NEC IS016-5E User Manual

NEC Storage Manager
Data Replication User’s Manual
(Installation and Operation
IS016-5E
© NEC Corporation 2001-2004
No part of the contents of this book may be reproduced or
transmitted in any form without permission of NEC Corporation.
The contents of this book may be modified without notice in the future.

Preface

This manual describes how to use the data replication function provided by NEC Storage DynamicDataReplication
Ver2, NEC Storage RemoteDataReplication Ver2, and NEC Storage ReplicationControl.
The data replication function consists of the replication volume creation function provided in a disk array subsystem
and software to manage and operate it. It utilizes replication volume to make business operation more effective.
Refer to the “NEC Storage Manager Manual Guide” (IS901) for the overview of NEC Storage and the related
manuals. Also, refer to the “NEC Storage Manager Data Replication User’s Manual (Disaster Recovery System
Installation and Operation Guide)” (IS027) for details of how to use the remote data replication function provided by
NEC Storage RemoteDataReplication/DisasterRecovery and NEC Storage ReplicationControl/DisasterRecovery.
Remarks 1. This manual explains functions implemented by the following program products:
NEC Storage Manager and NEC Storage BaseProduct
NEC Storage ReplicationControl
NEC Storage DynamicDataReplication
NEC Storage RemoteDataReplication
2. This manual is applicable to the program products of the following versions:
NEC Storage Manager Ver3.3
NEC Storage BaseProduct Ver3.3
NEC Storage ReplicationControl Ver3.3
3. The NEC Storage Manager is referred to as iSM or Storage Manager in the text of this manual. Also,
the NEC Storage series disk array subsystem is referred to as a disk array.
4. The following descriptions in the text of this manual refer to the corresponding products.
Storage Manager NEC Storage Manager
AccessControl NEC Storage AccessControl
DynamicDataReplication NEC Storage DynamicDataReplication
PerformanceMonitor NEC Storage PerformanceMonitor
RemoteDataReplication NEC Storage RemoteDataReplication
ReplicationControl NEC Storage ReplicationControl
ReplicationControl SQL Option NEC Storage ReplicationControl SQL Option
SnapControl NEC Storage SnapControl
Description Corresponding Product
5. The following descriptions in the text of this manual refer to the corresponding manuals.
Description Corresponding Manual
User's Manual (UNIX) NEC Storage Manager User's Manual (UNIX) (IS001)
User's Manual NEC Storage Manager User's Manual (IS004)
ReplicationControl SQL Option User’s Manual
Configuration Setting Tool User’s Manual (GUI)
NEC Storage ReplicationControl SQL Option User’s Manual (IS006)
NEC Storage Manager Configuration Setting Tool User’s Manual (GUI) (IS007)
Description Corresponding Manual
Messages Handbook NEC Storage Manager Messages Handbook (IS010)
Data Replication User’s Manual (Function Guide)
Data Replication Command Reference
PerformanceMonitor User’s Manual NEC Storage PerformanceMonitor User’s Manual (IS025)
6. Trademarks and registered trademarks
Microsoft®, Windows® are registered trademarks or trademarks of Microsoft Corporation in the
United States and other countries.
HP-UX is a registered trademark of Hewlett-Packard, Co. in the United States.
UNIX is a registered trademark of The Open Group in the United States and other countries.
VERITAS, VxVM, VxFS, NetBackup, VERITAS Volume Manager, VERITAS File System, and
VERITAS NetBackup are registered trademarks or trademarks of VERITAS Software Corporation in
the United States and other countries.
Legato NetWorker is a registered trademark of Legato Systems, Inc. in the United States.
Sun is a registered trademark of Sun Microsystems, Inc. in the United States and other countries.
Solaris is a registered trademark of Sun Microsystems, Inc. in the United States.
Linux is a trademark or registered trademark of Mr. Linus Torvalds in the United States and other
countries.
AIX is a trademark of IBM Corporation.
ORACLE is a registered trademark of Oracle Corporation in the United States.
Other product names and company names, etc. are registered trademarks or trademarks of the
associated companies.
7. In this document, matters to which careful attention needs to be paid will be described as follows:
Be sure to observe the contents.
If the indications are ignored and the system is improperly operated, settings which have been already
made might be affected.
NEC Storage Manager Data Replication User’s Manual (Function Guide) (IS015)
NEC Storage Manager Data Replication Command Reference (IS021)
Type of Indication
Type Description
Describes contents which require special attention during operation.
The First Edition in March 2003
The Fifth Edition in November 2004

Contents

Chapter 1 Installation Procedure.......................................................................................................................................1
1.1 Installation Procedure..................................................................................................................................................1
1.2 System Configuration..................................................................................................................................................2
1.2.1 Hardware Configuration ...................................................................................................................................... 2
1.2.2 Software Configuration .......................................................................................................................................3
1.3 Software Installation....................................................................................................................................................4
1.3.1 Replication Management .....................................................................................................................................4
1.3.2 ReplicationControl ..............................................................................................................................................5
1.4 Disk Array Configuration............................................................................................................................................9
1.4.1 Logical Disk (LD) Selection................................................................................................................................9
1.4.2 Settings of Disk Array Name, Logical Disk Name, and Port Name .................................................................11
1.4.3 Access Control Setting ......................................................................................................................................13
1.4.4 Product License Unlocking ...............................................................................................................................14
1.4.5 Pair Configuration Setting .................................................................................................................................15
1.5 Control Volume Setting............................................................................................................................................. 17
1.5.1 Starting the Volume List Display Function .......................................................................................................17
1.5.2 Registering a Control Volume ...........................................................................................................................18
1.5.3 Saving Registered Data .....................................................................................................................................19
1.5.4 Reflecting Data to the Volume List ...................................................................................................................20
1.6 Volume List Creation ................................................................................................................................................21
1.7 Preparing Volume...................................................................................................................................................... 22
1.8 Preparation for Operation ..........................................................................................................................................28
Chapter 2 Operation and Maintenance ........................................................................................................................... 30
2.1 Operations .................................................................................................................................................................30
2.1.1 Example of Backup Operation ..........................................................................................................................30
2.1.2 Example of Restoring Master Volume Data...................................................................................................... 38
2.1.3 Example of Using Replication Volumes ...........................................................................................................47
2.1.4 Restarting Business/Backup Server...................................................................................................................55
2.2 Measures for Errors ...................................................................................................................................................59
2.2.1 Error Types ........................................................................................................................................................59
2.2.2 HW Fault Unique to Replication .......................................................................................................................59
2.2.3 Server or Client Fault ........................................................................................................................................61
2.2.4 Abnormal End of ReplicationControl................................................................................................................ 62
2.2.5 Down of Server Machine Connected to RV ......................................................................................................66
2.2.6 Invalid Product ..................................................................................................................................................67
2.2.7 Information Gathering in the Event of a Fault ..................................................................................................68
Chapter 3 Notes..................................................................................................................................................................69
3.1 Windows System Volumes and Partitions ................................................................................................................69
3.2 File System Selection ................................................................................................................................................71
3.3 Windows System Selection .......................................................................................................................................71
3.4 Disk Signatures..........................................................................................................................................................71
3.5 Copy Control State Selection ....................................................................................................................................71
3.6 RV Access Restriction Setting ..................................................................................................................................72
3.7 Data Replication and Data Consistency ....................................................................................................................73
3.8 Access Right Settings on Volumes............................................................................................................................76
3.9 Control Volume .........................................................................................................................................................76
3.10 Management and Operations of Data Replication.....................................................................................................76
Index ...................................................................................................................................................................................80
i
This page is intentionally left blank.
ii

Chapter 1 Installation Procedure

Chapter 1 Installation Procedure
This chapter describes the system installation procedures showing an example of a tape backup system that uses
the 2000 series disk array subsystem.
1
.
1
I
n
s
t
a
l
l
a
t
i
o
n
P
r
o
c
e
d
u
r
e
1
.
1
I
n
s
t
a
l
l
a
t
i
o
n
P
r
o
c
e
d
1
.
1
I
n
s
t
a
l
l
a
t
i
o
n
P
r
o
c
Installation works are outlined below. For details of the procedures, refer to the associated sections.
1. Determining the system configuration y Select necessary hardware
configuration.
y Select necessary software
configuration.
1.2.1 Hardware Configuration
1.2.2 Software Configuration
e
d
u
u
r
e
r
e
2. Installing software
y Install/uninstall/update iSM y Install/uninstall/update
ReplicationControl
3. Determining the disk array configuration y Select necessary logical disk
(LD) configuration.
y Assign an identification name to
the management target hardware.
y Set AccessControl according to
the connection state.
y Unlock the product license. y Configure a pair.
4. Setting a control volume
Only when a control volume is
used
1.3.1 Replication Management
1.3.2 ReplicationControl
1.4.1 Logical Disk (LD) Selection
1.4.2 Setting of Disk Array Name, Logical Disk Name, and Port Name
1.4.3 AccessControl Setting
1.4.4 Product License Unlocking
1.4.5 Pair Configuration Setting
1.5 Control Volume Setting
5. Creating the volume list 1.6 Volume List Creation
6. Preparing volumes 1.7 Preparing Volume
7. Preparing the start of operations
1.8 Preparation for Operation
1
Chapter 1 Installation Procedure
p
1
.
2
S
y
s
t
e
1
.
2
S
1
.
2
1
.
2
.
1
1
.
2
.
1
1
.
2
.
1
Select hardware components according to the business conditions, requirements, disk capacity, and so
forth. Figure 1-1 shows an example of hardware configuration.
Business Server (Operated primarily)
To utilize the data replication function most efficiently, it is better to separate business servers,
which process tasks, from backup servers. Thus, tape backup operation gives no additional load
to business servers.
When doing disk backup instead of tape backup, no backup servers are required.
Though the business or backup server may also be used as a management server, using a specific
management server is recommended. To avoid conflicts with host accesses, use of LAN
connection is strongly recommended for connection with disk array.
The disk array accepts any tape drives. Select one of drives authorized by the backup software to
be used.
Connect the path of individual servers, to be connected to the disk array, to the port of different
directors of the disk array, limiting the servers to be accessed by AccessControl.
In the configuration example, the business servers are installed in a cluster and mutually connected
through the LAN specific to interconnection.
Using data replication in the 4000 series or 3000 series requires a separate replication director.
S
H
H
H
Dir No.1 Port No.0
y
y
a
a
a
m
s
t
e
m
s
t
e
m
r
d
w
d
w
r
d
w
LAN Specific for Inter­connection
a
r
Figure 1-1 Hardware Configuration Example
a
a
r
r
C
C
r
o
o
C
o
e
e
e
SwitchSwitch
Dir No.0 Port No.0
C
C
C
n
n
n
o
o
o
f
f
f
n
n
n
i
i
i
g
u
g
u
g
u
f
i
g
f
i
g
f
i
g
Business Server (Standby)
Dir No.1 Port No.1
r
a
r
a
r
a
u
r
a
u
r
a
u
r
Dir No.0 Port No.1
t
t
a
i
o
i
o
t
i
o
t
i
t
i
t
i
n
n
n
o
n
o
n
o
n
Management Server
Backu
LAN
Server
LTO
2
Chapter 1 Installation Procedure
r
A
1
.
2
.
2
S
o
f
t
w
a
r
e
C
o
n
f
i
g
u
r
a
t
i
o
n
1
.
2
.
2
S
o
f
t
w
a
r
e
C
o
n
f
i
g
u
r
a
1
.
2
.
2
S
o
f
t
w
a
r
e
C
o
n
f
i
g
Select software to be used according to the hardware components, operating conditions, etc. Figure
1-2 shows a software configuration example.
Business Serve
(Operated
primarily)
Because business servers are in cluster configuration, let both the administration and standby
business servers belong to the same domain. In both the primary and standby business servers,
install the same business application software.
Install the backup software in the backup server.
Install the management software in the management server. Install the iSM in the management
server.
Install the ReplicationControl in the master and backup servers.
Install the DynamicDataReplication and the RemoteDataReplication in the disk array. From the
server where the iSM is installed, the iSM replication management functions can be executed for
disk arrays where the DynamicDataReplication or the RemoteDataReplication has been installed.
ReplicationControl PathManager
Dir No.1 Port No.0
ccessControl PerformanceMonitor DynamicDataReplication
Figure 1-2 Software Configuration Example
SwitchSwitch
Dir No.0 Port No.0
Storage Manager
Business Server (Standby)
Dir No.1 Port No.1
u
r
Dir No.0
Port No.1
a
t
t
i
o
n
i
o
n
ReplicationControl PathManager
LAN
LTO
3
Chapter 1 Installation Procedure
1
.
3
S
o
f
t
w
1
.
3
S
1
.
3
1
.
3
.
1
1
.
3
.
1
1
.
3
.
1
(1) Operating Environment
Replication Management (Server)
The replication management function is included in the iSM server.
For the operating environment, refer to the “User’s Manual” or “User’s Manual (UNIX)” in
accordance with your OS.
Replication Management (GUI)
The replication management is an expanded function of the iSM client.
For the operating environment, refer to the “User’s Manual” or “User’s Manual (UNIX)” in
accordance with your OS.
(2) Installation
o
S
o
R
e
R
e
R
e
a
f
t
w
a
f
t
w
a
p
l
i
c
p
a
l
i
c
a
l
i
c
p
a
r
e
I
n
s
t
a
l
l
a
t
i
o
n
r
e
I
n
s
t
a
l
l
a
n
n
n
t
l
l
a
t
a
g
a
g
a
g
r
e
I
n
s
t
a
t
i
o
n
M
n
M
M
a
a
a
t
i
o
n
t
i
o
i
i
e
e
e
o
o
n
m
m
m
n
e
e
e
n
t
n
t
n
t
iSM Server Installation
When you install the iSM server, the replication management function of the server is installed.
Refer to the “User’s Manual” or “User’s Manual (UNIX)” in accordance with your OS to install
it.
iSM Server Setting
Create an environment definition file and the environment by referring to the “User’s Manual” or
“User’s Manual (UNIX)” in accordance with your OS.
Replication Management (GUI) Installation
To use the Replication Management of the iSM client, you must install the basic+extended
function.
Refer to the “User’s Manual” or “User’s Manual (UNIX)” in accordance with your OS to install
it.
(3) Software Uninstallation
iSM Server Uninstallation
Refer to the “User’s Manual” or “User’s Manual (UNIX)” in accordance with your OS to uninstall
iSM server.
4
Chapter 1 Installation Procedure
Replication Management (GUI) Uninstallation
Refer to the “User’s Manual” or “User’s Manual (UNIX)” in accordance with your OS to uninstall
the Replication Management (GUI).
(4) Software Update
iSM Server Update
To update the iSM server, uninstall the existing software, and then install the new software.
Replication Management (GUI) Update
To update the iSM client, uninstall the existing software, and then install the new software.
1
.
3
.
2
R
e
p
l
i
c
a
t
i
o
n
C
o
n
t
r
o
l
1
1
.
3
.
2
R
e
p
l
i
c
a
t
i
o
n
C
o
.
3
.
2
R
e
p
l
i
c
a
t
i
o
n
C
o
n
n
t
r
o
l
t
r
o
l
(1) Operating Environment
Operating system
This software operates in the following operating systems.
Microsoft Windows 2000 Advanced Server (SP2 or later)
Microsoft Windows 2000 Server (SP2 or later)
Microsoft Windows Server 2003, Enterprise Edition
Microsoft Windows Server 2003, Standard Edition
Required disk free space
To install the ReplicationControl, at least 35 Mega-bytes of disk free space are required.
Required memory
To use the ReplicationControl, required memory capacity is shown below.
Microsoft Windows 2000 Advanced Server approx. 2MB or more
Microsoft Windows 2000 Server approx. 2MB or more
Microsoft Windows Server 2003, Enterprise Edition (64-bit) approx. 6MB or more
Microsoft Windows Server 2003, Enterprise Edition (32-bit) approx. 3MB or more
Microsoft Windows Server 2003, Standard Edition approx. 3MB or more
5
Chapter 1 Installation Procedure
(2) ReplicationControl Software Installation
To install ReplicationControl, follow the procedure below.
(1) Log on as the Administrator.
(2) Set the ReplicationControl installation media on CD-ROM drive and execute the following install
program in the CD-ROM drive:
\iSMRC\SETUP.EXE
(3) Follow the directions of the installer.
The following software components are installed:
ReplicationControl
Storage Manager Volume List
To use the ReplicationControl, build the logical volumes to be operated on the disk array, set a pair
of volumes under replication control, and then create a Volume List. Use the iSMvollist command
to create the Volume List.
To use the ReplicationControl through the previously installed job scheduling software or Windows
task scheduler, the services and systems need to restart for recognizing the path names of the
installed execution files.
To install and use both ReplicationControl and SnapControl on the same server, they must be of the
same version.
(3) ReplicationControl Software Uninstallation
To uninstall ReplicationControl, follow the procedure below.
(1) Log on as the Administrator.
(2) Check whether the Storage Manager Volume List or ReplicationControl command is running and
whether the Volume List Display screen is open.
Terminate any running command and close any screen.
(3) Close [Event Viewer] if it is open.
6
Chapter 1 Installation Procedure
(4) Select the deletion of the following software component by using [Add/Remove Programs] ([Add
or Remove Programs] for Windows Server 2003) in [Control Panel] to start uninstallation:
ReplicationControl
(5) Follow the directions of the uninstaller.
The following software components are uninstalled:
ReplicationControl
Storage Manager Volume List
If the Storage Manager Volume List or ReplicationControl command is running or the Volume List
Display screen is open, and uninstallation is performed, a message may appear which prompts you to
reboot the operating system. In this case, be sure to reboot the operating system.
(4) ReplicationControl Software Update
To update the ReplicationControl software, uninstall the existing software, and then install the new
software.
(5) Replication operation option setting
You can set various types of operations when executing a command by using the replication operation
option setting file (iSMrpl.ini).
For details of the replication operation option setting file, refer to the “Data Replication Command
Reference”.
7
Chapter 1 Installation Procedure
ReplicationControl outputs the operation trace (trace log) in the folder iSMrpl\etc\trace under the
folder where ReplicationControl has been installed (\Program Files\NEC\iSMrpl\etc\trace\ by
default) to deal with faults if occur.
In operation trace files, messages output to the standard output, standard error output, event log, and
command trace and the detailed internal information are recorded. These files are used as important
data for analyzing a fault if occurs. For details of information to be collected in the event of a fault,
refer to 2.2.7 “Information Gathering in the Event of a Fault”.
The amount of the output operation trace (file size) and retention amount and period vary depending
on the command execution frequency and other factors. You can set these items optionally by
writing the following option parameters:
[TRACELOG] section
RPLLOGFILENUM
Specifies the maximum number of log files to be saved.
When this option parameter is omitted, up to 10 log files are used sequentially.
RPLLOGFILEMAXSIZE
Specifies the maximum size per a log file to be saved in kilobytes.
When this option parameter is omitted, the size of one log file is about 400 kilobytes.
In ReplicationControl Ver2.1 or earlier, log data recorded during the number of days specified by
option parameter RPLLOG was saved in one log file. This conventional method is not
recommended due to the following reasons:
The saved log file becomes larger in proportion to the command execution frequency.
When the first command is executed after change-of-day, one day’s log out of the retention
period is deleted. Therefore, if one day’s log data to be deleted is large, it takes time to
delete it.
Accordingly, if option parameter RPLLOG has been used, it is advisable to change the setting to that
using the above option parameters RPLLOGFILENUM and RPLLOGFILEMAXSIZE for operation.
8
Chapter 1 Installation Procedure
1
.
4
D
i
s
k
A
r
r
a
y
C
o
n
f
i
g
u
r
a
t
i
o
n
1
.
4
D
i
s
k
A
r
r
a
y
C
o
n
f
i
g
u
r
a
e
e
e
t
r
a
t
l
e
c
t
l
e
c
l
e
c
1
.
4
D
i
s
k
A
r
r
a
y
C
o
n
f
i
g
u
For the disk array to be connected, determine the configuration for using the data replication.
1
.
4
.
1
L
o
g
i
c
a
l
D
i
s
k
(
L
D
)
1
.
4
.
1
L
o
g
i
c
a
l
D
i
s
k
(
1
.
4
.
1
L
o
g
i
c
a
l
D
i
s
According to the disk capacity necessary for business or operation conditions, determine the logical
disk (LD) and hot spare configurations. For the 4000 series and the 3000 series, disk array
configurations are executed by maintenance personnel and therefore should be determined before
installation. To improve the access performance and keep tolerance against physical disk (PD) faults,
assign MV and RV to different ranks. MV and RV to be paired should have the same LD capacity.
If LD configuration is changed after starting the server, be sure to execute the create/display Volume
List command (iSMvollist -cr) after changing the configuration.
Figure 1-3 shows an example of setting five pairs.
RANK00 RANK01 RANK02 RANK03 RANK04
LD00 LD01 LD02 LD03 LD04
PD01 PD00 PD03 PD02 PD05PD04 PD07PD06 PD09PD08 PD0b PD0a PD0dPD0c PD0e
PD11 PD10 PD13 PD12 PD15PD14 PD17PD16 PD19PD18 PD1b PD1a PD1dPD1c PD1e
RANK05 RANK06 RANK07 RANK08 RANK09
LD05 LD06 LD07 LD08 LD09
Figure 1-3 LD Configuration Example (2000 series)
The PD group number for PD and RANK is 00.
One LD is associated with one RANK. (The whole area for one RANK is assigned to one LD.)
LD00 and LD05 are in RAID5 (4+P) configuration.
LD01 to LD04 and LD06 to LD09 are in RAID1 configuration.
Each DE has two spare disks.
LD00 to LD04 are used for MV and LD05 to LD09 are for RV.
* This configuration is just an example. Actual configuration should be determined based on your
business conditions.
k
MV
RV
L
(
L
D
D
S
)
S
)
S
i
o
n
i
o
n
i
o
n
t
t
i
o
n
i
o
n
Spare Disks
9
Chapter 1 Installation Procedure
Figure 1-4 shows an example of setting five pairs and one IV on the backup server as a control volume.
A control volume is used when a server issues control I/O to the relevant disk array. For details of a
control volume, refer to 1.5 “Control Volume Setting”, 3.9 “Control Volume”, and the “Data
Replication User’s Manual (Function Guide)”.
RANK00 RANK01 RANK02 RANK03 RANK04
LD00 LD01 LD02 LD03 LD04
PD01 PD00 PD03 PD02 PD05PD04 PD07PD06 PD09PD08 PD0b PD0a PD0dPD0c PD0e
PD11 PD10 PD13 PD12 PD15PD14 PD17PD16 PD19PD18 PD1b PD1a PD1dPD1c PD1e
RANK05 RANK06 RANK07 RANK08
LD05 LD06 LD07 LD08
Figure 1-4 LD Configuration Example when a Control Volume Is Used (2000 Series)
The PD group number for PD and RANK is 00.
For LD00 to LD09, one LD is associated with one RANK (the whole area for one RANK is assigned
to one LD).
LD00 and LD05 are in RAID5 (4+P) configuration.
LD01 to LD04 and LD06 to LD09 are in RAID1 configuration.
LD00 to LD04 are used for the MV and LD05 to LD09 are for the RV.
For LD0a, only one small-capacity LD is built with a RANK in RAID0 configuration.
LD0a is used for an IV as the control volume.
* This configuration is an example. Actual configuration should be determined based on your
business conditions.
For the disk arrays with pool, you can build a small-capacity logical disk for a control volume. For
details of how to build a control volume, refer to descriptions about building logical disks in the
“Configuration Setting Tool User’s Manual (GUI)”.
MV
RV
RANK09
LD09
Control Volume
RANK0A
LD0a
Spare Disks
10
Chapter 1 Installation Procedure
1
.
4
.
2
S
e
t
t
i
n
g
s
o
f
D
i
s
k
A
r
r
a
y
N
a
m
e
,
L
o
g
i
c
a
1
.
4
.
2
S
e
t
t
i
n
g
s
o
f
D
i
s
k
A
r
r
a
y
N
a
m
e
,
L
o
1
.
4
.
2
S
e
t
t
i
n
g
s
o
f
D
i
s
k
A
r
r
a
y
N
a
m
e
,
D
i
s
k
N
a
m
e
,
a
n
d
P
o
r
t
N
a
m
e
D
i
s
k
N
a
m
e
,
a
n
d
P
o
r
t
N
D
i
s
k
N
a
m
e
,
a
n
d
P
o
You can assign identification names to hardware components managed by the iSM. Identification
names can be given to the following items:
Disk array subsystem name
Logical disk name (plus OS type)
Port name
A disk array subsystem name, logical disk name, and port name may be set without special restrictions,
except character types and character length; however, it is better to set these names considering the
operating conditions and server connection conditions. Determine the OS type according to the
servers connected. They are set from the iSM client. If the LD configuration is changed after
starting the servers, separate all pairs on all servers connected to the LD whose configuration is changed,
and, after changing the configuration, be sure to execute the Volume List create/display command
(iSMvollist -cr).
Table 1-1 Example of Disk Array Name Setting
Disk array subsystem Disk array subsystem name
a
r
t
N
a
m
m
e
e
g
L
o
g
l
i
c
a
l
i
c
a
l
StorageS2130 Tokyo_Customer_DataBase
Remark 1: This is an example of setting a disk array name for administrating database of customers
in Tokyo.
Table 1-2 Example of Setting Logical Disk Names and OS Types
LD No. OS type Logical disk name Remarks
00 DB_DATA_MV MV for DB data file
01 DB_REDO1_MV MV for DB REDO file 1
02 DB_REDO2_MV MV for DB REDO file 2
03 DB_CTL_MV MV for DB control file
04 DB_ARCHIVE_MV MV for DB archive file
05 DB_DATA_RV RV for DB data file
06 DB_REDO1_RV RV for DB REDO file 1
07 DB_REDO2_RV RV for DB REDO file 2
08 DB_CTL_RV RV for DB control file
09
Remark 1: Because logical disks are used by Windows servers, set the OS type as WN (the Windows
Remark 2: This example shows logical disk names reflecting the database configuration.
WN
DB_ARCHIVE_RV RV for DB archive file
operating system default value).
11
Chapter 1 Installation Procedure
Table 1-3 gives an example of setting logical disk names and OS types for an LD configuration
example when a control volume is used (Figure 1-4).
Table 1-3 Example of Setting Logical Disk Names and OS Types (When a Control Volume Is Used)
LD No. OS type Logical disk name Remarks
00 DB_DATA_MV MV for DB data file
01 DB_REDO1_MV MV for DB REDO file 1
02 DB_REDO2_MV MV for DB REDO file 2
03 DB_CTL_MV MV for DB control file
04 DB_ARCHIVE_MV MV for DB archive file
05 DB_DATA_RV RV for DB data file
06 DB_REDO1_RV RV for DB REDO file 1
07 DB_REDO2_RV RV for DB REDO file 2
08 DB_CTL_RV RV for DB control file
09 DB_ARCHIVE_RV RV for DB archive file
0a
WN
BACKUP_CV Control volume
Remark 1: Because logical disks are used by Windows servers, set the OS type as WN (the Windows
operating system default value).
Remark 2: This example shows logical disk names reflecting the database and connection
configurations.
Table 1-4 Example of Setting Port Names
Director No. Port No. Port name Server connected
00 00 DB_SECONDARY
01 00 DB_PRIMARY
00 01 BACKUP_PRIMARY
01 01 BACKUP_SECONDARY
Remark 1: This is an example of setting port names in accordance with the server connection
configuration.
Business server
Backup server
12
Chapter 1 Installation Procedure
1
.
4
.
3
A
c
c
e
s
s
C
o
n
t
r
o
l
S
e
t
t
i
n
g
1
.
4
.
3
A
c
c
e
s
s
C
o
n
t
r
o
l
S
e
t
1
.
4
.
3
A
c
c
e
s
s
C
o
n
t
r
o
l
Normally, in a system without clusters, one volume cannot be connected to more than one server to
prevent data inconsistency due to file update from servers.
To prevent erroneous updates to this volume or erroneous changes to disk configuration on the business
servers, the RV must be separated using Access Control, etc. from the business server that uses the MV.
Furthermore, the MV must be separated from the business server that uses the RV, in the same way.
To prevent errors in control volume operation, the control volume must be connected only to a specific
server by using Access Control etc., so that it is not operated or updated from another server.
Before introducing servers, you must determine the server connection modes and design Access Control
settings. Access Control can be set for individual Ports or WWNs. Setting for Access Control
requires purchasing the AccessControl.
Figure 1-5 shows an example of Access Control setting for individual Ports.
Business Server
(Operated primarily)
MV RV MV
Switch Switch
Access Control
Dir No.1 Port No.0
2000 Series
Figure 1-5 Connection Example in Cluster Configuration
Business Server
(Standby)
Access Control
Dir No.0 Port No.0
S
t
e
t
t
Dir No.1 Port No.1
Dir No.0 Port No.1
i
n
g
i
n
g
Business Server
(Evaluation, Backup)
Access Control
13
Chapter 1 Installation Procedure
Table 1-5 Access Control Setting Example
Director No. Port No. Access Control settings Server connected
00 00
01 00
00 01
01 01
Table 1-6 gives an Access Control setting example for an LD configuration example when a control
volume is used (Figure 1-4).
Table 1-6 Access Control Setting Example (When a Control Volume is Used)
Director No. Port No. Access Control settings Server connected
00 00
01 00
00 01
01 01
When setting the configuration, take care not to overlap the ports (MV side) connected to the business
servers and those (RV side) connected to the evaluation and backup servers.
1
.
4
.
4
P
r
o
d
u
c
t
L
i
1
1
.
4
.
4
P
r
o
d
u
.
4
.
4
P
r
o
d
u
c
c
c
t
L
i
c
t
L
i
c
LD00 to LD04 Business server
LD05 to LD09 Backup server
LD00 to LD04 Business server
LD05 to LD09 and LD0a
e
n
s
e
U
n
l
o
c
k
i
n
e
e
n
n
s
s
e
e
U
U
n
n
l
o
c
l
o
c
k
k
g
i
n
g
i
n
g
Backup server
To use the DynamicDataReplication or the RemoteDataReplication, you must unlock the product
license set in the disk array. To unlock the license, you must purchase the corresponding products for
the capacity category equal to or greater than the total physical capacity of the disk array.
When the replication management is executed by starting up the ReplicationControl, these products
check the licenses of the products purchased whether they are purchased properly.
If the total capacity of the physical disk exceeds the product’s specified capacity because physical disks
are added to the disk array system, no additional pairs can be set or canceled (however, replication
operations for the preset pairs are enabled).
14
Chapter 1 Installation Procedure
1
.
4
.
5
P
a
i
r
C
o
n
f
i
g
u
r
a
t
i
o
n
S
e
t
t
i
n
g
1
.
4
.
5
P
a
i
r
C
o
n
f
i
g
u
r
a
t
i
o
n
S
e
t
1
.
4
.
5
P
a
i
r
C
o
n
f
i
g
u
r
a
t
i
o
n
In the basic pair configuration, one RV is connected to one MV. For certain operation conditions, more
than one RV may be connected, but select the basic or parallel configuration for backup operations. The
MV and RV to be paired must have the same LD capacity and OS type.
S
e
t
t
t
i
n
g
i
n
g
DynamicDataReplication
RemoteDataReplication
Disk Array
Disk Array
MV
Disk Array Disk Array
MV RV
Figure 1-6 Basic Configuration
MV
Figure 1-7 Example of Parallel Configuration
RV
RV
RV
RV
Synchronized
Backup
(Previous day)
Test Environment
15
Chapter 1 Installation Procedure
An RV of a maximum of four volumes can be set for one PV.
For DynamicDataReplication, an RV of a maximum of three volumes can be set at a time, however.
An RV can be allocated to a maximum of two disk arrays for one PV.
The DynamicDataReplication can be set in only one layer in the disk array.
You cannot set dRV directly for dRV.
Volumes with different volume capacities cannot be set as a pair.
Unless the OS type is the same, the pair setting cannot be executed.
Table 1-7 Example of Setting Data Replication
Pair setting
MV RV
DB_DATA_MV DB_DATA_RV
DB_REDO1_MV DB_REDO1_RV
DB_REDO2_MV DB_REDO2_RV
DB_CTL_MV DB_CTL_RV
DB_ARCHIVE_MV DB_ARCHIVE_RV
16
Chapter 1 Installation Procedure
1
.
5
C
o
n
t
r
o
l
V
o
l
u
m
e
S
e
t
t
i
n
g
1
.
5
C
o
n
t
r
o
l
V
o
l
u
m
e
S
e
t
1
.
5
C
o
n
t
r
o
l
V
o
l
u
m
e
A control volume is used when a server issues control I/O to the relevant disk array. Select one of the
logical disks connected to each server for each disk array as the volume for issuing I/O to that disk
array and register the volume in the Volume List.
The use of a control volume has the following effects, in particular, in the backup server environment:
Operation can also be continued even when an RV connected to the server or a link-volume (LV) for
the snapshot function cannot be accessed from the server (operating system) due to a data replication
or snapshot operation.
From a server that is not connected to an MV to be operated, Replicate and Separate can be executed.
The logical disk which can be operated using the control volume from a server is a logical disk which
is allowed to access that server by the Access Control setting for the disk array or a logical disk
paired with a logical disk which is allowed to access that server.
For details of a control volume, refer to 3.9 “Control Volume” also.
For details of the Volume List Display function, refer to the help of the Volume List Display screen or
the “Data Replication User’s Manual (Function Guide)”.
1
.
5
.
1
S
t
a
r
t
i
n
g
t
h
e
V
o
l
u
1
1
.
5
.
1
S
t
a
r
t
i
n
g
t
h
e
.
5
.
1
S
t
a
r
t
i
n
g
t
h
e
V
V
o
o
m
l
u
m
l
u
m
S
e
e
e
e
t
t
t
L
L
L
i
n
g
i
n
g
i
s
t
D
i
s
p
l
a
y
i
s
t
D
i
s
D
p
i
s
p
i
s
t
l
a
y
l
a
y
F
u
n
c
t
i
o
n
F
u
n
c
n
c
t
t
F
u
Click the Windows [Start] button and select [Storage Manager Volume List] and [Volume List Display]
from [Programs] ([All Programs] for Windows Server 2003) to start the Volume List Display function.
i
o
n
i
o
n
Figure 1-8 Volume List Display Screen
17
Chapter 1 Installation Procedure
Then, select [Define Control Volume] in [Operation] in the Volume List Display screen to open the
Define Control Volume screen.
Figure 1-9 Define Control Volume Screen
“Selected Volume List”
Lists already registered control volumes.
“Candidate Volume List”
Lists candidate logical disks that can be registered as a control volume.
1
.
5
.
2
R
e
g
i
s
t
e
r
i
n
g
a
C
o
n
t
r
o
l
V
o
l
u
m
e
1
.
5
.
2
R
e
g
i
s
t
e
r
i
n
g
a
C
o
n
t
r
o
l
V
o
l
1
.
5
.
2
R
e
g
i
s
t
e
r
i
n
g
a
C
o
n
t
r
o
l
A control volume is used when a server issues control I/O to the relevant disk array. You can select
one logical disk for each disk array as a control volume. Prepare a volume such as IV with which the
server can properly issue I/O to the disk array.
Do not select an RV or a link-volume (LV) for the snapshot function as a control volume because it
may enter the Not Ready state during operation.
V
o
u
l
u
m
m
e
e
18
Chapter 1 Installation Procedure
(1) Select a logical disk you want to use as a control volume from “Candidate Volume List”.
(2) Click the [Add] button.
(3) The selected logical disk is registered in “Selected Volume List”.
Figure 1-10 Registering a Control Volume
1
.
5
.
3
S
a
v
i
n
g
R
e
g
i
s
t
e
r
e
d
D
a
t
a
1
.
5
.
3
S
a
v
i
n
g
R
e
g
i
s
t
e
r
e
d
1
.
5
.
3
S
a
v
i
n
g
R
e
g
i
s
t
e
r
Click the [OK] button on the Define Control Volume screen. A confirmation message appears asking
if you want to save definition information.
Figure 1-11 The definition of control volume: Saving Confirmation Screen
Clicking the [Yes] button for the message saves definition information and displays a termination
message. Clicking the [No] button displays the Define Control Volume screen again.
e
d
D
D
a
a
t
a
t
a
19
Chapter 1 Installation Procedure
Figure 1-12 The definition of control volume: Termination Message Screen
Clicking the [OK] button closes the Define Control Volume screen and displays the Volume List
Display screen again.
Clicking the [Cancel] button in the Define Control Volume screen displays a confirmation message
asking if you want to cancel the definition.
Figure 1-13 The definition of control volume: Cancel Confirmation Screen
Clicking the [Yes] button for the message cancels saving of the definition information. The Define
Control Volume screen is closed and the Volume List Display screen appears again.
Clicking the [No] button displays the Define Control Volume screen again.
1
.
5
.
4
R
e
f
l
e
c
t
i
n
g
D
a
t
a
t
o
t
h
e
V
o
l
u
m
e
L
i
s
t
1
.
5
.
4
R
e
f
l
e
c
t
i
n
g
D
a
t
a
t
o
t
h
e
V
o
l
u
m
e
1
.
5
.
4
R
e
f
l
e
c
t
i
n
g
D
a
t
a
t
o
t
h
e
V
o
l
u
Select [Create/Update Volume List] from [File] in the Volume List Display screen to create or update
the Volume List file, reflect the saved registration data of the control volume to the Volume List, and
register it.
When the Volume List file has been created or updated, the Volume List Display screen is
automatically refreshed. Confirm that “Control” is displayed for “Volume Definition” of the logical
disk selected as a control volume.
m
e
L
L
i
s
t
i
s
t
20
Chapter 1 Installation Procedure
1
.
6
V
o
l
u
m
e
L
i
s
t
C
r
e
a
t
i
o
n
1
.
6
V
o
l
u
m
e
L
i
s
t
C
r
e
a
1
.
6
V
o
l
u
m
e
L
i
s
t
C
Creation of Volume List is required before using replication operation command. A Volume List is
created by the iSMvollist command with an argument -cr. Execute iSMvollist command by a user that
belongs to Administrators group.
When you have already performed [Create/Update Volume List] using the Volume List Display
function (screen operation) according to the instructions described in 1.5, “Control Volume Setting”,
you do not have to perform the following operation.
iSMvollist -cr
Upon successful creation of Volume List, the following message appears:
iSM11701: Volume list is created successfully.
t
r
e
a
t
i
o
n
i
o
n
If creation of a Volume List fails, execution of replication operation command is disabled.
Troubleshoot in accordance with an error message or with operation error tracing, create a Volume List
again.
Even under operation with replication, a Volume List must be created again in the following cases.
Failing in updating of Volume List may result in data inconsistency upon execution of replication
operation command.
• Change of disk array settings (disk array name, logical disk name, format)
• Setting/Change of Access Control
• Adding/change/deleting of disk
• Adding/change/deleting of partition
• Adding/change/deleting of drive name on partition, and of drive path mounted on NTFS folder
To use a control volume, before creating or updating a Volume List, check the following:
• A control volume has been selected and registered in advance using the Define Control Volume
function from the Volume List Display screen.
21
Loading...
+ 60 hidden pages