckplane 1 Align the hol es on the back plan e with the holes on the array . 2 Tighten the captive scr ew to secur e the backplane to the chassis. See F igure 16-1 6 for P owerV ault MD3600i or F igur e 16-17 for P owerV ault MD3620i.
Management: Firmware Inventory 243 17 Management: Firmware Inventory A storage array is made up of many components, which may include R AID controller modules, physical disks, and enclo sur e management modules (EMMs). Each of these components cont ains firmware.
244 Management: Firmware Inventory book.book Page 244 Tuesday, September 27, 2011 3:13 PM.
Management: Sy stem Interfaces 245 18 Management: Sy stem Interfaces Microsoft Services V irtual Disk Service The Microsoft V irtual Disk Service (VDS) is a component of the W indows operatin g system.
246 Management: Sy stem Interfaces VSS attaches to the service and uses it to coor dinate the cr eation of snapshot virtual disks on the storag e array . VSS-initiated snap shot virtual disks c an be triggere d through backup to ols, known as requestors.
T roubleshooting: Y our Storage Array Software 247 19 T roubleshooting: Y our Storage Array Software Start-Up Routine L ook and listen during t he array ’s start-up routine fo r the indications described in T able 19-1. F or a descri ption of the front- and back-panel indicators, see "Planning: About Y o ur Storage Array" on page 23.
248 T roubleshooting: Y our Storage Array Software T o launch the AMW , perform one of these actions: •O n t h e Devices tab, in either the T ree view or the T able view , double-click a storage array . Alternatively , you can right-click a storage array and select Manage Storage Array from the pop-up men u.
T roubleshooting: Y our Storage Array Software 249 In the T able view , every m anaged storag e array is listed once, regardless of the number of attachment s it has in the T ree view . After the storage arr ay is contacted by MDSM, an icon representing i ts h a rdw a re s ta t u s i s di s p la y e d .
250 T roubleshooting: Y our Storage Array Software In the T ree vi ew , icons can ar e disp layed in a string to convey more information. F or example, the following string means that the storage array is optimal, an alert is set for the storag e array , and firmware is available for downloa d.
T roubleshooting: Y our Storage Array Software 251 Storage Array Support Data Y ou can gather various types of inventor y , status, and performance data that can help troubleshoot any problem with the storage array . All the files are compressed into a single archive in a zipp ed-file format.
252 T roubleshooting: Y our Storage Array Software WA RN I N G : Use this option only under the guidance of your T echnical Support representative. NOTE: Enable only one collect support bundle data to a single client sy stem. Setting multiple sy stems to collect data may potentially affect the storage array performance.
T roubleshooting: Y our Storage Array Software 253 • A time stamp. • The version number for the R A ID controller module firmware. • The version number for the management application programming interface (API). • The model ID for the R AID controller module board.
254 T roubleshooting: Y our Storage Array Software Collecting Phy sical Disk Data Y ou can use the Collect Physical Disk Data option to collect log sense data from all the physical disks on your storage array . L og sense data consists of statistical informat ion that is mainta ined by each of the physical disks in your stor age array .
T roubleshooting: Y our Storage Array Software 255 Event Log Y ou can use the Event Log V iewer to view a detailed list of events that occur in a storage array . The event log is stored on r eserved areas on the storage array disks. I t recor ds configuration events and storage arr ay component failur es.
256 T roubleshooting: Y our Storage Array Software Recovery Guru The Recovery Guru is a component of MDSM tha t diagnoses critical even ts on the storage array and recommends step-by-st ep re covery procedu res to res olve the problems. In the AMW , to display the Recovery Guru, perform one of these actions: •C l i c k Rec o v er y G ur u .
T roubleshooting: Y our Storage Array Software 257 2 P erform one of these actions in the Storage Array P rofile dialog: • V iew detailed information—Go to step 3. • Search the storage array profile—Go to step 4. • Save the storage array profile—Go to step 5.
258 T roubleshooting: Y our Storage Array Software V iewing the Logical Associations Y ou can use the Associated L ogical Elements option to view the logical associations amo ng different virtual disks in a storage array .
T roubleshooting: Y our Storage Array Software 259 Finding Nodes Y ou can use the F ind option to sear ch for a particular node on the Log i ca l tab, the Physical tab, or the Mappings tab of the AMW . The search may be based on a particular node name, the R AID level, virtual disk capacit y , or specific free capacity nodes.
260 T roubleshooting: Y our Storage Array Software 7 T o search for all F ree Capacity nodes with a parti cular capacity , perform these steps: NOTE: This option is not available when the Search by name option is selected or from the Mappings tab. Y ou must cancel the selection of the Search by name option to use this option.
T roubleshooting: Y our Storage Array Software 261 2 Select Vi e w Go T o Snapshot V irtual Disk . The selection jumps to the associated sna pshot virtual disk in the Lo gi c al pane. 3 Select Vi e w Go T o Snapshot Repository V irtual Disk .
262 T roubleshooting: Y our Storage Array Software • Out-of -band manage d storage array—Go to step 6. • In-band managed storage array—Go to step 12.
T roubleshooting: Y our Storage Array Software 263 If you started the host system before you were connected to the RAID controller module in the storage array , the Host Conte xt Agent software is not able to detect the RAID controller modules.
264 T roubleshooting: Y our Storage Array Software Locating a Phy sical Disk Y ou can use the L ocate Physical Disk op tion to physically locate and identify one or more of the physical disks in an e xpansion enclosure by activating physical disk LEDs.
T roubleshooting: Y our Storage Array Software 265 Locating an Expansion Enclosure Y ou can use the Blink option to physica lly locat e and id entify an expansion enclosure in the storage array . The LED activation varies accor ding to the type of e xpansion enclosure that you have.
266 T roubleshooting: Y our Storage Array Software Capturing the State Information Use the T roubleshootin g Capture State Information option to captur e information about the curr ent state of your stor age array and save the captured information to a te xt file .
T roubleshooting: Y our Storage Array Software 267 SMrepassist Utility SMrepassist (r eplication ass istance) is a host-based utility for W indows platforms.
268 T roubleshooting: Y our Storage Array Software Unidentified Devices An unidentified node or device occu rs when MDSM cannot access a new storage array . Causes for this error include network connection problems, the storage array is turned off, or the storage array does not e xist.
T roubleshooting: Y our Storage Array Software 269 b Mak e sure that the network can access the host by using the ping command in the foll owing syntax: ping <host-name-or-IP-address-of-the-host> . If the network can access the host, co ntinue to step c.
270 T roubleshooting: Y our Storage Array Software d Make sur e that the applicable network configuration tasks ar e done (for example, the IP addr esses ar e assigned to each contr oller). 5 Mak e sure that the controller firmware is compatible with MDSM on your management station.
T roubleshooting: Y our Storage Array Software 271 Starting or Restarting the Host Context Agent Software The Host Context Agent softwar e modu le is the software component that r esides on the server or manage ment station th at commun icates w ith the MD3600i Series storage arrays.
272 T roubleshooting: Y our Storage Array Software book.book Page 272 Tuesday, September 27, 2011 3:13 PM.
T roubleshooting: Y our Array 273 20 T roubleshooting: Y our Array Safety First—For you and Y our Array CAUTION: Many repairs may only be done by a certified service technician.
274 T roubleshooting: Y our Array T roubleshooting Power Supply/Cooling Fan Module CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troublesh ooting and simple repairs as authorized in your product documentation, or as dir ected by the online or telephone service and support team.
T roubleshooting: Y our Array 275 T roubleshooting Array Cooling Problems CAUTION: Many repairs may only be done by a certified service technician. Y ou must only perform troubleshooting and simple repairs as authorized in your product documentation, or as direct ed by the online or telephone service and support team.
276 T roubleshooting: Y our Array c Reseat the EMM module and wai t for 30 seconds. See "Removing an EMM" in the MD1200 and MD1220 Storage Enclosures Hardware Owner's Manual . d T urn on the server . e Check the EMM status LED. f If the LED does not turn green, replace the EMM.
T roubleshooting: Y our Array 277 wait for up to 5 minutes to chec k if the LE D has turned blue. See "Recovery Guru" on page 256. b If following the r ecovery guru proc edures does not solve the problem, complete the following procedure to further troubleshoot the array .
278 T roubleshooting: Y our Array T roubleshooting Hard Drives CAUTION: Many repairs may only be done by a certified se rvice technician. Y ou must only perform troublesh ooting and simple repairs as authorized in your product documentation, or as dir ected by the online or telephone service and support team.
T roubleshooting: Y our Array 279 T roubleshooting Array and Expansion Enclosure Connections 1 V erify that th e R AID controller modu le port link statu s LED and the R AID controller module status LED are solid green for each port that is connected to a cable.
280 T roubleshooting: Y our Array 2 Remove the following components fr om the array . See "Management: Installing Array Comp onents" on page 219. •H a r d d r i v e s • RAID controller modules • P ower supply/cooling fan modules • Control panel •B a c k p l a n e 3 L et the system dry thoroughly for at least 24 hours.
T roubleshooting: Y our Array 281 T roubleshooting RAID Controller Modules Conditions Certain events can cause a R AID controll er module to fail and/or shut down. Unre coverable ECC m emory or PCI errors , or critical physical conditions can cause lockdown.
282 T roubleshooting: Y our Array PCI Errors The storage array firmware can detect an d only recover from PCI erro rs when the R AID controller modules ar e configur ed for redundancy . If a virtual disk uses cache mirroring , it fails over to its peer R AID controller module, which initiates a flush of the dirty cache.
Getting Help 283 21 Getting Help Contacting Dell F o r customers in the United States , call 800- WWW -DELL (800-9 99-3355). NOTE: If you do not have an active Inte rnet connection, you can find contact information on your purchase invoice, packing slip, bill, or Dell product catalog.
284 Getting Help book.book Page 284 Tuesday, September 27, 2011 3:13 PM.
Index 285 Index A Access Virtual Disk, 68 Advanced F eatur e Using Snaps hot and Disk Copy To g e t h e r , 5 4 Advanced F eatur es, 51 Snapshot Repository V irtual Disk, 5 2 Snapshot Virtual Disks, 5.
Index 286 contacting Dell, 283 control panel installing, 2 3 8 re m o v i n g , 2 3 7 Copy Manager , 186 D Defining a Host, 101 Dell contacting, 2 8 3 Disk Group Creating, 1 1 2 Expansion, 1 4 8 Expor.
Index 287 F ree Capa city , 149 front bezel installing, 2 2 0 re m o v i n g , 2 2 0 H hard drive drive carrier , 2 2 5 installing, 2 2 4 re m o v i n g , 2 2 2 Har d-Drive Indicator Pa t t e r n s , .
Index 288 Media Errors and Unreadable Sectors, 216 Medi a Scan Changing setti ngs, 1 5 3 Suspending, 1 5 4 Microsoft Virtual Disk Serv ice, 2 4 5 V olume Shad ow-Copy Service, 2 4 5 Microsoft Services.
Index 289 front bezel, 2 2 0 hard drive, 2 2 2 har d drive from a drive carrier , 2 2 5 power supply/cooling fan module, 2 3 4 Removing Copy P airs, 192 Removing Host Access, 102 Restricted Mappings, .
Index 290 Recovery Guru, 2 5 6 Starting or Restarting the Host-Agent Softw ar e, 2 7 1 Start-Up Routine, 2 4 7 Storag e Array P rofile, 2 5 6 Storage Array Support Data, 2 5 1 Unidentified De vices, 2.
Index 291 Vi r t u a l D i s k O p e r a t i o n s Limit, 45 V irtual Disk Ownership, 55 Vi r t u a l D i s k S t a t e s , 40 Vi r t u a l D i s k C o p y Ta r g e t , 5 3 V irtual Disks and Disk Groups, 39 book.
292 Index book.book Page 292 Tuesday, September 27, 2011 3:13 PM.
デバイスDell POWERVAULT MD3620Iの購入後に(又は購入する前であっても)重要なポイントは、説明書をよく読むことです。その単純な理由はいくつかあります:
Dell POWERVAULT MD3620Iをまだ購入していないなら、この製品の基本情報を理解する良い機会です。まずは上にある説明書の最初のページをご覧ください。そこにはDell POWERVAULT MD3620Iの技術情報の概要が記載されているはずです。デバイスがあなたのニーズを満たすかどうかは、ここで確認しましょう。Dell POWERVAULT MD3620Iの取扱説明書の次のページをよく読むことにより、製品の全機能やその取り扱いに関する情報を知ることができます。Dell POWERVAULT MD3620Iで得られた情報は、きっとあなたの購入の決断を手助けしてくれることでしょう。
Dell POWERVAULT MD3620Iを既にお持ちだが、まだ読んでいない場合は、上記の理由によりそれを行うべきです。そうすることにより機能を適切に使用しているか、又はDell POWERVAULT MD3620Iの不適切な取り扱いによりその寿命を短くする危険を犯していないかどうかを知ることができます。
ですが、ユーザガイドが果たす重要な役割の一つは、Dell POWERVAULT MD3620Iに関する問題の解決を支援することです。そこにはほとんどの場合、トラブルシューティング、すなわちDell POWERVAULT MD3620Iデバイスで最もよく起こりうる故障・不良とそれらの対処法についてのアドバイスを見つけることができるはずです。たとえ問題を解決できなかった場合でも、説明書にはカスタマー・サービスセンター又は最寄りのサービスセンターへの問い合わせ先等、次の対処法についての指示があるはずです。