HIKVISION DS-A80, DS-A81 User Manual

DS-A80&81 Series Storage System
User Manual
UD.6L0205D1035A01
1
User Manual
COPYRIGHT © 2016 Hangzhou Hikvision Digital Technology Co., Ltd.
ALL RIGHTS RESERVED.
Any and all information, including, among others, wordings, pictures, graphs are the properties of Hangzhou
Hikvision Digital Technology Co., Ltd. or its subsidiaries (hereinafter referred to be “Hikvision”). This user manual
(hereinafter referred to be the Manual) cannot be reproduced, changed, translated, or distributed, partially or
wholly, by any means, without the prior written permission of Hikvision. Unless otherwise stipulated, Hikvision
does not make any warranties, guarantees or representations, express or implied, regarding to the Manual.
About this Manual
This Manual is applicable to DS-A80&81 Series Storage System.
The Manual includes instructions for using and managing the product. Pictures, charts, images and all other
information hereinafter are for description and explanation only. The information contained in the Manual is
subject to change, without notice, due to firmware updates or other reasons. Please find the latest version in the
company website (http://overseas.hikvision.com/en/).
Please use this user manual under the guidance of professionals.
Trademarks Acknowledgement
and other Hikvisions trademarks and logos are the properties of Hikvision in various jurisdictions.
Other trademarks and logos mentioned below are the properties of their respective owners.
Legal Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE PRODUCT DESCRIBED, WITH ITS HARDWARE,
SOFTWARE AND FIRMWARE, IS PROVIDED AS IS, WITH ALL FAULTS AND ERRORS, AND HIKVISION MAKES NO
WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION, MERCHANTABILITY, SATISFACTORY
QUALITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT OF THIRD PARTY. IN NO EVENT WILL
HIKVISION, ITS DIRECTORS, OFFICERS, EMPLOYEES, OR AGENTS BE LIABLE TO YOU FOR ANY SPECIAL,
CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES, INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF
BUSINESS PROFITS, BUSINESS INTERRUPTION, OR LOSS OF DATA OR DOCUMENTATION, IN CONNECTION WITH
THE USE OF THIS PRODUCT, EVEN IF HIKVISION HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
REGARDING TO THE PRODUCT WITH INTERNET ACCESS, THE USE OF PRODUCT SHALL BE WHOLLY AT YOUR OWN
RISKS. HIKVISION SHALL NOT TAKE ANY RESPONSIBILITES FOR ABNORMAL OPERATION, PRIVACY LEAKAGE OR
OTHER DAMAGES RESULTING FROM CYBER ATTACK, HACKER ATTACK, VIRUS INSPECTION, OR OTHER INTERNET
SECURITY RISKS; HOWEVER, HIKVISION WILL PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED.
SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL RELEVANT LAWS IN YOUR JURISDICTION
BEFORE USING THIS PRODUCT IN ORDER TO ENSURE THAT YOUR USE CONFORMS THE APPLICABLE LAW.
HIKVISION SHALL NOT BE LIABLE IN THE EVENT THAT THIS PRODUCT IS USED WITH ILLEGITIMATE PURPOSES.
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATER PREVAILS.
2
Regulatory Information
FCC Information
FCC compliance: This equipment has been tested and found to comply with the limits for a Class A digital device,
pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful
interference when the equipment is operated in a commercial environment. This equipment generates, uses, and
can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may
cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to
cause harmful interference in which case the user will be required to correct the interference at his own expense.
FCC Conditions
This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference received, including interference that may cause undesired operation.
EU Conformity Statement
This product and - if applicable - the supplied accessories too are marked with "CE" and comply
therefore with the applicable harmonized European standards listed under the EMC Directive
2004/108/EC, the RoHS Directive 2011/65/EU, the LVD Directive 2006/95/EC.
2012/19/EU (WEEE directive): Products marked with this symbol cannot be disposed of as unsorted
municipal waste in the European Union. For proper recycling, return this product to your local
supplier upon the purchase of equivalent new equipment, or dispose of it at designated collection
points. For more information see: www.recyclethis.info
2006/66/EC (battery directive): This product contains a battery that cannot be disposed of as
unsorted municipal waste in the European Union. See the product documentation for specific
battery information. The battery is marked with this symbol, which may include lettering to indicate
cadmium (Cd), lead (Pb), or mercury (Hg). For proper recycling, return the battery to your supplier or to a
designated collection point. For more information see: www.recyclethis.info
Industry Canada ICES-003 Compliance
This device meets the CAN ICES-3 (A)/NMB-3(A) standards requirements.
3
Safety Instruction
These instructions are intended to ensure that user can use the product correctly to avoid danger or property
loss.
The precaution measure is divided into “Warnings” and “Cautions”
Warnings: Serious injury or death may occur if any of the warnings are neglected. Cautions: Injury or equipment damage may occur if any of the cautions are neglected.
Warnings
Proper configuration of all passwords and other security settings is the responsibility of the installer and/or
end-user.
In the use of the product, you must be in strict compliance with the electrical safety regulations of the nation
and region. Please refer to technical specifications for detailed information.
Input voltage should meet both the SELV (Safety Extra Low Voltage) and the Limited Power Source with
100~240 VAC or 12 VDC according to the IEC60950-1 standard. Please refer to technical specifications for
detailed information.
Do not connect several devices to one power adapter as adapter overload may cause over-heating or a fire
hazard.
Please make sure that the plug is firmly connected to the power socket.
If smoke, odor or noise rise from the device, turn off the power at once and unplug the power cable, and then
please contact the service center.
Warnings Follow these safeguards to
prevent serious injury or death.
Cautions Follow these precautions to
prevent potential injury or material
damage.
4
Table of Contents
Chapter 1 Overview ......................................................................................................................... 7
Chapter 2 Getting Started ................................................................................................................ 8
2.1 HDD Installation ............................................................................................................................... 9
2.2 Access by Web Browser ................................................................................................................. 10
2.3 Login .............................................................................................................................................. 11
Chapter 3 Maintenance .................................................................................................................. 12
3.1 System Monitor ............................................................................................................................. 13
3.2 Performance .................................................................................................................................. 13
3.3 Common ........................................................................................................................................ 15
3.3.1 Viewing Version Information ............................................................................................ 15
3.3.2 Resetting System ............................................................................................................... 16
3.3.3 Managing Maintenance Log.............................................................................................. 16
3.3.4 Application Service ........................................................................................................... 16
3.3.5 System Upgrade ................................................................................................................ 20
3.3.6 Strategy ............................................................................................................................. 20
3.4 Graphical Display ........................................................................................................................... 21
3.4.1 Front View ........................................................................................................................ 21
3.4.2 Pie Chart ........................................................................................................................... 22
3.5 Control Message ............................................................................................................................ 23
Chapter 4 Storage Management ..................................................................................................... 25
4.1 Managing Local Disk ...................................................................................................................... 26
4.1.1 Viewing Disk Status ........................................................................................................... 26
4.1.2 Rescanning Disk ................................................................................................................ 27
4.1.3 Positioning Disk ................................................................................................................. 27
4.1.4 Disk Initialization ............................................................................................................... 28
4.1.5 Disk Check ......................................................................................................................... 28
4.2 Array .............................................................................................................................................. 29
4.2.1 Creating Array ................................................................................................................... 29
4.2.2 Array Exception ................................................................................................................. 31
4.2.3 Rebuilding Array................................................................................................................ 31
4.2.4 Checking Array .................................................................................................................. 32
4.2.5 Repairing Array ................................................................................................................. 33
4.2.6 Renaming Array ................................................................................................................ 33
4.2.7 Deleting Array ................................................................................................................... 34
4.2.8 Adding Hot Spare .............................................................................................................. 34
4.2.9 Deleting Hot Spare ............................................................................................................ 35
4.3 Storage Pool ................................................................................................................................... 35
4.3.1 Adding Storage Pool .......................................................................................................... 36
4.3.2 Deleting Storage Pool ........................................................................................................ 37
4.3.3 Positioning Storage Pool ................................................................................................... 37
4.4 LUN (Logical Volume) ..................................................................................................................... 37
4.4.1 Creating LUN ..................................................................................................................... 37
5
4.4.2 Deleting LUN ..................................................................................................................... 38
4.4.3 Renaming LUN .................................................................................................................. 38
4.4.4 Enlarging LUN .................................................................................................................... 38
4.5 Settings .......................................................................................................................................... 39
4.5.1 Synchronization Speed and Type ...................................................................................... 39
4.5.2 Flashing Time .................................................................................................................... 40
Chapter 5 SAN ................................................................................................................................ 41
5.1 iSCSI ............................................................................................................................................... 42
5.1.1 Adding CHAP User ............................................................................................................. 42
5.1.2 Modifying CHAP User ........................................................................................................ 43
5.1.3 Enabling iSCSI .................................................................................................................... 43
5.1.4 Disabling iSCSI ................................................................................................................... 44
5.1.5 Modifying iSCSI Port.......................................................................................................... 44
5.2 FC (Optional) .................................................................................................................................. 45
5.2.1 Enabling FC ....................................................................................................................... 45
5.2.2 Disabling FC ....................................................................................................................... 46
Chapter 6 CVR ................................................................................................................................ 47
6.1 Quick-Setting CVR .......................................................................................................................... 48
6.2 CVR Configuration ......................................................................................................................... 49
6.2.1 Starting CVR ...................................................................................................................... 49
6.2.2 Resetting CVR .................................................................................................................... 51
6.2.3 Record Volume .................................................................................................................. 52
6.3 Backup and Restoring .................................................................................................................... 54
6.3.1 Viewing Private Volume Information ................................................................................ 54
6.3.2 Restoring ........................................................................................................................... 55
6.3.3 Backup .............................................................................................................................. 55
6.3.4 Recovering Video Data...................................................................................................... 56
6.4 N+1 Management .......................................................................................................................... 56
6.4.1 Adding Backup CVR ........................................................................................................... 57
6.4.2 Deleting Backup CVR ......................................................................................................... 58
6.4.3 Adding Master CVR ........................................................................................................... 58
Chapter 7 CVR Sub-System.............................................................................................................. 60
7.1 Access by Web Browser ................................................................................................................. 61
7.2 Information .................................................................................................................................... 61
7.3 Device Management...................................................................................................................... 62
7.3.1 Device ............................................................................................................................... 63
7.3.2 Tools .................................................................................................................................. 67
7.4 Live View and Record .................................................................................................................... 69
7.4.1 Live View ........................................................................................................................... 70
7.4.2 Manual Record .................................................................................................................. 70
7.5 Schedule and Alarm ....................................................................................................................... 71
7.5.1 Schedule ........................................................................................................................... 71
7.5.2 Record Upload................................................................................................................... 74
7.5.3 Alarm ................................................................................................................................ 76
6
7.6 Playing and Downloading .............................................................................................................. 77
7.6.1 Searching Video ................................................................................................................ 78
7.6.2 Archiving ........................................................................................................................... 78
7.6.3 Remote Backup ................................................................................................................. 80
7.6.4 Locking .............................................................................................................................. 80
7.6.5 Playback ............................................................................................................................ 81
7.6.6 Downloading ..................................................................................................................... 82
7.7 Archiving ........................................................................................................................................ 84
7.7.1 Archive Volume ................................................................................................................. 84
7.7.2 Archive Search .................................................................................................................. 85
7.8 User ............................................................................................................................................... 86
7.9 System Configuration..................................................................................................................... 86
7.9.1 System Alarm .................................................................................................................... 87
7.9.2 CVR Version ....................................................................................................................... 88
7.10 Log Management ........................................................................................................................... 89
7.10.1 Searching Log .................................................................................................................... 89
7.10.2 Exporting Log .................................................................................................................... 89
7.10.3 Clearing Log ...................................................................................................................... 90
Chapter 8 System ............................................................................................................................ 91
8.1 Network ......................................................................................................................................... 92
8.1.1 Modifying Data NIC ........................................................................................................... 92
8.1.2 NIC Bond ........................................................................................................................... 93
8.1.3 Adding Route .................................................................................................................... 94
8.1.4 MAC and IP Bonding ......................................................................................................... 95
8.1.5 Advanced Parameters ....................................................................................................... 96
8.2 Alarm ............................................................................................................................................. 98
8.2.1 Alarm Type ........................................................................................................................ 99
8.2.2 Adding E-Mail .................................................................................................................. 100
8.2.3 Testing E-Mail .................................................................................................................. 101
8.2.4 Adding SMTP Manager ................................................................................................... 101
8.2.5 Testing SMTP Manager ................................................................................................... 102
8.3 Time ............................................................................................................................................ 102
8.3.1 Adjusting System Time .................................................................................................... 103
8.3.2 Synchronizing Time ......................................................................................................... 103
8.4 Tool .............................................................................................................................................. 104
Chapter 9 Log ............................................................................................................................... 105
9.1 Operation Log .............................................................................................................................. 106
9.2 Performance Log.......................................................................................................................... 107
9.3 Update Log .................................................................................................................................. 107
7
Chapter 1 Overview
Purpose:
DS-A80&81 series storage system is a high-performance and highly reliable storage system. Designed with four
enterprise-class gigabyte network interfaces, it provides a bandwidth with 4 to 8G bps transmission capability and
a huge storage space. It is integrated with multiple advanced technologies, including a 64-bit hexa-core processors,
stable architecture, and the RAID 6 storage technology, thus to run reliably and protect users data security
effectively.
Figure 1. 1 GUI and Table 1. 1 GUI Introduction introduce the elements appear in the GUI (Graphical User
Interface) and clarify names for each element.
Figure 1. 1 GUI
Table 1. 1 GUI Introduction
No.
Name
Description
1
Banner and device
model
Shows the banner and device model.
2
Running status
A shortcut for obtaining the real-time running status.
3
Navigation Bar
Lists the storage system menu.
4
Help and logout
A shortcut for accessing user manuals, downloading software, and logout.
5
Operation window
Lists the parameters. You can configure parameters in the area.
8
Chapter 2 Getting Started
Purpose:
The chapter introduces HDD installation steps, web browser access steps, and login steps.
Table 2. 1 Module Description
Module
Description
HDD Installation
Describes the steps of HDD installation.
Web Browser Access
You can get access to the storage system via a server with the web browser
installed.
Login
Introduces login storage system steps.
Key Words:
HDD Installation, Web Browser Access, Login
9
2.1 HDD Installation
Before you start:
Prepare the following equipment and accessories.
A storage system Hard disks A pair of anti-static gloves A screwdriver
Steps:
1. Press the blue button to pop up the hander.
Figure 2. 2 Press the Blue Button
2. Hold the hander and pull the hard disk box out of the slot.
Figure 2. 3 Pull out the Hard Disk Box
3. Use the screwdriver to uninstall the baffle in the bottom of hard disk slot.
4. Place a hard disk in the hard disk box. The SATA interface must face the hard disk box rear.
Figure 2. 4 Place Hard Disk
5. Adjust the hard disk position. Ensure the hard disk rear aligning with hard disk rear and the two screw holes
aiming at the holes that marked with red frame in Figure 2. 5 HDD Position.
10
Figure 2. 5 HDD Position
6. Use a screwdriver to fasten the four screws into the screw holes that in both sides.
Figure 2. 6 Install Screws
7. Push the hard disk box back into the slot.
Figure 2. 7 Pull the HDD Box into Slot
2.2 Access by Web Browser
Purpose:
You can get access to the storage system via a server with a web browser installed, without needing to install any
other software. The recommended web browser includes Internet Explorer 8 and Internet Explorer 11.
Before you start:
1. Use a network cable to connect the server’s Ethernet port and the storage systems Management NIC
(Network Interface Card).
2. Configure the servers IP address. Ensure it is in the same network segment with the Management NIC (the
default IP address of Management NIC is 10.254.254.254.
Steps:
1. Open web browser.
2. Input the storage system’s IP address (https://10.254.254.254:2004) in Web browser address bar.
3. Press Enter. Then login interface appears.
11
Figure 2. 8 Login Interface
2.3 Login
Steps:
1. Select Login account as Basic Management or CVR Sub-system.
Basic Management: Used to configure basic parameters of storage system. CVR Sub-system: Used to Log into CVR sub-system.
2. Select User name.
3. Enter Password. The default password is 123.
STRONG PASSWORD RECOMMENDED–We highly recommend you create a strong password of your own
choosing (Using a minimum of 8 characters, including at least three of the following categories: upper
case letters, lower case letters, numbers, and special characters.) in order to increase the security of your product.
And we recommend you reset your password regularly, especially in the high security system, resetting the
password monthly or weekly can better protect your product.
4. Mode is Advanced by default and is not selectable.
5. Click Login to log in system.
Figure 2. 9 Login
12
Chapter 3 Maintenance
Purpose:
Maintenance function enables you to view login and iSCSI information, monitor running status, restore default
settings, check and download logs, upgrade storage system, and so forth.
Table 3. 1 Module Description
Module
Description
System Monitor
It is a shortcut for reboot and shutdown and lists the login users information and
iSCSI connection information.
Performance
Shows you the real-time graph and data of system performance, including
bandwidth usage, memory usage, CPU usage, IO status, and Vmstatus.
Common
You can view system version, reset system, view logs, upgrade system, and add
check and repair strategy.
Graphical Display
Provides a graph to show the front view status and a pie chart to show the storage
information.
Control Message
Shows the fans information, modules temperature, fan control panel version, and
chassis power.
Key words:
System Monitor, Performance, Common, Graphical Display, Control Message
Figure 3. 2 Maintenance
13
3.1 System Monitor
Purpose:
Once you log into the storage system, system monitor menu appears. System monitor menu is a shortcut for
reboot and shutdown and lists the login users information and iSCSI connection information.
Steps:
1. Click Maintenance in navigation bar and choose System Monitor to enter System Monitor interface.
Figure 3. 3 System Monitor
2. Reboot, power off, or view login information or iSCSI connection info.
Click Reboot or Power off to restart or shut down the storage system. The logged in users names and IP addresses are listed in the Login info. The LUN ID, iSCSI ID, and Initiator name are listed in iSCSI connection info, which shows which
devices are connecting iSCSI.
3.2 Performance
Purpose:
Performance menu shows you the real-time graph and data of system performance, including bandwidth usage,
memory usage, CPU usage, IO status, and Vmstatus.
Steps:
1. Click Maintenance in navigation bar and choose Performance to enter Performance interface.
Figure 3. 4 Performance
2. Click Enable Graph Monitor to show the real-time graphs of bandwidth usage, memory usage, and CPU
usage.
3. Optionally, click Disable Graph Monitor to fold the graphs.
14
Figure 3. 5 Graph Monitor
4. Click Vmstat to pop up Vmstat window. Vmstat updates per second.
Figure 3. 6 Vmstat
5. Click of Iostat to unfold input/output status.
6. Optionally, click of Iostat to fold input/output status.
Figure 3. 7 Iostat
15
3.3 Common
Purpose:
You can view system version, reset system, view logs, upgrade system, and add check and repair strategy.
Step:
Click Maintenance in navigation bar and choose Common to enter Common interface.
Figure 3. 8 Common
3.3.1 Viewing Version Information
Purpose:
Version information interface lists information including SMI, CVR, Support, and so on.
Steps:
1. Click Version information to pop up version information window.
2. Click Cancel to close the window.
Figure 3. 9 Version Information
16
3.3.2 Resetting System
Purpose:
You can reset system to factory defaults when system is abnormal. Youre recommended to reset system under
the direction of professional technical support.
Resetting operation wont restore administrator user name and password, RAID configuration, hot spot
configuration, and network parameters.
Steps:
1. Click Reset system to pop up reset system dialog.
Figure 3. 10 Reset System
2. Enter yes or YES in text field and click OK to reset.
3.3.3 Managing Maintenance Log
Purpose:
When system is abnormal, you can download the maintenance log to analyze problems.
Steps:
For details, refer to 9.1 Operation Log.
3.3.4 Application Service
Purpose:
When you want to reboot, turn on or turn off any applications, use the application service management function.
Step:
Click Application Service in Common menu to enter Application Service interface.
17
Figure 3. 11 Application Service
3.3.4.1 Modifying Password
Purpose:
You can modify password for basic management system and CVR sub-system user.
Steps:
1. Click Modify password button. And modify password window appears.
2. Select User Name as web_admin or nvr_admin.
web_admin: Basic management system user name. nvr_admin: CVR sub-system user name.
3. Enter Old Password and the same password in New Password and Confirm Password.
The security level of modified password shouldnt be lower than low security. Password can only contain numbers, lowercase, uppercase, and underline for your password.
Figure 3. 12 Modify Password
4. Click OK and click OK in popup message dialog to save the new password.
Once password is modified, it jumps to login interface. You need to enter the new password to log in. Another controllers password changes with the current controllers password.
18
3.3.4.2 SNMP Configuration
Purpose:
By configuring SNMP parameters, you can log in PRTG Traffic Grapher tool to monitor the system status, including
exception information, CPU usage, and so forth.
Steps:
1. Click SNMP configure button. Then SNMP configure interface appears.
Figure 3. 13 SNMP Configuration
2. SNMP version is V2(v2c) by default and is not editable.
3. Enter User Name, Linkman, and Physical addr.
4. Click OK to save the settings. Then you can view system status by logging in PRTG Traffic Grapher Tool.
3.3.4.3 Network Test
Purpose:
You can test the network communication between the storage system with any other IP addresses.
Steps:
1. Click Network test to pop up Network test interface.
Figure 3. 14 Network Test
2. Input the IP address you want to test in Test IP text field.
19
3. Click Test to start testing. Test result would be listed in the current interface.
Figure 3. 15 Test Result
3.3.4.4 Modifying Host Name
Steps:
1. Click Modify and text field appears.
2. Enter host name in the text field.
3. Click Modify to activate the new host name.
Figure 3. 16 Modify Host Name
Only letters (a to z and A to Z), numbers (0 to 9), and underline (_) can be input.
3.3.4.5 Viewing Service Status
Purpose:
Whether the services are running or not is listed. You can enable, disable, or restart the services.
Steps:
Click Enable to start the service isnt running. Click Disable to shut down the running service. Click Restart to restart services.
Figure 3. 17 Service Status
20
3.3.5 System Upgrade
Purpose:
You’re recommended to upgrade system under the help of professional support.
Steps:
1. Click System upgrade in Common menu to enter Application Service interface.
Figure 3. 18 Application Service
2. Click Browser and choose the upgrade package.
3. Click Upload to upgrade. After upgrade succeeded, reboot the storage system to activate the new version.
4. Optionally, you can click Restore to restore to previous version.
You can only restore to the last upgraded version.
3.3.6 Strategy
Purpose:
By setting array and disk check strategy, the storage system automatically check array and disk according to
configuration.
Steps:
1. Select Add strategy in Common menu to pop up Add strategy interface.
Figure 3. 19 Add Strategy
2. Choose Type as RAID verification or Disk check. Type is chosen as RAID verification.
1) Select Verify mode as Check or Require.
Check: Check whether the data bit and parity data in array match or not.
21
Require: Repair the data bit and parity data mismatch issue.
2) Select Array you want to verify. Type is chosen as Disk check.
Select check mode as All or Check.
All: Check all disk blocks. It takes longer time than quick check. Quick: Check parts of all disk blocks. It takes shorter time than all check.
3. Enter strategy Name in the text field.
Only letters (a to z and A to Z), numbers (0 to 9), and underline (_) are allowed.
4. Choose detection Cycle unit as Week, Year, Month, or Once in dropdown list and enter quantity in the text
field.
5. Choose Start time and End time.
6. Click OK to save the strategy. Added strategy is listed in the list.
3.4 Graphical Display
Purpose:
The storage system provides a graph to show the front view status and a pie chart to show the storage
information.
Step:
Click Maintenance in navigation bar and choose Graphical Display to enter Graphical Display interface.
Figure 3. 20 Graphical Display
3.4.1 Front View
Purpose:
Front view can show you the disk status.
Steps:
1. Click Front View in Graphical Display menu to show front view.
22
Table 3. 2 Indicator Status Description
Indicator
Color
Description
Top indicator Unlit
Disk doesnt exist.
Green
Disk is connected and recognized.
Bottom indicator
Green
Disk is normal.
Blue
Reading and writing normally.
Red
Disk is rebuilding.
2. Positioning the pointer in a green indicator slot. Then the message dialog appears.
Figure 3. 21 Disk Information
3. Click Overview to view all disks information.
Figure 3. 22 Disk Overview
4. Optionally, click Refresh in top-right corner to update the front view.
3.4.2 Pie Chart
Purpose:
Pie chart shows the free size of all storage modules, including system, LUN, snapshot, CVR, iSCSI, and FC.
Steps:
1. Click Pie Chart in Graphical Display to enter Pie Chart interface.
2. Positioning the pointer in the part you want to view. Free size and free size Percentage appear in a dialog.
3. Optionally, click Refresh in top-right corner to update the information.
23
Figure 3. 23 Pie Chart
3.5 Control Message
Purpose:
Control Message shows the fans information, modules temperature, fan control panel version, and chassis
power.
Steps:
1. Click Maintenance in navigation bar and choose Control Message to enter Control Message interface. Fan
RPM (Revolutions per Minute), temperature, and other information are shown.
You can install or uninstall fans. Up to 6 fans formation can be connected.
Figure 3. 24 Host
2. Click Mute in top-right corner to turn off system audible warning.
3. To find out which controller is working, click Position in top-right corner and click OK in popup dialog. The
FN indicator of working controller would light up and flash for 10 minutes.
4. Set fan speed.
1) Click Set fan speed in top-right corner to pop up dialog box.
24
Figure 3. 25 Fan Speed
2) Choose speed as Low speed, Medium speed, or High speed in dropdown list.
3) Click OK to save the settings.
25
Chapter 4 Storage Management
Purpose:
Storage management provides configuration including disk, array, storage pool, LUN (logical Volume), and storage
settings.
Table 4. 1 Module Description
Module
Description
Disk
You can:
View disks information and status. Rescan, positioning, initialize, and check disks.
Array
You can:
Create arrays. Add hot spare. View array and hot spare information. Delete array and hot spare.
Storage pool
You can:
Add, delete, and positioning storage pools. Remove and positioning disks. View system total and free capacity.
LUN (Logical volume)
You can
Add and delete LUNs. Rename, expand, clone, and snapshot LUNs.
Settings
You can:
Set array synchronization speed. Set array synchronization type. Set flicking frequency for disk positioning indicator.
Key words:
Disk, Array, Storage Pool, LUN (Logical Volume), Settings
Figure 4. 2 Storage
26
4.1 Managing Local Disk
Purpose:
You can view the disk information here, including disk location, supplier, model, size, status, and belonging group.
Step:
Click Storage in navigation bar and choose Disk to enter Disk interface.
Figure 4. 3 Disk
4.1.1 Viewing Disk Status
Purpose:
You can view status of one disk or all disks.
4.1.1.1 One Disk
Steps:
1. In the Disk information list, Click Details of a disk. Disk state dialog appears.
2. Click SMART to view the disk’s SMART detection information.
Figure 4. 4 Details
4.1.1.2 All Disks
Steps:
1. Click Disk state in the top-right corner. The following dialog appears.
2. Click SMART of a disk to view its SMART detection information.
27
Figure 4. 5 Disk Status
There are totally 6 kinds of status for a disk.
Table 4. 2 Disk Status Description
Status
Description
Normal
Disk works normally.
Undetected
Disk hasnt gone through disk check in a storage system.
Lost
Disk is unrecognized.
Risky
Exception occurs during disk detection. But it can still work.
Bad
Disk is kicked out by an array.
Warning
Disk read and writing speed is higher than 10 MB/S during pressure test.
4.1.2 Rescanning Disk
Step:
If detecting a newly installed disk failed, click Rescan to find the disk. If a disk is uninstalled from the storage system, click Rescan to remove it from the Disk interface.
Rescanning disks may resulted in disks status appearing as Unknown. Fresh the interface or click Rescan again to
solve the problem.
4.1.3 Positioning Disk
Purpose:
Disk bottom indicator flickers after enabling the function. It enables you to find a certain disk more easily.
Before you start:
Set the flashing time first. For details, refer to 4.5.2 Flashing Time.
Steps:
1. Check the checkbox of disk you want to find.
2. Click Position and click OK in popup dialog box. Then disk indicator keeps flickering in red for the set
flashing time.
28
4.1.4 Disk Initialization
Purpose:
To recover a disk when its status is uninitialized or when it is kicked out by an array, you can initialize it.
Steps:
1. Check the checkbox of disk you want to initialize.
2. Click Initialize and click OK in popup dialog box to start initializing.
4.1.5 Disk Check
Purpose:
To recognize a disk which is added to a storage system for the first time, check it.
Steps:
1. Check the checkboxes of disks you want to check.
2. Click Check to pop up Disk check interface.
Figure 4. 6 Disk Check
3. Select the Check style as Quick Check or Full Check.
Quick Check: Check parts of all disk blocks. It takes shorter time than Full Check. Full Check: Check all disk blocks. It takes longer time than Quick Check.
It is recommended to operate full check when system is under low pressure. You are recommended to operate full check for the first use disk. To keep data safe, check a disk every 3 months.
4. Click Start to start checking. The selected check type, check progress, and checked time are listed in the top
part of the interface.
5. Optionally, click Refresh to update the check status, check process and checked time.
Or you can click Stop to end all disks check.
29
There are 3 kinds of check status: Unsubmitted, Checking, and Completed.
Table 4. 3 Check Status Description
Check Status
Description
Unsubmitted
Disk check hasnt been submitted.
Checking
Disk is being checked.
Waiting
Another disk is being checked. You need to wait till the check is finished.
4.2 Array
Purpose:
You can create and manage array.
Step:
Click Storage in navigation bar and choose Array to enter Array interface.
Figure 4. 7 Array
4.2.1 Creating Array
Purpose:
You can use available disks to create array.
Steps:
1. Click Create to enter Create array interface.
Loading...
+ 79 hidden pages