HP StoreVirtual 4000, LeftHand Storage User Manual

HP LeftHand Storage User Guide
Abstract
This guide provides instructions for configuring individual storage systems, as well as for creating storage clusters, volumes, snapshots, and remote copies.
HP Part Number: AX696-96202 Published: November 2012 Edition: 8
© Copyright 2009, 2012 Hewlett-Packard Development Company, L.P.
Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license.
The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Acknowledgements
Microsoft, Windows, Windows XP, and Windows NT are U.S. registered trademarks of Microsoft Corporation.
Contents
1 Getting started.........................................................................................14
Creating storage with HP LeftHand Storage................................................................................14
Configuring storage systems.....................................................................................................15
Creating a storage volume using the Management Groups, Clusters, and Volumes wizard...............15
Enabling server access to volumes............................................................................................16
Using the Map View...............................................................................................................17
Using the display tools.......................................................................................................17
Using views and layouts......................................................................................................17
Setting preferences.................................................................................................................18
Setting the font size and locale............................................................................................18
Setting naming conventions.................................................................................................18
Changing naming conventions........................................................................................18
Troubleshooting......................................................................................................................19
Storage systems not found...................................................................................................19
Configuring remote support for HP LeftHand Storage...................................................................19
2 Working with storage systems....................................................................21
Identifying the storage system hardware.....................................................................................21
Storage system tasks...............................................................................................................22
Logging in to and out of storage systems ..............................................................................22
Logging out of a storage system .....................................................................................22
Changing the storage system hostname................................................................................22
Locating the storage system in a rack....................................................................................22
Powering off or rebooting the storage system .............................................................................23
Powering on or off, or rebooting storage systems with modular components...............................23
Rebooting the storage system...............................................................................................24
Powering off the storage system...........................................................................................24
Upgrading SAN/iQ on storage systems....................................................................................25
Registering advanced features for a storage system ....................................................................25
Determining volume and snapshot availability ...........................................................................25
Checking status of dedicated boot devices ................................................................................26
Checking boot device status................................................................................................26
Getting there................................................................................................................26
Replacing a dedicated boot device......................................................................................27
3 Configuring RAID and Managing Disks.......................................................28
Getting there..........................................................................................................................28
Configuring and managing RAID..............................................................................................28
RAID Levels............................................................................................................................28
Explaining RAID devices in the RAID setup report.......................................................................29
RAID devices by RAID type.................................................................................................30
Virtual RAID devices......................................................................................................30
Planning the RAID configuration...............................................................................................30
Data protection..................................................................................................................30
Using RAID for data redundancy.....................................................................................30
Using Network RAID in a cluster.....................................................................................31
Using disk RAID with Network RAID in a cluster.....................................................................31
Mixing RAID configurations.................................................................................................32
Setting RAID rebuild rate.........................................................................................................32
General guidelines for setting the RAID rebuild rate................................................................32
Setting the RAID rebuild rate...............................................................................................32
Reconfiguring RAID.................................................................................................................33
Contents 3
To reconfigure RAID...........................................................................................................33
Configuring RAID for a P4800 G2 with 2 TB drives................................................................33
Monitoring RAID status............................................................................................................34
Data reads and writes and RAID status.................................................................................34
Data redundancy and RAID status........................................................................................34
Managing disks.....................................................................................................................35
Getting there.....................................................................................................................35
Reading the disk report on the Disk Setup tab........................................................................35
Verifying disk status............................................................................................................37
Viewing disk status for the VSA.......................................................................................37
Viewing disk status for the HP P4500 G2.........................................................................37
Viewing disk status for the HP P4300 G2.........................................................................38
Viewing disk status for the P4800 G2..............................................................................39
Viewing disk status for the HP P4900 G2 ........................................................................39
Viewing disk status for the HP LeftHand 4130....................................................................40
Viewing disk status for the HP LeftHand 4330...................................................................41
Replacing a disk.....................................................................................................................41
Using Repair Storage System...............................................................................................42
Replacing disks in hot-swap storage systems..........................................................................42
Preparing for a disk replacement.........................................................................................42
Replacing a disk in a hot-swap storage system ......................................................................43
4 Managing the network..............................................................................45
Network best practices............................................................................................................45
Changing network configurations.............................................................................................46
Managing settings on network interfaces...................................................................................46
TCP status tab....................................................................................................................46
Changing speed and duplex settings....................................................................................47
Changing NIC frame size...................................................................................................48
Jumbo frames...............................................................................................................48
Editing the NIC frame size..............................................................................................49
Changing NIC flow control.................................................................................................49
The TCP/IP tab.......................................................................................................................50
Identifying the network interfaces.........................................................................................50
Pinging an IP address.........................................................................................................50
To ping an IP address....................................................................................................50
Configuring the IP address manually.........................................................................................51
Using DHCP..........................................................................................................................51
Configuring network interface bonds.........................................................................................51
Bonding with 10 GbE interfaces..........................................................................................52
Supported bonds with 10 GbE........................................................................................53
Unsupported bonds with 10 GbE....................................................................................53
IP address for NIC bonds....................................................................................................53
NIC bonding and speed, duplex, frame size, and flow control settings......................................53
How Active-Passive bonding works.......................................................................................54
Physical and logical interfaces........................................................................................54
Which physical interface is preferred...............................................................................55
Summary of NIC status during failover.............................................................................55
Example network cabling topologies with Active-Passive.....................................................56
How link aggregation dynamic mode bonding works.............................................................57
Which physical interface is preferred...............................................................................57
Which physical interface is active....................................................................................58
Summary of NIC states during failover.............................................................................58
Example network cabling topologies with link aggregation dynamic mode...........................58
How Adaptive Load Balancing works ..................................................................................59
4 Contents
Which physical interface is preferred...............................................................................59
Which physical interface is active....................................................................................59
Summary of NIC states during failover.............................................................................60
Example network cabling topologies with Adaptive Load Balancing ....................................60
Creating a NIC bond.........................................................................................................61
Creating the bond.........................................................................................................62
Verify communication setting for new bond.......................................................................63
Viewing the status of a NIC bond........................................................................................64
Deleting a NIC bond..........................................................................................................65
Disabling a network interface...................................................................................................67
Configuring a disabled interface..........................................................................................68
Using a DNS server................................................................................................................68
Editing DNS settings...........................................................................................................68
Setting up routing...................................................................................................................69
Adding routing information.................................................................................................69
Editing routing information..................................................................................................69
Deleting routing information................................................................................................70
Configuring storage system communication................................................................................70
Selecting the interface used by the SAN/iQ software ............................................................70
Updating the list of manager IP addresses.............................................................................71
Fibre Channel .......................................................................................................................72
5 Setting the date and time..........................................................................73
Management group time.........................................................................................................73
Getting there..........................................................................................................................73
Refreshing the management group time.....................................................................................73
Using NTP.............................................................................................................................73
Editing NTP servers............................................................................................................74
Deleting an NTP server.......................................................................................................74
Delete an NTP server.....................................................................................................74
Changing the order of NTP servers .....................................................................................74
Editing the date and time.........................................................................................................75
Editing the time zone only........................................................................................................75
6 Managing authentication..........................................................................76
Managing administrative users.................................................................................................76
Adding an administrative user.............................................................................................76
Editing administrative users.................................................................................................76
Changing a user’s description.........................................................................................76
Changing a user’s password..........................................................................................76
Adding group membership to a user................................................................................76
Removing group membership from a user.........................................................................76
Deleting an administrative user.......................................................................................77
Managing administrative groups..............................................................................................77
Default administrative groups...............................................................................................77
Adding administrative groups.........................................................................................78
Editing administrative groups...............................................................................................78
Changing the group description......................................................................................78
Changing administrative group permissions......................................................................78
Adding users to an existing group...................................................................................78
Removing users from a group..........................................................................................78
Deleting administrative groups........................................................................................78
Using Active Directory for external authentication........................................................................79
Configuring external authentication......................................................................................80
Associating the Active Directory group with the SAN/iQ group................................................80
Removing the Active Directory configuration..........................................................................81
Contents 5
7 Monitoring the SAN.................................................................................82
Monitoring SAN status............................................................................................................82
Customizing the SAN Status Page .......................................................................................83
Using the SAN Status Page.................................................................................................84
Alarms and events overview.....................................................................................................84
Working with alarms...............................................................................................................86
Filtering the alarms list........................................................................................................86
Viewing and copying alarm details......................................................................................87
Viewing alarms in a separate window..................................................................................87
Exporting alarm data to a .csv file.......................................................................................87
Configuring events..................................................................................................................87
Changing the event retention period.....................................................................................87
Configuring remote log destinations.....................................................................................88
Viewing events in a separate window...................................................................................88
Working with events...............................................................................................................88
Viewing new events............................................................................................................88
Filtering the events list.........................................................................................................88
Saving filter views.........................................................................................................89
Deleting custom filters....................................................................................................89
Viewing event details..........................................................................................................89
Copying events to the clipboard...........................................................................................90
Exporting event data to a .csv or .txt file...............................................................................90
Configuring email notification..................................................................................................90
Configuring the email server................................................................................................90
Configuring email recipients................................................................................................91
Configuring SNMP.................................................................................................................91
Enabling SNMP agents.......................................................................................................92
Enabling the SNMP agent..............................................................................................92
Configuring access control for SNMP clients.....................................................................92
Adding an SNMP client............................................................................................92
Editing access control entries......................................................................................93
Deleting access control entries....................................................................................93
Disabling the SNMP agent.............................................................................................93
Disabling SNMP......................................................................................................93
Adding SNMP traps...........................................................................................................93
Using the SNMP MIBs........................................................................................................95
Troubleshooting SNMP.......................................................................................................96
Running diagnostic reports.......................................................................................................96
Generating a hardware information report.................................................................................97
Using log files......................................................................................................................100
Saving log files locally......................................................................................................100
Configuring a remote log and remote log destination...........................................................100
Editing remote log targets.................................................................................................100
Deleting remote logs........................................................................................................101
Exporting the management group support bundle.....................................................................101
Exporting the storage system support bundle............................................................................101
Exporting the System Summary...............................................................................................102
8 Working with management groups...........................................................103
Functions of management groups............................................................................................103
Planning management groups................................................................................................103
Creating a management group..............................................................................................104
Name the management group and add storage systems.......................................................104
Add administrative user....................................................................................................105
Set management group time..............................................................................................105
6 Contents
Set DNS server................................................................................................................105
Set up email for notification...............................................................................................105
Create cluster and assign a VIP.........................................................................................105
Create a volume and finish creating management group.......................................................106
Management group map view tab.....................................................................................106
Logging in to a management group ...................................................................................106
Configuration Summary overview...........................................................................................106
Reading the configuration summary....................................................................................107
Optimal configurations................................................................................................107
Configuration warnings................................................................................................107
Configuration errors.....................................................................................................108
Configuration guidance....................................................................................................108
Best Practice summary overview..............................................................................................109
Disk level data protection..................................................................................................110
Disk protection using RAID...........................................................................................110
Large single-system SATA cluster....................................................................................110
Disk RAID Consistency.................................................................................................110
Cluster-level data protection...............................................................................................110
Volume-level data protection..............................................................................................111
Volume access.................................................................................................................111
Systems running managers................................................................................................111
Network bonding............................................................................................................111
Network bond consistency................................................................................................111
Network flow control consistency.......................................................................................111
Network frame size consistency.........................................................................................111
Management group maintenance tasks...................................................................................111
Logging in to a management group....................................................................................111
Choosing which storage system to log in to.....................................................................112
Logging out of a management group..................................................................................112
Adding a storage system to an existing management group...................................................112
Starting and stopping managers........................................................................................112
Starting additional managers........................................................................................112
Stopping managers.....................................................................................................113
Implications of stopping managers............................................................................113
Editing a management group............................................................................................113
Setting or changing the local bandwidth priority.............................................................113
Saving the management group configuration information......................................................114
Shutting down a management group.......................................................................................114
If volumes are still connected to servers or hosts...................................................................114
Restarting the management group......................................................................................115
Restarted management group in maintenance mode........................................................115
Manually changing the management group to normal mode.............................................115
Removing a storage system from a management group..............................................................116
Deleting a management group...............................................................................................116
9 Working with managers and quorum........................................................118
Managers overview..............................................................................................................118
Best practice for managers in a management group.............................................................118
Managers and quorum.....................................................................................................119
Regular managers and specialized managers......................................................................120
Failover Managers......................................................................................................120
Virtual Managers........................................................................................................120
Using the Failover Manager...................................................................................................121
Planning the virtual network configuration...........................................................................121
Using the Failover Manager on Microsoft Hyper-V Server......................................................121
Contents 7
Installing the Failover Manager for Hyper-V Server...........................................................122
Uninstalling the Failover Manager from Hyper-V Server....................................................122
Using the Failover Manager for VMware vSphere................................................................123
Installing the Failover Manager for VMware vSphere.......................................................123
Installing the Failover Manager for other VMware platforms..............................................124
Configuring the IP address and host name.................................................................124
Installing the Failover Manager using the OVF files with the VI Client.................................125
Configure the IP address and host name....................................................................125
Finishing up with VI Client.......................................................................................125
Troubleshooting the Failover Manager on VMware vSphere..............................................125
Uninstalling the Failover Manager from VMware vSphere.................................................126
Using a virtual manager........................................................................................................126
Requirements for using a virtual manager............................................................................127
Adding a virtual manager.................................................................................................128
Starting a virtual manager to regain quorum.......................................................................129
Verifying virtual manager status.........................................................................................130
Stopping a virtual manager...............................................................................................130
Removing a virtual manager from a management group.......................................................131
10 Working with clusters............................................................................132
Clusters and storage systems..................................................................................................132
Creating a cluster.................................................................................................................132
Cluster Map View............................................................................................................133
Monitoring cluster usage.......................................................................................................133
Editing a cluster....................................................................................................................133
Editing cluster properties...................................................................................................133
Editing iSNS servers.........................................................................................................133
Editing cluster VIP addresses..............................................................................................134
Reconnecting volumes and applications after changing VIPs or iSNS servers............................134
Maintaining storage systems in clusters....................................................................................135
Adding a storage system to a cluster..................................................................................135
Upgrading the storage systems in a cluster using cluster swap................................................135
Reordering storage systems in a cluster...............................................................................136
Exchange a storage system in a cluster...............................................................................136
Removing a storage system from a cluster............................................................................136
Troubleshooting a cluster.......................................................................................................137
Auto Performance Protection..............................................................................................137
Auto Performance Protection and the VSA.......................................................................137
Auto Performance Protection and other clusters................................................................137
Repairing a storage system................................................................................................138
Deleting a cluster..................................................................................................................139
11 Provisioning storage..............................................................................141
Understanding how the capacity of the SAN is used.................................................................141
Provisioning storage..............................................................................................................141
Provisioning volumes.............................................................................................................141
Full provisioning...............................................................................................................142
Thin provisioning.............................................................................................................142
Best practice for setting volume size...............................................................................142
Planning data protection...................................................................................................142
Former terminology in release 8.1 and earlier.................................................................142
Data protection level....................................................................................................143
How data protection levels work...................................................................................144
Network RAID-10 (2–Way Mirror).............................................................................144
Network RAID-10+1 (3-Way Mirror)..........................................................................144
Network RAID-10+2 (4-Way Mirror)..........................................................................145
8 Contents
Network RAID-5 (Single Parity).................................................................................145
Network RAID-6 (Dual Parity)...................................................................................146
Provisioning snapshots...........................................................................................................147
Snapshots versus backups.................................................................................................147
The effect of snapshots on cluster space..............................................................................147
Managing capacity using volume size and snapshots...........................................................148
Volume size and snapshots...........................................................................................148
Schedules to snapshot a volume and capacity.................................................................148
Deleting snapshots......................................................................................................148
Ongoing capacity management.............................................................................................148
Number of volumes and snapshots.....................................................................................148
Reviewing SAN capacity and usage...................................................................................148
Cluster use summary....................................................................................................149
Volume use summary...................................................................................................150
System Use summary...................................................................................................151
Measuring disk capacity and volume size...........................................................................152
Block systems and file systems.......................................................................................152
Storing file system data on a block system......................................................................152
Changing the volume size on the server..............................................................................153
Increasing the volume size in Microsoft Windows............................................................153
Increasing the volume size in other environments.............................................................153
Changing configuration characteristics to manage space......................................................154
12 Using volumes......................................................................................155
Volumes and server access....................................................................................................155
Prerequisites....................................................................................................................155
Planning volumes..................................................................................................................155
Characteristics of volumes......................................................................................................156
Creating a volume................................................................................................................157
Viewing the volume map.......................................................................................................158
Editing a volume..................................................................................................................158
To edit a volume..............................................................................................................159
Deleting a volume.................................................................................................................160
To delete the volume........................................................................................................161
13 Using snapshots....................................................................................162
Types of snapshots................................................................................................................162
Uses and best practices for snapshots.................................................................................162
Planning snapshots...............................................................................................................163
Prerequisites for application-managed snapshots..................................................................164
Creating snapshots...............................................................................................................165
Editing a snapshot...........................................................................................................166
Scheduling snapshots............................................................................................................166
Best practices for scheduling snapshots of volumes...............................................................166
Requirements for snapshot schedules..................................................................................167
Scheduling snapshots for volume sets..................................................................................167
Creating a schedule to snapshot a volume..........................................................................168
Editing scheduled snapshots.........................................................................................169
Pausing and resuming scheduled snapshots....................................................................169
Deleting schedules to snapshot a volume........................................................................170
Scripting snapshots......................................................................................................170
Mounting a snapshot............................................................................................................170
Mounting the snapshot on a host.......................................................................................170
Making a Windows application-managed snapshot available...............................................171
Managing snapshot temporary space.................................................................................173
Convert the temporary space to access data...................................................................173
Contents 9
Delete the temporary space..........................................................................................173
Rolling back a volume to a snapshot or clone point...................................................................174
Rolling back a volume to a snapshot or clone point..............................................................174
Continue with standard roll back...................................................................................175
Create a new SmartClone volume from the snapshot........................................................175
Roll back all associated volumes....................................................................................176
Cancel the rollback operation.......................................................................................177
Deleting a snapshot..............................................................................................................177
14 SmartClone volumes..............................................................................178
What are SmartClone volumes?.............................................................................................178
Prerequisites....................................................................................................................178
SmartClone volume terminology.........................................................................................178
Example scenarios for using SmartClone volumes.................................................................179
Deploy multiple virtual or boot-from-SAN servers.............................................................179
Scenario: Computer training lab...............................................................................179
Safely use production data for test, development, and data mining....................................180
Test and development.............................................................................................180
Data mining..........................................................................................................180
Clone a volume..........................................................................................................180
Planning SmartClone volumes................................................................................................180
Space requirements..........................................................................................................180
Naming convention for SmartClone volumes........................................................................181
Naming and multiple identical disks in a server..............................................................181
Server access..................................................................................................................181
Defining SmartClone volume characteristics..............................................................................181
Naming SmartClone volumes.................................................................................................182
Shared versus individual characteristics...................................................................................183
Clone point..........................................................................................................................185
Shared snapshot ..................................................................................................................187
Creating SmartClone volumes................................................................................................189
To create a SmartClone volume..............................................................................................189
Viewing SmartClone volumes.................................................................................................190
Map view.......................................................................................................................190
Using views................................................................................................................191
Viewing clone points, volumes, and snapshots................................................................192
Editing SmartClone volumes...................................................................................................193
To edit the SmartClone volumes.........................................................................................194
Deleting SmartClone volumes.................................................................................................194
Deleting the clone point ...................................................................................................194
Deleting multiple SmartClone volumes................................................................................195
15 Working with scripting..........................................................................196
Documentation.....................................................................................................................196
16 Controlling server access to volumes........................................................197
Planning server connections to management groups..................................................................198
Planning iSCSI server connections to management groups.....................................................198
Adding an iSCSI server connection....................................................................................199
Editing an iSCSI server connection.....................................................................................199
Deleting an iSCSI server connection...................................................................................200
Completing the iSCSI Initiator and disk setup...........................................................................200
Persistent targets or favorite targets.....................................................................................200
HP LeftHand DSM for Microsoft MPIO settings.....................................................................200
Disk management............................................................................................................200
Planning Fibre Channel server connections to management groups.............................................201
10 Contents
Adding a Fibre Channel server connection..........................................................................201
Manually configuring a Fibre Channel initiator....................................................................201
Deleting a manually configured Fibre Channel initiator....................................................202
Editing a Fibre Channel server connection...........................................................................202
Deleting a Fibre Channel server connection.........................................................................202
Completing the Fibre Channel setup...................................................................................202
Clustering server connections.................................................................................................203
Requirements for clustering servers.....................................................................................203
Creating a server cluster...................................................................................................203
Viewing the relationship between storage systems, volumes, and servers.................................204
Editing a server cluster......................................................................................................204
Deleting a server cluster....................................................................................................204
Assigning iSCSI server connections access to volumes...............................................................205
Assigning server iSCSI connections from a volume................................................................206
Assigning volumes from an iSCSI connection.......................................................................206
Assigning volumes to Fibre Channel servers.............................................................................206
Assigning Fibre Channel servers from a volume....................................................................207
Assigning volumes from a Fibre Channel server...................................................................207
Assigning a boot volume to a Fibre Channel server..............................................................207
Editing server connection and volume assignments....................................................................207
17 Monitoring performance .......................................................................209
Prerequisites.........................................................................................................................209
Introduction to using performance information..........................................................................209
What can I learn about my SAN?......................................................................................209
Current SAN activities example.....................................................................................210
Workload characterization example..............................................................................210
Fault isolation example.....................................................................................................210
What can I learn about my volumes?......................................................................................211
Most active volumes examples...........................................................................................211
Activity generated by a specific server example...................................................................212
Planning for SAN improvements.............................................................................................212
Network utilization to determine if NIC bonding could improve performance example..............212
Load comparison of two clusters example............................................................................213
Load comparison of two volumes example...........................................................................213
Accessing and understanding the Performance Monitor window.................................................214
Performance Monitor toolbar.............................................................................................215
Performance monitor graph...............................................................................................215
Performance monitor table................................................................................................216
Understanding the performance statistics.............................................................................217
Monitoring and comparing multiple clusters.............................................................................219
Performance monitoring and analysis concepts.........................................................................219
Workloads......................................................................................................................219
Access type.....................................................................................................................219
Access size.....................................................................................................................220
Access pattern.................................................................................................................220
Queue depth...................................................................................................................220
Changing the sample interval and time zone............................................................................220
Adding statistics...................................................................................................................220
Viewing statistic details.....................................................................................................221
Removing and clearing statistics.............................................................................................222
Removing a statistic..........................................................................................................222
Clearing the sample data..................................................................................................222
Clearing the display.........................................................................................................222
Resetting defaults.............................................................................................................222
Contents 11
Pausing and restarting monitoring...........................................................................................222
Changing the graph.............................................................................................................223
Hiding and showing the graph..........................................................................................223
Displaying or hiding a line................................................................................................223
Changing the color or style of a line..................................................................................223
Highlighting a line...........................................................................................................223
Changing the scaling factor..............................................................................................224
Exporting data.....................................................................................................................224
Exporting statistics to a CSV file.........................................................................................224
Saving the graph to an image file......................................................................................225
18 Registering advanced features................................................................226
Evaluation period for using advanced features..........................................................................226
Starting the evaluation period............................................................................................226
Backing out of Remote Copy evaluation..............................................................................227
Scripting evaluation..............................................................................................................227
Turn on scripting evaluation...............................................................................................227
Turn off scripting evaluation...............................................................................................228
Registering advanced features................................................................................................228
Using license keys............................................................................................................228
Registering available storage systems for license keys...........................................................228
Registering storage systems in a management group.............................................................229
Saving and editing your customer information..........................................................................231
19 HP LeftHand Storage using iSCSI and Fibre Channel.................................233
iSCSI and HP LeftHand Storage..............................................................................................233
Number of iSCSI sessions.................................................................................................233
VIPs...............................................................................................................................233
iSNS server.....................................................................................................................233
iSCSI load balancing.......................................................................................................233
Authentication (CHAP)......................................................................................................234
iSCSI and CHAP terminology............................................................................................235
Example iSCSI configurations........................................................................................235
Use the HP LeftHand DSM for Microsoft MPIO.....................................................................237
Fibre Channel and HP LeftHand Storage..................................................................................237
Creating Fibre Channel connectivity...................................................................................238
Zoning.......................................................................................................................238
Using MPIO with Fibre Channel.........................................................................................238
Adding the MPIO Device Hardware ID..........................................................................238
20 Using the Configuration Interface............................................................239
Connecting to the Configuration Interface................................................................................239
Establishing a terminal emulation session on a Windows system.............................................239
Establishing a terminal emulation session on a Linux/UNIX system..........................................239
Opening the Configuration Interface from the terminal emulation session.................................240
Logging in to the Configuration Interface.................................................................................240
Configuring administrative users.............................................................................................240
Configuring a network connection..........................................................................................240
Deleting a NIC bond............................................................................................................241
Setting the TCP speed, duplex, and frame size..........................................................................241
Removing a storage system from a management group..............................................................242
Resetting the storage system to factory defaults.........................................................................242
21 Replacing hardware..............................................................................243
Replacing disks and rebuilding data.......................................................................................243
Replacing disks...............................................................................................................243
Verify the storage system is not running a manager..........................................................244
12 Contents
Repair the storage system.............................................................................................244
Rebuilding data...............................................................................................................245
Reconfigure RAID........................................................................................................245
Returning the storage system to the cluster...........................................................................246
Restarting a manager..................................................................................................246
Adding the repaired storage system to cluster.................................................................247
Rebuilding volume data....................................................................................................247
Controlling server access..............................................................................................247
Removing the ghost storage system.....................................................................................248
Returning the failed disk...............................................................................................248
Replacing the RAID controller.................................................................................................248
Verifying component failure...............................................................................................248
Removing the RAID controller............................................................................................250
Installing the RAID controller..............................................................................................253
Verifying proper operation................................................................................................254
22 SAN/iQ TCP and UDP port usage..........................................................255
23 Third-party licenses...............................................................................258
24 Support and other resources..................................................................259
Contacting HP......................................................................................................................259
Subscription service..........................................................................................................259
Rack stability........................................................................................................................259
Customer self repair..............................................................................................................259
HP Insight Remote Support Software........................................................................................259
Related information...............................................................................................................260
HP websites....................................................................................................................260
25 Documentation feedback.......................................................................261
Glossary..................................................................................................262
Index.......................................................................................................268
Contents 13
1 Getting started
HP LeftHand Storage enables you to create a virtualized pool of storage resources and manage a SAN. The SAN/iQ operating system is installed on the HP LeftHand Storage and you use the HP LeftHand Centralized Management Console (CMC) to manage the storage. For a list of supported software and hardware, see the HP LeftHand 4000 Storage Compatibility Matrix at
http://www.hp.com/go/LeftHandcompatibility
Creating storage with HP LeftHand Storage
HP LeftHand Storage supports both iSCSI and Fibre Channel storage networks. Using the wizard on the Getting Started Launch Pad, work through these steps to create a management group, cluster and volume.
The following sections provide an overview of the steps required to set up and configure your storage.
Creating iSCSI storage
1. Install storage systems on network, assign IPs and change the hostname using the Configuration
Interface. (See “Using the Configuration Interface” (page 239).)
2. Install an iSCSI Initiator on the application server.
3. Create a new management group or add storage systems to existing management group.
(See “Creating a storage volume using the Management Groups, Clusters, and Volumes
wizard” (page 15).)
4. Create an iSCSI server in CMC. (See “Enabling server access to volumes” (page 16))
5. Assign volumes to the iSCSI server. (See “Planning server connections to management groups”
(page 198).)
6. Discover targets in the iSCSI Initiator.
7. Finish creating storage as necessary, for example, initialize and partition disks in Microsoft
Windows.
Creating Fibre Channel storage
1. Install FC-enabled storage systems on network and fibre channel fabric, assign IPs and change
the hostname using the Configuration Interface. (See “Using the Configuration Interface” (page
239).)
IMPORTANT: Do not zone storage systems until they have been put into a management
group.
2. Ensure your initiator HBA driver is loaded and logged in to the Fibre Channel switches.
3. Ensure that appropriate MPIO support is loaded. For example, Microsoft Windows 2008 R2
or Windows 2012 uses the MS MPIO feature, configured for LEFTHANDP4000 disk
4. Configure storage systems by configuring 10 GbE NICs and appropriate bonding and SNMP.
Change RAID if desired.
5. Create a new management group with two or more FC–enabled storage systems. (See
“Creating a storage volume using the Management Groups, Clusters, and Volumes wizard” (page 15).)
NOTE: Adding two or more FC–enabled storage systems to an existing management group
creates FC connectivity.
6. Optional: Configure zoning on the fibre channel switches. Zone the switch connections using
either the port numbers or the WWNNs of the storage systems. Port-based zoning is
14 Getting started
recommended as the WWNNs based on the management group may change. (See the HP SAN Design Reference Guide.)
7. Create a Fibre Channel server in the CMC. (See “Planning Fibre Channel server connections
to management groups” (page 201))
8. Assign LUNs to the Fibre Channel server. (See “Assigning volumes to Fibre Channel servers”
(page 206).)
9. Discover the LUNs in the OS.
Configuring storage systems
All systems, including Failover Managers, that have not been added to a management group appear in the list of Available Systems in the navigation window. If you plan to use multiple storage systems, they must all be configured before you use them for clustered storage.
The most important categories to configure are:
RAID—The storage system is shipped with RAID already configured and operational. Find
instructions for changing RAID, and for ensuring that drives in the storage system are properly configured and operating in “Configuring RAID and Managing Disks” (page 28).
Network—Bond the NIC interfaces and set the frame size, NIC flow control, and speed and
duplex settings. Read detailed network configuration instructions in “Managing the network”
(page 45).
IMPORTANT: The network settings must be the same for the switches, clients, and storage
systems. Set up the end-to-end network before creating storage volumes.
1. From the navigation window, select a storage system in the Available Systems pool.
2. Open the tree underneath the storage system.
3. In the list of configuration categories, select the Storage category.
4. Select the RAID Setup tab and verify the RAID settings or change the RAID level.
5. In the list of configuration categories, select the Network category and configure the network
settings.
Creating a storage volume using the Management Groups, Clusters, and Volumes wizard
Select Getting Started in the navigation window to access the Getting Started Launch Pad. Select Management Groups, Clusters, and Volumes Wizard to create storage volumes.
The wizard takes you through creating the tasks of creating a management group, a cluster, and a storage volume. This storage hierarchy is depicted in Figure 1 (page 16).
Configuring storage systems 15
Figure 1 The SAN/iQ software storage hierarchy
1. Management group
2. Cluster
3. Volume
To complete this wizard, you will need the following information:
A name for the management group.
A storage system discovered on the network and then configured for RAID and the Network
settings
DNS domain name, suffix, and server IP address for email event notification
IP address or hostname and port of your email (SMTP) server for event notification
A name for the cluster
Virtual IP address to use for the cluster
A name for the volume
The size of the volume
NOTE: Names of management groups, clusters, volumes, and snapshots cannot be changed in
the future without deleting the management group.
Enabling server access to volumes
Create a server or server cluster to connect application servers to volumes. To create a server or server cluster, you must first have created a management group, a cluster, and at least one volume. You should also plan the following:
The application servers that need access to volumes.
The iSCSI initiator you plan to use. You need the server’s initiator name, and CHAP information
if you plan to use CHAP.
For Fibre Channel access, have two Fibre Channel-enabled storage systems in the management
group.
See “Controlling server access to volumes” (page 197) for more information.
16 Getting started
Using the Map View
The Map View tab is available for viewing the relationships between management groups, servers, sites, clusters, volumes and snapshots. When you log in to a management group, there is a Map View tab for each of those elements in the management group. For example, when you want to make changes such as moving a volume to a different cluster, or deleting shared snapshots, the Map View allows you to easily identify how many snapshots and volumes are affected by such changes.
The Map View pane contains display tools to control and manipulate the view. The display tools are available from the Map View Tasks menu or from the tool bar across the top of the pane. The tools function the same from either the tool bar or the Map View tasks menu.
Using the display tools
Use these tools, described in Table 1 (page 17), to select specific areas of the map to view, zoom in on, rotate, and move around the window. If you have a complex configuration, use the Map View tools to easily view and monitor the configuration.
Table 1 Map View display tools
FunctionTool Icon
Zoom In—incrementally magnifies the Map View window.
Zoom Out—incrementally reduces the Map View window.
Magnify—creates magnification area, like a magnifying glass, that you can move over sections of the map view. Note that the magnify tool toggles on and off. You must click the icon to use it, and you must click the icon to turn it off.
Zoom to Fit—returns the map view to its default size and view.
Select to Zoom—allows you to select an area of the map view and zoom in on just that area.
Rotate—turns the map view 90 degrees at a time.
You can left-click in the Map View window and drag the map around the window
Click and drag
Using views and layouts
The views and layouts differ for each element of your network that uses the map view. For views and layouts available, see:
Working with management groups, “Management group map view tab” (page 106)
Controlling server access to volumes, “Viewing the relationship between storage systems,
volumes, and servers” (page 204)
Sites, HP LeftHand Storage Multi-Site Configuration Guide
Clusters, “Cluster Map View” (page 133)
Volumes and Snapshots, “Viewing the volume map” (page 158)
SmartClone volumes, “Using views” (page 191)
Using the Map View 17
Setting preferences
Use the Preferences window to set the following:
Font size in the CMC
Locale for the CMC. The locale determines the language displayed in the CMC.
Naming conventions for storage elements
Online upgrade options. See the HP LeftHand Storage Upgrade Instructions.
Setting the font size and locale
Use the Preferences window, opened from the Help menu, to set font size and locale in the CMC. Font sizes from 9 through 16 are available.
The CMC obtains the locale setting from your computer. If you change the locale on your computer and open the CMC, it uses the new locale, if available in the CMC.
You can override the locale setting from your computer by selecting a different locale in the CMC. Changing the locale in the CMC affects the language of the text that appears in the CMC and in the online help.
After changing the locale, you must close and reopen the CMC to see the change.
Setting naming conventions
Use the Preferences window, opened from the Help menu, to set naming conventions for elements you create when building the HP LeftHand Storage. You can use the default values or create your own set of customized values.
When you install the CMC for the first time, or upgrade from release 7.0.x, default names are enabled for snapshots, including schedules to snapshot a volume, and for SmartClone volumes. No default names are provided for management groups, clusters, and volumes.
Figure 2 Default naming conventions for snapshots and SmartClone volumes
Changing naming conventions
Change the elements that use a default naming convention or change the naming convention itself.
18 Getting started
If you use the given defaults, the resulting names look like those in Table 2 (page 19). Notice that the volume name carries into all the snapshot elements, including SmartClone volumes, which are created from a snapshot.
Table 2 Example of how default names work
ExampleDefault nameElement
VOL_VOL_ExchLogs_SS_3_1VOL_SmartClone Volumes
VOL_ExchLogs_SS_1_SS_Snapshots
VOL_RemoteBackup_RS_1_RS_Remote Snapshots
VOL_ExchLogs_Sch_SS_2.1_Sch_SS_Schedules to Snapshot a Volume
VOL_ExchLogs_Sch_RS_2_Pri.1, VOL_RemoteBackup_Sch_RS_1_Rmt.1
_Sch_RS_Schedules to Remote Snapshot a
Volume
If you delete all the default names from the Preferences Naming window, the only automatically generated naming elements that remain will incrementally number a series of snapshots or SmartClone volumes.
Troubleshooting
Storage systems not found
If the network has a lot of traffic, or if a storage system is busy reading or writing data, it may not be found when a search is performed. Try the following steps to find the storage system.
1. If the storage system you are looking for does not appear in the navigation window, search
again using the Find menu.
2. If you have searched using Auto Discover by Broadcast, try adding individual IP addresses
and clicking Find.
3. If you have searched by individual IP addresses, try searching by Auto Discover by Broadcast
instead.
4. If searching again does not work, try the following:
Check the physical connection of the storage system.
Wait a few minutes and try the search again. If activity to the storage system was frequent,
the storage system might not have responded to the search.
Other problems can prevent the CMC from finding a storage system:
Extremely high network traffic to and from the storage system.
The IP address could have changed if the storage system is configured to use DHCP (not
recommended).
The storage system may have been rebooted and is not yet online.
Power could have failed to a network switch to which the storage system is connected.
The CMC might be running on a system that is on a different physical network than the storage
system. Poor network routing performance at the site may severely affect performance of the CMC.
Configuring remote support for HP LeftHand Storage
If you are using HP remote support, Table 3 (page 20) lists the required configuration tasks.
Troubleshooting 19
Table 3 CMC setup for remote support
For more information, seeTask
“Enabling SNMP agents” (page 92)Enable SNMP on each storage system
“Adding SNMP traps” (page 93)Set the SNMP trap recipient to IP address of the system
where the remote support client is installed
Your network administratorOpen port 8959 (used for the CLI)
“Adding an administrative user” (page 76)Set the management group login and password for a
read-only (View_Only_Administrator group) user
20 Getting started
2 Working with storage systems
Storage systems displayed in the navigation window have a tree structure of configuration categories under them, as shown in Figure 3 (page 21). The configuration categories provide access to the configuration tasks for individual storage systems. You must configure each storage system individually before using it in a cluster.
Figure 3 Storage system configuration categories
The configuration categories include the following:
Diagnostics—Run hardware diagnostic tests, view current hardware status and configuration
information, and save log files.
Network—For each storage system, configure and manage the network settings, including
network interface cards (NICs), the routing table, and which interface carries SAN/iQ communications.
Storage—Manage RAID and the individual disks in the storage system.
Identifying the storage system hardware
Each HP LeftHand storage system is based on a specific HP platform. For general information about the underlying hardware of your HP LeftHand Storage model, such as LEDs, component identification, and replacing components, see the platform-specific documentation. Table 4 (page 21) identifies the HP platform used for each LeftHand model and a link to related information.
Table 4 HP platform identification
LinkDocumentationHP platformHP LeftHand model
http://www.hp.com/support/DL320s_UG_enHP ProLiant DL320s User
Guide
ProLiant DL320s
NSM 2120
http://www.hp.com/support/ DL185Gen5_MSG_en
HP ProLiant DL185 Generation 5 Maintenance and Service Guide
ProLiant DL185 G5
HP LeftHand P4300 HP LeftHand P4500
Contact HP Support for more information as this guide is not publicly available.
HP SE1220 Maintenance and Service Guide
SE1220HP P4300 G2
HP P4500 G2 HP P4900 G2
http://www.hp.com/support/ HP_P4800_G2_SAN_Solution_BladeSystem_MG_en
HP P4800 G2 SAN Solution for BladeSystem Maintenance Guide
ProLiant BL460c G7
P4800 G2
Identifying the storage system hardware 21
Table 4 HP platform identification (continued)
LinkDocumentationHP platformHP LeftHand model
http://www.hp.com/support/ BL460cG7_Server_Blade Maintenance and Service Blade_MSG_en
HP ProLiant BL460c G7 Server Blade Maintenance and Service Guide
http://www.hp.com/go/proliantgen8/docsHP ProLiant DL360p Gen8
Server Maintenance and Service Guide
ProLiant DL360p G8
HP LeftHand 4130 HP LeftHand 4330
Storage system tasks
Logging in to and out of storage systems
When storage systems are in the Available pool, you log in without a user name or password. Simply click the link Log in to view. When you use the Management Group, Clusters and Volumes wizard, selecting a storage system to use automatically logs in to that storage system. You can find the link to log in at the following locations:
From the Available systems list in the Navigation window
On individual storage system Details tabs
Logging out of a storage system
1. Select a storage system in the navigation window.
2. Right-click and select Log Out.
NOTE: If you are logged in to multiple storage systems, you must log out of each storage system
individually.
Changing the storage system hostname
The storage system arrives configured with a default hostname. Change the hostname as follows:
1. In the navigation window, log in to the storage system.
2. On the Details tab, click Storage System Tasks and select Edit Hostname.
3. Enter the new name, and click OK.
4. Click OK to finish.
NOTE: Add the hostname and IP pair to the hostname resolution methodology employed in your
environment, for example, DNS or WINS.
Locating the storage system in a rack
The Set ID LED illuminates lights on the physical storage system to aid in physically locating that storage system in a rack. The Set ID LED is available depending on the model of the storage system.
1. Select a storage system in the navigation window and log in.
2. Click Storage System Tasks on the Details tab and select Set ID LED On.
The ID LED on the front of the storage system is now a bright blue. Another ID LED is located on the back of the storage system.
When you click Set ID LED On, the status changes to On.
3. Select Set ID LED Off when you have finished.
The LED on the storage system turns off.
22 Working with storage systems
Powering off or rebooting the storage system
Reboot or power off the storage system from the CMC. Set the amount of time before the process begins, to ensure that all activity to the storage system has stopped.
Powering off the storage system through the CMC physically powers it off. The CMC controls the power down process so that data is protected.
Powering off an individual storage system is appropriate for servicing or moving that storage system. However, if you want to shut down more than one storage system in a management group, you should shut down the management group instead of individually powering off the storage systems in that group. See “Shutting down a management group” (page 114).
IMPORTANT:
Before powering off or rebooting the storage system, ensure that volumes will not go offline
by checking the storage system Availability tab. See “Determining volume and snapshot
availability ” (page 25).
You should also verify that you have the proper number of managers and possibly a Failover
Manager to ensure that quorum is maintained. See “Managers and quorum” (page 119).
Powering on or off, or rebooting storage systems with modular components
Some storage systems are comprised of modular components, that may include:
Disk enclosure
Server blades enclosure
System controller
The P4800 is an example of a storage system that is comprised of modular components. Power on the components in the following order:
1. Disk enclosure.
2. Server blades enclosure or system controller.
Allow up to 6 minutes for the system controller to come up completely and be discovered by the CMC. If the CMC cannot find the storage system after 6 minutes, contact Customer Support.
3. If you do not power on the disk enclosure first, the Storage System Details tab shows the status
with No Formatted Devices Available.
Figure 4 Disk enclosure not found as shown in Details tab
Powering off or rebooting the storage system 23
When powering off the storage system, be sure to power off the components in the following order:
1. Power off the server blades enclosure or system controller from the CMC as described in
“Powering off the storage system” (page 24).
2. Manually power off the disk enclosure.
When you reboot the storage system, use the CMC, as described in “Rebooting the storage system”
(page 24). This process reboots only the server blades enclosure or the system controller.
Rebooting the storage system
1. Select a storage system in the navigation window and log in.
2. Click Storage System Tasks on the Details tab and select Power Off or Reboot.
3. In the minutes field, enter the number of minutes before the reboot should begin.
Enter any whole number greater than or equal to 0. If you enter 0, the storage system reboots shortly after you confirm the reboot.
NOTE: If you enter 0 for the value when rebooting, you cannot cancel the action. Any value
greater than 0 allows you to cancel before the reboot actually takes place.
4. Select Reboot to perform a software reboot without a power cycle.
5. Click OK.
The storage system starts the reboot in the specified number of minutes. The reboot takes several minutes.
6. Search for the storage system to reconnect the CMC to the storage system once it has finished
rebooting.
Powering off the storage system
1. Log in to the storage system.
2. Select Storage System Tasks on the Details tab and select Power Off or Reboot.
3. Select Power Off.
The button changes to Power Off.
4. In the minutes field, enter the number of minutes before the powering off should begin.
Enter any whole number greater than or equal to 0. If you enter 0, the storage system powers off shortly after you confirm the power off.
NOTE: If you enter 0 for the value when powering off, you cannot cancel the action. Any
value greater than 0 allows you to cancel before the power off actually takes place.
5. Click Power Off.
24 Working with storage systems
Figure 5 Confirming storage system power off
Depending on the configuration of the management group and volumes, your volumes and snapshots can remain available.
Upgrading SAN/iQ on storage systems
The CMC enables online upgrades for storage systems, including the latest software releases and patches. See the HP LeftHand Storage Upgrade Instructions.
Registering advanced features for a storage system
Using the Feature Registration tab, register individual storage systems for advanced features. For more information about registering advanced features, see “Registering advanced features”
(page 226).
Determining volume and snapshot availability
The Availability tab displays which volumes’ and snapshots’ availability depends on this storage system staying online. Details include the data protection level and what factors contribute to the availability status, such as the status of storage systems participating in any replication or a RAID restripe in progress.
Upgrading SAN/iQ on storage systems 25
Figure 6 Availability tab
Checking status of dedicated boot devices
Some storage systems contain either one or two dedicated boot devices. Dedicated boot devices may be compact flash cards or hard drives. If a storage system has dedicated boot devices, the Boot Devices tab appears in the Storage configuration category. Storage systems that do not have dedicated boot devices will not display the Boot Devices tab.
In storage systems with two dedicated boot devices, both devices are active by default. If necessary, compact flash cards can be deactivated or activated using the buttons on this tab. However, you should only take action on these cards if instructed by HP Technical Support.
Checking boot device status
View dedicated boot device status in the Boot Devices tab window in the Storage category in the storage system tree.
Getting there
1. Select a storage system in the navigation window and log in if necessary.
2. Open the tree below the storage system and select Storage.
3. Select the Boot Devices tab.
The status of each dedicated boot device on the storage system is listed in the Status column.
Table 5 (page 27) describes the possible status for boot devices.
NOTE: Some statuses only occur in a storage system with two boot devices.
26 Working with storage systems
Table 5 Boot device status
DescriptionBoot device status
The device is synchronized and ready to be used.Active
The device is ready to be removed from the storage system. It will not be used to boot the storage system.
Inactive
The device encountered an I/O error and is not ready to be used.
Failed
The device has not yet been used in a storage system. It is ready to be activated.
Unformatted
The device is not recognized as a boot device.Not Recognized
The device cannot be used. (For example, the compact flash card is the wrong size or type.)
Unsupported
NOTE: When the status of a boot device changes, an event is generated. See “Alarms and events
overview” (page 84).
Replacing a dedicated boot device
If a boot hard drive fails, you will see an event that the boot device is faulty. Replace it with a new drive. The boot device drives support hot swapping and do not require activation.
Checking status of dedicated boot devices 27
3 Configuring RAID and Managing Disks
For each storage system, you can select the RAID configuration and the RAID rebuild options, and monitor the RAID status. You can also review disk information and, for some models, manage individual disks.
Getting there
1. In the navigation window, select a storage system and log in if necessary.
2. Open the tree under the storage system and select the Storage category.
Figure 7 Viewing the storage configuration category for a storage system
Columns in the RAID Setup tab show four categories:
Device Name
Device Type or the RAID level
Device Status
Subdevices
NOTE: For hardware-specific LED information for your storage system, see “Identifying the storage
system hardware” (page 21) for document titles and document links.
Configuring and managing RAID
Managing the RAID settings of a storage system includes:
Choosing the right RAID configuration for your storage needs
Setting or changing the RAID configuration, if necessary
Setting the rate for rebuilding RAID
Monitoring the RAID status for the storage system
Reconfiguring RAID when necessary
RAID Levels
The availability of certain RAID levels is determined by the number of storage system hard drives.
Table 6 Descriptions of RAID levels
DescriptionRAID level
Offers a good combination of data protection and performance. RAID 1 or drive mirroring creates fault
RAID 1 – Mirroring
tolerance by storing duplicate sets of data on a minimum of two hard drives. There must be an even number of drives for RAID 1. RAID 1 and RAID 1+0(10) are the most costly fault tolerance methods because they require 50 percent of the drive capacity to store the redundant data. RAID 1
28 Configuring RAID and Managing Disks
Table 6 Descriptions of RAID levels (continued)
DescriptionRAID level
mirrors the contents of one hard drive in the array onto another. If either hard drive fails, the other hard drive provides a backup copy of the files and normal system operations are not interrupted.
Offers the best combination of data protection and performance. RAID 1+0 or drive mirroring creates fault
RAID 1+0 – Mirroring and Striping
tolerance by storing duplicate sets of data on a minimum of four hard drives. There must be an even number of drives for RAID 1+0. RAID 1+0(10) and RAID 1 are the most costly fault tolerance methods because they require 50 percent of the drive capacity to store the redundant data. RAID 1+0(10) first mirrors each drive in the array to another, and then stripes the data across the mirrored pair. If a physical drive fails, the mirror drive provides a backup copy of the files and normal system operations are not interrupted. RAID 1+0(10) can withstand multiple simultaneous drive failures, as long as the failed drives are not mirrored to each other.
Offers the best combination of data protection and usable capacity while also improving performance over RAID 6.
RAID 5
RAID 5 stores parity data across all the physical drives in the array and allows more simultaneous read operations and higher performance. If a drive fails, the controller uses the parity data and the data on the remaining drives to reconstruct data from the failed drive. The system continues operating with a slightly reduced performance until you replace the failed drive. RAID 5 can only withstand the loss of one drive without total array failure. It requires an array with a minimum of three physical drives. Usable capacity is N-1 where N is the number of physical drives in the logical array.
Offers the best data protection and is an extension of RAID
5. RAID 6 uses multiple parity sets to store data and can
RAID 6
therefore tolerate up to 2 drive failures simultaneously. RAID 6 requires a minimum of 4 drives. Performance is lower than RAID 5 due to parity data updating on multiple drives. RAID 6 uses two disk for parity; its fault tolerance allows two disks to fail simultaneously. Usable capacity is N-2 where N is the number of physical drives in the logical array.
Explaining RAID devices in the RAID setup report
In the Storage category, the RAID Setup tab lists the RAID devices in the storage system and provides information about them. An example of the RAID setup report is shown in Figure 8 (page 29). Information listed in the report is described in Table 7 (page 30).
Figure 8 RAID setup report
Explaining RAID devices in the RAID setup report 29
RAID devices by RAID type
Each RAID type creates different sets of RAID devices. Table 7 (page 30) contains a description of the variety of RAID devices created by the different RAID types as implemented on various storage systems.
Table 7 Information in the RAID setup report
Describes thisThis item
The disk sets used in RAID. The number and names of devices varies by storage system and RAID level.
Device Name
The RAID level of the device. For example, in a HP P4300 G2, RAID 5 displays a Device Type of RAID 5 and subdevices as 8.
Device Type
The RAID status of the device. Status is one of the following:
Device Status
Normal—green
Degraded—yellow
Off—red
Rebuilding—blue
The number of disks included in the device.Subdevices
Virtual RAID devices
If you are using the VSA, the only RAID available is virtual RAID. After installing the VSA, virtual RAID is configured automatically if you first configured the data disk in the VI Client.
HP recommends installing VSA for vSphere on top of a server with a RAID 5 or RAID 6 configuration.
Planning the RAID configuration
Plan the RAID configuration for storage systems based on a balance between data high availability or fault tolerance, I/O performance, and usable capacity.
CAUTION: Plan your RAID configuration carefully. After you have configured RAID, you cannot
change the RAID configuration without deleting all data on the storage system.
Data protection
Keeping multiple copies of your data ensures that data is safe and remains available in the case of disk failure. HP recommends using both disk RAID and Network RAID to insure high availability:
Configure RAID 1, RAID 10, RAID 5, or RAID 6 within each storage system to ensure data
redundancy.
Always use Network RAID to mirror data volumes across storage systems in a cluster, regardless
of RAID level, for added data protection and high availability .
Using RAID for data redundancy
Within each storage system, RAID 1 or RAID 10 ensures that two copies of all data exist. If one of the disks in a RAID pair goes down, data reads and writes continue on the other disk. Similarly, RAID 5 or RAID 6 provides redundancy by spreading parity evenly across the disks in the set.
If one disk in a RAID 5 set, or two disks in a RAID 6 set goes down, data reads and writes continue on the remaining disks in the set.
RAID protects against failure of disks within a storage system, but not against failure of an entire storage system. For example, if network connectivity to the storage system is lost, then data reads and writes to the storage system cannot continue.
30 Configuring RAID and Managing Disks
Loading...
+ 252 hidden pages