Dell Computer Drive User Manual

Dell™ PowerVault™ Modular Disk
Storage Manager User’s Guide
www.dell.com | support.dell.com
Notes and Notices
NOTE: A NOTE indicates important information that helps you make better use of
your computer.
NOTICE: A NOTICE indicates either potential damage to hardware or loss of data
____________________
Information in this document is subject to change without notice. © 2008 Dell Inc. All rights reserved.
Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Trademarks used in this text: Dell, the DELL logo, PowerEdge and PowerV ault are trademarks of Dell Inc.; Microsoft, Windows, Windows Server, MS-DOS, and Internet Explorer are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Red Hat and Red Hat Enterprise Linux are registered trademarks of Red Hat, Inc. SUSE is a registered trademark of Novell Inc.
Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
February 2008

Contents

1 About This Guide . . . . . . . . . . . . . . . . . . . 11
User Interface . . . . . . . . . . . . . . . . . . . . . . 11
Other Information You May Need . . . . . . . . . . . . 14
2 About Your Storage Array . . . . . . . . . . . . 15
Access Virtual Disk . . . . . . . . . . . . . . . . . . . 15
Summary Tab
Configure Tab
Modify Tab
Tools Tab
iSCSI Tab
. . . . . . . . . . . . . . . . . . . . . 12
. . . . . . . . . . . . . . . . . . . . . . 13
. . . . . . . . . . . . . . . . . . . . . . 13
Support Tab
. . . . . . . . . . . . . . . . . . . . 12
. . . . . . . . . . . . . . . . . . . 12
. . . . . . . . . . . . . . . . . . . . 13
Out-of-Band and In-Band Management
Adding Storage Arrays
. . . . . . . . . . . . . . . . . 17
Automatic Discovery of Storage Arrays
Manual Addition of a Storage Array
Naming Storage Arrays
Removing Storage Arrays
Setting Up Your Storage Array
Storage Array Support Data
. . . . . . . . . . . . . . . . . 18
. . . . . . . . . . . . . . . . 18
. . . . . . . . . . . . . 19
. . . . . . . . . . . . . . . 21
. . . . . . . . 16
. . . . . . 17
. . . . . . . . 17
Contents 3
Setting a Password . . . . . . . . . . . . . . . . . . . 21
Password Guidelines
. . . . . . . . . . . . . . . . 22
Resetting a Password
Connecting the Serial Cable
System Setup for Password Reset
Reset Password
Changing Expansion Enclosure ID Numbers
Configuring Alert Notifications
Configuring E-mail Alerts
Configuring SNMP Alerts
. . . . . . . . . . . . . . . . . . 22
. . . . . . . . . . . . 22
. . . . . . . . . 23
. . . . . . . . . . . . . . . . . . 24
. . . . . . 25
. . . . . . . . . . . . . 25
. . . . . . . . . . . . . . 25
. . . . . . . . . . . . . 27
Starting or Restarting the Host-Agent Software in Windows
. . . . . . . . . . . . . . . . . . . . . . . 28
Starting or Restarting the Host-Agent Software in Linux
. . . . . . . . . . . . . . . . . . . . . . . . . . 28
3 Using iSCSI . . . . . . . . . . . . . . . . . . . . . . . 31
Using the iSCSI Tab . . . . . . . . . . . . . . . . . . . 31
Changing the iSCSI Target Authentication
Entering Mutual Authentication Permissions
Creating CHAP Secrets
. . . . . . . . . . . . . . . 32
. . . . . . . 32
. . . . . 32
4 Contents
Changing the iSCSI Target Identification
Changing the iSCSI Target Discovery
. . . . . . . . . . 34
Configuring the MD3000i iSCSI Host Ports
Advanced iSCSI Host Ports Settings
Viewing or Ending an iSCSI Session
. . . . . . . . . . 36
. . . . . . . . 34
. . . . . . . 35
. . . . . . . . 35
Viewing iSCSI Statistics and Setting Baseline Statistics
. . . . . . . . . . . . . . . . . . . . . . . . . 37
Edit, Remove, or Rename Host Topology
. . . . . . . . 38
4 Event Monitor . . . . . . . . . . . . . . . . . . . . . 41
Enabling the Event Monitor . . . . . . . . . . . . . . . 41
Disabling the Event Monitor
. . . . . . . . . . . . . . 42
5 About Your Host . . . . . . . . . . . . . . . . . . . 43
Configuring Host Access . . . . . . . . . . . . . . . . 43
Automatic Configuration
Manual Configuration (using SAS HBA)
Manual Configuration (using iSCSI)
Removing Host Access
Host Groups
. . . . . . . . . . . . . . . . . . . . . . . 47
Creating a Host Group
Adding a Host to a Host Group
Removing a Host From a Host Group
Moving a Host to a Different Host Group
Removing a Host Group
. . . . . . . . . . . . . . 44
. . . . . . 44
. . . . . . . . 45
. . . . . . . . . . . . . . 46
. . . . . . . . . . . . . . . 47
. . . . . . . . . . . 47
. . . . . . . 48
. . . . . 48
. . . . . . . . . . . . . . 49
Host Topology
Host Context Agent
I/O Data Path Protection
. . . . . . . . . . . . . . . . . . . . . . 49
. . . . . . . . . . . . . . . . . 50
. . . . . . . . . . . . . . . . 51
Failover with Red Hat Enterprise Linux
. . . . . . 51
Contents 5
6 Disk Groups and Virtual Disks . . . . . . . . . 53
Creating Disk Groups and Virtual Disks . . . . . . . . 54
Automatic Configuration
Manual Configuration
. . . . . . . . . . . . . . 55
. . . . . . . . . . . . . . . 55
Hot Spare Drive Protection
. . . . . . . . . . . . . . . 58
Automatically Configuring Hot Spares
Manually Configuring Hot Spares
Host-to-Virtual Disk Mapping
. . . . . . . . . . . . . . 60
Creating Host-to-Virtual Disk Mappings
Modifying and Removing Host-to-Virtual Disk Mapping
. . . . . . . . . . . . . . . . . . . . 60
Changing Controller Ownership of the Virtual Disk
Storage Partitioning
. . . . . . . . . . . . . . . . . . . . . 61
. . . . . . . . . . . . . . . . . . . 61
Disk Group and Virtual Disk Expansion
Disk Group Expansion
Virtual Disk Expansion
Storage Array Media Scan
. . . . . . . . . . . . . . . 62
. . . . . . . . . . . . . . . 62
. . . . . . . . . . . . . . . 63
Changing Media Scan Settings
Suspending the Media Scan
Microsoft Services
. . . . . . . . . . . . . . . . . . . 64
Virtual Disk Service
Volume Shadow-Copy Service
. . . . . . . . . . . . . . . . . 64
. . . . . . . . . . . . 64
. . . . . . . . . . . 65
. . . . . . . 58
. . . . . . . . . 59
. . . . . . 60
. . . . . . . . . 62
. . . . . . . . . . 63
6 Contents
7 Premium Feature—Snapshot
Virtual Disks
Creating a Snapshot Virtual Disk Using the Simple Path
About the Simple Path
Preparing Host Servers to Create the Snapshot Using the Simple Path
Creating the Snapshot Using the Simple Path
Creating a Snapshot Virtual Disk Using the Advanced Path
About the Advanced Path
Preparing Host Servers to Create the Snapshot Using the Advanced Path
Creating the Snapshot Using the Advanced Path
67
. . . . . . . . . . . . . . . . . . . . . . . 68
. . . . . . . . . . . . . . . 68
. . . . . . . . . . . . . . . 69
. . . . . . . . . . . . . . . . . . . . . 73
. . . . . . . . . . . . . 73
. . . . . . . . . . . . . 74
. . . . . . . . . . . . . . . . . . . . . . . . . 76
. . . 71
Specifying Snapshot Virtual Disk Names
Snapshot Repository Capacity
Re-creating Snapshot Virtual Disks
Disabling a Snapshot Virtual Disk
. . . . . . . . . . . . . 79
. . . . . . . . . . 80
. . . . . . . . . 80
Preparing Host Servers to Re-create a Snapshot Virtual Disk
. . . . . . . . . . . . . . . 81
Re-creating a Snapshot Virtual Disk
8 Premium Feature—Virtual Disk
Copy
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Creating a Virtual Disk Copy for an MSCS Shared Disk
Virtual Disk Read/Write Permissions
Virtual Disk Copy Restrictions
. . . . . . . . . . . . . . . . . . . . . . . 84
. . . . . . . . . . 85
. . . . . . . . . . . . . 86
. . . . . . . 78
. . . . . . . . 82
Contents 7
Creating a Virtual Disk Copy . . . . . . . . . . . . . . 87
Preparing Host Servers to Create a Virtual Disk Copy
Copying the Virtual Disk
. . . . . . . . . . . . . . . . . . . . . . 87
. . . . . . . . . . . . . . 88
Storage Array Performance During Virtual Disk Copy
. . . . . . . . . . . . . . . . . . . . . . . . 89
Setting Copy Priority
. . . . . . . . . . . . . . . . 89
Stopping a Virtual Disk Copy
Recopying a Virtual Disk
. . . . . . . . . . . . . . 90
. . . . . . . . . . . . . . . . 90
Preparing Host Servers to Recopy a Virtual Disk
Recopying the Virtual Disk
Removing Copy Pairs
. . . . . . . . . . . . . . . . . . . . . 91
. . . . . . . . . . . . . 92
. . . . . . . . . . . . . . . . . . 93
9 Firmware Downloads . . . . . . . . . . . . . . . . 95
Downloading RAID Controller and NVSRAM Packages
Downloading Physical Disk Firmware
Downloading EMM Firmware
. . . . . . . . . . . . . . . . . . . . . . . . 95
Downloading Both RAID Controller and NVSRAM Firmware
Downloading Only NVSRAM Firmware
. . . . . . . . . . . . . . . . . 96
. . . . . . 97
Downloading Non-redundant MSCS NVSRAM Firmware
. . . . . . . . . . . . . . . . . 97
. . . . . . . . . 98
. . . . . . . . . . . . . . 99
10 Troubleshooting Problems . . . . . . . . . . . 101
8 Contents
Recovery Guru . . . . . . . . . . . . . . . . . . . . . . 101
Storage Array Profile
. . . . . . . . . . . . . . . . . . 101
Device Health Conditions . . . . . . . . . . . . . . . . 101
SMrepassist Utility
Support Information Package
Unidentified Devices
. . . . . . . . . . . . . . . . . . . 102
. . . . . . . . . . . . . . 103
. . . . . . . . . . . . . . . . . . 104
Recovering from an Unidentified Storage Array
A Enclosure Hardware Replacement,
Maintenance, and Configuration Considerations
Removing and Inserting Enclosure Management Modules on Attached Expansion Enclosures
Removing an EMM from the Expansion Enclosure
Inserting an EMM into an Expansion Enclosure
Removing and Inserting Physical Disks
MD3000 Maintenance Considerations
MD3000 Cluster Configuration Guidelines for Standalone Host Servers
. . . . . . . . . . . . . . . . . . . 107
. . . . . . . . . . . . . . . . . . . . . . 107
. . . . . . . . . . . . . . . . . . . . . . 107
. . . . . . . . 108
. . . . . . . . . 108
. . . . . . . . . . . . . . . . 109
. . . . 104
. . . . . 107
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Contents 9
10 Contents

About This Guide

Dell™ PowerVault™ Modular Disk (MD) Storage Manager software is used to create and manage multiple storage arrays. The software can be used on any host attached to the storage array, as well as on storage management stations connected to the same sub-network.
MD Storage Manager is a graphical user interface (GUI) with wizard-guided tools and a task-based structure designed to reduce the complexity of installation, configuration, management, and diagnostic tasks.
MD Storage Manager software also contains an optional event monitoring service that is used to send alerts when a critical problem with the storage array occurs and a command line interface (CLI) to access functions performed by MD Storage Manager.
This guide is intended for users who are already familiar with the basic functions of their storage array. Any differences in certain functions between supported operating systems are explained where applicable.
MD Storage Manager online help contains detailed answers to software­related questions. You can access online help by clicking Help located at the top right corner of the MD Storage Manager interface. Refer to your storage array’s
Installation Guide
Manager.

User Interface

for information on installing the MD Storage
The Storage Manager screen is divided into three parts:
The
Beneath the Title Bar is the
Title Bar
and the Dell logo.
that is currently selected. The icon next to the array’s name indicates its condition. You can choose another array by clicking the down-arrow next to the array’s name and highlighting a different array in the drop-down list. Links to the right of the array name let you add or remove arrays from the list of managed arrays. Links to the far right provide access to online help or close the Storage Manager.
at the top of the screen displays the name of the application
Array Selector
, listing the MD Storage Array
About This Guide 11
Beneath the Array Selector is the area to group the tasks you can perform on the selected array. When you click on a tab, the Content Area displays links for the tasks you can perform. The following sections list some of the tasks you can perform under each tab.
Content Area
. Several tabs appear in this

Summary Tab

See the status of a storage array
See the hardware components in a storage array
See storage array capacity
See hosts, mappings, and storage partitions
See virtual disk groups and virtual disks
Access links to online help, FAQs, and a tutorial about storage concepts

Configure Tab

Configure host access
Create a host group
Create hot spares
Create virtual disks
Create snapshot virtual disks (if enabled)
Create virtual disk copies (if enabled)
Create host-to-virtual disk mappings

Modify Tab

Modify the host topology
Rename and delete virtual disks
Add free capacity to a disk group
Change virtual disk ownership and the preferred path of virtual disks
Modify a snapshot virtual disk (if enabled)
Manage virtual disk copies (if enabled)
Edit host-to-virtual disk mappings
12 About This Guide

Tools Tab

Rename a storage array
Set or change a password
View or enable premium features
Turn on indicator lights
Change enclosure ID numbers
Set or change enclosure tags
Set up e-mail alerts and SNMP alerts
Synchronize controller clocks, change the network configuration, or reset the battery age
Inherit system settings
Change media scan settings

iSCSI Tab

Set the authentication method supported by the target
Define permissions for mutual authentication
Set an alias for the target for identification
Modify the discovery method for iSCSI targets
Set the parameters for iSCSI host ports
View or end iSCSI sessions
View iSCSI statistics
NOTE: The iSCSI tab is shown only in the MD Storage Manager when the
controllers contain iSCSI host ports.

Support Tab

Recover from a failure
Gather support information
View the storage array profile
Download RAID controller, NVSRAM, and physical disk firmware
Manage RAID controllers
About This Guide 13
View online help
View the event log

Other Information You May Need

CAUTION: For complete regulatory and safety information, see your Product
Information Guide. Warranty information may be included within this document or
as a separate one.
Setting Up Your Dell PowerVault MD
and cabling your
Dell™ PowerVault™ MD Installation Guide
storage array.
configuration instructions for both software and hardware.
Dell™ PowerVault™ MD Hardware Owner's Manual
about the enclosure hardware.
Dell™ PowerVault™ MD Storage Manager CLI Guide
about using the command line interface (CLI).
Dell™ PowerVault™ MD Resource
• and management tools.
Dell™ PowerVault™ MD Systems Support Matrix
supported software and hardware for MD systems. The document is available at
Dell PowerEdge
support.dell.com
®
Cluster Documentation is available at
.
A link to clustering documentation is also included on the under
Product Documentation
Documentation for any components you purchased separately provides information to configure and install these options.
Release notes or readme files are included to provide last-minute updates to the
enclosure
or documentation or advanced technical reference
material intended for experienced users or technicians.
provides an overview of setting up
provides installation and
provides information
provides information
CD contains all system documentation
provides information on
support.dell.com
Resource CD
.
.
NOTE: Always check for updates on support.dell.com and read the updates
first because they often supersede information in other documents.
14 About This Guide

About Your Storage Array

This chapter covers basic information about how to manage storage arrays from MD Storage Manager, including adding and removing arrays from the software, performing initial setup tasks, setting passwords on an array, and configuring alert notifications. For information on planning your storage array, see the Installation Guide.
Following is a list of terms that are used throughout this chapter:
Physical Disk — Non-volatile, randomly-addressable device for storing data.
Host —
disks.
Host Group — Hosts that are logically associated and share access to the same virtual disks.
Host-Agent Software — Software installed on the host that provides in­band management and topology discovery.
Logical Unit Number (LUN) — Address that identifies individual virtual disks within a storage array.
Event Monitor — A
managed storage arrays and notifies a host or remote system when critical problems occur.
SNMP Alert — Alert (SNMP trap) that is sent from the event monitor to an SNMP-enabled host.
System that accesses a storage array and is mapped to virtual
feature that, when enabled, monitors activity on

Access Virtual Disk

Each RAID controller in an MD Storage Array maintains an access virtual disk. The host-agent software uses the access virtual disk to communicate
management requests and event information between the storage management station and the RAID controller module in an storage array. The access virtual disk is not available for application data storage. The default LUN is 31.
in-band–managed
Storage Array 15
NOTICE: Removing or manipulating an access virtual disk can cause a loss of
management access. If you remove an access virtual disk mapping from an in-band-managed storage array, MD Storage Manager can no longer access the storage array. Do not modify the access virtual disk either in the operating system or with MD Storage Manager.

Out-of-Band and In-Band Management

You can manage a storage array in two ways:
Out-of-band management
In-band management
For out-of-band management, data is separate from commands and events. Data travels through the host-to-controller interface, while commands and events travel through the management port Ethernet cables.
When you use out-of-band management, you must set the network configuration for each RAID controller module’s management Ethernet port, including its Internet Protocol (IP) address, subnetwork mask (subnet mask), and gateway. If you are using a Dynamic Host Configuration Protocol (DHCP) server, you can enable automatic network configuration, but if you are not using a DHCP server, you must enter the network configuration manually.
NOTE: RAID controller module network configurations can be assigned using a
DHCP server (the default setting). However, if a DHCP server is not available and the 10-second selection period times out, the RAID controller modules use the
192.168.128.101 static IP address for controller 0. For controller 1, the RAID controller modules use the 192.168.128.102 static IP address.
For in-band management, commands, events, and data travel through the host-to-controller interface. Unlike out-of-band management, commands and events are mixed with data.
For detailed information on setting up in-band and out-of-band management see the Installation Guide.
NOTE: In-band management is not supported on systems running the Red Hat®
Enterprise Linux
®
3 operating system.
16 Storage Array

Adding Storage Arrays

To add a storage array to MD Storage Manager, click New in the Array Selector area. A window is displayed that allows you to choose the automatic or manual process to add a new storage array.
NOTE: Verify that your host or management station network configuration—
including station IP address, subnet mask, and default gateway—is correct before adding a new storage array using the Automatic option.
NOTE: For Linux, set the default gateway so that broadcast packets are sent to
255.255.255.255. For Red Hat default gateway to the IP address of the NIC.
NOTE: MD Storage Manager uses TCP/UDP port 2463 for communication to the
MD Storage Array.

Automatic Discovery of Storage Arrays

The Automatic Discovery process sends out a broadcast message across the local subnetwork (subnet) and adds any storage array that responds to the message. The Automatic Discovery process finds both in-band and out-of­band storage arrays.

Manual Addition of a Storage Array

Use Manual Addition if the storage array resides outside of the local subnet. This process requires specific identification information to manually add a storage array:
To add a storage array that uses in-band management, specify the host name or IP address of the host.
When adding a storage array using in-band management with iSCSI, a session must first be established between the initiator on the host server and the storage array. For more information, see "Configuring iSCSI" in the
Modular Disk 3000i Systems Installation Guide.
®
Linux®, if no gateway exists on the network, set the
The host agent must be restarted before in-band management communication can be established. See "Starting or Restarting the Host­Agent Software in Windows" on page 28 or "Starting or Restarting the Host-Agent Software in Linux" on page 28.
Storage Array 17
To add a storage array that uses out-of-band management, specify the host name or IP address of each controller in the storage array.
NOTE: It can take several minutes for MD Storage Manager to connect to the
specified storage array.

Naming Storage Arrays

Each storage array should be assigned a unique name. A storage array name has a 30-character limit. All leading and trailing spaces are deleted from the name. A name can consist of letters, numbers, and the special characters underscore (_), dash (–), and pound sign (#). No other special characters are allowed.
To physically locate a storage array:
1
Click the
2
Click
3
Select the storage array from the displayed list and click
The indicator light on the front of the storage array flashes.
4
Click
To rename the selected storage array:
1
Click the
2
Click
3
Type a unique, meaningful name that is easy to understand and remember.
4
Click OK.
Tools
tab.
Blink
and then click
Stop
after you locate the array.
Tools
tab.
Rename Storage Array
Blink Storage Array or Enclosures
.
Blink
.
.
NOTE: Avoid arbitrary names or names that might lose meaning in the future.

Removing Storage Arrays

You can remove a storage array from the list of managed arrays if you no longer want to manage it from a specific storage management station. Removing a storage array does not affect the storage array or its data in any way. Removing a storage array simply removes it from the list of storage arrays that appear in the drop-down list in the Array Selector. If a storage array is accidentally removed, it can be added again (see "Adding Storage Arrays" on page 17).
18 Storage Array
To remove a storage array:
1
Click
Remove
Selector.
2
Click OK in the
You can still manage the storage array from other storage management stations where it has been added.
located to the right of the drop-down menu in the Array
Remove
dialog box.

Setting Up Your Storage Array

The Perform Initial Setup Tasks link located on the Summary tab provides links to the basic steps you should follow when initially setting up a storage array in MD Storage Manager. Following these steps ensures that you complete all the basic steps to configure your storage array.
Initial setup tasks include:
1
Blink the Storage Array — Find the physical location of the storage array on your network. The storage array can then be identified with a label.
2
Rename the Storage Array — Provide a unique and memorable name to help you easily identify the storage array.
3
Set a Storage Array Password — Set a unique password to prevent unapproved manipulation of the storage array, such as deletion of a virtual disk.
4
Set up alert notifications — Enable e-mail and SNMP alerts to notify administrators about storage array conditions that require attention. See "Configuring Alert Notifications" on page 25 for more information.
a
Configure Sender E-mail Settings — Provide the SMTP, e-mail address, and contact information MD Storage Manager uses to send e-mail alerts.
b
Add or Edit E-mail Addresses — Provide information about accounts that should receive e-mail–based alerts.
c
Set up SNMP Alerts — Provide information about hosts that should receive SNMP-based alerts.
5
Configure iSCSI Host Ports — Configure network parameters for the iSCSI host ports on the RAID controller module(s).
Storage Array 19
6
Configure Host Access — Set up one or more hosts to access the storage array. See "Configuring Host Access" on page 43 for more information.
7
Configure storage array (2 options)
a
Automatic (Simple) configuration
Step 1: Automatic Configuration — See "Creating Disk Groups and Virtual Disks" on page 54 for more information.
Step 2: Create Host-to-Virtual Disk Mappings — See "Creating Host-to-Virtual Disk Mappings" on page 60 for more information.
b
Manual (Advanced) configuration
Step 1: Create Virtual Disks — See "Manual Configuration" on page 55 for more information.
Step 2: Configure Hot Spare Physical Disks — See "Manually Configuring Hot Spares" on page 59 for more information.
8
Manage iSCSI Settings — This option will be present only if your controllers contain iSCSI host ports.
a
Change Target Authentication — Choose the authentication methods and permissions (if required) for an initiator to access the target.
b
Enter Mutual Authentication Permissions — If initiators require mutual authentication, you can enter permissions for the target to access the initiator.
c
Change Target Identification — Define an alias for the target for easy identification.
d
Change Target Discovery — Configure parameters for how the target will be discovered on the network.
9
View and Enable Premium Features (Optional) — You may have purchased premium features, including snapshot virtual disks and virtual disk copies. See which premium features are currently available to you and enable these features if they are currently turned off.
10
Configure Ethernet Management Ports (Optional) — Configure network parameters for the Ethernet management ports managing a storage array for out-of-band Ethernet connections.
20 Storage Array

Storage Array Support Data

Aggregated support data can be generated for a storage array to aid in remote troubleshooting and issue analysis. To generate the support data report:
1
Click the
2
Click
3
In the report saved.
4
Type a meaningful name in the
5
Click
A compressed (zip) file containing support data is saved to the location of your choice.
Support
Browse
Save in
Start
.
tab, then click
to display the
drop-down box, navigate to the location where you want the
Gather Support Information
Collect All Support Data
File name
text box and click
.
dialog box.
Save
.

Setting a Password

You can configure each storage array with a password to protect it from unauthorized access. MD Storage Manager asks for this password when an attempt is made to change the storage array configuration, such as when a virtual disk is created or deleted. View operations do not require a password.
To set, change, or remove a password for a storage array:
1
Click the
Text boxes for the current password, the new password, and new password confirmation are displayed.
To ol s
tab, then click
Set or Change Password
.
2
To enter a new password:
Leave the
Enter the new password in the
password
To change a password:
Enter the current password in the
Enter the new password in the
password text boxes.
Current password
text boxes.
text box blank.
New password
Current password
New password and Confirm new
and
Confirm new
text box.
Storage Array 21
To remove a password:
Enter the current password in the
Leave the blank.
If you forget your password, contact Dell for technical assistance.
New password
and
Current password
Confirm new password
text box.
text boxes

Password Guidelines

Consider these guidelines when you create a password:
Use secure passwords for your storage array. A password should be easy for you to remember but difficult for others to determine. Consider using numbers or special characters in the place of letters, such as a 1 in the place of the letter
For increased protection, use a long password with at least 15 alphanumeric characters. The maximum password length is 30 characters.
Passwords are case sensitive.
For security reasons, you can attempt to enter a password only ten times before the storage array enters a lockout state. Before you can try to enter a password again, you must wait ten minutes for the storage array to reset.
I,
or the at sign (@) in the place of the letter a.

Resetting a Password

Perform this procedure when you have lost or forgotten your password and you need to reset it.

Connecting the Serial Cable

1
Remove the serial cable from the password reset cable package.
2
Connect the DB9 (oval) end of the cable to the serial port on the computer to be used to communicate with the RAID Controller module.
3
Connect the PS2-type (round) end of the cable to the serial port on either of the MD RAID Controller Modules. The flat side of the connector faces down when inserting.
22 Storage Array

System Setup for Password Reset

Microsoft
®
Windows® Operating Systems
1
Click
Start
→ Programs → Accessories → Communication
HyperTerminal
If HyperTerminal is not installed, click
Programs
and click the check-box, then click
NOTE: The original Windows installation disk may be needed to install
HyperTerminal.
NOTE: HyperTerminal is not a component on Windows Server
systems.
2
When
HyperTerminal
3
Select the COM1 port and click OK.
4
Set the following communication settings, click
to run HyperTerminal.
Control Panel → Add/Remove
Add/Remove Windows Components
Apply
and OK.
prompts for a name, type
, find
HyperTerminal
®
MD
and click OK.
Apply
, then click OK.
2008 operating
Bits per second: 115200
Data bits: 8
Parity: none
Stop bits: 1
Flow control: none
LINUX Operating System
The following instructions use the Linux application, MINICOM, to connect via the serial port:
1
Open a terminal/command window.
2
At the prompt, type
3
Once MINICOM is open, press <Ctrl><A>, then <Z>, then the letter
minicom
(all lowercase) and press <Enter>.
<O> to open the configuration screen.
4
Select
Serial Port Setup
5
Press <F> to change
6
Press <E> to set the
and press <Enter>.
Hardware Flow Control
Comm Parameters
.
setting to no.
Storage Array 23
7
Press <I> to set the
8Press <Q> to set the
speed
to
115200.
data, parity
, and
stopbits
to
8-N-1
press <Enter>.
9
Press <Enter> to exit the
10
Select Exit and press <Enter> again to exit the setup screen.
Comm Parameters
screen.

Reset Password

NOTICE: Failure to stop data I/O to a non-fault-tolerant array before performing the
following steps may result in loss of data.
1
Stop all I/O to the array.
2
From the HyperTerminal (Windows) or MINICOM (Linux) window, press <Ctrl><B>.
3
At the
SPECIAL OPERATIONS MENU
<Enter>.
4
At the
SERIAL INTERFACE MODE MENU
then <Q> and <Enter>.
5
At the
BOOT OPERATIONS MENU
restart the controller. Text scrolls across the screen as the controller reboots.
6
Once Controller 0 has fully booted (look for HyperTerminal or MINICOM window), press <Enter>.
7
At the prompt, type
clearSYMbolPassword
and press <Enter>.
The return
value = 0 = 0x0
indicates that the password has been
reset /deleted.
, press <1>, <0>, and
, press <1> and <Enter>,
, press <R> and <Enter> to
sodMain complete
(must use exact case)
, then
in the
8
Close HyperTerminal or MINICOM.
9
Remove password reset cable.
10
To set a new password, go to the Modular Disk Storage Manager software under the
11
Leave the Current Password blank, enter the new password twice, and click
OK
Tools
.
tab and click
Set Or Change Password Link
24 Storage Array
.
NOTE: If you require help with this procedure, contact Dell for technical
assistance. For more information on contacting Dell, see the "Getting Help" chapter of the Hardware Owners Manual.

Changing Expansion Enclosure ID Numbers

When an MD1000 expansion enclosure is attached to an MD3000/MD3000i storage array for the first time, an enclosure ID number is assigned and maintained by the MD1000. This enclosure ID number is also shown in the MD Storage Manager, but it is not an indicator of the enclosure’s physical location. It may appear that MD Storage Manager is reporting the expansion enclosures in improper order.
You can change the enclosure ID numbers in the MD Storage Manager by clicking the To ol s menu and then clicking Change Enclosures ID Numbers. Any ID number you assign will not conflict with the enclosure IDs.

Configuring Alert Notifications

MD Storage Manager can send an alert for any condition on the storage array that requires your attention, such as the failure of a storage array component or the occurrence of an adverse environmental condition. Alerts can be sent as e-mail messages or as SNMP messages.
You can verify whether alerts are currently set by looking at the Alert status line in the Status area of the Summary tab.

Configuring E-mail Alerts

To configure e-mail alerts, click the Tools tab and then click Set up e-mail alerts. The Content Area displays two links: Configure Sender E-mail Settings and Add or Edit E-mail Addresses.
NOTE: These settings apply to all storage arrays currently managed by the
management station.
Storage Array 25
Sender e-mail settings include the SMTP and e-mail address information MD Storage Manager uses to send e-mail alerts. To configure sender e-mail settings:
1
Click the
2
Enter the following information:
Tools
tab, then click
Sender email address
Set Up Email Alerts
.
— The e-mail address that appears as the sender
on every e-mail alert, such as that of the network administrator.
Mail (SMTP) server
— The name of the Simple Mail Transfer Protocol (SMTP) gateway of the mail server from which e-mail alerts will be sent. For example,
Edit Sender Contact Information (Optional)
smtp.mycompany.com
— Additional
.
information about the sender such as the sender’s name, company, and phone number. This information is optional; e-mail alerts will work if contact information is not provided.
To specify to whom alerts are sent:
1
Click the
2
Type an e-mail address in the
Add
3
Specify the following for each e-mail address in the list (to choose a
Tools
tab, then click
Set Up Email Alerts
.
Recipient email addresses
to add it to the list of configured e-mail addresses.
text box and click
different setting, click the down arrow to the right of the field):
Information To Send
— Select one of the following options from the
drop-down list:
Event Only
information. This alert type is the default.
Event + Profile
information and the storage array profile.
Event + Support
information and a compressed file that contains complete support information for the storage array that has generated the alert.
Frequency
— Select one of the following options from the drop-down list:
Every event
option is the default.
26 Storage Array
— The alert e-mail contains only the event
— The alert e-mail contains the event
— The alert e-mail contains the event
— Sends an e-mail whenever an event occurs. This
Every x hours
— Sends an e-mail at the specified interval if an event occurred during that period. You can select this option only if the
4
Click
Information to send
Event + Support
Save
.
.
option is set to
Event + Profile or

Configuring SNMP Alerts

To add a management console to the list of addresses configured to receive SNMP alerts:
NOTE: The Management Information Base (MIB) for the MD Storage Array is
copied to the client directory as part of a Full or Management Station installation selection. DellMDStorageArray.mib can be compiled on an SNMP Management Console using the interface provided by the console.
1
Click the
2
Enter the
3
Enter the
4
Click
addresses
5
Repeat steps 2 through 4 until you have added all management consoles that should receive SNMP alerts.
6
Click OK.
To ol s
tab, then click
Community name
NOTE: The community name is an ASCII string that identifies a known set of
management consoles and is set by the network administrator in the management console. The default community name is public.
Trap destination
NOTE: The trap destination is the IP address or the host name of a
management console that runs an SNMP service.
Add
to add the management console to the
Set up SNMP Alerts
.
.
.
Configured SNMP
list.
NOTE: You must install an SNMP service on every system included in the list of
addresses configured to receive SNMP alerts.
NOTE: You do not have to install MD Storage Manager on a system in order to
display SNMP alerts. You need only install an appropriate SNMP service and application (such as the Dell IT Assistant).
Storage Array 27

Starting or Restarting the Host-Agent Software in Windows

The SMagent software automatically starts after you reboot the host. If you add a storage array after the host server has started, or if iSCSI sessions are created while the SMagent is running, you must restart the SMagent software manually using the following procedure:
1
Click
Start → Settings → Control Panel → Administrative Tools
Services
or
.
Start → Administrative Tools → Services
Click
2
In the Services dialog, select
3
If the Modular Disk Storage Manager Agent is running, click
Action→Stop
4
Click
Action →
, then wait approximately 5 seconds.
Start
.
Modular Disk Storage Manager Agent
.
.

Starting or Restarting the Host-Agent Software in Linux

The SMagent software automatically starts after you reboot the host. If you add a storage array after the host server has started, or if iSCSI sessions are created while the SMagent is running, you must restart the SMagent software manually using the following procedure.
To start or restart the host-agent software, enter the following command at the prompt:
SMagent start
The SMagent software might take a little time to initialize. The cursor is shown, but the terminal window does not respond. When the program starts, the following message is displayed:
SMagent started.
28 Storage Array
After the program completes the startup process, text similar to the following messages is displayed:
Storage Manager Agent, Version 09.1x.00.00 Built Wed Aug 15
16:54:46 CDT 2006 Copyright (C) 2006. All rights reserved.
checking device /dev/rdsk/c0t0d0s2 : skipping checking device
/dev/rdsk/c2t3d18s2 : skipping checking device /dev/rdsk/c2t3e16s2 : skipping checking device /dev/rdsk/c2t3d14w2 : skipping
Storage Array 29
30 Storage Array

Using iSCSI

This chapter provides information on using iSCSI in MD Storage Manager. For iSCSI prerequisite requirements and detailed step-by-step instructions on setting up and configuring iSCSI, see the Installation Guide.

Using the iSCSI Tab

The iSCSI tab is shown in the MD Storage Manager only when the controllers contain iSCSI host ports. You can define or change settings for the iSCSI target or enter the CHAP permissions in the iSCSI tab. Here are some of the iSCSI settings:
Change Target Authentication
supported by the target.
Enter Mutual Authentication Permissions
initiators that require mutual authentication.
Change Target Identification
• simpler identification.
Change Target Discovery
using the Internet Storage Name Service (iSNS) server settings.
Configure iSCSI Host Ports
View/End iSCSI Sessions
• sessions.
View iSCSI Statistics
— View and save iSCSI statistics.
— Select the authentication method to be
— Define the permissions for
— Associate an alias with the target for
— Modify the way to discover iSCSI targets
— Set the parameters for iSCSI host ports.
— View iSCSI session details and end iSCSI
Using iSCSI 31

Changing the iSCSI Target Authentication

If an initiator requires mutual (bi-directional) authentication see "Entering Mutual Authentication Permissions" on page 32.
1
Click the
2
Select target.
3
Select provide the target permissions. If defined, an error message appears.
Click CHAP Secret to see the Enter CHAP Secret dialog (see "Creating CHAP Secrets" on page 32). You can define the permissions in this dialog.
iSCSI
tab, and then click
None
if no authentication is required for any initiator to access the
NOTE: If you select None, any initiator can access this target. Use this option
only if you do not require secure data. However, if you select both None and CHAP at the same time, the storage array will allow an iSCSI initiator to log on with or without CHAP authentication.
CHAP
if you want any initiator that tries to access the target to
Change Target Authentication
CHAP
is selected, but no CHAP secret is
.

Entering Mutual Authentication Permissions

Mutual authentication or two-way authentication is a way for a client or a user to verify themselves to a host server, and for the host server to validate itself to the user. This validation is accomplished in such a way that both parties are sure of the other’s identity.
1
Click the
Permissions
2
Select an initiator from the list. The initiator details are shown.
3
Select that appears.
iSCSI
tab, and then click
.
CHAP Secret
Enter Mutual Authentication
to enter the initiator CHAP permissions in the dialog
NOTE: To add, modify, or delete an initiator, click the Modify tab, and then
click Edit Host Topology.

Creating CHAP Secrets

When you set up an authentication method, you can choose to create a Challenge Handshake Authentication Protocol (CHAP) secret. The CHAP secret is a password that is recognized by the initiator and the target. If you are using mutual authentication to configure the MD3000i storage array, you
32 Using iSCSI
must enter the same CHAP secret that is defined in the iSCSI initiator, and you must define a CHAP secret on the target (the storage array) that must be configured in every iSCSI initiator that will connect to the target. For more information on CHAP, see "Understanding CHAP Authentication" in the Installation Guide.
Initiator CHAP Secret
The initiator CHAP secret is set on the host using the iSCSI initiator. If you are using the mutual authentication method, you must define the initiator CHAP secret when you set up the host. This must be the same CHAP secret that is defined for the target when defining mutual authentication settings.
Target CHAP Secret
If you are using CHAP secrets, you must define the CHAP secret for the target.
Valid Characters for CHAP Secrets
The CHAP secret must be between 12 and 57 characters. The CHAP secret supports characters with ASCII values of 32 to 126 decimal. See Table 3-1 for a list of valid ASCII characters.
Table 3-1. Valid ASCII Characters for CHAP Secrets
Space! " #$%&’ ( )*+
, - . / 01234567
89: ; <=>? @ABC
DE F GHI J K L MNO
PQRSTUVWXYZ[
\]^_abcdefgh
ijklmnopqrst
uvwxyz{|}~
Using iSCSI 33

Changing the iSCSI Target Identification

You cannot change the iSCSI target name, but you can associate an alias with the target for simpler identification. Aliases are useful because the iSCSI target names are not intuitive. You should provide an iSCSI target alias that is meaningful and easy to remember.
1
Click the
2
Type the alias in the
iSCSI
tab, and then click
iSCSI target alias
NOTE: Aliases can contain a maximum of 30 characters. Aliases can include
letters, numbers, and the special characters underscore (_), minus (-), and pound sign (#). No other special characters are permitted.
NOTE: Open iSCSI (which is used by Red Hat Enterprise Linux 5 and SUSE
Linux Enterprise Server 10 with SP 1) does not support using target alias.
Change Target Identification
field and click OK.
.
®

Changing the iSCSI Target Discovery

1
Click the
2
Select the You can use
a
b
3
If you do not want to allow discovery sessions that are not named, select
Disallow un-named discovery sessions
Un-named discovery sessions are discovery sessions that are permitted to run without a target name. With an un-named discovery session, the target name or the target portal group tag is not available to enforce the iSCSI session identifier (ISID) rule. For more information on un-named discovery sessions, click the Support tab, then click View Online Help.
iSCSI
tab, and then click
Use iSNS server
one
of these methods:
Use the DHCP option (IPv4 only) to automatically activate target discovery. You also can refresh the DHCP.
Type the IPv4 or IPv6 address to activate the target discovery. After you manually enter an IP address, you also can click the customized TCP listening ports.
check box to activate iSCSI target discovery.
Change Target Discovery
Advanced
.
.
to set
34 Using iSCSI

Configuring the MD3000i iSCSI Host Ports

Use the configuration dialog for the iSCSI host ports to set up the MD3000i iSCSI host ports to use with storage arrays in a storage area network (SAN).
1
Click the
2 Select the controller in the iSCSI host port field, and then
these methods to configure the port:
a
b

Advanced iSCSI Host Ports Settings

iSCSI
tab, and then click
Configure iSCSI Host Ports
use
.
one
of
Automatically obtain the configuration using one of the following methods:
IPv4 — Obtain the configuration from the DHCP server, or refresh DHCP.
IPv6 — Obtain the configuration automatically from a router.
Manually specify the configuration using one of the following methods:
IPv4 — Enter the IP address, subnet mask, and gateway for the host port.
IPv6 — Enter the IP address, routable IP addresses, and router IP address.
After you manually enter an IP address, you also can click set the
advanced parameters for the iSCSI target discovery.
Advanced
to
NOTE: Configuring the advanced iSCSI host ports settings is optional.
Use the advanced settings for the individual iSCSI host ports to specify the TCP frame size, the virtual LAN, and the network priority.
Table 3-2. Advanced iSCSI Host Port Settings
Setting Description
Virtual LAN (VLAN) A method of creating independent logical networks within
a physical network. Several VLANs can exist within a network. VLAN 1 is the default VLAN.
NOTE: For more information on creating and configuring a
VLAN with MD Support Manager, click the Support tab, then click View Online Help.
Using iSCSI 35
Table 3-2. Advanced iSCSI Host Port Settings (continued)
Setting Description
Ethernet Priority The network priority can be set from lowest to highest.
Although network managers must determine these mappings, the IEEE has made broad recommendations:
•0 — lowest priority (default)
1-4
— ranges from "loss eligible" traffic to controlled-load
• applications, such as streaming multimedia and business­critical traffic
5-6
— delay-sensitive applications such as interactive
• video and voice
7
— highest priority reserved for network-critical traffic
• (do not use with the MD3000i)
TCP Listening Port The default Transmission Control Protocol (TCP)
listening port is 3260.
Jumbo Frames The maximum transmission units (MTUs). It can be set
between 1500 and 9000 bytes per frame. If the Jumbo Frames are disabled, the default MTU is 1500 bytes per frame.
NOTE: Changing any of these settings resets the iSCSI port. I/O is interrupted to
any host accessing that port. You can access the I/O automatically after the port restarts and the host logs in again.

Viewing or Ending an iSCSI Session

1
Click the
2
Select the session you want to view in the details are shown below in the
3
If you want to end the session, perform the following steps:
a
36 Using iSCSI
iSCSI
tab, and then click
View/End iSCSI Sessions
Current sessions
Details
box.
Select the session that you want to end, and then click show the
End Session
confirmation window.
.
box. The
End Session
to
b
In the confirmation window, type the iSCSI session, and then click
NOTE: If you end a session, any corresponding connections terminate the link
between the host and the storage array, and the data on the storage array is no longer available.
NOTE: When a session is manually terminated using the MD Storage
Manager, the iSCSI initiator software will automatically attempt to re­establish the terminated connection to the storage array. This may cause an error message.
4
Click
Save As
to save the entire iSCSI sessions topology as a text file.
yes
to confirm that you want to end
OK
.

Viewing iSCSI Statistics and Setting Baseline Statistics

If the configured storage array has iSCSI technology, the View iSCSI Statistics option is available only on the iSCSI tab.
1
Click the
2
Select the iSCSI statistic type you want to view. Select one of these types:
Ethernet MAC statistics
Ethernet TCP/IP statistics
Target (protocol) statistics
3
Choose either
Raw statistics are all the statistics that have been gathered since the controllers were started. Baseline statistics are point-in-time statistics that have been gathered since you set the baseline time.
iSCSI
tab, and then click
Raw statistics
View iSCSI Statistics
or the
Baseline statistics
.
.
After you select the statistics type and either raw or baseline statistics, the details of the statistics appear in the statistics tables.
4
To set the baseline for the statistics, complete the following steps:
a
Select
Baseline Statistics
b
Click
Set Baseline
.
.
Using iSCSI 37
c
Confirm that you want to set the baseline statistics in the dialog that appears.
The baseline time shows the latest time you set the baseline. The sampling interval is the difference in time from when you set the baseline until you launch the dialog or click
NOTE: You must first set a baseline before you can compare baseline
statistics.
Refresh
.

Edit, Remove, or Rename Host Topology

If you give access to the wrong host or the wrong host group, you can remove or edit the host topology. Use one of the following actions to correct the host topology:
Table 3-3. Host Topology Actions
Desired Action Steps to Complete Action
Move the host, the host group, or the iSCSI initiator.
Manually change the host type.
Manually delete the host, the host group, or the iSCSI initiator.
Rename the host, the host group, or the iSCSI initiator.
1
Click the
To po l og y
2
Select the item that you want to move, and then click
Move
3
Select a host group to move the host to and click OK.
1
Click the
To po l og y
2
Select the host that you want to change and click
Change
3
Select a new host type (or operating system) and click
1
Click the
To po l og y
2
Select the item that you want to remove and click
Remove
1
Click the
To po l og y
2
Select the item that you want to rename and click
Rename
3
Type a new label for the host and click OK.
.
OK
Modify
.
Modify
.
.
.
Modify
.
.
Modify
.
.
tab, and then click
tab, and then click
tab, and then click
tab, and then click
Edit Host
Edit Host
Edit Host
Edit Host
38 Using iSCSI
Table 3-3. Host Topology Actions (continued)
Desired Action Steps to Complete Action
Add an iSCSI Initiator. 1
Click the
To po l og y
2
Select the host you want to add an iSCSI initiator to and click
3
Type or select an iSCSI initiator name and label for
Modify
.
Add
.
tab, and then click
the iSCSI initiator and click
OK
Edit Host
.
Using iSCSI 39
40 Using iSCSI

Event Monitor

An event monitor is provided with MD Storage Manager. When enabled, the event monitor runs continuously in the background and monitors activity on the managed storage arrays. If the event monitor detects any critical problems, it can notify a host or remote system using e-mail, Simple Network Management Protocol (SNMP) trap messages, or both.
For the most timely and continuous notification of events, enable the event monitor on a management station that runs 24 hours a day. Enabling the event monitor on multiple systems or having a combination of an event monitor and MD Storage Manager active can result in duplicate events, but this does not indicate multiple failures on the array.

Enabling the Event Monitor

You can enable the event monitor at any time.
NOTE: It is a good idea to configure the event monitor to start by default on a
management station that runs 24 hours a day.
Microsoft® Windows
1
Select
Start →
Services
or
Start →
Select
2
From the list of services, select
Monitor.
3
Select
Action →
4
In the
Service Status
Linux
At the command prompt, type SMmonitor start and press <Enter>. When the program startup begins, the system displays the following message:
SMmonitor started.
®
Settings → Control Panel → Administrative Tools →
.
Administrative Tools →
Modular Disk Storage Manager Event
Propertie
s.
area, click
Start
Services
.
.
Event Monitor 41

Disabling the Event Monitor

Disable the event monitor if you do not want the system to send alert notifications. If you are running the event monitor on multiple systems, disabling the event monitor on all but one system prevents the sending of duplicate messages.
Windows
1
Select
Start →
Services
or
.
Settings →
Control Panel →
Administrative Tools →
Start →
Select
2
From the list of services, select
Monitor
3
Select
Action →
4
In the
Service Status
Linux
At the command prompt, type SMmonitor stop and press <Enter>. When the program shutdown is complete, the system displays the following message:
Stopping Monitor process.
Administrative Tools →
.
Properties
area, click
Services
Modular Disk Storage Manager Event
.
Stop
.
.
42 Event Monitor

About Your Host

This chapter covers basic information about configuring host groups and host access, host topology, and I/O data path protection.
A host is a system that accesses a storage array and is mapped to the virtual disks through one or more host connections. Hosts have the following attributes:
Host name — A name that uniquely identifies the host.
Host type — The operating system running on the host.
Host connection — A physical connection to the host server. Host connections can be automatically detected by MD Storage Manager and can be identified by an alias assigned by the user.
Host group — A host may be associated with other hosts to share access to the same virtual disks.

Configuring Host Access

Configuring host access allows you to either permit or deny access to a storage array for specific hosts. When you permit host access, that host can then be mapped to a virtual disk on the storage array. On the Summary tab, the Hosts & Mappings area indicates how many hosts are configured to access the array. Click Configured Hosts in this area to see the names of these hosts.
Host access configuration is the first step in setting up your storage array. You must complete this task during initial setup and anytime you connect a new host.
After you configure host access, the host does not yet have the ability to write data to the storage array. You must map hosts to the virtual disks and register virtual disks with the host’s operating system before a host can write to the storage array. See “Disk Groups and Virtual Disks” on page 53 for information on these tasks.
About Your Host 43
To begin configuring host access, click the Configure tab and then click either Configure Host Access (Automatic) or Configure Host Access (Manual). See the appropriate section for manual configuration, depending on whether you are using SAS HBA or iSCSI.

Automatic Configuration

To automatically configure a host for access to the storage array:
Click the
1
(Automatic)
2
To see hosts that already have access to the storage array, click
configured hosts
3
Select the hosts you want to give access to the storage array in the
Available hosts
4
To see the ports and the host type for the selected hosts, click
Configure
.
.
window.
tab and then click
Configure Host Access
View
View Details
at the right of the list.
5
Click
Add
to move specific hosts to the
6
Click OK to configure access for the hosts you selected.
Selected hosts
window.

Manual Configuration (using SAS HBA)

NOTE: Host access that is manually configured requires special attention to
ensure that the correct SAS host port World Wide IDs are selected for each host. If any incorrect IDs are configured, an inaccurate topology will result. You can use the SAS/5/E HBA BIOS Setup program to identify the World Wide IDs for the SAS host ports.
Configure the host to make it available to the storage array for volume mapping by following these steps.
1
Click the
2
Type a name of your choice in the
This can be an informal name, not necessarily a name used to identify the host to the network.
Configure
tab and then click
Enter host name
Configure Host Access (Manual)
text box.
.
3
Select the operating system of your host in the
Next
then click
.
44 About Your Host
Select host type
box and
4
Specify the HBA host ports by choosing known host ports or by manually defining host ports.
To select a host port that is already recognized by MD Storage Manager, click a host port in the
To manually define a host port, click
Alias
in the
Enter New HBA Host Port
5
Click
Next
.
6
Indicate whether the host is part of a host group (cluster):
If the host is not part of a host group, select
If the host is part of a host group, select
Known HBA host ports
New
, enter the
dialog box, and then click
No
Yes
:
list, then click
HBA host port
.
Add
.
and
Add
.
To create a new host group, enter a name in the
text box.
name
To add the host to an existing host group, select the host group from
the
7
8
Click
Click
Select existing host group
Next
.
Finish
to configure the host
box.
.
Enter new host group

Manual Configuration (using iSCSI)

Configure the host to make it available to the storage array for volume mapping by following these steps.
1
Click the
2
Type a name of your choice in the
This can be an informal name, not necessarily a name used to identify the host to the network.
3
Select the operating system of your host in the box and then click
4
Specify the iSCSI initiators by choosing known initiators or by manually defining initiators.
To select an initiator that is already recognized by MD Storage Manager, click an initiator in the
Configure
tab and then click
Enter host name
Next
.
Known iSCSI Initiators
Configure Host Access (Manual)
text box.
Select host type
list, and then click
drop-down
Add
.
.
About Your Host 45
To manually define an initiator, click and
iSCSI initiator label
Add
then click
NOTE: The initiator name entered must match the name on a host server that
will connect to the storage array.
5
Click
Next
6
Indicate whether the host is part of a host group (cluster):
.
.
in the
If the host is not part of a host group, select
New
, enter the
iSCSI initiator name
Enter new iSCSI initiator
No
.
dialog box, and
If the host is part of a host group, select
To create a new host group, enter a name in the
name
text box.
Yes
:
Enter new host group
To add the host to an existing host group, select the host group from
the
7
8
Click
Click
Select existing host group
Next
.
Finish
to configure the host
box.
.

Removing Host Access

Use the following procedure to remove a host’s access to a storage array:
Click the
1
2
In the host topology list, click the plus sign (+) to the left of the host group name.
The host group expands to show the hosts in the group.
3
In the list, click the name of the host whose access you want to remove, and then click access.
4
Repeat step 3 for each host whose access you want to remove.
5
When the list contains only those hosts you want to access the storage array, click
Modify
tab, then click
Remove
Close
beneath the list.
Edit topology
.
located to the right of the list. Click
Yes
to remove
46 About Your Host

Host Groups

A host group is a logical entity of two or more hosts that share access to specific virtual disks on the storage array. You create host groups with MD Storage Manager.
All hosts in a host group must have the same host type (operating system). In addition, all hosts in the host group must have special software, such as clustering software, to manage virtual disk sharing and accessibility.
If a host is part of a cluster, every host in the cluster must be connected to the storage array, and every host in the cluster must be added to the host group.
Use the following procedures to create a host group, to add or remove hosts from a host group, or to delete a host group.

Creating a Host Group

1
Click the
2
Type a name for the new host group in the text box.
3
In the the host group, then click
The host moves to the
4
Repeat step 3 until all the hosts you want to add to the host group are moved into the
5
Click OK.
Configure
Select hosts to add
tab and then click
Hosts in group
Hosts in group
Create Host Group
Enter new host group name
list, click the name of a host you want to add to
Add
.
list.
list.
.

Adding a Host to a Host Group

1
Click the
A list of hosts and host groups appears.
2
In the host topology list, click the plus sign (+) to the left of the host group name.
The host group expands to show the hosts in the group.
3
Click the host you want to move and click
Modify
tab, then click
Edit Host Topology
Move
.
About Your Host 47
.
4
Select the host group to which you want to move the host.
5
Click OK.
The host is moved into the host group.
The host retains the virtual disk mappings assigned to it, and inherits the virtual disk mappings assigned to the group. Other hosts in the group do not inherit the mappings of the added host.

Removing a Host From a Host Group

1
Click the
A list of hosts and host groups appears.
2
In the host topology list, click the plus sign (+) to the left of the host group name.
The host group expands to show the hosts in the group.
3
Click the name of the host you want to remove from the group.
4
Click
5
Click
The host is moved out of the host group. The host retains the virtual disk mappings assigned to it, and loses the virtual disk mappings assigned to the group.
Modify
Remove
Yes
to remove the host.
tab, then click
located to the right of the list.
Edit Host Topology
.

Moving a Host to a Different Host Group

1
Click the
A list of hosts and host groups appears.
2
In the host topology list, click the plus sign (+) to the left of the host group name.
The host group expands to show the hosts in the group.
3
Click the name of the host you want to move to another group and click
Move
4
Select the host group to which you want to move the host.
5
Click OK.
The host is moved to the indicated host group.
48 About Your Host
.
Modify
tab, then click
Edit Host Topology
.
The host retains the virtual disk mappings assigned to it, and inherits the virtual disk mappings assigned to the group to which it is moved. The host loses the virtual disk mappings assigned to the group from which it was moved.

Removing a Host Group

This section covers removing an entire host group. To remove a single host from a host group, see "Removing a Host From a Host Group" on page 48.
1
Click the
2
In the host topology list, click the name of the host group you want to remove.
3
Click
4
Click
The host group and its assigned virtual disk mappings are removed.
NOTE: If the host group contains hosts, those hosts are removed as well, including
their access to the storage array.
Modify
Remove
Yes
.
tab, then click
.
Edit Host Topology
.

Host Topology

Host topology is the organization of hosts, host groups, and host interfaces configured for a storage array. The Edit Host Topology screen accessed from the Modify tab shows the hierarchy of the host groups, the hosts that are part of each host group, and the host connections of each host.
You can use these tasks to change the host topology:
Move a host or a host connection
Rename a host group, a host, or a host connection
Add a host connection
Replace a host connection
Change a host type
MD Storage Manager automatically detects these changes for any host running the host agent software.
About Your Host 49

Host Context Agent

The host context agent discovers the host topology. The host context agent starts when the host is started and stops when the host is turned off. The topology discovered by the host context agent can be viewed by clicking Configure Host Access (Automatic) in the Configure tab in the MD Storage Manager.
You must stop and restart the host context agent to see the changes to the host topology if any of the following situations occur:
A new storage array is attached to the host server.
A host is added while turning on power to the RAID controller modules.
Linux
In Linux, you can stop and start the host context agent from the command line. Use the following syntax: SMagent start or SMagent stop.
You will stop and then restart SMagent after performing either of the two following maintenance tasks.
Moving a controller offline or replacing a controller.
Removing host-to-array connections from or attaching host-to-array connections to a Linux host server.
Windows
In Windows, you can stop and start the host context agent from the Services option of the Administrative Tools. To access the host context agent:
1
Select
Start → Settings → Control Panel→ Administrative Tools →
Services
or
.
Select
Start →
2
From the list of services, select
50 About Your Host
Administrative Tools →
Services
Modular Disk Storage Manager Agent
.
.

I/O Data Path Protection

You can have multiple host-to-array connections for a host. Make sure to select all of the connections to the array when configuring host access to the storage array.
NOTICE: Refer to the Installation Guide for more information on cabling
configurations.
NOTE: For maximum redundancy, you must select all host connections to the array
when manually defining host topology. For example, a host might have two host connections. For this host, you would select two host connections.
If a component such as a RAID controller module or a cable fails, or an error occurs on the data path to the preferred RAID controller module, virtual disk ownership is moved to the alternate nonpreferred RAID controller module for processing. This failure or error is called failover.
Multi-path drivers such as MPIO and MPP are installed on host systems that access the storage array and provide I/O path failover. The multi-path driver (MPIO in Windows and MPP in Linux) is used for failover. Automatic Virtual Disk Transfer (AVT) is used specifically for single-port cluster failover. The AVT feature mode is automatically selected by host type.
NOTE: You should have the multi-path driver installed on the hosts at all times,
even in a configuration where there is only one path to the storage system, such as a single port cluster configuration.
During a failover, the virtual disk transfer is logged as a critical event, and an alert notification is sent automatically if you have configured alert destinations for the storage array.

Failover with Red Hat Enterprise Linux

For users running Red Hat Enterprise Linux Version 3.0 (x86), the mpp_vhba failover driver component does not load unless a storage array is connected and a LUN is mapped to the host server. Follow these steps to ensure proper MPP driver loading and LUN mapping:
1
Ensure that the storage array is connected to the host server and that out­of-band (Ethernet) connections to each RAID controller module exist.
2
Create a virtual disk and map it to LUN 0.
3
Reboot the host.
About Your Host 51
After the host is rebooted, the LUN is properly mapped and the MPP driver is loaded. All other sequential LUNs can be created and registered to the operating system by running hot_add.
52 About Your Host

Disk Groups and Virtual Disks

Following is a list of terms used throughout this chapter:
Disk Group — A set of physical disks that are logically grouped and assigned a RAID level. Every disk group provides the overall capacity required to create one or more virtual disks.
Virtual Disk — A logical component created to enable hosts to access storage on the storage array. A virtual disk is created from the capacity available on a disk group and appears as one logical component even though it is created from more than one physical disk.
Storage Partitioning —
consisting of one or more virtual disks that can be accessed by a single host or shared among hosts that are part of a host group.
Unconfigured Capacity —
a disk group.
Free Capacity —
virtual disk.
Standby Hot Spare Drive —
spare drive and is available to take over for any failed physical disk.
In-use Hot Spare Drive —
spare drive and is currently taking over for a failed physical disk.
Snapshot Virtual Disk —
storage array.
Snapshot Repository Virtual Disk — Virtual disk containing metadata and copy-on-write data for a particular snapshot virtual disk; automatically created when the snapshot virtual disk is created.
Consistency Check — Background operation that checks the parity of virtual disks.
Logical division of a storage array into entities
Physical disks that are not already assigned to
Space in a disk group that has not been assigned to a
Physical disk that has been assigned as a hot
Physical disk that has been assigned as a hot
Point-in-time image of a virtual disk in a
Disk Groups and Virtual Disks 53

Creating Disk Groups and Virtual Disks

Disk groups are created in the unconfigured capacity of a storage array, and virtual disks are created in the free capacity of a disk group. The maximum number of physical disks supported in a disk group is 30. The hosts attached to the storage array read and write data to the virtual disks.
NOTE: Before you can create virtual disks, you must first organize the physical
disks into disk groups and configure host access. Then you can create virtual disks within a disk group.
NOTE: The disk group must contain physical disks of the same type. Mixing SAS
and SATA II disks in a disk group is not supported.
To create a virtual disk, use one of the following methods:
Create a new disk group from unconfigured capacity. You first define the RAID level and free capacity (available storage space) for the disk group, and then you define the parameters for the first virtual disk in the new disk group.
Create a new virtual disk in the free capacity of an existing disk group. You only need to specify the parameters for the new virtual disk.
A disk group has a set amount of free capacity that was configured when the disk group was created. You can use that free capacity to subdivide the disk group into one or more virtual disks.
You can create disk groups and virtual disks using an automatic configuration procedure or using a manual configuration procedure. Automatic configuration provides the fastest method, but with limited configuration options. Manual configuration is a more involved process, but provides more configuration options.
When creating a virtual disk, consider all of the possible uses for that virtual disk, and select an appropriate capacity for those uses. For example, if a disk group has a virtual disk that stores multimedia files (which tend to be large) and another virtual disk that stores text files (which tend to be small), the multimedia file virtual disk requires more capacity than the text file virtual disk.
A disk group should be organized according to its related tasks and subtasks. For example, if you create a disk group for the Accounting Department, you can create virtual disks that match the different types of accounting
54 Disk Groups and Virtual Disks
performed in the department: Accounts Receivable (AR), Accounts Payable (AP), internal billing, and so forth. In this scenario, the AR and AP virtual disks probably need more capacity than the internal billing virtual disk.
NOTE: In Linux, the host must be rebooted after deleting virtual disks to reset the
/dev entries.
NOTE: Before you can use a virtual disk, you must register the disk with the host
systems. This process is described in “Host-to-Virtual Disk Mapping” on page 60.

Automatic Configuration

If you want to set up virtual disks quickly, click the Configure tab and then click Automatic Configuration. With this option, you do not need to configure individual options for each virtual disk. When you use automatic configuration:
All available unconfigured capacity on the array is used.
All disk groups have the same RAID level.
All virtual disks have equal capacity.
The number of virtual disks created is based on the selected RAID level and available unconfigured capacity.
•For
a RAID level 1 or 5 disk group
automatically based on the number of drives and types of drives available in the storage array.
, hot spare drives are selected

Manual Configuration

To create individual virtual disks or disk groups, click the Configure tab and then click Create Virtual Disks. You create one disk group and virtual disk at a time, but have control over the RAID level and capacity for each virtual disk and disk group. Use this method if you have unique capacity requirements for a disk group or virtual disk.
Creating a Disk Group and Virtual Disk From Unconfigured Capacity
Use the following procedure to manually create a disk group:
Click the
1
2
Select
Capacity Type
Configure
tab, then click
Unconfigured capacity
page, then click
Create Virtual Disks
on the
Create Virtual Disks – Select
Next
.
Disk Groups and Virtual Disks 55
.
3
Select
Manual
Choices
4
Select the RAID level for the new disk group.
5
To select one physical disk to add to the disk group, click the disk of your choice in the
on the
page, then click
Create Virtual Disks – Physical Disk Selection
Next
Unselected physical disks
.
list.
To select more than one physical disk to add to the disk group, press
6
7
<Ctrl> disks
Click
disks
Click
while clicking the disks of your choice in the
Unselected physical
list.
NOTE: When adding more than one physical disk to a disk group, it is
recommended to use disks with the same capacity. You can choose to use disks of differing capacities; however, the overall capacity of the disk group will be based on the smallest capacity physical disk. This means that additional capacity on larger physical disks will not be available for use.
Add
to add the disk(s) you selected in step 5 to the
Selected physical
list.
Calculate Capacity
beneath the list of selected disks to see the
capacity of the disk group you are creating.
8
To add or remove capacity for the proposed disk group, highlight disks in either list and click
9
When you are satisfied with the size of the disk group, click
Add
or
Remove
.
Next
bottom of the page.
10
Specify the size of the first virtual disk to be created in the new disk group in the
New virtual disk capacity
11
Enter a name for the virtual disk in the
12
Specify the type of files that will be stored on the virtual disk. MD Storage
box.
Name
text box.
Manager will optimize the virtual disk based on your selection. Your choices include:
File system (typical)
Database
Multimedia
13
When you are satisfied with the parameters of the virtual disk, click
at the
Next
.
56 Disk Groups and Virtual Disks
14
To map the new virtual disk to a host now, select
Map now
and assign a
logical unit number (LUN) to the virtual disk in the drop-down box.
To map the new virtual disk to a host later, select
15
Click
Finish
to create the new disk group and the first virtual disk in the
Map later
.
group.
Creating a Virtual Disk From Free Capacity
To manually create a virtual disk within an existing disk group, first decide in which disk group you want to create the new virtual disk. Then use the following procedure to create the new virtual disk:
1
Click the
2
Select
Configure
Free capacity
tab, then click
on the
Create Virtual Disks – Select Capacity Type
Create Virtual Disks
.
page.
3
Click the plus sign (+) at the left of the disk group to display the virtual disks and free capacity in the disk group.
4
Click the free capacity for the disk group you want to modify, and then click
Next
at the bottom of the page.
5
Specify the size of the virtual disk to be created in the
capacity
6
Enter a name for the virtual disk in the
7
Specify the type of files that will be stored on the virtual disk. MD Storage
box.
Name
text box.
New virtual disk
Manager will optimize the virtual disk based on your selection. Your choices include:
File system (typical)
Database
Multimedia
8
When you are satisfied with the parameters of the virtual disk, click
9
To map the new virtual disk to a host now, select
Map now
and assign a
Next
logical unit number (LUN) to the virtual disk in the drop-down box.
To map the new virtual disk to a host later, select
Map later
.
.
After you create virtual disks and map them to hosts, you must register the virtual disks with each host. Registration ensures the host recognizes the virtual disks.
Disk Groups and Virtual Disks 57
If you plan to create multiple virtual disks, wait until you have created all the virtual disks to register them. Waiting prevents you from having to register virtual disks more than once.
Linux
NOTE: You need super-user (Linux) privileges to run the hot_add utility.
The hot_add utility is installed with the host-agent package and is run from the Linux command line. You cannot run the hot_add utility using the MD Storage Manager.
Windows
Windows automatically registers virtual disks.
NOTE: Virtual disks mapped to Windows Server 2008 hosts are marked offline by
default. To bring the virtual disks online, use the Disk Management MMC (if you are using a GUI version of Windows Server 2008) or use the DiskPart utility (if you are using a Core version of Windows Server 2008).

Hot Spare Drive Protection

Hot spare drives in a storage array provide an additional level of protection in case a physical disk fails. Hot spare drives only take over for failed drives in a RAID level 1, 5, or 10 disk group. Using a hot spare drive can be an advantage because it automatically replaces a failed physical disk that is part of a disk group.
You can see whether hot spare protection is currently set by viewing the Hot Spare Physical Disks line in the Hardware Components area of the Summary tab. You can also see the number of standby and in-use hot spares. A standby hot spare drive is a physical disk that has been assigned as a hot spare drive and is available to take over for any failed physical disk. An in-use hot spare drive is a physical disk that has been assigned as a hot spare drive and is currently taking over for a failed physical disk.

Automatically Configuring Hot Spares

You can choose to allow MD Storage Manager to automatically configure hot spare drives. With automatic configuration, the controller automatically configures the number and type of hot spare drives that will provide optimal
58 Disk Groups and Virtual Disks
coverage for the storage array. The number and type of hot spare drives is determined based on the number, type, and capacity of physical disks in the storage array.
To add hot spare drive protection using automatic configuration:
1
Click the
2
To automatically assign hot spare drives, click
(Automatic)
3
Click
Configure
Assign
tab, then click
Configure Hot Spares
.
Configure Hot Spares
.
.
To remove hot spare drive protection using automatic configuration:
1
Click the
2
Click
3
Click
4
Click OK in the dialog box.
Configure
tab, then click
Configure Hot Spares
Configure Hot Spares (Automatic)
Unassign
.
.
.

Manually Configuring Hot Spares

You can choose to manually configure hot spare drives for the drive sets in your storage array. With manual configuration, you assign the type and capacity of hot spare protection for individual drives.
Click the
1
2
To manually assign hot spare drives, click
(Manual)
3
In the
The
Configure
tab, then click
.
Drive sets
list, click the drive you wish to protect, then click
Assign Hot Spares
Configure Hot Spares
dialog box appears.
.
Configure Hot Spares
Assign
.
4
In the
Assign Hot Spares
to configure into a hot spare physical disk, then click
NOTE: When manually configuring a hot spare physical disk, you must use a
physical disk type that matches the other physical disks in the disk group. Using a SAS physical disk to replace a SATA II physical disk (or a SATA II physical disk to replace a SAS physical disk) is not supported. Also, the hot spare physical disk must be as large as or larger than the largest physical disk in the disk group.
dialog box, click the unassigned drive you want
OK
.
Disk Groups and Virtual Disks 59

Host-to-Virtual Disk Mapping

After you create virtual disks, you must map them to the host(s) connected to the array. When you configure host-to-virtual disk mapping, consider these guidelines:
Each virtual disk in the storage array can be mapped to only one host or host group.
Host-to-virtual disk mappings are shared between controllers in the storage array.
A unique LUN must be used by a host group or host to access a virtual disk.
Not every operating system has the same number of LUNs available.

Creating Host-to-Virtual Disk Mappings

Create host-to-virtual disk mappings by clicking the Configure tab, then clicking Create Host-to-Virtual Disk Mappings. When you click this link, the Storage Manager displays a series of pages in which you select the hosts and virtual disks to be mapped.
After you complete this configuration, verify the mapping by clicking Host-to- Virtual Disk Mappings on the Summary tab to ensure the configuration was created correctly.

Modifying and Removing Host-to-Virtual Disk Mapping

You might choose to modify or remove a host-to-virtual disk mapping for several reasons, such as an incorrect mapping or reconfiguration of the storage array. Modifying or removing a host-to-virtual disk mapping applies to both hosts and host groups.
NOTICE: Before you modify or remove a host-to-virtual disk mapping, you must
stop any data access (I/O) to the virtual disks to prevent data loss.
1
Stop any data access (I/O) to the virtual disks.
2
Click the
MD Storage Manager displays a list of virtual disks and the hosts to which they are mapped.
3
Select the virtual disk you wish to modify by clicking its name.
60 Disk Groups and Virtual Disks
Modify
tab and then click
Edit Host-to-Virtual Disk Mappings
.
4
To map the disk to a different host or host group, click the right of the list.
5
To remove the disk mapping to a host or host group, click to the right of the list.
Change
Remove
located to
located

Changing Controller Ownership of the Virtual Disk

If the host has a single data-path to the MD storage array, the virtual disk must be owned by the controller to which the host is connected. You must configure this storage array before you start I/O operations and after the virtual disk is created.
To assign ownership of the virtual disk to the connected controller:
1
Click the
Ownership/Preferred Path.
2
Select the appropriate virtual disk and click
Modify
tab and then select
Change Virtual Disk
Change
.

Storage Partitioning

A storage partition is a logical entity consisting of one or more virtual disks that can be accessed by a single host or shared among hosts that are part of a host group. The first time you map a virtual disk to a specific host or host group, a storage partition is created. Subsequent virtual disk mappings to that host or host group do not create another storage partition.
One storage partition is sufficient if:
Only one attached host accesses all of the virtual disks in the storage array.
All attached hosts share access to all of the virtual disks in the storage array. When you choose this type of configuration, all of the hosts must have the same operating system and special software (such as clustering software) to manage virtual disk sharing and accessibility.
More than one storage partition is required if:
Specific hosts must access specific virtual disks in the storage array.
Hosts with different operating systems are attached to the same storage array. In this case, a storage partition will be created for each host type.
NOTE: If Microsoft Windows is the host server, you must partition and format
the virtual disk using the Microsoft Management Console (MMC). Go to
Settings
Control Panel → Administrative Tools, or Control Panel →
Disk Groups and Virtual Disks 61
Administrative Tools and select the Disk Management MMC option to format and partition the disk. If the host server is running Windows Server 2008 Core version, partition and format the virtual disk using the Microsoft DiskPart utility.

Disk Group and Virtual Disk Expansion

Adding free capacity to a disk group is achieved by adding unconfigured capacity on the array to the disk group. Data is accessible on disk groups, virtual disks, and physical disks throughout the entire modification operation. The additional free capacity can then be used to perform a virtual disk expansion on a standard or snapshot repository virtual disk.

Disk Group Expansion

To add free capacity to a disk group, use the following procedure:
1
Click the
2
On the
3
Click
The Storage Manager displays information on the disk group you selected.
4
In the amount of unconfigured capacity to add to the disk group.
5
Click
You can also use the Command Line Interface (CLI) on both Windows and Linux hosts to add free capacity to a disk group. See the information.
Once the capacity expansion is completed, additional free capacity is available in the disk group for creation of new virtual disks or expansion of existing virtual disks.
Modify
Add Free Capacity
Next
Add capacity to volume group
Finish
tab, then click
beneath the list of disk groups.
to start the process of adding capacity to the disk group.
Add Free Capacity (Physical Disks)
page, click the disk group you want to expand.
drop-down menu, choose the
CLI Guide
.
for more

Virtual Disk Expansion

Virtual disk expansion is a dynamic modification operation that increases the capacity of standard virtual disks.
NOTE: Snapshot repository virtual disks can be expanded from the CLI or from MD
Storage Manager. All other virtual disk types are expandable only from the CLI.
62 Disk Groups and Virtual Disks
If you receive a warning that the snapshot repository virtual disk is becoming full, you may expand the snapshot repository virtual disk from MD Storage Manager. See "Snapshot Repository Capacity" on page 79 for step-by-step instructions.

Storage Array Media Scan

The media scan is a long-running operation that examines virtual disks to verify that data is accessible. The process finds media errors before normal read and write activity is disrupted and reports errors to the event log.
Errors discovered by the media scan include:
Unrecovered media error — Data could not be read on the first attempt or on any subsequent attempts. For virtual disks with redundancy protection, data is reconstructed, rewritten to the physical disk, and verified and the error is reported to the event log. For virtual disks without redundancy protection (RAID 0 virtual disks and degraded RAID 1 and RAID 5 virtual disks), the error is not corrected but is reported to the event log.
Recovered media error — Data could not be read by the physical disk on the first attempt but was successfully read on a subsequent attempt. Data is rewritten to the physical disk and verified and the error is reported to the event log.
Redundancy mismatches error — The first 10 redundancy mismatches that are found on the virtual disk are reported to the event log.
Unfixable error — Data could not be read and parity or redundancy information could not be used to regenerate the data. For example, redundancy information cannot be used to reconstruct the data on a degraded virtual disk. The error is reported to the event log.

Changing Media Scan Settings

1
Click the
2
Select the number of days allowed for the media scan to complete in the
Scan duration (days)
To ol s
tab, then click
box.
NOTE: Performing the media scan frequently may negatively impact the
performance of other operations. Adjust scan duration based on the performance needs of your storage array.
Change Media Scan Settings
Disk Groups and Virtual Disks 63
.
3
In the
Select virtual disks to scan
include in the media scan.
NOTE: Press <Ctrl> and click to add more than one virtual disk to the media
scan. Click Select All to include all virtual disks in the media scan.
4
Check the choose either
Consistency check enables parity data to be checked during the media scan.
5
Click OK to accept the updated media scan settings.
Scan selected virtual disks
With consistency check
box, click the virtual disk you want to
checkbox to enable scanning, then
or
Without consistency check
.

Suspending the Media Scan

You cannot perform a media scan while performing another long-running operation on the disk drive such as reconstruction, copy-back, reconfiguration, volume initialization, or immediate availability formatting. If you want to perform another long-running operation, you should suspend the media scan.
NOTE: A background media scan is the lowest priority of the long-running
operations.
1
Click the
2
Check the
3
Click
Tools
tab, then click
Suspend media scan
OK
to suspend media scanning.
Change Media Scan Settings
checkbox.
.

Microsoft Services

Virtual Disk Service

The Microsoft Virtual Disk Service (VDS) is supported on your RAID storage array. Microsoft VDS is a set of application programming interfaces (APIs) that provides a single interface for managing disks and other storage hardware, including creating volumes on those disks.
64 Disk Groups and Virtual Disks

Volume Shadow-Copy Service

The Microsoft Volume Shadow-copy Service (VSS) is a storage management interface for Microsoft Windows operating systems. VSS enables your storage array to interact with third-party applications that use the VSS Application Programming Interface.
Virtual disks that will be used as source virtual disks for VSS snapshots should have names no longer than 16 characters. The VSS hardware provider uses the source virtual disk name as a prefix for the snapshot and repository virtual disk names. The resulting snapshot and repository names will be too long if the source virtual disk name exceeds 16 characters.
For more information on VDS and VSS, see www.microsoft.com.
Disk Groups and Virtual Disks 65
66 Disk Groups and Virtual Disks
Premium Feature—Snapshot Virtual Disks
NOTE: If you ordered this feature, you received a Premium Feature Activation card
shipped in the same box as your Dell PowerVault MD storage array. Follow the directions on the card to obtain a key file and to enable the feature.
A snapshot virtual disk is a point-in-time image of a virtual disk in a storage array. It is not an actual virtual disk containing data; rather, it is a reference to the data that was contained on a virtual disk at a specific time. A snapshot virtual disk is the logical equivalent of a complete physical copy. However, you can create a snapshot virtual disk much faster than a physical copy, using less disk space.
The virtual disk on which the snapshot is based, called the source virtual disk, must be a standard virtual disk in your storage array. Typically, you create a snapshot so that an application, such as a backup application, can access the snapshot and read the data while the source virtual disk remains online and accessible.
NOTE: No I/O requests are permitted on the source virtual disk while the virtual
disk snapshot is being created.
A snapshot repository virtual disk containing metadata and copy-on-write data is automatically created when a snapshot virtual disk is created. The only data stored in the snapshot repository virtual disk is that which has changed since the time of the snapshot.
After the snapshot repository virtual disk is created, I/O write requests to the source virtual disk resume. Before a data block on the source virtual disk is modified, however, the contents of the block to be modified are copied to the snapshot repository virtual disk for safekeeping. Because the snapshot repository virtual disk stores copies of the original data in those data blocks, further changes to those data blocks write only to the source virtual disk. The snapshot repository uses less disk space than a full physical copy, because the only data blocks that are stored in the snapshot repository virtual disk are those that have changed since the time of the snapshot.
Snapshot Virtual Disks 67
When you create a snapshot virtual disk, you specify where to create the snapshot repository virtual disk, its capacity, and other parameters. You can disable or delete the snapshot virtual disk when you no longer need it, such as when the backup is complete. If you disable a snapshot virtual disk, you can re-create and reuse it the next time you perform a backup (see "Re-creating Snapshot Virtual Disks" on page 80 for more information). If you delete a snapshot virtual disk, you also delete the associated snapshot repository virtual disk.
NOTE: Deleting a snapshot does not affect data on the source virtual disk.
The information that follows will better prepare users for using the snapshot virtual disk premium feature of the Dell PowerVault systems.
NOTE: The following host preparation sections also apply when using the snapshot
feature through the CLI interface.

Creating a Snapshot Virtual Disk Using the Simple Path

You can choose the simple path to create a snapshot virtual disk if the disk group of the source virtual disk has the required amount of free space. A snapshot repository virtual disk requires a minimum 8 MB of free capacity. The destination of a snapshot repository virtual disk is determined based on the free capacity available in the disk group.
If 8 MB of free capacity is not available in the disk group of the source virtual disk, the Create Snapshot Virtual Disks feature defaults to the advanced path (see "Creating a Snapshot Virtual Disk Using the Advanced Path" on page 73). In the advanced path option, you can choose to place the snapshot repository virtual disk in another disk group or you can use unconfigured capacity on the storage array to create a new disk group.

About the Simple Path

Using the simple path, you can specify the following parameters for your snapshot virtual disk:
Snapshot Virtual Disk Name
associate the snapshot virtual disk to its corresponding snapshot repository virtual disk and source virtual disk.
68 Snapshot Virtual Disks
— A user-specified name that helps you
Snapshot Repository Virtual Disk Name
— A user-specified name that helps you associate the snapshot repository virtual disk to its corresponding snapshot virtual disk and source virtual disk.
Using the simple path, the following defaults are used for the other parameters of a snapshot virtual disk:
Capacity Allocation
— The snapshot repository virtual disk is created using free capacity on the same disk group where the source virtual disk resides.
Host-to-Virtual Disk Mapping
Percent Full
— When the snapshot repository virtual disk reaches the
— The default setting is
Map now
.
specified repository full percentage level, the event is logged in the Main Event Log (MEL). The default snapshot repository full percentage level is 50 percent of the source virtual disk.
Snapshot Repository Virtual Disk Full Conditions
— When the snapshot repository virtual disk becomes full, you are given a choice of failing write activity to the source virtual disk or failing the snapshot virtual disk.

Preparing Host Servers to Create the Snapshot Using the Simple Path

NOTICE: Before using the Snapshot Virtual Disks Premium Feature in a Microsoft®
Windows the cluster node that owns the source virtual disk. This ensures that the cluster nodes correctly recognize the snapshot virtual disk.
Mapping the snapshot virtual disk to the node that does not own the source virtual disk before the Snapshot enabling process is completed can result in the operating system mis-identifying the snapshot virtual disk. This, in turn, can result in data loss on the source virtual disk or an inaccessible snapshot.
For details on mapping the snapshot virtual disk to the secondary node, refer to the
Dell PowerEdge™ Cluster SE600W Systems Installation and Troubleshooting Guide
on support.dell.com
NOTE: You can create concurrent snapshots of a source virtual disk on both the
source disk group and on another disk group.
®
clustered configuration, you must first map the snapshot virtual disk to
Snapshot Virtual Disks 69
Before creating a Snapshot Virtual Disk, note the following:
The following types of virtual disks are not valid source virtual disks: snapshot repository virtual disks, snapshot virtual disks, target virtual disks that are participating in a virtual disk copy.
NOTE: Virtual Disk Copy is an Advanced (Premium) feature.
You cannot create a snapshot of a virtual disk that contains unreadable sectors.
You must satisfy the requirements of your host operating system for creating snapshot virtual disks. Failure to meet the requirements of your host operating system results in an inaccurate point-in-time image of the source virtual disk or the target virtual disk in a virtual disk copy.
NOTICE: Before you create a new point-in-time image of a source virtual disk, stop
any data access (I/O) activity or suspend data transfer to the source virtual disk to ensure that you capture an accurate point-in-time image of the source virtual disk. Close all applications, including Windows Internet Explorer activity has stopped.
NOTE: Removing the drive letter of the associated virtual disk(s) in Windows or
unmounting the virtual drive in Linux will help to guarantee a stable copy of the drive for the Snapshot.
®
, to make sure all I/O
Before creating a snapshot virtual disk, the host server has to be in the proper state. To ensure that the host server is properly prepared to create a snapshot virtual disk, you can either use an application to carry out this task, or you can perform the following steps:
1
Stop all I/O activity to the source.
2
Using your Windows system, flush the cache to the source. At the host prompt, type
SMrepassist -f <
filename-identifier
>
and press <Enter>. See "SMrepassist Utility" on page 102 for more information.
70 Snapshot Virtual Disks
3
Remove the drive letter(s) of the source in Windows or unmount the virtual drive(s) in Linux to help guarantee a stable copy of the drive for the Snapshot. If this is not done, the snapshot operation will report that it has completed successfully, but the snapshot data will not be updated properly.
NOTE: Verify that the virtual disk has a status of Optimal or Disabled by
clicking the Summary tab and then clicking Disk Groups & Virtual Disks.
4
Follow any additional instructions for your operating system. Failure to follow these additional instructions can create unusable snapshot virtual disks.
NOTE: If your operating system requires additional instructions, you can find those
instructions in your operating system documentation.
After your host server has been prepared, see "Creating the Snapshot Using the Simple Path" on page 71 to create the snapshot using the simple path.
If you want to use a snapshot regularly, such as for backups, use the Disable Snapshot and Re-create Snapshot options to reuse the snapshot. Disabling and re-creating snapshots preserves the existing virtual disk-to-host mappings to the snapshot virtual disk.

Creating the Snapshot Using the Simple Path

NOTE: Removing the drive letter of the associated virtual disk in Windows or
unmounting the virtual drive in Linux will help to guarantee a stable copy of the drive for the Snapshot.
After first preparing the host server(s) as specified in the preceding procedure, complete the following steps to create a virtual disk snapshot using the simple path:
1
In MD Storage Manager, click the
Snapshot Virtual Disks
2
The
Additional Instructions
.
continue.
3
Click the plus sign (+) to the left of the disk group to expand it, then click the virtual disk from which you want to create a snapshot.
4
Click
Next
.
A
No Capacity Exists
warning appears if there is not enough space in the
disk group of the source virtual disk to create the snapshot.
Configure
tab, and then click
dialog appears; click
Close
in this dialog to
Create
Snapshot Virtual Disks 71
5
On the
Create Snapshot Virtual Disks – Select Path
screen, select the
Simple path.
NOTE: A snapshot repository virtual disk requires 8 MB of free space. If the
required free space is not available in the disk group of the source virtual disk, the Create Snapshot Virtual Disks feature defaults to the advanced path.
6
Click
Next
.
7
Type a name for the snapshot in the
8
Type a name for the snapshot repository virtual disk in the
repository virtual disk name
9
Click
Next
.
10
Choose whether to map the virtual disk to a host or host group now or
text box.
Snapshot virtual disk name
Snapshot
later:
To map now, select
Map now
, select a host or host group by clicking it, and
then assign a LUN.
text box.
To map later, select
11
Click
Finish
to create the snapshot virtual disk and the associated
Map later
.
snapshot repository virtual disk.
12
After you have created one or more snapshot virtual disks, mount or reassign a drive letter of the source virtual disk.
13
If needed, assign host-to-virtual disk mapping between the snapshot virtual disk and the host operating system that accesses it.
NOTE: In some cases, depending on the host type and any virtual disk
manager software in use, the software prevents you from mapping the same host to both a source virtual disk and its associated snapshot virtual disk.
14
If you are using a Linux-based system, run the
hot_add
the snapshot virtual disk with the host operating system.
NOTE: The hot_add utility is not needed for Windows.
72 Snapshot Virtual Disks
utility to register

Creating a Snapshot Virtual Disk Using the Advanced Path

About the Advanced Path

Use the advanced path to choose whether to place the snapshot repository virtual disk on free capacity or unconfigured capacity and to change the snapshot repository virtual disk parameters. You can select the advanced path regardless of whether you use free capacity or unconfigured capacity for the snapshot virtual disk.
Using the advanced path, you can specify the following parameters for your snapshot virtual disk:
Snapshot Virtual Disk Name
associate the snapshot virtual disk to its corresponding snapshot repository virtual disk and source virtual disk.
Snapshot Repository Virtual Disk Name
helps you associate the snapshot repository virtual disk to its corresponding snapshot virtual disk and source virtual disk.
Capacity Allocation
create the snapshot repository virtual disk. You can allocate capacity by using one of the following methods:
Use free capacity on the same disk group where the source virtual disk
resides.
Use free capacity on another disk group.
Use unconfigured capacity and create a new disk group for the
snapshot repository virtual disk.
Dell recommends placing the snapshot repository virtual disk within the disk group of the source virtual disk. This ensures that if drives associated with the disk group are moved to another storage array, all the virtual disks associated with the snapshot virtual disk remain in the same group.
— This parameter allows you to choose where to
— A user-specified name that helps you
— A user-specified name that
Percent Full
user-specified repository full percentage level, the event is logged in the Major Event Log (MEL). The default snapshot repository full percentage level is 50% of the source virtual disk.
— When the snapshot repository virtual disk reaches the
Snapshot Virtual Disks 73
Snapshot Repository Virtual Disk Full Conditions
— You can choose whether to fail writes to the source virtual disk or fail the snapshot virtual disk when the snapshot repository virtual disk becomes full.
Host-to-Virtual Disk Mapping
— Choose whether to map the snapshot virtual disk to a host or host group now or to map the snapshot virtual disk later
.
The default setting is
Map later
.

Preparing Host Servers to Create the Snapshot Using the Advanced Path

NOTICE: Before using the Snapshot Virtual Disks Premium Feature in a Microsoft®
Windows the cluster node that owns the source virtual disk. This ensures that the cluster nodes correctly recognize the snapshot virtual disk.
Mapping the snapshot virtual disk to the node that does not own the source virtual disk before the Snapshot enabling process is completed can result in the operating system mis-identifying the snapshot virtual disk. This, in turn, can result in data loss on the source virtual disk or an inaccessible snapshot.
For details on mapping the snapshot virtual disk to the secondary node, refer to the
Dell PowerEdge™ Cluster SE600W Systems Installation and Troubleshooting Guide
on support.dell.com
®
clustered configuration, you must first map the snapshot virtual disk to
The destination of a snapshot repository virtual disk is determined based on the free capacity available in the disk group. A snapshot repository virtual disk requires a minimum 8 MB of free capacity. You can choose your preferred creation path—simple or advanced—if the disk group of the source virtual disk has the required amount of free space.
If 8 MB of free capacity is not available in the disk group of the source virtual disk, the Create Snapshot Virtual Disks feature defaults to the advanced path (see "Creating a Snapshot Virtual Disk Using the Advanced Path" on page 73). In the advanced path option, you can choose to place the snapshot repository virtual disk in another disk group or you can use unconfigured capacity on the storage array to create a new disk group.
NOTE: You can create concurrent snapshots of a source virtual disk on both the
source disk group and on another disk group.
74 Snapshot Virtual Disks
Before creating a Snapshot Virtual Disk, note the following:
The following types of virtual disks are not valid source virtual disks: snapshot repository virtual disks, snapshot virtual disks, target virtual disks that are participating in a virtual disk copy.
NOTE: Virtual Disk Copy is an Advanced (Premium) feature.
You cannot create a snapshot of a virtual disk that contains unreadable sectors.
You must satisfy the requirements of your host operating system for creating snapshot virtual disks. Failure to meet the requirements of your host operating system results in an inaccurate point-in-time image of the source virtual disk or the target virtual disk in a virtual disk copy.
NOTICE: Before you create a new point-in-time image of a source virtual disk, stop
any data access (I/O) activity or suspend data transfer to the source virtual disk to ensure that you capture an accurate point-in-time image of the source virtual disk. Close all applications, including Windows Internet Explorer activity has stopped.
NOTE: Removing the drive letter of the associated virtual disk(s) in Windows or
unmounting the virtual drive in Linux will help to guarantee a stable copy of the drive for the Snapshot.
®
, to make sure all I/O
Before creating a snapshot virtual disk, the host server has to be in the proper state. Perform the following steps to prepare your host server:
1
Stop all I/O activity to the source.
2
Using your Windows system, flush the cache to the source. At the host prompt, type
SMrepassist -f <
filename-identifier
>
and press <Enter>. See "SMrepassist Utility" on page 102 for more information.
3
Remove the drive letter(s) of the source in Windows or unmount the virtual drive(s) in Linux to help guarantee a stable copy of the drive for the Snapshot. If this is not done, the snapshot operation will report that it has completed successfully, but the snapshot data will not be updated properly.
NOTE: Verify that the virtual disk has a status of Optimal or Disabled by
clicking the Summary tab and then clicking Disk Groups & Virtual Disks.
Snapshot Virtual Disks 75
4
Follow any additional instructions for your operating system. Failure to follow these additional instructions can create unusable snapshot virtual disks.
NOTE: If your operating system requires additional instructions, you can find those
instructions in your operating system documentation.
After your host server has been prepared, see "Creating the Snapshot Using the Advanced Path" on page 76 to create the snapshot using the advanced path.
If you want to use a snapshot regularly, such as for backups, use the Disable Snapshot and Re-create Snapshot options to reuse the snapshot. Disabling and re-creating snapshots preserves the existing virtual disk-to-host mappings to the snapshot virtual disk.

Creating the Snapshot Using the Advanced Path

NOTE: Removing the drive letter of the associated virtual disk in Windows or
unmounting the virtual drive in Linux will help to guarantee a stable copy of the drive for the Snapshot.
After first preparing the host server(s) as specified in the preceding procedure, complete the following steps to create a virtual disk snapshot using the advanced path:
1
In MD Storage Manager, click the
Snapshot Virtual Disks
2
The
Additional Instructions
.
continue.
3
Click the plus sign (+) to the left of the disk group to expand it, then click the virtual disk from which you want to create a snapshot.
4
Click
Next
.
No Capacity Exists
A
warning appears if there is not enough space in the
disk group of the source virtual disk to create the snapshot.
Configure
tab, and then click
dialog appears; click
Close
in this dialog to
Create
5
On the
Create Snapshot Virtual Disks – Select Path
Advanced path.
NOTE: A snapshot repository virtual disk requires 8 MB of free space. If the
required free space is not available in the disk group of the source virtual disk, the Create Snapshot Virtual Disks feature defaults to the advanced path.
76 Snapshot Virtual Disks
screen, select the
6
Click
Next
.
7
Type a name for the snapshot in the
8
Type a name for the snapshot repository virtual disk in the
repository virtual disk name
9
Click
Next
.
10
Choose whether to create the snapshot virtual disk from unconfigured
text box.
Snapshot virtual disk name
Snapshot
capacity or free capacity.
To create the snapshot virtual disk from unconfigured capacity:
a
Select
Unconfigured capacity
b
On the
Create Snapshot Virtual Disks – Specify Capacity
choose a RAID level, then click
, then click
Next
.
Next
.
To create the snapshot virtual disk from free capacity:
a
Select
Free capacity
b
Select a free capacity node, then click
11
On the
Capacity
Create Snapshot Virtual Disks – Specify Repository Virtual Disk
screen, enter how much space you want to allocate for the
snapshot repository virtual disk in the
Next
.
12
In the
Notify me when the repository disk becomes x% full
.
Next
.
Specify capacity
box, then click
box, specify at what percentage MD Storage Manager should consider the snapshot repository virtual disk to be full.
13
Specify what should happen if the snapshot repository virtual disk becomes full.
Select
Fail the snapshot virtual disk
to leave the source disk available.
text box.
screen,
Fail writes to the source virtual disk
Select
to leave the snapshot virtual
disk available and stop data from writing to the source virtual disk.
14
Choose whether to map the virtual disk to a host or host group now or later.
To map now, select
Map now
, select a host or host group by clicking it,
then assign a LUN.
Snapshot Virtual Disks 77
To map later, select
15
Click
Finish
to create the snapshot virtual disk and the associated
snapshot repository virtual disk.
16
After you have created one or more snapshot virtual disks, mount or reassign a drive letter of the source virtual disk.
17
If needed, assign host-to-virtual disk mapping between the snapshot virtual disk and the host operating system that accesses it.
NOTE: In some cases, depending on the host type and any virtual disk
manager software in use, the software prevents you from mapping the same host to both a source virtual disk and its associated snapshot virtual disk.
18
If you are using a Linux-based system, run the the snapshot virtual disk with the host operating system.
NOTE: The hot_add utility is not needed for Windows.
Map later
.
hot_add
utility to register

Specifying Snapshot Virtual Disk Names

Choose a name that helps you associate the snapshot virtual disk and snapshot repository virtual disk with its corresponding source virtual disk. The following information is useful when naming virtual disks:
By default, the snapshot name is shown in the field as:
<
source-virtual disk-name
>—<
Snapshot virtual disk name
sequence-number
>
where
sequence-number
relative to the source virtual disk.
The default name for the associated snapshot repository virtual disk that is shown in the
<
source-virtual disk-name
For example, if you are creating the first snapshot virtual disk for a source virtual disk called
Accounting-1
name is disk you create based on Accounting is corresponding snapshot repository virtual disk named as default.
78 Snapshot Virtual Disks
Snapshot repository virtual disk
Accounting
, and the associated snapshot repository virtual disk default
Accounting-R1
is the chronological number of the snapshot
field is:
>—R<
sequence-number
, the default snapshot virtual disk is
. The default name of the next snapshot virtual
Accounting-2
, with the
Accounting-R2
>
by
Whether you use the software-supplied sequence number that (by default) populates the
repository virtual disk name
snapshot repository virtual disk still uses the sequence number determined by the software. For example, if you give the first snapshot of source virtual disk
Accounting
supplied sequence number of 1, the default name for the next snapshot of
Accounting
The next available sequence number is based on the number of existing snapshots of a source virtual disk. If you delete a snapshot virtual disk, its sequence number becomes available again.
You must choose a unique name for the snapshot virtual disk and the snapshot repository virtual disks, or an error message is displayed.
Names are limited to 30 characters. After you reach this limit in either the
Snapshot virtual disk name
fields, you can no longer type in the field. If the source virtual disk is 30 characters, the default names for the snapshot and its associated snapshot repository virtual disk use the source virtual disk name truncated enough to add the sequence string. For example, for
Engineering Group GR-1 Engineering GR-1 Software Engineering GR-R1
is still
Snapshot virtual disk name
field, the next default name for a snapshot or
the name
Accounting-2
, and the default repository name would be
Accounting-8
.
or the
, the default snapshot name is
.
, and do not use the software-
Snapshot repository virtual disk name
or the
Host Software
Snapshot
Host Software
Host

Snapshot Repository Capacity

If you receive a warning that the capacity for the snapshot repository virtual disk is approaching its threshold, you can increase the capacity of a snapshot repository virtual disk by using one of the following methods:
Use the free capacity available on the disk group of the snapshot repository virtual disk.
Add unconfigured capacity to the disk group of the snapshot repository virtual disk. Use this option when no free capacity exists on the disk group.
You cannot increase the storage capacity of a snapshot repository virtual disk if the snapshot repository virtual disk has any one of the following conditions:
The virtual disk has one or more hot spare drives in use.
The virtual disk has a status other than Optimal.
Snapshot Virtual Disks 79
Any virtual disk in the disk group is in any state of modification.
The controller that has ownership of this virtual disk is currently adding capacity to another virtual disk. Each controller can add capacity to only one virtual disk at a time.
No free capacity exists in the disk group.
No unconfigured capacity is available to add to the disk group.
To expand the snapshot repository virtual disk from MD Storage Manager:
Click the
1
2
Click
3
Click the snapshot repository virtual disk you want to expand.
4
If necessary, you can add free capacity to the volume group by adding an unassigned drive. To add an unassigned drive:
a
b
c
5
Enter the amount by which you want to expand the snapshot repository virtual disk in the
6
Click
Modify tab
Expand Snapshot Repository
Click
Add Drives
Select the capacity to add from the drop-down menu.
Click
Add
Finish
to expand the capacity of the snapshot repository virtual disk.
, then click
.
.
Increase capacity by
Modify snapshot virtual disks
.
field.
.

Re-creating Snapshot Virtual Disks

Before re-creating a snapshot virtual disk, refer to the following guidelines.

Disabling a Snapshot Virtual Disk

Disable a snapshot virtual disk if one of the following conditions exists:
You do not need the snapshot now.
You intend to re-create the snapshot at a later time and want to retain the associated snapshot repository virtual disk so that you do not need to create it again.
You want to maximize storage array performance by stopping copy-on­write activity to the snapshot repository virtual disk.
The SMdevices utility displays the snapshot virtual disk in its output, even after the snapshot virtual disk is disabled.
80 Snapshot Virtual Disks
To disable a snapshot virtual disk:
1
Click the
2
Click
3
Highlight the snapshot virtual disk to be disabled and click
Modify
tab, then click
Modify snapshot virtual disks
Disable Snapshot Virtual Disks
.
.
Disable
beneath the list.
4
In the
Confirm Disable Snapshot Virtual Disk
then click
OK
.
dialog box, type
yes
and
The snapshot virtual disk is disabled. The associated snapshot repository virtual disk does not change status, but copy-on-write activity to the disabled snapshot virtual disk stops until the snapshot virtual disk is re-created.

Preparing Host Servers to Re-create a Snapshot Virtual Disk

NOTICE: Before you create a new point-in-time image of a source virtual disk, stop
any data access (I/O) activity or suspend data transfer to the source virtual disk and snapshot virtual disk to ensure that you capture an accurate point-in-time image of the source virtual disk. Close all applications, including Windows Internet Explorer, to make sure all I/O activity has stopped.
NOTE: Removing the drive letter of the associated virtual disk in Windows or
unmounting the virtual drive in Linux will help to guarantee a stable copy of the drive for the Snapshot.
Before re-creating a snapshot virtual disk, both the host server and the associated virtual disk you are re-creating have to be in the proper state. Perform the following steps to prepare your host server and virtual disk:
Stop all I/O activity to the source and snapshot virtual disk (if mounted).
1
2
Using your Windows system, flush the cache to both the source and the snapshot virtual disk (if mounted). At the host prompt, type
SMrepassist -f <
filename-identifier
>
and press <Enter>. See "SMrepassist Utility" on page 102 for more information.
3
Click the
Summary
tab, then click
Disk Groups & Virtual Disks
that the snapshot virtual disk is in Optimal or Disabled status.
Snapshot Virtual Disks 81
to ensure
4
Remove the drive letter(s) of the source and (if mounted) snapshot virtual disk in Windows or unmount the virtual drive(s) in Linux to help guarantee a stable copy of the drive for the Snapshot. If this is not done, the snapshot operation will report that it has completed successfully, but the snapshot data will not be updated properly.
5
Follow any additional instructions for your operating system. Failure to follow these additional instructions can create unusable snapshot virtual disks.
NOTE: If your operating system requires additional instructions, you can find
those instructions in your operating system documentation.

Re-creating a Snapshot Virtual Disk

After first preparing the host server(s) as specified in the preceding procedure, re-create a snapshot virtual disk using the following steps.
NOTICE: This action invalidates the current snapshot.
1
Click the
2
Click
3
Highlight the snapshot virtual disk to re-create and click beneath the list.
4
In the and then click
Re-creating a snapshot repository virtual disk uses the previously configured snapshot name and parameters.
Modify
Re-create Snapshot Virtual Disks
tab, then click
Modify snapshot virtual disks
.
Confirm Snapshot Virtual Disk Re-Creation
OK
.
.
Re-Create
dialog box, type
yes
82 Snapshot Virtual Disks
Premium Feature—Virtual Disk Copy
NOTICE: A virtual disk copy overwrites data on the target virtual disk. Before
starting a virtual disk copy, ensure that you no longer need the data or back up the data on the target virtual disk.
NOTE: If you ordered this feature, you received a Premium Feature Activation card
that shipped in the same box as your Dell PowerVault MD storage array. Follow the directions on the card to obtain a key file and to enable the feature.
NOTE: The preferred method for creating a virtual disk copy is to copy from a
snapshot virtual disk. This allows the original virtual disk used in the snapshot operation to remain fully available for read/write activity while the snapshot is used as the source for the virtual disk copy operation.
When you create a virtual disk copy, you create a copy pair that has a source virtual disk and a target virtual disk on the same storage array.
The source virtual disk is the virtual disk that contains the data you want to copy. The source virtual disk accepts the host I/O read activity and stores the data until it is copied to the target virtual disk. The source virtual disk can be a standard virtual disk, a snapshot virtual disk, or the source virtual disk of a snapshot virtual disk. When you start a virtual disk copy, all data is copied to the target virtual disk, and the source virtual disk permissions are set to read­only until the virtual disk copy is complete.
The target virtual disk is a virtual disk to which you copy data from the source virtual disk. The target virtual disk can be a standard virtual disk, or the source virtual disk of a failed or disabled snapshot virtual disk.
After the virtual disk copy is complete, the source virtual disk becomes available to host applications for write requests. To prevent error messages, do not attempt to access a source virtual disk that is participating in a virtual disk copy while the virtual disk copy is in progress.
Virtual Disk Copy 83
Reasons to use virtual disk copy include the following:
Copying data for improved access — As your storage requirements for a virtual disk change, you can use a virtual disk copy to copy data to a virtual disk in a disk group that uses drives with larger capacity within the same storage array. Copying data for larger access capacity enables you to move data to greater capacity physical disks (for example, 61 GB to 146 GB).
Restoring snapshot virtual disk data to the source virtual disk — The Virtual Disk Copy feature enables you first to restore the data from a snapshot virtual disk and then to copy the data from the snapshot virtual disk to the original source virtual disk.
Creating a backup copy — The Virtual Disk Copy feature enables you to create a backup of a virtual disk by copying data from one virtual disk (the source virtual disk) to another virtual disk (the target virtual disk) in the same storage array, minimizing the time that the source virtual disk is unavailable to host write activity. You can then use the target virtual disk as a backup for the source virtual disk, as a resource for system testing, or to copy data to another device, such as a tape drive or other media.
NOTE: Recovering from a backup copy — You can use the Edit Host-to-Virtual Disk
Mappings feature to recover data from the backup virtual disk you created in the previous procedure. The Mappings option enables you to unmap the source virtual disk from its host and then to map the backup virtual disk to the same host.

Creating a Virtual Disk Copy for an MSCS Shared Disk

To create a virtual disk copy for a Microsoft Cluster Server (MSCS) shared disk, create a snapshot of the virtual disk, and then use the snapshot virtual disk as the source for the virtual disk copy.
NOTE: An attempt to directly create a virtual disk copy for an MSCS shared disk,
rather than using a snapshot virtual disk, will fail with the following error:
operation cannot complete because the selected virtual disk is not a source virtual disk candidate
NOTE: When creating a snapshot virtual disk, map the snapshot virtual disk to only
one node in the cluster. Mapping the snapshot virtual disk to the host group or both nodes in the cluster may cause data corruption by allowing both nodes to concurrently access data.
84 Virtual Disk Copy
.
The

Virtual Disk Read/Write Permissions

After the virtual disk copy is complete, the target virtual disk automatically becomes read-only to the hosts. The target virtual disk rejects read and write requests while the virtual disk copy operation has a status of Pending or In Progress or if the operation fails before completing the copy. Keep the target virtual disk Read-Only enabled if you want to preserve the data on the target virtual disk for reasons such as the following:
If you are using the target virtual disk for backup purposes.
If you are using the data on the target virtual disk to copy back to the source virtual disk of a disabled or failed snapshot virtual disk.
If you decide not to preserve the data on the target virtual disk after the virtual disk copy is complete, change the write protection setting for the target virtual disk to Read/Write.
To set the target virtual disk read/write permissions, complete the following steps:
1
Click the
2
Select one or more copy pairs in the table and click right of the table.
The
3
In the
Only
4
Click OK in the dialog box.
If you select Read-Only, write requests to the target virtual disk will be rejected. If you select Read/Write, the host can read and write to the target virtual disk after the virtual disk copy is complete.
Modify
Set Target Virtual Disk Permissions
Set Target Virtual Disk Permissions
or
Read/Write
tab, and then click
.
Manage Virtual Disk Copies
Permissions
dialog box appears.
dialog box select either
.
to the
Read-
Virtual Disk Copy 85

Virtual Disk Copy Restrictions

Before you perform any virtual disk copy tasks, understand and adhere to the restrictions listed in this section. The restrictions apply to the source virtual disk, the target virtual disk, and the storage array.
While a virtual disk copy has a status of In Progress, Pending, or Failed, the source virtual disk is available for read I/O activity only. After the virtual disk copy is complete, read and write I/O activity to the source virtual disk are permitted.
A virtual disk can be selected as a target virtual disk for only one virtual disk copy at a time.
A virtual disk copy for any virtual disk cannot be mounted on the same host as the source virtual disk.
Windows does not allow a drive letter to be assigned to a virtual disk copy.
A virtual disk with a Failed status cannot be used as a source virtual disk or target virtual disk.
A virtual disk with a Degraded status cannot be used as a target virtual disk.
A virtual disk participating in a modification operation cannot be selected as a source virtual disk or target virtual disk. Modification operations include the following:
Capacity expansion
RAID-level migration
Segment sizing
Virtual disk expansion
Defragmenting a virtual disk
NOTE: The following host preparation sections also apply when using the virtual
disk copy feature through the CLI interface.
86 Virtual Disk Copy

Creating a Virtual Disk Copy

Use the Create Virtual Disk Copies feature on the Configure tab to create a full copy of a source virtual disk. This operation overwrites any existing data on the target virtual disk. Once the virtual disk copy has started, all I/O activity to the source virtual disk is read-only. Any attempts to write to the source virtual disk fail until the operation is complete.
NOTE: It is recommended that you create a virtual disk copy from a snapshot
virtual disk rather than from the original virtual disk. This allows the original virtual disk to remain in full use while the snapshot of this virtual disk is used as the source for the virtual disk copy operation.

Preparing Host Servers to Create a Virtual Disk Copy

NOTICE: Before you create a new copy of a source virtual disk, stop any data
access (I/O) activity or suspend data transfer to the source virtual disk (and, if applicable, the target disk) to ensure that you capture an accurate point-in-time image of the source virtual disk. Close all applications, including Windows Internet Explorer, to make sure all I/O activity has stopped.
NOTE: Removing the drive letter of the associated virtual disk(s) in Windows or
unmounting the virtual drive in Linux will help to guarantee a stable copy of the drive for the virtual disk copy.
Before creating a virtual disk copy, both the host server and the associated virtual disk you are copying have to be in the proper state. Perform the following steps to prepare your host server and virtual disk:
1
Stop all I/O activity to the source and target virtual disk.
2
Using your Windows system, flush the cache to both the source and the target virtual disk (if mounted). At the host prompt, type
SMrepassist -f <
filename-identifier
>
and press <Enter>. See "SMrepassist Utility" on page 102 for more information.
3
Click the
Summary
tab, then click
Disk Groups & Virtual Disks
that the virtual disk is in Optimal or Disabled status.
Virtual Disk Copy 87
to ensure
4
Remove the drive letter(s) of the source and (if mounted) virtual disk in Windows or unmount the virtual drive(s) in Linux to help guarantee a stable copy of the drive for the virtual disk. If this is not done, the copy operation will report that it has completed successfully, but the copied data will not be updated properly.
5
Follow any additional instructions for your operating system. Failure to follow these additional instructions can create unusable virtual disk copies.
NOTE: If your operating system requires additional instructions, you can find
those instructions in your operating system documentation.

Copying the Virtual Disk

After first preparing the host server(s) as specified in the preceding procedure, complete the following steps to make a virtual disk copy:
1
Click the
2
On the (source virtual disk), and click
The
3
Choose the target virtual disk:
a
Configure
Select Source Virtual Disk
Select Target Virtual Disk
NOTE: If the virtual disk you select is not valid, an information dialog box
appears explaining the types of virtual disks you can use as the source for a virtual disk copy. Click OK to close this dialog box and select a different source virtual disk.
To use an existing virtual disk as the target, select
virtual disk
tab, then click
Create Virtual Disk Copies
.
page, select the virtual disk to copy
Next
.
page appears.
Use an existing
and highlight the virtual disk of your choice in the list.
NOTE: If you select a target virtual disk with a capacity similar to the source
virtual disk, you reduce the risk of having unusable space on the target virtual disk after the virtual disk copy is completed.
To create a new virtual disk for the target, select
b
. Type a name for this new target virtual disk in the text box.
disk
4
Click
Next
at the bottom of the page.
The
Create virtual disk copies—Set Copy Priority
88 Virtual Disk Copy
Create a new virtual
dialog box appears.
5
Set the copy priority for the virtual disk copy and click
The source virtual disk, the target virtual disk, and the copy priority setting that you selected appear on the
Copy Settings
virtual disk copy at the expense of the storage array’s performance. For more information, see "Setting Copy Priority" on page 89.
dialog. The higher priorities allocate more resources to the
Create virtual disk copies—Confirm
Next
.

Storage Array Performance During Virtual Disk Copy

The following factors contribute to the overall performance of the storage array:
I/O activity
Virtual disk RAID level
Virtual disk configuration — Number of drives in the virtual disk groups
Virtual disk type — Snapshot virtual disks might take more time to copy than standard virtual disks
During a virtual disk copy, resources for the storage array are diverted from processing I/O activity to completing a virtual disk copy. This affects the overall performance of the storage array. When you create a new virtual disk copy, you define the copy priority to determine how much controller processing time is diverted from I/O activity to a virtual disk copy operation.

Setting Copy Priority

The Copy Priority setting defines how much of the storage array’s resources are used to complete a virtual disk copy, rather than to fulfill I/O requests. Changing the copy priorities sets the rate at which a virtual disk copy is completed.
Five copy priority rates are available: lowest, low, medium, high, and highest. If the copy priority is set at the lowest rate, I/O activity is prioritized and the virtual disk copy takes longer. At the highest priority rate, the virtual disk copy is prioritized, and I/O activity for the storage array is slower.
Virtual Disk Copy 89
You can change the copy priority for a virtual disk copy in the following circumstances:
Before the virtual disk copy begins
See "Creating a Virtual Disk Copy" on page 87.
While the virtual disk copy is in progress
Click the active copy operation, then click disk copies.
When re-creating a virtual disk copy
Click the completed copy operation, then click virtual disk copies.
Modify
Modify
tab, then click
tab, then click
Manage Virtual Disk Copies Priority
Manage Virtual Disk Copies
to the right of the list of virtual
Re-copy
to the right of the list of
. Select an
. Select a

Stopping a Virtual Disk Copy

You can stop a virtual disk copy operation that has an In Progress status, a Pending status, or a Failed status. Stopping a virtual disk copy that has a Failed status clears the Needs Attention status displayed for the storage array.
When you stop a virtual disk copy, all mapped hosts have write access to the source virtual disk. If data is written to the source virtual disk, the data on the target virtual disk no longer matches the data on the source virtual disk.
To stop a virtual disk copy, complete the following steps:
1
Click the
2
Select the copy
You can only select one copy
Modify
tab, and then click
operation
you wish to stop by clicking it and click
operation
Manage virtual disk copies
at a time to be stopped.
.
Stop
.
3
Click
Yes
to stop the virtual disk copy.

Recopying a Virtual Disk

You can recopy a virtual disk when you have stopped a virtual disk copy and you want to start it again or when a virtual disk copy has failed.
The Recopy option overwrites existing data on the target virtual disk and makes the target virtual disk read-only to hosts. This option fails all snapshot virtual disks associated with the target virtual disk, if any exist.
90 Virtual Disk Copy

Preparing Host Servers to Recopy a Virtual Disk

NOTICE: Before you create a new copy of a source virtual disk, stop any data
access (I/O) activity or suspend data transfer to the source virtual disk (and, if applicable, the target disk) to ensure that you capture an accurate point-in-time image of the source virtual disk. Close all applications, including Windows Internet Explorer, to make sure all I/O activity has stopped.
NOTE: Removing the drive letter of the associated virtual disk(s) in Windows or
unmounting the virtual drive in Linux will help to guarantee a stable copy of the drive for the virtual disk copy.
Before creating a new virtual disk copy for an existing copy pair, both the host server and the associated virtual disk you are recopying have to be in the proper state. Perform the following steps to prepare your host server and virtual disk:
1
Stop all I/O activity to the source and target virtual disk.
2
Using your Windows system, flush the cache to both the source and the target virtual disk (if mounted). At the host prompt, type
SMrepassist -f <
and press <Enter>. See "SMrepassist Utility" on page 102 for more information.
3
Click the
Summary
that the virtual disk is in Optimal or Disabled status.
4
Remove the drive letter(s) of the source and (if mounted) virtual disk in Windows or unmount the virtual drive(s) in Linux to help guarantee a stable copy of the drive for the virtual disk. If this is not done, the copy operation will report that it has completed successfully, but the copied data will not be updated properly.
5
Follow any additional instructions for your operating system. Failure to follow these additional instructions can create unusable virtual disk copies.
filename-identifier
tab, then click
Disk Groups & Virtual Disks
>
to ensure
NOTE: If your operating system requires additional instructions, you can find
those instructions in your operating system documentation.
Virtual Disk Copy 91

Recopying the Virtual Disk

After first preparing the host server(s) as specified in the preceding procedure, complete the following steps to create a new virtual disk copy for an existing copy pair:
1
Click the
You can only select one copy
2
Select the copy
Copies
3
The
4
Ty p e
5
If you approve of the parameters, type click
The started. This dialog also enables you to exit the feature or create another new virtual disk copy.
6
Choose one of the following options, based on whether you want to create another virtual disk copy or modify the one you just created:
You can view the progress of a virtual disk copy in the Manage virtual disk copies page. For each copy operation in progress, the list displays a sliding
scale in the Status field showing the percentage of the operation that is complete.
Once the virtual disk copy is complete, perform the following actions:
1
In Linux, if you created the target virtual disk with unconfigured capacity, run the
2
If you created the target virtual disk with unconfigured capacity, you must map the virtual disk to a host in order to use it. See "Host-to-Virtual Disk Mapping" on page 60 for more information.
Modify
page, and then click
Recopy
yes
, and click OK.
Finish
Copy Started
Yes
— Create a new virtual disk copy.
No
— Exit the Create virtual disk copies dialog.
Manage Virtual Disk Copies
permissions or priority, or remove virtual disk copies.
hot_add
tab, and then click
operation
operation
dialog box appears. Set the copy priority.
to confirm the copy settings and start the virtual disk copy.
in the list displayed by the
Recopy
page appears, verifying that the virtual disk copy has
utility.
Manage virtual disk copies
at a time to be recopied.
Manage Virtual Disk
at the right of the list
yes in the text box
Create virtual disk copies
— Recopy, stop the copy process, set
.
.
and
92 Virtual Disk Copy
3
You must register the target virtual disk with the operating system before you can use the new virtual disk. Perform the following steps:
a
Enable write permission on the target virtual disk by either removing the virtual disk copy pair (see "Removing Copy Pairs" on page 93) or explicitly setting write permission.
b
In Windows, assign a drive letter to the virtual disk.
NOTE: Following a disk copy, if the properties of a Windows-based volume
indicate a RAW file system (one that has not been formatted) you must reboot the system so that Windows can recognize the correct virtual target disk.
In Linux, mount the virtual disk.
c
4
Enable I/O activity to the source virtual disk and the target virtual disk.

Removing Copy Pairs

Removing copy pairs permanently removes any virtual disk copy–related information for the source virtual disk and target virtual disk in the Virtual Disk Properties and the Storage Array Profile dialogs.
After you remove the virtual disk copy, you can select the target virtual disk as a source virtual disk or a target virtual disk for a new virtual disk copy. Removing a virtual disk copy also permanently removes the Read-Only attribute for the target virtual disk.
Removing copy pairs does not delete the data on the source virtual disk or target virtual disk. This merely breaks the copy relationship between the two virtual disks.
When you remove a virtual disk copy from the storage array, the target write attribute for the target virtual disk is also removed. If the virtual disk copy is in In Progress status, you must stop the virtual disk copy before you can remove the copy pair.
To remove a copy pair, perform the following steps:
1
Click the
2
Select one or more copy pairs in the table, and click
The
Modify
tab, and then click
Remove Copy Pairs
Manage virtual disk copies
dialog appears.
Remove
.
.
3
Click
Yes
to remove the copy pair.
Virtual Disk Copy 93
94 Virtual Disk Copy

Firmware Downloads

You can download the following types of firmware images with MD Storage Manager:
RAID controller module firmware that manages the storage array controllers
RAID nonvolatile static random access memory (NVSRAM) images that specify the default settings for the storage array controllers
Physical disk firmware that controls the operation of the disks in the storage array
Enclosure Management Modules (EMMs) firmware that manages data transfer between the drives and a RAID enclosure
To download firmware for any of these components, c
then click the components for which firmware is available.
Before downloading any firmware, verify that the storage arrays are in Optimal status. When you download new firmware, MD Storage Manager checks the operating status of the storage array controllers. If any controllers are not in the Optimal status, an error message appears, and you can stop or continue the download. Before continuing, correct any non-Optimal conditions.
Download firmware
NOTE: Virtual disks that do not have all their member drives at controller startup
are reported as Optimal. The firmware reports this to prevent disks failing as a result of disconnected enclosures.
. MD Storage Manager displays links to specify
lick the
Support
tab and

Downloading RAID Controller and NVSRAM Packages

The following sections describe the downloading process for RAID Controller and NVSRAM firmware.
NOTE: Due to a limitation with Linux, firmware updates to the RAID controller
module must be performed using out-of-band management only. Failure to do so may result in the host server becoming unresponsive, and it may require a reboot.
Firmware Downloads 95

Downloading Both RAID Controller and NVSRAM Firmware

NOTE: I/O to the array can continue while you are upgrading RAID controller and
NVSRAM firmware.
NOTE: The RAID enclosure must contain at least two disk drives in order to update
the firmware on the controller.
Use the following procedure to download RAID controller and NVSRAM firmware in a single operation:
1
Click the
2
From the
Module Firmware
A dialog box lists the current controller firmware and NVSRAM versions in use.
3
Click default, only firmware images that are compatible with the current storage array configuration appear.
4
Click the file in the
5
If the file you selected is not valid or is incompatible with the current storage array configuration, an error message appears. Click the error message, and select a compatible file.
NOTE: If you wish to only download firmware for the RAID controller, skip to
step 10 in this procedure.
6
Click the check box next to
module firmware
7
Click default, only firmware images that are compatible with the current storage array configuration appear.
8
Click the file in the
9
If the file you selected is not valid or is incompatible with the current storage array configuration, an error message appears. Click and select a compatible file.
10
Click
Support
tab, then click
Download firmware
.
Select File
to browse to the file that you want to download. By
File Selection
.
Select File
to browse to the file that you want to download. By
File Selection
Transfer...
Download firmware
display, click
Download RAID Controller
.
area and then click OK.
OK
to close
Transfer NVSRAM file with RAID controller
area and then click OK.
OK
to close it,
96 Firmware Downloads
11A Confirm Download
dialog box appears listing the current versions and the versions you selected of the RAID controller and NVSRAM firmware. To complete the download, click
Yes
.

Downloading Only NVSRAM Firmware

Use the following procedure to download NVSRAM firmware:
1
Click the
2
From the
Module NVSRAM
A dialog box lists the current controller firmware and NVSRAM versions in use.
3
Click default, only firmware images that are compatible with the current storage array configuration appear.
4
Click the file in the
5
If the file you selected is not valid or is incompatible with the current storage array configuration, an error message appears. Click and select a compatible file.
6
Click
7A Confirm Download
the versions you selected of the RAID controller and NVSRAM firmware. To complete the download, click
Support
tab, then click
Download firmware
.
Select File
to browse to the file that you want to download. By
File Selection
Transfer...
Download firmware
display, click
Download RAID Controller
.
area and then click OK.
OK
dialog box appears listing the current versions and
Yes
.
to close it,

Downloading Non-redundant MSCS NVSRAM Firmware

NOTE: For non-redundant MCSC Cluster configurations, download an updated
NVSRAM to avoid Virtual Disk Not on Preferred Path conditions.
Use the following procedure to download non-redundant NVSRAM firmware:
1
Click the
2
From the
Module NVSRAM
A dialog box lists the current controller firmware and NVSRAM versions in use.
Support
tab, then click
Download firmware
.
Download firmware
display, click
Download RAID Controller
Firmware Downloads 97
.
3
Click
Select File
default, only firmware images that are compatible with the current storage array configuration appear.
4
Click the and then click
5
If the file you selected is not valid or is incompatible with the current storage array configuration, an error message appears. Click and select a compatible file.
6
Click
7A Confirm Download
the versions you selected of the RAID controller and NVSRAM firmware. To complete the download, click
non-redundant-MSCS NVSRAM
Transfer...
to browse to the file that you want to download. By
OK
file in the
.
dialog box appears listing the current versions and
Yes
.
File Selection
OK

Downloading Physical Disk Firmware

Use the following procedure to download physical disk firmware:
NOTE: Dell recommends stopping all I/O to the array when downloading physical
disk firmware.
NOTE: Due to a limitation with Linux, physical disk firmware updates must be
performed using out-of-band management only. Failure to do so may result in the host server becoming unresponsive, and it may require a reboot.
1
Click the
2
From the
Firmware
A dialog box lists the current physical disk firmware version in use.
Support
Download firmware
.
tab, then click
Download firmware
display, click
Download Physical Disk
.
area
to close it,
3
Click
Add
to browse to the file that you want to download. By default, only firmware images that are compatible with physical disks in the storage array appear.
4
Click the file in the
5
If the file you selected is not valid or is incompatible with the physical disks in the storage array, an error message appears. Click and select a compatible file.
6
Click
Transfer...
98 Firmware Downloads
File Selection
area and then click OK.
OK
to close it,
7A Confirm Download
dialog box appears listing the current versions and the versions you selected of physical disk firmware. To complete the download, click
Yes
.

Downloading EMM Firmware

NOTICE: Do not make any configuration changes to the storage array while you are
downloading the EMM firmware. Doing so could cause the firmware download to fail, damage the storage array, or cause loss of data accessibility.
NOTE: Due to a limitation with Linux, EMM firmware updates must be performed
using out-of-band management only. Failure to do so may result in the host server becoming unresponsive, and it may require a reboot.
1
Click the
2
From the
(EMM) Card Firmware
A list of expansion enclosures appears with the corresponding version of the current EMM firmware file.
3
Select where to download the EMM firmware by clicking an individual expansion enclosure to highlight it or by clicking the to highlight all the expansion trays.
4
Click download resides. Select the file to download by double-clicking the file, and then click
The Start button is disabled until you select a firmware file. If you click Stop while a firmware download is in progress, the download completes before the operation stops. When the status field for the remaining expansion enclosures changes to Canceled, restart the firmware upgrade process.
Support
tab, then click
Download firmware
Select File
to locate the directory in which the EMM firmware file to
Start
to start the download.
display, click
.
Download firmware
Download Environmental
.
Select All
checkbox
Firmware Downloads 99
100 Firmware Downloads
Loading...