Dell MD3660I User Manual

Dell PowerVault MD3660i Series Storage Arrays Deployment Guide
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2012 Dell Inc.
Trademarks used in this text: Dell™, the Dell logo, Dell Boomi™, Dell Precision™ , OptiPlex™, Latitude™, PowerEdge™, PowerVault™, PowerConnect™, OpenManage™, EqualLogic™, Compellent™, KACE™, FlexAddress™, Force10™ and Vostro™ are trademarks of Dell Inc. Intel®, Pentium®, Xeon®, Core® and Celeron® are registered trademarks of Intel Corporation in the U.S. and other countries. AMD is a registered trademark and AMD Opteron™, AMD Phenom™ and AMD Sempron™ are trademarks of Advanced Micro Devices, Inc. Microsoft®, Windows®, Windows Server®, Internet Explorer®, MS-DOS®, Windows Vista® and Active Directory® are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Red Hat® and Red Hat Enterprise Linux® are registered trademarks of Red Hat, Inc. in the United States and/or other countries. Novell® and SUSE® are registered trademarks of Novell Inc. in the United States and other countries. Oracle® is a registered trademark of Oracle Corporation and/or its affiliates. Citrix®, Xen®, XenServer® and XenMotion® are either registered trademarks or trademarks of Citrix Systems, Inc. in the United States and/or other countries. VMware trademarks of VMware, Inc. in the United States or other countries. Corporation.
2012 - 08
®
,
Virtual SMP
®
®
,
vMotion
®
is a registered trademark of International Business Machines
IBM
,
vCenter
®
and
vSphere
®
are registered trademarks or
®
®
Rev. A00
Contents
Notes, Cautions, and Warnings...................................................................................................2
1 Introduction..................................................................................................................................7
System Requirements...............................................................................................................................................7
Management Station Requirements..................................................................................................................7
Introduction To Storage Arrays................................................................................................................................7
2 Hardware Installation.................................................................................................................9
Planning The Storage Configuration ........................................................................................................................9
Connecting The Storage Array.................................................................................................................................9
Cabling The Storage Array.......................................................................................................................................9
Redundant And Non-Redundant Configurations..............................................................................................10
Direct-Attached Configurations.......................................................................................................................10
Network-Attached Configurations...................................................................................................................14
Cabling PowerVault MD3060e Expansion Enclosures............................................................................................17
Expanding With Previously Configured PowerVault MD3060e Series Expansion Enclosures........................17
Expanding With New PowerVault MD3060e Expansion Enclosures...............................................................18
3 Installing MD Storage Manager.............................................................................................19
Modular Disk Configuration Utility..........................................................................................................................19
Graphical Installation (Recommended)..................................................................................................................20
Console Installation ...............................................................................................................................................20
Silent Installation ...................................................................................................................................................21
Silent Installation On Windows........................................................................................................................21
Silent Installation On Linux...............................................................................................................................21
Enabling Premium Features (Optional)...................................................................................................................21
Upgrading PowerVault MD Storage Manager.......................................................................................................21
4 Post Installation Tasks.............................................................................................................23
Before You Begin....................................................................................................................................................23
iSCSI Configuration Terminology.....................................................................................................................23
iSCSI Configuration Worksheet..............................................................................................................................24
Configuring iSCSI On Your Storage Array..............................................................................................................24
Automatic Configuration Using The Modular Disk Configuration Utility..........................................................24
Post Connection Establishment Steps....................................................................................................................26
5 Guidelines For Configuring Your Network For iSCSI...........................................................27
Microsoft Windows Host Setup..............................................................................................................................27
Using A DHCP server........................................................................................................................................27
Using A Static IP Address................................................................................................................................27
Using A DNS Server.........................................................................................................................................28
Using A WINS Server.......................................................................................................................................28
Linux Host Setup.....................................................................................................................................................28
Using DHCP......................................................................................................................................................28
Using A Static IP Address................................................................................................................................29
6 Uninstalling MD Storage Manager........................................................................................31
Uninstalling MD Storage Manager From Windows................................................................................................31
Uninstall MD Storage Manager From Microsoft Windows Operating Systems Other Than Microsoft
Windows Server 2008.......................................................................................................................................31
Uninstall MD Storage Manager From Windows Server 2008 GUI Versions....................................................31
Uninstall MD Storage Manager From Windows Server 2008 Core Versions...................................................31
Uninstalling MD Storage Manager From Linux......................................................................................................32
7 Appendix — Manual Configuration Of iSCSI........................................................................33
Step 1: Discover The Storage Array (Out-of-band Management Only)..................................................................33
Default Management Port Settings..................................................................................................................33
Automatic Storage Array Discovery................................................................................................................34
Manual Storage Array Discovery.....................................................................................................................34
Setting Up The Array........................................................................................................................................34
Step 2: Configure The iSCSI Ports On The Storage Array......................................................................................35
Step 3: Perform Target Discovery From The iSCSI Initiator...................................................................................35
For Windows Server 2003 Or Windows Server 2008 GUI Version....................................................................35
For Windows Server 2008 Core Version...........................................................................................................36
For Red Hat Enterprise Linux 5 Or 6, SUSE Linux Enterprise Server 10 Or 11..................................................36
Step 4: Configure Host Access...............................................................................................................................37
Understanding CHAP Authentication.....................................................................................................................37
What Is CHAP...................................................................................................................................................37
Target CHAP.....................................................................................................................................................37
Mutual CHAP....................................................................................................................................................38
CHAP Definitions..............................................................................................................................................38
Step 5: Configure CHAP Authentication On The Storage Array (Optional).............................................................38
Configuring Target CHAP Authentication On The Storage Array....................................................................38
Configuring Mutual CHAP Authentication On The Storage Array....................................................................39
Step 6: Configure CHAP Authentication On The Host Server (Optional)................................................................39
For Windows Server 2008 GUI Version............................................................................................................39
For Windows Server 2008 Core Version...........................................................................................................40
For Red Hat Enterprise Linux 5 Or 6, SUSE Linux Enterprise Server 10 Or 11..................................................40
For SUSE Linux Enterprise Server SP3 Using The GUI.....................................................................................41
Step 7: Connect To The Target Storage Array From The Host Server....................................................................42
For Windows Server 2008 GUI Version............................................................................................................42
For Windows Server 2008 Core Version...........................................................................................................42
For Linux Server...............................................................................................................................................43
Step 8: (Optional) Set Up In-Band Management....................................................................................................44
8 Appendix — Using Internet Storage Naming Service........................................................45
9 Appendix — Load Balancing..................................................................................................47
Windows Load Balance Policy...............................................................................................................................47
Round Robin With Subset.......................................................................................................................................47
Least Queue Depth With Subset.............................................................................................................................47
Changing Load Balance Policies In Windows Sever 2008 ....................................................................................47
Changing The Load Balance Policy Using Windows Server 2008 Device Manager Options..........................47
Changing The Load Balance Policy Using The Windows Server 2008 Disk Management Options.................48
Increasing Bandwidth With Multiple iSCSI Sessions............................................................................................48
10 Appendix — Stopping And Starting iSCSI Services In Linux..........................................51
11 IPv4 Settings — Worksheet..................................................................................................53
12 IPv6 Settings — Worksheet..................................................................................................55
6

Introduction

This guide provides information about deploying Dell PowerVault MD3660i storage arrays. The deployment process includes:
Hardware installation
Modular Disk Storage Manager (MD Storage Manager) installation
Initial system configuration
Other information provided include system requirements, storage array organization, and utilities.
NOTE: For more information on product documentation, see support.dell.com/manuals.
MD Storage Manager enables an administrator to configure and monitor storage arrays for optimum usability. The version of MD Storage Manager included on the PowerVault MD Series resource media can be used to manage both the PowerVault MD3660i Series and other PowerVault MD Series storage arrays. MD Storage Manager is compatible with both Microsoft Windows and Linux operating systems.

System Requirements

Before installing and configuring the PowerVault MD3660i Series hardware and software, ensure that the supported operating system is installed and minimum system requirements are met. For more information, see the Support Matrix at support.dell.com/manuals.
1

Management Station Requirements

A management station uses MD Storage Manager to configure and manage storage arrays across the network. A management station must meet the following minimum system requirements:
Intel Pentium or an equivalent processor (1333 MHz or faster) with 512 MB RAM (1024 MB recommended).
1 GB disk space.
Display resolution of 1024x768 with 16 million colors (1280x1024 32-bit recommended).
Microsoft Windows, Red Hat Enterprise Linux, or SUSE Linux Enterprise Server.
NOTE: Operating system installations can be either native or hypervisor guest configurations.
NOTE: Supported hypervisors include Microsoft Hyper-V, Citrix XenServer, and VMware. For information about the supported versions, see the Support Matrix at support.dell.com/manuals.
Administrator or equivalent permissions.

Introduction To Storage Arrays

An enclosure containing physical disks accessed through RAID controller modules is called a storage array. A storage array includes various hardware components, such as physical disks, RAID controller modules, fans, and power supplies.
7
One or more host servers attached to the storage array can access the data on the storage array. You can also establish multiple physical paths between the host(s) and the storage array so that loss of any single path (for example, through failure of a host server port) does not result in loss of access to data on the storage array.
The storage array is managed by MD Storage Manager running on a:
Host server — On a host server system, MD Storage Manager and the storage array communicate management requests and event information using SAS connections.
Management station — On a management station, MD Storage Manager communicates with the storage array either through an Ethernet connection to the storage array management port or through an Ethernet connection to a host server. The Ethernet connection passes management information between the management station and the storage array using SAS connections.
Using MD Storage Manager, you can configure the physical disks in the storage array into logical components called disk groups and then divide the disk groups into virtual disks. Disk groups are created in the unconfigured capacity of a storage array. Virtual disks are created in the free capacity of a disk group.
Unconfigured capacity comprises physical disks not already assigned to a disk group. When a virtual disk is created using unconfigured capacity, a disk group is automatically created. If the only virtual disk in a disk group is deleted, the disk group is also deleted. Free capacity is space in a disk group that is not assigned to any virtual disk.
Data is written to the physical disks in the storage array using RAID technology. RAID levels define the way in which data is written to physical disks. Different RAID levels offer different levels of accessibility, redundancy, and capacity. You can set a specified RAID level for each disk group and virtual disk on your storage array. For more information about using RAID and managing data in your storage solution, see the Administrator's Guide at support.dell.com/manuals.
8

Hardware Installation

Before using this guide, ensure that you review the instructions in the:
Getting Started Guide
configure the initial setup of the system.
Dell PowerVault MD3260/3260i/3660i/3660f/3060e Storage Arrays Administrator's Guide
Guide provides information about important concepts you must know before setting up your storage solution. See the Administrator's Guide at support.dell.com/manuals.
The Rack Installation instructions, that shipped with the storage array, provides information on how to rack your system.

Planning The Storage Configuration

Consider the following before installing your storage array:
Evaluate data storage needs and administrative requirements.
Calculate availability requirements.
Decide the frequency and level of backups, such as weekly full backups with daily partial backups.
Consider storage array options, such as password protection and e-mail alert notifications for error conditions.
Design the configuration of virtual disks and disk groups according to a data organization plan. For example, use one virtual disk for inventory, a second for financial and tax information, and a third for customer information.
Decide whether to allow space for hot spares, which automatically replace failed physical disks.
—The
Getting Started Guide
that shipped with the storage array, provides information to
—The Administrator's
2

Connecting The Storage Array

The storage array is connected to a host using two hot-swappable RAID controller modules. The RAID controller modules are identified as RAID controller module 0 and RAID controller module 1.
Each RAID controller module has four iSCSI IN port connectors that provide Ethernet connections to the host or node. Each RAID controller module also contains an Ethernet management port and a SAS OUT port connector. The Ethernet management port allows you to install a dedicated management station (server or stand-alone system). The SAS OUT port allows you to connect the storage array to optional expansion enclosures for additional storage capacity.
Each PowerVault MD3660i Series storage array can be expanded to a maximum of 120 (or 180, if enabled using Premium Feature activation) physical disks through a maximum of seven PowerVault MD3060e Series expansion enclosures.

Cabling The Storage Array

The iSCSI interface enables different host-to-controller configurations. The figures in this chapter are grouped according to the following categories:
Direct-attached configurations (no Ethernet switches are used)
Network-attached (SAN) configurations (Ethernet switches are used)
9

Redundant And Non-Redundant Configurations

Non-redundant configurations are configurations that provide only a single data path from a host to the storage array. This type of configuration is only recommended for non-critical data storage. Path failure from a failed or removed cable, a failed HBA, or a failed or removed RAID controller module results in loss of host access to storage on the storage array.
Redundancy is established by installing separate data paths between the host and the storage array, in which each path is to one of the two RAID controller modules installed in the storage array. Redundancy protects the host from losing access to data in the event of path failure, because both RAID controller modules can access all the disks in the storage array.

Direct-Attached Configurations

You can connect the Ethernet ports of the host servers directly to the storage array RAID controller module iSCSI ports.
The following figure shows four stand-alone hosts supported in a dual controller array configuration with a single data path.
10
Figure 1. Four Hosts in a Dual-Controller Configuration
In the following figure, up to two servers are directly attached to the RAID controller modules. If the host server has a second Ethernet connection to the array, it can be attached to the iSCSI ports on the array's second controller. This configuration provides improved availability by allowing two separate physical paths for each host, which ensures full redundancy if one of the paths fail.
11
Figure 2. Two Hosts Connected to Two Controllers
In the following figure, up to two cluster nodes are directly attached to two RAID controller modules. Since each cluster node has redundant paths, loss of a single path still allows access to the storage array through the alternate path.
12
Figure 3. Two Cluster Nodes Connected to Two Controllers
13

Network-Attached Configurations

You can also cable the host servers to the RAID controller module iSCSI ports through industry-standard 10 Gbps or 1 Gbps Ethernet switches. An iSCSI configuration that uses Ethernet switches is frequently referred to as an IP SAN. By using an IP SAN, the PowerVault MD3660i series storage array can support up to 64 hosts simultaneously. This configuration supports either single or dual path data configurations and either single or dual controller modules.
The following figure shows up to 64 stand-alone servers attached (using multiple sessions) to a dual RAID controller module configuration through a network. Hosts that have a second Ethernet connection to the network allow two separate physical paths for each host, which ensures full redundancy if one of the paths fails. It is recommended you use two switches for more redundancy. However, single switch configuration is also supported.
14
Figure 4. 64 Servers Connected to Two Controllers
The following figure shows up to 64 stand-alone servers attached (using multiple sessions) to a dual RAID controller configuration through a network using a 1 Gbps to 10 Gbps aggregation scheme. The NICs on the servers are 1 Gbps NICs and the uplink ports on the 1 Gbps switches are 10 Gbps. Hosts that have a second Ethernet connection to the
15
network allow two separate physical paths for each host, which ensures full redundancy if one of the paths fails. It is recommended you use two switches for more redundancy. However, single switch configuration is also supported.
Figure 5. 64 Servers Connected to Two RAID Controllers
16

Cabling PowerVault MD3060e Expansion Enclosures

You can expand the capacity of your PowerVault MD3660i Series storage array by adding PowerVault MD3060e expansion enclosures. You can expand the physical disk pool to a maximum of 120 (or 180, if enabled using Premium Feature activation) physical disks using a maximum of two expansion enclosures.

Expanding With Previously Configured PowerVault MD3060e Series Expansion Enclosures

Use this procedure if your expansion enclosure is directly attached to and configured on a Dell PowerEdge RAID Controller (PERC) H800 adapter. Data from virtual disks created on a PERC H800 adapter cannot be directly migrated to a PowerVault MD3660i Series storage array or to a PowerVault MD3060e Series expansion enclosure connected to a PowerVault MD3660i Series storage array.
CAUTION: If a PowerVault MD3060e Series expansion enclosure that was previously attached to PERC H800 adapter is used as an expansion enclosure to a PowerVault MD3660i Series storage array, the physical disks of the expansion enclosure are reinitialized and data is lost. You must backup all data on the expansion enclosure before attempting the expansion.
To attach previously configured PowerVault MD3060e Series expansion enclosures to the PowerVault MD3660i Series storage array:
After the PowerVault MD3060e Series expansion enclosures are online, they can be accessed as a part of the storage array.
1. Back up all data on the expansion enclosure(s).
2. Upgrade the expansion enclosure firmware to the latest version available at support.dell.com while the enclosure is still attached to the PERC H800 controller.
Windows systems users can reference the DUP.exe package and Linux kernel users can reference the DUP.bin package.
3. Ensure that the storage array software is installed and up to date before adding the expansion enclosure(s).
For more information, see the Support Matrix at support.dell.com/manuals.
4. Install the software and driver package included on the PowerVault MD Series resource media.
For information about installing the software, see Installing MD Storage Manager.
5. Update the storage array RAID controller module firmware and NVSRAM to the latest versions available at support.dell.com, using Modular Disk Storage Manager.
6. Launch MD Storage Manager.
7. Click ToolsUpgrade RAID Controller Module Firmware in the Enterprise Management Window (EMW).
8. Stop all I/O to the array and turn off the host systems attached to the storage array.
9. Turn off the storage array.
10. Turn off the expansion enclosure(s) in the affected system.
11. Cable the expansion enclosure(s) to the storage array.
12. Turn on the expansion enclosure(s).
13. Turn on the storage array and wait for the status LED to indicate that the unit is ready:
– When power is on, the power on indicator lights solid green.
– If the Service action required indicator lights amber, there is an error that can be viewed using the
PowerVault Modular Disk Storage Manager.
14. When the storage array is online and ready, turn on any attached host systems.
17
Loading...
+ 39 hidden pages