NEC 5800 User Manual

NEC Express5800 Series Web-based Promise Array Management Professional User's Guide (Linux Version)
1st Edition
08-2007
856-840000-889-A

Preface

This User's Guide explains the management utility [Web-based Promise Array Management Professional] to be used for operating N8103-105 Disk Array Controller provided by Promise.
Some of the features explained in this guide may not be supported in your environment. Please be sure to read the User’s Guide supplied with the platform.
The guide is intended for persons who are familiar with Linux functions and operation methods. For details on Linux operation, see Linux Online Help or manuals.
Copyrights
Promise® and its logo are registered trademarks of Promise Technology Inc. of the U.S.A.
Linux is a trademark or registered trademark of Linus Torvalds in the United States and other countries.
Red Hat, RPM, and all the trademarks and logos based on Red Hat are the trademarks or registered trademarks in the United States and other countries.
MIRACLE LINUX and its logo are registered trademarks of MIRACLE LINUX Corporation.
NEC ESMPRO and NEC EXPRESSBUILDER are registered trademarks of NEC Corporation.
Microsoft, its logo, Windows, Windows Server and MS-DOS are worldwide registered trademarks of Microsoft Corporation of the U.S.A.
All company names and product names mentioned herein are trademarks or registered trademarks of their respective companies.
Notes:
(1) No part of this manual may be reproduced in any form without the prior written permission of
NEC Corporation.
(2) The contents of this manual may be revised without prior notice.
(3) The contents of this manual shall not be copied or altered without the prior written permission
of NEC Corporation.
(4) All efforts have been made to ensure the accuracy of all information in this manual. If you
notice any part unclear, incorrect, or omitted in this manual, contact the sales agent where you purchased this product.
(5) NEC assumes no liability arising from the use of this product, nor any liability for incidental
or consequential damages arising from the use of this manual regardless of Item (4).
(6) Should any of these products be considered as strategic goods, and thereby governed by
foreign exchange or foreign trade regulations, the Government of Japan will require an export license before said products can be exported from Japan.
(7) NEC will not guarantee the proper operation of the open source software including Linux
kernels. Please be sure to implement and operate the Linux system based on the principle of self-responsibility.

Contents

1. Overview .................................................................................................................... 1
1.1 Web-based Promise Array Management Professional.......................................................... 1
1.2 Precautions ........................................................................................................................... 2
2. Installation/Uninstallation.........................................................................................3
2.1 Operation Environment for WebPAM PRO ......................................................................... 3
2.2 Installing WebPAM PRO...................................................................................................... 3
2.3 Uninstalling WebPAM PRO ................................................................................................. 4
3. Operation.................................................................................................................... 5
3.1 Starting and Exiting WebPAM PRO..................................................................................... 5
3.1.1 Controlling WebPAM PRO with a Local Computer .................................................. 6
3.1.2 Controlling WebPAM PRO with a Remote Computer ............................................... 7
3.1.3 Exiting WebPAM PRO............................................................................................... 7
3.2 WebPAM PRO Operation Window ...................................................................................... 8
3.2.1 Using WebPAM PRO for the First Time.................................................................... 8
3.2.2 WebPAM PRO Operation Screen............................................................................. 10
3.3 Icons ............................................................................................................................... 11
3.4 Managing Users..................................................................................................................13
3.5 Several Settings and Information Review .......................................................................... 16
3.5.1 Subsystem (ST EX4650EL) Icon............................................................................. 16
3.5.2 Controller ................................................................................................................. 19
3.5.3 Enclosure.................................................................................................................. 22
3.5.4 Physical Drives......................................................................................................... 22
3.5.5 Physical Drive .......................................................................................................... 24
3.5.6 Disk Arrays .............................................................................................................. 26
3.5.7 Disk Array ................................................................................................................ 26
3.5.8 Logical Drives.......................................................................................................... 28
3.5.9 Logical Drive ........................................................................................................... 28
3.5.10 Spare Drives............................................................................................................. 30
3.5.11 Logical Drive Summary........................................................................................... 30
3.6 Creating Disk Array or Logical Driver............................................................................... 31
3.6.1 Automatic Configuration ......................................................................................... 31
3.6.2 Express Configuration.............................................................................................. 31
3.6.3 Advanced Configuration .......................................................................................... 33
3.6.4 Adding Logical Drives............................................................................................. 36
3.7 Deleting Disk Array or Logical Drive................................................................................ 37
3.7.1 Deleting Disk Array ................................................................................................. 37
3.7.2 Deleting Logical Drive............................................................................................. 37
3.8 Redundancy Check............................................................................................................. 38
3.8.1 Scheduling Redundancy Check................................................................................ 40
3.9 Media Patrol ....................................................................................................................... 44
3.9.1 Scheduling Media Patrol .......................................................................................... 46
3.10 Rebuild ............................................................................................................................... 50
3.10.1 Hot Spare Rebuild.................................................................................................... 50
3.10.2 Hot Swap Rebuild .................................................................................................... 50
3.10.3 Manual Rebuild........................................................................................................ 51
3.11 PDM ............................................................................................................................... 53
3.12 Transition............................................................................................................................ 56
3.13 Transport............................................................................................................................. 61
3.14 Initializing Logical Drive ................................................................................................... 63
3.15 Creating or Deleting Spare Drives ..................................................................................... 64
3.15.1 Creating Spare Drives .............................................................................................. 64
3.15.2 Deleting Spare Drives .............................................................................................. 66
3.16 Expansion........................................................................................................................... 67
3.17 Event ............................................................................................................................... 71
3.18 Collecting Configuration Information................................................................................ 73
Appendix A First Logon............................................................................................... 74
Appendix B Report Monitoring ...................................................................................76

1. Overview

1.1 Web-based Promise Array Management Professional

Web-based Promise Array Management Professional (hereafter abbreviated for WebPAM PRO) is a Web-based application that locally or remotely manages N8103-105 Disk Array Controller provided by Promise.
WebPAM PRO only supports Mozilla Firefox 1.5 or later (when monitoring from the Linux environment) and Microsoft Internet Explorer (IE) 6.0 or later (when monitoring from the Windows environment) as its browser. After installing WebPAM PRO, the following features become available in the system.
Creating or deleting the following logical arrays on the graphical operation screen of
the browser
RAID0 (data striping with one or more hard disk drives)
RAID1 (data mirroring with two hard disk drives)
RAID5 (data striping with parity with more than two hard disk drives)
RAID1 spanning (same as RAID10. Data mirroring and striping with four hard disk
drives)
Checking consistency among logical drives (redundancy check)
Checking media error in disks (media patrol)
Auto-recovering degraded logical drives if entered into the state (rebuild)
To manage N8103-105 remotely from the management computer, WebPAM PRO must be installed in the machine to which N8103-105 is connected. These two computers must be set to allow communication with each other via TCP/IP. HTTPS or SSL is used for communication via TCP/IP in order to endure security and encrypt transfer data.
- 1 -

1.2 Precautions

Be sure to read the following notes and precautions before using WebPAM PRO:
It is strongly recommended to provide media patrol or redundancy check routinely for
all logical drives and HDDs to be connected. Whether the media patrol or the redundancy check is used may be determined as follows depending on the environment of your system.
Redundancy check
Media patrol Environment in which your system is subject to comparatively
Environment in which your system is always subject to load.
--- Redundancy check can continue at a constant rate under heavy system load
small load in any period including the night.
--- Media Patrol has lower priority than other tasks in the system, so it may make little progress under heavy system load
The above action allows you to find subsequent defects (due to degradation such as aging) in files of low access frequency and unused areas as soon as possible. In rebuilding after replacement of a HDD due to a failure, subsequent defects may be found in remaining HDDs. In such a case, the system cannot be recovered. Thus, detecting subsequent defects as early as possible is extremely effective as preventive maintenance. Periodical redundancy check or media patrol is effective to keep the stable operation of your system. It is strongly recommended to take the action once per week or at least once per month. For the detailed explanation and routine action, see the description on the scheduling of the redundancy check or media patrol in this manual. Note that a media patrol task has been scheduled to be done on AM0:00 every Wednesday by default.
Setting for security is required when you log on to WebPAM PRO first time. See
"Appendix A First Logon."
To start WebPAM PRO, more than 255 colors must be selected in the screen setup.
A message that indicates “Unknown”may be registered in the Event Frame of
WebPAM PRO when the system is under heavy load such as the case when mutilple background activities are running at the same time. Even in that case, all the background activities are properly done and will successfully be finished, and the messages will be registered in syslog. Please close WebPAM PRO and then restart it.
The “HTTP 500 Error” window may be displayed when some load is added during
operation of WebPAM PRO or, in particular, while multiple background activities are running. In this case, refresh the screen from the Refresh tab. For the Refresh tab, see Section 3.3.
- 2 -

2. Installation/Uninstallation

2.1 Operation Environment for WebPAM PRO

The following operation environment is required for the proper operation of WebPAM PRO.
- Hardware
NEC EXPRESS5800 server available for the “N8103-105 Disk Array Controller (SAS)”
- Software
RHEL AS/ES 4 Update 5 or later ML4SP2 or later
IMPORTANT:
Only users authorized as root are permitted to install
and uninstall WebPAM PRO.
If you have used Web-based Promise Array Manager
(WebPAM, N8103-101/103 management utility), be sure to uninstall WebPAM before installing WebPAM PRO. You cannot use WebPAM PRO with WebPAM. For uninstalling WebPAM, see "Web-based Promise Array Manager User’s Guide (Linux Version)”.

2.2 Installing WebPAM PRO

1. Untar the WebPAM PRO installation module.
Ex.) As the WebPAM PRO installation module is “WPPInst-1.00.tar.gz”: # tar -zxvf WPPInst-1.00.tar.gz
2. Execute the WebPAM PRO installation script as follows:
# ./WPPInst.sh –e
3. Check that WebPAM PRO has been successfully installed.
WPP: Installation completed. Please reboot the system.
After installation completed, restart the system.
- 3 -

2.3 Uninstalling WebPAM PRO

IMPORTANT: Follow the procedure described in this
chapter to uninstall WebPAM PRO.
NOTE: WebPAM PRO is required for managing the RAID system. Do not uninstall WebPAM PRO unless you have to uninstall for maintenance including the upgrade of the utility.
1. Go to the folder that WebPAM PRO has been installed.
# cd /opt/Promise/WebPAMPRO.
2. Execute the WebPAM PRO uninstallation script as follows.
# ./WPPUninst.sh
3. Check that WebPAM PRO has been successfully uninstalled.
If the installation has finished successfully, the following messages will appear.
WPP: Uninstallation completed. Please reboot the system.
After installation completed, restart the system.
- 4 -

3. Operation

This chapter describes how to start WebPAM PRO and operations on screens appearing after starting WebPAM PRO.

3.1 Starting and Exiting WebPAM PRO

IMPORTANT:
For a specific controller, do not start more than one
web browser or more than one tab in a browser concurrently.
You need a certificate for security when logging in for
the first time. Install the security certificate according to Appendix A.
Opening the WebPAM PRO screen with Internet
Explorer 7 always causes [Certificate Error] to appear at the top of Internet Explorer. However, this does not affect proper operations of WebPAM PRO.
When using Internet Explorer 7, a certificate warning
is always displayed on the upper right of the Internet Explorer screen. This has no effect on WebPAM Pro operation.
The default user name and password are
"administrator" and "password," respectively. At the first logon, enter "administrator" and "password" as the user name and password, respectively. For changing the administrator’s password after the logon, see "3.4 Managing Users." The user name and password for logon to WebPAM PRO are accounts exclusively used for WebPAM PRO. They are different from the user name and password used for logon to OS.
When you start WebPAM PRO first time, messages
with the date of 1970s may be registered. This has no effect on WebPAM PRO operation.
NOTE: Depending on the OS used, browser, and/or color scheme, the images shown in this manual may be different from the actual images.
- 5 -

3.1.1 Controlling WebPAM PRO with a Local Computer

1. Start WebPAM PRO by either of the following methods.
- Double-click the WebPAM PRO icon on the desktop.
- <On RHEL> Select [Application] (the main menu on the panel) [Accessory] [WebPAMPRO]. Then click [WebPAMPRO]. <On Miracle> Select [Start] (the main menu on the panel) [Applications] [Utilities]. Then click [WebPAMPRO].
2. The Security Alert window will appear. See Appendix A to install the certificate.
3. If the “Security Error: Domain Name Mismatch” message is displayed, click OK.
4. Perform the following operation on the logon screen.
Enter your user ID and password in the [User Name] and [Password] fields,
respectively. (At the first logon, specify "administrator" and "password" as the user ID and password, respectively.)
Click [Login].
- 6 -

3.1.2 Controlling WebPAM PRO with a Remote Computer

NOTES:
If using a proxy server for making access to the
Internet, you need to bypass the proxy server. See Appendix A for the setting procedure.
If a firewall function is running on the system (server),
you may not controll from the remote computer. In this case, change the setting to make it possible to connect from the remote computer (e.g. check the port setting for firewall).
The procedure provided below is for connecting from
the Windows environment. If you want to connect from the Linux environment, after performing Steps 1 and 2 shown below, follow the Steps 2 and 3 in “3.1.1 Controlling WebPAM PRO with a Local Computer” instead of Step3 below. Then go back to Step 4 below.
1. Start the Web browser.
2. Enter the IP address of the Promise RAID system to be controlled in the browser
address and press Enter.
For example, if the IP address is "10.10.10.10," type "https://10.10.10.10:8443/promise."
If a session with the remote system can be established, the WebPAM PRO logon screen appears.
3. The Security Alert window will appear. Click [Yes].
The [Block by Security Enforcement] screen may appear. Click [Add] to register WebPAM PRO to a zone in the trusted site.
4. On the logon screen, perform the following operations:
Enter your user ID and password in the [User Name] and [Password] fields,
respectively. (At the first logon, specify "administrator" and "password" as the user ID and password, respectively.)
Click [Login].

3.1.3 Exiting WebPAM PRO

Click [Logout] on the WebPAM PRO Header of the WebPAM PRO operation window to exit the WebPAM PRO operation window. Click [x] at the upper right corner of the WebPAM PRO logon window to exit it.
- 7 -

3.2 WebPAM PRO Operation Window

3.2.1 Using WebPAM PRO for the First Time

1. Click the Subsystem/Host Management icon in the Tree View appearing at the left side of the
screen.
2. Click the Add Subsystem/Host tab in the screen appearing at the right side of the screen.
- 8 -
3. Make sure that "127.0.0.1" is entered in the Subsystem/Host Port IP address field, and click
the [Submit] button.
The host PC information appears in the Tree View.
- 9 -

3.2.2 WebPAM PRO Operation Screen

The WebPAM PRO window is mainly configured with three parts; Tree View, Management Window, and Event Frame.
WebPAM PRO Header
Function tab
Tree View
Management Window
Event Frame
Tree View
The Tree View can indicate the configuration of the RAID system hierarchically in the similar way as Windows Explorer. Each item at a specific level can be expanded by displaying the relevant information at the lower levels.
Management Window
The information appearing in the Management Window varies depending on the item selected in the Tree View. The window allows the information set on users and/or devices to be checked or updated or logical drives to be created, maintained, deleted or monitored. The information to be displayed includes text and list boxes, fields and buttons. In each function tab, various tasks and processes can be controlled. Function tabs unavailable depending on the status of logical drives or HDDs are grayed out.
Event Frame
The Event Frame indicates the list of events. The Event Frame can be either displayed or not alternately by selecting [Show Event/Hide Event] on the WebPAM PRO Header. See "3.17 Events" for details.
- 10 -

3.3 Icons

When you click the link to an icon on the Tree View, several setting and status display screens appear on the Management Window. The features grayed out on the Management Window are unavailable. For details of features, see the relevant chapters.
Tree View Management Window display
Home icon
Indicates the name of the current logon user in parentheses.
Administrative Tools icon
Indicates the user, host and software management information in WebPAM PRO.
User Management icon
Subsystem/Host Management icon
(Displayed at logon as a super privilege user) Indicates the information on the current host.
Software Management icon
(Displayed at logon as a super privilege user)
Host icon
Indicates the information on the host including its IP address.
ST EX4650EL icon
(Subsystem icon)
Indicates the version information of WebPAM PRO.
User Management tab
Subsystem/Host Management tab
Software Management tab
Lists user names registered currently in the Information tab. Logging on to WebPAM PRO as a super privilege user, you can create, delete or set users in the Create or Delete tab. Logging on to WebPAM PRO as another user, you can only change your password and Display Name.
Indicates the IP address of the host, the firmware version of the controller and the Display Name.
You can change privilege levels of users in the User Privilege tab.
Logging on to WebPAM PRO as a super privilege user, you can set the interval for refreshing the Event Frame. The Event Frame can be selected out of 15, 30, 60 and 300 seconds. The default is 30.
Indicates the version of WebPAM PRO, firmware version and host information including its IP address.
Logging on to WebPAM PRO as a super privilege user, you can change privilege levels of users in the User Rights tab.
Clicking [Submit] in the Refresh tab allows the screen to be updated to the latest status. If you click [Submit], confirmation dialog "Are you sure you want to refresh" appears. Then click [OK].
Indicates the information on the installed RAID card. You can provide settings for background tasks including redundancy check and media patrol and scheduling and get configuration information. See the following description for details.
- 11 -
Tree View Management Window display
Indicates the information on BIOS and drivers. In
Controller icon
Enclosure icon
Physical Drives icon
Indicates HDDs in the enclosure and connected HDDs.
Disk Arrays icon
Indicates HDDs in the enclosure and connected HDDs.
Logical Drives icon
Displays the list of logical drives installed in this host.
Spare Drives icon
Logical Drive Summary icon
Displays the battery.
addition, you can provide various settings including performance, display battery status and display or change buzzer setting.
Indicates the enclosure information. See the following description for details.
Indicates the information on all connected HDDs.
Indicates the information on disk arrays. You can provide creation, deletion, rebuild, transition or PDM for disk arrays here.
Indicates the information on logical drives. You can initialize logical drives and provide redundancy check for each logical drive.
Indicates the information on spare drives. You can create or delete spare drives here.
Indicates the information on all logical drives subordinate to the controller. The displayed information is the same as that appearing when you click a logical drive subordinate to Disk Arrays.
- 12 -

3.4 Managing Users

Creating user account
To create a new user account, follow the procedure described below:
1. Logon to WebPAM PRO as an administrator, or a super privilege user.
2. Click the User Management in the Tree View and then click the Create tab in the
Management Window.
3. Set the items in the Create tab as shown in the table below:
Item name Description Available characters
User Name Account used at login Alphanumeric characters of 1
New Password Password Alphanumeric characters of 0
Retype Password Same as the value entered in
the New Password field
Display Name Name of user Alphanumeric characters of 0
Privilege Privilege to be given to the
user
Enable Check the checkbox.
Privileges are defined as described in the table below.
Privilege Description
View Users of the privilege can set or check every status but cannot
create or modify any status.
Maintenance Users of the privilege can provide rebuild, PDM, transition,
media patrol and redundancy check.
- 31 bytes
- 31 bytes (Always set the password for security enforcement.)
- 10 bytes
- 13 -
Privilege Description
Power Users of the privilege can create (but cannot delete) disk
arrays and logical drives, change RAID levels and stripe sizes and set or change components of disk arrays, logical drives and physical drives
Super Users of the privilege have all access authorities. The users
can create, delete or change all disk arrays, logical and physical drives and users.
4. After completing the entry, click [Submit].
If the user is created successfully, message "User was created successfully" appears.
The created user is added to the list in the Information tab.
Setting or changing a user account
You may select an existing user and change the display name in the Settings tab and the password in the Password tab.
If you logon to WebPAM PRO as a super privilege user, you can select the User Privilege tab in the Subsystem/Host Management window to change the privilege levels of users.
(Selecting the User Privilege tab and clicking the link of the displayed IP address allows the privileges of registered users to be changed through pull-down menus.)
- 14 -
Deleting User Account
1. Logon to WebPAM PRO as an administrator, or a super privilege user.
2. Click the User Management in the Tree View and then click the Delete tab appearing in
the Management Window.
3. Check the checkbox located to the left of each user to be deleted and click [Submit].
The confirmation dialog box appears. Click [OK].
Now the specified user accounts are deleted.
IMPORTANT: Administrator accounts cannot be deleted.
- 15 -

3.5 Several Settings and Information Review

Clicking an icon on the Tree View allows the relevant information to be displayed on the Management View.
In the Management Window, you can view the following information or set several features.

3.5.1 Subsystem (ST EX4650EL) Icon

If you select the subsystem (ST EX4650EL) icon in the Tree View, the controller information screen appears in the Management Window. This screen indicates the information on BIOS and drivers. In addition, the screen allows you to set various information including performance, provide redundancy check and check or delete scheduling of media patrol.
Information tab
The Information tab indicates the information on the subsystem.
Clear Statistics - Clears the statistical information accumulated for the controller. Do not manipulate this item because it is provided only for maintenance.
Settings tab
The Settings tab allows you to set an alias of the subsystem. If you enter a name in the Alias field and click [Submit], the subsystem name in the Tree View will be changed to the entered name at the screen update timing.
- 16 -
Firmware Update tab
The Firmware Update tab allows the firmware for the RAID card to be updated from WebPAM PRO. Do not manipulate this tab generally because it is provided only for maintenance.
Health tab
The Health tab indicates the health status of the controller, disk arrays, logical drives, spare drives and connected HDDs.
Event tab
If you click the center of the Event tab, then the log information saved in the RAMs on the RAID card (runtime events) appears.
If you click the downward arrow at the right end of the tab, then the log information (subsystem events) saved in NVRAMs appears in addition to runtime events.
NOTE: You cannot sort the list in this screen.
Background Activities tab
If you click the center of the Background Activities tab, then the progresses of tasks being executed, the priority of each tack and other information appear.
Clicking the link of a task being progressed allows detailed information to be displayed further.
- 17 -
If you click the downward arrow at the right end of the tab, then a menu item for changing the priorities of tasks (Settings) and those for starting tasks appear.
Settings menu
Rebuild Rate Set the priority of rebuild processing. The default is Medium.
Logical Drive Initialization Rate
Media Patrol Rate Set the priority of media patrol. The default is Low.
Redundancy Check Rate Set the priority of redundancy check. The default is Medium.
Migration Rate Set the priority of expansion. The default is Low.
PDM Rate Set the priority of PDM. The default is Medium.
Transition Rate Set the priority of transition. The default is Medium.
Reassigned Block Threshold
Error Block Threshold Set the error block threshold. The default is 32.
Enable Media Patrol Set whether the media patrol is enabled or not. The default is
Enable Auto Rebuild Set whether the auto rebuild is enabled or not. The default is [Enable].
Set the priority of logical drive initialization. The default is Medium.
Set the reassigned block threshold. The default is 32.
[Enable].
When you change a setting value but want to return it to the value at the screen display, click [Reset]. To change a setting value and enable the new value, click [Submit]. To return to the recommended default value (set in the above screen image), first click [Default] and then [Submit].
- 18 -
IMPORTANT: The information is set to proper values by default. Do not change the settings.
Scheduler tab
If you click the center of the Scheduler tab, then tasks already scheduled are listed.
One or more tasks may be scheduled. If you click the link of a scheduled task, the detailed settings appear.
This screen allows you to change the information on a scheduled task. The procedure is the same as that for creating a schedule.
If you click the downward arrow at the right end of the tab, you can create a new schedule or delete an existing schedule. See the description of each task for details.
Configuration tab
For details of the Configuration tab, see "3.18 Collecting Configuration Information."

3.5.2 Controller

If you expand the Controllers icon in the Tree View, then the information on the controller connected now appears. Clicking the icon of the controller displayed by the expansion allows the information to be displayed in the Management Window. On the screen, you can check the status information of the controller or provide settings for batteries and buzzers.
- 19 -
Information tab
The Information tab indicates the information on the controller.
Settings tab
The Settings tab allows you to set alias of the controller, provide settings on S.M.A.R.T. detection or set write cache of the controller. The information is set to proper values by default. As a rule, do not change the settings.
IMPORTANT:
The information is set to proper values by default. As
a rule, do not change the settings.
If you put or remove a checkmark in Enable SMART
Log or Enable Coercion check box, it is validated immediately, regardless of clicking of Submit or Reset button.
- 20 -
Loading...
+ 58 hidden pages