Home

Intel® Storage System Software User Manual

image

Contents

1. Figure 58 Intel Storage System SSR316MJ2 RAID 50 Using 4 Disk Sets 70 Intel Storage System Software User Manual Storage J hs SSM su u ae TIS dia RS 13 T RAID 5 sets Figure 59 Intel Storage System SSR316MJ2 RAID 50 Using 3 Disks Plus a Hot Spare RAID 50 in the Intel Storage System SSR212MA RAID 50 in the Intel Storage System SSR212MA consists of sets using either all the disks in 6 disk sets shown in Figure 60 or n disks so that the single disk acts as a hot spare for the RAID set shown in Figure 61 The RAID 50 n configuration is 5 disks plus a spare disks RAID 5 sets SSM U LAI REM MILE MA LE A A Figure 60 Intel Storage System SSR212MA RAID 50 Using 6 Disk Sets SSM 1 4 id a Lu 8 LAM kl r RAID 5 sets Figure 61 Intel Storage System SSR212MA RAID 50 Using 5 Disks Plus a Hot Spare Intel Storage System Software User Manual 71 Storage Planning RAID Configuration Warning The RAID configuration you choose for the SSM depends on your plans for data safety data availability and capacity growth If you plan to expand your network of SSMs and create clusters of SSMs ch
2. Power Off Feature Registration Boot Devices Module Information Backup amp Restore Lg al Storage H Time ga TCP IP Network i z oe Device Status L Empty a Reporting Active Deactivate Power Off Feature Registration Boot Devices Module Information Backup amp Restore pm T Storage Time TCP IP Network u SSM Administration Device Status gg SNMP Active jen Reporting Figure 47 Viewing Single Boot Device Status Intel Storage System Software User Manual 55 Working with Storage System Modules 3 The status of each compact flash card is listed in the Status column Table 2 Boot Flash Card Status Flash Card Status Description Active The device is synchronized and ready to be used Inactive The device is ready to be removed from the SSM It will not be used to boot the SSM Failed L encountered an I O error and is not ready to be used Intel Storage System SSR316MJ2 If a flash card has a status of Failed select the card and click Activate If the card fails repeatedly it needs to be replaced Empty Intel Storage System SSR316MJ2 The flash card bay on the front of the SSM does not contain a boot flash card or the card in the slot is unreadable Unformatted The device has not yet been used in an SSM It is ready to be activated Not Recognized The device in the flash card
3. 353 Remote Snapshot Details for a Completed Remote Copy 354 Remote Snapshot Details for a Remote Copy in Progress 355 Creating a New Remote Snapshot Schedule ccescceceseeeeeeeesseeeeseneeenees 356 The Remote Setup TAD EEE kk kk kk kek kk kk kK k kK Kr kK 357 Editing a Remote Snapshot Schedule iii Ek 359 Volume Changed from Primary to Remote iELE ken 360 Creating a Snapshot Before Making a Primary Volume into a Remote Volume 361 Finalizing the New Remote Volume iE EEE kk kk 362 Making a Remote Volume into a Primary Volume iE 363 Rolling Back a Primary Volume iii kk kk kek kk k 368 Verifying the Primary Volume Roll Back E kk kk ke 369 Editing a Management GIOUD EEE Ek kek kk kk kk kk KK k ke 370 High Availability Example Configuration LiE keke 372 High Availability Configuration During Failover ccccsceeeeseeeeeeeeeeeeeeeeneeeeeee 372 High Availability Configuration During Failback E EEEhEEEEE 374 High Availability During Failover Example Configuration 375 Affordable Disaster Recovery Example Configuration 376 Restoring from a Remote Volume iiEE EE kk kK KK 377 Restoring from Tape BackU D
4. EEEEEEEE Eker kk kK Queene 232 Viewing a Volume in a ClUSt r EEE Ek kk kk kk kK k KK K kk KK 233 Editing a Vo lU T as yn aku ka ni d d k A b kan s hun aA bean Akan A Qa zan 237 Volume Tal V W kk kk ke kk k kK KA KK KA KAK kk A KA KA KAR kk kk kk RA KAR 246 Creating a New SnapshoOt E EE Ek kek K k k kr k kk KK KK KAK 247 New Snapshot iuE kek kek kek kk Kek kK ke KAKA kK ka kk nenne kk kk 248 Snapshot LA 1 5s 2x y d n la dan n an nakene b an na dik kama wench daah n k Halana x k DEKA ge day k n 248 Viewing the Writable Space Used for a Snapshot EEEEEE U 250 Editing a SAIS INO ccc aedeeccastss contetuandnceaesabene hese gseedes soaceneaseut deaetanctdmcndiuaccesmaaccooetee 251 Intel Storage System Software User Manual Figure 179 Figure 180 Figure 181 Figure 182 Figure 183 Figure 184 Figure 185 Name Field Figure 186 275 Figure 187 Figure 188 Figure 189 Figure 190 Figure 191 Figure 192 Figure 193 Figure 194 Figure 195 Figure 196 Figure 197 Figure 198 Figure 199 Figure 200 Figure 201 Figure 202 Figure 203 Figure 204 Figure 205 Figure 206 Figure 207 Figure 208 Figure 209 Figure 210 Figure 211 Figure 212 Figure 213 Figure 214 Figure 215 Figure 216 Figure 217 Figure 218 Figure 219 Figure 220 Figure 221 Figure 222 Figure 223 Intel Storage System Software User Manual L
5. full_administrator Administrator Figure 105 Sorting Administrative Users Editing Administrative Users 1 Select SSM Administration from the configuration categories 2 Click the Users tab to bring it to the front 3 Select the user to edit from the list of users 4 Click Edit The Edit Administrative User window opens shown in Figure 106 138 Intel Storage System Software User Manual Administrative Users and Groups x User Name 3 40 characters 0 9 a z _ Must begin with a lower case letter Description Administrator 3 40 characters 0 9 a z A Z _ space Must begin with a letter Member Groups full administrator Add Tewa Password Confirm Password 5 40 characters Figure 106 Editing an Administrative User 5 Change the necessary information 6 Click OK Deleting Administrative Users 1 2 3 4 2 Note If you delete an administrative user that user is automatically removed from any Select SSM Administration from the configuration categories Click the Users tab to bring it to the front Select the user to delete from the list of users Click Delete A confirmation message opens Click OK administrative groups Intel Storage System Software User Manual 139 Administrative Users and Groups 140 Intel Storage System Software User Manual 7 Using SNMP The SSM can be monitored using an SNMP
6. Auto Grow Checksum Data Figure 243 Editing a Remote Snapshot 3 Change the desired information and click OK Deleting a Remote Snapshot 1 Log in to the management group that contains the remote snapshot 2 Right click the remote snapshot and select Delete Snapshot from the menu A confirmation message opens 3 Click OK Intel Storage System Software User Manual 351 Remote Copy Monitoring Remote Snapshots Information for monitoring remote snapshots is available from multiple sources Active monitoring features provide you the capability to configure alerts that you view in the Console as well as receiving alerts as emails and through SNMP traps The Console tab view also provides monitoring information for remote snapshots Configuring Active Monitoring Alerts for Remote Copy There are four variables for remote snapshots for which you can configure alerts Notifica tion for these variables automatically come as alert messages in the Console You can also configure Active Monitoring to receive email notification or for SNMP traps The Remote Copy variables that are monitored include Remote Copy status an alert is generated if the copy fails Remote Copy complete an alert is generated when the remote copy is complete Remote Copy failovers an alert is generated when a remote volume is made primary Remote management group status an alert is generated if the connection to a remote manage
7. Device Name Device Type Subdevices Figure 48 Viewing the Storage Configuration Category Storage Configuring and Managing RAID Managing the RAID settings of an SSM includes Choosing the right RAID configuration for your storage needs Setting the RAID configuration e Setting the rate for rebuilding RAID Monitoring the RAID status for the SSM e Starting or reconfiguring RAID when necessary Note The SSM comes configured for RAID 5 Benefits of RAID RAID combines several physical disks into a larger virtual disk This larger virtual disk can be configured to improve both read write performance and data reliability for the module RAID Configurations Defined The RAID configuration you choose depends upon how you plan to use the SSM The SSM can be configured with RAID 0 RAID 1 10 or RAID 5 50 The factory default setting is RAID 5 Number of Disks and RAID The number of disks in the SSM affects the RAID configurations available as illustrated in the following table Number of disks required Intel Storage Intel Storage RAID Level System System SSR212MA SSR316MJ2 RAID 0 from 1 to 12 from 1 to 16 RAID 1 10 2 4 6 8 10 or 2 4 6 8 up to 12 16 RAID 5 50 6or12 4 8 12 or 16 62 Intel Storage System Software User Manual Storage RAID 0 RAID 0 is available for any number of disks in an SSM RAID 1 10 RAID 1 10 requires pairs of
8. u EEE kk kk kK kk KAKA KAK 302 Using License KEYS acesicareariiiran a assoc ee eee n 302 Registering Available SSMs for License Keys eeeeceeeeeeeeeeeeenneeeeeennaeeeseseeeeeeseaeeees 302 Registering SSMs in a Management Group E kk kk kk k kk kek 303 Appendix A Using the Configuration Interface ccccssssseeeeeeeseeeeeeeeeeeeeeeeeeees 307 Connecting to the Configuration Interface ccceccceeeeeseeeeeeeeeeeeeeeaaeeeeeeaaeeeeneneeeeeeeeeaeees 307 Connecting to the Configuration Interface with Windows ccccceesessteeeeeeeeeeeees 307 Connecting to the Configuration Interface with Linux UNIX UUUUUEUE EUEUUU LUE U 308 Logging IPTG TS aS V rl _ _ ss 309 Configuring Administrative Users kk kk K k k kk K k kk KK KAK KK 309 Configuring a Network Connection E EE kk kek kek keke kk K k kK KK KAK KK 310 Deleting a NIC Bond E fee ene eee ee eee ne ee ee KA kK KK rk kK HH 311 Setting the TCP Speed Duplex and Frame Size E iuE kk kk kes 312 Removing an SSM from a Management Group EE kk kk kk kk kk 314 Resetting the SSM to Factory Defaults E EEE kk kk kk kk K k kk 314 Appendix B SNMP MIB Information cccseseeseeeeeeeeeeeeeeeeeeeeeeseeseeeeeeeeeeeeeeeees 315 SNMP AJEN erisera a e E a a Aar Ea a EE dar aE EEEE EEE EEEE EAAS 315 SUPPO ned MIB Senara eee ee ee a E ee tee KE
9. E EEE kk kk kk kk kk kK Kn kk 143 Figure 110 Editing a Host in the Access Control List EE n 144 Figure 111 Editing SNMP Client from the Access Control List E UUUEEEEEEUUUUUUUjUUE 144 Figure 112 Enabling SNMP TAS ccccus cescracacsrasnsadireaausincecunted aaatartanteteascarataseencRadmicnmctannasseras 147 Figure 113 Adding an SNMP Trap Recipi ent LuEiE kk kk kk 147 Figure 114 Viewing the Reporting Window uEu Ek kk kk kk kK KK KK 149 Figure 115 Saving Log Files to a Local Machine EEEE keke 152 Figure 116 Adding a Remote Log iccctcratersotshsccceiceaaisband kk kk kk kk KA KAKA KA KAK KK KA 153 Figure 117 Setting Active Monitoring Variables uEEE keke 155 Figure 118 Adding a Variable Step 1 umE kk kk kk kk K k kK K k kK 156 Figure 119 Adding a Variable Step 2 ELiE kk kk kk kk kk K k KK KA kK 157 Figure 120 Setting Alerts for Monitored Variables EEEE keke 157 Figure 121 Viewing the Monitoring Variable Summary on the Active Window 158 Figure 122 Configuring Email Settings for Email Alert Notifications 161 Figure 123 Viewing the List of Diagnostics uE Ek kk kk KA KA KAR 162 Figure 124 Alert Messages Tab on Console Main Window iueEEEE 165 Figure 125 Viewing Alerts cicisscssasantntecsccasattettcectaas
10. 2 Intel Storage Server Console Installer Complete All of the application features will be installed This option is recommended for users that use SNMP Typical The most common application features will be installed This option is recommended for most users _Frevous_ 2 Intel Storage Server Console Installer Where Would You Like to Install C Program Files Intel Storage Server UI Restore Default Folder Choose A vet Intel Storage System Software User Manual Getting Started 10 Leave Desktop checked if you want the install routine to automatically create a shortcut to the Console on your desktop Click on Next to continue Intel Storage Server Console Installer Select Shortcut locations F Desktop Bi N Previous J Nex I Intel Storage Server Console Installer Would you like to start the Intel Storage Server Console after the installation completes Yes ONo Surneeenry Install Complete Intel Storage System Software User Manual 3 Getting Started 12 Review the Pre Installation Summary and click on Install 2 Intel Storage Server Console Installer Please Review the Following Before Continuing Product Name Intel Storage Server Console Install Folder C Program Files intel Storage Server Ul Product Components SNMP Support Application Disk Space Information for Installation Target Required 104 449 425 byte
11. Name Logged In Boulder 2 al Boulder 3 Cancel Figure 134 List of SSMs Running Managers 2 Select an SSM and click Log In Whatever view of the Console is displayed when you log in to a management group that is the view that returns after logging in to that management group File Find Tasks View Help Available SSMs fm Transaction_Data EEE ERE Denver 2 Denver 3 Completed management group Details Managers Clusters Authentication Groups Volume Lists Register Times Remote Snapshot Management Group Transaction_Data Managers 2 of 3 Local Bandwidth 32768 Kb sec Virtual Manager Yes 2 Status Normal Coordinating manager Denver 1 Management Group Tab View Figure 135 Viewing a Management Group in the Console Intel Storage System Software User Manual 175 Working with Management Groups Management Group Tab View When you have logged in to and selected a management group the management group Tab View opens The tabs provide access to management group information and features such as viewing management group properties registering features and creating clusters and authentication groups Details Tab Details about the management group are listed along with the Task menu for taking action on the management group Information provided on the Details tab includes The name of the management group The number of managers operating
12. eee eeeeeeeee kk kk kk ke k k k 73 Planning RAID for Capacity Growth LEEEL EEE kk kk kek kk kk kK KK KH 74 Requirements for Configuring RAID kk kk kk ek kk k k kK rk kK KAK 74 Placement of Disks in the SSM ssccicessteucdisniavereonsantan eecenacaonieasamennnn de kk kek kake k KK kK KK KK 74 Management Groups and RAID E kk kk kk k k k kk KK kk kk KA 75 Clusters and RAID i u keke keke kk kk k k rk KK KK KAK KK kK A KA kK KK rk 75 N NN NAT wg n mm 75 Setting RAID Rebuild Rate for RAID 1 10 or RAID 5 50 76 Starting RAID xi c kinisi lan n bl nlu al n lan bil aetanenteeny alal an n v kana b n bke ea EMANA 76 BAND NNN N rb wel gr 77 Monitoring RAID Status sons tacts cess kk ek ke cactentansntdanactenendanGacaneestontnds 78 Intel Storage System Software User Manual Contents Replacing Disks and RAID kk kk keke kK kK KK kK kk kk KK A A KAK R 80 Ma aging DISKS can isen mana ka zi katan k na V k ak Hakan kin Wn San den GR k A k kah ke Vl WW A RAWAN EAEEREN R 80 Getting Ta Ka nbKkK2 gxx D9 KK xDxy 22 zh y2 80 Using the Disk RepOrl s i l kar nd alan na Raw lln k kak ker lik nek n kal kine ana an W balan b d e ka Saw Vu 83 Verifying Disk Status EEL oer ee secs ease keke kek keke kek k kk KK kK KK KK KAK KK KK KK KHK acess 83 Replacing DISK asc cand kalik dk kk lk a nin bidan w dk yak
13. Available SSMs These SSMs are available for u Zj Show Launch Pad on startup Name This Vizard Launch Pad and the wizards are available via the Help menu foftware Version 21 Select the storage system in the main window by double clicking on the icon for the system 8 Intel Storage System Software User Manual Getting Started 22 Enter the user name and password for the storage system The Edit Configuration window should display Edit Configuration for SSM 1 10 1 1 10 Power Off Feature Registration Boot Devices a eli Module Information r Backup amp Restore TCP IP Network Sn SSM Administration ge SNMP a Reporting a Host Name SSM 1 Apply IP Address 10 1 1 10 Model SSR212MA Serial Number 00 04 23 BB E4 5C Software Version 6 3 70 0009 0 Install Software Logged In User admin Change Password ID LED Off Set ID LED On togou 23 Select the storage link in the left hand navigation screen Edit Configuration for SSM 1 10 1 1 10 Module RAID Setup Disk Setup p Disk Setup qi Stor Time RAID Status orr Start RAID E TCP IP Network n SSM Administration RAID Configuration RAID 0 v fe SNMP Reconfigure RAID Reporting The RAID Rebuild Rate is a percentage of RAID card throughput Percent c TH je io wt ip om ava a 1 10 20 70 80 90 100 Apply Device Name Device Type Subdevices deviscsi host0
14. uiEE Ek kk kk kk AKA KAK KK KRA 377 Off site Backup and Recovery Example Configuration 380 Non destructive Rollback Example uEEE EEE k kk 382 Non destructive Rollback from the Primary Snapshot EE UEUUEEUU U E L L 383 Non destructive Rollback from the Remote Snapsho t 384 Data Migration Example Configuration E i keke 385 Configuration after Data MigratiOn i EEE kek 386 Intel Storage System Software User Manual List of Tables List of Tables Table 1 SSM Configuration TA SKS EE Ek kk kek kek kk kK k kK K KA KK KA kk 15 Table 2 B o t Flash Card Stat seserinis yaka k o d e aa kake ena a n k ke nun a K R 56 Table 3 Data Availability and Safety in RAID 1 10 Configuration and in a Clustered RAID 0 or RAID 5 50 Configuratio sisser e entree ener Wak a verd n bad da kud d na W n Daka ee RA D N 74 Table 4 Intel Storage System SSR316MJ2 Disk Requirements for Maintaining RAID Quorum 78 Table 5 Intel Storage System SSR212MA Disk Requirements for Maintaining RAID Quorum 78 Table 6 Relationship of Software Disk Display Numbering to Hardware Drive Bay Numbering in the Intel Storage System SSR316 VJ2 uE kk kk kek k k kk K k kK 81 Table 7 Description of items on the disk repOrt EE kk kk kk 83 Table 8 Memory
15. Figure 142 Opening the Configuration Binary File 3 Navigate to the location of the configuration binary file 4 Select the file and click Restore Management Group The Verify Management Group Configuration window opens shown in Figure 143 Verify Management Group Configuration Management Group Name Transaction_Data Local Bandwidth 32768 Kb sec Remote Bandwidth 32768 Kb sec Database Version 6 1 Virtual Manager None Communication Mode Multicast Off Unicast On Unicast IPs 10 0 33 35 10 0 33 18 10 0 33 13 Authentication Groups Name AuthGroup_0 Description Y 4 gt Restore Management Group Cancel Figure 143 Verifying the Management Group Configuration 5 After you have reviewed the configuration parameters click Restore Management Group The management group is restored 188 Intel Storage System Software User Manual Working with Management Groups Deleting a Management Group Delete a management group when you are completely reconfiguring your network storage Warning When a management group is deleted all data stored on SSMs in that management group are lost Prerequisites Logging in to each SSM in the management group e Stopping the virtual manager and managers on the individual SSMs 1 Log in to the management group in the Network View The management group Tab View opens From the Tasks menu on the Details tab select Delete Management Group A confirma
16. View and configure the TCP interface speed duplex and frame size Update the list of managers running in an SSM s management group Bond NICs to ensure continuous network access or to improve bandwidth Getting There 1 On the Network View double click the SSM and log in The SSM Configuration window opens 2 Select TCP IP Network from the SSM configuration categories The window opens with the TCP IP tab on top shown in Figure 69 Module H Storage Time J SSM Administration H g SNMP L Reporting togou TcPaP TCP Status DNS Routing Communication Name Description MAC Mode IP Subnet Gateway Type Motherboard Port0 Intel Corp 00 07 E Static IP 10 0 7 255 25 10 0 1 Motherboard Port1 Intel Corp 00 07 E Disabled 0 0 0 0 0000 0 0 0 0 NIC NIC New Bond Delete Bond Figure 69 Viewing the Network Configuration Managing the Network The TCP IP Tab The TCP IP tab lists the network interfaces on the SSM You can configure each of these interfaces Table 9 Network interfaces Displayed on the TCP IP Tab Name Description NICs Embedded in the SSM Motherboard Motherboard Port1 1000BASE T interface Motherboard PortO 1000BASE T interface Add on NICs in PCI Slots Slot1 PortO Multiple add in PCI cards each en cc N and so on Bonded Interfaces bondN O
17. 2 Right click the volume in the network view and select Edit Volume The Edit Volume window opens 3 Change the Type from Primary to Remote Notice that the window changes to the Edit Remote Volume window and all the fields are greyed out as shown in Figure 250 Additionally the values in the size hard threshold and soft threshold fields are set to Li x x Edit Volume Edit Remote Volume Type Primary Remote Type Primary Remote Volume Name Volume Name Description Description Created Created Cluster TransData05 Vv Cluster Replication Level 2 Way kuz Replication Level Replication Priority Availability Redundancy Replication Priority Size 8 0 GB v Max Size Hard Threshold 3 0 GB v Max Hard Threshold Soft Threshold 3 0 GB v Max Soft Threshold Auto Grow Off Auto Manual Auto Grow Checksum Data O Yes No Checksum Data Cancel Cancel Primary volume with size hard and electing Remote changes the volume to soft thresholds defined a remote volume with the size hard and soft thresholds set to 0 Figure 250 Volume Changed from Primary to Remote 4 Click OK The Make Volume Remote window opens shown in Figure 251 360 Intel Storage System Software User Manual Remote Copy Make Volume Remote Make Volume Remote WARNING Changing this primary volume to a remote volume can result in data loss if any hosts are accessing thi
18. Configuration Category Parameters Snapshot Schedule Intel Storage System Software User Manual 341 Remote Copy Table 62 Remote Copy Planning Checklist Configuration Category Parameters Start Time Date and time for the schedule to begin Start date mm dd yyyy Start time mm hh ss Recurrence e Recurrence v Recurrence is a yes no choice You can schedule a remote snapshot to occur one time in the future and not have it recur Frequency minutes hours days or weeks Primary Setup Hard Threshold Set the hard threshold and soft threshold for the primary snapshot Soft Threshold Retention Retain either Maximum number of snapshots Set period of time minutes hours days or weeks Remote Setup Management Group The management group to contain the remote snapshot Volume The remote volume for the remote snapshots Retention Retain one of the following Maximum number of snapshots This number equals completed snapshots only In progress snapshots take additional space on the cluster while they are being copied Also the system will not delete the last fully synchronized snapshot For space calculations figure N 2 with N maximum number of snapshots Set period of time minutes hours days or weeks Working with Remote Snapshots Remote snapshots are the core of Remote Copy You use the existing volume and snapshot capabilit
19. IP or HostName Status 10 0 33 25 Found 10 0 33 35 Found 10 0 7 11 Found Add Edit Delete Figure 9 Using IP or Host Name to Search Adding IPs or Host Names Use the following steps to add specific IP addresses or host names to the list 1 Click Add The Add IP or Host Name window opens 2 Type in the IP or Host Name for the module 3 Click OK 4 Repeat steps 1 through 3 for each module you want to find 5 Click Find all Intel Storage System Software User Manual 25 Getting Started Editing the IP or Host Name in the Search List Use the following steps to change the IP or Host Name of an SSM in the list used to search for modules 1 2 SS vn A U Click the Find menu Click By Module IP or Host Name The IP and Host Name List window opens shown in Figure 9 Select the IP Host Name you want to edit Click Edit The Edit IP or Host Name window opens Change the necessary information Click OK to return to the IP and Host Name List window Deleting the IP or Host Name in the Search List Once you enter an IP or host name in the IP and Host Name List that entry is saved Every time you open the Console a search for all the IPs and host names occurs You can delete an IP from the list if you no longer want to search for that SSM 1 2 SS vn A U 26 Click the Find menu Click By Module IP or Host Name The IP and Host Name List window opens shown
20. Model The model of the disk in the SSM Serial Number The serial number of the disk Class The class type of disk The SSM uses SATA disks Capacity The data storage capacity of the disk Status Whether the disk is Active and participating in RAID Status column Active other columns with information On but not participating in RAID Status column Uninitialized other columns with information Not on Status column Off or Missing other columns with dashed lines DMA Off disk unavailable due to faulty hardware or improperly seated Verifying Disk Status Check the Disk Setup window to verify that all the disks in the SSM are active and participating in RAID Replacing a Disk Prerequisite Always power the drive off before removing and replacing a disk See Powering Drives Off on page 87 Intel Storage System Software User Manual 83 Storage Replacing Disks in RAID 0 If you lose a disk in RAID 0 you will lose all of the data on the SSM and you will have to rebuild the SSM to recover any replicated volumes within a cluster If RAID 0 is configured but data redundancy is achieved by replication of data within a cluster of SSMs then data is not lost See Repairing an SSM on page 215 In order to make the SSM functional again you must replace the disk and reconfigure RAID 0 1 Remove the SSM from the management group 2 See Removing an SSM
21. Remove from Management Group Start Manager Stop Manager ailabili Click Start Manager Start Virtual Manager Stop Virtual Manager irtual Manager No Repair SSM Swap in Hot Spare UCU Ui Normal Manager Up Not a Virtual Manager Edit Configuration Copy Configuration Log Out Figure 132 Starting a Manager 3 Repeat steps 1 and 2 to start managers on additional SSMs Logging In to a Management Group You must log in to a management group to administer the functions of that group Note Log in to a management group by logging in to an SSM that is designated as a manager for that management group 1 Click Log In on the management group in the Network View shown in Figure 133 File Find Tasks View Help a Available SSMs 7 Transaction Data mu Se Denver 2 Denver 1 Denver 3 ba Click Log In Details Management Group Information Management Group Transaction_Data Manager Yes Hot Spare NA Virtual Manager No Migrating Data NA Status Storage Server Normal RAID Normal Manager Up Not a Virtual Manager Figure 133 Logging in to a Management Group 174 Intel Storage System Software User Manual Working with Management Groups The Manager Log In List window opens shown in Figure 134 Any SSMs to which you are already logged in display Yes in the Logged In column Manager Log in List x Select a manager to log in to
22. al 2 way CHAP CHAP is optional However if you configure 1 way or 2 way CHAP you must remember to configure both the authentication group and the iSCSI initiator with the appropriate parameters Table 49 The table lists the requirements for configuring CHAP Intel Storage System Software User Manual 273 Controlling Client Access to Volumes Requirements for Configuring CHAP Table 49 Configuring iSCSI CHAP What to Configure in the What to Configure in the iSCSI Char Level Authentication Group Initiator CHAP not required e Initiator node name only No configuration requirements 1 way CHAP CHAP Name see note below Enter the target secret when Target Secret logging on to available target 2 way CHAP CHAP Name Enter the initiator secret e Target Secret Enter the target secret e Initiator Secret Note If using CHAP with a single node only use the initiator node name as the CHAP name Sample iSCSI Configurations Figure 185 illustrates the configuration for a single host authentication with CHAP not required New Authentication Group iSCSI Initiator Properties xj New Authentication Group General Discovery Targets Persistent Targets Bound Volumes Devices Name AuthGroup_d The iSCSI protocol uses the following information to uniquely n identify this initiator and authenticate targets Description Volume List No Volume L
23. Note For information about powering off the module manually see the Technical Product Specification TPS provided with the SSM Registering Features for an SSM Using the Feature Registration tab you can register individual SSMs for add on modules and applications such as Remote Copy You can also register SSMs when they are in a management group For detailed information about registering see Registering Features and Applications on page 302 Using the Feature Registration Tab The Feature Registration tab as shown in Figure 44 displays the following information The SSM serial number used to obtain a license key The license key for that SSM if one has been purchased Which if any add on modules or applications have been licensed Power Off Feature Registration Boot Devices Module Information Backup amp Restore Storage Time TCP IP Network Ju SSM Administration Registration is required for additional software features Current feature g SNMP registration license keys are displayed below For additional feature la Reporting registration please contact your storage provider and be prepared to provide the serial number s indicated below SerialNumber 429JMMJ00919 License Key Not licensed for Manual Snapshot Pak Not licensed for Scalability Pak Not licensed for Remote Data Protection Pak Not licensed for Configurable Snapshot Pak Figure 44 Viewing the
24. x a inka s kana b k k ade kak kes aA k kunka cap ka kak kak a k la a a b kaa b a 130 Adding Administrative Group Permissions E kek kk kk kk kek 132 Description of Administrative Group Permissions E uE Eke 133 Editing Administrative Groups ELui EEE kek kk k kk k K k kk KK KK KA KA KA 134 Deleting Administrative Group Eu Ek kk ek kk kk ka kk KK k kk KAK YA 136 Managing Administrative Users Ek kk kK kk KK KA KK AK kk KA eee 136 Adding Administrative Users Mh EEE k KK kK KA KAK KAK KAR KK KA KIRA KA 136 Editing Administrative Users cic ceruccaneusstannpeicnnvteeewanpneds cepeivuacoamenmnes kaka kak k KAKA kk kk kK kK KA 138 Deleting Administrative Users MA A hk lLE kak kk kaka ak kk KAK k kK KAK KK AHA 139 Chapter 7 USING SNMP cssscnissessicrisetnissscidacanadawawetsccaressnnrenerneenscueussormaanenssieaneaaunen 141 Getting There seed ca cence HHHH HHHH 141 Enabling the SNMP 219 210 ieee eee ene ene ee ee eee 142 Choosing Access Control ELUL keke kk keke k kk kK KK kK KK kK KK eases 143 vi Intel Storage System Software User Manual Contents By FOGG ainut pinsi aia aa aaa Ra aN accu tagan Saa REE EAN AEA NERENS es 143 SN HW Perr r lee g2xm m 143 Editing Access Control Entries L E E kk kk ek k ek kk k KK KA kk 144 Deleting Access Control Entries EELELEE kk kk k keke kK Kek KK KA kk KK kk KK 145 Entering System Inf
25. 242 Intel Storage System Software User Manual Working with Snapshots Managing Capacity Using Volume and Snapshot Thresholds How Snapshots are Created When you create a snapshot of a volume the original volume is actually saved as the snapshot and a new volume the writable volume with the original name is created to record any changes made to the volume s data after the snapshot was created Subsequent snapshots record only changes made to the volume since the previous snapshot Hard Thresholds and Snapshots One implication of the relationship between volumes and snapshots is that the space used by the writable volume can become very small when it records only the changes that have occurred since the last snapshot was taken This means that less space or a smaller hard threshold may be required for the writable volume You can save space on your cluster of SSMs by estimating the size required for the changes in data between snapshots and decreasing the hard threshold of each snapshot accordingly This planning is particularly important if you plan to use a series of snapshots to protect against data corruption For more information about hard thresholds and volumes see Planning Hard Thresholds on page 221 Deleting Snapshots One important factor in planning capacity is the fact that when a snapshot is deleted the snapshot s hard and soft thresholds are added to the snapshot or volume directly after it Hard a
26. Primary Man Primary Sna Remote Man JRemote Sna Complete Elapsed Time Data Copied Rate State Transaction Snapshot 0 Transaction Snapshot_1 100 s 25 MB 157 Kbisec Complete Figure 240 List of Remote Snapshots Setting the Remote Bandwidth The remote bandwidth sets the maximum rate for data transfer between management groups The remote bandwidth setting is the upper limit of the range of data transfer that is the copy rate will be equal to or less than the rate set The remote bandwidth specifies the speed at which data is received from another management group This means that to control the maximum rate of data transfer to a remote snapshot set the remote bandwidth on the management group that contains the remote snapshot 1 Right click the remote management group and select Edit Management Group The Edit Management Group window opens shown in Figure 241 Intel Storage System Software User Manual 349 Remote Copy Edit Management Group Edit Management Group Group Name Local Bandwidth 32768 KbiSec Remote Management Groups Management Gr Logged In Remote Bandwi J Connected Transaction_D Yes 32768 Kb sec Yes Disassociate Edit Bandwidth Cancel Figure 241 Editing a Remote Management Group 2 In the Remote Management Groups section click Edit Bandwidth The Edit Remote Bandwidth window opens Edit Remote Bandw
27. Storage System Software User Manual Controlling Client Access to Volumes Finishing Up the New Authentication Group 1 Click OK on the New Authentication Group window when you are finished The Network View opens Go to the Authentication Group tab to see the new group displayed in the list shown in Figure 199 Details Managers Clusters Authentication Groups Volume Lists Register Times Remote Snapshot Na Volume List iSCSI Mode Initiator Node Na J EBSD Mode Fibre Channel Namen WPN_ AG_TransDataR Volume List 2 _ No access No Access Access Allowed bkupSS 1adfe23 AG_AcctRec Volume_List_1 No CHAP required ign 1991 05 com No Access No Access AG_AcctPay Volume_List_0 No CHAP required iqn 1991 08 com No Access No Access Figure 199 Viewing the Authentication Groups Editing an Authentication Group You can edit the following Change the description Adda volume list Change the types of authentication in either of those modes Warning Depending on your configuration editing an authentication group may interrupt client access to volumes If necessary stop client access before editing an authentication group See Client Access and iSCSI on page 272 and Client Access and Fibre Channel Intel Storage System SSR316MJ2 only on page 277 before changing iSCSI or Fibre Channel authentication group parameters 1 Log into the management group and select that
28. Storage System Software User Manual Remote Copy How Remote Copy Works Replicating data using Remote Copy follows a three step process 1 At the production location you create a snapshot of the primary volume this is called the primary snapshot 2 You create a remote volume at the remote location and then create a remote snapshot The remote snapshot is a snapshot of the empty remote volume and it is linked to the primary snapshot 3 The system copies data from the primary snapshot to the remote snapshot 1 System takes a snapshot 2 System creates an empty snapshot of the primary volume of the remote volume Primary Volume Remote Volume Read Write i J Pointer to remote Accessed by H 3 snapshots application server Source for primary snapshots Primary Snapshot Remote Snapshot Primary Location Remote Location 3 System copies data from the primary snapshot to the remote snapshot Figure 230 Basic Flow of Remote Copy Note Both primary and completed remote snapshots are the same as regular snapshots Chapter 13 Working with Snapshots Note Remote Copy can be used on the same site even in the same management group and cluster Intel Storage System Software User Manual 335 Remote Copy Graphical Representations of Remote Copy The Storage System Console displays special graphical representations of Remote Copy Copying the Primary Snapshot to the Remote Snapshot When the primary snapsho
29. Volume Lists Tab Volume lists are created at the management group level and provide the connection between authentication groups and volumes Information provided on the Volume Lists tab includes Name of the volume lists Name of all volumes within the volume lists e Authentication group associated with the volume list Register Tab Register to use add on modules available for specialized storage features See Chapter 16 Feature Registration for more information about registering add on modules Information available on the Register tab includes Version information about the software components of the system The version information is provided for customer support should you ever have a support issue License information for all the SSMs in the management group Times Tab Resynchronize the management group time any time you change the time on an SSM in the management group that is running a manager Note Use NTP to ensure closely synchronized times on the SSMs in the management group Information available on the Times tab includes Current time setting of the management group Current time setting of each SSM in the management group Intel Storage System Software User Manual 177 Working with Management Groups Remote Snapshot Tab The Remote Snapshot tab lists details for the remote snapshot including e Primary and remote management groups and snapshots Copy rate percent complete and statu
30. marginal Value does not equal Jun 7 14 01 13 Golden 3 hydra Drive 4 Health Status marginal Value does not equal Jun 7 14 04 13 Golden 3 hydra Drive 2 Health Status marginal Value does not equal Jun 7 14 04 13 Golden 3 hydra Drive 3 Health Status marginal Value does not equal Jun 7 14 04 13 Golden 3 hydra Drive 4 Health Status marginal Value does not equal Figure 125 Viewing Alerts 4 To refresh the list of alerts click Refresh Intel Storage System Software User Manual 165 Reporting 5 Optional To save the list of alerts click Save to File Then select a location for the file 166 Intel Storage System Software User Manual Working with Management Groups A management group is a collection of one or more SSMs It is the container within which you cluster SSMs and create volumes for storage Creating a management group is the first step towards maximizing the clustering capacity of the SSM Management groups serve several purposes To organize your SSMs into different groups for different functional areas of your organization For example you might create a management group for your Oracle applications and a separate management group for user file share storage To ensure added administrative security For example you could give one storage administrator access to the SSMs in one management group but not in another management group To prevent some storage resource
31. Enter The Configuration Management window opens shown in Figure 228 General lt Remove from management group gt Reset to factory defaults Figure 228 Removing the SSM from a Management Group 2 Tab to Remove from management group and press Enter A window opens warning you that removing the SSMfrom the management group will delete all data on the SSM and reboot the SSM 3 Tab to Ok and press Enter 4 On the Configuration Management window tab to Done and press Enter Resetting the SSM to Factory Defaults Resetting the SSM to factory defaults deletes all data and erases the configuration of the SSM including administrative users and network settings Warning Resetting the SSM to factory defaults deletes all data on the SSM 1 On the Configuration Interface main menu tab to Config Management and press Enter The Configuration Management window opens shown in Figure 229 General Figure 229 Resetting to Factory Defaults 2 Tab to Reset to factory defaults and press Enter A window opens warning you that resetting the SSM configuration will delete all data on the SSM and reboot the SSM 3 Tab to Ok and press Enter 4 On the Configuration Management window tab to Done and press Enter 5 Use the default User Name admin and Password storage to log in to the SSM 314 Intel Storage System Software User Manual B SNMP MIB Information SNMP Agent The SNMP Agent res
32. Figure 33 Viewing ID LED Indicator on Front of Module When you click Set ID LED On the status changes to On and the button changes to Set ID LED Off as shown in Figure 34 Software Version 6 3 70 0010 0 install Software ID LED toggles on and off Logged In User admin Change Password ID LED On Set ID LED Off Figure 34 ID LED Indicator 3 Click Set ID LED Off when you are finished The LED on the module turns off and the button returns to Set ID LED On Upgrading the Storage System Software When you upgrade the Storage System Software the version number will change You can view the current software version on the Module Information tab in the SSM configuration window or on the SSM Details tab in the Network View Prerequisites Intel Storage System SSR316MJ2 Both flash cards must be present before upgrading the software Stop any applications that are accessing volumes that reside on the SSM you are upgrading 44 Intel Storage System Software User Manual Working with Storage System Modules Copying the Upgrade Files from CD or FTP Site Upgrade the Storage System Software on the SSM when an upgrade or a patch is released The Storage System Software upgrade installation takes about 5 to 8 minutes including the SSM reboot Note The 88M must contain both boot flash cards in order to upgrade the storage system sofiware See Configuring Boot Devices on page 54 1 Download the u
33. Normal Operation 2 regular managers 2 regular managers 1 virtual manager started 1 virtual manager started Scenario 1 Communication link is lost Virtual manager started on both sites 2 regular managers 2 virtual managers started Scenario 2 Site A goes down Two virtual managers started on Site B Warning Examples of what NOT to do when using a virtual manager to regain quorum Figure 145 Incorrect Uses of Virtual Manager to Regain Quorum 194 Intel Storage System Software User Manual Disaster Recovery Using A Virtual Manager Configuring a Cluster for Disaster Recovery In addition to using a virtual manager you must configure your cluster and volumes correctly for disaster recovery This section describes how to configure your system including the virtual manager Best Practice The following configuration steps ensure that you have all the data replicated at each site and the managers configured correctly to handle disaster recovery For the following example we are configuring two sites with two SSMs at each site for an even number of SSMs The management group contains one cluster The cluster contains four SSMs and one volume with 2 way replication that spans both sites That volume must contain all the data in each site Configuration Steps Name SSMs with Site Identifying Host Names To ensure that you can easily identify in the Console which SSMs reside at each site use host names that ident
34. Remote Copy No Yes 15 Console alert if true Failovers minutes Remote Copy No Yes 15 Console alert if fails Status minutes Remote No Yes 1 minute Console alert if Management changes Group Status Snapshot No Yes 1 minute Console alert if Status snapshot status changes Intel Storage System Software User Manual Reporting Table 32 List of Variables Available for Active Monitoring a 2 Perm Specify Default Default Action Varlable Name Units Variable Freq Freq Threshold Storage Server No Yes 1 minute Console alert if not Status up Volume No Yes 1 minute Console alert if Restripe completed Complete Volume Status No Yes 15 Console alert if minutes volume status changes Volume No Yes 15 Console alert if Thresholds minutes threshold exceeded for any volume or snapshot in the mgt group Setting Email Notification If you request email notification on the Active tab you set the email addresses to receive the notifications there You then use the Email tab to configure the SMTP settings for email communication For more information on configuring active monitoring see Using Active Monitoring on page 154 To complete the request for email notification that you configured for monitored variables 1 In the Reporting category select the Email tab The Email window opens shown in Figure 122 m Module Passive LogFiles Activ
35. Sample Device Entry in etc ebsd conf HHEEREE EE EE HEHE HH HEHE HEE Sample devic ntries deviceO type volume client_name myclient ip_bind 10 0 1 63 management_group my_mgtgroup auth_group public volume_name my_volume_0 access_mode rw use_unicast true unicast_list 10 0 0 12 10 0 0 13 nabled tru use_multicast false HHPHEEEEEEREEEEE EEE HEE HF devicel type volume client_name myclient ip_bind 10 0 1 63 management_group my_mgtgroup auth_group public volume_name my_volume_1 access mode rw use_unicast true unicast_list 10 0 0 12 10 0 0 13 nabled tru use_multicast false Intel Storage System Software User Manual Using the EBSD Driver for Linux Connecting the EBSD Devices to the SSM EBSD Server 1 Run the startup script which will spawn a child process for the new device etc init d ebsd start loads the driver 2 Start and wait until all devices are online There is a timeout of two minutes Verifying EBSD Devices The EBSD driver creates a block device for each volume 1 Check the current status of the device entries Use cat proc ebsd client It should say online suzyl cat proc ebsd client Version 04 04 03 4 1 14 0004 Majors 176 177 178 Device 0 my mgtgroup 0 my_ volume _0 Status Online Active Read 0 B Requests 0 Write 0 B Requests 0 Ops 0 sync 0 Cycles 147 BSize 512 Capacity
36. Select Reporting from the configuration categories The Reporting window opens 2 Click Refresh to display statistics on the Passive tab 3 Scroll down to the Fibre Channel statistics The Node WWN is the same for all ports in a management group The Port WWN is unique for each port Intel Storage System Software User Manual 93 94 Managing the Network Module 0 Storage Time is TCP IP Network tem a SSM Administration L g SNMP Passive Log Files Active Email Diagnostics Alerts Value Fibre Channel Items Device Port Model QLogic 2312 Device Number 0 Channel Number 0 ode S IRQ 52 Node WWN 5000eb3337fce755 the same for Port WWN 5000eb3 111081b00 lt lt all ports in the Status one Device Port Port WWN is unique for management Model Qlogic 2312 Device Number 1 each Fibre Channel port group Channel Number 0 IRQ 53 Node WWN 5000eb3337fce755 Port WiWN 5000eb3131081b01 am v Status enabled Log Out Refresh Save to File ID Advanced Figure 73 Viewing the WWN of a Fibre Channel Port Configuring the IP Address Manually Use the TCP IP Network category in the SSM configuration window to configure the IP address for an interface Note Any time you change an IP address of an SSM that is running a manager the volumes on the SSM may become inaccessible to hosts configured to access the volume You must reconfigure all h
37. The Edit Speed and Duplex window opens shown in Figure 85 Intel Storage System Software User Manual 111 Managing the Network Edit Speed Duplex and Frame Size Name Motherboard Port0 Speed Duplex Speed Auto Auto Duplex Frame Size Default O Set to Figure 85 Editing TCP Speed Duplex and Frame Size 3 Select the combination of speed and duplex that you want 4 Click OK A series of status messages display Then the changed setting displays in the TCP status report Note You can also use the Configuration Interface to edit the TCP speed and duplex See Setting the TCP Speed Duplex and Frame Size on page 312 Editing the NIC Frame Size The frame size specifies the size of data packets that are transferred over the network The default Ethernet standard frame size is 1500 bytes The maximum allowed frame size is 9000 bytes Increasing the frame size improves data transfer speed by allowing larger packets to be transferred over the network and by decreasing the CPU processing time required to transfer data However increasing the frame size requires that routers switches and other devices on your network support that frame size Note Increasing the frame size can cause decreased performance and other network problems if routers switches or other devices on your network do not support frame sizes greater than 1500 bytes If you are unsure about whether your routers and other device
38. Volume Lists Register Times Remote Snapshot Volume List Name Volume_List_O Volume_List_1 Volume_List_2 Volumes Volume_O Snapshot_O Snapshot_O rem_test Authentication Groups AG_AcctPay AG_AcctRec AG_TransDataRemote Figure 204 Viewing the New Volume List Editing a Volume List Edit the volumes in a volume list to e Add a volume Edit the permissions for a volume Remove a volume Edit the authentication groups in a volume list to Add a group to the list Remove a group from the list Warning Before editing the volume list stop any applications from accessing volumes for which you are restricting permissions or removing authentication groups Opening the Volume List to Edit 1 Log in to the management group that contains the volume list you want to edit 2 Select the Volume Lists tab 3 Select the volume list to edit 4 From the Tasks menu select Edit Volume List The Edit Volume List window opens shown in Figure 205 290 Intel Storage System Software User Manual Controlling Client Access to Volumes Edit Volume List Edit Volume List Description Volumes Authentication Groups Volume Name Permission Level FC LUN Volume_0 Read Snapshot_O Read Edit Permission Levet Remove Cancel Figure 205 Opening a Volume List to Edit Editing Volume Permission Levels Changing the permission level fo
39. Warning Decreasing the volume size or hard threshold is not recommended without careful planning Changing the Hard Threshold 3 In the hard threshold field change the number and change the units if necessary 4 Click OK when you are finished See Requirements for Changing Volume Parameters on page 235 for detailed requirements Changing the Soft Threshold 1 In the soft threshold field change the number and change the units if necessary 2 Click OK when you are finished See Requirements for Changing Volume Parameters on page 235 for detailed requirements 238 Intel Storage System Software User Manual Working with Volumes Fixing a Replica challenged Redundant Volume If an SSM goes offline and needs to be repaired or replaced and a replicated volume configured for redundancy becomes unavailable to clients the following procedure allows you to safely return the volume to fully operational status 1 Stop any clients from accessing the volume Select the volume in the Console Right click and select Edit Volume Change the data priority from data redundancy to data availability Remove the SSM from the cluster Repair or replace the SSM Optional Add the new or repaired SSM to the cluster Wait for the restripe of the volume to finish oN Dn nH A QU N Edit the volume 9 Change the data priority from data availability to data redundancy 10 Restore the clients access to th
40. ak n N 16 Access Volume Wizard accent sect A N a a ba wan r A weka ak gear se KRA 16 Console Main Wi ndoOw EEu kk kk kk ek Kek kk k kk K k KK KAKA KA KK KAK kK KK KA 17 Icons Used in the Storage System Console EE Eke es 18 Finding Storage System Modules on the Network E kk kk kk 20 Finding by Subnet and Mask kek kk ek kk k k kr K k kK KK kK 22 Finding by Module IP or Host NENG E i iuEE kk kk kk KA KAK kk 24 Using the Network V W i Ek kak ek E kK kk KK KK KEKE KAKA KAK KK KAK KA KA KA KA KAR KA KA KK RA 27 Using the Tab VI Y 4 N n selata is neyi ner n varie dek ba s gerin a wake bane een aed nee une 29 Viewing Storage System Module Details EE Ek kek kk k k kk ke 31 BAR AN D DD eaaaruuogggg j xb b b bglggM 32 Management Group Information Tal kk kk kk k kek 33 Availability TaD octets ka kiy nan gian kun nane ka ida Henek n n Md Mz K k En 33 Logging In to and Out of the SSM MK K 444444 EE kk kk kk ec kak KK kk KK KK KK 34 Logging In to Additional SSMS E kek kk kek k k kk Kek A KA 34 Logging Out of the SSM mae etree Ree eee eee keke k kk k KK rk reer 35 SSM Configuration WindoOw uuE keke kk kk kk k kk KK k KK KAKA KK KAK KA kK KK YA 35 Configuring Multiple SSMS E uEE Ek keke karek kk kk kak KK Kr KA kK KK KHK KK 36 Chapter 2 Working wit
41. in Figure 9 Select the IP Host Name to delete Click Delete A confirmation message opens Click OK The IP or host name is removed from the list Click OK Intel Storage System Software User Manual Getting Started Using the Network View The Network View displays SSMs according to the criteria you set in the Find function The graphics displayed in the Network View provide information about the following e SSMs Management groups Clusters e Volumes e Snapshots Remote Copy File Find Tasks View Help Management Group j Cluster G Available SSMs J Transaction_Data i m Credit Denver 1 Boulder 3 EEE i j 7 Boulder 1 Boulder 2 Denver 2 Denver 3 Volume_0 a Snapshot_0 Available SSMS napshot Figure 10 Network View Features Intel Storage System Software User Manual 27 Getting Started Changing Which SSMs Appear in the Network View Click the Find menu Select Clear All Found Items to remove all SSMs and EBSD drivers from the Network View Perform a Find using either method Finding by Subnet and Mask on page 22 or Finding by Module IP or Host Name on page 24 to find the desired set of SSMs Status of SSMs 28 The Network View graphically depicts the status of each SSM SSMs on the network are either available or part of a management group Other graphical information i
42. on page 24 Intel Storage System Software User Manual 51 Working with Storage System Modules Canceling a Reboot 1 2 3 When you click OK the Reboot button changes to Cancel as shown in Figure 43 Power Off Feature Registration Boot Devices Module Information Backup amp Restore H Storage Time p TCP IP Network amp SSM Administration Fa SNMP L fa Reporting Reboot O Power Off in 5 minutes Reboot tow out_ Figure 43 Canceling the ssm Reboot Click Cancel to stop the reboot A confirmation message opens Click OK The Power Off window returns with the original settings such as those in Figure 42 Powering Off the SSM Powering off the SSM through the Console physically powers off the SSM The Console controls the power down process so that data is protected 1 2 52 Log in to the SSM Select the Power Off tab The Power Off window opens shown in Figure 42 Select Power Off The button changes to Power Off In the minutes field type the number of minutes before the powering off should begin You can enter any whole number greater than or equal to 0 If you enter 0 the SSM will power off as soon as you complete step 6 Click Power Off A confirmation message appears Click OK The SSM will power down in the specified number of minutes Intel Storage System Software User Manual Working with Storage System Modules
43. recovery Planning the Remote Copy Schedule When creating a remote snapshot schedule a number of considerations are important to plan All of these issues impact the amount of storage available in the system Recurrence How often do you want the snapshots created The recurrence frequency must account for the amount of time it takes to complete a remote snapshot For example if your recurrence schedule is set for a new snapshot every 4 hours you should ensure that the time to copy that snapshot to the remote location is less than 4 hours One way to check the time required to copy a snapshot is to run a test of the actual process In the test you take two remote snapshots of the primary volume Since the first remote snapshot copies the entire volume it will take longer to copy The second remote snapshot copies only changes made to the volume since the first remote snapshot Since you create the second remote snapshot after the time interval you intend to schedule the copy time for the second remote snapshot is more representative of the actual time required for copying subsequent remote snapshots 1 Create a remote snapshot of the primary volume 2 Wait for the copy to finish 3 Create another remote snapshot of the primary volume 4 Track the time required to complete the second remote snapshot This is the minimum amount of time that you should allow between scheduled copies Be sure to check the Intel Storage System So
44. you plan to keep a series of daily snapshots up to four After creating the fifth snapshot the earliest snapshot is deleted thereby keeping the number of snapshots on the cluster at four Scheduled snapshots are an add on feature You must purchase the Configurable Snapshot Pak to use snapshot schedules beyond the 30 day evaluation period Requirements for Snapshots Review Planning Volumes on page 219 to ensure that you configure snapshots correctly When creating a snapshot you define the following parameters Table 40 Snapshot Parameters Snapshot Parameter What it Means Snapshot Name The name of the snapshot that is displayed in the Console A snapshot name must be from 1 to 127 characters and is case sensitive Description Optional A description of the snapshot Hard Threshold This becomes the hard threshold of the writable volume and defines the amount of space allocated for changes to the original volume When reached the hard threshold triggers an alert and data can no longer be written to the volume The hard threshold must be less than or equal to the volume size and cannot exceed available space in the cluster Soft Threshold The amount of space actually used on the writable volume that triggers a warning alert This alert notifies the storage administrator that the writable volume is approaching the hard threshold The soft threshold must be less than or equal to the hard threshold
45. 1 On the Network View double click the SSM and log in if necessary The SSM Configuration window opens 2 Select Reporting from the configuration categories The Reporting window opens 3 Select the Alerts tab The Alerts window opens shown in Figure 125 Module Passive Logfiles Active Email Diagnostics Alerts Storage Time TCP IP Network Alerts File Alerts log n SSM Administration 7 04 49 28 Golden 3 hydra Drive 3 Health Status marginal Value does not equal g8 SNMP Jun 7 07 04 28 Golden 3 hydra Drive 2 Health Status marginal Value does not equal le Reporting Jun 7 07 04 28 Golden 3 hydra Drive 4 Health Status marginal Value does not equal Jun 7 07 19 28 Golden 3 hydra Drive 3 Health Status marginal Value does not equal Jun 7 09 34 28 Golden 3 hydra Drive 2 Health Status marginal Value does not equal Jun 7 09 34 28 Golden 3 hydra Drive 4 Health Status marginal Value does not equal Jun 7 09 49 28 Golden 3 hydra Drive 3 Health Status marginal Value does not equal Jun 7 12 04 28 Golden 3 hydra Drive 2 Health Status marginal Value does not equal Jun 7 12 04 28 Golden 3 hydra Drive 4 Health Status marginal Value does not equal Jun 7 12 19 28 Golden 3 hydra Drive 3 Health Status marginal Value does not equal Jun 7 14 01 13 Golden 3 hydra Drive 2 Health Status marginal Value does not equal Jun 7 14 01 13 Golden 3 hydra Drive 3 Health Status
46. 109 CPU Fan Speed 0 Value is below 3100 2 06 07 2005 12 51 41 PM MST Alert from Nightly FT 10 0 7 2 RAID Status normal Value changed 1 06 07 2005 12 51 11 PM MST Alert from bmastors 10 0 3 109 CPU Fan Speed 0 Value is below 3000 Figure 14 Viewing messages in the Alert Messages Tab The most recent alert is at the top The messages are continuous while the Console is open When you close the Console the messages are cleared 30 Intel Storage System Software User Manual Getting Started EBSD Hosts Tab The EBSD Hosts tab shown in Figure 15 lists all versions of the EBSD drivers that are currently installed on the network It also lists information about the hosts that are using that driver See the EBSD Linux Manual for more information about the EBSD drivers Available SSMs Management Groups Alert Messages EBSD Hosts IP Host Name Groups amp Volumes Version Figure 15 EBSD Hosts Tab Viewing Storage System Module Details Select an SSM from the Network View and the SSM Details tab opens in the Tab View shown in Figure 16 File Find Tasks View Help a Available SSMs Denver 1 Denver 2 Details for selected SSM Denver 3 Details Management Group Information Availability Host Name Denver 1 RAID Status Normal IP Address 10 0 33 35 RAID Configuration RAID 1 or 10 Model SSR212MA Storage Mode block
47. 96 Module Groups Users E Storage Time fe Topap Network amp Group Contains Administrators Description m full_administrator root admin Manage all Functions L ge SNMP view_only_administrator View only all Functions Reporting Figure 96 SSM Administration Groups Tab Administrative Users and Groups Managing Administrative Groups The SSM comes configured with a set of default administrative groups You can use these groups or create new ones Default Administrative Groups If you assign an administrative user to one of the following groups that user will have the privileges associated with the group Table 27 Using Default Administrative Groups Name of Group Management Capabilities Assigned to Group Full_Administrator Manage all functions read write access to all functions View_Only_Administrator View only capability to all functions read only Adding Administrative Groups Administrative groups are listed on the SSM Administration window on the Groups tab shown in Figure 97 Adding a Group 1 Select SSM Administration from the configuration categories 2 Click Add on the Groups tab The Create Administrative Group window opens shown in Figure 97 130 Intel Storage System Software User Manual Administrative Users and Groups Create Administrative Group General Group Permission Group Name 3 40 characters 0
48. Active Data Transfer Yes Preferred No Status Active Data Transfer Yes 102 Intel Storage System Software User Manual Table 18 Managing the Network NIC Status During Failover with NIC Aggregation Failover Status Status of Motherboard Port0 Status of Slot1 Port0 Motherboard Porto Fails Data Transfer Continues on Slot1 Porto Preferred No Status Passive Failed Data Transfer No Preferred No Status Active Data Transfer Yes Motherboard PortO Restored Preferred No Status Active Data Transfer Yes Preferred No Status Active Data Transfer Yes Example Network Configurations with NIC Aggregation Two simple network configurations using NIC aggregation in high availability environments are illustrated ServerA lt IP SAH Ethernet Switch IP SAH Ethernet Switch Storage Module Cluster Server B IP SAH Ethernet Switch Figure 77 NIC Aggregation in a Partial mesh Topology with Server Intel Storage System Software User Manual Failover 103 Managing the Network Server A Server B ill IP SAH Ethernet Switch Storage Module Cluster Figure 78 NIC Aggregation in a Single switch Topology Creating a NIC Bond 104 Follow these guidelines when creating NIC bonds You can create bonds of 2 or 4 interfaces You can create more than one bond on an SSM An interface can only be in one bond To provide failo
49. Agent You can also enable SNMP traps The SSM Management Information Base MIB is read only and supports SNMP versions 1 and 2c See Installing the Storage System MIB on page 145 for a list of Storage System MIBs Getting There 1 On the Network View double click the SSM and log in if necessary The SSM Configuration window opens 2 Select SNMP from the configuration categories The SNMP General tab opens shown in Figure 107 _ Module SNMP General SNMP Traps W Storage Time Disable SNMP Agent ru TCP IP Network J SSM Administration OE m Enable SNMP Agent gt ERM L e Reporting IP Host Name tson Figure 107 Using SNMP Using SNMP Enabling the SNMP Agent 3 Click Enable SNMP Agent The Enable Agent fields become activated shown in Figure 108 Module M Storage Time TCP IP Network SSM Administration SNMP General SNMP Traps Disable SNMP Agent Enable SNMP Agent Community String Access Control IP Host Name Add System Location System Contact Apply Figure 108 Enabling the SNMP Agent 4 Type the Community String Note The community string identifies a group of hosts that are allowed read only access to the SNMP data The community public is typically used to denote a read access community This string is entered into the SNMP Management
50. BOnd cis sin alien k hs n ba l diki k ar ak kaka b kan b naka sikan kaka b n N ene 312 Available Network Devices WiNdOW EiE Ek kk kk kK KK KAKA KA 313 Setting the Speed Duplex and Frame SiZe c cceeeeecceeeeeeeceeeeeseeeeeeeeeeees 313 Removing the SSM from a Management GIrOU EEE kk 314 Resetting to Factory DefaUl S lLllll kk kaka kk kak kk KAKA 314 Basic Flow of Remote COpy uie kk kk kk kk kk k kK k kk 335 Icons Depicting the Primary Snapshot Copying to the Remote Snapshot 336 Icons for Remote Copy as Displayed in the Graphical Legends Window 336 Creating a New Remote Snapshot E EEE kk kk e 343 Creating a New Primary Snapshot kk kk kk kk kk e 344 New Primary Snapshot Created iiE kk kk kk kk kek 345 Completing the New Remote Snapshot Dialog E E U 345 Viewing the Remote Snapshot EE kek kek kk Kek kk kk rk KK 346 Selecting a Cluster for the Remote Volume kk 347 Creating a New Remote Volume u kk kk kk kK KH 348 List Of Remote Snapshots sssrinds arenae E naib deyan k c b 349 Editing a Remote Management Group EEE kk kek kk ke 350 Editing the Remote Bandwidth uL E Ek kK kK KK 350 Editing a Remote SnapsShOt EE kk kk K k kk k KK k ke 351 Remote Snapshot Details in the Remote Snapshot Tab
51. Click the Routing tab to bring it to the front shown in Figure 87 r Module 0 Storage Time gt da TCP IP Network Routing Info in order u SSM Administration jg SNMP Device Net Gateway Netmask Flags a Reporting bondo 10 0 0 0 0 0 0 0 255 255 240 0 TCPAP TCP Status DNS Routing Communication Motherboard Port0 10 0 0 0 0 0 0 0 255 255 240 0 Slot1 Port0 10 0 0 0 0 0 0 0 255 255 240 0 bond0 0 0 0 0 10 0 1 254 0 0 0 0 Figure 87 Adding Network Routing Information Intel Storage System Software User Manual 117 Managing the Network 4 Click Add The Add Routing Information dialog opens shown in Figure 88 Add Routing Info xj Device Motherboard Port1 Y Net Gateway Netmask 255 255 255 255 Cancel Figure 88 Adding Routing Information 5 Select the port to use for routing in the Device list 6 Type the IP address portion of the network address in the Net field 7 Type the IP address of the router in the Gateway field 8 Select the netmask 9 Click OK 10 Use the arrows on the routing table panel to order devices according to the needs of your network The SSM will attempt to use the routes in the order in which they are listed 11 Click Apply when you are finished Editing Routing Information You can only edit optional routes you have added 1 On the routing tab select the information you want to
52. EEE EEEE EE 282 Adding a Subnet and Mask for EBSD Host Auithenitication 283 Configuring Fibre Channel for New Authentication GrouUp E U U 284 Adding a Name and WWPN for Fibre Channel Authentication 284 Viewing the Authentication GIrOUDS E E Ek kk kk ek kk kk Kek kK 285 Editing an Authentication Group EEE Ek kk kk kk kk Kek kk KA 286 Creating a New Volume LiSt Ek kk kk kk ke kk kek kk 288 Adding a Volume to a Volume List uE Ek kk kk kK 288 Connecting Authentication Groups to a Volume List 289 Viewing the New Volume LiSt EL Ek kk kk kk kk A KAKA KK KA 290 Opening a Volume List to Edit kk kk kk kk kk kek k kk 291 Editing Permissions on a Volume Ek kk kK 291 Viewing the Edited Volume LiSt E kk kk kk kk K KK AK 292 Volume Lists Tab xas lcs ka sanaaas nn ER banka xuri an b na Mees W wa S ka aa Vi hana sah ana saza Dada l 293 Verifying the Start of the 30 day Evaluation Period E E 295 Evaluation Period Countdown on Register Tab E e 296 Evaluation Period Countdown Message i kk kk kk 296 Icons Indicating License Status for Features ccceecccceceeeeeseseeeeeeeeesssesaaes 297 Enabling Scripting Evaluation eee a ee ee 301 Registering Feat
53. Figure 80 Creating a NIC Bofd ii kl k kkl l lalan la yaaa saya ka MiR ak kak k yaa ka aa k Hak B kek k 106 Figure 81 Viewing a New Active Backup BOnd E EEE kk k KK KA 107 Figure 82 Viewing the Status of an Active Backup BoOnd LiEE ke 107 Figure 83 Viewing the Status of a NIC Aggregation Bond EEE 108 Figure 84 Viewing the TOP St amp US lli Eke KEKE k kA KAKA KAK KAK KA YA 110 Figure 85 Editing TCP Speed Duplex and Frame S Ze EuEE keke 112 Figure 86 Adding DNS SQVw Gr exc case saiss cencsaccraserensananssanceanedenspeanesdeccieeetiaaserauertnuenveneinteceont 115 xviii Intel Storage System Software User Manual List of Figures Figure 87 Adding Network Routing Information Lu Ek kk kk kK KS 117 Figure 88 Adding Routing Informat On i Ek kk kK K KK KK 118 Figure 89 Editing Routing Information cccictisssicecieicenenvecve ier nnectera caundocornecagnantanactbonmieneeteenencines 118 Figure 90 Selecting the Storage System Software Network Interface and Updating the List of Managers cect es ences gece eee mn nnn mn m mmggp nnxwrxyxna 121 Figure 91 Setting the Time LONG ve caceiercineasaceshcocayvaspeceauasiecea caucaderenucitand Wisneeuddanrnnenenieeaeuseneed 124 Figure 92 Setting the SSM Date and Tim e EE kk kk kk kk k 125 Figure 93 Adding an NTP Server E E Ek ek ke kek k k
54. IP Address for iSCSI 2 Add the IP address subnet mask and default gateway if required Adding an iSNS Server Optional Note Ifyou use an iSNS server you may not need to add Target Portals in the Microsoft iSCSI Initiator 1 Click Add The Add iSNS Server window opens shown in Figure 154 Add iSNS Server x ISNS Server _ Figure 154 Adding an iSNS Server 2 Type the IP address of the iSNS server 206 Intel Storage System Software User Manual Working with Clusters 3 Click OK The server is added to the list shown in Figure 155 xi New Cluster General iscs Virtual IP IP Address 10 0 13 25 Acluster of multiple SSMs requires a virtual IP to configure failover for Subnet Mask 10 0 0 0 iSCSI initiators that do not support m Multiple IP addresses per target Default Gateway 255 255 255 0 ISNS Servers IP eee List of iSNS servers 10 0 12 78 Figure 155 List of iSNS Servers 4 Click OK when you have finished The cluster is created and displayed inside the management group shown in Figure 156 5 Select the cluster to open the clusters Tab View also shown in Figure 156 File Find Tasks View Help a Available SSMs 8 Transaction_Data u Transactions_2004 Boulder 3 Boulder 1 Boulder 2 Denver 2 Denver 3 Details Volumes SSMs Disk Usage iSCSI Name Transactions Hot Spar
55. KK KK kK KK KK KK KAK KHK kk 168 Communication VIOd e is l 12 2 niyan l an k m Milk kal anda a Q na b n Keye nan s a bela Mb naa b na d dan b kane 169 Unicast Communication EEE EEE keke ek kk ee aac aie 169 Adding or Removing Managers iii Ek kk kK kk KK KAKA KA kk KA KA A A KH 169 Creating a Management Group EE kk kek K k kek Kek kk kk KK KK KA kk KA kk KH 169 Getting There EEE Eke tener kk kk ke kr kk K k k kk Kr K kK kak kk kk kK Ak 170 Adding the First SSM to Create a New Management Group EEE UU U EU 171 Adding Additional SSMs When Creating a Management Group 173 Intel Storage System Software User Manual vii Contents Adding Managers to the Management Group EEEEE kk kek kk K k kk 173 Logging In to a Management Group EEE kek kek kek kk KK ke kK kk kK KK kk 174 Management Group Tab View uE kk kk kk kK kk kk K k KK K rk kK KAK 176 Editing a Management Group EEEEE kk kk kk ek kek K k KK K KK KK KK KA A KK KA KH 178 Setting or Changing the Local Bandwidth uL Eke 178 Logging Out of a Management Group EEE cece tenet tree eeeeeeeneaeeeeeeeeeeeeteneeeeeetiaaeeeeee 179 Adding an SSM to an Existing Management Group EE kk kk kk keke 180 Adding Manager IP Addresses to Application Servers E er 180 Resetting the Management Gro
56. MIB files have been developed for SSM specific information These files when loaded in the Network Management System allow you to see SSM specific information such as model number serial number hard disk capacity network parameters RAID configuration DNS server configuration details and more See Installing the Storage System MIB on page 145 Installing the Storage System MIB The Storage System MIB files are installed when you install the Storage System Console Load the Storage System MIB in the Network Management System as outlined below 1 Load STORAGE SYSTEMS GLOBAL REG 2 Load STORAGE SYSTEMS SSM COMMON MIB 3 The following MIB files can be loaded in any sequence STORAGE SYSTEMS SSM COMMON DNS MIB STORAGE SYSTEMS SSM COMMON CLUSTERING MIB STORAGE SYSTEMS SSM COMMON INFO MIB STORAGE SYSTEMS SSM COMMON NETWORK MIB STORAGE SYSTEMS SSM COMMON NIS MIB Intel Storage System Software User Manual 145 Using SNMP STORAGE SYSTEMS SSM COMMON NOTIFICATION MIB STORAGE SYSTEMS SSM COMMON NTP MIB STORAGE SYSTEMS SSM COMMON STATUS MIB STORAGE SYSTEMS SSM COMMON STORAGE MIB Note Any variable that is labeled Counter64 in the MIB requires version 2c or later of the protocol Note Other standard version 2c compliant MIB files are also provided on the resource CD Load these MIB files in the Network Management System if required Disabl
57. Manager IP Addresses to save this list You can print the list and use it as a reference when reconfiguring application servers 180 Intel Storage System Software User Manual Working with Management Groups Resetting the Management Group Time Any time you change the time setting of an SSM that is running a manager you must reset the time of the management group as well If the manager SSM time is different from the management group time then File creation times on volumes and snapshots might be affected e Scheduled snapshots might not kick off at the intended time Note Use NTP to ensure closely synchronized times on the SSMs in the management group When resetting the management group time first verify the time settings of the SSMs running managers If necessary change time settings to ensure all the manager SSMs have the same time For information about setting the time on the SSM see Chapter 5 Setting the Date and Time Then refresh the management group time 1 Log in to the management group 2 Select the Times tab 3 From the Tasks menu click Refresh All Verify the time settings on the SSMs running managers 4 Click Reset Management Group Time A confirmation message opens 5 Click OK All the times listed on the Times tab should be the same Starting and Stopping Managers Start or stop managers on SSMs already in a management group 1 Log in to the management group 2 Click the Managers tab in
58. Missing 164 Intel Storage System Software User Manual Reporting Viewing Alerts Any time that an actively monitored variable causes an alert the alert is logged by the SSM If the Console is open alerts display in the Alert Messages tab on the Console main window shown in Figure 124 Available SSMs Management Groups Alert Messages EBSD Hosts 6 06 07 2005 12 52 58 PM MST Alert from Nightly FT 2 10 0 7 4 RAID Status normal Value changed 5 06 07 2005 12 52 17 PM MST Alert from Slavy 1 10 0 11 123 CPU Fan Speed 0 Value is below 3100 4 06 07 2005 12 52 13 PM MST Alert from Nightly FT 2 10 0 7 4 Device flash 1 Status Active Value changed 3 06 07 2005 12 52 11 PM MST Alert from bmastors 10 0 3 109 CPU Fan Speed 0 Value is below 3100 2 06 07 2005 12 51 41 PM MST Alert from Nightly FT 10 0 7 2 RAID Status normal Value changed 1 06 07 2005 12 51 11 PM MST Alert from bmastors 10 0 3 109 CPU Fan Speed 0 Value is below 3000 Figure 124 Alert Messages Tab on Console Main Window If the Console is not open these alerts are still logged and you can view them in the Reporting category of the SSM Configuration window the next time you open the Console Note The Alerts tab in the Reporting category displays the most recent alerts up until the alert list reaches 1 MB in size To view alerts older than those displayed on the Alerts tab save the Alerts log on the Log Files tab
59. Pad and the wizards are available via the Help menu Intel Storage System Software User Manual Getting Started 16 Select the By Subnet and Mask global broadcast or By Module IP or Host Name individual search option to search for your storage system If you are using a fixed IP address select the By Module IP or Host Name individual search option Press Next to continue Find SSMs Wizard Search for SSMs either globally or individually Select subnetmask or IP hostname How would you like to search for your SSMs By Subnet and Mask global broadcast By Module IP or Host Name individual search To continue click Next 17 If you selected the By Module IP or Host Name individual search option a Search by SSM IP or Hostname list will display Click on the Add button Find SSMs Wizard Search by SSM IP or hostname Enter IP address or hostname Click Add to enter an IP address or host name Use Edit or Delete to refine your list IP or Host Name Status faa Edit Delete To find your SSMs on the network click Finish 6 Intel Storage System Software User Manual Getting Started 18 At the Add IP or Host Name screen enter the static IP address of your storage system Click on OK to continue Add IP or Host Name K IP or Host Name 169 254 1 1 19 Click on Finish to search for the specified
60. SSM has the hot spare icon next to it E A confirmation message opens 2 Click OK The SSM begins the process of data migration See Swap in Hot Spare on page 202 for more information 214 Intel Storage System Software User Manual Working with Clusters Repairing an SSM Repairing an SSM allows you to replace a failed disk in an SSM that is in a cluster configured for 2 way or 3 way replication and only trigger one resync of the data stored on SSMs in that cluster rather than restriping Resyncing the data is a shorter operation than a restripe Prerequisites for Using Repair SSM Volume must have 2 way or 3 way replication SSM must be blinking red in the Console Ifthe SSM is running a manager stopping that manager must not break quorum How Repair SSM Works Replacing a failed disk requires removing the SSM from the cluster and management group replacing the disk and returning the SSM to the cluster Because of the replication level removing and returning the SSM to the cluster would normally cause the remaining SSMs in the cluster to restripe the data twice once when the SSM is removed from the cluster and once when it is returned Repairing the SSM creates a placeholder in the cluster in the form of a ghost SSM This ghost SSM keeps the cluster intact while you remove the SSM replace the disk configure RAID and return the SSM to the cluster The returned SSM only has to resynchronize with the
61. SSMs move to the SSMs in Cluster list or Click Add All to move all the SSMs from the Available list to the SSMs in Cluster list Designating a Hot Spare You must purchase the Scalability Pak to use the hot spare feature beyond the 30 day evaluation period Detailed information about using hot spares is in Using Hot Spares on page 201 1 Optional Click the Hot Spare drop down list to designate a hot spare Only SSMs in the cluster are displayed in the Hot Spare list Hot spares cannot be used for storage that is you cannot create volumes on them See Using Hot Spares on page 201 for detailed information about hot spares 2 Optional If you designate a hot spare you can set the hot spare time out See Setting the Hot Spare Time Out on page 202 Intel Storage System Software User Manual 205 Working with Clusters Configure Virtual IP and iSNS for iSCSI Optional To configure iSCSI failover for initiators that do not support multiple addresses per target add a virtual IP for the cluster 1 Click the iSCSI tab to bring it to the front shown in Figure 153 New Cluster xi New Cluster General iSCSI Virtual IP IP Address A cluster of multiple SSMs requires a virtual IP to configure failover for Subnet Mask iSCSI initiators that do not support multiple IP addresses per target Default Gateway iSNS Servers IP Figure 153 Configuring a Virtual
62. SSR316MJ2 RAID 0 disks 7 Z 3 A T Sar J 12 Figure 55 RAID 0 on an Intel Storage System SSR212MA Intel Storage System Software User Manual 69 Storage Devices Configured in RAID 1 10 If RAID 1 or 10 is configured the physical disks are combined into mirrored pairs of disks RAID 1 uses only one pair of disks RAID 10 uses up to 8 pairs of disks SSM disks TT T2 T T4 Mirrored RAID Ny disk pairs W Figure 56 RAID 10 on an Intel Storage System SSR316MJ2 SSM disks 7 2 3 7T4 Mirrored RAID M y disk pairs W Figure 57 RAID 10 on an Intel Storage System SSR212MA Devices Configured in RAID 5 50 If RAID 5 or 50 is configured the physical disks are grouped into sets RAID 5 uses one set of disks RAID 50 uses multiple sets of disks in each SSM RAID 50 in the Intel Storage System SSR316MJ2 RAID 50 in the Intel Storage System SSR316MJ2 consists of multiple RAID 5 sets using either all the disks as in 4 disk or 8 disk sets shown in Figure 58 or n disks so that the single disk acts as a hot spare for the RAID set as shown in Figure 59 The RAID 50 n 1 configurations are 3 disks plus a spare and 7 disks plus a spare SSM disks Eek h ku ee N lk RAID 5 Y y y y sets
63. Select New Management Group and click on Next Management groups allow you to manage and configure storage systems as a group See Working with Management Groups on page 167 for additional information on management groups Create Volume Wizard Choose a Management Group Select new or existing management group Do you want to create a new management group or use an existing one New Management Group Existing Management Group Amanagement group is a container in which you cluster SSMs and create volumes To continue click Next Create Volume Wizard Create a Management Group Name your management group and select SSMs Management Group Name Group_0 This name cannot be changed after the management group is created Available SSMs Host Name IP Address Version wazeni In You may have to login to an SSM to cor tinue To continue click Next asa Eza emer sw 12 Intel Storage System Software User Manual Getting Started 33 Enter a cluster name in the Cluster Name field Ensure that the I do not want to use a virtual IP address for this cluster checkbox is checked Click on Next to continue See Working with Clusters on page 201 for additional information on clusters Create Volume Wizard Create Cluster Name your cluster and select SSMs Cluster Name Cluster_0 This name cannot be changed after the cluster is created r V
64. Select SSM Administration from the configuration categories Click the Groups tab to bring it to the front Select the group to delete Click Delete A confirmation message opens Click OK nA A U N _e Note When you delete a group the users who are members of that group are NOT deleted Managing Administrative Users Add administrative users as necessary to provide access to the management functions of Storage System Software Note The user who is created during SSM configuration using the Configuration Interface becomes a member of the Full Administrator group by default Adding Administrative Users Administrative users are listed on the SSM Administration window on the Users tab along with their group membership and a description Module Groups Users Hal Storage L Time gt ga TePe Network A User Member of Groups Description da admin full_administrator Administrator L g8 SNMP root full_administrator Administrator L fa Reporting tou out_ Figure 102 Adding Administrative Users 136 Intel Storage System Software User Manual Administrative Users and Groups Adding an Administrative User 1 Select SSM Administration from the configuration categories 2 Click the Users tab to bring it to the front shown in Figure 102 3 Click Add The Create Administrative User window opens shown in Figure 103 User Name 3 40 characters 0 9 a z
65. SerialNumber 00 03 47 EB 86 EF Software Version 6 3 19 0001 0 Figure 16 Viewing individual SSM information Intel Storage System Software User Manual 31 Getting Started Details Tab Includes host name IP address the model serial number RAID status RAID configuration storage mode and software version RAID States RAID states are displayed on the SSM Details tab If RAID is normal a green circle displays in the SSM configuration details tab when the SSM is selected in the Network View as shown in Figure 17 Details Management Group Information Availability HostName Boulder 1 RAID Status Normal IP Address 10 0 33 25 RAID Configuration RAID 1 or 10 Model SSR316MJ2 Storage Mode block Serial Number 00 03 47 EB 89 A9 Software Version 6 0 99 0308 0 Figure 17 Icon Showing RAID is Normal If RAID is off a red circle displays in the SSM configuration details tab as shown in Figure 18 For information about turning RAID on see Starting RAID on page 76 Details Management Group Information Availability HostName Boulder 1 RAID Status orr IP Address 10 0 33 25 RAID Configuration Not Configured Model SSR316MJ2 Storage Mode block SerialNumber 00 03 47 EB 89 49 Software Version 6 0 99 0308 0 Figure 18 Icon Showing RAID is Off If RAID is degraded a yellow circle displays as shown in Figure 19 See Monitoring RAID Status on page 78 for information about fixing
66. Soft Threshold 1 0 GB v rRetention for Primary Snapshots Retain Maximum Of 10 Snapshots Retain Snapshots For Cancel Figure 249 Editing a Remote Snapshot Schedule Deleting a Remote Snapshot Schedule 1 Select the volume for which you want to delete the remote snapshot schedule The volume tab view opens Click the Remote Snapshot Schedule tab to bring it to the front Select the schedule you want to delete From the Tasks menu select Delete Schedule A confirmation message opens Click OK Q A W N Changing the Roles of Primary and Remote Volumes Changing the roles of primary and remote volumes comes into play during failover recovery You use these procedures when you are resynchronizing data between the acting primary volume and the recovered or newly configured production site primary volume Intel Storage System Software User Manual 359 Remote Copy Making a Primary Volume Into a Remote Volume You can make any primary volume into a remote volume First the system takes a snapshot of the volume to preserve the existing data that is on the volume The data can then be accessed on that snapshot Next the volume is converted to a remote volume The remote volume is a placeholder for the remote snapshots and does not contain data itself So the size hard threshold and soft threshold change to 0 length 1 Log in to the management group containing the volume that you want to convert
67. The configuration description is saved as a text file in the folder you selected 5 Click OK to close the Backup Configuration window Restoring a Management Group For disaster recovery you can use the management group binary file to recreate a management group The restore procedure restores everything except snapshots since the data stored in volumes and snapshots is gone Requirements for Restoring a Management Group e Hardware You must have the same number of SSMs available that are the same capacity or greater IP Addresses You must use the same IP addresses for the replacement SSMs that were assigned to the original SSMs If you do not have a record of those IP addresses you can retrieve them when performing the restore As part of the restore process the configuration description is displayed and it lists the IP addresses To Restore a Management Group 1 Make sure that the SSMs you are using to restore your management group are in the Available pool in the Console 2 Right click in the Network view and select Restore Management Group A standard Open window opens shown in Figure 142 Intel Storage System Software User Manual 187 Working with Management Groups Look In Config Backup v Hd El BB a C TransactionDataConfig bin File Name TransactionDataConfig bin Files of Type Management Group Configuration Files Restore Management Group Cancel
68. These interfaces are named Motherboard Port0 and Motherboard Port1 In addition the SSM can include multiple add on PCI cards each with up to 4 interfaces These add on interfaces are named according to the card s slot and the port number such as Slot1 Port0 For information about how the interfaces are labeled on the back of the SSM see Configuring the IP Address Manually on page 94 Once you have established a connection to the SSM using a terminal emulation program you can configure an interface connection using the Configuration Interface 1 On the Configuration Interface main menu tab to Network TCP IP Settings and press Enter The Available Network Devices window opens shown in Figure 222 if Figure 222 Selecting an Interface to Configure 2 Tab to select the network interface that you want to configure and press Enter The Network Settings window opens shown in Figure 223 If the interface you selected is a bond then the Logical Interface Device window displays first Click Change Settings to open the Network Settings window for the bond 310 Intel Storage System Software User Manual Using the Configuration Interface it Ethernet Figure 223 Entering the Host Name and Settings for an Interface 3 Enter the host name and tab to the next section to configure the network settings Note If you specify an IP address the Gateway is a required field If you do not have a Gateway enter 0
69. _ Must begin with a lower case letter Description 3 40 characters 0 9 a z A Z _ space Must begin with a letter Member Groups Add rene Password Confirm Password 40 characters Cancel Figure 103 Adding an Administrative User 4 Type a User Name and Description 5 Type a password and confirm that password Adding a Member Group 1 Click Add in the Member Groups section The Add Administration Groups window opens shown in Figure 104 Add Administration Groups x full_administrator wiew_only_administrator Figure 104 Adding a Group to an Administrative User Intel Storage System Software User Manual 137 Administrative Users and Groups 2 Select one or more groups you want to add 3 Click OK The Create Administrative User window opens 4 Click OK to finish adding the administrative user Sorting Columns in the Administrative Users Window The columns in the Administrative Users window can be sorted in ascending or descending order Click on the column header to sort Click again to reverse the sort The arrow next to the column title indicates which column is the sorted column and whether the sorting order is ascending up arrow or descending down arrow r Module Groups Users oring indicator Member of Groups Description r 2m i full_administrator Administrator iad A nn AN
70. a remote snapshot of his X Rays volume in the backup management group in the corporate backup site He is naming this new remote snapshot RSS2_xrays and the new primary snapshot PSS2_ xrays He created his remote volume RemVolX_Rays using the Console and named his first primary snapshot PSS1_ xrays and Intel Storage System Software User Manual 267 Working with Scripting his first remote snapshot RSS1_xrays The size of the thresholds for the new primary and remote snapshots are the same 500 MB hard thresholds and 500 MB soft thresholds The script looks as follows java commandline CommandLine jjones trumpet 10 0 111 212 volume snapshot X Rays PSS2_xrays 500 500 first primary snapshot 15 java commandline CommandLine jjones saxophone 10 10 45 72 volume_remote_snapshot RemVolX_Rays RSS2_xrays second remote snapshot jjones trumpet 10 0 111 212 PSS2_xrays 15 Creating A Remote Snapshot In The Same Management Group 1 Create the primary snapshot java commandline CommandLine lt primary admin name gt lt primary admin password gt lt primary manager ip gt volume_snapshot lt primary volume name gt lt primary snapshot name gt lt failure timeout seconds gt 2 Create the remote snapshot java commandline CommandLine lt primary admin name gt lt primary admin password gt lt primary manager ip gt volume_remote_snapshot lt remote volume name gt lt remote snapshot name gt lt remote snapshot description gt lt pr
71. a spare and 7 disks plus a spare designate as a hot spare the remaining disk of the 4 or 8 RAID set With a hot spare disk if any one of the 3 or 7 disks in the RAID 5 set fails the hot spare disk is automatically added to the set RAID 5 in the Intel Storage System SSR212MA A RAID 5 set in the Intel Storage System SSR212MA is comprised of 6 disks The RAID 5 set using 6 disks may be configured as follows 5 disks plus a spare or 6 disks RAID and Hot Spare Disks The RAID configuration using 5 disks plus a spare designates as a hot spare the remaining disk of the 6 disk RAID set With a hot spare disk if any one of 6 disks in the RAID 5 set fails the hot spare disk is automatically added to the set RAID 50 RAID 50 combines the redundancy of parity within a RAID set with striping across RAID sets Configuring RAID 5 or RAID 50 on the Intel Storage System SSR316MJ2 RAID 5 and RAID 50 can only be configured on completely populated sets of disks This means the Intel Storage System SSR316MJ2 must contain either 4 8 12 or 16 disks Whether the Intel Storage System SSR316MJ2 is configured in RAID 5 or RAID 50 depends on the number of disk sets in the module Ifthe Intel Storage System SSR316MJ2 contains 1 disk set then that set is RAID 5 Ifthe Intel Storage System SSR316MJ2 contains more than one set then all the sets are RAID 50 66 Intel Storage System Software User Manual Storage Storage Capaci
72. address and host name of the storage system have not changed If the storage system uses DHCP the IP address may have changed Login to the Intel Storage System Console and select Edit Config gt Storage gt RAID Setup and ensure all disks are online and in their original RAID configuration Intel Storage System Software User Manual Working with Storage System Modules All volumes should be available with data restored to all volumes and your host should be able to perform an iSCSI login Note In most cases DOM replacement should result in no issues However the following two conditions may occur if there is another hardware problem present In both cases refer to the Intel Storage System SSR212MA User Guide for instructions on removing the DOM and replacing it with the original If the new DOM could not access data on the disks because of another system fault e g RAID is seriously degraded or no longer configured or the RAID controllers midplane or server board have a failure then the replacement DOM will boot a single time and appear to be a newly manufactured system Check the network settings and if they are set to factory defaults the restoration process has failed because the DOM could not detect a coherent RAID configuration In this case the DOM cannot be used again to attempt a system restoration Replace with the original DOM because the problem is not a bad DOM If the original RAID array is intact but t
73. and to ensure fault tolerance connect to ports across more than one PCI slot For example connect to the first port in the first 64 bit PCI slot Then connect to the next port in the second 32 bit slot and connect to the third port in the third 32 bit slot Connect to the fourth port in the first slot and so on The following figure shows the optimal configuration of add on ports 92 Intel Storage System Software User Manual Managing the Network Add port to 64 bit slot first i 64 bit 32 bit 32 bit 66MHz 33 MHz 33 MHz Figure 72 Distributing Bandwidth and Ensuring Fault Tolerance of Add on Ports Across PCI slots Note When adding more than one port to the SSM you can distribute bandwidth and ensure fault tolerance by distributing the ports across more than one PCI slot Start with the first 64 bit slot The Intel Storage System SSR212MA contains one open 32 bit 66 MHz PCI slot This open 32 bit slot can hold a dual 2 port or a quad 4 port NIC card The other two covered slots are occupied by SATA RAID controller cards Adding Fibre Channel Ports Intel Storage System SSR316MUJ2 only When you add a card containing Fibre Channel ports to a PCI slot the Fibre Channel ports do not display on the TCP IP tab of the Network configuration window You can view the status of the Fibre Channel ports and the unique World Wide Name WWN of each port in the Passive Report 1
74. bay is not recognized as a boot flash device Unsupported The flash card in the flash card bay cannot be used For example it is the wrong size or card type 1 Some statuses listed above only occur in a system with two boot devices Note When the status of a flash card changes an alert is generated See Using Active Monitoring on page 154 Replacing a Boot Device Only in Modules with Two Boot 56 Note Devices Intel Storage System SSR316MJ2 only If a compact flash card fails first try to activate it on the Boot Devices window If the card fails repeatedly replace it with a new one You can also replace a boot flash card if you have removed the original card to store it as a backup in a remote location The replacement boot flash card must be a standard 256 Mb or larger compact flash memory card As of publication product approved cards are SanDisk 256 Mb Compact Flash Kingston 256 Mb Compact Flash P725228X1 Check with your supplier for an updated list of approved flash cards Warning A flash card from one SSM cannot be used in a different SSM If a card fails replace it with a fresh flash card Intel Storage System Software User Manual Working with Storage System Modules Removing a Boot Flash Card Before you remove one of the boot flash cards from the SSM deactivate the device in the Storage System Console 1 2 On the Boot Devices window select the flash card tha
75. can add managers to other SSMs later Assigning manager IP addresses The SSMs that are running managers must have static IP addresses or reserved IP addresses if using DHCP Managers Managers are SSMs within a management group that you designate to govern the activity of all of the SSMs in the group All SSMs contain the management software but you must designate which SSMs in the management group you want to act as managers These SSMs run managers much like a PC runs various services Functions of Managers Managers control data replication keep track of system status coordinate reconfigurations as SSMs are brought up and taken offline and re synchronize data when SSMs fail and recover Managers and Quorum Managers use a voting technology to coordinate SSM behavior In this voting technology a strict majority of managers a quorum must be running and communicating with each other in order for the Storage System Software to function Therefore for optimal fault tolerance you should have three or five managers in your management group Three or five managers provide the best balance between fault tolerance and performance 168 Intel Storage System Software User Manual Working with Management Groups Number of Number for a Management Managers Quorum Fault Tolerance Explanation 1 1 None If the manager fails no data control takes place 2 2 None If one manager
76. cluster is a grouping of SSMs from which you create volumes Think of a cluster as a pool of storage You add storage to the pool by adding SSMs You then carve volumes out of the pool Volumes seamlessly span the SSMs in the cluster This chapter discusses e Mixing SSMs in a cluster Hot spares e iSCSI and clusters Creating and managing clusters e Repairing an SSM Mixing SSMs of Different Capacities in Clusters Clusters can contain SSMs with different capacities However all SSMs in a cluster will operate at a capacity equal to that of the smallest capacity SSM Prerequisites All the SSMs in a cluster must be configured alike See SSM Configuration Window on page 35 Before you create a cluster you must have created a management group See Creating a Management Group on page 169 Using Hot Spares A cluster of SSMs can contain a hot spare SSM A hot spare is an SSM that is not used for data storage but stands by in case an SSM in the cluster goes down at which time the hot spare is activated When the hot spare is activated in the cluster replicated volumes restripe onto the hot spare SSM A hot spare SSM is designated in the Console by the icon show below s Note Hot spares do not provide protection for non replicated volumes There must be some copy of data to be restriped onto the new SSM and non replicated volumes do not have copies Working with Clusters In order to have more than on
77. cluster to accommodate the increase in the volume s hard threshold when the snapshot is deleted Remember that the hard threshold will never exceed the volume size Protection Against Data Corruption Plan to use a series of snapshots deleting the oldest on a scheduled basis Consider the following questions in your planning What is the minimum size you can set for the hard threshold that will accommodate the changes likely to occur between snapshots Is space available on the cluster to create the snapshots Is space available in the cluster to accommodate the increase in the volume s hard threshold when the snapshot is deleted Intel Storage System Software User Manual 245 Working with Snapshots Creating a Snapshot Create a snapshot to preserve a version of a volume at a specific point in time 1 Log into the management group that contains the volume for which you want to create a new snapshot The management group Tab View opens 2 Select the volume on which you want to create a snapshot The volume Tab View opens shown in Figure 173 File Find Tasks View Help Available SSMs Transaction_Data cs a TransData05 Boulder 3 1 Boulder 2 a Boulder 1 CreditData05 Remote Snapshot Schedules Target Information Volume List Memberships Details Snapshots Snapshot Schedules Hosts f Remote Snapshot Name CreditData05 Size 8GB Replication Level 2 Way Created 07 06 2005 06 47 41 PM GMT Ha
78. daa a d ka ny dun b k y daka d na cari aay n anl d hn ak ainan 83 Prorsgul N DD Dy DD rr 83 Replacing Disks in RAID kk kk kk kK KK KA KAK kK KK KAK A 84 Adding Disksto th SSM ss slsl alika nln midi Hile ke kanan Man HAWA H kan SUR N Si ked ben HERR Han GA SAR b ak ka N 84 Diagrams of DISK Bays h kk kk kk k KAK KEK KAK KAKA KA KA kk KIRA A A KAK 84 Adding Disks and SSM Capacity L uE kk kk keke kk kK k K kK KK A kK 85 Memory Requirements for Adding DISKS E kk kk kk kK KK KAKA 86 Adding TDS IS s eeee e eeeoj mmn gbonanmnmnmnmmmnm 86 Powering Drives On Or Off silsila minalan kadina eih z sakin bidan balan Sin beka kurr binan baka nn s k ra guk n bidan b k 87 Powering Drives Off L iEE uEE kk kk kk kek kk k kk kk kK k KK KA kK KK KA kK KH 87 Power tig Drives O 5 salle n nin a k Ml d ne ziy e kaka kak HEL Ek ka Mak kak bi bek y Gara a Ari n r k 87 Chapter 4 Managing the Network ccccsssseeeeeeeeeseeeeeeeeeeeeeessneeeeeeeeseeseeeeeeeeees 89 Managing the Network Overview iE kek keke ek kr k k kk KK KA kK K KK KK 89 Getting TNC reinii a aat apaina pem mp 89 Mie TOPRIP TAD rem e DD r E eee eee ee 90 Identifying the Network Interfaces ll E EEE kk kk Kek kk kk KA KA KAK kK KA KK KA 90 Adding Interfaces to PEI SOS sk 4sy l l mlna n bn anlnkan na kan binn Milan selen sukan bidan kuR k RN 92 Co
79. disks Therefore an SSM must contain an even number of disks to configure RAID 1 10 RAID 5 50 RAID 5 50 requires sets of disks to configure Intel Storage System SSR316MJ2 requires sets of 4 or 8 disks up to a total of 16 disks Intel Storage System SSR212MA requires sets of 6 disks up to a total of 12 disks RAID Set Size The RAID set size is limited to 2 TB This means that the combined capacity of the disks participating in the RAID set cannot exceed 2 TB RAID 5 50 in the Intel Storage System SSR316MJ2 The following table illustrates RAID 5 50 capacity calculations for three different disk capacities in the Intel Storage System SSR316MJ2 Since 2 TB equals 2048 GB the RAID 5 50 configurations available for 400 and 500 GB disks are 3 plus a spare and 4 For Intel Storage A System Using Disk Capacity of SSR316MJ2 M Set 250 GB 400 GB 500 GB ze 3 plus spare 750 GB 1200 GB 1500 GB 4 disks 1000 GB 1600 GB 2000 GB 7 plus spare 1750 GB 2800 GB 3500 GB 8 disks 2000 GB 3200 GB 4000 GB 1 Parentheses indicate RAID set size greater than 2 TB Note Inthe Intel Storage System SSR316MUJ2 if you plan to use 400 or 500 GB drives configure RAID 5 50 for 3 plus spare or 4 disks Intel Storage System Software User Manual 63 Storage RAID 5 50 in the Intel Storage System SSR212MA The following table illustrates RAID 5 50 capacity calculations for three different disk
80. established when the SSM was first configured Note This user is viewable in the Storage System Console under SSM Administration Click Users and find the admin user on the list 1 Tab to Login and press Enter The Configuration Interface main menu opens shown in Figure 220 _ Configuration Interface Ne CP IP t Figure 220 Configuration Interface Main Menu Configuring Administrative Users Use the Configuration Interface to add new administrative users or to change administrative passwords You can only change the password for the administrative user that you used to log in to the Configuration Interface 1 On the Configuration Interface main menu tab to General Settings and press Enter The General window opens shown in Figure 221 General lt Add Adm rator c d Figure 221 General Settings Window Intel Storage System Software User Manual 309 Using the Configuration Interface 2 To add an administrative user tab to Add Administrator and press Enter Then enter the new user s name and password Confirm password tab to Ok and press Enter 3 To change the password for the user that you are currently logged in as tab to Change Password and press Enter Then enter the new password Confirm password tab to Ok and press Enter 4 On the General window tab to Done and press Enter Configuring a Network Connection The SSM has two 1000BASE T Gigabit Ethernet NICs in its motherboard
81. ever used in the snapshot and in the writable snapshot Max Full Highest level of block level space ever used e Cluster e SSM Volume e Snapshot Percent of raw space allocated to volumes and snapshots Percent of SSM raw space to which data has been written Percent of volume hard threshold raw space ever used Percent of snapshot hard threshold raw space ever used Misc Other information that impacts space usage e Cluster e SSM Volume e Snapshot Percent of raw space in the cluster that has been allocated for volumes and snapshots e Whether the SSM has been designated as a hot spare Replication level for the volume Replication level for the snapshot Usage Graphs The usage graphs shown in Figure 158 provide a visual display of the cluster usage The display updates in real time so you can easily see changes in the usage in the space allocated for the cluster and in the space used for volumes and snapshots Details Volumes NSMs Disk Usage Usage Graphs iSCSI Remote Snapshot TransData05 Total Alloc 157 45 GB Volumes vs Snapshots ae Allocated GB 15 20 BM Volumes M Snapshots W Free Space Figure 158 Disk Space Allocated and Used for the Cluster and its Volumes and Snapshots Intel Storage System Software User Manual 209 Working with Clusters iSCSI Tab Displays the virtual IP address if there is one and lists any iSNS serve
82. fhusOftargetO unO dise Device Type Disk Disk Disk Disk Disk Disk Disk Disk Disk Figure 53 Viewing the RAID Setup Report 68 Intel Storage System Software User Manual Storage This Item Describes This Device Name The disks pairs of disks or sets used in RAID For RAID 0 an entry for each disk in the SSM For RAID 1 and RAID 10 one entry for each disk pair For RAID 5 and RAID 50 one entry for each set Device Type The RAID level of the device For RAID 0 the device type is Disk For RAID 1 and RAID 10 the device type for each disk pair is RAID 1 For RAID 5 and RAID 50 the device type for each disk set is RAID 5 If the device is not functioning properly the RAID Level reads failed and the level For example failed 5 Subdevices The number of disks included in the device For RAID 0 there are no subdevices because each disk is listed separately in the report For RAID 1 and RAID 10 there are 2 subdevices per device Intel Storage System SSR316MJ2 For RAID 5 and RAID 50 there are either 4 or 8 subdevices per set Intel Storage System SSR212MA For RAID 5 and RAID 50 there are 6 devices per set Devices Configured in RAID 0 If RAID 0 is configured each physical disk operates as a separate RAID 0 disk as shown below RAID 0 disks 1 2 3 4 7 16 Figure 54 RAID 0 on an Intel Storage System
83. for that volume Volume List Memberships Tab Lists the volume lists and which volumes and authentication groups they are connected to 234 Intel Storage System Software User Manual Working with Volumes Editing a Volume When editing a volume you can change the description replication level replication priority size hard and soft thresholds the cluster that contains the volume whether the volume is configured for auto grow and whether checksumming is enabled Table 39 Requirements for Changing Volume Parameters Item Requirements for Changing Description Must be from 0 to 127 characters Cluster The target cluster must e Reside in the same management group Have sufficient unallocated space for the hard threshold and replication level of the volume being moved When moving a volume to a different cluster that volume will temporarily exist on both clusters Replication Level The cluster must have sufficient SSMs and unallocated space to support the new replication level Replication Priority To change the replication priority the replication level must support the change You can always go from Redundancy to Availability However you cannot go from Availability to Redundancy unless a sufficient number of SSMs are in the cluster to make the volume available For a detailed explanation see Table 36 on page 225 For example if you have 2 way replication with 3 SSMs in the cluster
84. information about completing the IP and Host Name List window 20 Intel Storage System Software User Manual Getting Started Once you have found SSMs the first time the Find settings are saved Every time you open the Console the search takes place and a window opens as shown in Figure 6 listing which SSMs have been found The window also lists any EBSD hosts that are found on the network Storage System Console SSM search results Host Name IP Status Golden 1 10 0 33 25 Newly Found Golden 2 10 0 33 35 Newly Found Golden 3 10 0 7 11 Newly Found EBSD hosts on the network Host Name Status Figure 6 SSMs Found Message When you click OK those SSMs appear in the Network View Note You can control which SSMs appear in the Network View by entering only specific IPs or Host Names in the IP and Host Name List window Then when you open the Console only those IPs or Host Names will appear in the Network View Modules Not Found If the network has a lot of traffic or if a module is busy reading or writing data it may not be found when a search is performed If a module is not found try the following steps to find it 1 Search again using the Find menu 2 If you have searched by Subnet and Mask try using the Find by IP or Host Name search 3 If searching again does not work try the following Check the physical connection of the module Wait a few minutes and try th
85. k kk KAK A KK KA KA 204 Creating a New CIlUSter L EEE Ek kk kk kk kk Kek kK KK KA KK 205 Configuring a Virtual IP Address for iSCSI ELEEE ER 206 Adding an ISNS SIV SF ister tee cicette center Raat 206 List of ISNS SGIV GUS se scenes casas teccpecahecnnacsesedecsycecuavsncetecesnccanenseaueceesusecndsdsecstanese 207 Viewing a Cluster and the Cluster Tab ccccceessseeeeeeceeeeeeeaeeeeeesseeestenseeees 207 Statistics for a GIWSTON sicitacecnsecansseecsetesstecnssescennscanecedanisseantdaabciedectessntadsseterseeaniee 208 Disk Space Allocated and Used for the Cluster and its Volumes and Snapshots Editing a GIU STON sec i i sy sun ninin belk al n in sin kiika a anka lS b ka b nan EEEE 211 SSM with Failed DiSK ELE kk kk kk kk kk kk k ke kak ke kk kK kk A kK 215 Viewing th Ghost SSM s iy sundi l dire xn Eh Eki nel kl san ba bee ek ENER 216 Returning the SSM to the Management Group E uE Eke 216 Returning the Repaired SSM to the Cluster L E EEE ERE 217 Write Patterns in 2 way Replication Eu EEE kk kkK 224 Up to Ten Automatic Increments for Auto GI OW kk 228 Example Manual Auto Grow Chart LL kk kk kek Acad 229 Example Automatic Auto Grow Chhari u E kk kk ek kek 230 Viewing the Volumes TaD l llluEkkk kk kek kk ec eerie 231 Creating a New Primary Volume kk kk kk kk ke 232 Setting Replication to None
86. ke 174 List of SSMS Running Managers LiuEE Ek kk kek K k kk 175 Viewing a Management Group in the Console EE E 175 Editing a Management GIOUD EEEE Eke kk kk kk kk kk KK k ke 179 Adding an SSM to Existing Management Group EEEEE k 180 Starting a Manager eiseressen sideahad kan sir bask kan bance M A Wan n ka s k n b a neues 182 Adding Manager IP Addresses to Application Servers EEEEEU 183 Backing up the Management Group Configuration EUEEEEEEEEEUU UUEUUEUEE 185 Save Window for Backing up the Management Group Configuration 186 Opening the Configuration Binary File LLE kek n 188 Verifying the Management Group Configuration EEEEEE EE 188 Correct Two site Failure Scenarios Using Virtual Managers 193 Incorrect Uses of Virtual Manager to Regain Quorum 194 Adding SSMs to Cluster in Alternating Site Order EEE EEEEEEUUUUUU UEE 196 Cluster with SSMs Added in Alternating Order EEE EE 197 Management Group with Virtual Manager Added EEEE EEE 198 Starting a Virtual Manager aiascds seeded ccoucteees nceeneeioneulan seedeeunantinds aemneuiis kek K k KH 199 Indicator of the Virtual MAMAQEN irc sssccineccarssicistacdcasemianaasesreeiensesseenn dareneeeevematte 199 Viewing the Clusters Tal kk kk aca k
87. kk K k kk kk A KA KAK KA kk KA A eect 153 Using ACIVe Wella ET rt eee_ _o_ n a aommrmrrmpemmmm 154 Setting Notification Methods for Monitored Variables UUL EEEEEEEEEEEEU UEUEEEEE 155 Removing a Variable from Active Monitoring i keke 156 Adding Variables to Monitor k kkiiim kk kk kk k eka k kk k kak kk kK 156 Downloading a Variable Log File uu Ek kk kk AKA KA 158 Viewing the Variable SUMMAary l iuE Eek kek kek kek E kk kK KAK KAK 158 List of Monitored Variables u kk kk kk kK KK KAK KA kk KAK A A 159 Setting Email Notification EELLEE EEE kk eet Kek kK K k Kr K KAK RR 161 Running Diagnostics E Ek kk kk kk K Kek kK KK KA KK KAKA KK KK KAK KA A KK KAK A AA nnana 162 Viewing the Diagnostic Report kk KEK kk kK KAK KK AR KRA 163 List of Diagnostic Tests JL AL A l E EEiE EEE k kK KK KK KK A KA KAK KAR KA KK KAK 163 Viewing PEA CE HHHHHHHHHHHHHHHHHNNNNNNHNHHHNHNHFNHDDININIDIMI IZN 165 Chapter 9 Working with Management Groups ccsseeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeees 167 Requirements for Creating Management Groups EE EEE kk kk kes 167 AMM Dacawwwww gt p gt 3 gt gt 3 gt 3bpnp2pp DDD DD DDD xxxxbbnbbx x _n mmrmrbxnm_mmmm 168 Functions of MANAGEIS lt xis Hacl lanik Aman xalki kay kikan E ka w k MALE HH a bave aka nak eakas aaa 168 Managers and QUOTUM K Eu kk kk kk kek kK kk
88. kwegner wxg Target Secret Kardak Initiator Secret a Cancel Figure 187 Adding an Initiator Secret for 2 way CHAP Shown in the MS iSCSI Initiator Warning Allowing more than one iSCSI application server to connect to a volume could result in data corruption Intel Storage System Software User Manual 275 Controlling Client Access to Volumes Client Access and EBSD Clients accessing volumes using EBSD can be restricted via specific subnets and masks or they can be unrestricted When configuring client access using EBSD you create an authentication group that allows EBSD access The New Authentication Group window with the EBSD tab is shown in Figure 188 New Authentication Group F xj New Authentication Group Name CreditTransAG Description Volume List No Volume List iscsi EBSD Fibre Channel j Allow access via EBSD Authentication Hosts with the following subnets and masks Subnet Hosts with all subnets and masks Figure 188 Creating a New Authentication Group for EBSD Access Planning EBSD access requires planning how you want to configure authentication Only hosts which map to designated subnets and masks All hosts 276 Intel Storage System Software User Manual Controlling Client Access to Volumes Client Access and Fibre Channel Intel Storage System SSR316MJ2 on
89. kwegner wxp CHAP required Target secret e CHAP Name qn 1991 05 com microsoft kwegner wxp r TT Perform mutual authentication Target Secret To use mutual CHAP specify an initiator secret on the Initiator Settings Initiator Secret page and configure that secret on the target Figure 186 Configuring iSCSI shown in the MS iSCSI initiator for a Single Host with CHAP Figure 187 illustrates the configuration for a single host authentication with 2 way CHAP required New Authentication Group x New Authentication Group iSCSI Initiator Properties xj General Discovery Targets Persistent Targets Bound Volumes Devices Name lAuthGroup_0 The iSCSI protocol uses the following information to uniquely identify this initiator and authenticate targets Description Initiator Node Name ign 1991 05 com micrasoft kwegner wxp Volume List No Volume List iSCSI EBSD Fibre Channel To rename the initiator node click Change id Allow access via SC To authenticate targets using CHAP click Secret to Authentication specify a CHAP secret To configure IPSec Tunnel Mode addresses click CHAP not required CHAP Secret Setup The secret allows the initiator to authenticate targets when performing mutual CHAP Targets must also be configured with this initiator secret CHAP required RITE N CHAP Name iqn 1991 05 com microsoft l
90. management group in the Network View The management group Tab View opens 2 Click the Authentication Groups tab to bring it to the front 3 Select from the list the group you want to edit 4 From the Tasks menu select Edit Authentication Group The Edit Authentication Group window opens shown in Figure 200 Intel Storage System Software User Manual 285 Controlling Client Access to Volumes 2 6 r Edit Authentication Group Edit Authentication Group Name Description Volume List Credit iscsi EBSD Fibre Channel Z Allow access via iSCSI Authentication CHAP not required Initiator Node Name jign 1991 05 com microsof kwegner wxp CHAP required Figure 200 Editing an Authentication Group Select the appropriate tab for the group you are editing Change the appropriate information Click OK when you are finished Deleting an Authentication Group Deleting an authentication group will stop access to volumes by clients using that group Access to the same volume by other authentication groups continues 1 286 Log into the management group and select that management group in the Network View The management group Tab View opens Click the Authentication Groups tab to bring it to the front Select from the list the group you want to delete From the Tasks menu select Delete Authentication Group A confirmation window opens Click OK to d
91. name for the backup file Note The configuration files for all SSMs that you back up are stored on the computer running the Console If you back up multiple SSMs be sure to give each SSM configuration file a unique and descriptive name This will make it easier to locate the correct configuration file if you need to restore the configuration of a specific SSM 4 Click Save 48 Intel Storage System Software User Manual Working with Storage System Modules Restoring the SSM Configuration from a File Use Restore to restore the configuration of an SSM 1 On the Backup and Restore tab click Restore The Restore SSM window opens shown in Figure 40 File Name jlntel Storage Server Boulder_2_Configuration_Backup Browse Version 6 3 0 Description module configuration Install SSM Version Management Group Cluster _ Boulder 3 10 0 33 6 3 70 0007 0 Available SSMs Golden 2 10 0 33 0 0 0 0 0 Trans_Data Not Logged In F Golden 1 10 0 33 6 3 30 0001 0 Trans_Data Not Logged In Check All Clear All Install file on selected SSMs one at a time Recommended Install file on selected SSMs simultaneously Advanced Figure 40 Restoring the ssm Configuration File 2 Select the Install check box next to the SSM you want to restore You can select multiple SSMs to restore from the list 3 Select Install file on selected SSMs one at a time Recommended 4 Click Browse to nav
92. network link goes down during the process copying resumes where it left off when the link is restored Intel Storage System Software User Manual 337 Remote Copy Planning for Remote Copy Remote Copy works at the management group cluster volume snapshot and SSM level Table 60 Remote Copy and Management Groups Clusters Volumes Snapshots and SSMs Storage System Level Remote Copy Configuration Management Groups Remote snapshots can be created in the same management group or in a different management group than the primary volume f using different management groups the remote bandwidth setting of the management group containing the remote volume determines the maximum rate of data transfer to the remote snapshot Clusters Remote snapshots can be created in the same cluster or ina different cluster than the primary volume Volumes e Primary volumes contain the data to be copied to the remote snapshot Data is copied to the remote snapshot via the remote volume The remote volume is a pointer to the remote snapshot The remote volume has a size of 0 Snapshots e Once data is copied from the primary snapshot to the remote snapshot the remote snapshot behaves as a regular snapshot SSM Active monitoring of each SSM notifies you when copies complete or fail Active monitoring also notifies you if a remote volume or snapshot is made primary or if the status of the connection between m
93. of Remote Data Protection Pak Evaluation 300 Safely Backing Out of Scripting Evaluation cccceeeeeeeeeeeeeeeeeeeeeneeeeeeseneeeeensaes 302 Parameters in G DSO COM ixi ii4ikkxi ka cette cceteccecee settee scees ariaa suk Wa EA kk A RRR AH RA RE REWE a arni 325 Parameters for proc ebsd client uE Ek kk kk kk kk kK k YA 327 Uses for Remote CO y Ei eke eke kek k rk kK k K k KA KK KK KA KAK 337 Remote Copy and Management Groups Clusters Volumes Snapshots and SSMs Snapshot Retention Policy and Maximum Number of Snapshots Retained 341 Remote Copy Planning Checklist E E caine neue ek kk kek 341 Values for Remote Copy Details WindoOw uE eke 354 Steps 16 Create Snapshots acai i4so5xd y kn mana bldak nak aa Man E beli zi salana bizan RE 365 Requirements for Rolling Back a Primary Volume E E 368 Intel Storage System Software User Manual 1 Getting Started Welcome to the Intel Storage System Console Console The Console is used to configure and manage storage volumes spanning clustered Storage System Modules SSMs After you have installed your SSMs and have installed the Console on the system administrator s PC you must take certain steps to prepare for creating storage clusters and volumes The Console is the storage administrator s tool for Configuring and managing the SSM Creating a
94. password gt lt manager ip gt volume_autogrow_get lt volume name gt lt failure timeout seconds gt Example java commandline CommandLine jjones trumpet 10 0 111 212 volume_autogrow_get X Rays 60 Scripted Commands for Remote Copy Scripting operations for Remote Copy use the same tools that are available for scripting snapshots with the addition of parameters specific to Remote Copy Using the command line parameters allows you to create scripts for Creating a primary snapshot Creating a remote snapshot Making a primary volume into a remote volume Failing over to a remote snapshot Creating A Remote Snapshot In A Different Management Group 1 Create the primary snapshot java commandline CommandLine lt primary admin name gt lt primary admin password gt lt primary manager ip gt volume_snapshot lt primary volume name gt lt primary snapshot name gt lt soft threshold Megabytes gt lt hard threshold Megabytes gt lt description gt lt failure timeout seconds gt 2 Create the remote snapshot java commandline CommandLine lt remote admin name gt lt remote admin password gt lt remote manager ip gt volume_remote_snapshot lt remote volume name gt lt remot snapshot name gt lt remote snapshot description gt lt primary admin name gt lt primary admin password gt lt primary manager ip gt lt primary snapshot name gt lt failure timeout seconds gt Example Joe Jones plans to create
95. return a variable to active monitoring at any time Permanent variables such as motherboard temperature cannot be removed See List of Monitored Variables on page 159 1 Select the variable you want to remove 2 Click Remove A confirmation message opens 3 Click OK The variable is removed Note Variables are not deleted when they are removed from active monitoring You can add them back to active monitoring at any time Adding Variables to Monitor You can only add variables that have been previously removed The variables that the SSM is currently monitoring are listed in the box All variables in the list are configured and set for Console alerts 1 Click Add The Configure Variable wizard opens to Step 1 shown in Figure 118 Configure ariable Step 1 of 3 Select Variable Fibre Channel Status Cancel Figure 118 Adding a Variable Step 1 2 Select the variable that you want to monitor and click Next The Configure Variable wizard Step 2 opens shown in Figure 119 156 Intel Storage System Software User Manual Reporting Er Specify Frequency Seconds Enter number of minutes Minutes 1 lt Back Next gt cancer Figure 119 Adding a Variable Step 2 3 Specify the frequency for monitoring the variable and click Next The Configure Variable wizard Step 3 opens Configure Yariable Step 3 of 3 xj The following actions will occur when th
96. sec Figure 246 Remote Snapshot Details for a Remote Copy in Progress Scheduling Remote Snapshots Scheduled remote snapshots provide high availability for business continuance disaster recovery and provide a consistent predictable update of data for remote backup and recovery The first step in scheduling remote snapshots is planning for creating and deleting primary and remote snapshots Issues that require planning include e Recurrence frequency Intel Storage System Software User Manual 355 Remote Copy Creating 356 Snapshot thresholds e Retention policies For detailed information about these issues see Planning for Remote Copy on page 7 Once you have defined your plan you are ready to create the remote snapshot schedule These are the basic steps you will follow 1 Create the schedule 2 Configure the primary volume and snapshot 3 Create the remote volume and configure remote snapshots Detailed instructions are provided in the following sections the Schedule 1 Right click the volume for which you want to create the remote snapshot schedule and then select Remote Copy gt New Remote Snapshot Schedule The New Remote Snapshot Schedule window opens shown in Figure 247 2 Type a name for the schedule 3 Optional Type a description for the schedule New Remote Snapshot Schedule a New Remote Snapshot Schedule Name RC_Sch_O Description snapshot Remote Sna
97. status becomes Passive Failed Slot1 PortO status changes to Active 3 The Motherboard Port0 link is restored Motherboard Port0 status changes to Active after a 30 second delay Slot1 PortO status changes to Passive Ready Intel Storage System Software User Manual Summary of NIC Status Durin g Failover Managing the Network Table 16 shows the states of Motherboard Port0 and Slot1 Port0 when configured for Active Backup Table 16 NIC Status During Failover with Active Backup Failover Status Status of Motherboard Port0 Status of Slot1 Port0 Normal Operation Preferred Yes Status Active Data Transfer Yes Preferred No Status Passive Ready Data Transfer No Motherboard Port0 Fails Data Transfer Fails Over to Slot1 Porto Preferred Yes Status Passive Failed Data Transfer No Preferred No Status Active Data Transfer Yes Motherboard PortO Restored Preferred Yes Status Active Data Transfer Yes Preferred No Status Passive Ready Data Transfer No Example Network Configurations with Active Backup Two simple network configurations using active backup in high availability environments are illustrated Intel Storage System Software User Manual 99 Managing the Network Active W EE Storage Module Cluster Figure 75 Active Backup in a Two switch Topology with Server Failover
98. switch capabilities you can bond NICs in two ways Active Backup You specify a preferred NIC for the bonded logical interface to use If the preferred NIC fails then the logical interface begins using another NIC in the bond until the preferred NIC resumes operation When the preferred NIC resumes operation data transfer resumes on the preferred NIC NIC Aggregation The logical interface uses both NICs simultaneously for data transfer This configuration increases network bandwidth and if one NIC fails the other continues operating normally Warning NIC aggregation requires plugging both NICs into the same switch This means that NIC aggregation does not protect against switch failure You can create bonds of 2 or 4 NICs A NIC can only be in one bond Best Practices NIC aggregation provides bandwidth gains because data is transferred over both NICs simultaneously For NIC aggregation both NICs must be plugged into the same switch and that switch must be LACP capable and support 802 3ad aggregation Because both NICs are plugged into the same switch NIC aggregation does not protect against switch failure For active backup plug the two NICs on the SSM into separate switches While NIC aggregation will only survive a port failure active backup will survive a switch failure Table 12 Comparison of Active Backup and NIC Aggregation Bonding Feature Active Backup NIC Aggregation Bandwidth Use of 1 NIC at at
99. the network such as a file server 8 Click Next Review the Pre installation Summary window 9 Click Install The EBSD driver bundle is copied into the directory you specified The driver bundle contains tar gz files for all the versions of Linux that are currently supported plus an install sh file to install the driver With Autorun Not Enabled 1 Insert the driver CD in to the CD drive of the EBSD host server 2 Open a terminal window 3 Navigate to the VM directory on the cd cd mnt cdrom Disk1 InstData VM This directory contains the EBSD6x_setup bin binary file that will launch the automatic install 4 Launch the automatic install by issuing the following command sh EBSD6x_setup bin The automatic installer launches Installing the EBSD Driver Using the CD or the Driver Bundles You can install the EBSD driver locally using the CD or using a driver bundle from a network share See Copying Driver Bundle to a Network Share Optional on page 319 320 Intel Storage System Software User Manual Using the EBSD Driver for Linux Installing from the CD Installing from a Network Share 1 Start the Windows Manager of your 1 Optional Copy one or all tar gz file s and choice such as KDE or GNOME the install sh file to the computer on which 2 Insert the driver CD into the CD drive you want to install the driver of the EBSD client PC Autorun See Copying Driver Bundle to a Network should automatica
100. the Tab View The Managers tab displays shown in Figure 138 Intel Storage System Software User Manual 181 Working with Management Groups File Find Tasks View Help G Available SSMs MM Transaction_Data a me l y EE 7 a Denver 3 Denver 1 Denver 2 Details Managers Clusters Authentication Groups Volume Lists Register Times Remote Snapshot Name Manager Virtual Manager Denver 1 Yes Figure 138 Starting a Manager 3 Select from the list the SSM on which you want to start a manager 4 From the Tasks menu click Start Manager 5 Click OK 182 Intel Storage System Software User Manual Working with Management Groups Adding Manager IP Addresses to Application Servers When you add a manager to a management group a window opens shown in Figure 139 which displays all the IP addresses of the managers in that management group and a reminder to reconfigure the application servers that are affected by the change Manager IP Addresses For each host that is using EBSD enter the following manager IP addresses in the driver dialog box used to create and edit volumes 10 0 33 18 10 0 33 25 Save Manager IP Addresses Figure 139 Adding Manager IP Addresses to Application Servers Click Save Manager IP Addresses to save this list You can print the list and use it as a reference when reconfiguring application servers Stopping a A
101. the management group and select that management group in the Network View The management group tab view opens 2 Click the Authentication Groups tab to bring it to the front 3 From the Tasks menu select New Authentication Group The New Authentication Group window opens shown in Figure 193 Intel Storage System Software User Manual 279 Controlling Client Access to Volumes New Authentication Group New Authentication Group Name AuthGroup_ol Description Volume List No Volume List iscsi EBSD Fibre Channel C Allow access via iSCSI Authentication Coma Figure 193 Creating a New Authentication Group 4 Type a name and description for the authentication group The authentication group name is case sensitive 5 Select the volume list if appropriate The volume list can be added later 6 Select the tab for the appropriate type of host access Configuring iSCSI 1 On the Authentication Group iSCSI tab shown in Figure 194 select the check box to allow access via iSCSI 2 Select the authentication method Warning Allowing more than one iSCSI application server to connect to a volume could result in data corruption 280 Intel Storage System Software User Manual Controlling Client Access to Volumes New Authentication Group New Authentication Group Name CreditTransAG Description Volume List No Volume List iS
102. those SSMs You can connect to one specific IP or host name or find all the SSMs in the list Network Configuration and Find by IP or Host Name The way your network is configured may affect the results of finding SSMs by IP address An example of the effect of network configuration is detailed below e You configure both NICs in an SSM eth0 and eth1 The NICs are on separate subnets e You open the Console on a system on the same subnet as the ethO NIC on the SSM The Console Find function is set to Module IP or Host Name using only the IP address of the eth NIC The SSM is discovered and appears in the Console However the IP address returned to the Console is that of the ethO NIC The eth1 IP address is not discovered This is normal behavior controlled by the way networking is configured The SSM receives the broadcast and replies through eth0 regardless of which NIC received the broadcast The Console picks up the address from the packet that was sent through eth0 and displays it as representative of the SSM 24 Intel Storage System Software User Manual Getting Started To Find by IP or Host Name 1 If this is the first time you have opened the Console select By Module IP or Host Name at the dialog box then click OK or Click the Find menu and click By Module IP or Host Name The IP and Host Name List window opens as shown in Figure 9 IP and Host Name List xj List of IPs or host names to search for
103. to configure your session Bits per second 19200 Data bits 8 Parity None Stop bits 1 Flow control None Backspace key sends Del Emulation ANSI If using HyperTerminal set the properties for the backspace key and emulation after the session is established If you exit the session and return to the session in order to use the Configuration Interface the screen will not open correctly Power up the SSM with the replacement DOM From the laptop you should be able to observe two boot cycles A boot cycle is indicated by a Welcome to SAN IQ message displayed on the screen On the second boot the cycle should end with a DOM replacement logic OS was restored to DOM on previous boot cycle message The logon screen will display indicating a proper restoration process Caution Do not execute any keyboard commands such as lt ESC gt to view diagnostic messages lt F2 gt to enter setup lt F12 gt for a network boot lt CTRL gt lt G gt for running the RAID BIOS Console or login to the storage system during reboot Note Disregard any failed statuses and failure messages during reboot These statuses messages are normal and are not an indication of a failure The entire restoration process if successful will take about 30 minutes Once the two boot cycles have executed ensure the system has been restored From the laptop or text interface log in and verify that the IP
104. to read and write to the volume This is useful in failover recovery if you want to use the failover site as the acting primary site Note You cannot make a remote volume into a primary volume while a remote snapshot is in progress Wait until the remote snapshot copy is complete before making the remote volume into a primary volume 362 Intel Storage System Software User Manual Remote Copy Designating Size and Threshold Values for the Converted Volume If the remote volume was originally created as a remote volume you will need to designate a volume size and hard and soft thresholds If the remote volume was originally created as a primary volume that was then changed to remote returning that volume to its primary state will automatically return the original size and threshold values You can change these values before completing the conversion 1 Log in to the management group containing the remote volume that you want to convert 2 Right click the volume in the network view and select Edit Volume The Edit Remote Volume window opens 3 Change the Type from Remote to Primary Notice that the window changes to the Edit Volume window and all the fields are greyed out as shown in Figure 253 x RT x Edit Remote Volume Edit Volume Type Primary Remote Type Remote Volume Name Volume Name Description Description Created Created Cluster TransData_BkUp v Cluster Replication Level None v Rep
105. use NTP to manage the time for the SSM NTP updates are fixed at 5 minute intervals You still must set the time zone for the SSM See Setting the SSM Time Zone on page 124 1 Select On in the NTP Mode area The Add NTP Server dialog opens shown in Figure 93 Ada v r server TER NTP Server Preferred Not Preferred Figure 93 Adding an NTP Server 2 Type the IP address of the NTP server you want to use 3 Click whether you want the NTP server to be designated preferred or not preferred Note A preferred NTP server is one that is more reliable such as a server that is on a local network An NTP server on a local network would have a reliable and fast connection to the SSM Not preferred designates an NTP server to be used as a back up if a preferred NTP server is not available An NTP server that is not preferred might be located further away and have a less reliable connection 126 Intel Storage System Software User Manual Setting the Date and Time 4 Click OK The NTP server is added to the list on the NTP tab shown in Figure 94 Q Module m Storage L Time NTP Mode L g TCP IP Network ji n e SSM Administration lon Oorr g8 SNMP e Reporting SSM Time Zone SSM Date and Time NTP NTP Server Preferred time mit edu yes Figure 94 Viewing the List of NTP Servers Editing NTP Servers You can change the pro
106. using Remote Copy This chapter provides instructions for registering configuring and using Remote Copy for business continuance backup and recovery and failover Registering Remote Copy Remote Copy is a feature upgrade You must purchase a Remote Data Protection Pak license to use Remote Copy beyond the 30 day evaluation period For information about registering Remote Copy licenses see Chapter 16 Feature Registration Number of Remote Copy Licenses Required Register Remote Copy on each management group that contains SSMs that will participate in Remote Copy If there are SSMs in a management group that will not contain Remote Copy primary or remote volumes you do not need to purchase licenses for those modules For example if your management group contains a cluster of two SSMs that will contain a remote volume and another cluster of three SSMs that will not use Remote Copy you only need two Remote Copy licenses Remote Copy Glossary for Remote Copy 334 The following terminology is used in describing the components and processes involved in Remote Copy Term Definition Primary Volume The volume which is being accessed by the application server The primary volume is the volume that is backed up with Remote Copy Primary Snapshot A snapshot of the primary volume which is created in the process of creating a remote snapshot The primary snapshot is located on the same cluster as the prima
107. volume select the management group and existing remote volume in the Remote section of the New Remote Snapshot window Otherwise create a remote volume See Creating a Remote Volume on page 346 344 Intel Storage System Software User Manual New Remote Snapshot New Remote Snapshot rPrimary Management Group Volume Name Snapshot Name Transaction_Data CreditData05 Snapshot_0 New Snapshot Remote Management Group Volume Name Transaction_Data Y CreditData05 bel New Volume Remote Copy Snapshot Name Snapshot Description Figure 235 New Primary Snapshot Created Completing the Remote Snapshot 1 Type a name for the remote snapshot 2 Optional Type a description for the snapshot The completed window is shown in Figure 236 3 Click OK New Remote Snapshot Primary Management Group Transaction_Data Volume Name CreditData05 Snapshot Name Snapshot_0 New Snapshot rRemote Management Group Transaction_Data Y Volume Name Volume_0 New Volume Snapshot Name BkUpss_1 Snapshot Description Figure 236 Completing the New Remote Snapshot Dialog The system creates the remote snapshot in the cluster that contains the remote volume The system then copies the primary snapshot onto the remote snapshot The process of copying the data may take some time The remote snapshot appears below th
108. with a static IP address and then restore that configuration to a second SSM the second SSM will have the same IP address Rebooting the SSM Reboot the SSM from the Console without powering off Set the amount of time before the reboot begins to ensure that any activity to the module has stopped 1 Log in to the SSM 2 Select the Power Off tab The Power Off window opens shown in Figure 42 50 Intel Storage System Software User Manual Working with Storage System Modules Ha Storage H Time H gs TCP IP Network H amp SSM Administration Fa SNMP L fa Reporting Power Off Feature Registration Boot Devices Module Information Backup amp Restore Reboot Power Off in 5 minutes Reboot O Log Out Figure 42 Shutting Down or Rebooting the SSM Select Reboot In the minutes field type the number of minutes before the reboot should begin You can enter any whole number greater than or equal to 0 If you enter 0 the SSM will reboot as soon as you complete step 6 Click Reboot A confirmation message appears Click OK The SSM will reboot in the specified number of minutes When reboot actually begins the SSM disappears from the Network View The reboot takes 3 to 4 minutes Search for the SSM to reconnect the Console to the module once it has finished rebooting See Finding by Subnet and Mask on page 22 or Finding by Module IP or Host Name
109. with asynchronous Remote Copy on a different cluster of SSMs creates a robust high availability configuration Uses for Remote Copy Table 59 Uses for Remote Copy Use Remote Copy for How It Works Business continuance disaster recovery Using Remote Copy store remote snapshots off site The remote snapshots remain continuously available in the event of a site or system failure Off site backup and recovery Remote Copy eliminates the backup window on an application server by creating remote snapshots on a backup server either local or remote and backing up from that server Split mirror data migration content distribution Using Remote Copy make a complete copy of one or more volumes without interrupting access to the original volumes Move the copy of the volume to the location where it is needed Benefits of Remote Copy Remote Copy maintains the primary volume s availability to application servers Snapshots on the primary volume are taken instantaneously and are then copied to remote snapshots in the off site location Remote Copy operates at the block level moving large amounts of data much more quickly than file system copying Snapshots are incremental that is snapshots save only those changes in the volume since the last snapshot was created Hence failover recovery may need to resynchronize only the latest changes rather than the entire volume Remote Copy is robust If the
110. with the feature or application become unavailable to any clients The data is safe and you can manage the volumes and snapshots in the Console Also the entire configuration can be restored to availability when a license key is obtained and applied to the SSMs in the management group containing the configured features Note If you know you are not going to purchase the feature plan to remove any volumes and snapshots created by using the feature before the end of the 30 day evaluation period Tracking the Time Remaining in the Evaluation Period Track the time left on your 30 day evaluation period by using either the management group Register tab shown in Figure 210 or the reminder notices that open periodically as shown in Figure 211 Details i Managers Clusters Authentication Groups Volume Lists Times Remote Snapshot You have 29 days 23 hours and 29 minutes left in your evaluation period After the evaluation period volumes and snapshots attached to clusters containing license violations will become unavailable Management group version is 6 0 C Communications protocol version is 2 E SSM Colorado 2 F D Provisioning server version is 6 0 14 0001 0 H B Storage server version is 6 0 14 0001 Figure 210 Evaluation Period Countdown on Register Tab License iolations for Transaction_Data The following license agreements are being violated in Transaction_Data LA You hav
111. with the same user name and password by double clicking those SSMs in the Network view If you try to log in to an SSM that uses a different user name or password the Log In window opens shown in Figure 24 Log in to SSM Log in to SSM Golden 2 10 0 33 17 Trying the user name and password from the following SSM s failed SSM Golden 1 admin user name or password was incorrect User Name Password Figure 24 Automatic Log in Failure 1 Type the correct User Name and Password 2 Click Log In 34 Intel Storage System Software User Manual Getting Started Logging Out of the SSM Log out to prevent access to an SSM without closing the Console This provides security if you are leaving the management workstation but do not want to close the Console 1 When the SSM Configuration window is open click Log Out shown in Figure 25 The Network view opens and the SSM you logged out of no longer displays the logged in icon the pink square Note If you are logged in to multiple SSMs you need to log out of each SSM individually SSM Configuration Window The SSM Configuration window opens when you log into an individual SSM From the configuration window you have access to all configuration tasks for individual SSMs To configure specific settings of an individual module you use the SSM Configuration window shown in Figure 25 Power Off Feature Registration Boot Devices Modu
112. 0 0 0 for the Gateway address 4 Tab to OK and press Enter to complete the network configuration A second window opens asking you to confirm the changes 5 Press Enter Return to the Storage System Console and locate the SSM using the Find menu to search by subnet and mask or search by entering the SSM IP address Deleting a NIC Bond You can delete two types of NIC bonds using the Configuration Interface Active backup bond e NIC aggregation bond For more information about creating and configuring NIC aggregation and active backup bonds see Configuring NIC Bonding on page 95 When you delete an active backup bond the primary interface assumes the IP address and configuration of the deleted logical interface The other NIC is disabled and its IP address is set to 0 0 0 0 When you delete a NIC aggregation bond one of the active interfaces in the bond retains the IP address of the deleted logical interface The other NIC is disabled and its IP address is set to 0 0 0 0 1 On the Configuration Interface main menu tab to Network TCP IP Settings and press Enter The Available Network Devices window opens shown in Figure 224 The logical bond is listed in the window Intel Storage System Software User Manual 311 Using the Configuration Interface Figure 224 Selecting a Bonded Interface in the Available Network Devices Window 2 Tab to select the bond and press Enter The Logical Failover Device window opens s
113. 0 0 12 36 Bouldert SSM Credit_05 Figure 162 Returning the SSM to the Management Group 7 Edit the cluster and add the repaired SSM to the cluster Warning The repaired SSM must be returned to the cluster in the same place it originally occupied to have the cluster resync rather than restripe To return the repaired SSM to the cluster in the original order 8 In the Edit Cluster window shown in Figure 163 remove any SSMs in the list that are below the ghost SSM The removed SSMs return to the SSMs Available column 216 Intel Storage System Software User Manual Working with Clusters Edit Cluster Ghost SSM as placeholder Repaired SSM General iSCSI Cluster Name Description SSMs Available SSMs in Cluster SSM IP RAID SSM IP RAID 10 0 3318 10 0 33 18 Not Availab Boulder 2 10 0 33 17 Stripe Boulder 1 10 0 33 13 Stripe lt Add lt Add all Remove gt Remove ant 9 Hot Spare None Hot Spare Time Out 0 Seconds Cancel Figure 163 Returning the Repaired SSM to the Cluster 9 Remove the ghost SSM 10 Select the repaired SSM and add it to the cluster It will be in the place reserved by the ghost SSM 11 Add any remaining SSMs to the cluster 12 Click OK The SSMs are in the cluster in their original order The ghost SSM is removed from the cluster 13 Select
114. 10 create mirrored disk pairs there must be an even number of disks in the SSM If you configure RAID 1 or RAID 10 on an SSM that contains an odd number of disks RAID will be configured but the odd disk will not be included in RAID For example if the SSM contains 9 disks then disks 1 8 will be included in 4 disk pairs Disk 9 will be inactive If you add a 10th disk later you can add disks 9 and 10 to RAID RAID 5 and RAID 50 can only be configured on completely populated sets of disks The Intel Storage System SSR316MJ2 must contain 4 8 12 or 16 disks The Intel Storage System SSR212MA must contain either 6 or 12 disks Management Groups and RAID You cannot configure RAID on an SSM that is already in a management group If you want to change the RAID configuration for an SSM that is in a management group you must first remove it from the management group Clusters and RAID All SSMs in a cluster must have the same RAID configuration However you can have mixed versions of RAID 5 50 within a cluster In the Intel Storage System SSR316MJ2 for example you have 1 SSM with four 4 disk sets configured as 3 plus a spare and 1 SSM with two 8 disk sets configured as 8 disks per set Configuring RAID Before you configure RAID make sure that the disks in the SSM are inserted in contiguous disk bays from left to right and for the Intel Storage System SSR212MA from top to bottom as shown in Figure 67 and Figure 68
115. 2 Right click and select Log Out of Management Group Adding an SSM to an Existing Management Group SSMs can be added to management groups at any time Adding an SSM to a management group increases the storage space available to the group The newly added SSM can also be used as a hot spare for a cluster within the management group Note All SSMs in a cluster must be configured alike See SSM Configuration Window on page 35 1 Select the SSM that you want to add to a management group 2 Right click and select Add to New or Current Management Group The Add to or Create a Management Group window opens shown in Figure 137 Add to or create a Management Group Select a management group for SSM Denver 2 10 0 33 18 to join or create a new management group Existing Management Group Group Name Transaction_Data New Management Group Figure 137 Adding an SSM to Existing Management Group 3 Select the correct management group from the list of existing management groups 4 Click Add 5 Optional If you want the SSM to run a manager select the SSM in the management group right click and select Start Manager Adding Manager IP Addresses to Application Servers When you add a manager to a management group a window opens which displays all the IP addresses of the managers in that management group and a reminder to reconfigure the application servers that are affected by the change Click Save
116. 33 Administrative Users and Groups What the Permission Levels Mean Read Only User can only view the information about these functions Read Modify User can view and modify existing settings for these functions Full Users can perform all actions view modify add new delete in all functions Sorting Columns in the Administrative Group Window The columns in the Administrative Group window can be sorted in ascending or descending order Click on the column header to sort Click again to reverse the sort The arrow next to the column title indicates which column is the sorted column and whether the sorting order is ascending up arrow or descending down arrow m Module Groups Users Sorting indicator Contains Administrators Description full_administrator rootadmin Manage all Functions i r ge SNMP view_only_administrator View only all Functions L a Reporting eya a Figure 100 Sorting Administrative Groups Editing Administrative Groups Change information about administrative groups Administrative groups are listed on the SSM Administration window on the Groups tab 1 Select SSM Administration from the configuration categories 2 Select the group you want to edit 3 Click Edit The Edit Administrative Group window opens shown in Figure 101 134 Intel Storage System Software User Manual Administrative Users and Groups Edit Administrative Group General
117. 5 Remote Copy Table 64 Steps to Create Snapshots Volumes and Volumes and Snapshots on Snapshots on z Action Activity Primary Remote pipe bles Asia Management Management p Group Group 2 Make a snapshot of the OrigPrimaryVol_0 Creates a snapshot of the original primary volume that includes the data from 1 00 1 30 original volume OrigPrimarySS 0 p m 3 Make the acting primary RemoteVol_0 Returns the remote volume into the remote management group to ActPrimarySS_0 its original configuration volume This automatically creates a snapshot of the acting primary volume 2 Synchronize the Data Synchronize the snapshots OrigPrimarySS_0 and ActPrimarySS_0 created in Steps 2 and 3 of Table 64 as appropriate for the application Creating a New Primary Volume at the Original Production Site If the original primary volume is not available designate a new primary volume synchro nize the data from the acting primary volume and configure the remote snapshot schedule on the new primary volume 1 Stop the application that is accessing the acting primary volume 2 Create a remote snapshot of the acting primary volume and make a new primary volume on the original production site as part of creating that remote snapshot 3 Convert the remote volume into a primary volume 4 Make the acting primary volume into the remote volume This creates a snapshot of that volume 5 Configure a new snapsho
118. 5 50 in SSMs that use replication in a cluster is that if a single disk goes down the data on that SSM can be rebuilt using RAID instead of requiring a complete copy from another SSM in the cluster Rebuilding the disks within a single set is faster and creates less of a performance hit to applications accessing data than copying data from another SSM in the cluster Note If you are replicating volumes across a cluster Configuring the SSM for RAID 0 allows you to use all of the disk capacity on the module while protecting against failure of individual disks or failure of an entire SSM Configuring the SSM for RAID 5 50 provides redundancy within each SSM while allowing most of the disk capacity to be used for data storage Table 3 summarizes the differences between running RAID 1 or 10 ona stand alone SSM and running RAID 0 or RAID 5 on SSMs in a cluster Intel Storage System Software User Manual 73 Storage Table 3 Data Availability and Safety in RAID 1 10 Configuration and in a Clustered RAID 0 or RAID 5 50 Configuration Data Data Configu Safety and Avail Avail Availability If Hot Spare To ration ability During Disk ability If Network Replace Failed Failure Entire Connection Hardware SSM Fails to SSM Lost Stand alone Yes In any No No No hot spare SSMs configuration 1 disk disk within the RAID 1 10 per mirrored pair can SSM fail but there is no redundancy in pairs with a failed disk Repli
119. 52428800 kb Device 1 my_mgtgroup_0 my_volume_1 Status Online Active Read 0 B Requests 0 write 0 B Requests 0 Ops 0 sync 0 Cycles 147 BSize 512 Capacity 419430400 kb Table 58 Parameters for proc ebsd client Parameter What It Is Status Status of the device e Starting Deleted Online may be either Active or Lost Manager Read ane of data read and the number of read requests in bytes KiB MiB or iB Write Amount of data written and the number of write requests in bytes Ops Combined total of read requests and write requests Cycles Internal the number of times the ebsd task looped BSize Block size in bytes Capacity Size of the attached volume in kilobytes Intel Storage System Software User Manual 327 Using the EBSD Driver for Linux Table 58 Parameters for proc ebsd client Parameter What It Is NOTE KiB MiB and GiB are calculated in increments of 1024 bytes For example 1 KiB 1024 bytes 1 MiB 1024 KiB 1 GiB 1024 MiB 2 To verify that the block devices were created use Is la dev ebsd root lnx demo root ls la dev ebsd total 0 crwxr xr x I root root 1276 0 Apr 4 14 39 ebsdctrl brwxr xr x 1 KOO root L 0 Apr 10 17 53 diskO0 brwxr xr x I Foot root 177 1 Apr 10 17 53 disk1 You can format the block devices by using any of the OS filesystem utilities For example you can use mkfs t ext2 dev ebsd disk0 Moun
120. 6 Disks are grouped into RAID 5 50 sets from left to right starting with the first disk in the SSM In an Intel Storage System SSR316MJ2 e Disks 1 4 5 8 9 12 and 13 16 or e Disks 1 8 and 9 16 In an Intel Storage System SSR212MA Disks 1 6 and 7 12 Monitoring RAID Status RAID is critical to the operation of the SSM If RAID has not been configured the SSM cannot be used Monitor the RAID status of an SSM to ensure that operation is normal Data Transfer and RAID Status RAID status of Normal Rebuild or Degraded all allow data transfer The only time data cannot be transferred to the SSM is if the RAID status shows Off 78 Intel Storage System Software User Manual Storage Data Redundancy and RAID Status In a RAID 1 10 or RAID 5 50 configuration when RAID is degraded there is not full data redundancy Therefore data is at risk if there is a disk failure when RAID is degraded Warning In a degraded RAID 1 10 configuration loss of a second disk within a pair will result in data loss In a degraded RAID 5 50 configuration loss of a second disk will result in data loss The RAID Status is located at the top of the RAID Setup tab in Storage RAID status also displays in the Details Tab on the main Console window when an SSM is selected in the Network view File Find Tasks View Help Available SSMs Denver 1 Denver 2 Denver 3 RAID Status Golden 3 Details Mana
121. 9 a z _ Must begin with a lower case letter Description 3 40 characters 0 9 a z A Z _ space Must not begin with a space Users Add Figure 97 Adding an Administrative Group 3 Type a Group Name and Description Both are required Table 28 Administrative Group Name Requirements Group Name Requirements Example e 3 to 40 characters e Software_Admins start with a letter e Region11_Managers Use letters a z A Z numbers 0 9 or characters _ Adding a User to the Group 1 Click Add in the Users section The Add Users window opens with a list of administrative users shown in Figure 98 Intel Storage System Software User Manual 131 Administrative Users and Groups Add Administrative Users to Group x Figure 98 Adding an Administrative User to a Group 2 Select one or more users you want to add to the group 3 Click Add Adding Administrative Group Permissions Administrative groups can have e Different levels of access to the SSM such as read write e Access to different management capabilities for the SSM such as creating volumes When you are creating a group you also set the management capabilities available to members of a group The default setting for a new group is Read Only for each category 1 From the Create Administrative Group window click the Group Permission tab to bring it to the front shown in Figure 99 132 I
122. A is configured for RAID 50 and contains 2 sets of 6 250 GB disks The total capacity for that Intel Storage System SSR212MA equals 2500 GB ie cal i lez a i Nu Ms y Set 1 capacity 1250 GB RA capacity 1250 GB Sh capacity 2500 GB Figure 52 Capacity of Disk Sets in RAID 50 Viewing the RAID Setup Report In the Storage category the RAID Setup tab lists the RAID disks in the SSM and provides information about them The RAID Setup Report is shown in Figure 53 The following table describes the information listed in the report Module RAID Setup Disk Set RI PAID Sotin RAID Status TCP IP Network Normal Start RAID Za SSM Administration RAID Configuration RAID 0 g8 SNMP Reporting Percent v Reconfigure RAID rr The RAID Rebuild Rate is a percentage of RAID card throughput c Ct eee ee ee gw 1 10 20 30 40 50 60 70 80 90 100 Apply Device Name Subdevices etup i i Report f dewscsi host0 busOitargetO lunOldisc dewscsi hostO busOitargett lunO disc devscsi host0 busOitarget2iunOldisc dewscsi host0 busOitarget3 lunO disc dewscsi host0 busOitarget4 lunOidisc E dev scsi host 0 bus target5 lun0 disc deviscsi host0 busOitarget6 lunOldisc dewscsi host0 busOitarget8 lunO disc Log Out dewsesithost
123. Apply Setting SSM Date and Time Ifusing NTP the NTP server controls the date and time for the SSM See Using NTP on page 126 Note Even if you are using an NTP server you can set the date and time manually If the difference between the date and time on the SSM and the date and time on the NTP server is too large the NTP server will not change the date and time on the SSM To ensure that the NTP server is able to control the SSM date and time first set the date and time manually 124 Intel Storage System Software User Manual Setting the Date and Time Setting the Date and Time 1 If you are not using an NTP server make sure NTP mode is set to Off 2 Click the SSM Date and Time tab to bring it to the front shown in Figure 92 Module j l Storage 3 NTP Mode gs TCP IP Network k amp 55M Administration g SNMP E Reporting SSM Time Zone SSM Date and Time KIP O 0n off Enter the current date and time for the SSM time zone SSM Time Zone Greenwich Mean Time SSM Date and Time 04 25 2004 07 27 55 PM Apply togou Figure 92 Setting the SSM Date and Time 3 Change the date and time to the correct date and time for that time zone Type the time directly in the field Type the date in the field or use the calendar button to select the date 4 Click Apply Intel Storage System Software User Manual 125 Setting the Date and Time Using NTP You can
124. Available SSMS Denver 2 Denver 3 Management Groups Alert Messages EBSD Hosts These SSMs are available for use Name Denver 2 10 0 33 18 Denver 3 10 0 33 35 Denver 1 10 0 33 48 Figure 8 SSMs in the Network View Pane Note The subnet and mask are saved in the list Every time you open the Console the search takes place automatically and all SSMs on the network are listed in the Network View See Deleting Subnets and Masks on page 24 if you want to disable this search Editing Subnets and Masks Change the subnets and masks used to search for modules Click the Find menu Click By Subnet and Mask The List of Subnets to Search window opens Select the subnet you want to edit Click Edit The subnet and mask window opens Change information as necessary Click OK RH nn BPW N e Intel Storage System Software User Manual 23 Getting Started Deleting Subnets and Masks You can delete a subnet and mask from the search list if you remove modules from that network or if you do not want to view those modules in the Network View 1 Click the Find menu Click By Subnet and Mask The List of Subnets to Search window opens Select the subnet and mask to delete 2 3 4 Click Delete A confirmation message opens 5 Click OK 6 Click Done Finding by Module IP or Host Name Identify SSMs by listing module IP or host names and searching for
125. CSI EBSD Fibre Channel vi allow access via iSCSI Authentication CHAP not required Initiator Node Name CHAP required Figure 194 Creating iSCSI Access in New Authentication Group Authenticate with CHAP Not Required For detailed illustrations of the relationship between the authentication group fields and the MS iSCSI Initiator see Planning iSCSI and CHAP on page 273 1 In the Authentication box select CHAP not required 2 Copy the Initiator node name into the initiator node name field Authenticate with CHAP Required 1 In the Authentication box select CHAP required 2 Complete the fields necessary for the type of CHAP you intend to configure as shown in Table 50 Table 50 Entering CHAP Information in a New Authentication Group For this CHAP Mode Complete these Fields 1 way CHAP CHAP name Target Secret minimum of 12 characters Intel Storage System Software User Manual 281 Controlling Client Access to Volumes Table 50 Entering CHAP Information in a New Authentication Group For this CHAP Mode Complete these Fields 2 way CHAP e CHAP name Target Secret minimum of 12 characters e Initiator Secret minimum of 12 characters must be alphanumeric Best Practice Keep a separate record of the iSCSI initiator CHAP information and the corresponding authentication group information Finishing iSCSI Configuration Click OK if you a
126. Communications protocol version is 3 E SSM Denver 2 m D Provisioning server version is 6 3 30 0001 0 Figure 214 Registering Features and Applications 3 From the Tasks menu select Feature Registration The Feature Registration window opens shown in Figure 215 Listed are all the SSMs in that management group Intel Storage System Software User Manual 303 Feature Registration Feature Registration Feature Registration Registration is required for additional software features Current feature registration license keys are displayed below For additional feature registration please contact your storage provider and be prepared to provide the serial number s indicated below Feature Registration Scripting Evaluation 9 E Denver 2 A Serial Number 00 03 47 EB 83 99 LD License Key none set E Denver 1 E Serial Number 00 03 47 EB 89 A9 LD License Key none set Db Edit License Key Cancel Figure 215 Opening the Feature Registration Window 4 For each SSM listed in the window that you want to register submit the serial number as instructed in the Feature Registration window Control C copies the serial number so that you can paste it into an application such as Notepad or Word Note Record the host name or IP address of the SSM along with the serial number This record will make it easier to add the license key to the correct SSM when you receive it
127. Configurations Using Remote Copy for Off site Backup and Recovery For backup and recovery systems Remote Copy can eliminate the backup window on an application server Using scripting configure the EBSD driver to mount remote snapshots on a backup server either local or remote and then back up the remote snapshot from the backup server The remote snapshot is available if the primary volume fails Achieving Off site Tape Backup Rather than creating tape backups and then transporting them to a secure off site location you can use Remote Copy to create remote snapshots in an off site location and then create tape backups at the off site location Configuration for Off site Backup and Recovery To use remote snapshots for off site tape backup create remote snapshots for access by your tape backup application Create remote volumes in your backup location Configure your backup application to access the remote snapshots Configure schedules to create remote snapshots in the designated off site locations If your application server uses multiple volumes that must be in sync use a script to quiesce the application before creating remote snapshots Create routine tape backups of the remote snapshots See the example configuration illustrated in Figure 264 Intel Storage System Software User Manual 379 Sample Remote Copy Configurations Configuration Diagram Application Workstations TEZ Tape La Producti
128. Disk Setup tab shown in Figure 63 on page 81 and Figure 65 on page 82 The RAID states are reported on the RAID Setup tab as shown in Figure 53 on page 68 Removing and Reinserting the Same Disk Warning If your SSM has a BBU and you pull a disk from the drive bay you will lose all data on that disk If you pull a disk from its drive bay and then push it back into that same drive bay For RAID 1 10 or 5 50 you must first power on the disk on the Disk Setup tab and then select the disk and click Add to RAID e SSMs with BBU For RAID 0 you must first go to the Disk Setup tab and power on the disk Then go to the RAID Setup tab and click Reconfigure RAID Warning Reconfiguring RAID destroys all the data on the disks SSMs without BBU For RAID 0 you must first power on the disk on the Disk Setup tab and then select the disk and click Add to RAID For information about the rate at which RAID rebuilds on disks added to RAID see Setting RAID Rebuild Rate on page 76 Managing Disks Use the Disk Setup tab to monitor information about the disks in the selected SSM to power on a disk that you have replaced or added to the SSM and to add disks to RAID You can also power off disks on this tab Getting There 1 On the Network View double click the SSM and log in if necessary The SSM Configuration window opens to the Module Information tab shown in Figure 48 80 Intel Storage System Software User Manual Sto
129. EE r J Z MDREE 113 Using a DNS Server MjAKAK F E SiEE E KEE kk kk kk ke ek Kak KK KK KK k KAK k KK KA KK KAK KK KK KA KAK Kr ent 114 Intel Storage System Software User Manual v Contents DNS and DFICP aia x xak n dalenara nikilan sa l lnnnn sahaya Ra naka S dana nakan Wa kk Waaa kanek a a Haa bak 114 DNS and Static IP Addresses E kk kk xe kk ke kek k K k eek 114 Adding the DNS Domain Name iiE kek kek kk kK kk kk kk KK k kK 115 Adding a DNS S WV O Fa s sin m n sitin n n lak bar bda El kn akan xu kan binal AREA a naka e bl a al kasak 115 Adding Domain Names to the DNS Suffixes h lEL i Ek keke 115 Editing a DNS Server MhAA kK KF E ihLeE kk kk ke kk kek kk KK K kk K kK kK KAK KK KK kk KAR KRA 116 Editing a Domain Name in the DNS Suffixes List h 116 Removing a DNS Server saci csscciceauncanagasesesthedansenetneatsanad kk eka kk Kake kk KK kk KK KAK KK KAK KARIR 116 Removing a Domain Name from the DNS Suffixes List LEEEE U UELUEUEE 116 RouUuting OVE VIEW EE EEE soetesesatutententenacasitecantaasuien iA kK kK KA ka kK KK KK KK kk kK kk kk ka kk K k kk K k 117 Adding Routing Information L EEE kk k kk kK KAKA KAK KAK KA 117 Editing Routing Information u u Ek kk kK kk KA KA KA KAK KA KRA 118 Deleting Routing Information u Ek kk kk KAK KAK RA 119 Configu
130. EEEEEEEEEEE kk kk kk keka kaka KEK AK kkkK KAKA KK k KA KAK A KAK Ak KAW KK KA 295 30 Day Evaluation Peri dirinci kull k esr Eka kirl Wa d n kareba ka kal anes W k n davek aka k ka a baka 295 Tracking the Time Remaining in the Evaluation Period E UU UU 296 Evaluating the Scalability Pak sniccicissicacsesticceseisonctendeatasexaeededenanednnd bisl Nader aa ka kak as b ka belen k 297 Starting the License Evaluation Period uuE kk kk kek kek 297 Backing Out of the License Evaluation Period E uLE Ee 298 Evaluating the Configurable Snapshot Pak EEE keke kk kk kk kek kk 298 Starting the License Evaluation Period Ek kk kk kk k k 298 Backing Out of the License Evaluation Period ELiEE Ek 298 Evaluating the Remote Data Protection Pak ccccseeeecceeeeeeeeeeeeeeeeeeeeeeeeseeeeeeeeeeeeneees 299 Starting the License Evaluation Period uE kek kk kek kek 299 Backing Out of the License Evaluation Period 0 cceeceecceeeeeeeeeeeeseeeeeeseeeeeeeeeaeeees 299 Scripting Evaluation seca e ceca sat emccehia aan enc davon kk kk kk k k kK ka kk Kak KK K KE KAKA KA KK KK kk KK 300 T rn On Seripting EvalUatlOR 1 14 22 salan hak h n naka Hi aabee al nan b ban bidi ek 300 Turn Off Scripting Evaluation L E EE kk kk ek k kk k k KK kk KAK RA 301 Registering Features and Applications
131. Entering License Keys When you receive the license keys add them to the SSMs in the Feature Registration window 1 Select the management group 2 Select the Register tab 3 From the Tasks menu select Feature Registration 4 Select an SSM and click Edit License Key The Edit Feature Registration window opens shown in Figure 216 Edit Feature Registration E x License Key for Boulder 2 Cancel Figure 216 Entering License Key 304 Intel Storage System Software User Manual Feature Registration 5 Copy and paste the appropriate license key for that SSM into the window 6 Click OK The license key information is updated in the Feature Registration window as shown in Figure 217 Feature Registration Feature Registration Registration is required for additional software features Current feature registration license keys are displayed below For additional feature registration please contact your storage provider and be prepared to provide the serial number s indicated below Feature Registration Scripting Evaluation E Denver 2 D Serial Number 00 03 47 EB 83 99 D License Key 0353 BA26 8AA8 EE76 D6FB E21D 75E9 E Denver 1 D Serial Number 00 03 47 EB 89 A9 D License Key 0298 DB F B2A0 D842 D654 EE1E 21A44 D gt Edit License Key Cancel Figure 217 Viewing License Keys Intel Storage System Software User Manual 305 Feature Registration 306 Intel Stora
132. Feature Registration Tab You can register the SSM and purchase a license key to apply in this window First you submit the serial number as instructed Then when you receive a license key copy and paste it into the License Key field Intel Storage System Software User Manual 53 Working with Storage System Modules Evaluating Features Add on modules and applications are available when you begin using the Storage System Software If you begin using an add on feature or application without registering a 30 day evaluation period begins Throughout the evaluation period you receive reminders to register and purchase a license for the add on module and applications you want to continue using The Feature Registration tab lists the status of add on modules and applications on your SSM An example of an unlicensed application in the evaluation period is shown in Figure 45 Power Off j Feature Registration Boot Devices Module Information Backup amp Restore Registration is required for additional software features Current feature registration license keys are displayed below For additional feature registration please contact your storage provider and be prepared to provide the serial number s indicated below Serial Number 00 03 47 EB 89 A9 License Key unlicensed and in the evaluation period B Not licensed for Manual Snapshot Pak in violation for volume or snapshot SS_1 30 B Not licensed for Scala
133. Find Tasks View Help Available SSMs Management_Group_1 z Boulder 2 Boulder 1 Denver 1 Denver 2 Details Management Group Information Availability Management Group Management_Group_1 Manager Yes Hot Spare NA Virtual Manager No Migrating Data NA Status RAID Normal Figure 131 New Management Group with One SSM Adding Additional SSMs When Creating a Management Group 1 Select the next SSM that you want to add 2 Click the Tasks button on the Management Group Information tab and select Add to New or Current Management Group The Add to or create a Management Group window opens with the existing management group selected Click Add The SSM is added to the specified management group 4 Repeat steps 1 through 3 to add additional SSMs Adding Managers to the Management Group After adding the SSMs to the management group you can start managers on the additional SSMs in the management group The number of managers you start depends upon the overall design of your storage system See Managers on page 168 for more information about how many managers to add 1 Select an SSM in the management group on which to start a manager The SSM Tab View opens Intel Storage System Software User Manual 173 Working with Management Groups 2 On the Management Group Information tab select the Tasks menu and click Start Manager as shown in Figure 132 Add to New or Current Management Group
134. Group Permission Group Name full_administrator 3 40 characters 0 9 a z _ Must begin with a lower case letter Description Manage all Functions 3 40 characters 0 9 a z A Z _ space Must not begin with a space Users ane Add mo Figure 101 Editing an Administrative Group 4 Change the name and description as necessary Adding or Removing Administrative Users in an Existing Group Adding New Users to the Group 1 Click Add in the Users section The Add Users window opens with a list of administrative users 2 Select one or more users to add to the group 3 Click Add The users are added to the list 4 Click OK when you are finished adding users Removing Users from a Group 1 Select the user to remove in the Users section 2 Click Remove The user is removed from the list Changing Administrative Group Permissions Change the management capabilities available to members of a group The default setting is Read Only for each category Click the Groups tab to bring it to the front Select a group and click Edit The Edit Administrative Group window opens Click the Group Permission tab to bring it to the front Click the management capabilities you want for the group you are editing Click OK when you are finished Q A U N e Intel Storage System Software User Manual 135 Administrative Users and Groups Deleting Administrative Groups
135. I L uEE EE kek kek kek kk K k kk K rk KK KA kk KAR kk KH 272 Configuring Authentication Groups for iSCSI uLuE Ek kk K k kk e 272 Planning iSCSI ard CHAP ene eer er kad i eer ee k anan kane kak a anka daka cala ee 273 Client Access and EBSD K4 khK K A tlld kk ek kk kk cael kak kK k kK K k kK KAK kk KAK KA kK KK YA 276 Client Access and Fibre Channel Intel Storage System SSR316MJ2 oniy 277 Planning Volumes and Fibre Channel EE kk kk e 277 Assigning LUN Numbers to Volumes l uiiE kk kk kk kk k kk KK KK ARK 277 Creating an Authentication Group EEuE kk kk kek kk kk Kek kK KA KK KA kk KH 279 Configuring MESI OTS MPE 280 Finishing iSCSI Configuration EE Ek kk kek k kk K k ke 282 Configuring EBSD Ek kk ek k kk k ek kk K k teed A kk KAK KK KA A KK KK kK KK rk KK rk K 282 Finishing EBSD Configuration u LLEEEEE Eke kk kk ke kak kK ke kk KK KK KA 283 Configuring Fibre Channel Intel Storage System SSR316MJ2 only 284 Finishing Up the New Authentication Group cccceeeececeeeeeeeeeeeeesaaeeeeesneeeseeeeeeees 285 Editing an Authentication Group EE Ek kk kk kek k ee ee eee 285 Deleting an Authentication Group E E kk kk kk kek ke kK KK KK kk KK rk kK 286 Volume Lists Overview cc testis ceases aac ac ee Se oe KK KK KK KK KK KK KAK KK KAK KK KK 287 Re
136. IP address The storage system will display a Found under Status if the unit is correctly detected Find SSMs Wizard Search by SSM IP or hostname Enter IP address or hostname Click Add to enter an IP address or host name Use Edit or Delete to refine your list IP or Host Name Status 169 254 1 1 Found had eat delete To find your SSMs on the network click Finish Intel Storage System Software User Manual 7 Getting Started 20 Click on Close to return to the Wizard Launch Pad Find SSMs Wizard Summary Found NSMs are listed below SSM search results Host Name 169 254 1 1 To find additional SSMs Repeatthis wizard using different search criteria Search again using the Find menu on the Centralized Management Console Repeat this Wizard Run the Create Volume Wizard a You must set up your RAID configuration before using the SSM Close out of the Wizard Launch Pad by clicking on OK Intel Storage System Console File Find Tasks View Help a Available SSMs Wizard Launch Pad Welcome to the Wizard Launch Pad The Wizard Launch Pad provides wizards for common tasks to get you started Find SSMs Wizard The Find SSMs Wizard finds SSMs on your network Create Volume Wizard The Create Volume Wizard creates a new volume Access Volume Wizard The Access Volume Wizard creates access privileges for a volume
137. If you are configuring RAID 1 or RAID 10 the SSM must contain an even number of disks If you are configuring RAID 5 or RAID 50 the Intel Storage System SSR316MJ2 must contain 4 8 12 or 16 disks the Intel Storage System SSR212MA must contain 6 or 12 disks Warning Changing the RAID configuration will erase all the data on the disks 3 On the Storage configuration category click the RAID Setup tab to bring it to the front shown in Figure 48 4 Select the RAID configuration from the list 5 Click Configure RAID Intel Storage System Software User Manual 75 Storage A confirmation message opens 6 Click OK A warning message opens 7 Click OK RAID starts configuring Note If the SSM contains a large number of disks it may take several hours for the disks to synchronize in a RAID 10 configuration When the RAID status on the RAID Setup tab shows Normal the disks provide fully operational data redundancy with the mirror in place The SSM is ready for data transfer at this point Setting RAID Rebuild Rate for RAID 1 10 or RAID 5 50 Choose the rate at which the RAID configuration rebuilds if a disk is replaced The rate is a percentage of the throughput of the RAID card e Setting the rate high is good for rebuilding RAID quickly and protecting data however it will slow down user access e Setting the rate low maintains user access to data during the rebuild Setting RAID Rebuild Rate 1 Se
138. Intel Storage System Software User Manual Intel Storage System SSR316MJ2 Intel Storage System SSR212MA Intel Order Number D26451 002 Disclaimer Information in this document is provided in connection with Intel products No license express or implied by estoppel or otherwise to any intellectual property rights is granted by this document Except as provided in Intel s Terms and Conditions of Sale for such products Intel assumes no liability whatsoever and Intel disclaims any express or implied warranty relating to sale and or use of Intel products including liability or warranties relating to fitness for a particular purpose merchantability or infringement of any patent copyright or other intellectual property right Intel products are not designed intended or authorized for use in any medical life saving or life sustaining applications or for any other application in which the failure of the Intel product could create a situation where personal injury or death may occur Intel may make changes to specifications and product descriptions at any time without notice Intel server boards contain a number of high density VLSI and power delivery components that need adequate airflow for cooling Intel s own chassis are designed and tested to meet the intended thermal requirements of these components when the fully integrated system is used together It is the responsibility of the system integrator that chooses not to use Intel d
139. Intel Storage System Software User Manual Sample Remote Copy Configurations Create a second management group and cluster of 3 SSMs in the backup location Create a schedule for making remote snapshots of the primary volume See Scheduling Remote Snapshots on page 355 Note Volume replication levels are set independently for primary and remote volumes How It Works If one of the SSMs in the primary location fails the primary volume will still be available If all of the SSMs fail or if the application server fails then failover to the backup application server occurs and the remote snapshot becomes available Application Workstations Production Application Application Server Server Clustered Production Backup Application Application Servers N Server Read Only Read wWrite Primary Remote Volume Volume Primary Storage ary Volume Subnet Primary Remote Primary Snapshot Snapshot Snapshot Figure 260 High Availability During Failover Example Configuration Achieving Affordable Disaster Recovery Even if you do not have clustered application servers or network bandwidth required for configuring hot backup sites you can still use Remote Copy to protect your data during an emergency Using remote snapshots you can maintain copies of your volumes in remote sites Set up a schedule for creating remote copies and if your primary storage site becomes unavailable you can easily access the most recent r
140. Manager Under normal circumstances you stop a manager when you are removing an SSM from a management group You cannot stop the last manager in a management group Deleting the management group is the only way to stop the last manager Implications of Stopping Managers Quorum may be decreased Fewer copies of configuration data are available Fault tolerance may be lost Data integrity and security may be compromised Warning Stopping a manager can result in the loss of fault tolerance 1 Select the management group in the Network View 2 Log in to the management group Intel Storage System Software User Manual 183 Working with Management Groups 3 Select the Managers tab in the Tab View The Managers tab displays 4 Select the SSM on which you want to stop the manager 5 Right click and select Stop Manager A confirmation message opens 6 Click OK to confirm stopping the manager Removing Manager IP Addresses from Application Servers When you remove a manager from a management group a window opens that displays all the IP addresses of the managers in that management group and a reminder to reconfigure the application servers that are affected by the change Click Save Manager IP Addresses to save this list You can print the list and use it as a reference when reconfiguring application servers Removing an SSM from a Management Group Remove an SSM from an existing management group Prerequisites Stopping o
141. P Network i Model Serial Number Class Capacity _ Status j u SSM Administration E 1 WDC WOD16 WD WCAL945 SATA 150MB 148 08 GB Active g SNMP WDC WD16 WD WCAL944 SATA 150MB 148 08 GB Active E Reporting WDC WD16 WD WCAL945 SATA 150MB 148 08 GB Active WDC WD16 WD WCAL945 SATA 150MB 148 08 GB Active WDC WD16 WD VWCAL945 SATA 150MB 148 08 GB Active WDC WD16 WD WCAL944 SATA 150MB 148 08 GB Active WDC WD16 WD VWCAL945 SATA 150MB 148 08 GB Active WDC WD16 WD WCAL944 SATA 150MB 148 08 GB Active WDC WD16 WD WCAL945 SATA 150MB 148 08 GB Active 10 WDC WD16 WD WCAL945 SATA 150MB 148 08 GB Active 11 WDC WD16 WD WCAL945 SATA 150MB 148 08 GB Active 12 WDC WD16 WD WCAL945 SATA 150MB 148 08 GB Active Logout Power On Disk Add Disk To RAID Power Off Disk Figure 65 Viewing the Disk Setup Tab in an Intel Storage System SSR212MA Figure 66 Diagram of the Drive Bays in the Intel Storage System SSR212MA 82 Intel Storage System Software User Manual Storage Using the Disk Report The Disk Setup tab lists the individual disks in the module and provides information about them Table 7 Description of items on the disk report This Item Describes This Disk Lists the numbers of the disk drives The disks are numbered sequentially from left to right as you view the front of the SSM
142. Requirements for Fully Populated SS V u e 86 Table 9 Network interfaces Displayed on the TCP IP TalD EE 90 Table 10 Identifying the NICs in the MotherbOard iu iE kk kk kek 90 Table 11 Identifying Add on NICS kk kk kk kk kk k k kK kK KK KK A 91 Table 12 Comparison of Active Backup and NIC Aggregation Bonding 96 Table 13 Physical and Logical Interfaces in a BOTH E 97 Table 14 Description of NIC Status in an Active Backup Configuration 97 Table 15 SSM Active Backup Failover Scenario and Corresponding NIC Status 98 Table 16 NIC Status During Failover with Active Backup cceceeeeeeeeeeeeeeeeeeeeeeeeeteaeeeeenee 99 Table 17 SSM NIC Aggregation Failover Scenario and Corresponding NIC Status 102 Table 18 NIC Status During Failover with NIC Aggregation EEE E 102 Table 19 Status of Information About Network lnterf CeS E uEE e 110 Table 20 Setting SSM Speed and Duplex SetlingsS EuEE kk kk 111 Table 21 Setting Corresponding Frame Sizes on SSMs and Windows or Linux Clients 113 Table 22 Editing TCP Speed Duplex and Frame Size ccccccccccessssseeeeeeeeeesesseeneeeeeeees 114 Table 23 SSM Network Interface Settings iEE kk kk kek ke 119 Table 24 SSM Route Settings s 25cose cence argc tesa tele kk ete ai
143. SSM to become a hot spare 1 Click the Hot Spare drop down list and select the SSM to designate as the hot spare 2 Click OK when you are finished Note A cluster must contain at least three SSMs to have one SSM designated as a hot spare Removing a Hot Spare To remove a hot spare simply change the designation in the list to none The hot spare then becomes an SSM in the cluster adding more space for storage 1 Click the Hot Spare drop down list and select None from the list 2 Click OK when you are finished The SSM returns to the cluster as available storage Changing the Hot Spare Time Out The hot spare time out designates the amount of time before a hot spare is activated in the cluster You can change the value at any time The results of changing the time out value are listed below Cluster operating normally changing hot spare time out has an effect only if an SSM in the cluster becomes unavailable e Cluster with unavailable SSM reducing the time out value will activate the hot spare earlier For example an SSM is not available and the hot spare time out is configured for 6 hours After 3 hours you reduce the time out to 1 hour thinking that will activate the hot spare in 60 minutes However the hot spare activates immediately This is because the clock that is tracking the time out started when the SSM became unavailable and it considers the 1 hour interval to have passed already e Cluster with unavaila
144. Schedule eee eee ern eee EEE er eee eee ee ree eT 356 Configuring the Primary Volume and Snapshots kE kk e 357 Configuring the Remote Volume and Snapshot kkhklhlli kk eenn 357 What the System Does icccecasceadeccructccnuasserectenascedeaseiatad kk kk kk kk k K k KK KAKA KK KK KA KK KK kK 358 Editing a Remote Snapshot Schedule li Eek aioe 358 Deleting a Remote Snapshot Schedule l Li Ek kk kk K k KA 359 Changing the Roles of Primary and Remote Volumes EELhdE ken 359 Making a Primary Volume Into a Remote Volume ii EEE 360 Making a Remote Volume Into a Primary Volume iu kere 362 Designating Size and Threshold Values for the Converted Volume 363 Configuring Failover crs couwedsdaie cee se kek keke kk kk kek kk K k K k kK KK kK KA KK sommes 364 Planning Failover EEEE EEE kk kk KK E KA KA KAK KAK kk kk KIRA A A AA kk KA KK 364 Using Scripting for Failover eee ee ener ener eee eee ee eee eee k kk KAK kk 364 Resuming Production After Failover Ek kk kk kk A kk KAR RR 364 synchronizing Data After Failover scsccesssctivesdacsvcavstcend kk kk kk kk k kk kK k ke 364 Returning Operations to Original Primary Site LEEE Eke 365 Synchronizing the Data Between the Acting Primary Volume and the Original Primary Vali eee eee eee ere eee ee lT eee ee ee ee ee eee 365 Creating a New Primary Volume at the Original Product
145. Snapshot Schedules LEiEEEEEEE kk Enka k n ke k k kk kK KK KK KAKA kr KHK ees 252 Requirements for Scheduling Snapshots kEE kk kk kk kk kk K 252 Creating Snapshot Schedules kuE ek kek kk Keke kK KK kK K k kk 253 Editing Snapshot Schedules EEEE kek kk k k kk K k k A Ratios 255 Deleting Snapshot Schedules C EEE kk kk kk kk kek kk KK kk KA 256 S ripting SnapS 1OlS ili ak kamal sal ee idin kl k n kaz kak nena sea ke saa dkin anan W sera ka a s k na nan a al 257 Rolling Back a Volume to a Snapshot LEE kk ek kek kk kK K k kk KAY 257 Requirements for Rolling Back a Volume EiE Ek kk ke 257 Deleting a Snapshot ccs tach veces kek ek k kk K k kk K ke kK KK KK kK KA KAK KK KK KARIK 259 Selecting a Snapshot from the List LEL Ek ek kk K k kk 260 Selecting a Snapshot Schedule from the List uE kk 260 Chapter 14 Working with Scripting 0 ccccccceeeeeeeseeeeeeeseeeseeseneeeeeeeeeeeeeeeeeeeees 261 Tools for Scripting J L kk kk kk kk kk kk Kek kk kr k KK nenna KK KK KA kk KK kk kr 261 Java commandline CommandLine kk kk kk kk k kk KK KK KK KAK KK KA 261 Qele MN eee en eee eee ee eee ee ee ee 264 Scripted Commands for Volumes and Snapshots ccccceeeeseeeeeeeeeeeeeeeeeaeeeeeesaeeeeeeaees 264 Creating a Snapshot sscccigcssnccten cant inantstheraencei ten igin
146. System Software User Manual Getting Started 1 In the Configuration Settings section select which configurations you want to copy For information about the configuration settings see the following Enabling the SNMP Agent on page 142 Using Active Monitoring on page 154 Remote Log Files on page 153 Setting Email Notification on page 161 2 In the Copy Configurations to SSMs section select the SSMs to which you want to copy the configurations 3 Click Copy The configuration settings are copied to the selected SSMs 4 Click OK on the confirmation window The Copy Configuration window closes Intel Storage System Software User Manual 37 Getting Started 38 Intel Storage System Software User Manual 2 Modules Working with Storage System SSM Configuration Window Overview The SSM configuration window shown in Figure 27 opens when you log into an individual SSM From the configuration window you have access to all the configuration tasks for individual SSMs 0 Storage Time TCP IP Network j amp SSM Administration g8 SNMP le Reporting Feature Registration Boot Devices pm Module Information Host Name IP Address 10 0 7 11 Configuration categories Model SSR316MJ2 Serial Number 00 07 E9 3F D Software Version 6 3 25 0001 0 Backup amp Restore Golden 3 Apply 2 1 Install Software Cha
147. The logical master bond interface monitors each physical slave interface to determine if its link to the device to which it is connected such as a router switch or repeater is up As long as the interface link remains up the interface status is preserved Table 14 Description of NIC Status in an Active Backup Configuration If the NIC Status is The NIC is Active Currently enabled and in use Passive Ready Slave to a bond and available for failover Passive Failed Slave to a bond and no longer has a link If the active NIC fails or if its link is broken due to a cable failure or a failure in a local device to which the NIC cable is connected then the status of the NIC becomes Passive Failed and the other NIC in the bond if it has a status of Passive Ready becomes active This configuration remains until the failed preferred interface is brought back online When the failed interface is brought back online it becomes Active The other NIC returns to the Passive Ready state Intel Storage System Software User Manual 97 Managing the Network Requiremenits for Active Backup To configure active backup Both NICs should be enabled e NICs should be connected to separate switches Which Physical Interface is Preferred A preferred interface is an interface within an active backup bond that is used for data transfer during normal operation When you create an active backup bond one of the interfaces
148. The two switch scenario in Figure 75 is a basic yet effective method for ensuring high availability If either switch failed or a cable or NIC on one of the SSMs failed the active backup bond would cause the secondary connection to become active and take over 100 Intel Storage System Software User Manual Managing the Network Server A SL Server B Active el Passive Storage Module Cluster Figure 76 Active Backup Failover in a Four switch Topology Figure 76 illustrates the active backup configuration in a four switch topology How NIC Aggregation Works NIC aggregation allows the SSM to use both interfaces simultaneously for data transfer Both interfaces have an active status If the interface link to one NIC goes down the other interface continues operating Using both NICs also increases network bandwidth Requirements for NIC Aggregation To configure NIC aggregation e Both NICs should be enabled e NICs must be configured to the same subnet e NICs must be connected to a single switch that is LACP capable and supports 802 3ad link aggregation If SSM is directly connected to a server then the server must support 802 3ad link aggregation Intel Storage System Software User Manual 101 Managing the Network Which Physical Interface is Preferred Because the logical interface uses both NICs simultaneously for data transfer neither of the NICs in an aggregation bond are designated as p
149. a Split Mirror To create a split mirror e Create a remote snapshot e Create a volume list for that snapshot e Create an authentication group for client access e Configure client to access the remote snapshot Disassociate Remote Management Groups Management groups become associated when linked by remote snapshots or remote snapshot schedules When you have management groups that no longer share remote Intel Storage System Software User Manual 369 Remote Copy snapshots or remote snapshot schedules you can disassociate those management groups Disassociating management groups destroys all the shared knowledge between those groups 1 Log in to both management groups that you want to disassociate 2 Right click the remote management group and select Edit Management Group The Edit Management Groups window opens shown in Figure 256 Edit Management Group Edit Management Group Group Name Local Bandwidth 32768 Kb Sec Remote Management Groups Management Gr _Loggedin _ Remote Bandwi Connected l Transaction_D Yes 32768 Kbisec Yes Disassociate Edit Bandwidth Cancel Figure 256 Editing a Management Group 3 Select the management group or groups you want to disassociate 4 Click Disassociate A confirmation message opens describing the results of disassociating the management groups Warning Disassociating the management groups Cancels any in progress remote snaps
150. aca GE eee 315 EXCEPHON S eka asc dunan cece mee sack tec cates tage cea mr ede aa EE AAEE 315 Appendix C Using the EBSD Driver for Linux cccsssseeseeeeeeeeeeeeeeeeeeeeeeeeees 319 Installing the EBSD Driver for LINUX EEL kk kk kk kk k kk a KK KA kK AY 319 Options Available When Using the Installation Wizard EEEEUUUU UUUE 319 Copying Driver Bundle to a Network Share Optional UEEUEEEEEEEUUUUUUU UEU 319 Installing the EBSD Driver Using the CD or the Driver Bundles 320 Location of the Installed Driver Files uEuuE Ek kK K 321 Upgrading the EBSD Driver Using the CD or Driver Bundles 321 Installing the EBSD Driver with RPM Packages iiEE kk kk kek kK kk kk 322 xii Intel Storage System Software User Manual Contents RPM Package Naming Convention EE Ek kk kk kk kk kk kk 322 installing A Binary RPM Package lllddduEEE kk kk kk k KK kk kk KA A A A A 322 Querying An Existing RPM Package lliiEd kk kk kk kk kk KK k KAK 323 Uninstalling the RPM i 4 x 3 air sekinl nan teas alee keke ka eukana b wak bakan xw Wi ex kl ba b k b RA sa Sa b 324 Using the Source RPM Package to Build a Driver for a New Kernel Version 324 Configuring the EBSD Driver for LINUX EEE Ek kk kk kk kk K k ke 325 Creating ebsd CONi pee meme n
151. access Hosts with the following subnets and masks Only hosts on the designated subnet and mask gain access If selecting this method 1 Click Add 2 Enter a subnet and mask 3 Click OK All hosts on the network All hosts gain access Finishing EBSD Configuration 1 Click OK if you are finished configuring the authentication group or Select the iSCSI tab if you want to add iSCSI configuration to this authentication group Intel Storage System Software User Manual 283 Controlling Client Access to Volumes Configuring Fibre Channel Intel Storage System SSR316MJ2 only 1 On the Fibre Channel tab shown in Figure 197 select the check box to allow access via Fibre Channel New Authentication Group New Authentication Group Name AuthGroup_0O Description Volume List No Volume List iscsi EBSD Fibre Channel rm fallow access via Fibre Channel Authenticate hosts with the following WWPNS Name Optional Figure 197 Configuring Fibre Channel for New Authentication Group 2 Click Add The Add Name and WWPN window opens shown in Figure 198 Add Name and WWPN xj Name Optional WWPN must be 16 hex characters Cancel Figure 198 Adding a Name and WWPN for Fibre Channel Authentication 3 Add a name optional and a WWPN 4 Click OK 5 Repeat for additional host WWPNs 284 Intel
152. ails Tab Displays information about the selected snapshot Use the Tasks menu to edit and delete snapshots and roll back volumes from this tab 248 Intel Storage System Software User Manual Working with Snapshots Hosts Tab Lists all EBSD hosts that are associated to the snapshot To retrieve the IP Mode Type and driver version for the snapshot put the IP address of the host in Find By Module IP or Host Name Remote Snapshot Tab Lists remote snapshots associated with a snapshot Buttons include creating a remote snapshot and canceling a remote snapshot that is in progress Target Information Tab Displays the Initiator name assigned by the Microsoft iSCSI Initiator and the masked Target Secret Volume List Memberships Tab Displays information about volume list memberships which are inherited from the parent volume See Creating Access to Volumes on page 271 For information about authentication groups and volume lists see Chapter 15 Controlling Client Access to Volumes Mounting or Accessing a Snapshot A snapshot is a point in time picture of a volume In order to mount the snapshot for backing up or making the data available for other uses such as data mining or testing you can configure the snapshot as a read write volume Snapshot Writable Space When you configure a snapshot as read write additional space is created in the cluster for use by applications and operating systems that need to write
153. al Number Class Capacity Status E1 Maxtor 7v250 YB29983E SATA 150MB 233 76 GB Active Maxtor 7Y250 Y6299NCE SATA 150MB 233 76 GB Active Maxtor 7Y250 Y6299QQE SATA 150MB 233 76 GB Active Maxtor 7Y250 Y61QRWOE SATA 150MB 233 76 GB Active Maxtor 7 250 Y6298D0E SATA 150MB 233 76 GB Active Maxtor 7Y250 Y61QRW4E SATA 150MB 233 76 GB Active Maxtor 7Y250 Y6266GWE SATA 150MB 233 76 GB Active Maxtor 7Y250 Y627ZFGE SATA 150MB 233 76 GB Active Maxtor 7Y250 Y629E7WE SATA 150MB 233 76 GB Active Maxtor 7Y250 Y6299QFE SATA 150MB 233 76 GB Active Maxtor 7Y250 Y624Z39E SATA 150MB 233 76 GB Uninitialized Maxtor 7Y250 Y61QRWWE SATA 150MB 233 76 GB Uninitialized Offor missing Offor missing Off or missing Off or missing Power On Disk Add Disk To RAID Power Off Disk Figure 63 Viewing the Disk Setup Tab in the Intel Storage System Intel Storage System Software User Manual SSR316MJ2 81 Storage Figure 64 Diagram of the Drive Bays in the Intel Storage System SSR316MJ2 Disk Setup Tab for the Intel Storage System SSR212MA For the Intel Storage System SSR212MA the drives are labeled 1 through 12 in the Disk Setup window and correspond with the disk drives from left to right and top to bottom when you are looking at the front of the Intel Storage System SSR212MA Module RAID Setup Disk Setup storage l L Time H ru TCP I
154. amount you specify in the script The thresholds will only increase When there is sufficient room in the cluster to accommodate the increases or To the point where the hard threshold equals the volume length whichever of these conditions occur first To increase space in the cluster by adding more SSMs or to increase the volume length follow instructions as described in Chapter 11 Working with Clusters or Chapter 12 Working with Volumes Scripting Automatic Threshold Increases 266 Below is an example of scripting automatic threshold increases using java commandline CommandLine java commandline CommandLine lt admin name gt lt admin password gt lt manager ip gt volume_autogrow_set lt volume name gt lt grow size Megabytes gt lt failure timeout seconds gt Example Joe Jones creates a script to automatically increase the hard and soft thresholds for his X Rays volume The volume length is 10 GB with a hard threshold of 2 GB and a soft threshold of 1 GB Joe scripts the increases for increments of 512 MB java commandline CommandLine jjones trumpet 10 0 111 212 Intel Storage System Software User Manual Working with Scripting volume autogrow set X Rays 512 600 Reviewing the Increment Size for Increasing the Thresholds You can run an operation to review the setting for automatic threshold increases using java commandline CommandLine java commandline CommandLine lt admin name gt lt admin
155. anagement groups containing primary and remote volumes changes Planning the Remote Snapshot In order to create a remote snapshot You must be logged in to both the management group that contains the primary volume and the management group containing the target cluster where the remote snapshot will be created You must designate or create a remote volume in that remote management group You must have enough space on the target cluster for the remote snapshot Logging in to the Management Group Log in to both management groups before you begin If you are creating the remote volume and remote snapshot in the same management group as the primary volume then you only need to log in to that management group 338 Intel Storage System Software User Manual Remote Copy Designating or Creating the Remote Volume You can create a remote volume by any of the following methods Make an existing volume into a remote volume Create a new remote volume during creation of a remote snapshot Create a new volume from the cluster Details panel and then select the Remote option on the New Volume window For more information about the three methods of creating remote volumes see Creating a Remote Volume on page 346 Using Schedules for Remote Copy Scheduled remote snapshots provide high availability for business continuance disaster recovery and provide a consistent predictable update of data for remote backup and
156. ap Recipient window opens Add IP or Host Name xj IP or Host Name __ Figure 113 Adding an SNMP Trap Recipient 3 Enter the host name or IP address for the SNMP client that is receiving the traps 4 Click OK 5 Repeat steps 2 through 4 for each host in the trap community 6 Click Apply when you are finished adding hosts Intel Storage System Software User Manual 147 Using SNMP Editing the Trap Recipient Select the host you want to change from the list of Trap Recipients Click Edit The Trap Recipient window opens Change the host name or IP address Click OK Click Apply when you are finished editing trap recipients nA A LU N _e Removing the Trap Recipient 1 Select the host you want to remove from the list of Trap Recipients 2 Click Remove A confirmation window opens 3 Click OK to remove the trap recipient The host is removed from the list 4 Click Apply when you are finished removing trap recipients Disabling SNMP Traps To disable SNMP traps you must delete all of the settings in the SNMP Traps window 1 Remove the Trap Recipient hosts 2 Delete the Trap Community String 3 Click Apply 148 Intel Storage System Software User Manual 8 Reporting The Reporting category includes multiple types of information and reporting capabilities Review a passive report of system statistics hardware and configuration information save log files set up email alerting and re
157. application consider rolling back the remote volume instead Figure 266 shows rollback of the primary snapshot while leaving the remote snapshots intact 382 Intel Storage System Software User Manual Sample Remote Copy Configurations Application Workstations Clustered Application Application Server Servers Read wWrite Primary Volume Storage 3 00 PM Subnet Snapshot 3 00 PM Primary Remote Snapshot Snapshot 7 00 PM 4 00 PM Primary Remote Snapshot Snapshot 14 00 AM 44 00 AM Figure 266 Non destructive Rollback from the Primary Snapshot To roll back the remote snapshot you must first make the remote volume into a primary volume This will stop scheduled creation of remote snapshots which may jeopardize your high availability disaster recovery or routine backup strategies Figure 267 shows rollback of the remote snapshot Intel Storage System Software User Manual 383 Sample Remote Copy Configurations Applicatior Workstations Clustered Application Servers Read Write Read Only Read Write Primary es Primary H Volume Volume Storage k H 1 5 00 PM K Remote Primary Snapshot Snapshot 4 00 PM 4 00 PAS Remote Primary Snapshot Snapshot Snapshot 44 00 AM 11 00 AM 44 00 AM We Subr et Primary Remote Snapshot Snapshot ml 3 00 PM Figure 267 Non destructive Rollback from the Remote Snapshot Best Practices Roll back the primary snapshot and keep the remote snapshot
158. apshots are stored on the same cluster as the volume Therefore snapshots protect against data corruption but not device or storage media failure Prerequisites Before you create a snapshot you must have created a management group acluster a volume Topics covered in this chapter include Single snapshots and scheduled snapshots Managing capacity using volume and snapshot thresholds Creating snapshot schedules Using Snapshots You create snapshots from a volume on the cluster At any time you can roll back to a specific snapshot When you do roll back all the snapshots created after that snapshot are deleted Also using a third party utility you can copy a snapshot to a different server and open the snapshot as a volume on that server Snapshots can be used for Source volumes for data mining and other data use Source volumes for creating backups e Data or file system preservation before upgrading software Protection against data or file system corruption File level restore without tape or backup software Working with Snapshots Single Snapshots versus Scheduled Snapshots Some snapshot scenarios call for creating a single snapshot and then deleting it when it is no longer needed Other scenarios call for creating a series of snapshots up to a specified number or for a specified time period after which the earliest snapshot is deleted when the new one is created scheduled snapshots For example
159. ariable and the EBSD volume manager tool ebsdtool environment variable If the configuration file and the EBSD volume manager tool exist then the EBSD service e Loads the EBSD driver if needed e Starts all the devices listed in the EBSD configuration file ebsdconf e Waits until all the devices become online or exceed the timeout value e Mount all the EBSD devices listed in etc fstab and not marked as noauto Stopping the EBSD Driver The EBSD stop service first checks for the EBSD configuration file ebsdconf environment variable and the EBSD volume manager tool ebsdtool environment variable If the configuration file and the EBSD volume manager tool exist then the EBSD service Reports a system hang warning if a mounted device has lost connection e Stops all processes using mounted EBSD devices Unmounts all mounted EBSD devices e Stops and removes all the EBSD devices e Unloads the EBSD driver Status of the EBSD Driver and Devices To display the status of the EBSD driver and the associated devices enter the following service ebsd status or Intel Storage System Software User Manual 329 Using the EBSD Driver for Linux etc init d ebsd status This status command displays the information in the file proc ebsd client Disconnecting an EBSD Device Warning Disconnecting an EBSD device stops activity on the SSM but preserves the data in the volume Prerequisite Stop all applications u
160. at SSM See the chapter on Working with Management Groups on page 167 for more information about removing SSMs from a management group Registering Available SSMs for License Keys SSMs that are not in a management group are licensed individually in the module configuration category see Registering Features for an SSM on page 53 302 Intel Storage System Software User Manual Feature Registration Registering SSMs in a Management Group SSMs that are in a management group are licensed through the management group Submitting SSM Serial Numbers First you must submit the serial numbers of all the SSMs that you want to register 1 Select the management group for which you want to register features or applications 2 Select the Register tab shown in Figure 214 The Register tab lists licenses that have been purchased If you are evaluating features the time remaining in the evaluation period is listed on the tab as well File Find Tasks View Help Available SSMs 8 Transaction_Data ama a TransData05 a Denver 1 Denver 2 CreditData05 Details Managers Clusters Authentication Groups Volume Lists Register Times Remote Snapshot You have 24 days 21 hours and 36 minutes left in your evaluation period After the evaluation period volumes and snapshots attached to clusters containing license violations j will become unavailable Management group version is 6 3 D
161. ation 185 Working with Management Groups Backing Up a Management Group Configuration 1 Click Back Up Configuration The Save window opens shown in Figure 141 Save In Config_Backup a E ge File Name ManagementGroupDescription b Files of Type Management Group Description Files v Save Cancel Figure 141 Save Window for Backing up the Management Group Configuration 2 Navigate to the location in which to store the configuration binary file 3 Use the default name or type a new name for the file 4 Click Save The configuration file is saved as a binary file in the folder you selected 5 Click OK to close the Backup Configuration window Backing Up a Management Group With Remote Copy Relationships If you back up a management group that is participating in Remote Copy it is important to back up the other Remote Copy management groups at the same time If you back them up at different times and then try to restore one of the groups the back up files will not match which could cause problems with the restore 186 Intel Storage System Software User Manual Working with Management Groups Saving the Management Group Configuration Description 1 Click Save Configuration Description The Save window opens 2 Navigate to the location in which to store the configuration description text file 3 Use the default name or type a new name for the file 4 Click Save
162. ation Workstations Clustered Application Servers x Production Application Server gt Primary Volume Primary Snapshot Application Read Only Read Write Remote Primary Volume Volume Remote Snapshot Primary Snapshot Figure 258 High Availability Configuration During Failover 372 Intel Storage System Software User Manual Sample Remote Copy Configurations Data availability if the primary volume or production application server fails If either the primary volume or production application server in your production site fails only that data written to the volume since the last remote snapshot was created will be unavailable until the volume or production application server is restored Failover to the backup application server To maintain availability of the application and the remaining data the following process occurs 1 A script or other application monitoring the production application server discovers that primary volume is not available A script executes to fail over to the backup application server 2 The backup application server executes a script to convert the remote volume into a primary volume so that the volume can be accessed by the backup application server 3 Because the backup application server was configured to access the remote now primary volume operation of backup application server begins The application continues to operate after the failov
163. ative privileges Can be either the primary or remote administrator if they are different admin password Value text The administrator s Storage System Console password Can be either primary or remote password if they are different manager ip Value IP address IP address of an SSM running a manager in the management group containing either the source volume or the remote volume volume name Value text Name of the volume For volume_autogrow and FC_LUN commands this also could be a snapshot snapshot name Value text Name of the snapshot to create primary volume name Value text Name of the primary volume to make remote remote volume name Value text Name of the remote volume created in the Console remote snapshot name Value text Name of the remote snapshot remote snapshot description Value text Description of the remote snapshot Intel Storage System Software User Manual Working with Scripting Table 47 Parameters for commandline CommandLine Parameter What It Is soft threshold see note Value number Size of the volume s new soft threshold in MegaBytes MB May be the soft threshold of the new primary volume if using Remote Copy hard threshold see note Value number Size of the source volume s new hard threshold in MegaBytes MB May be the hard threshold of the new primary volume if usi
164. authentication groups from the volume list Warning Before you delete access to a volume the host server 5 Disk Management or equivalent window must be closed Note To prevent a group from accessing a volume without deleting the volume list change the volume permissions to No Access See Editing Volume Permission Levels on page 291 1 Log into the appropriate management group 2 Select the Volume Lists tab shown in Figure 208 Details i Managers Clusters i Authentication Groups Volume Lists Register Times Remote Snapshot volume List Name volumes Authentication Raza Volume_List_1 Snapshot_O AG_AcctRec Volume_List_2 rem_test AG_TransDataRemote Figure 208 Volume Lists Tab 3 Select the volume list you want to remove 4 From the Tasks menu select Delete Volume List A confirmation window opens 5 Click OK to confirm the deletion The Volume Lists tab no longer displays the volume list Selecting an Authentication Group from the List Select an authentication group and click OK Selecting a Volume List from the List Select a volume list and click OK Intel Storage System Software User Manual 293 Controlling Client Access to Volumes 294 Intel Storage System Software User Manual 16 Feature Registration Add On Features and Applications Registration Overview Add on features and applications expand the capabilities of the Storage System Software Add on feat
165. availability status Factors include but are not limited to the status of SSMs participating in any replication and RAID restriping due to auto grow or other factors Details Management Group Information Availability The following volumes and snapshots will become unavailable if SSM Boulder 1 goes offline Updated every 5 seconds Name Type Status Volume Normal Snapshot Volume CreditData05 BkUpO605 Volume_O Replication Level 2 Way Normal Writable s 2 Way Restriping 2 Way Contributing Factors replicated for redundancy replicated for redundancy not replicated Figure 22 Availability Tab Intel Storage System Software User Manual 33 Getting Started Logging In to and Out of the SSM After finding all the SSMs on the network you must log in to each SSM individually to configure modify or monitor the functions of that SSM 1 On the Network view double click the SSM that you want to log in to The Log In window opens shown in Figure 23 Log in to SSM Denver 1 10 0 33 25 User Name Password Figure 23 Logging in to an SSM 2 Type the User Name and Password 3 Click Log In When you are successfully logged in the SSM configuration window opens to the Module configuration category shown in Figure 25 Logging In to Additional SSMs Once you are logged in to an SSM you can log in automatically to additional SSMs configured
166. ave 0 0 11 255 255 0 0 0 0 NIC Bonded logical Physical interfaces network interface shown as slaves Figure 81 Viewing a New Active Backup Bond The bond interface shows as bond0 and has a static IP address The two physical NICs now show up as slaves in the Mode column 14 Optional for active backup bonds To change which interface is the preferred interface in an active backup bond on the TCP Status tab select one of the NICs in the bond and click Set Preferred Viewing the Status of a NIC Bond You can view the status of the interfaces on the TCP Status tab Notice that in the active backup bond one of the NICs is the preferred NIC In the NIC aggregation bond neither physical interface is preferred Figure 82 shows the status of interfaces in an active backup bond Figure 83 shows the status of interfaces in a NIC aggregation bond Module TCPAP TCP Status DNS Routing Communication Wl Storage Time e SSM Administration Name Description Speed Met DuplewM Status _ Frame S Preferred g SNMP Motherboard Portt Intel Corp Unknown Unknown Disabled Default Reporting Slott Port1 Intel Corp Unknowns Unknown Disabled Default Slott Port2 Intel Corp Unknowns Unknown Disabled Default Slott Port3 Intel Corp Unknown Unknown Disabled Default Slott Portd Intel Corp Unknown Unk
167. becomes the preferred interface in the bond You can change the preferred setting after creating the bond See Creating a NIC Bond on page 104 Which Physical Interface is Active 98 Note When the active backup bond is created if both NICs are plugged in the preferred interface becomes the active interface The other interface is Passive Ready For example suppose you create an active backup bond consisting of 2 NICs Motherboard Port0 and Slot1 Port0 If Motherboard Port0 is the preferred interface it will be active and Slot1 Port0 will be Passive Ready Then if Motherboard Port0 fails Slot1 Port0 changes from Passive Ready to active Motherboard Port0 changes to Passive Failed Once the link is fixed and Motherboard Port0 is operational there is a 30 second delay and then Motherboard Port0 becomes the active interface Slot1 Port0 returns to the Passive Ready state When the preferred interface comes back up there is a 30 second delay before it becomes active Table 15 Status SSM Active Backup Failover Scenario and Corresponding NIC Example Failover Scenario NIC Status 1 Active backup bondO0 is created The active preferred interface is Motherboard Port0 BondO is the master logical interface Motherboard Port0 is Active Slot1 PortO is connected and is Passive Ready 2 Active interface fails BondO detects the failure and Slot1 PortO takes over Motherboard Port0
168. bility Pak in violation in cluster TransData05 i gt Not licensed for Remote Data Protection Pak B Not licensed for Configurable Snapshot Pak in violation for schedule SS_Daily Figure 45 Using Remote Copy without a License For more detailed information about the evaluation process see Evaluating Features on page 54 Configuring Boot Devices The Intel Storage System SSR212MA has a single boot device The Intel Storage System SSR316MJ2 has two boot devices Modules with Two Boot Devices 54 Note When a SSM with two boot devices powers on or reboots it references boot configuration information from one of two compact flash cards located on the front of the module The module boot configuration information is mirrored between the two compact flash cards If one card fails or is removed the system can still boot If you remove and replace one of the cards you must activate the card to synchronize it with the other card There must always be at least one active flash card in the SSM If you are upgrading the Storage System Software a dual boot device SSM must contain both flash cards Intel Storage System Software User Manual Working with Storage System Modules Checking Boot Device Status in an SSM You can view the compact flash card status on the Boot Devices window 1 Log in to the Storage System Module 2 Click the Boot Devices tab The Boot Devices window opens shown in Figure 46
169. ble SSM increasing the time out value will activate the hot spare later 212 Intel Storage System Software User Manual Working with Clusters For example an SSM is not available and the hot spare time out is configured for 6 hours Four hours have passed You increase the time out to 8 hours adding an additional 2 hours to the time out interval before the hot spare activates To change the hot spare time out 1 Change the value for the hot spare time out 2 Click OK Removing an SSM from a Cluster You can remove an SSM from a cluster only if the cluster contains sufficient storage modules to maintain the existing volumes and replication level See Chapter 12 Working with Volumes on page 219 for details about editing volumes 1 Select an SSM from the SSMs in Cluster list 2 Click Remove The SSM moves to the SSMs Available list 3 Click OK when you are finished Changing or Removing the Virtual IP Anytime you change or remove the virtual IP address for iSCSI volumes you are changing the configuration that clients are using Therefore it is important to disconnect any clients before making this change Preparing Clients Quiesce any applications that are accessing volumes in the cluster Log off the active sessions in the initiator for those volumes Changing or Removing the Virtual IP Address 1 In the Edit Cluster window click the iSCSI tab 2 Change or delete the entries in the IP Address Subnet Mask an
170. bus1target0 lunO disc Disk 0 Intel Storage System Software User Manual Getting Started 24 Enter the RAID level and rebuild rate See Storage on page 61 for more information on RAID levels 25 Click on Configure RAID to set up the RAID level Edit Configuration for SSM 1 10 1 1 10 oA RAID Setup Disk Setup rn anan can nand RAID Status orr Start RAID l TCP IP Network SSM Administration ii s RAID Configuration RAID 0 Reconfigure RAID l Reporting The RAID Rebuild Rate is a percentage of RAID card throughput Percent ey 1 j 1 I 70 80 90 100 _ Apply Device Name Device Type Subdevices dewscsi hostO bust ftargetO lunOldisc Disk 0 Click on Done 26 The RAID Status should indicate normal as illustrated in the following figure Edit Configuration for SSM 1 10 1 1 10 pon RAID Setup Disk Setup gt n g Time RAID Status Normal Start RAID a i TCP IP Network a ev Administration RAID Configuration Ran 0 v Reconfigure RAID 2 Reporting The RAID Rebuild Rate is a percentage of RAID card throughput i 1 j I 30 40 50 60 70 80 90 100 Apply Device Name Device Type Subdevices devscsi host0 bus1 target 0 lun0 disc Disk 0 dewscsiihostO bus1 targett lun0 disc Disk 0 27 Click on Done 28 From the Help menu select Wiza
171. capacities in the Intel Storage System SSR212MA Since 2 TB equals 2048 GB the RAID 5 50 configuration available for the 400 GB disks is 5 plus a spare RAID 5 50 is not supported for 500 GB disks For Intel Storage R System Using Disk Capacity of SSR212MA bi i 250 GB 400 GB 500 GB Ize 5 plus a spare 1250 GB 2000 GB 2500 GB 6 disks 1500 GB 2400 GB 3000 GB 1 1 Parentheses indicate RAID set size greater than 2 TB RAID 0 RAID 0 creates a striped disk set Data will be stored across all disks in the RAID which increases performance However RAID 0 does not provide fault tolerance If one disk in the set is powered down or fails all data on the set will be lost SSM capacity in RAID 0 is equal to the total capacity of all disks in the module RAID 1 and RAID 10 RAID 1 RAID 1 provides data redundancy by mirroring the data from one disk onto a second disk RAID 10 RAID 10 combines mirroring data within pairs of disks with striping data across pairs RAID 10 combines data redundancy with the performance boost of RAID 0 Configuring RAID 1 or RAID 10 Whether the SSM is configured in RAID 1 or RAID 10 depends on the number of disks in the module Ifthe SSM contains only 2 disks configured for RAID then the mirrored disk pair is RAID 1 Ifthe SSM contains 4 or more disks configured for RAID then the 2 or more mirrored disk pairs are RAID 10 64 Intel Storage System Software Us
172. cated Yes However if any Yes Yes Yes configure a volumes on disk in the SSM fails hot spare SSM clustered the entire SSM must be within a cluster SSMs copied from another RAID 0 SSM in the cluster Replicated Yes 1 disk per RAID Yes Yes Yes select a volumes on set can fail without hot spare disk clustered copying from another RAID SSMs RAID SSM in the cluster configuration 5 50 Planning RAID for Capacity Growth Warning If you plan to add more SSMs to your network as your storage needs grow remember that all SSMs in a cluster must have the same RAID configuration For example if you configure RAID 10 now and later decide to replicate volumes through clustering then any new SSMs must also be configured for RAID 10 Alternately you can remove all data from your existing SSMs configure RAID 0 and then cluster the SSMs Once RAID is configured you cannot change the RAID configuration without deleting all data on the SSM Requirements for Configuring RAID Placement of Disks in the SSM 74 All disks must be in contiguous drive bays from left to right and for the Intel Storage System SSR212MA from top to bottom as shown in Figure 67 and Figure 68 for RAID to be configured If there are empty drive bays only the disks to the left of the empty drive bay will be included in RAID The remaining disks will be inactive Intel Storage System Software User Manual Storage Because RAID 1 and RAID
173. change 2 Click Edit The Edit Routing Information dialog opens shown in Figure 89 Motherboard Port1 v Net Gateway Netmask 255 255 255 255 v Cancel Figure 89 Editing Routing Information 3 Change the relevant information 4 Click OK 5 Click Apply 118 Intel Storage System Software User Manual Managing the Network Deleting Routing Information You can only delete optional routes you have added 1 On the Routing tab select the information you want to delete 2 Click Delete A confirmation message opens 3 Click OK 4 Click Apply when you are finished Configuring a Direct Connection Between the SSM and an EBSD Host If you want to configure a direct point to point connection between the SSM and the EBSD host computer you must specify the route to be used for communication between the SSM and the EBSD host 1 On the TCP IP tab edit the Ethernet port to be used for communication as shown below Table 23 SSM Network Interface Settings SSM Network Interface Setting IP Address Subnet Mask Value The IP address of the SSM The same subnet as the EBSD host The IP address of the SSM Default Gateway 2 On the Routing tab add a route for communication with the EBSD host Table 24 SSM Route Settings SSM Route Setting Value Device The network interface you configured in step 1 Net The IP address of the EBSD ho
174. ck device underneath the Storage System Software volume that there is freed up space In fact no mechanism exists to transmit that information There is no SCSI command which says block 198646 can be safely forgotten at the block device level there are only reads and writes So to ensure that our iSCSI and EBSD network block devices work correctly with file systems any time a block is written to that block is forever marked as allocated Then when all blocks are allocated up to the full size of the storage volume the file system takes over The file system reviews its available blocks list and reuses blocks that have been freed up Planning Hard Thresholds The hard threshold is the amount of application data that can actually be written to the volume This size is the actual physical space reserved for data on the disks in the cluster Therefore it is the limit beyond which data can no longer be written to the volume The hard threshold can be increased up to the volume size if they are not set as equal Best Practice if Not Using Snapshots For volumes that will not be used with snapshots hard thresholds should be set equal to the volume size This setting ensures that the hard threshold cannot be exceeded which prevents clients from accessing the volume If you intend to use snapshots see Managing Capacity Using Volume and Snapshot Thresholds on page 243 Best Practice if Using Snapshots For volumes that will be used w
175. covery of backed up data If you retain a number of remote snapshots after a tape backup is created you can access this data without going to the backup tape Example configuration e Retain 3 primary snapshots This enables you to roll the primary volume back yet it requires a relatively small amount of space on the primary cluster 380 Intel Storage System Software User Manual Sample Remote Copy Configurations e Retain up to a week s worth of remote snapshots on the backup cluster For snapshots older than week go to the backup tape Achieving Non Destructive Rollback As discussed in Rolling Back a Primary Volume on page 367 rolling a snapshot back to a volume deletes any snapshots that were created since the snapshot that you roll back to For example suppose you created snapshots of a volume on Monday Tuesday and Wednesday On Thursday if you roll the volume back to Monday s snapshot then the snapshots from Tuesday and Wednesday will be deleted You can use Remote Copy to roll a volume back to an old snapshot without losing the interim snapshots Because Remote Copy creates two sets of snapshots primary snapshots and remote copies you can roll a volume back to a snapshot and still retain the other set of snapshots Configuration for Non Destructive Rollback To use remote snapshots for non destructive rollback Create a remote snapshot schedule Inthe schedule specify the same retention policy for
176. ct the domain name to edit 2 Click Edit The Edit DNS Suffix window opens 3 Enter the change to the domain name 4 Click OK 5 Click Apply when you are finished Removing a DNS Server Remove a DNS server from the list 1 Select the server you want to remove from the DNS Servers list 2 Click Remove A confirmation message opens 3 Click OK to remove the DNS server from the list 4 Click Apply when you are finished Removing a Domain Name from the DNS Suffixes List 1 Select the domain name you want to remove from the DNS Suffixes list 116 Intel Storage System Software User Manual Managing the Network 2 Click Remove A confirmation message opens 3 Click OK to remove the domain name from the list 4 Click Apply when you are finished Routing Overview The Routing tab displays the routing table You can specify static routes and or a default route If you specify a default route here it will not survive a reboot or shut down of the SSM To create a route that will survive an SSM reboot or shut down you must enter a default gateway on the TCP IP tab See Configuring the IP Address Manually on page 94 Information for each route listed includes the device the network gateway and mask and flags Adding Routing Information 1 On the Network View double click the SSM and log in if necessary 2 The SSM Configuration window opens Select TCP IP Network from the SSM configuration categories 3
177. cters and is case sensitive 5 Optional Type a description of the volume 6 Select the replication level You can set different replication levels for the remote volume and the primary volume Note You cannot set the size or thresholds for the remote volume Those values are 0 since the remote volume is a placeholder for data 7 Select a replication priority If you select a replication level of None you cannot set a replication priority See Chapter 12 Working with Volumes for detailed information about creating volumes 8 Select the Auto Grow and Checksum Data options 9 Click OK to return to the New Remote Snapshot window The new remote volume has been created at this point 348 Intel Storage System Software User Manual Remote Copy Viewing a List of Remote Snapshots You can view a list of remote snapshots associated with management groups clusters volumes or snapshots 1 Click the item for which you want to view the list of remote snapshots 2 Click the Remote Snapshot tab The tab view opens shown in Figure 240 The report on the tab lists both management groups and all the snapshots The other columns report status information about the remote snapshots as described in detail in Monitoring Remote Snapshots on page 352 Remote Snapshot Schedules Target Information Volume List Memberships Details i Snapshots Snapshot Schedules Hosts f Remote Snapshot
178. d Three or more None One copy of data in the cluster no e 2 Way replication e 3 Way Two copies of data in the cluster one replica Three copies of data in the cluster Two replicas are created Note The system calculates the actual amount of storage resources needed if the replication level is greater than none How Replication Levels Work When you choose 2 way or 3 way replication data is written to either 2 or 3 consecutive SSMs in the cluster For example 2 Way Replication A cluster with three SSMs configured for 2 way replication There have been five writes to the cluster Figure 164The figure illustrates the write patterns on the three SSMs Intel Storage System Software User Manual 223 Working with Volumes Store 1 Store 2 Store 3 Figure 164 Write Patterns in 2 way Replication Replication Priority Set the replication priority according to whether data availability or data redundancy is the goal for the volume e Availability Priority If data availability is your priority you can set any replication level e Redundancy Priority If redundancy is the priority you must select either 2 way or 3 way replication Note When you have volumes with a priority of redundancy you cannot use a hot spare in the cluster Volume is available to a client with a replication level of anda priority None 2 way 3 way setting
179. d edit and delete administrative users and groups See Chapter 6 Administrative Users and Groups on page 129 SNMP Enable SNMP and enable SNMP traps See Chapter 7 Using SNMP on page 141 Reporting View real time statistical information about the SSM run diagnostic tests and configure selected variables for active monitoring See Chapter 8 Reporting on page 149 Configuring Multiple SSMs Note When planning the configuration of your SSMs note that all of the SSMs in a cluster must be configured the same way You can copy the reporting and monitoring configuration of one SSM to multiple SSMs Copying these configurations makes it easy to ensure that those SSMs have exactly the same configuration 36 1 On the Network View select the SSM that has the configuration that you want to copy 2 Right click and select Copy Configuration The Copy Configuration window opens as shown in Figure 26 Copy Configuration Copy Configuration from SSM Boulder 1 10 0 33 13 Configuration Settings C SNMP Settings General Traps Active Monitoring Remote Log Files Email Copy Configuration to SSMs Copy A SSM Management Group Cluster J Boulder 2 10 0 33 17 Available SSMs Boulder 3 10 0 33 18 Available SSMs Golden 1 10 0 33 25 Group_0 Golden 2 10 0 33 35 Group_0 Select All Clear All Copy Cancel Figure 26 SSM Copy Configuration Window Intel Storage
180. d Default Gateway fields Finishing Up 1 Click OK when you are finished changing or removing the virtual IP 2 Reconfigure the iSCSI initiator with the changes 3 Reconnect to the volumes 4 Restart the applications that use the volumes Intel Storage System Software User Manual 213 Working with Clusters Changing or Removing an iSNS Server If you change the IP address of an iSNS server or remove the server you may need to change the configuration that clients are using Therefore you may need to disconnect any clients before making this change Preparing Clients Quiesce any applications that are accessing volumes in the cluster Log off the active sessions in the initiator for those volumes Changing an iSNS Server 1 Select the iSNS server to change 2 Click Edit The Edit iSNS Server window opens 3 Change the IP address 4 Click OK Deleting an iSNS Server 1 Select the iSNS server to delete 2 Click Delete A confirmation message opens 3 Click OK Finishing Up 1 Click OK when you are finished changing or removing an iSNS server 2 Reconfigure the iSCSI initiator with the changes 3 Reconnect to the volumes 4 Restart the applications that use the volumes Swapping in a Hot Spare You can manually swap in a hot spare if an SSM in the cluster is not available and is blinking red in the Console 1 Right click on the SSM designated as the hot spare for the cluster The hot spare
181. d by the change Using DHCP Warning A DHCP server becomes a single point of failure in your system configuration If the DHCP server goes down then IP addresses may be lost If you use DHCP be sure to reserve statically assigned IP addresses for all SSMs on the DHCP server This is required because management groups use unicast communication 1 Select from the list the interface you want to configure for use with DHCP 1 Click Edit The Edit TCP IP Configuration window opens shown in Figure 74 2 Select Obtain an address automatically using the DHCP BOOTP protocol 3 Click OK Configuring NIC Bonding Network interface bonding provides high availability fault tolerance and or bandwidth aggregation for the network interface cards in the SSM Bonds are created by bonding NICs into a single logical interface This logical interface acts as the master interface controlling and monitoring the physical slave interfaces Intel Storage System Software User Manual 95 Managing the Network Bonding two interfaces for failover provides fault tolerance at the local hardware level for network communication Failures of NICs Ethernet cables individual switch ports and or entire switches can be tolerated while maintaining data availability Bonding two interfaces for aggregation provides bandwidth aggregation and localized fault tolerance Depending on your SSM hardware network infrastructure design and Ethernet
182. d time The virtual manager should run only until the site is or Communication is Restored restored and data is resynchronized or until communication is restored and data is resynchronized Illustrations of correct uses of a virtual manager are shown in the first example of two site failure scenarios Figure 144 It is important to only start a virtual manager once In the second exampleFigure 145 illustrations of incorrect uses of a virtual manager are shown Intel Storage System Software User Manual Disaster Recovery Using A Virtual Manager virtual manager added 2 regular 2 regular managers managers Normal Operation 2 regular 2 regular managers managers 1 virtual manager started Scenario 1 Communication link is lost Start virtual manager on only one site 2 managers 2 regular managers S 1 virtual manager started Scenario 2 Site A fails Start virtual manager on Site B 2 regular managers 1 virtual manager started Scenario 3 Site B fails Start virtual manager on Site A Examples of two site failure scenarios where a virtual manager is started to regain quorum In all the failure scenarios only one site becomes primary with a virtual manager started Figure 144 Correct Two site Failure Scenarios Using Virtual Managers Intel Storage System Software User Manual 193 Disaster Recovery Using A Virtual Manager Site B virtual manager added 2 regular 2 regular managers managers
183. degraded RAID Details Management Group Information Availability Host Name Boulder 1 RAID Status Degraded IP Address 10 0 33 25 RAID Configuration RAID 1 or 10 Model SSR316MJ2 Storage Mode block SerialNumber 00 03 47 EB 89 A9 Software Version 6 0 99 0305 0 Figure 19 Icon Showing RAID is Degraded 32 Intel Storage System Software User Manual Getting Started If RAID is rebuilding for RAID 5 or 50 or for RAID 10 a blue circle displays as shown in Figure 20 Details Management Group Information Availability RAID Status Rebuilding RAID Configuration RAID 1 or 10 Host Name Golden 2 IP Address 10 0 33 25 Model SSR316MJ2 Storage Mode block SerialNumber 00 03 47 EB 89 49 Software Version 6 3 21 0001 0 Figure 20 Icon Showing RAID is Rebuilding Management Group Information Tab The Management Group Information tab provides detailed information about the management group to which the SSM belongs Details if Management Group Information Availability Management Group Transaction_Data Manager No Hot Spare No Virtual Manager No Migrating Data Status Storage Server Normal RAID Normal Not a Manager Not a Virtual Manager Figure 21 Management Group Information Tab Availability Tab The Availability tab displays which volumes and snapshots availability This tab depends on this SSM staying online Details include the replication level and what factors contribute to the
184. down Drive Health Normal Yes Yes 1 minute Console alert if not Status i normal Marginal Faulty Drive Status On and No Yes 1 minute Console alert if secured Off and secured Off or removed changes Intel Storage System Software User Manual 159 Reporting 160 Table 32 List of Variables Available for Active Monitoring a Perm Specify Default Default Action Sate AANE Ea Variable Freq Freq Threshold Drive Celsius Yes No 1 minute Warning at 60 Temperature Console alert Critical at 65 Console alert Drive Power Off Fan Status Normal No Yes 1 minute Console alert if h Faulty eae Fibre Channel Waiting for No Yes 1 minute Console alert if Status firmware changes Active Enabled Not ready Initialized Hot Spares No Yes 15 Console alert if an Activated minutes SSM hot spare is activated Memory Percent No Yes 1 minute Console alert at Utilization gt 90 Motherboard Celsius Yes No 15 Warning at 65 Temperature seconds Console alert Critical at 70 Console alert Shutdown Network No Yes 1 minute Console alert if NIC Interface Status status changes NVRAM Status Yes Yes 1 minute Console alert if not normal Power Supply No Yes 1 minute Console alert if Status status changes RAID Status Yes Yes 15 Console alert if seconds changes Remote Copy No Yes 15 Console alert if true Complete minutes
185. dules snmpModules snmpModules SNMP MIB Information snmpTargetMIB MIB Tree snmpNotificationMIB MIB Tree snmpProxyMIB MIB Tree snmpUsmMIB usm MIBObjects usmUser usm UserTable MIB Tree snmpVacmMIB vacm MIBObjects vacmContextTable MIB Tree snmpCommunityMIB MIB Tree Intel Storage System Software User Manual 317 SNMP MIB Information 318 Intel Storage System Software User Manual Note Using the EBSD Driver for Linux The EBSD Driver for Linux provides access to and management of Storage System Software volumes from Linux systems Install and configure the EBSD Driver for Linux on the computer that accesses the SSM You will need root privileges during installation and configuration Use the X11R6 window environment Installing the EBSD Driver for Linux You can install the EBSD Driver for Linux using either the Installation Wizard or the RPM packages available on the Resource CD See Installing the EBSD Driver with RPM Packages on page 322 Options Available When Using the Installation Wizard The EBSD Driver for Linux CD has a graphical installation wizard that allows you to install the EBSD Driver directly on your system or the EBSD Driver Bundles The EBSD Driver Bundles can be installed locally or on a network share The appropriate driver version can be installed later from the bundled files Copying Driver Bundle to a Network Share Optional Copying the driver bundle results in separate
186. e 4 From the Tasks menu select Delete Schedule 256 Intel Storage System Software User Manual Working with Snapshots Scripting Snapshots Application based scripting is available for taking snapshots Using application based scripts allows automatic snapshots of a volume For detailed information see Chapter 14 Working with Scripting Check your vendor s web site for specific applications for which sample scripts have been developed Rolling Back a Volume to a Snapshot Rolling back a volume to a snapshot replaces the original volume with a read write copy of the selected snapshot The new volume has a different name than the original and the original volume is deleted Prerequisites Stop applications from accessing the volume e Disable the volume if it is mounted by a host Requirements for Rolling Back a Volume Many of the parameters for the new volume must be configured as if you had created this volume for the first time Note After rolling back a volume to a snapshot you lose all data stored after the rolled back snapshot Table 45 Requirements for Rolling Back a Volume Parameter Requirements for Changing New Volume Name You must choose a new name for the volume The name must be from 1 to 127 characters Names are case sensitive New Hard Threshold Hard threshold size must be equal to or less than the size of the volume See Managing Capacity Using Volume and Snapshot Thresholds o
187. e Email Diagnostics Alerts G Storage Time F TCP IP Network u SSM Administration gas SNMP SMTP Settings Server IP Host name Port 25 Sender Address Test Email Figure 122 Configuring Email Settings for Email Alert Notifications 2 Enter the IP or host name of the email server 3 Enter the email port Intel Storage System Software User Manual 161 Reporting The standard port is 25 4 Optional If your email server is selective about valid sender addresses on incoming emails enter a sender address for example username company com If you do not enter a sender address the From field of email notifications will display root hostname where hostname is the name of the SSM 5 Click Apply Note Notification of undeliverable email messages are sent to the sender address Note If you are requesting email notification be sure to set up the email notification in Active monitoring Running Diagnostics Use diagnostics to check the health of the SSM hardware Note Running diagnostics can help you to monitor the health of the SSM or to troubleshoot hardware problems To run diagnostic tests 1 On the Network View double click the SSM and log in if necessary The SSM Configuration window opens 2 Select Reporting from the configuration categories The Reporting Window opens 3 Select the Diagnostics tab The Diagnostics window opens shown i
188. e 100 MB Hard Threshold 100 MB Soft Threshold 100 MB Replication Level None Replication Priority Availability You can edit the volume settings from the Storage Systern Console Repeat this Wizard Run the Access Volume Wizard 37 Click on OK at the Wizard Launch Pad and you should see the volume listed in the main window This means that it has been successfully created Refer to the remainder of this manual for detailed information on managing and configuring your storage system Setting up an Intel Management Module IMM Password for the Intel Storage System SSR212MA 1 Install dpcproxy from the ISM CD that shipped with your Intel Storage System SSR212MA For Microsoft Windows dpcproxy install net start dpcproxy 2 Bring up an MSDOS window and enter the following commands c gt telnet localhost 623 or dpecli Enter the IP address for your system and press lt Enter gt For example Server 111 112 113 20 Press lt Enter gt for the user name Press lt Enter gt for the password 14 Intel Storage System Software User Manual Getting Started 3 Enter the following all on one line to set the user name and password for Intel Management Module Professional Edition dpccli gt set T BMC user UserName YourUserName Password YourPassword To permanently set the values use the commit command dpccli gt commit Configuration Tasks Complete the following tasks to conf
189. e 3m 14s Est Time Remaining N A Completion Time 5 27105 2 16 PM Data Data Copied 61 5 MB COMPLETE Data Remaining N A 100 Current Rate NA Avg Rate 2 596 Kbisec Ea Figure 245 Remote Snapshot Details for a Completed Remote Copy During the remote copy process the Details window reports current data for the statistics When the copy is completed the statistics show summary data Figure 245 shows a completed remote copy Table 63 lists the values for the statistics reported in the Details window Table 63 Values for Remote Copy Details Window Statistic Values Source Info Section Primary Mgmt Group Name of the management group containing the primary volume and snapshot Primary Snapshot Name of the primary snapshot Remote Mgmt Group Name of the management group containing the remote snapshot Remote Snapshot Name of the remote snapshot Status Manual Scheduled Whether the snapshot was created using a snapshot schedule or manually State Started Copying Stalled Complete Current state of the copy process Complete 0 100 Percent of the copy process that is completed Time Start Time MM DD YY HH MM AM PM Date and time copy started Elapsed Time Xd Xh Xm Xs X a number and the days hours minutes and seconds the copy has been processing N A if not yet available Est Time Remaining Xd Xh Xm Xs X a number and the days
190. e Threshold Active value of CPU Utilization exceeds 90 7 Storage System Console Alert 7 SNMP Trap z Email enter email addresses below separated by commas E lt Back Finish cancer Figure 120 Setting Alerts for Monitored Variables 4 For each threshold listed select the type of alert you want to receive Table 31 Types of Alerts Available for Active Monitoring Type of Alert Where Alerts Are Sent For More Information Console alerts To the Alert Message area of the See Alert Messages Tab on Console and the Alerts tab in page 30 Reporting SNMP traps To the SNMP trap community See Enabling SNMP Traps on managers You must have page 147 configured the SSM to use SNMP Email To specified email addresses Type See Setting Email Notification on the email addresses to receive the page 161 notification separated by commas Then configure Email Notification on the Email tab 5 Optional To apply the alert actions including the email addresses that you selected in step 4 to all variables that are monitored on the SSM select the Apply Threshold Actions to All Monitored Variables checkbox Intel Storage System Software User Manual 157 Reporting Note To save time while setting up active monitoring specify alert actions for one variable and then check the box to apply those actions to all variables on the SSM This s
191. e the ability to make snapshots may be impacted See Chapter 13 Working with Snapshots Remote volumes contain no data and therefore do not have a size The default value in the size field is equal to the available space on the cluster Intel Storage System Software User Manual 225 Working with Volumes Table 36 Parameters for Volumes Volume Parameter Configurable in Volume Type What it Means Hard Threshold Primary The amount of physical space allocated for actual data storage Reaching the hard threshold triggers an alert and data can no longer be written to the volume The hard threshold must be less than or equal to the volume size Remote volumes contain no data and do not have a size Therefore you cannot set a hard threshold for a remote volume Soft Threshold Primary The amount of space used on the volume that triggers a warning alert This alert notifies the storage administrator that the volume is approaching the hard threshold The soft threshold must be less than or equal to the hard threshold Because remote volumes have no size and cannot have a hard threshold they also cannot have a soft threshold Auto Grow Any Auto grow automatically increases the hard and soft volume thresholds by a specific amount Automatic auto grow uses a predetermined formula Manually setting auto grow allows the user to determine the size increment by which the hard and soft
192. e 24 days 21 hours and 46 minutes left in your evaluation period After the evaluation period volumes and snapshots attached to clusters containing license violations will become unavailable G4 SSM Denver 1 Not licensed for Scalability Pak in violation in cluster TransData05 We suggest you upgrade your license immediately by contacting your storage provider Figure 211 Evaluation Period Countdown Message 296 Intel Storage System Software User Manual Feature Registration Viewing Licensing Icons Icons indicate the status of licensing on individual modules Figure 212The figure below illustrates the icons for each state License purchased for Scalability Pak Details Managers Clusters Authentication Groups Volume Lists D Management server version is 6 0 17 0002 Evaluat d ian valua lon perio F D Storage server version is 6 0 1 7 0002 for Configurable B Licensed for the Scalability Pak Snapshot Pak a a Not licensed for the Configurable Snapshot Pak in violation for volume or snay Not licensed for the Remote Data Protection Pak Ef SSM Boulder 2 Bi Provisioning server version is 6 0 17 0002 0 Bi Management server version is 6 0 17 0002 r O evaluation or license for Remote Data Protection Pak Figure 212 Icons Indicating License Status for Features Evaluating the Scalability Pak The Scalability Pak includes th
193. e SSM 2 or 3 way replication Set volume replication level to none Virtual manager Stop virtual manager 2 Remove the extra SSMs from the cluster Evaluating the Configurable Snapshot Pak The Configurable Snapshot Pak includes programmable snapshots Features included are e Scheduled snapshots e Scripting for snapshots Starting the License Evaluation Period The Configurable Snapshot Pak 30 day evaluation period begins if you create a snapshot schedule Backing Out of the License Evaluation Period If you decide not to purchase the Configurable Snapshot Pak you must delete any snapshot schedules that you have configured 1 Back up any volumes you plan to retain Table 54 describes how to safely back out of the Configurable Snapshot Pak evaluation 298 Intel Storage System Software User Manual Feature Registration Table 54 Safely Backing out of Configurable Snapshot Pak Evaluation Feature Being Evaluated Steps to Back Out Scheduled snapshots Delete the snapshot schedule Evaluating the Remote Data Protection Pak The Remote Data Protection Pak includes Remote Copy Features included are Remote volumes Remote snapshots Remote snapshot schedules e Scripting for remote copy Starting the License Evaluation Period The Remote Data Protection Pak 30 day evaluation period begins if you create a remote volume by Making an existing primary volume into a remote volume e Creating a
194. e SSM in a cluster beyond the 30 day evaluation period you must purchase the Scalability Pak See Chapter 16 Feature Registration Requirements for Hot Spares To designate a hot spare SSM for a cluster the following requirements apply e A cluster must contain at least 3 SSMs to have one SSM designated as a hot spare At most one hot spare SSM can be designated per cluster However a cluster does not require a hot spare The hot spare SSM should be equal to or greater in size than the other SSMs in the cluster How a Hot Spare Works If an SSM in a cluster goes down and a hot spare is designated for that cluster then the spare is automatically activated and data from replicated volumes start to migrate to the new SSM At this point the cluster no longer contains a hot spare When the down SSM comes back up it becomes the hot spare When a hot spare is activated it is not configured as a manager If you want to designate the activated hot spare as a manager you must start the manager See Starting and Stopping Managers on page 181 Setting the Hot Spare Time Out The hot spare time out designates the amount of time before a hot spare is activated in the cluster When a hot spare is activated the system will migrate data onto the new SSM This data migration may take some time Setting the hot spare time out allows you to control for situations in which you don t want the hot spare activated for example if your netw
195. e Time Out 0 Seconds Geza Cluster Tab View Hot Spare None Status Normal Description Figure 156 Viewing a Cluster and the Cluster Tab Intel Storage System Software User Manual 207 Working with Clusters The Cluster Tab View The cluster Tab View is shown in Figure 156 In the Cluster Tab view tThe tabs provide access to cluster information and features along with a Tasks button for taking actions on features Details Tab Includes name status description hot spare and the SSM to which the Virtual IP is assigned Volumes Tab Includes the name replication level size hard threshold and soft threshold for volumes in the cluster SSMs Tab For each SSM in the cluster this tab includes the host name IP address and whether the module is a hot spare for the cluster Disk Usage Tab Displays usage statistics for the cluster and the modules volumes and snapshots contained in the cluster See Measuring Disk Capacity and Volume Size on page 220 for a detailed explanation of disk capacity allocation in a cluster Details Volumes NSMs Disk Usage Usage Graphs iSCSI Remote Snapshot Type Name Space Max Used Max Full Misc Cluster TransData05 118 09 GB 1 43 GB 1 21 45 73 Allocated SSM Boulder 2 39 36 GB 489 5 MB 1 21 SSM Denver 2 39 36 GB 489 25 MB 1 21 SSM Boulder 1 39 36 GB 488 75 MB 1 21 SSM Denver 1 39 36 GB OMB 0 Volume CreditData 4 GB Hard Thre
196. e configuration categories The Reporting window opens 2 Click Refresh to display statistics on the Passive tab 3 Optional To view extended statistics about the SSM click Advanced at the bottom of the window Saving the Report to a File 1 On the Passive Tab click Save To File to download a text file of the reported statistics The Save dialog opens 2 Choose the location and name for the report 3 Click Save The report is saved with a doc extension It is a text file and will open with Word in Windows or any text editor in Linux or UNIX Passive Reporting Detail This list details selected information available on the Passive Reporting window Not all items are listed here Table 30 Selected Details of the Passive Report This Term Means This Passive Report Date and time report created Host Name Host name of the SSM IP Number IP address of the SSM SSM Software Full version number for SSM software GUI Software Full version number for the Console Support Key Support Key is used by a Technical Support representative to log in to the SSM Boot Devices Status information about the compact flash card s used to boot the SSM flash 0 flash 1 150 Intel Storage System Software User Manual Reporting Table 30 Selected Details of the Passive Report This Term Means This NIC Data Information about NICs in the SSM Card Indicates which NIC in the list is being descr
197. e ee xarna san k ber ee yan eee ee aren dena dank 325 Connecting the EBSD Devices to the SSM EBSD Server d Ee 327 Verifying EBSD Devices s li kl H n k kunik akai Ma E Ha n a k kn K R N kulk Ra kO Duw 327 Mounting the Block Device EBSD Disk EEE kk ek kk kk K k ke 328 Adding an EBSD Disk at Runtime EEE kk kek kk kk ka kk K k kK KK 328 Starting the EBSD Service E EEE EEE keke kek kek k k kk K Kek KAK rk KK KA KAK KA KK 328 Stopping the EBSD Driver cciccessscccciscsnsecnessnensascaceeccsessccenscesnsasensaccenssceansnensseeatasezectenansacee 329 Status of the EBSD Driver and Devices E kk kk kk kK kk kk K k ke 329 Disconnecting an EBSD Device M M kk kk kek keke k Kake kr KK kk kk KK KA kK KAK 330 Disabling an EBSD DEVICE siccin enpaki lak ka Seh ki k l kik ek k BER kel M R ba V k EEE 330 Deleting an EBSD Device amen etree ammeter en mre ee ae ee ee eer KK KK KA KAK KK KA eee 331 Uninstalling the EBSD Driver vc csicncccececis caxiecacncentstcecenats saneonds scctsduegncaadedeesatadeasPeceesicdennced 331 FINS gi De et en ee eee er re eee A et 331 Troubleshooting fe a ee 332 Appendix D Remote COpy iicsidisiatinatipcenanadeiedasinnibsnnineniaiinlnnisen AKA HARA K KAK KH HAAA KHK KAWA KAKA 333 Registering Remote GOpy i y ss puan xana Eda kanan Mal NIV S Bin L w ke EEA Ek Hak E b a k kuma E 333 Number of Remote Copy Licen
198. e following features Multiple nodes in a cluster Hot spares e N way replication Virtual manager Starting the License Evaluation Period If you put more than one SSM into a cluster the 30 day license evaluation begins During the 30 day evaluation period you can create volumes with 2 or 3 way replication add a hot spare to the cluster or configure a virtual manager Please read Using Hot Spares on page 201 Planning Data Replication on page 222 and Chapter 10 Disaster Recovery Using A Virtual Manager before working with these features Intel Storage System Software User Manual 297 Feature Registration Backing Out of the License Evaluation Period If you decide not to purchase the Scalability Pak you must reduce the cluster to one SSM The features you are evaluating dictate the steps required to safely back out of the evaluation configuration particularly if you want to save any volumes or snapshots in the test configuration 1 Back up any volumes you plan to retain The table below describes additional steps to safely back out of the Scalability Pak evaluation Table 53 Safely Backing out of Scalability Pak Evaluation Feature Being Evaluated Steps to Back Out Multiple SSMs with a large volume If volume is too large to fit on a cluster with one SSM do one of the following Delete the volume Move the volume to another single note cluster with adequate capacity Add storage to th
199. e inana DIRE bakan wiki n kuna WE sike ak MAT bA M RE 203 Creating a Cluster LEEEEL EEE kk keke kk kk kk Kek kk rk kK KK KK KA kK KK rk kK KAK rk kk r 204 viii Intel Storage System Software User Manual Contents Designating a Hot Spare hKh llkhk E Ll kk kk kk k k ke kk K k A K KA kK KK A KH 205 Configure Virtual IP and ISNS for iSCSI J EEE kk kk kek 206 Adding an iSNS Server Optional Eke kes 206 The Cluster Tab ViGW s sin haka kla iN na kak bazakal a binan MaLi baki an kk bak k d bik aa bal ken bin 208 Editing a Cluster eneee e a ebe ee SE ee ee Se eye e ee 210 Getting There EE Ek kk eke ekr ak k k kk kra kk kk kk kk kk canes wens 210 Adding an SSM to an Existing Cluster E kk kk kk kk kk ke H 211 Changing the Hot Spare Designation EEE kk kk kek K k KS 212 Changing the Hot Spare Time Out iuEE kk kk kek k kek kk K k kk KAK 212 Removing an SSM from a Cluster LEE kk k kK kk kK ka kk 213 Changing or Removing the Virtual IP kk kek kk ks 213 Changing or Removing an ISNS Server L E E E kk kk kk e ke 214 Swapping in a Hot Spare h hk di eke kek kk k k k kak kK KA kK K k KK KAK KAK KAK KK RA A 214 Repairing AN SSM sis nllk a nike makan kini bini i an bar n n bid weka an suk nan b nin bizaN R Haran E 215 Prerequisites for Using Repair SSM b E SBBE kk kk kk kk
200. e new snapshot also displays in the Network view as shown in Figure 175 Intel Storage System Software User Manual 247 Working with Snapshots File Find Tasks View Help a Available SSMs IB Transaction_Data zz a m TransData05 Boulder 3 EE EE Boulder 2 Boulder 1 New Snapshot Remote Snapshot Schedules T Volume List Memberships Details Snapshots Snapshot Schedules Hosts Remote Snapshot Name Hard Threshold Soft Threshold Created Snapshot_O 8 GB 8 GB 07 06 2005 09 25 37 PM Figure 175 New Snapshot Note Snapshots are listed below the volume in descending date order from newest to oldest The Snapshot Tab View Clicking on the snapshot itself opens the snapshot Tab View shown in Figure 176 Details Hosts Remote Snapshot Target Information Volume List Memberships Name Snapshot_0 Size 8GB Replication Level 2 Way Created 07 06 2005 09 25 37 PM GMT Hard Threshold 8GB Replication Priority Availability Cluster TransData05 Soft Threshold 8GB Type Primary Checksum Data No Auto Grow Auto Created by Script No Status Normal Writable space None Description Figure 176 Snapshot Tab The tabs provide access to snapshot information and features such as editing snapshots rolling back a volume and associating authentication groups with the snapshot The Tasks button on each tab provides access to the actions you can take related to that tab Det
201. e power supply voltages Allvoltages One or voltages against the accepted voltage range are within more for normal operation the range voltages outside range Enclosure Sends a passive command to the Backplane Backplane weg backplane and verifies that the returns times out communication response from the backplane expected or does not matches criteria string return expected string Hard drive status Checks the status of all installed All drives One or drives are On more and drives not Secured On and Secured Hard drive For each of the drives compares the Temp ofall One or temperature temperature against an accepted drives are more range for normal operation within drives out range of range Fan status Checks the fan status Fan is Fan is normal faulty Power supply Checks the power supply status Power Power status supply is supply is normal faulty Hard drive S M A R T Self Monitoring Analysis All drives Warning or SMART health and Reporting Technology is pass Failed if implemented in all modern disks A health test one or program inside the disk constantly more tracks a range of the vital parameters drives fails including driver disk heads surface health test state and electronics This information may be used to predict hard drive failures RAID controller Checks the status of the RAID BBU is Failed if BBU Status controller Battery Backup Unit BBU Normal Charging Faulty or
202. e remote volume as shown in Figure 237 Intel Storage System Software User Manual 345 Remote Copy Note If you create a remote snapshot of a volume with a remote snapshot still in progress the second remote snapshot will not begin copying until the first remote snapshot is complete gz Remote_Backup a a Transaction_Data a Transaction_Data_Backup a a Transaction_Data Boulder 1 Boulder 2 RemVolCD 4 a Remsscb04 Remote Volume Primary Volume and Remote Snapshot and Primary Snapshot Figure 237 Viewing the Remote Snapshot Creating a Remote Volume Then go to Completing the Remote Snapshot on page 345 You can create a remote volume by any of the following methods Make an existing volume into a remote volume Create a new remote volume during creation of a remote snapshot e Create a new volume from the cluster Details panel and then select the Remote option on the New Volume window Making an Existing Volume into a Remote Volume Selecting an existing volume to become a remote volume will cause A snapshot of all existing data to be created for that volume and then All the data in that volume will be deleted so that the remote volume will have zero length and zero hard and soft thresholds 346 Intel Storage System Software User Manual Remote Copy Creating a New Remote Volume When you create the remote snapshot use the Remote Snapshot window shown in Figure 233 t
203. e search again If activity to the module was high the module might not have responded to the search Note Other problems can occur that prevent connection such as a bad cable connection Intel Storage System Software User Manual 21 Getting Started Finding by Subnet and Mask Find all the SSMs on the network by searching subnets with masks To do this Click the Find menu and click By Subnet and Mask The List of Subnets to Search window opens shown in Figure 7 List of Subnets to Search x List of subnets with masks to search Subnet Mask 10 0 0 0 255 255 240 0 Add Edit Delete Figure 7 Using Subnet and Mask to Search Adding Subnets and Masks Click Add to enter a subnet and mask The Add Subnet and Mask window opens Type in the Subnet Click OK to close the Add Subnet and Mask window Click Find all The Active Search window opens tracking the search process When the search is complete the Active Search window closes The Console window opens listing all the SSMs that were found on the network 1 2 3 Select the appropriate mask from the list 4 5 6 Click OK to close the Console window 22 Intel Storage System Software User Manual Getting Started 7 Click Done on the List of Subnets to Search window The modules appear in the Network View identified by host name File Find Tasks View Help Available SSMs Denver 1
204. e the primary and remote management groups if the remote copy was between management groups Scripting Evaluation Application based scripting is available for volume and snapshot features as part of the Configurable Snapshot Pak and the Remote Data Protection Pak Features that can be scripted include Creating snapshots and setting hard and soft snapshot thresholds Increasing volume hard and soft thresholds e Scripting automatic threshold increases e Creating remote volumes and snapshots Because using scripts with add on features and applications starts the 30 day evaluation period without requiring you to use the Console you must first verify that you are aware of starting the 30 day evaluation clock when using scripting If you do not enable the scripting evaluation period any scripts you have running licensed or not will fail Turn On Scripting Evaluation To use scripting while evaluating add on features or applications enable the scripting evaluation period 1 Select the management group 2 Select the Register tab 3 From the Tasks menu select Feature Registration 4 Select the Scripting Evaluation tab shown in Figure 213 300 Intel Storage System Software User Manual Feature Registration Feature Registration Feature Registration Registration is required for additional software features Current feature registration license keys are displayed below For additional feature registratio
205. e volume See Editing a Volume on page 235 for detailed requirements Deleting a Volume Delete a volume to remove that volume s data from the SSM and make that space available When deleting volumes you must delete all snapshots of that volume before you can delete the volume itself Warning Deleting a volume permanently removes that volume s data from the SSM Prerequisites Delete all snapshots of the volume that you want to delete Stop applications from accessing the volume e Disable the drives on the host Use these steps to delete the volume 1 Select the volume you want to delete The volume Tab View opens 2 Click Delete Volume A confirmation window opens 3 Click OK The volume is removed from the cluster Intel Storage System Software User Manual 239 Working with Volumes Selecting a Volume or Snapshot from the List The Select Volume list window opens when you select the Tasks menu and then one of the following choices Tasks gt Volume Tasks gt Snapshot or Snapshot Schedules New Snapshot New Snapshot Schedule Tasks gt Remote Copy New Remote Snapshot New Remote Snapshot Schedule 240 Intel Storage System Software User Manual 13 Working with Snapshots Snapshots provide a fixed version of a volume for use with backup and other applications Snapshots vs Backups Unlike backups which are typically stored on different physical devices or tapes sn
206. eating the Primary Snapshot iu keke k kek K k kk K k kK 344 Completing the Remote Snapshot ELEE kk kk kk kk K k kk KAY 345 Creating a Remote Volume EEEEE kk eke kk k k kk kK ake kK rk KK KA KAK KA RR 346 Making an Existing Volume into a Remote Volume E k r 346 Creating a New Remote Volume iE Eek kk k ek kk kk kk Kek 347 Intel Storage System Software User Manual xiii Contents Viewing a List of Remote Snapshot EEE kk kk ek k kk kK k kk KK KA kK KA KA 349 Setting the Remote Bandwidth EE kk keke ek kK k kk K KE KK kr KO 349 Canceling a Remote Snapshot Ek kek kek kek kk K rk kK rk kK KA 350 Editing a Remote SnapS nO l3 i i acai blal nal sika sar WE kek khan kuln l ana kin ah sah na kab n h dala Hakan b k anka 351 Deleting a Remote Snapshot ccc init kk kk k k kk Kek aeons 351 Monitoring Remote Snapshots EEE kk kk kk k kk K ek k re kk K KK kK kk KA kk KH 352 Configuring Active Monitoring Alerts for Remote Copy EiE ee 352 Monitoring Remote Snapshot Details from the Console Tab View 352 Viewing Information in the Remote Snapshot Tal ee 352 Viewing Status in the Remote Copy Details Window cceeeeeeeeeeeeeeeeeetteeeteeeees 353 Scheduling Remote Snapshots LL Eek kk kk kk kk kK k kk KK KA KA KA YA 355 Creating the
207. ed to create and delete snapshots and to automatically increase volume thresholds The second one ebsdvm is used to mount the snapshot Java commandline CommandLine Java commandline CommandLine is the program that actually invokes the snapshot function in the Console for creating and deleting snapshots In addition the program can respond when a soft threshold is reached on a volume and automatically increase the hard and soft thresholds on that volume 1 Set the environment Table 46 Setting the Environment for Using Scripting Tools Operating System Syntax Example Windows set CLASSPATH lt full path set CLASSPATH C Program Files Intel Storage to Ul jar gt Server UNUI jar Working with Scripting 262 Table 46 Setting the Environment for Using Scripting Tools el Syntax Example Unix C Shell setenv CLASSPATH lt full setenv CLASSPATH opt IntelStorageServer UI type path to Ul jar gt Ul jar Unix Bourne export CLASSPATH lt full export CLASSPATH opt IntelStorageServer UI or Kshell or Bash path to Ul jar gt Ul jar 2 Run the tool commandline CommandLine Note Run this program twice to take a snapshot of both the journaling data and the application data if you have them stored in separate volumes Table 47 Parameters for commandline CommandLine Parameter What It Is admin name Value text Name of the administrator with full administr
208. ed with a default host name 1 Log in to the SSM 2 On the Module Information tab click the Host Name field and type the new name If you are operating in a Windows environment the host name should be 15 characters or fewer 3 Click Apply A confirmation message opens 4 Click OK Note Add the host name and IP pair to whatever host name resolution methodology is employed in your environment e g DNS or WINS Changing Passwords Change the password for the user who is logged in to an SSM on the Module Information tab 1 Log in to the SSM 2 On the Module Information tab click Change Password The Change Password window opens 3 Type in the User Name and Old Password 4 Type in the New Password 5 Retype the New Password for confirmation 6 Click OK Change any other user s password in the SSM Administration configuration category Intel Storage System Software User Manual 43 Working with Storage System Modules Locating the Module in a Rack Intel Storage System SSR212MA only The Set ID LED On turns on lights on the physical module so that you can find that module in a rack 1 Log in to the SSM 2 On the Module Information tab click Set ID LED On The ID LED on the left front of the module illuminates a bright blue Another ID LED is located on the back of the module on the right side under the empty slot Blue ID LED is bottom indicator on left front side i of module
209. eeeeeeeeeseenenneneeeees 375 Configuration for Affordable Disaster Recovery Ed Eke k 375 How this Works for Affordable Disaster Recovery EEEE EEE 376 B st Practices casas ve Serer ects Se aces asian eee eee eee ace al 377 Using Remote Copy for Off site Backup and Recovery E iu kk 379 Achieving Off site Tape Backup EuEE Ek kk kek kek K kk kk KK KA kK 379 Configuration for Off site Backup and Recovery eeeeeeeeeeeeeeeeeeneeeeeeteaeeeeeeenaeeeeeees 379 How This Configuration Works for Off site Tape Backup cceecseeeeeeeereeeeeeneeees 380 Best ee Ui ate ec n N ND JM MNMMMIMMMMMDMDDMDM MMDRDnNnDnDnDRo35noD3aDDADMDMDMMDDMDMIDIk ATE 380 Achieving Non Destructive Rollback ELE EEE kk kk KK k 381 Configuration for Non Destructive Rollback LE Ek ek 381 How This Configuration Works for Non Destructive Rollback UUUUUUUUUj 382 Best Practices sisiya l l k na kan sain ay aa nakan Dinar kan aa biwan N na qalen b kan lala sala bena k 384 Using Remote Copy for Data Migration EEu Ek kk kek kr kk 384 Achieving Data Migration sssrini l yan ala Wn H k kl ka yeak ka Vl ka kk bayek ERNEA kulk ea kaka ke aaa 385 Configuration for Data Migration L EE kk kek kk kek kK ke 385 How This Configuration Works for Data Migration EE 385 Intel Storage System Software User Manual XV Cont
210. ees 61 Figure 49 Capacity of Disk Pairs in RAID 10 kk kk kk 65 Figure 50 Parity Distributed Across a RAID 5 Set Using Four DisKS E U U EU 65 Figure 51 Capacity of Disk Sets in RAID D kk k kk kk K k kk 67 Figure 52 Capacity of Disk Sets in RAID D kk kk kk kk kk K k kk 68 Figure 53 Viewing the RAID Setup Report iE kk ek kk kk K k kk K k RA 68 Figure 54 RAID 0 on an Intel Storage System SSR316MU2 cee eeeeeeeeeeeeeeeeeeeeeeneeeeeeee 69 Figure 55 RAID 0 on an Intel Storage System SSR212MA EuE kek 69 Figure 56 RAID 10 on an Intel Storage System SSR316IMJ2 uEEE 70 Figure 57 RAID 10 on an Intel Storage System SSR212MA uEE en 70 Figure 58 Intel Storage System SSR316MJ2 RAID 50 Using 4 Disk Sets 70 Figure 59 Intel Storage System SSR316MJ2 RAID 50 Using 3 Disks Plus a Hot Spare 71 Figure 60 Intel Storage System SSR212MA RAID 50 Using 6 Disk Sets 71 Figure 61 Intel Storage System SSR212MA RAID 50 Using 5 Disks Plus a Hot Spare 71 Figure 62 Monitoring RAID Status on the Main Console Window iu 79 Figure 63 Viewing the Disk Setup Tab in the Intel Storage System SSR316MJ 81 Figure 64 Diagram of the Drive Bays in the Intel Storage System SSR316MJ2 82 Figure 65 Viewing the Disk Setup Tab in an Intel Storage Syste
211. elete the group Intel Storage System Software User Manual Controlling Client Access to Volumes Volume Lists Overview The volume list for an authentication group is the list of volumes accessible to that group Prerequisites At least one management group has been created At least one cluster has been created in that management group At least one volume has been created in that cluster Warning When associating or deleting associations for Fibre Channel LUNs the host server s Disk Management or equivalent window must be closed Requirements for Volume Lists An authentication group can contain only one volume list Only one authentication group should have read write access to a volume For Fibre Channel volumes or snapshots you must assign LUN numbers when you add the volume to the volume list Planning Volume Lists Planning volume lists takes into account multiple factors What applications or clients will access the volume How will those applications or clients access the volume through an iSCSI initiator the EBSD driver or through a Fibre Channel host What permissions will you assign for those clients Creating a Volume List 1 Log into the management group and select that management group in the Network View The management group Tab View opens 2 Click the Volume Lists tab to bring it to the front 3 From the Tasks menu select New Volume List The New Volume List window opens s
212. emote copy of your data volumes You can also use remote snapshots to transfer data to a backup location where tape backups are then created This eliminates the backup window on your primary volumes and ensures that you have copies of your data in the remote site on SSMs as well as on tape Configuration for Affordable Disaster Recovery To configure affordable disaster recovery create remote snapshots of your volumes in an off site location In addition you can create tape backups from the remote snapshots in the off site location Designate one or more off site locations to be the destination for remote snapshots Intel Storage System Software User Manual 375 Sample Remote Copy Configurations Set up a schedule for creating remote snapshots in the designated off site locations If your application server uses multiple volumes that must be in sync use a script to quiesce the application before creating remote snapshots Create routine tape backups of the remote snapshots in the off site locations Configuration Diagram Application Workstations Ethernet Corporate LAN 2 Production l i Production Application Application Server Server Applicatior Servers Read Only Read Only Primary Fa Remote fi Remote Primary Volume i Volume 1 i i Volume 2 Volume Storage axan kd Subr et Primary Remote Remote Primary Snapshot Snapshot 41 Snapshot 2 Snapshot Production Site 1 Backup Site Product
213. en nee Rene ee een me ere ne eee ene eee kak k Kak eee KAK kk KK KK RA 227 Creating a Volume uE kk kek kek kk kK kek kk K kK k KK K k KA KA KAK KAKA kk 231 The Volume Tab View sisirin xak n kan k klr H k ue Ek ku ae ak ka ni MEKR Ak ke kah wak kaka ak 233 Editing a Web nm h ame mmgmggmmmmgg mnn 235 Getting WEIS scrierea HH yp bb bp br rb r br r rp r rm e bpr er DD DED 236 Changing the Volume Description LEE kek kk kek kk Kek kek 237 Changing the Cluster uEE Ek kk ek kk keke k k kk kk kK KK KK KA A KA KA 237 Changing the Replication Level ELE Ek kek kek kk kk Kek kK 238 Changing the Replication Priority EE Ek kk kk kk kk k kK 238 Changing the SIZE i i qe milen mall Han SER NENN E wad Eaa kal van AR H R E 238 Changing the Hard Threshold E kk kk kk kk KK k KAK 238 Changing the Soft Threshold uEE kek kk kek kk K k kk ke Ke 238 Intel Storage System Software User Manual ix Contents Fixing a Replica challenged Redundant Volume uE kk kk K k 239 Deleting a VO U I 4 5 4x x 24x24 wa selah iaaa H n kal kla d AA W wl H dd keda d l kew d UB HE W A EKA 239 Selecting a Volume or Snapshot from the List es 240 Chapter 13 Working with SnapShots ccccseseeeeeeeeeeeeeseeeeeeeeeeeseeseeeeeeeeeeeeeeeees 241 Using SHAPSWORS isis DD bbbkxbxbzbz gggmgm_og_gmmmg ge 241 Single Snapsho
214. ens 2 Click the Clusters tab The Clusters tab opens shown in Figure 151 File Find Tasks View Help a Available SSMs a a Transaction_Data Denver 1 Boulder 1 Boulder 2 Boulder 3 EEE Denver 2 zz Denver 3 Details Managers Clusters Authentication Groups Volume Lists Register Times Remote Snapshot Name Clusters tab Figure 151 Viewing the Clusters Tab 3 From the Tasks menu click New Cluster The New Cluster window opens with the General tab on top shown in Figure 152 204 Intel Storage System Software User Manual Working with Clusters New Cluster New Cluster General iSCSI Cluster Name Cluster_0 Description SSMs Available SSMs in Cluster SSM IP RAID Boulder 3 10 0 3318 RAID 0 Boulder 1 10 0 3313 RAID 0 Boulder 2 10 0 3317 RAID 0 lt Add lt amp Add All Remove gt Remove All 9 gt Hot Spare None Hot Spare Time Out 0 Seconds Cancel Figure 152 Creating a New Cluster 4 Type a meaningful name for the cluster A cluster name is case sensitive and must be from 1 to 127 characters 5 Optional Type a description of the cluster 6 Select one or more SSMs from the SSMs Available list Note The SSMs in the list are all those included in the management group that are not already in a cluster 7 Click Add The selected
215. ensure that you do not lose more than 4 hours worth of data in an emergency e A second schedule to create remote snapshots every 24 hours and retain 7 remote snapshots Use remote snapshots in conjunction with local synchronous volume replication To prevent data loss reinforce Remote Copy with synchronous replication of the volume within the cluster of SSMs at the primary geographic site With synchronous replication a single SSM can be off line and your primary volume will remain intact At the backup location you can also use synchronous replication to protect your remote volume against SSM failure Example configuration In the production location create a cluster of 3 SSMs all with managers Create volumes on the cluster and set the replication level to 2 Create a schedule for making remote snapshots of the primary volume Set the recurrence to every 4 hours and retention of remote snapshots to 2 days Note You can use the same volume replication configuration on the remote volume as well However this replication is configured independently of the volume replication configured on the primary volume If one of the SSMs in the primary location fails the primary volume will still be available If all of the SSMs fail or if the application server fails then you can recover data from the remote snapshots or tape backups in the off site location 378 Intel Storage System Software User Manual Sample Remote Copy
216. ents xvi Intel Storage System Software User Manual List List of Figures of Figures Figure 1 Viewing the Wizard Launch PAQ kk kk Ak kk KA KK KA KA RR 16 Figure 2 Features of the Console Main Window i kk kek ek kk 17 Figure 3 Graphical Legend Items from the Help Menu k Ek 18 Figure 4 Graphical Legend States Tab from the Help MeNnu cceceeceeeeeeseeeeeeeeeeeeeeeeneeeees 19 Figure 5 Graphical Legend Hardware Tab from the Help Menu EEEEU UUU UEE 20 Figure 6 SSMs Found Message iiEE Sei ieee iar eae 21 Figure 7 Using Subnet and Mask to SearC h EEEd kk kk kek kk kk 22 Figure 8 SSMs in the Network View Pane iiEEE kk kk kek ke kK kk kk 23 Figure 9 Using IP or Host Name to Search EE Eke kk kek kk kk 25 Figure 10 Network View FeatUr S LlllE llilillllil Eka ak kk kk ak kk ania kk kk KA KAK KA AA KA 27 Figure 11 Tab View in Main Wi nd6OW i iiuE Ek kk kk kk KK KA KAK kk KK KAK KAR 29 Figure 12 SSMS Tab with SSMS LiSted EEE kk kk kk kk K k ke 29 Figure 13 Management Groups Tab from Network Tab V W iEeeeE 30 Figure 14 Viewing messages in the Alert Messages Tab E E 30 Fig r 15 coy oro Bayt an ne eterno evn ene ere eee Ce eee ee re 31 Figure 16 Viewing individual SSM information ccccceeceeeeeeeeeeeeeeeeeneeeeeeenaeeeeeeneeeeesenaeeee
217. er Manual Storage Storage Capacity in RAID 10 SSM capacity in RAID 10 is the total capacity of all mirrored disk pairs in the module The capacity of a single disk pair is equal to the capacity of one of the disks as shown in eee Eee bk E2 Sart eD y capacity capacity capacity 250 GB 250 GB 250 GB capacity 750 GB Figure 49 Capacity of Disk Pairs in RAID 10 RAID 5 and RAID 50 RAID 5 RAID 5 provides data redundancy by distributing data blocks across disks in a RAID set Redundant information is stored as parity distributed across the disks Figure 50 shows the distribution of parity across 4 disks in a RAID 5 set Mw _0 _0__J 0 parity 1 1 parity _ 0 1 1 1 L 2 j pariy 2 3 parity J 3 3 Disk 1 Disk 2 Disk 3 Disk 4 Figure 50 Parity Distributed Across a RAID 5 Set Using Four Disks Parity allows the SSM to use more disk capacity for data storage than RAID 10 allows Intel Storage System Software User Manual 65 Storage RAID 5 in the Intel Storage System SSR316MJ2 A RAID 5 set in the Intel Storage System SSR316MJ2 is comprised of 4 or 8 disks The RAID 5 set using 4 disks may be configured as follows 3 disks plus a spare or 4 disks The RAID 5 set using 8 disks may be configured as follows 7 disks plus a spare or 8 disks RAID and Hot Spare Disks The RAID configurations that use 3 disks plus
218. er Manual 169 Working with Management Groups Getting There 1 Open the Console If you have not created a management group but you have some SSMs on the network the Console displays those SSMs as available See Figure 126 File Find Tasks View Help Available SSMs Denver 1 Available SSMS before creating a Denver 2 management group Denver 3 j Available SSMs Management Groups Alert Messages EBSD Hosts These SSMs are available for use Name Denver 2 10 0 33 18 Denver 3 10 0 33 35 Denver 1 10 0 33 48 Figure 126 Viewing SSMs Before Creating a Management Group 2 Log in to one or more of the SSMs you want to add to the new management group 170 Intel Storage System Software User Manual Working with Management Groups 3 Click Done from the SSM Edit Configuration window to return to the main Console window with the SSM tab view shown in Figure 127 File Find Tasks View Help a a Available SSMs Denver 1 Denver 2 Denver 3 Details Management Group Information i Availability HostName Denver 1 RAID Status Normal IP Address 10 0 33 35 RAID Configuration RAID 1 or 10 SSM Tab View Model SSR212MA Storage Mode SerialNumber 00 03 47 EB 86 EF Software Version 6 3 19 0001 0 Figure 127 SSM Tab Adding the First SSM to Create a New Management Group 1 Select the first SSM to include in the management grou
219. er to the backup application servers Failback to the production configuration When the production server and volumes become available again you have two failback options e Resume operations using the original production server and return the backup volumes to their original remote status as illustrated in Figure 259 This will require migration back onto the production volumes of data that was written to the backup volumes since the failure Continue operating on the backup application server When the production server and volumes become available configure the production server to be the backup server role reversal Merging data for failback In the failover scenarios described above there are probably two snapshots with different data As part of failback users must make a decision whether to merge the data from the two snapshots and the most effective method for doing so See Synchronizing the Data Between the Acting Primary Volume and the Original Primary Volume on page 365 Intel Storage System Software User Manual 373 Sample Remote Copy Configurations Application Workstations Clustered Production Backup Production Application Application Application Application Servers Server Server Read Only WM Read Write Primary Remote Volume Volume Primary Storage Mak Volume Subnet Primary Remote _ Primary Snapshot Snapshot Snapshot Figure 259 High Availability Configuration During Failback Best P
220. es Change the speed and duplex method of an interface The TCP Status Tab Review the status of the network interfaces on the TCP Status tab shown in Figure 84 Module igi Storage Time SSM Administration Name Description Speed Met DuplexiM Status Frame S Preferred g2 SNMP Reporting Slott Portt Intel Corp Unknown Unknown Disabled Default TCPAP TCP Status DNS Routing Communication Motherboard Portt Intel Corp Unknown J Unknown Disabled Default Slot1 Port2 Intel Corp Unknown J Unknown Disabled Default Slot1 Port3 Intel Corp Unknown Unknown Disabled Default Default Slot1 Port Intel Corp Unknown Unknown Passive Default Motherboard Port0 Intel Corp 100Mbs A Full Auto Active Default Yes Set Preferred Figure 84 Viewing the TCP Status Table 19 Status of Information About Network Interfaces Column Description Name Name of the interface Entries are e Motherboard PortO Motherboard Port1 e Slot1 PortO bondO the bonded interface s displays only if SSM configured for bonding Description Describes each interface listed For example the bondO is the Logical Failover Device Speed Method Lists the actual operating speed reported by the device Duplex Method Lists duplex as reported by the device Status De
221. es 42 Figure 33 Viewing ID LED Indicator on Front of Module EEE 44 Fig re 34 ID LED IndiCalOfF i xi xaxan sanan sa nanan niza k RL a awa A Mada an b n b ka GR Vu 44 Figure 35 Upgrading the SSM SOflWaAr6 EEEEEE EEE keke k kk K kA kK KA kk 45 Figure 36 Browsing for Upgrade or Patch File EE EEEu ERK KAS 46 Figure 37 Upgrade Status SSAge S EEE Eke kk kk kk Kek k kK KK KAK KK kk KA 46 Figure 38 Viewing the Backup and Restore WindOW iEE EEE kk kk kk kek 47 Figure 39 Backing up the SSM Configuration File EELuLE kk ke 48 Figure 40 Restoring the SSM Configuration File uLEE keke 49 Figure 41 Restoring the SSM Configuration File kk 50 Figure 42 Shutting Down or Rebooting the SSM iu kk kek kek kk ke 51 Intel Storage System Software User Manual xvii List of Figures Figure 43 Canceling the SSM Reboot EE uEL Ek kk kek kk kk KK kk kk 52 Figure 44 Viewing the Feature Registration Tal kk 53 Figure 45 Using Remote Copy without a LICENSEC eceeceeeeeeeeeeeeeneeeeeeeeeeeeteeeeeeetnaaeeeenes 54 Figure 46 Viewing Boot Device Status with Two DeviCeS lE EE kk ekkk 55 Figure 47 Viewing Single Boot Device Status cccccceccseeeeeeceeeeeeeeeeeeeeeeeaaeeeeeeneeeeeeeeeeeee 55 Figure 48 Viewing the Storage Configuration Category ccccccceeeeeeeeeeeeeneeeeeeeneeeeeetaeeee
222. est practice configuration for assigning LUN numbers to volumes and associating LUNs to hosts Each host is accessing two LUNs Each of the two LUN associations has a different LUN number Engineering Volume 1 Engineering Authentication all Group Engineering Volume 2 Finance Volume 1 Finance Authentication Group Finance Volume 2 Marketing Volume 1 Marketing Volume 2 Figure 190 Example Configuration for Assigning LUN Numbers Prohibited Host with Duplicate Numbered LUN Figure 191 illustrates a prohibited LUN numbering configuration Engineering Volume 1 Engineering m UNO m jJ J T _ Engineering Volume 2 Figure 191 LUN Numbering Configuration that is NOT Allowed Authentication 278 Intel Storage System Software User Manual Controlling Client Access to Volumes Possible Hosts with a Shared LUN It is possible to associate multiple hosts to one LUN in which case you should make one host association read write and the other host associations read only as shown below in Figure 192 aer ul NF nonin vt Group l r N Ey LUN 0 thw Finance Authentication LUN 1 Finance Volume Group LUN 0 r o Marketing Authentication wal LUN 1 Marketing Volume Group r F LUN 0 r o Shared Volume Used by All Groups Via Lun Figure 192 LUN Numbering Configuration with one LUN Shared Among Three Hosts Creating an Authentication Group 1 Log into
223. estdsanascndaneetandida kk K k kK kk K KE KAK KA KK KK kK 264 Deleting a Snapshot EELuE Ek kk kk kk k ek k k k kk K KAK KK KK KK KAK KA 265 Assigning a LUN Number to a Fibre Channel Volume or Snapshot Intel Storage Sys tem SSR316MJ2 only E kk kk kek kk vender kk kK KK kk 265 M unting a SnapShO0L 4sx x kan nani Hilal E HEE E buk HOLE EEE k Kul nee 266 Increasing Volume Hard and Soft Thresholds uE ker 266 x Intel Storage System Software User Manual Contents Scripted Commands for Remote Copy E iid kk kk kk ek kk kk kK ka kk k kk KH 267 Creating A Remote Snapshot In A Different Management Group 267 Creating A Remote Snapshot In The Same Management Group 268 Converting a Remote Volume to a Primary Volume and Back to a Remote Volume 268 Sniping E odo eee ee ee meee e r eee eee NE ET e N an ee eer ae Tee 269 Make Remote Volume into Primary Volume E kk kk kk kk ke 269 Mount New Primary Volume u kk kk kk ka kk KK KAKA KA KAK KAK 269 Chapter 15 Controlling Client Access to Volumes eeeeeeeeeeeeeeeeeeeeeees 271 Creating Access to VOlUmes EE Ek ek kk K k kk K k kk KK KK KA kk KA kk KH 271 Types of Clhent ACCESS sce viet so ul san een enmand kan ba kak kn KELE n SA bA N Ha ke Hen KR E el 1a b ladan 271 Client Access and iSCS
224. etting applies the same email address and other alert settings to all SSMs Then if you need to customize alert actions for a particular variable you can edit that variable 6 Click Finish when you have configured all the threshold items in the list Downloading a Variable Log File To save the history of a variable download a copy of the log file 1 In the list of monitored variables click the variable for which you want to save the log file 2 Click Download Log on the Active Reporting window The Save Variable Log File window opens 3 Choose a location for the file 4 Optional Change the name of the log file 5 Click Save The file is saved to the location you specified Viewing the Variable Summary You can review the frequency settings and the triggers for a variable in the Monitored Variables list without editing the variable 1 In the list of monitored variables select a variable The frequency thresholds and notification settings display to the right of the list Module Passive Logfiles Active Email Diagnostics Alerts fi Storage Time TCP IP Network n SSM Administration g8 SNMP Monitored Variables Summary Frequency 15 seconds E CPU Temperature Thresholds 2 Power Supply Status If the value exceeds 65 alert CPU Utilization Memory Utilization RAID Status Network Interface Status 5 T Drive Status ave Log Files If the value exceeds 70 alert shut do
225. eveloped server building blocks to consult vendor datasheets and operating parameters to determine the amount of airflow required for their specific application and environmental conditions Intel Corporation can not be held responsible if components fail or the server board does not operate correctly when used outside any of their published operating or non operating limits Intel Intel Pentium and Intel Xeon are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries Other names and brands may be claimed as the property of others Copyright 2005 Intel Corporation All Rights Reserved ii Intel Storage System Software User Manual Contents Contents Chapter 1 Getting Started iyi a lxi lll kanasls s lia akl cenian niya Hana kad ka bihek s ak an n gand ua ka w b 1 Installing the Col SO l si iyan anam kanan sestane KE na NR Ru S ME HEWAN SUWAR An SEWM EA bA DEW G GOG R 1 Setting up an Intel Management Module IMM Password for the Intel Storage System aa 2 ce rm 14 Configuration Tasks J L kk kk kek k kk kK kek kK kak K k kk KK KAK KA KK KA KK KA KAK KK KAR RA 15 Wi ardS ttee _ j m rm gg E EEEE 16 Find SSMS W ZANd pardina enini k na a k n K ERE ue n e h madh ker n d k E 16 Create Volume Wizard sxlis sikan asin H kan ee an l b ki sikak S kan ai k l ben n K RE HE DAW A anc b
226. evice numbers 0 to 63 type volume snapshot EBSD device types is a volume or snapshot client_name s The EBSD driver client s hostname ip_bind x x x x The IP address of the client that you want this driver to bind to This address identifies the interface over which the driver will communicate to this volume in a multihomed system management_group s The name of the management group that contains the volume auth_group s The authentication group assigned to this volume volume_name s The volume name that is used to create the local ebsd disk Intel Storage System Software User Manual 325 Using the EBSD Driver for Linux 326 Table 57 Parameters in ebsd conf Parameter What It Is access_mode r ro rw r or ro read only rw read write The access mode the driver should use to access this volume use_unicast true false Whether the driver should use unicast discovery unicast_list x x x x x x x x Used if the use_unicast flag is set to true Coma separated list of ip addresses to be used for unicast discovery enabled true false Designates whether the device should come online at boot time If false then the device is disabled at boot time use_multicast true false Whether the driver should use multicast discovery see note NOTE Use either unicast or multicast Do not use both together
227. f disks so if one of the disks in the pair fails quorum is broken and RAID cannot be rebuilt Data is safe as long as both disks in one of the mirrored pairs are operating normally In order for RAID to rebuild when disks are replaced at least one complete pair of disks must be in the SSM to ensure that data is rebuilt correctly Disks are paired from left to right and for the Intel Storage System SSR212MA from top to bottom as shown in Figure 67 and Figure 68 starting with the first disk in the SSM e Disks 1 and 2 e Disks 3 and 4 Disks 5 and 6 and so on Quorum for RAID 5 or RAID 50 For RAID 5 50 quorum requires that at least n in each RAID set be intact If too many disks fail within one set quorum is broken and RAID cannot be rebuilt Table 4 and Table 5 show the number of intact disks required to maintain quorum for each configuration of RAID 5 50 sets in both the Intel Storage System SSR316MJ2 and the Intel Storage System SSR212MA Intel Storage System Software User Manual 77 Storage Table 4 Intel Storage System SSR316MJ2 Disk Requirements for Maintaining RAID Quorum Number of Intact Disks Required to Maintain Quorum RAID Set Configuration 3 plus a spare 2 4 3 7 plus a spare 6 8 7 Table 5 Intel Storage System SSR212MA Disk Requirements for Maintaining RAID Quorum Number of Intact Disks Required to Maintain Quorum RAID Set Configuration 5 plus a spare
228. f the remote volume It then copies the data from the primary snapshot to the remote snapshot This process will recur according to the schedule Editing a Remote Snapshot Schedule When editing a remote snapshot schedule you can change the following items e Schedule description start date and time recurrence policy Primary Setup primary snapshot thresholds retention policy e Remote Setup tetention policy Note Plan threshold changes carefully See the Managing Capacity Using Volume and Snapshot Thresholds on page 243 for detailed information about threshold requirements 1 Select the primary volume that has the schedule you want to edit 2 Click the Remote Snapshot Schedules tab 3 Select from the list the schedule to edit 4 From the Tasks menu select Edit Schedule The Edit Remote Snapshot Schedule window opens shown in Figure 249 Nn Change the desired information 6 Click OK 358 Intel Storage System Software User Manual Remote Copy Edit Remote Snapshot Schedule E Edit Remote Snapshot Schedule Name Description Remote Snapshot Schedule Time Zone Mountain Standard Time Start At 12 09 2004 04 45 02 PM X Recur Every 30 Primary Setup Remote Setup Management Group Transaction_Data Volume Name CreditData Snapshot Name Schedule Name Number Thresholds for Primary Snapshots Size 9 0 GB Hard Threshold 1 0
229. fails there is not a quorum Not Recommended 3 2 High If one manager fails 2 remain so there is still a quorum Note 2 managers are not fault tolerant See above 4 3 High If one manager fails 3 remain so there is still a quorum 5 3 High If one or two managers fail 3 remain so there is still a quorum Communication Mode The Storage System Console and Storage System Software support unicast communication among SSMs and application servers Unicast Communication Unicast is communication between a single sender and a single receiver over a network Unicast communication allows application servers to direct messages to SSM managers which are located in different subnets When you configure application servers to access storage volumes you must use the IP addresses of the SSMs that are running managers Adding or Removing Managers Any time you add or remove managers in a management group a window opens which displays all the IP addresses of those managers along with a reminder to reconfigure the application servers that are affected by the change Note Unicast requires that the SSMs running managers have static IP addresses Creating a Management Group Creating a management group is the first step in the process of creating clusters and volumes for storage Tasks included in creating a management group are Adding SSMs to the management group Starting managers on selected SSMs Intel Storage System Software Us
230. figuration of Management Group to save one or both of the following on your local machine e a binary file of the management group configuration from which you can restore the management group e a text file listing the configuration parameters of the management grou g g p g group The binary file enables you to automatically recreate a management group with the same configuration Use the text file for support information or to manually reconstruct the configuration of a management group Backing up the management group configuration does not save the configuration information for the individual SSMs in that management group To back up SSM configurations see Backing Up the SSM Configuration File on page 48 1 Log in to the management group 2 From the Tasks menu on the Details tab select Back up Configuration of Management Group The Back up Configuration of Management Group window opens shown in Figure 140 Back up Configuration of Management Group j Save Backup Configuration Management Group Name Transaction_Data Local Bandwidth 32768 Kb sec Remote Bandwidth 32768 Kb sec Database Version 6 3 Mirtual Manager None Communication Mode Multicast Off Unicast On Unicast IPs 10 0 33 18 10 0 33 25 Authentication Groups Name CreditTrans Description Volume list Credit ALLE D Save Configuration Description Back Up Configuration Figure 140 Backing up the Management Group Configur
231. from a Management Group on page 184 3 Power off the drive See Powering Drives On or Off on page 87 4 Replace the disk in the SSM 5 Power on the drive 6 Reconfigure RAID 0 Replacing Disks in RAID 1 10 or RAID 5 50 To replace a disk in an SSM running RAID 1 10 or RAID 5 50 1 On the Disk Setup tab select the old disk and click Power Off Disk 2 Replace the disk in the SSM 3 On the Disk Setup tab select the new disk and click Power On Disk 4 When disk is powered on select the disk and click Add to RAID Adding Disks to the SSM If the SSM is configured for RAID 1 or RAID 10 you must add an even number of disks to include all the disks in the RAID configuration See Requirements for Configuring RAID on page 74 If the SSM is configured for RAID 5 or RAID 50 you must add disks in complete sets as follows Intel Storage System SSR316MJ2 4 or 8 disks at a time Intel Storage System SSR212MA 6 disks at a time Diagrams of Disk Bays 84 Figure 67 and Figure 68 illustrate the placement of the drive bays in the Intel Storage System SSR212MA and in the Intel Storage System SSR316MJ2 Intel Storage System Software User Manual Storage Figure 67 Diagram of the Drive Bays in the Intel Storage System SSR212MA Figure 68 Diagram of the Drive Bays in the Intel Storage System SSR316MJ2 Adding Disks and SSM Capacity If you are usi
232. ftware User Manual 339 Remote Copy remote bandwidth setting for the management group containing the remote volume since that setting affects the time required to copy a remote snapshot Thresholds Does the cluster that contains the remote snapshots have sufficient space to accommodate scheduled snapshots See Chapter 13 Working with Snapshots for information about managing capacity using volume and snapshot thresholds See Managing Capacity Using Volume and Snapshot Thresholds on page 243 If the cluster does not have sufficient space available the remote snapshot will appear in the Console and it will flash red On the Details tab of the remote snapshot the status says Read only not enough space in cluster to start copy Retention Policies How long do you want to retain the primary snapshots The remote snapshots You can set different retention policies for the primary and remote snapshots For example you can choose to retain two primary snapshots and five remote snapshots The number of snapshots retained refers to completed snapshots Parameters for Remote Snapshot Schedule Retention Policies The system will never delete the last fully synchronized remote snapshot Under some circumstances such as unpredictable network speeds or varying snapshot size a remote snapshot schedule may create primary snapshots more frequently than the remote copy process can keep up with The retention policies for scheduled rem
233. ge System Software User Manual Using the Configuration Interface The Configuration Interface is the command line interface that uses a direct connection with the SSM You may need to access the Configuration Interface if all network connections to the SSM are disabled Use the Configuration Interface to Add SSM administrators and change passwords Access and configure network interfaces Delete a NIC bond Set the TCP speed and duplex Edit the frame size Reset the SSM configuration to factory defaults Connecting to the Configuration Interface Accessing the Configuration Interface is accomplished by attaching a PC or a laptop to the SSM using a null modem cable and connecting to the Configuration Interface with a terminal emulation program Connecting to the Configuration Interface with Windows On the PC or laptop attached directly to the SSM with a null modem cable open a session with a terminal emulation program such as HyperTerminal or ProComm Plus Use the following settings Bits per second 19200 Data bits 8 Parity None Stop bits 1 Flow control None Backspace key sends Del Emulation ANSI When the session is established the Configuration Interface window opens shown in Figure 218 Using the Configuration Interface Figure 218 Opening the Configuration Interface Connecting to the Configuration Interface with Linux UNIX 308 If using Linux create the following configuration file You mus
234. ge System Software User Manual Working with Snapshots Storage System Console x Rolling the volume back to this snapshot will delete the volume Before proceeding you must manually delete all snapshots of the volume that are newer than this snapshot To preserve the volume and snapshots that you need to delete create a copy of the volume and snapshots before rolling the volume back Are you sure you want to roll the volume back to this snapshot Figure 183 Verifying the Volume Roll Back 7 Click OK The snapshot version of the volume is restored as a read write volume 8 Add the restored volume to the original volume list For Fibre Channel volumes add a new LUN number as well 9 Reconfigure hosts to access the new volume Warning The original volume is deleted as part of the rollback Deleting a Snapshot Deleting a snapshot removes that snapshot s data from the SSM and removes the snapshot from the Network View The writable space associated with the snapshot is deleted Prerequisites Note These prerequisites do not apply to Fibre Channel snapshots Stop applications from accessing the snapshot e Disable the snapshot if it is mounted by a host 1 Log into the management group that contains the snapshot that you want to delete The management group Tab View opens 2 Select the snapshot that you want to delete 3 Review the Details tab to ensure you have selected the correct snapshot 4 From the Tas
235. ge on one or more SSMs It can be used as raw data storage or it can be formatted with a file system and used by a host or file server You create volumes on clusters of one or more SSMs After you create a volume you must add it to a volume list which is associated with an authentication group Volume lists and authentication groups control access to volumes by application servers For detailed information see Chapter 15 Controlling Client Access to Volumes This chapter covers the following topics e Planning volume size and thresholds Planning data replication and data priority Creating and managing volumes Prerequisite Before you create a volume you must have created a management group and at least one cluster See Chapter 9 Working with Management Groups and Chapter 11 Working with Clusters Planning Volumes Planning volumes takes into account multiple factors How many volumes do you need What type of volume are you creating primary or remote What size do you want the volume to be Do you plan to use snapshots Do you plan to use data replication Do you plan to grow the volume or to keep it the same size Note If you plan to mount file systems create a volume for each file system you plan to mount You can then grow each file system independently Working with Volumes Planning Volume Type Primary volumes are volumes used for data storage Remote volumes are used with Re
236. gement Group Information Availability Host Name Golden 3 RAID Status Normal IP Address 10 0 7 11 RAID Configuration RAID 0 Model SSR316MJ2 Storage Mode block SerialNumber 00 07 E9 3F D2 1C Software Version 6 3 25 0001 0 Figure 62 Monitoring RAID Status on the Main Console Window The status displays one of four RAID states e Normal RAID is synchronized and running No action is required Rebuild A new disk has been inserted in a drive bay and RAID is currently rebuilding No action is required Degraded RAID is degraded Either a disk needs to be replaced or a replacement disk has been inserted in a drive You must add a disk to RAID on Disk Setup if you are inserting a replacement disk e Off Data cannot be stored on the SSM The SSM is down and flashes red in the Network view Intel Storage System Software User Manual 79 Storage Replacing Disks and RAID Disk failure in an SSM affects RAID for that module First replace the failed disk Then reestablish RAID on the SSM When using RAID 0 you must reconfigure RAID 0 If the SSM is in a cluster you must first remove the SSM from the management group and then reconfigure RAID 0 When using RAID 1 10 or RAID 5 50 RAID must be rebuilt As long as RAID quorum was not lost you can replace disks in an SSM and rebuild RAID while the SSM remains in the cluster See RAID Quorum on page 77 You can view the status of the disks in the SSM on the
237. ges EBSD Hosts These SSMs are available for use Name Denver 2 10 0 33 18 Denver 1 10 0 33 48 Denver 3 10 0 33 35 Figure 12 SSMs Tab with SSMs Listed Intel Storage System Software User Manual 29 Getting Started Management Groups Tab The Management Groups tab shown in Figure 13 lists all the management groups currently created with the SSMs that are displayed in the Network View pane For information on management groups see Working with Management Groups on page 167 Available SSMs Management Groups Alert Messages EBSD Hosts Name Logged In Figure 13 Management Groups Tab from Network Tab View Alert Messages Tab Use the Alert Messages tab to review any alert messages Figure 14 shows the area in which alert messages display These messages include alerts from the monitoring parameters you set in Reporting for individual SSMs See Using Active Monitoring on page 154 for detailed information about setting reporting parameters Available SSMs Management Groups EBSD Hosts 6 06 07 2005 12 52 58 PM MST Alert from Nightly FT 2 10 0 7 4 RAID Status normal Value changed 5 06 07 2005 12 52 17 PM MST Alert from Slavy 1 10 0 11 123 CPU Fan Speed 0 Value is below 3100 4 06 07 2005 12 52 13 PM MST Alert from Nightly FT 2 10 0 7 4 Device flash 1 Status Active Value changed 3 06 07 2005 12 52 11 PM MST Alert from bmastors 10 0 3
238. h Storage System Modules cccccssssseeeeeeeeeeeeeeeteeees 39 SSM Configuration Window OVErVieW EEE kk ek eke kk Kek kk K KA kK KA kk 39 Cohfiguration Calt egorl S s x is ian dio n na Hiin kn sakal hisi cik Harian nav k nal k da b ka v kan NE kaba RA Sin 40 Logging Ito th SSM Y en eee em ec eee EE Ee ou yy 40 Logging In to Additional SSMS u kk ek k e kek kk K k kk KA 41 Closing the SSM Configuration Window EEd keke ek kk kk kK ka kk 41 Logging Out of the SSM MAhK hGX 444444E kk kk kk kek kk K k KK rk kK KK KA kK KH 41 Closing the SSM Configuration Window without Logging Out 42 Module Configuration Overvi w ciccisccccscidtienccrtacdsncecptunictneasdeumtiatarieceeigeniudantieemsmiaanedeeniadeatacs 42 Changing the SSM Host Name iiE kek keke kk k kk K x kk KK kk kK KK KA 43 Changing PASSWOLd Stas gee Sacer n ne a ad ean n el S VEL Ea n eee seme ta k n ens 43 Locating the Module in a Rack Intel Storage System SSR212MA only 44 Upgrading the Storage System Software EE EEE kk kk K k k KK k kk KH 44 Copying the Upgrade Files from CD or FTP Site h L EEuE keke 45 Intel Storage System Software User Manual iii Contents Upgrading the SSM s e Ek ek kk keka kek Kek kk KK KK kK K kk K k KK KA kK KAHR 45 Backup and Res
239. hard threshold Planning Data Replication Data replication creates redundant copies of a volume You can create up to three copies using 3 way replication Because these copies reside on different SSMs replication levels are tied to the number of available SSMs in a cluster Hot spare SSMs are not available for data storage and therefore not available when calculating replication levels The Storage System Software and the Storage System Console provide flexibility when planning data replication through two features Replication level allows you to choose how many copies of data you want to keep in the cluster e Replication priority allows you to choose whether availability or redundancy is more important in your configuration 222 Intel Storage System Software User Manual Working with Volumes Replication Level Three replication levels are available depending upon the number of available non hot spare SSMs in the cluster The level of replication you choose also affects the Replication Priority you can set Table 35 Setting a Replication Level for a Volume With This Number of Select This Available SSMs in Replication For This Number of Copies Cluster Level One None One copy of data in the cluster No replica is created Two not a recommended None One copy of data in the cluster no configuration for high 2 Way replication availability Two copies of data in the cluster One replica is create
240. hat if an SSM in a cluster becomes unavailable clients using an initiator such as Novell that does not support multiple addresses per target can still access the volume through the other SSMs in the cluster If the initiator you are using does support multiple addresses you may not want to use a virtual IP Note If you are using Microsoft cluster services you must use a Virtual IP to ensure correct operation Requirements for a Virtual IP SSMs must be in same subnet address range as the virtual IP The virtual IP must be routable regardless of which SSM it is assigned to e iSCSI clients must be able to ping the virtual IP e Must be unique to all SSMs on the network e Must be a specific IP reserved for this purpose If you use DHCP you must use a static IP e All iSCSI initiators must be configured to connect to this IP for failover Using an iSNS Server An iSNS server simplifies the discovery of iSCSI targets on multiple clusters on a network You can have up to 3 iSNS servers Intel Storage System Software User Manual 203 Working with Clusters Creating a Cluster Creating a cluster is the first step in designating space for storage in a management group Note Ifyou plan to have two clusters each with one SSM the most reliable configuration is to create two management groups with one SSM in each group 1 Log in to the management group for which you want to create a cluster The management group Tab View op
241. he restoration process is unsuccessful because the new DOM can t be written or verified then the system will remain in a reboot cycle attempting to recover the configuration If the DOM has not recovered after several reboot cycles or exceeded an hour without completing the process then the system cannot recover the original configuration Power down the system if the system is continuously rebooting Intel Storage System Software User Manual 59 Working with Storage System Modules 60 Intel Storage System Software User Manual 3 Storage Storage Overview For each SSM you can select the RAID configuration the RAID rebuild options and monitor the RAID status You can also manage individual disks including powering them on or off and reviewing disk information Storage Requirement You must configure RAID before you can use an SSM for data storage Getting There 1 On the Network View double click the SSM and log in if necessary The Edit SSM Configuration window opens 2 Select the Storage configuration category The Storage category opens shown in Figure 48 ss TCP IP Network k J SSM Administration L 8 SNMP Reporting RAID Setup Disk Setup RAID Status orr r Id Start RAID RAID Configuration Not Configured v Configure RAID The RAID Rebuild Rate is a percentage of RAID card throughput Percent c 10 20 30 XURT TTK TT TT Te 40 50 60 70 80 90 100 _APpy
242. he Console Help Access online help and other information about the Console and Storage System Software File Find Tasks View Help a a Available SSMs Denver 1 Menu Bar Denver 2 Denver 3 Network View Available SSMs_ Management Groups Alert Messages EBSD Hosts lt lt These SSMs are available for use Name IP Denver 2 10 0 33 18 Denver 1 10 0 33 48 Tab View Denver 3 10 0 33 35 Figure 2 Features of the Console Main Window Intel Storage System Software User Manual 17 Getting Started Icons Used in the Storage System Console A description is available of all the icons used in the Console To see them 1 Click Help on the menu bar 2 Select Graphical Legend from the menu The icon display window opens The Graphical Legend has three tabs The Items tab shown in Figure 3 displays the icons used to represent virtual items displayed in the Console For example management groups and clusters are virtual items Graphical Legend States Hardware Big Icons Small Icons Primary Volume Remote Volume Snapshot Cluster Management Group Item is selected Item is reconfiguring or unavailable Item has mouse over it Figure 3 Graphical Legend Items from the Help Menu Intel Storage System Software User Manual Getting Started The States tab shown in Figure 4 displays the icons used to depict s
243. he bond 7 Enter the Subnet mask The default value for the bond subnet mask is the subnet mask of one of the physical interfaces in the bond 8 Optional Enter the default gateway The default value for the bond default gateway is the gateway of the one of the physical interfaces in the bond 9 Click OK A confirmation message opens 10 Click OK to confirm the TCP IP changes A message opens prompting you to search for the bonded SSM on the network 11 Search for the SSM by subnet and mask or by IP address host name A message opens listing the manager IP addresses that must be set on the application servers 12 Click OK 13 Verify the new bond interface The TCP IP tab displays the new list of interfaces as shown in Figure 81 106 Intel Storage System Software User Manual Managing the Network Module Tcpap TCP Status DNS Routing Communication T Storage Time SSM Administration Name Descript _ MAC J Mode IP Subnet Gateway Type gt SNMP Motherboard Portl Intel Co 00 07 Disabled 0 0 0 0 0 0 0 0 0 0 0 0 NIC fa Reporting Slot1 Port1 Intel Co 00 04 2 Disabled 0 0 00 0 0 0 0 0 0 0 0 NIC Slott Port2 Intel Co 00 04 2 Disabled 0 0 0 0 0 0 0 0 0 0 0 0 NIC Slott Port3 Intel Co 00 04 2 Disabled 0 0 0 0 0 0 0 0 0 0 0 0 NIC Slott Intel Co 00 07 Slave 10 0 11 255 255 0 0 0 0 NIC Motherbora P Intel Co 00 07 Sl
244. henever the soft threshold is reached The rate of increase is illustrated belowin Table 37 and Figure 166 Table 37 Progression of Increments in Manual Auto Grow Setting of 50 MB Soft Threshold MB Hard Threshold MB 95 100 145 160 195 210 245 260 995 1010 1024 1 1024 When the hard threshold reaches the volume length the soft threshold is increased to the same value to disable alerts 2 The hard threshold cannot exceed the volume length Manual Auto Grow H El Soft Threshold i i TI TI JI TI m Hard Threshold TI TIL TI TI TI l i i A ll 23 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 Auto Grow Increments Figure 166 Example Manual Auto Grow Chart Intel Storage System Software User Manual 229 Working with Volumes Automatic Auto Grow When auto grow is set for Auto the soft and hard thresholds increase automatically according to a preset algorithm The rate of increase begins small and increases to ever greater increments as illustrated belowin Table 38 and Figure 167 Table 38 Progression of Increments in Automatic Auto Grow Soft Threshold MB Hard Threshold MB 48 644 64 80 72 96 96 128 144 192 192 256 384 512 1024 1024 3 The ratio of the soft threshold to the hard threshold 3 4 in this example is maintained throughout the auto grow process 4 The first automatic auto grow is always to the nea
245. hots Deletes all snapshot schedules that are shared between the selected management groups 5 Click OK The Edit Management Group window opens and the remote management group you disassociated from is gone from the list 6 Click OK to return to the Network view 370 Intel Storage System Software User Manual E Sample Remote Copy Configurations Overview Because of the flexibility provided by Remote Copy you can use the functionality in a variety of configurations that are most suitable for your requirements The sample configurations described in this chapter are only a few possible ways to use Remote Copy for business continuance backup and recovery data migration and data mining Using Remote Copy for Business Continuance Business continuance comprises both disaster recovery and high availability of data Using Remote Copy for business continuance data is stored off site and is continuously available in the event of a site or system failure Achieving High Availability Creating remote snapshots in remote locations with application based scripting can ensure that database applications such as SQL Server Oracle and Exchange have continual access to data volumes if production application servers or data volumes fail Using off site remote snapshots of your production volumes you can configure a backup application server to access those remote snapshots Off site remote snapshots particularly when supplemented with sync
246. hours minutes and seconds estimated to remain in the copy process N A for completed copies or in progress copies not yet calculated Intel Storage System Software User Manual Remote Copy Table 63 Values for Remote Copy Details Window Statistic Values Completion Time MM DD YY HH MM AM PM Date and time copy completed N A for in progress copies Data Data Copied MB GB or TB Amount of data copied so far in smallest unit size Data Remaining MB GB or TB Amount of data remaining to be copied in smallest unit size Current Rate Kb sec Current rate of data being copied in Kb second This rate is recalculated regularly throughout the remote copy process N A If not yet available or completed Avg Rate Kb sec Average rate of copy progress You can leave the Details window open and monitor the progress of the remote copy An example of a Details window with a remote copy in progress is shown in Figure 246 Remote IP Copy Details Source Info Primary Mgmt Group Primary Snapshot Remote Mgmt Group Remote Snapshot Status Manual Scheduled MANUAL State Complete Time Transaction_Data Start Time 6 2 05 5 53 PM Snapshot_0 Elapsed Time 30m 22s TransData_Remote Est Time Remaining 59m 56s Bkup_0602 Completion Time NA Data Data Copied 291 MB COPYING Data Remaining 1 15 GB 37 6 Current Rate 1 445 Kb sec Avg Rate Co 1 308 Kb
247. hown in Figure 201 Intel Storage System Software User Manual 287 Controlling Client Access to Volumes New Volume List New Volume List Name Volume_List_O Description Volumes Authentication Groups Volume Name Permission Level Edit Permission Level Remove Cancel Figure 201 Creating a New Volume List 4 Type a name and description for the volume list The volume list name is case sensitive Adding Volumes to the Volume List 1 Select the Volumes tab shown in Figure 201 2 Click Add to add a volume to the volume list 3 The Add Volume to Volume List window opens shown in Figure 202 Add Volume to Volume List x Add Volume to Volume List Volume _List_0 Volume Name CreditData05 Permission Level O No Access Read Access Read and Write Access Fibre Channel LUN Figure 202 Adding a Volume to a Volume List 4 Select the volume or snapshot to add to the list 5 Select the access permission level for the volume Characteristics of the permission levels are described below inTable 52 288 Intel Storage System Software User Manual Controlling Client Access to Volumes Table 52 Characteristics of Permission Levels Type of Access Allows This No Access Prevents the authentication group from accessing the volume or snapshot Read Access Restricts the authentication group to read o
248. hown in Figure 225 Figure 225 Deleting a NIC Bond 3 Tab to Delete Bond and press Enter A window opens asking you to confirm the changes 4 Press Enter 5 On the Available Network Devices window tab to Back and press Enter Setting the TCP Speed Duplex and Frame Size You can use the Configuration Interface to set the TCP speed duplex and frame size of a network interface e TCP speed and duplex You can change the speed and duplex of a 10 100 1000 interface If you change these settings you must ensure that BOTH sides of the NIC cable are configured in the same manner For example if the SSM is set for Auto Auto the switch must be set the same For more information about TCP speed and duplex settings see Editing the TCP Speed and Duplex on page 111 Frame size The frame size specifies the size of data packets that are transferred over the network The default Ethernet standard frame size is 1500 bytes The maximum allowed frame size is 9000 bytes Increasing the frame size improves data transfer speed by allowing larger packets to be transferred over the network and by decreasing the CPU processing time required to transfer data However increasing the frame size requires that routers switches and other devices on your network support that frame size 312 Intel Storage System Software User Manual Using the Configuration Interface For more information about setting a frame size that corresponds to
249. hronous volume replication within a cluster ensures high availability of critical data volumes Configuration for High Availability To use remote snapshots for high availability configure a backup application server to access remote snapshots in the event of a primary system failure Figure 257 illustrates this simple high availability configuration Configure clustered application servers in both the primary and backup locations During normal operation the production application server read writes to the primary volume Set up a schedule for copying remote snapshots to the backup location If your application server uses multiple volumes that must be in sync use a script to quiesce the application before creating remote snapshots Sample Remote Copy Configurations Configuration Diagram Application Workstations Clustered Application Servers net Corporate LAN Production Application Application Server Primary Volume Remote Snapshot Primary Snapshot Figure 257 High Availability Example Configuration How This Configuration Works for High Availability If the production application server or volumes become unavailable application processing fails over to the backup application server As shown in Figure 258 the remote volume and remote snapshots become primary and the backup application server becomes the production application server accessing data from the acting primary volume Applic
250. ibed Description Card name manufacturer and capable speed of the NIC MAC Address Physical address of the NIC Each card has a unique MAC media access control address Address IP address of the NIC Mask Network mask for NIC Gateway Gateway that the SSM is using Mode Shows manual auto disabled Manual equals a static IP auto equals DHCP disabled means the interface is disabled DNS Data Information about DNS if a DNS server is being used Server 1 Server 2 IP address of the DNS servers Memory Information about RAM memory in the SSM Total Total amount of memory in KB Free Total amount of free memory in KB CPU Information about the CPU Model Name Model name manufacturer and capable speed of the CPU Speed Clock speed of the microprocessor Load Average Information about the average load on the system Machine Uptime The total time the SSM has been running from initial boot up Enclosure Firmware Version Firmware version number for the midplane Drive Temperature The temperature of the drive in centigrade Drive Status Drive Number Information about the drives in the SSM Intel Storage System SSR316MJ2 Drive 1 through 16 Intel Storage System SSR212MA Drive 1 through 12 Indicates a specific drive in the SSM RAID Rebuild Rate Statistics Unit Number Information about RAID RAID Rebuild Rate is a percentage of RAID card through put Information abo
251. ides in the Storage System Module The agent takes SNMP network requests for reading or writing configuration information and translates them into internal system requests Management Information Base MIB files are provided which can enable the system administrator to use their favorite SNMP tool to view or modify configuration information The SNMP Agent supports versions 1 2c and 3 of the protocol Security can be configured based on the host making the request and a password Note To ensure that all items display properly in your SNMP tool use version 2c or later of the protocol Supported MIBs e MIB II e Host Resources MIB e UCD Extensions MIB Exceptions MIB II SNMPv3 MIB system sysServices interfaces interfaces interfaces interfaces interfaces if if if ifl ifl ip ipAddrTable ipAddr ip ipRouteT ip ipRouteT ip ipRouteT ip ipRouteT ip ipRouteT abl abl abl abl ab ip ipForward tcp tcpInErrs tcp tcpOutRsts tcp ipv TcpConnTable Table ifEntry ifLastChange Table ifEntry ifiInNUcastPkts Table ifEntry ifInDiscards Table ifEntry ifInUnknownProtos Table ifEntry ifOutNUcastPkts Entry ipAdEntReasmMaxSize e ipRouteEntry ipRouteMetric2 e ipRouteEntry ipRouteMetric3 e ipRouteEntry ipRouteMetric4 e ipRouteEntry ipRouteAge le ipRouteEntry ipRouteMetricd5 MIB Tree MIB Tree SNMP MIB Information udp ipv6UdpTable MIB Tree egp MIB Tree transmiss
252. idth x Remote Bandwidth 22768 Kb Sec Figure 242 Editing the Remote Bandwidth 3 Change the bandwidth setting as desired For example change the value to 93 KB to use no more than about one half the capacity of a T1 line Note Both bandwidth settings are configured in kilobytes Be careful when configuring this parameter as you may be used to using bits for networking settings Canceling a Remote Snapshot When you cancel a remote snapshot that is in progress the remote snapshot is deleted and the primary snapshot remains To cancel a remote snapshot that is in progress 1 Click the primary or remote snapshot The snapshot tab view opens 2 Click the Remote Snapshot tab 3 Select from the list the remote snapshot you want to cancel 4 Click Cancel Remote Snapshot A confirmation message opens 350 Intel Storage System Software User Manual Remote Copy 5 Click OK Editing a Remote Snapshot You can edit the description of a remote snapshot You can also change the hard and soft thresholds but it is not recommended 1 Log in to the management group that contains the remote snapshot 2 Right click the remote snapshot and select Edit Snapshot from the menu The Edit Snapshot window opens shown in Figure 243 Edit Snapshot Edit Snapshot Snapshot Name Description Created Cluster Replication Level Replication Priority Size Hard Threshold Soft Threshold
253. iencatenrenieistiedaa tae beeaimnna bare rsemnaaseceenenaase 165 Figure 126 Viewing SSMs Before Creating a Management GroUp EEEEEEEEEEUUUUUE 170 Fig re 127 SSM AD acetate cc salin idare ld nani el kanya dad ka a c dakan Hi heka kn aa h k ta an kan k A al y da KE 171 Figure 128 Management Group Information TalD EE Eke k 171 Figure 129 Creating a New Management Group EEE kk kk kk kk Kek kk 172 Figure 130 List of Manager IP Addresses for Management GroUp EEEEEEUUUE 172 Figure 131 New Management Group with One SS V 4 kk kek 173 Figure 132 Starting a ManaQel eccceeeessceeeeeeeeceeeeeseeeeeeeaaeeeeeaeeeeeeeeaaeeeessaaaesseeesaeeseeeeeees 174 Intel Storage System Software User Manual xix List of Figures Figure 133 Figure 134 Figure 135 Figure 136 Figure 137 Figure 138 Figure 139 Figure 140 Figure 141 Figure 142 Figure 143 Figure 144 Figure 145 Figure 146 Figure 147 Figure 148 Figure 149 Figure 150 Figure 151 Figure 152 Figure 153 Figure 154 Figure 155 Figure 156 Figure 157 Figure 158 209 Figure 159 Figure 160 Figure 161 Figure 162 Figure 163 Figure 164 Figure 165 Figure 166 Figure 167 Figure 168 Figure 169 Figure 170 Figure 171 Figure 172 Figure 173 Figure 174 Figure 175 Figure 176 Figure 177 Figure 178 XX Logging in to a Management Group EEEE kek kk kk KK k
254. ies along with replication across geographic distances to create remote snapshots Creating a Remote Snapshot 342 Creating a remote snapshot is the main task in Remote Copy You can create a one time remote snapshot or set up a schedule for recurring remote snapshots Many of the parameters for either case are the same Creating a remote snapshot involves four main steps 1 Log in to the management groups that will contain primary and remote volumes 2 Create a primary snapshot on the primary volume 3 Create a remote volume or select an existing remote volume Intel Storage System Software User Manual Remote Copy 4 Specify the settings for the remote snapshot Getting There 1 Log in to the management group that contains the primary volume for which you are creating the remote snapshot 2 Log in to the management group that will contain the remote volume and remote snapshot You can create remote volumes and snapshots within the same management group In that case you only log in to the one management group 3 Right click the primary volume and select Remote Copy gt New Remote Snapshot The New Remote Snapshot window opens shown in Figure 233 New Remote Snapshot New Remote Snapshot Primary Management Group Transaction_Data Volume Name CreditData Snapshot Name Create Primary Snapshot gt New Snapshot Remote Management Group TransData_Remote x Volume Name New Vol
255. ify where each SSM is located See Changing the SSM Host Name on page 43 e Management Group Name Transaction_Data SSM names Denver 1 Boulder 1 Denver 2 Boulder 2 Create Management Group Plan the Managers and Virtual Manager When you create the management group in the 2 site scenario plan to start two managers per site and add a virtual manager to the management group You then have five managers for fault tolerance See Managers on page 168 Intel Storage System Software User Manual 195 Disaster Recovery Using A Virtual Manager Add SSMs to the Cluster in Alternating Order Warning Create the cluster When adding SSMs to the cluster add them in alternating order as shown in Figure 146 The order in which the SSMs are added to the cluster determines the order in which copies of data are written to the volume Alternating the addition of SSMs by site location ensures that data is written to each site as part of the 2 way replication you configure when you create the volume See Creating a Cluster on page 204 Add SSMs to the cluster in the following order 1 1st SSM Denver 1 2 2nd SSM Boulder 1 3 3rd SSM Denver 2 4 4th SSM Boulder 2 If SSMs are added to the cluster in any order different than alternating order by site you will not have a complete copy of data on each site New Cluster New Cluster General iSCSI Cluster Name Card_Payments Descrip
256. igate to the folder on the Console computer where the configuration backup file is saved 5 Select the file to restore and click Open Backup File 6 Review the version and description to ensure you are restoring the correct file 7 Click Install The Install Status window opens When the restoration is complete the Save to File and Close buttons become enabled To save a log file of the restore operation before rebooting click Save to File Intel Storage System Software User Manual 49 Working with Storage System Modules Boulder 2 10 0 33 18 In Progress extracting upgrade program starting upgrade Save to File Cancel After CurrentSSM Close Figure 41 Restoring the ssm Configuration File 8 Click Close to finish restoring the configuration The SSM reboots and the configuration is restored to the identical configuration as that in the backup file Completing the Restore After you restore the SSM configuration from a file up to three manual configuration steps are required You must manually configure RAID on the SSM You must manually add network routes after the restoration Restoring an SSM configuration file from one SSM to a second SSM does not restore network routes that were configured on the SSM If you restore multiple SSMs from one configuration file you must manually change the IP address on the additional SSMs For example if you back up the configuration of an SSM
257. igure SSMs and create clusters and volumes Table 1 SSM Configuration Tasks Complete This Task Find Detailed Information In Search for one or more SSMs on the network Finding Storage System Modules on the Network on page 20 Log in to the SSMs you want to work with SSM Configuration Window on page 35 Configure individual SSMs SSM Configuration Window on page 35 Create one or more management groups Chapter 9 Working with Management Groups Create one or more clusters Chapter 11 Working with Clusters Create one or more volumes Chapter 12 Working with Volumes Configure access to volumes Chapter 15 Controlling Client Access to Volumes Intel Storage System Software User Manual 15 Getting Started Wizards The first time you open the Console the Wizard Launch Pad opens shown in Figure 1 Wizard Launch Pad xj Welcome to the Wizard Launch Pad The Wizard Launch Pad provides wizards for common tasks to get you started Find SSMs Wizard The Find SSMs Wizard finds SSMs on your network Create Volume Wizard The Create Volume Wizard creates a new volume by walking you through the creation of a management group and cluster Access Volume Wizard The Access Volume Wizard configures your volume for host access by walking you through the creation of a volume list and an authentication group V Show Launch Pad on
258. imary admin name gt lt failure timeout seconds gt Example If Joe Jones was creating his remote snapshot in the same management group the script would look like this java commandline CommandLine jjones trumpet 10 0 111 212 volume_snapshot X Rays PSS2_xrays 500 500 first primary snapshot 30 java commandline CommandLine jjones trumpet 10 0 111 212 volume_remote_snapshot RemVolX_Rays RSS2_xrays second remote snapshot PSS2_xrays 30 Converting a Remote Volume to a Primary Volume and Back to a Remote Volume Convert a remote volume into a primary volume to gain read write access to the most recently completed Remote Copy snapshot However if that remote volume is the target for scheduled remote snapshots those snapshots cannot take place if the remote volume is not present Therefore you use the operation for returning the primary volume back to its remote status to allow the scheduled remote snapshots to continue Make Remote Volume into Primary Volume java commandline CommandLine lt remote admin name gt lt remote admin password gt lt remote manager ip gt volume_make_primary lt remote volume name gt lt soft quota Megabytes gt lt hard quota Megabytes gt lt failure timeout seconds gt 268 Intel Storage System Software User Manual Working with Scripting Make Primary Volume into Remote Volume java commandline CommandLine lt primary admin name gt lt primary admin password gt lt primary
259. ime Simultaneous use of both provides normal bandwidth NICs increases bandwidth Protection during port Yes Yes failure Protection during switch Yes NICs are plugged into No Both NICs are plugged failure separate switches into the same switch Requires support for No Yes 802 3ad link aggregation Allocate a static IP address for the logical bond interface You cannot use DHCP for the bond IP 96 Intel Storage System Software User Manual Managing the Network Physical and Logical Interfaces The NICs in the SSM are labeled Motherboard PortN and SlotN PortN where N is a number depending on whether the NIC is located in the motherboard or in a PCI slot If 2 or 4 physical interfaces are bonded the logical interface is labeled bondN and acts as the master interface As the master interface bondN controls and monitors the two physical slave interfaces Table 13 Physical and Logical Interfaces in a Bond Interface Name Description bond0O Logical Interface acting as master Motherboard Por Physical interface in the motherboard tO This interface acts as a slave Slot1 Port0 Physical interface in a PCI slot This interface acts as a slave How Active Backup Works Bonding NICs for active backup allows you to specify a preferred interface that will be used for data transfer This is the active interface The other interface acts as a backup and its status is Passive Ready
260. ing Cluster Add an SSM to an exiting cluster to expand the storage for that cluster or to designate the SSM as a hot spare Prerequisites e Configure the SSM to match the SSMs already in the cluster See SSM Configuration Window on page 35 for information about what features must be configured Add the SSM to the management group that contains the cluster Note If you mix SSMs with different capacities in a cluster all SSMs in the cluster will operate at a capacity equal to that of the smallest capacity SSM 1 Select an SSM from the SSMs Available list 2 Click Add The SSM moves to the SSMs in Cluster list or Click Add All to move all the SSMs from the SSMs Available list to the SSMs in Cluster list 3 Click OK when you are finished Intel Storage System Software User Manual 211 Working with Clusters Changing the Hot Spare Designation You can add a hot spare or remove a hot spare from a cluster as long as the volumes in that cluster have a replication priority of availability See Planning Data Replication on page 222 for details about volume replication Note 4 hot spare cannot reside in a cluster which contains volumes that have a replication priority of redundancy Adding a Hot Spare To add a hot spare the cluster must contain sufficient SSMs to handle the volumes and snapshots that currently exist in that cluster See Adding an SSM to an Existing Cluster on page 211 if you want to add a
261. ing the List of Manager IP Addresses Update the list of manager IP addresses to ensure that a manager running on this SSM is communicating correctly with all managers in the management group Requirements Each time you update the list of managers you must reconfigure application servers that use the management group to which this SSM belongs Only update the list mode if you have reason to believe that there is a problem with the communication between the other managers in the group and the manager on this SSM 1 Select TCP IP Network from the SSM configuration categories 2 Click the Communication Mode tab to bring it to the front shown in Figure 90 3 Click Update The list is updated with the current SSM in the management group and a list of IPs with every manager s enabled network interfaces A window opens which displays the IP addresses in the management group and a reminder to reconfigure the application servers that are affected by the update Note For more information on unicast see Communication Mode on page 169 122 Intel Storage System Software User Manual 5 Setting the Date and Time The Storage System Module SSM uses the date and time settings to create a time stamp when data is stored You must set the date and time on each SSM e Setting the Time Zone Set the time zone where the SSM is located This time zone controls the time stamp on volumes and snapshots You must set the SSM time zone whether yo
262. ing the SNMP Agent Disable the SNMP Agent if you do not plan to use SNMP applications to monitor your network of SSMs 1 On the Network View double click the SSM and log in if necessary The SSM Configuration window opens 2 Select SNMP from the configuration categories The SNMP General window opens shown in Figure 107 Disabling SNMP 1 On the SNMP General window select Disable SNMP Agent 2 Click Apply Enabling and Disabling SNMP Traps Enable SNMP Traps if you plan to use an SNMP tool to notify you when a monitoring threshold is reached 1 On the Network View double click the SSM and log in if necessary The SSM Configuration window opens 2 Select SNMP from the configuration categories The SNMP General window opens shown in Figure 107 on page 141 3 Select the SNMP Traps tab The SNMP Traps window opens shown in Figure 112 146 Intel Storage System Software User Manual Using SNMP m Module SNMP General SNMP Traps WW Storage L Time az TCP IP Network Jin SSM Administration g9 SNMP L Reporting Trap Community String Trap Recipients IP Host name Figure 112 Enabling SNMP Traps Enabling SNMP Traps 1 Enter the Trap Community String This is required if you want to use SNMP traps Note The Trap Community String is used for client side authentication 2 Click Add in the Trap Recipients area to add specific trap recipients The Tr
263. ion MIB Tree snmp snmpSilentDrops snmp snmpProxyDrops rmon MIB Tree application MIB Tree mta MIB Tree ipv6MIB MIB Tree schedMIB MIB Tree scriptMIB MIB Tree agentxMIB MIB Tree ifInvertedStackMIB MIB Tree Host Resources MIB host host host host host host hrSWInstalled MIB Tree host hrDevice hrDevic hrDevice hrDeviceTable hrDeviceEntry hr Devicel hrDevice hrProcessorTable hr Processor hrDevice hrPrinterTable MIB Tree hrSWRun hrSwoSIndex hrMIBAdminInfo UCD Extensions MIB MIB Tree ucdavis processes MIB Tree ucdavis prTable MIB Tree ucdavis extensible MIB Tree ucdavis memory memTotalSwapTXT ucdavis memory memAvailSwapTXT ucdavis memory memTotalRealTXT ucdavis ucdavis disk MIB Tree ucdavis loadaves MIB memory memAvailRealTXT Tree ucdavis extTable MIB Tree ucdavis dskTable MIB Tree ucdavis systemStats ucdavis systemStats ucdavis systemStats ucdavis systemStats ucdavis systemStats ucdavis systemStats ucdavis systemStats ssCpuRawWait ssCpuRawKernel ssCpuRawInterrupt ssIORawSent ssTlORawReceived ssRawInterrupts ssRawContexts ucdavis ucdExperimental MIB Tree ucdavis fileTable MIB Tree 316 Intel Storage System Software User Manual Table hrDeviceEntry hr DeviceStatus Errors Entry hr ProcessorLoad SNMPv3 MIB snmpModules snmpModules snmpModules snmpMo
264. ion the upgrade process is complete 8 Click Close when the installation is completed 46 Intel Storage System Software User Manual Working with Storage System Modules Backup and Restore of SSM Configuration Note Backup and restore provides the capability to save the SSM configuration file for use in case of an SSM failure When you back up an SSM configuration all of the configuration information about the SSM is stored in a file on the computer where the Console is installed If an SSM failure occurs you can restore the configuration file to a new SSM The new SSM will be configured identically to the SSM when it was backed up Backing up the configuration file for an SSM does not save information about the configuration of any management groups clusters volume lists or authentication groups that the SSM belongs to It also does not back up license key entries for registered features To preserve a record of management group configuration information and license keys see Backing Up a Management Group Configuration on page 185 Back up the SSM configuration every time you change SSM settings This ensures that you can restore an SSM to its most recent configuration Backing Up Multiple SSMs with the Same Configuration Note If you have multiple SSMs with the same configuration you can create a single configuration backup file and use it to restore the configuration on any of these SSMs Any SSM that you restore fro
265. ion Site 366 Setting Up a New Production Site ELE eee aaresege dod needs eee 366 Making the Backup Site into the New Production Site E 367 Rolling Back Primary and Remote Volumes ccccccseeeeeneeeeeeeeeeeeeeeeeeeeneeeeeeeeeeeeeeeeeees 367 Rolling Back a Primary Volume i kk kk kk kk KAK KA kk KA KAK AR 367 Rolling Back a Remote Volume lllllli kk kk keka kak kk Kak kk kk KK A 369 Using Remote Snapshots for Data Migration and Data Minind 369 Creating a Split Mirror LL EEE kk kk kk K k ek kK kk kk KK rk kK 369 Disassociate Remote Management Groups kEE kk kk kk ke 369 Appendix E Sample Remote Copy Configurations csseesecesssseeeeeeeeeeeeees 371 CVI sheesh ceca nace tga dene ede sect e E s AEAEE chase a E A E E E E E Ai 371 Using Remote Copy for Business Continuance uuEE Ek kk k kk ek 371 Achieving High Availability Euu kk kk kk KK KAK KK K KK KIRA 371 Configuration for High Availability kk kk kk kk k 371 How This Configuration Works for High Availability UEUEEEUUEUEUUE UEU 372 xiv Intel Storage System Software User Manual Contents Bane S N eeeeoe nDeDEeERMRrRr r reraeareae Nii a a a T aN aS iSi 374 Achieving Affordable Disaster Recovery ccceeesseeecceeeeeeeeeeeee
266. ion Site 2 Figure 261 Affordable Disaster Recovery Example Configuration How this Works for Affordable Disaster Recovery If the SSMs in your primary location fail or volumes become unavailable the off site location contains the most recent remote snapshots Use the remote snapshots to resume operations as shown in Figure 262 If you created tape backups you can recover data from tape backups as shown in Figure 263 Only data written to the primary volumes since the last remote snapshot was created will be unavailable Application servers that were accessing the down volumes will not be available until you reconfigure them to access recovered data To resume operations using the most recent set of remote snapshots 1 In the backup location make the remote volume into a primary volume 2 Configure application servers to access this volume or if network connections are not fast enough to facilitate reading and writing to the off site location copy this volume to a location where application servers can access it more efficiently 376 Intel Storage System Software User Manual Sample Remote Copy Configurations Application Workstations Application Servers Storage Subnet Application Read Only sus Remote Production Application Read wWrite i Volume gt Snapshot Backup Site Workstations E Application Servers Storage Subnet Best Practices Select a recurrence schedule fo
267. ions LJ Design 5 licati Team 1 FRE alp 2 Application CAD Serer ener or Servers for Current Next Generation Product Product Read Write Read Only Primary Pt Remote Volume Volume Storage Snapshot Production Site 1 Production Site 2 Figure 268 Data Migration Example Configuration How This Configuration Works for Data Migration Suppose you want to create a complete copy of a volume for an application to use in different location 1 Configure a cluster of SSMs in the new location to contain the copied volume 2 Create either a one time remote snapshot of the volume onto the cluster in the new location Intel Storage System Software User Manual 385 Sample Remote Copy Configurations If your application server uses multiple volumes that must be in sync use a script to quiesce the application before creating remote snapshots Optional You can create regular one time snapshots and use remote copy to move the snapshots to the remote cluster at your convenience 3 On the cluster in the new location make the remote volume into a primary volume 4 Configure the application server in the new location to access the new primary volume Figure 269 shows migration of data by making a remote volume into a primary volume Application Workstations d T a esign lt 4 Design Team 2 eam Application CAD Sena eam 2 CAD Serer for Servers Next Generation for Current Product P
268. ipt scheduled snapshots or remote copying 2 Delete any scripts Snapshots with hard and soft Delete any primary or remote snapshots created by the scripts You can identify these snapshots thresholds different than volume size SD j by viewing the item Created By Script on the Remote copy volumes and snapshots snapshot Details tab Automatic threshold increases e Scheduled snapshots w Note Turning off the scripting evaluation ensures that no scripts will continue to run the 30 day evaluation clock unintentionally Registering Features and Applications When registering SSMs for add on features and applications you first submit the appropriate SSM serial number s to purchase the license key s You will then receive the license key s to apply to the SSM s Using License Keys License keys are assigned to individual SSMs License keys can be added to SSMs before or after they are in a management group One license key is issued per SSM and that key licenses all the features requested for that SSM Therefore you register each SSM for which you want to use add on features and applications For example if you wanted to configure multiple node clusters in two locations to use with you would license the SSMs in both the primary location and the remote location for both the Scalability Pak and the Remote Data Protection Pak Note Ifyou remove the SSM from the management group the license key remains with th
269. irtual IP Acluster of multiple SSMs requires a virtual IP to configure failover for iSCSI initiators that do not support multiple IP addresses per target K do not want to use a virtual IP address for this cluster Available SSMs Host Name IP Address Version ee In To continue click Next 34 Enter the Volume Name Description Size and Replication Level for your storage system Click on Finish to continue Create Volume Wizard Create Volume Name your volume and choose a size appropriate for its intended use Volume Name My_storage This name cannot be changed after the volume is created Description My Personal Storagel Size 100 0 Me rv vex Replication Level None b Replication Priority To create the volume click Finish 35 Select the IP address for the SSM and click on OK if asked for the Manager IP address Intel Storage System Software User Manual 13 Getting Started 36 A summary screen displays showing you that the volume has been successfully created Click on Close to continue Create Volume Wizard Create Volume Summary The new volume has been successfully created You have just completed the Create Volume Wizard Please review the volume details below Management Group Group_0 Cluster Cluster_0 Volume Name My_storage Description My Personal Storage Siz
270. isks on page 86 1 Add the new disks to the SSM Warning Adding a disk to the RAID deletes any existing data on that disk You must add disks in contiguous disk bays from left to right and for the Intel Storage System SSR212MA from top to bottom as shown in Figure 67 and Figure 68 2 Using the Storage System Console log in to the SSM 3 Select the Storage configuration category 4 Click the Disk Setup tab to bring it to the front The new disks will show a red X and be listed as Off 5 Select the new disks and click Power On Disk The disk status of the new disks becomes Uninitialized 6 Select the new disks and click Add Disk to RAID Shift click to select multiple disks to add to RAID pairs of disks to RAID 1 10 or Intel Storage System Software User Manual Storage sets of 4 or 8 disks to RAID 5 50 Intel Storage System SSR316MJ2 or sets of 6 disks Intel Storage System SSR212MA RAID begins to rebuild on the new disks according to the RAID Rebuild rate configured on the RAID Setup tab As soon as the RAID Status shows Normal the disks provide fully operational data redundancy with the mirror in place The SSM is ready for data transfer at this point The newly added disks display on the RAID Setup tab Powering Drives On or Off Powering drives on and off is part of removing and replacing disks in the SSM A bad drive should be powered off from the Console before you remove it fro
271. ist Initiator Node Name ign 1991 05 com microsoft kwegner wxp iSCSI EBSD Fibre Channel Z Allow access via iSCSI To rename the initiator node click Change Authentication To authenticate targets using CHAP click Secret to specify a CHAP secret Secret CHAP not required To configure IPSec Tunnel Mode addresses click Tunnel Tunnel Initiator Node Name iqn 1991 05 com microsoft l kwegner wxg CHAP required Figure 185 Open the MS iSCSI initiator and Copy the Initiator Node Name to the Initiator Node Name Field Figure 186 illustrates the configuration for a single host authentication with 1 way CHAP required 274 Intel Storage System Software User Manual Controlling Client Access to Volumes General IPSec New Authentication Group 7 Connect by using Name AuthGroup_0 Local adapter Default Description Source IP Default TT escripti Target Portal Default Volume List No Volume List iSCSI EBSD Fibre Channel M ERC Checksum T Data digest I Header digest vj Allow access via iSCSI Authentication r V CHAP logon information CHAP helps ensure data security by providing authentication between CHAP not required a target and an initiator trying to establish a connection To use it specify the same target CHAP secret that was configured on the target for this initiator User name iqn 1991 05 com microsoft
272. ist select the log that you want to direct to a remote computer The Log Type list only contains logs that support syslog 5 In the Destination field type the IP address or host name of the computer that will receive the logs 6 Click OK The remote log displays in the Remote logs list on the Log Files tab Configuring the Remote Log Target Computer Configure syslog on the remote log target computer Refer to the syslog product documentation for information about configuring syslog Note The string in parentheses next to the remote log name on the Log Files tab includes the facility and level information that you will configure in syslog For example in the log file name Intel Storage System Software User Manual 153 Reporting auth error auth warning the facility is auth and the level is warning Editing Remote Log Targets You can select a different log file or change the target computer for a remote log 1 On the Log Files tab select the log in the Remote logs list 2 Click Edit The Edit Remote Log Target window opens 3 Change the log type or destination 4 Click OK Deleting Remote Logs To delete a remote log 1 On the Log Files tab select the log in the Remote logs list 2 Click Delete A confirmation message opens 3 Click OK Note After deleting a remote log file from the SSM remove references to this log file from the syslog configuration on the target computer Using Acti
273. ist of Figures Creating a Snapshot Schedule iE Ek kk kek kek KH 254 List of Scheduled SnapshOtS EEEE EEE kk kek kek kk KK kk KA 255 Editing a Snapshot Schedule EiE EE kk kk kk ke kk K k kk 256 Rolling Back a VOlU kc kl lll da kaka kk k le Akla ened bakla k an Alak kek ka kak dek HK 258 Verifying the Volume Roll Back kk kk kk KAK KAK kK KA 259 Creating a New Authentication Group for iSCSI AccesSs _ EEEEEEEEEEEEUU 272 Open the MS iSCSI initiator and Copy the Initiator Node Name to the Initiator Node eT errr ere eee ee en ee T 274 Configuring iSCSI shown in the MS iSCSI initiator for a Single Host with CHAP Adding an Initiator Secret for 2 way CHAP Shown in the MS iSCSI Initiator 275 Creating a New Authentication Group for EBSD ACCESS EEEEE EE 276 Creating a New Authentication Group for Fibre Channel Access 277 Example Configuration for Assigning LUN Numbers E 278 LUN Numbering Configuration that is NOT Allowed 278 LUN Numbering Configuration with one LUN Shared Among Three Hosts 279 Creating a New Authentication GIOUD E LuE EEE kk kk k 280 Creating iSCSI Access in New Authentication GroUp E EE EEEEEEEEEEEUUUUE EEEE 281 Configuring EBSD for New Authentication GroUD
274. ith snapshots set the hard threshold size less than the volume size Next set the soft threshold less than the hard threshold Intel Storage System Software User Manual 221 Working with Volumes Planning Snapshots Snapshots take up space on the cluster Planning how much space and planning the use and scheduling of snapshots impacts the hard threshold you should set for the volume Note Volume size volume thresholds and using snapshots should be planned in conjunction If you intend to use snapshots review Chapter 13 Working with Snapshots Planning Soft Thresholds Soft thresholds trigger alerts to system administrators to help ensure that hard thresholds are not exceeded Upon receiving an alert the system administrator can take steps to increase capacity according to planned capacity management See Managing Volume Growth Capacity on page 226 for strategies to manage volume growth Best Practice If Not Using Snapshots If the hard threshold is equal to the volume size set the soft threshold equal to the volume size as well Use application level monitoring to manage capacity growth Best Practice If Using Snapshots If the hard threshold is less than the volume size set the soft threshold to a percentage of the hard threshold When a soft threshold alert is received e Provision more storage for the cluster if required e Increase the hard threshold e Re adjust the soft threshold to be a percentage of the new
275. kK ke 215 How Repair SSM Works J J keke keka ek k kek k rk KK r KK KHK KAK KA KHK KK RA 215 Deleting a Cluster eee meres ee EEE ee ee ee kK AKA kK ka kk kK kr kk 218 Selecting a Cluster from the List EEE EEE kk kk kK kk K k kk 218 Chapter 12 Working with Volumes cccccsssseeeeeeeeeseeeeeeeeeeeeeeseeeeeeeeeeenseeeeeneeees 219 Planning VO lU 65 4s su at HEN YR abe e Ke DN y ke be eee E a ee eaten 219 Planning Volume Type h d kk kk kk kk kK KK A KAK A A KAKA KAK kk AK KK A nnna 220 Planning Volume SIZ ss als denke ninin kelisanizk a binan tases biklan an b L N sav s beda kalan G nay b na kan 220 Measuring Disk Capacity and Volume Size E kk kk ek k 220 Planning Hard Thresholds yc i xu nul kulak kalik n d ka ni hin SE k k k AR kr k nan W K L dka a E HE kE HAV N 221 Planning Snapshots EEEE Eke kk kk k eee eee ee KK A ke 222 Planning Soft Thresholds uEuE cen sbamecenaadecedesadedecnceevsd cananzacedd teansseneiyeteianes 222 Planning Data Replication uEE EEE kk kk ete kk kk KA KAK A AR 222 Requirements for VOlUmes u E Ek kk kk kk KK kK AK KAK KA KA KAK AK KA KA KIRA 225 Managing Volume Growth Capacity E kk kk kk ek kk K ek Weta kk K k ke 226 Creating the Volume and Setting Thresholds uE EE 226 MUSIC PANO NOW oie HHHH HHHHHJEERIZN 227 How eet ORs 110 i Ca
276. king with Scripting How Auto Grow Works Auto grow is triggered when a soft threshold is reached Auto grow then raises both the soft and hard thresholds by either a calculated increment Auto or by an increment you choose Manual The thresholds will only increase When there is sufficient room in the cluster to accommodate the increases or To the point where the hard threshold equals the volume length at which point the soft threshold also is increased to equal the volume length so that alerts are not triggered Intel Storage System Software User Manual 227 Working with Volumes whichever of these conditions occur first Best Practice The goal when using auto grow is to grow smoothly and just in time growing as little as possible when you can get away with it and limiting the total number of auto grow events to a reasonable number Also you want the volume to grow before the client s hit the hard threshold which would cause the client s to stall for a few seconds Setting Auto Grow for Manual Use manual auto grow to select the amount by which you want the hard and soft thresholds to increase Both thresholds will increase by the same amount at the same time The increment must be at least 1 of the volume length or 1 MB whichever is greater Setting Auto Grow for Automatic The auto setting for auto grow begins with small increments which gradually increase in size After a maximum of ten auto grow events
277. ks menu on the Details tab click Delete Snapshot A confirmation message opens 5 Click OK Warning Deleting a snapshot causes that snapshot data to be unavailable from the SSM Intel Storage System Software User Manual 259 Working with Snapshots Selecting a Snapshot from the List Select a snapshot from the list and click OK Selecting a Snapshot Schedule from the List Select a snapshot schedule from the list and click OK 260 Intel Storage System Software User Manual 14 Working with Scripting The Storage System Software provides application based scripting for taking snapshots Using application based scripts allows automatic snapshots of a volume and automatic increases in the volume thresholds Scripting also provides access to Remote Copy the ability to maintain multiple copies of data across multiple facilities See Chapter 13 Working with Snapshots for detailed information about snapshot requirements Information about Remote Copy can be found in the Remote IP Copy User Manual The tasks supported by scripting includes Taking a snapshot of the volume Mounting the snapshot Optional Unmounting or deleting the snapshot e Increasing volume thresholds Two tools named commandline CommandLine and ebsdvm may be provided by your vendor to access the Console functionality Tools for Scripting Two software tools are available to use in scripts The first one java commandline CommandLine is us
278. l numbering For example if the snapshot name is Backup the list of scheduled snapshots will be named Backup1 Backup2 Backup3 5 Optional Enter a snapshot description 6 Optional Change the hard and soft thresholds for the snapshots Note Setting the hard threshold smaller than the size of the original volume allows you to create snapshots that require less space on the cluster See Managing Capacity Using Volume and Snapshot Thresholds on page 243 7 Enter a start date and time The date and time must be valid but they can occur in the past 8 Select a recurrence schedule The recurrence schedule can be in minutes hours days or weeks 9 Set a retention schedule The retention schedule can be for specified number of snapshots or for a designated period of time 10 Click OK The New Snapshot Schedule window closes and the new snapshot schedule appears on the tab shown in Figure 180 254 Intel Storage System Software User Manual Remote Snapshot Schedules Target Information Volume List Memberships Working with Snapshots Details Snapshots Snapshot Schedules Hosts Remote Snapshot Snapshot Sched Hard Threshold Soft Threshold Start At Recur Every Errors Retain 1GB 2GB Snap_Sch_O Weekly_SS 2GB 04 30 2005 11 0 1 Days 05 01 2005 06 0 1 Weeks 5 Max 3 Max Figure 180 List of Scheduled Snapshots Editing Snapsh
279. le 60 338 Table 61 Table 62 Table 63 Table 64 Table 65 xxiv Requirements for Changing Volume Parameters cccccceecceeeeeeteeeeeeeneeeeeeeeeeees 235 Snapshot Par am tef Seinere ne bizi al k kan k ME ane ia bilan s kn xa babe b n Ek RADA 242 Space used by Snapshots when Hard Threshold is set to the Original Volume Size Space used by Snapshots when Hard Threshold is Reduced 244 Data Requirements for Editing a Snapshot E ke 251 Requirements for Scheduling SnapShots cecccceeeeeeeeeeeeeneeeeeeeeneeeeseeeeeeeeeeseeees 253 Requirements for Rolling Back a Volume ii kk KH 257 Setting the Environment for Using Scripting Tools EE 261 Parameters for commandline COMMANALING ccceeeeeeeeeeneeeeeeeeeeeeeseeeeeeeees 262 Parameters for DSOQVITL 4 Li kk kk EKA K EKA KK KK KAKA KAKA KAKA KAKA KAWA 264 Configuring ISCSI CHAP EdE kk kk kk k kk Kek kk kk K KA kK KK KK kk K 274 Entering CHAP Information in a New Authentication Group 281 Choosing the Level of Access for Hosts using the EBSD Driver 283 Characteristics of Permission LevelS EiE Ek kk kk 289 Safely Backing out of Scalability Pak Evaluation nEE 298 Safely Backing out of Configurable Snapshot Pak Evaluation 299 Safely Backing Out
280. le Information Backup amp Restore E Storage Time gs TCP IP Network an SSM Administration r NMP in A Configuration Tabs Host Name pomer IP Address 10 0 7 11 Model SSR316MJ2 Configuration SerialNumber 00 07 E9 3F D2 1C Categ orles Software Version 6 3 25 0001 0 Install Software Change Password Figure 25 SSM Configuration Window The left pane of the configuration window lists the SSM configuration categories Within each category is a set of tabs used to configure different functions Module Upgrade the Storage System Software change the password or host name perform backup and restore of the SSM configuration reboot or shut down the SSM and manage boot devices See Chapter 2 Working with Storage System Modules on page 39 Storage Manage RAID and manage individual drives including powering them on or off and reviewing drive information See Chapter 3 Storage on page 61 Time Use NTP or manually set the time zone date and time for the SSM See Chapter 5 Setting the Date and Time on page 123 Intel Storage System Software User Manual 35 Getting Started TCP IP Network Specify the TCP IP settings of the SSM manage DNS information manage the routing table and update the communication mode information if the SSM is running a manager See Chapter 4 Managing the Network on page 89 SSM Administration Ad
281. lect the Storage configuration category 2 Click the RAID Setup tab 3 Set the slider for the desired rebuild rate 4 Click Apply The settings are then ready when and if RAID rebuild takes place Starting RAID 76 If RAID has been configured on the SSM and RAID is off it must be started before other RAID tasks can be started Normally once you start RAID you will not have to restart it However in some cases replacing disks requires that you start RAID Example In an SSM two disks were removed and replaced with two new disks However the disks that were removed caused the RAID quorum to break See RAID Quorum on page 77 To prevent losing quorum you replace one of the original disks Then RAID is started Finally the replacement disk is added to RAID Intel Storage System Software User Manual Storage To Start RAID 1 Select the Storage configuration category 2 Click the RAID Setup tab 3 Click Start RAID A confirmation message opens 4 Click OK RAID starts RAID Quorum RAID quorum must be maintained for RAID 1 10 or RAID 5 50 to operate and for data to be preserved Quorum for RAID 1 or RAID 10 For RAID 1 10 quorum requires that at least one disk pair in the SSM and one disk in each remaining pair be intact This means that an SSM configured for RAID 10 can tolerate the loss of 1 disk in an SSM 150 or the loss of 3 disks in an SSM 200 An SSM configured in RAID 1 contains only one pair o
282. lication Level Replication Priority Size Hard Threshold Soft Threshold Auto Grow Checksum Data Remote volume w Off Auto Manual O Yes No enabled editable T elds Replication Priority Size Hard Threshold Soft Threshold Auto Grow Checksum Data Selecting Primary changes the volume to a primary volume with all fields greyed out Figure 253 Making a Remote Volume into a Primary Volume 4 Click OK The Edit Volume window displays the editable fields enabled You can edit everything but the name and created date and time 5 Make any required changes i e to the size and hard and soft thresholds Intel Storage System Software User Manual 363 Remote Copy 6 Click OK The volume becomes a primary volume Configuring Failover Configuring Remote Copy for failover provides for business continuance and high avail ability When configuring failover you take into consideration both the failover path and the recovery from failover Planning Failover To achieve failover you plan the following parameters The location and structure of management groups and clusters Configuration of primary and remote volumes and snapshots and scheduling snapshots Configuration of application servers and backup application servers Task flow for failover recovery resuming production after failover Using Scripting for Failover Application based scripting provides
283. lly start The Share Optional on page 319 for autorun window opens asking you to information about the tar gz files verify that you want to run Autorun 2 Run the script install sh located in opt The autorun window may be behind Storage_System_Software 6 x Drivers the CD folder directory which also EBSD opens 3 Click Yes to have the automatic install process run The automatic installation starts and steps you through the install process 4 On the Choose Product Component window select EBSD Driver 5 Click Next The Choose Install Folder window opens 6 Choose to accept the default directory opt Storage_System Storage_System_Software 6 x Drivers EBSD 7 Review the Pre installation Summary window and click Install 8 Click Done on the Congratulations window NOTE See Configuring the EBSD Driver for Linux on page 325 for information about configuring the EBSD driver Location of the Installed Driver Files The installation installs the EBSD driver into the following locations e usr local sbin for ebsdvm e opt Storage System Storage System Software 6 x Drivers EBSD uname r etc for ebsd conf sample e etc init d for ebsd Script also installs run level links in etc rc d Upgrading the EBSD Driver Using the CD or Driver Bundles 1 Stop all operations to ebsd devices i e unmount ebsddisk 2 Install driver from Installation CD or the driver bundle 3 Run etc i
284. lover causes remote volume to ActPrimaryVol_0 active in Remote become the acting primary volume Management Group 2 00 p m Original primary volume comes back online OrigPrimaryVol_0 online Original volume contains data from 1 00 to 1 30 p m Acting primary volume contains data from 1 33 to 2 00 p m Returning Operations to Original Primary Site Once the original primary site is operational again restore operations to that site The steps to restore operations depend upon the state of the original primary volume Ifthe primary volume is working synchronize the data between the acting primary volume and the restored primary volume before returning the acting primary volume to its remote volume state Ifthe primary volume is not available create a new primary volume synchronize the data with the acting primary volume and then return the acting primary volume to a remote volume Synchronizing the Data Between the Acting Primary Volume and the Original Primary Volume 1 Create Snapshots of Data First you create snapshots that contain the data that you need to synchronize The steps to create those snapshots are described Table 64 Table 64 Steps to Create Snapshots Volumes and Volumes and Snapshots on Snapshots on 7 Action Activity Primary Remote pile Soda Management Management p Group Group 1 Stop applications that are accessing the volumes Intel Storage System Software User Manual 36
285. ly Storage volumes can also be configured for Fibre Channel access Use the Fibre Channel tab in the New Authentication Group window as shown in Figure 189 New Authentication Group New Authentication Group Name AuthGroup_0 Description Volume List No Volume List iscsi EBSD Fibre Channel ra allow access via Fibre Channel Authenticate hosts with the following WWPNS Name Optional pea Figure 189 Creating a New Authentication Group for Fibre Channel Access Planning Volumes and Fibre Channel First you configure authentication groups for Fibre Channel Then when you add the volume to a volume list you assign a LUN number for that volume Assigning LUN Numbers to Volumes Some requirements for authentication group access and LUN numbers include the following LUN numbers must be assigned to volumes when the volumes are added to a volume list LUN numbers are required before the hosts can access the volumes LUN numbers must be unique per authentication group For example one authentication group can only access one LUN 0 If you plan to have one host accessing two volumes with the same authentication group each volume must be assigned a different LUN number Intel Storage System Software User Manual 277 Controlling Client Access to Volumes Best Practice Hosts with Separately Numbered LUNs Figure 190 shows a typical b
286. ly one that is not already running a manager However if necessary you can start a virtual manager on an SSM that is already running a manager Figure 149 shows a management group with a down manager 1 Click the SSM on which you want to start the virtual manager 2 From the Tasks menu on either the Details tab or the Management Group Information tab select Start Virtual Manager shown in Figure 149 File Find Tasks View Help a a Available SSMs Transaction_Data Boulder 4 Denver 1 Boulder 1 Denver 2 F Boulder 2 Add to New or Current Management Group Remove from Management Group Start Manager Stop Manager Stop Virtual Manager Repair SSM Swap in Hot Spare onfiguration None je Mode block rare Version 6 0 12 0001 0 Edit Configuration Copy Configuration Log Out Figure 149 Starting a Virtual Manager The virtual manager starts on that SSM and the black triangle the graphic indicator of the virtual manager appears under the SSM shown in Figure 150 See Icons Used in the Storage System Console on page 18 for a key to all the graphic indicators a Transaction_Data a a Card_Payments Virtual manager EEEE EEE indicator ee anari Boulder 1 B Figure 150 Indicator of the Virtual Manager Note Ifyou attempt to start a virtual manager on an SSM that appears to be up in the Console and you receive a message that the SSM is down start the virt
287. m SSR212MA 82 Figure 66 Diagram of the Drive Bays in the Intel Storage System SSR212MA 82 Figure 67 Diagram of the Drive Bays in the Intel Storage System SSR212MA 85 Figure 68 Diagram of the Drive Bays in the Intel Storage System SSR316MJ2 85 Figure 69 Viewing the Network Configuration ccccccceeceeseeeeeeeeeeeeeeeeeeeeeeseaaeeeseeeeeeeeenneeees 89 Figure 70 Network Interface Ports and Open PCI Slots on the Back of the Intel Storage System Sele 8 ene ee ee ee eee ee ee ee 91 Figure 71 Network interface Ports and Open PCI Slot on the Back of the Intel Storage System IE eee a ee cetera E 92 Figure 72 Distributing Bandwidth and Ensuring Fault Tolerance of Add on Ports Across PCI SIOS anea E rrr rv ee 93 Figure 73 Viewing the WWN of a Fibre Channel POrtl EE keke 94 Figure 74 Configuring the IP Address Manually EE kk ke 94 Figure 75 Active Backup in a Two switch Topology with Server Failover 100 Figure 76 Active Backup Failover in a Four Switch Topology ceeeeeeeseeeeeeeeeeeeeeeeeeeeeeeees 101 Figure 77 NIC Aggregation in a Partial mesh Topology with Server Failover 103 Figure 78 NIC Aggregation in a Single switch Topology E 104 Figure 79 Selecting Motherboard PortO and Slot1 PortO for a New Bond 105
288. m the backup file will have exactly the same configuration If you back up the configuration of an SSM that has a static IP address and then restore that configuration to a second SSM the second SSM will have the same IP address You must manually change the IP address on the second SSM 1 Log in to the SSM 2 Click the Backup and Restore tab The Backup and Restore window opens shown in Figure 38 Power Off Feature Registration Boot Devices Module Information ji Backup amp Restore J l Storage H Time ru TCP IP Network j l SSM Administration H g SNMP E Reporting Back up the SSM configuration files to this machine Restore the backup configuration to the SSM if required Back Up Restore loson Figure 38 Viewing the Backup and Restore Window Intel Storage System Software User Manual 47 Working with Storage System Modules Backing Up the SSM Configuration File Use Backup to save the SSM configuration file to a directory on your local machine 1 Click Backup The Save window opens shown in Figure 39 Save In an Storage System x cma f oma EB E File Name SSM_Configuration_Backup Files of Type All Files Figure 39 Backing up the SSM Configuration File 2 Navigate to a folder on the Console computer to contain the SSM configuration backup file 3 Accept the default name SSM_Configuration Backup or enter a new
289. m the module Then after the replacement disk is inserted in the drive bay it must be powered on Warning Any time you must remove a disk you should power it off from the Console before you physically remove it from the SSM unless the SSM itself is powered off Powering Drives Off 1 2 3 Select the Storage configuration category Click the Disk Setup tab Select the disk in the list to power off If the disk is on all the columns are filled in Click Power Off Disk A confirmation message opens Click OK Powering Drives On When a new disk is inserted into an SSM that is on the disk must be powered on Select the disk in the list to power on If the disk is not powered on it is listed as Off or Missing in the Status column and the other columns display dotted lines like this Click Power On Disk A confirmation message opens Click OK Intel Storage System Software User Manual 87 Storage 88 Intel Storage System Software User Manual 4 Managing the Network Managing the Network Overview The SSM has two integrated TCP IP network interfaces In addition the Intel Storage System SSR316MJ2 can include three add on cards each with 2 or 4 interfaces The Intel Storage System SSR212MA can include one add on card with 2 or 4 interfaces For each SSM you can e Configure the SSM s TCP IP interfaces Set up and manage a DNS server e Manage the routing table
290. manager ip gt volume_make_remote lt primary volume name gt lt snapshot name gt lt snapshot description gt lt failure timeout seconds gt Example Joe has scripted an operation to make his remote volume into a primary volume once a week so that he can access the data from the most recently completed scheduled snapshot Since he is running scheduled remote snapshots to that volume he then needs to convert that primary volume back into a remote volume so that the remote snapshot schedule is maintained java commandline CommandLine jjones saxophone 10 10 45 72 volume_make_primary RemVolX_Rays 512000 512000 30 java commandline CommandLine jjones trumpet 10 3 11 19 volume_make_remote RemVolX_Rays snapshot_convert snapshot from making vol remote 30 Scripting Failover Scripting failover uses a java commandline CommandLine script along with the ebsdvmn script for mounting a snapshot Make Remote Volume into Primary Volume java commandline CommandLine lt remote admin name gt lt remote admin password gt lt remote manager ip gt volume_make_primary lt remote volume name gt lt soft quota Megabytes gt lt hard quota Megabytes gt lt failure timeout seconds gt Mount New Primary Volume ebsdvm lt remote mgmt group name gt lt remote volume name gt lt auth group name gt lt local ip gt lt number of managers gt lt each managers s ip gt lt lock_mode gt Example Joe s script for failing over
291. ment group changes disconnects and or reconnects For detailed information about configuring Active Monitoring see Using Active Monitoring on page 154 Monitoring Remote Snapshot Details from the Console Tab View View information about each remote snapshot in both the Remote Snapshot tab and in the Remote Copy Details panel Viewing Information in the Remote Snapshot Tab The Remote Snapshot tab displays a list of remote snapshots connected with a selected item in the Network view For example if you select a management group the Remote Snapshot tab displays the list of remote snapshots associated with that management group You can view lists of remote snapshots by management group cluster volume and snapshot levels 1 Select the appropriate item in the Network view 2 Click the Remote Snapshot tab to bring it to the front shown in Figure 244 352 Intel Storage System Software User Manual Remote Copy Details Managers Clusters Authentication Groups Volume Lists Register Times Remote Snapshot Primary Man Primary Sna Remote Man JRemote Sna J Complete Elapsed Time Data Copied Rate State Transaction CredDataRS1 TransData_ MayO5RemSs 100 3m 14s 61 5 MB 2 596 Kbisec COMPLETE j Transaction PriSS_0601 TransData_ Bkup0601 38 3 495 60 5 MB 10 114 Kbisec COPYING Figure 244 Remote Snapshot Details in the Remote Snapshot Tab The remote snapsh
292. mes Once removed that data cannot be retrieved Note Be sure to disconnect the device before deleting it 1 Modify the etc ebsd conf file Remove the appropriate device entry in ebsd conf Uninstalling the EBSD Driver 1 Navigate to the following directory opt Storage System Storage System_Software 6 x Drivers EBSD Copy the file install sh to your client system Run install sh u Type cd and press Enter Run Uninstall_ EBSD_ Driver The Install wizard opens Click Uninstall Click Done when the wizard is finished uninstalling the driver Type cd and press Enter Finishing Up Remove the EBSD volumes from the Storage System Console Intel Storage System Software User Manual 331 Using the EBSD Driver for Linux Troubleshooting Error Could not load the ebsd driver on your system 1 Run uname r to determine what version of Linux you are running 2 Determine whether that version is supported by the EBSD driver Driver successfully loaded but adding device returns failed i e ebsdvm add 0 returns failed 1 Check the error message and correct the problem Driver successfully loaded adding a device appears successful but when you check the config file the device was not added 1 Check cat proc ebsd client 2 If device does not exist add proper entry into the EBSD config file or If device status stuck in starting mode check the following Verify all entries in
293. mote Copy for business continuance backup and recovery and data mining migration configurations See the Remote IP Copy User Manual for detailed information about remote volumes Planning Volume Size Volume size is the size of the virtual device communicated to the operating system and the applications Volume size falls into one of three categories Volumes that are smaller than the storage capacity of the cluster Volumes that are equal in size to the storage capacity of the cluster Volumes that are larger than the storage capacity Creating larger volumes makes it easy to add additional storage resources to the cluster at a later date How you plan to use the volume is one factor in setting the size Other factors in planning size are calculating the hard threshold and whether you plan to use snapshots Measuring Disk Capacity and Volume Size If you are using Microsoft Windows or Novell NetWare with your Storage System Software you are dealing with two disk space accounting systems the block system and the native file system on Windows this is usually NTFS Block Systems and File Systems Operating systems see hard drives both physical and virtual as abstractions known as block devices arbitrary arrays of storage space which can be read from and written to at will Files on disks are handled by a different abstraction the file system File systems are placed on block devices File systems are given authority o
294. mounted Assign a LUN number as follows java commandline CommandLine java commandline CommandLine lt admin name gt lt admin password gt lt manager ip gt FC_LUN_set lt volume name gt lt auth group gt lt LUN gt lt failure timeout seconds gt Example Joe Jones is using Fibre Channel for a volume and snapshots for MRI images and he wants to mount the snapshots for backing up So first he assigns a LUN number java commandline CommandLine jjones trumpet 10 0 111 224 FC_LUN_set MRI604 FC_auth 2 lt failure timeout seconds gt Intel Storage System Software User Manual 265 Working with Scripting Mounting a Snapshot Below is an example of mounting the snapshot using ebsdvm ebsdvm lt mgmt group name gt lt snapshot name gt lt auth group name gt lt local ip gt lt number of managers gt lt each managers s ip gt lt lock_mode gt Example Joe Jones plans to mount his XRayReview snapshot and mount it on another server where the group named adminusers the administrators of the orthopedic section can access the images for filing the patient database ebsdvm Images XRayReview adminusers 10 0 20 212 3 10 0 13 79 10 0 33 47 10 0 33 87 ro Increasing Volume Hard and Soft Thresholds You can create a script that will automatically increase the hard and soft volume thresholds by a specific amount The operation is triggered when a soft threshold is reached It then raises both the soft and hard thresholds by the
295. mp on volumes and snapshots The date and time settings also affect schedules for snapshots and remote copies TCP IP Network For each SSM you can configure and manage the network settings including TCP IP interfaces DNS servers and the routing table SSM Administration The SSM comes configured with 2 default groups and 2 default users All administrative users and groups are added and managed locally SNMP Monitor the SSM using an SNMP Agent You can also enable SNMP traps Reporting The SSM offers multiple reporting capabilities including real time statistical information active monitoring of selected variables and diagnostics Logging In to the SSM After finding all the SSMs on the network you must log in to each SSM individually to configure modify or monitor the functions of that SSM 1 2 3 40 On the Network view double click the SSM that you want to log in to The Log In window opens shown in Figure 29 Log in to SSM Denver 1 10 0 33 25 User Name Password Figure 29 Logging in to an SSM Type the User Name and Password Click Log In When you are successfully logged in the SSM configuration window opens to the Module configuration category shown in Figure 27 and Figure 28 Intel Storage System Software User Manual Working with Storage System Modules Logging In to Additional SSMs Once you are logged in to an SSM you can log in automatically to additional SSM
296. n page 243 New Soft Threshold Soft threshold size must be equal to or less than the hard threshold size Authentication Groups You must include the new volume in a volume list See Volume Lists Overview on page 287 Hosts You must reconfigure hosts to connect to the new volume Prerequisites Stop applications from accessing the volume Intel Storage System Software User Manual 257 Working with Snapshots Delete all snapshots that are newer than the snapshot you are rolling back Rolling Back the Volume 258 Log in to the management group that contains the volume that you want to roll back Select the snapshot to which you want to roll back 1 2 3 Review the snapshot Details tab to ensure you have selected the correct snapshot 4 From the Tasks menu on the Details tab select Roll Back Volume The Roll Back Volume window opens shown in Figure 182 Roll Back Yolume Roll Back Volume New Volume Name Description Cluster Replication Level Replication Priority Size Hard Threshold Soft Threshold Auto Grow Checksum Data Volume_O Figure 182 Rolling Back a Volume 5 Type anew name for the rolled back volume You can also change the hard and soft thresholds if necessary 6 Click OK The Roll Back Volume confirmation message shown in Figure 183 explains that the original volume will be deleted Intel Stora
297. n please contact your storage provider and be prepared to provide the serial number s indicated below Feature Registration Scripting Evaluation In order to use scripting during a license evaluation period you must check the box below By checking this box you are agreeing to enter the license evaluation period O Scripting Evaluation Period Enabled Figure 213 Enabling Scripting Evaluation 5 Check the box to enable the use of scripts during a license evaluation period 6 Click OK For more information about scripting see Chapter 14 Working with Scripting Turn Off Scripting Evaluation The scripting evaluation period is turned off when You purchase the add on feature or application you were evaluating or You complete the evaluation and decide not to purchase any add on features or applications Select the management group Select the Register tab From the Tasks menu select Feature Registration Select the Scripting Evaluation tab shown in Figure 213 Clear the check box Click OK Table 56 The table below describes additional steps to safely back out of the scripting evaluation OY ee ee oS Intel Storage System Software User Manual 301 Feature Registration Table 56 Safely Backing Out of Scripting Evaluation Feature Being Evaluated Steps to Back Out e Any of the items below that are created by Back out of any configurable snapshots an application based scr
298. n 2 4 28 select source RPM 2 4 21 Installing the Source RPM Package 3 Run rpm ivh ebsd Release Version Build Number Kernel Version src rpm to install the appropriate RPM package This installs the sources in usr src redhat SOURCES for Redhat Systems usr src packages SOURCES in SuSE distributions 324 Intel Storage System Software User Manual Using the EBSD Driver for Linux Building the Driver for the New Kernel Version Navigate to the SOURCES directory Run mkdir EBSD Run tar xvzf ebsd 6 x xx xxxx tar gz Run configure Run make all 10 Run make install 11 Run depmod 4 5 6 Navigate to SOURCES EBSD 7 8 9 The driver is installed in lib modules uname r kernel drivers addon ebsd Configuring the EBSD Driver for Linux Once the EBSD driver is installed on Linux it must be configured and started Creating ebsd conf 1 Copy opt Storage System Storage System _Software 6 x Drivers EBSD uname r etc ebsd conf sample etc ebsd conf 2 Modify the etc ebsd conf file Add a device entry in ebsd conf for each volume or snapshot that has been configured on the SSM Required parameters are listed in Table 57 Table 57 Parameters in ebsd conf Parameter What It Is device This is the device section identifier It must be named device where is the device number Corresponding block device is created as dev ebsd disk Valid d
299. n Figure 123 Module Passive Logfiles Active Email Diagnostics Alerts T Storage Time TCP IP Network Sn SSM Administration g2 SNMP ln Test Result Mother board temperature CPU temperature CPU fan status Mother board voltages Enclosure cornmunication Power supply status Hard drive status Hard drive temperature Hard drive SMART health RAID controller BBU status 5 NASSAR Clear All Select All Save to File Apply Changes amp Run Tests Figure 123 Viewing the List of Diagnostics 4 Select the diagnostic tests that you want to run 162 Intel Storage System Software User Manual Reporting The default setting is to run all tests Clear any tests that you do not want to run To clear all selections click Clear All Note Running all of the diagnostic tests will take several minutes To shorten the time required to run tests clear the checkboxes for any tests that you do not need 5 Click Run Tests A progress message displays When the tests complete the results of each test display in the Result column 6 Optional When the tests complete if you want to view a report of test results click Save to File Then select a location for the diagnostic report file and click Save The diagnostic report is saved as a doc file in the designated location It is a text file and will open with Word in Windows or a
300. n the Network View depicts the storage architecture you create on your system An example setup is shown in Figure 10 Management Groups Management groups are groups of SSMs within which one or more SSMs are designated as managers Clusters Clusters are sub groupings of SSMs within a management group Volumes Volumes are data storage areas created on clusters Snapshots Snapshots are read only copies of volumes created at specific points in time If you are logged into the module a pink square displays underneath the SSM in the Network View Intel Storage System Software User Manual Getting Started Using the Tab View The Tab View displays properties of the item selected in the Network View For example Figure 11 shows the tabs that display when the SSMs on the network are found Select a tab to perform functions related to the selected item File Find Tasks View Help Available SSMs Denver 1 az Denver 2 EE Denver 3 Tab View Available SSMs_ Management Groups Alert Messages EBSD Hosts These SSMs are available for use Name Denver 2 10 0 33 18 Denver 1 10 0 33 48 Denver 3 10 0 33 35 Figure 11 Tab View in Main Window Available SSMs Tab The Available SSMs tab shown in Figure 12 lists the SSMs in the Network View pane that are available that is are not part of a management group Available SSMs_ Management Groups Alert Messa
301. n the cluster To decrease the hard threshold first decrease the size of the volume and then decrease the hard threshold to the same value as the size Warning Decreasing the volume size or hard threshold is not recommended If you shrink the volume in the Storage System Console before shrinking it from the client file system your data will be corrupted or lost Soft Threshold The soft threshold must be equal to or less than the hard threshold To decrease the soft threshold first decrease the hard threshold and decrease the soft threshold to a value less than the hard threshold Auto Grow Change the auto grow setting as desired You can turn auto grown on or off Warning Decreasing the volume size or hard threshold is not recommended If you shrink the volume in the Storage System Console before shrinking it from the client file system your data will be corrupted or lost Getting There 1 Select the volume you want to edit in the Network View The volume Tab View opens 2 Click Edit Volume The Edit Volume window opens as shown in Figure 172 See Table 39 for detailed information about making changes to the volume parameters 236 Intel Storage System Software User Manual Working with Volumes Edit olume Edit Volume Type Primary Remote Volume Name Description Created Cluster TransData05 Replication Level 2 Way Replication Priority Availability Redundancy Si
302. na management group Note The frame size for a bonded logical interface must be equal to the frame size of the NICs in the bond Editing the Frame Size To edit the frame size 1 On the TCP Status tab select the interface you want to edit 2 Click Edit The Edit Speed Duplex and Frame Size window opens shown in Figure 22 Edit Speed Duplex and Frame Size Name Motherboard Port0 Speed Duplex Speed Auto Auto Duplex Frame Size Default Setto Intel Storage System Software User Manual 113 Managing the Network Table 22 Editing TCP Speed Duplex and Frame Size 3 Select Set To in the Frame Size section 4 Enter a value between 1500 and 9000 bytes in the Set To field 5 Click OK A series of status messages display Then the changed setting displays in the TCP status report Note You can also use the Configuration Interface to edit the frame size See Setting the TCP Speed Duplex and Frame Size on page 312 Using a DNS Server The SSM can use a DNS server to resolve host names For example if you enter a host name to specify an NTP time server the SSM will use DNS to resolve the host name to its IP address For example the time server in Boulder Colorado has a host name of time nist gov DNS resolves this host name to its IP address of 192 43 244 18 DNS and DHCP If you configure the SSM to use DHCP to obtain an IP address and if the DHCP server is configured to
303. nager IP Addresses 10 0 33 13 10 0 33 18 10 0 33 25 Figure 90 Selecting the Storage System Software Network Interface and Updating the List of Managers Selecting the Interface Used by the Storage System Software The Storage System Software uses one network interface for communication with other SSMs on the network In order for clustering to work correctly the Storage System Software communication interface must be designated on each SSM The interface can be a single NIC that is not part of a bond e a bonded interface consisting of 2 or 4 bonded NICs Note Only NICS that are in the Active or Passive Ready state can be designated as the communication interface You cannot make a disabled NIC the communication interface When you initially set up an SSM using the Configuration Interface the first interface that you configure becomes the interface used for Storage System Software communication Warning To change the communication interface first remove the SSM from the management group To select a different communication interface 1 Make sure that the SSM is not in a management group 2 Select TCP IP Network from the SSM configuration categories 3 Click the Communication Mode tab to bring it to the front shown in Figure 90 4 Select an interface from the Storage System Software Interface drop down list 5 Click Apply Intel Storage System Software User Manual 121 Managing the Network Updat
304. napshots n 2 primary snapshots older than n X 2 remote snapshots older than xx n of days for primary snapshots x of days for remote snapshots n 2 primary snapshots older than n X 2 remote snapshots older than xx n of weeks for primary snapshots x of weeks for remote snapshots n 2 primary snapshots older than n X 2 remote snapshots older than xx Remote snapshots will only be deleted after their corresponding primary snapshot is deleted Additionally a remote snapshot will only be deleted after its counterpart primary snapshot Therefore you can not retain fewer scheduled remote snapshots than primary snapshots when setting your retention policies Note If you retain more remote snapshots than primary snapshots the remote snapshots become regular snapshots when their corresponding primary snapshots are deleted You can identify them as remote snapshots by their names since the naming convention is established as part of creating the remote snapshot schedule Best Practices e Retain at least two primary snapshots to ensure that only incremental copying is required for primary snapshots Review your remote copy schedule to ensure that the frequency of the remote copies correlates to the amount of time required to complete a copy Use the checklist in Table 62 to help plan scheduled remote snapshots Scheduled Remote Copy Planning Checklist Table 62 Remote Copy Planning Checklist
305. nd managing clusters and volumes This user manual provides instructions for installing the Console configuring individual SSMs as well as creating volumes that span a cluster of multiple SSMs Topics in this manual include the following Installing the Console Configuring individual SSMs by Configuring monitoring and reporting Creating volumes that span a cluster of SSMs by Creating management groups and clusters Creating volumes that span multiple SSMs Controlling client access to volumes Creating and using snapshots of volume Installing the Console 1 Before you install the Console software ensure that you have set up an IP address and password on your storage system Instructions for setting up an IP address and password are available on the ntel Storage System Quick Start User s Guide that shipped with your storage system 2 Insert the Resource CD that shipped with your storage system into the system from which you will install the Console software Scroll down and click on the Agree to accept the license agreement Select Microsoft Windows Selection under Software Heading Select Run when prompted SS vn A U Click on Next at the introduction screen Getting Started 7 Read the license agreement and click on I Accept to accept the terms of the license agreement Click on Next 8 Select the Complete option and click on Next
306. nd soft thresholds of the volume or snapshot directly after the deleted snapshot will increase by the hard and soft thresholds of the deleted snapshot up to the size of the volume Adding hard and soft thresholds into the next volume or snapshot insures that all changes to data are accounted for and saved Therefore if you plan a protocol where you routinely delete snapshots you must calculate the effect of adding the hard thresholds back into the volume For a detailed explanation of disk capacity allocation in a cluster and its relationship to disk or volume size in a file system see Measuring Disk Capacity and Volume Size on page 220 Easiest Method for Planning Capacity Make the snapshot hard threshold equal to the volume size and the soft threshold equal to the hard threshold Intel Storage System Software User Manual 243 Working with Snapshots Most Flexible Method for Planning Capacity Make the hard threshold less than the volume size and the soft threshold less than the hard threshold Then increase the volume size hard threshold and soft threshold as necessary to manage capacity growth Table 41 and Table 42 illustrate how storage can be effectively managed by setting the hard threshold below the original volume size in a series of snapshots as illustrated below Table 41 Space used by Snapshots when Hard Threshold is set to the Original Volume Size Snapshot Size Da Volume Data Stored w N
307. ne CommandLine commandline CommandLine lt admin name gt lt admin password gt lt manager ip gt volume_snapshot lt source volume name gt lt snapshot name gt lt soft threshold Megabytes gt lt hard threshold Megabytes gt lt description gt lt failure 264 Intel Storage System Software User Manual Working with Scripting timeout seconds gt Example Joe Jones is creating a snapshot for his management group Images volume named X Rays and he wants the snapshot name to be XRayReview The size of the thresholds for the snapshot is a 100 MB hard threshold and a 98 MB soft threshold So Joe s use of java commandline CommandLine will look as follows java commandline CommandLine jjones trumpet 10 0 111 212 volume_snapshot X Rays XRayReview 98 100 review volume for xray storage 10 Deleting a Snapshot Delete a snapshot using java commandline CommandLine java commandline CommandLine lt admin name gt lt admin password gt lt manager ip gt volume_delete lt snapshot name gt lt failure timeout seconds gt Example Joe Jones plans to retain the snapshot for a review period so he writes a script to delete the snapshot after 5 weeks java commandline CommandLine jjones trumpet 10 0 111 212 volume_delete XRayReview 45 Assigning a LUN Number to a Fibre Channel Volume or Snapshot Intel Storage System SSR316MJ2 only A Fibre Channel volume or snapshot must have a LUN number assigned before it can be
308. neral SNMP Traps WW Storage gt Time O Disable SNMP Agent L a5 TCP IP Network u SSM Administration Enable SNMP Agent L r Reporting Community String Access Control IP Host Name Mask Add System Location System Contact Log Out Apply Figure 110 Editing a Host in the Access Control List 2 Click Edit The Edit SNMP Client window opens shown in Figure 111 Edit SNMP Client By Address IP Network Address 10 10 10 2 IP Netmask Single Host ByName Cancel Figure 111 Editing SNMP Client from the Access Control List 3 Change the appropriate information 4 Click OK 144 Intel Storage System Software User Manual Using SNMP Deleting Access Control Entries Delete an SNMP client from the list 1 Select a host listed in the Access Control list shown in Figure 110 2 Click Delete A confirmation message opens 3 Click OK Entering System Information Optional 1 Enter System Location information such as address building name room number etc Normally this will be network administrator information the person you would contact if you could not connect to SNMP clients 2 Enter System Contact information such as name telephone email etc Using the SNMP MIB The Storage System MIB provides read only access to the SSM The SNMP implementation in the SSM supports MIB II compliant objects In addition
309. nfiguring the IP Address Manually Eek kk kk kk kK kk kK 94 Enla gg Tr zz mmm sZSZ a a e g 95 Configuring NIC Bonding kk kk kk eee KK kK KK KAK KK KK KA 95 Sen le bcc eeae ew A ODBBB m yer 96 Physical and Logical Interfaces Li Ek kk kk ek K k kk KK 97 How Active Backup Works l kk kk kk kk k kK K KAK kk KK KAK KAK kk A A A KAK A KA 97 How NIC Aggregation Works keke kek keke kk ke kK kK KA KAK KAKA KK 101 Creating a NIC Bond h d kk kk ek k kk kk KK kK KK kK KAK KK KA KA 104 Viewing the Status of a NIC Bond LiuEE kk kk kk kk kk k KA 107 Deleting a NIC Bond i sci kas sen n kall salan iyal ana banl ole ea 108 Disabling a Network Interface ELLLuE EE EEE kk kK kk kk KA KAK AK KK KK 109 Disabling a Network Interface LEL EEE kK kK kk atone 109 Configuring a Disabled Interface L uE kk kk kk kek Kek kk K k 109 TOP Status ciaiiy nE E a EE A a 110 The TOP St t s ee eat e a E ER N HEK ha rara Ha na ee 110 Editing the TCP Speed and Duplex EE kk kk kk kk kk k K k kK 111 R q l TUNES ki koy silek d a e r han ka k HE n ye ke ke a end A ER Aa e ae nav benek ae b 111 Best PractiCE mme zpak nc2CCn 111 Editing the NIC Frame iZe s x i 4x xi it s rana kelka HEL kl k P aniier Ean KER kak kilan ku k EREE 112 Sen n ni e DD rb bg uggxoxpxsAxDo DMDMJJJJJ J JnnNnNIIV
310. ng Remote Copy description see note Value text Optional Description associated with the snapshot failure timeout seconds Value number The number of seconds to wait until exiting with a failure grow size Value number The size in MegaBytes by which to increase the volume thresholds LUN Value number The LUN number assigned to the Fibre Channel volume when associating the volume to an auth group volume_snapshot Use this value as written This is verbatim Creates a snapshot from a volume volume_delete Use this value as written This is verbatim Deletes a volume volume_remote_snapshot Use this value as written This is verbatim Makes a remote snapshot of a volume volume_make_primary Use this value as written This is verbatim Makes a remote volume into a primary volume volume_make_remote Use this value as written This is verbatim Makes a primary volume into a remote volume volume_autogrow_set Use this value as written This is verbatim Sets the value by which to increase a volume threshold volume_autogrow_get Use this value as written This is verbatim Returns the value currently in the volume_autogrow_set command FC_LUN_set Use this value as written This is verbatim Sets the LUN number for a volume FC_LUN_get Use this value as written This is verbatim Returns the LUN number currently se
311. ng clustering all SSMs in a cluster will operate at a capacity equal to that of the smallest capacity SSM Adding capacity to all SSMs in the cluster will prevent stranded storage Note You must add disks in contiguous disk bays from left to right and for the Intel Storage System SSR212MA from top to bottom on the SSM as shown in Figure 67 and Figure 68 Note You cannot reduce the capacity of an SSM that is part of a management group If you want to reduce the capacity of an SSM first remove it from the management group Then remove disks from the SSM and reconfigure RAID Intel Storage System Software User Manual 85 Storage Memory Requirements for Adding Disks Before you add disks to the SSM confirm that the SSM has enough memory to use the additional disks Table 8 summarizes the memory requirements by disk capacity of fully populated SSMs with RAID 0 RAID 1 10 and RAID 5 50 configurations Contact your SSM supplier for additional memory Table 8 Memory Requirements for Fully Populated SSM Intel Storage System SSR316MJ2 Memory Requirement for 12 or 16 Disks Fully and Intel Populated Storage System SSR212MA RAID Level For 250 GB Disks For 400 GB Disks RAID 0 1 GB 2 GB RAID 1 10 1 GB 1 GB RAID 5 50 1 GB 2 GB Adding Disks Prerequisite 86 Before you add disks to the SSM be sure that the SSM has enough memory to use the additional disks See Memory Requirements for Adding D
312. nge Password Figure 27 SSM configuration window for the Intel Storage System SSR316MJ2 G Storage Time ij TCP IP Network SSM Administration g8 SNMP viz le Reporting Configuration categories Feature Registration Boot Devices Power Off Module Information Host Name IP Address 10 0 11 171 Model SSR212MA Serial Number 00 04 23 B2 F9 F2 Software Version 6 3 70 0006 0 Logged In User admin IDLED Off Backup amp Restore mao w ERDELAN Intel Change Password Sto ra g e Set ID LED On System Figure 28 SSM configuration window for the Intel Intel Storage System SSR212MA Working with Storage System Modules Configuration Categories The left pane lists the configuration categories The right pane contains a set of tabs which you use to configure different functions for each specific category The configuration categories are described below Module Use the module category to change the host name and login password for the SSM You can also install software backup and restore the Storage System Software configuration reboot or power off the SSM register the SSM for add on features and activate the flash cards used for booting the SSM Storage Manage RAID and the individual disks in the SSM Time Configure the time zone and set the date and time on the SSM The date and time settings are used to create a time sta
313. nit d ebsd restart or service ebsd restart 4 Cat proc ebsd client to verify driver version and devices online Intel Storage System Software User Manual 321 Using the EBSD Driver for Linux Installing the EBSD Driver with RPM Packages The RPM packages are located in the appropriate RPM directory on the Resource Driver CD Locate the appropriate RPM for your system Prerequisites for using RPM packages To use the RPM source kit you need either of the following RPMs e kernel source e gcc e glibcheader e glibckernelheader e rpmbuild automake e glibc devel e libgcc or include the development and kernel hacking groups when building your system RPM Package Naming Convention RPM packages are named using the following convention bsd Release Version Build Number Kernel Version i386 rpm For example RPM name ebsd 6 xXx xXxxx 2 4 9 e 3enterprise i386 rpm e ebsd represents the driver name e 6 x xx represents the release version e xxxx represents the build number 2 4 9 e 3enterprise represents the kernel version Installing A Binary RPM Package To install a binary RPM package on a system choose the appropriate RPM for the kernel version 1 Run uname r to determine what version of Linux you are running 2 Run rpm ivh to install the RPM For example on Red Hat Advanced Server 3 0 SMP the kernel version is 2 4 21 4 ELsmp The corresponding RPM is 322 Intel Storage System Softwa
314. nly access to the data on the volume or snapshot Read Write Access not Allows the authentication group read and write permissions to the available for snapshots volume 6 For a Fibre Channel volume enter the LUN number Warning Before you associate a LUN to an authentication group the host server s Disk Management or equivalent window must be closed 7 Click OK when you are finished 8 The volume is listed on the Volumes tab Adding Authentication Groups to the Volume List 1 Next select the Authentication Groups tab shown in Figure 203 New Volume List 3 New Volume List Name ITransDataBkUp Description Volumes Authentication Groups Authentication EBSD iSCs Fibre Channel Remove Cancel Figure 203 Connecting Authentication Groups to a Volume List 2 Click Add A list of existing authentication groups opens 3 Select the authentication group that you want to give access to the volume or snapshot 4 Click OK The authentication group is listed on the Authentication Groups tab Intel Storage System Software User Manual 289 Controlling Client Access to Volumes Completing the Volume List 1 Click OK on the New Volume List window when you are finished The Network View opens Go to the Volume Lists tab to see the new list displayed shown in Figure 204 Details Managers Clusters Authentication Groups
315. nown Passive Default Motherboard Port0 Intel Corp 100Mbs A Full Auto Active Default _ Yes Preferred interface Set Preferred Figure 82 Viewing the Status of an Active Backup Bond Intel Storage System Software User Manual 107 Managing the Network Module Tepap TCP status DNS Routing Communication j l Storage Time 3 SSM Administration Name Description Speed Met DuplewM _ Status Frame S Preferred Lg SNMP Motherboard Part1 Intel Corp Unknown Unknown Disabled Default L fa Reporting Slot1 Port1 Intel Corp Unknown Unknown Disabled Default Slot1 Port2 Intel Corp Unknown Unknown Disabled Default Slott Port3 Intel Corp Unknown 7 Unknown Disabled Default bond0 Logical Fa Auto Auto Auto Auto Active Default Slot1 Port Intel Corp Unknown Unknown Active Default Motherboard Port0 Intel Corp 100Mbs A Full Auto Active Neither interface is preferred Set Preferred Figure 83 Viewing the Status of a NIC Aggregation Bond Note If the bonded NIC experiences rapid sequential Ethernet failures the Console may display the SSM as failed flashing red and access to data on the SSM fails However as soon as the Ethernet connection is reestablished the SSM and the Console display the correct information Deleting a NIC Bond When y
316. nt 119 Table 25 EBSD Host Network Interface SetllgS uE keke 120 Table 26 EBSD Host Route SettilgS iEEE kk kek kk ek k k kk KK kk 120 Table 27 Using Default Administrative Groups EE EEE kk kk kk kk 130 Table 28 Administrative Group Name Requiremen S E iiEEE keke 131 Table 29 Descriptions of Group PermiSs OrS iE EEE kk keke kk kk 133 Table 30 Selected Details of the Passive Report uEE EE kk ke 150 Table 31 Types of Alerts Available for Active Monitoring EEE EEE 157 Table 32 List of Variables Available for Active Monitoring iiEE EE 159 Table 33 Typical Network TypeS ax crisces etc ees ee eect 178 Table 34 Disk Space use Reported on Disk Usage TalD iiu kk 209 Table 35 Setting a Replication Level for a Volume u ke 223 Table 36 Parameters for VOlumes idEE EE kk kk ek kk kk KAK KAK kk kk KAK A Ka 225 Table 37 Progression of Increments in Manual Auto Grow Setting of 50 MB 229 Table 38 Progression of Increments in Automatic Auto GIOW uE ke 230 Intel Storage System Software User Manual xxiii List of Tables Table 39 Table 40 Table 41 244 Table 42 Table 43 Table 44 Table 45 Table 46 Table 47 Table 48 Table 49 Table 50 Table 51 Table 52 Table 53 Table 54 Table 55 Table 56 Table 57 Table 58 Table 59 Tab
317. ntel Storage System Software User Manual Administrative Users and Groups Edit Administrative Group General Group Permission Network TCP IP SNMP DNS Time O Management Groups RAID Drive Hot Swap System and Disk Report Change Password SSM Administration Boot Upgrade Read Only Read Modify Full Figure 99 Adding Permissions to Administrative Groups 2 Click the permission level for each function for the group you are creating 3 Click the General tab and complete the rest of the information if you have not already done so 4 Click OK to finish adding the group The SSM Administration window opens with the Groups tab in front The new group is added to the list Description of Administrative Group Permissions Table 29 Descriptions of Group Permissions Management Area Activities Controlled by This Area Network Choose type of network connection set the time and time zone for the SSMs identify the Domain Name Server and use SNMP Management Groups RAID Drive Hot Swap Set the RAID configuration for the SSM Shut down disks restart RAID and hot swap disks Create management groups System and Disk Report View reports about the status of the SSM Change Change administrative users passwords Password SSM Administration and Add administrators and upgrade the Storage System Software Upgrade Intel Storage System Software User Manual 1
318. ny text editor in Linux or UNIX 7 Optional Click Save Configuration to save the list of diagnostics that you selected so that next time you open the Diagnostics window it will be preconfigured with your selections Viewing the Diagnostic Report The results of diagnostic tests are written to a report file For each diagnostic test the report lists whether the test was run and whether the test passed failed or issued a warning Note If any of the diagnostics show a result of Failed call your Technical Support representative To view the report file 1 After the diagnostic tests complete save the report to a file 2 Browse to the location where you saved the diagnostics report doc file 3 Open the report file List of Diagnostic Tests The following table shows the diagnostic tests that are available for the SSM For each test the table lists the following information A description of the test Pass fail criteria Intel Storage System Software User Manual 163 Reporting soot Pass Fail Diagnostic Test Description Criteria Criteria Motherboard Compares the mother board Within Outside temperature temperature against the accepted range range temperature range for normal operation CPU temperature Compares the processor temperature Within Outside against the accepted temperature range range range for normal operation Mother board Compares th
319. o bi tobi joa y Snapshot or Changed Threshold Cluster Change Mon Original Volume N A 50 GB 50 GB 50 GB Tue Snapshot 1 lt 15 GB 50 GB 100 GB Wed Snapshot 2 lt 10 GB 50 GB 150 GB Thur Snapshot 3 lt 8 GB 50 GB 200 GB Table 42 Space used by Snapshots when Hard Threshold is Reduced Snapshot Size Total Space Data Stored or w Hard Day Volume Snapshot Changed Threshold prake Reduced Mon Original Volume N A 50 GB 50 GB 50 GB Tue Snapshot 1 lt 15 GB 15 GB 65 GB Wed Snapshot 2 lt 10GB 15 GB 80 GB Thur Snapshot 3 lt 8 GB 15 GB 95 GB Note Note the dramatic savings in storage space in the table above Note Deleting files on a file system does not create space on the volume For file level capacity management use application or file system level tools 244 Intel Storage System Software User Manual Working with Snapshots Planning Snapshots When planning to use snapshots take the purpose and size considerations into account Note When considering the size of snapshots in the cluster remember that the replication level of the volume is duplicated in the snapshot Source Volumes for Data Mining or Tape Backups or Data Preservation Before Upgrading Software Plan to use a single snapshot and delete it when you are finished Consider the following questions in your planning Is space available on the cluster to create the snapshot Is space available in the
320. o create the volume Alternately you can create a new volume from the cluster details panel and select the Remote option in the New Volume Window Note The fastest way to create a remote volume is to create it as part of creating the remote snapshot using the Remote Snapshot window To create the remote volume from the New Remote Snapshot window 1 In the Remote section select the Management Group to contain the remote snapshot You must be logged into the management group to continue 2 To create a new remote volume click New Volume The Cluster List window opens shown in Figure 238 Cluster List Select a cluster to contain the volume E lx Clusters from management groups that you are logged in to Cluster eae ET Cancel Figure 238 Selecting a Cluster for the Remote Volume Intel Storage System Software User Manual 347 Remote Copy 3 Select a cluster for the remote volume and click OK The New Volume window opens shown in Figure 239 See Chapter 12 Working with Volumes for detailed information about creating volumes New Remote Yolume New Remote Volume Type Volume Name Volume_O Description Cluster TransData_BkUp Replication Level None Replication Priority Size Hard Threshold Soft Threshold Auto Grow Checksum Data Figure 239 Creating a New Remote Volume 4 Type a name for the volume A volume name must be from 1 to 127 chara
321. of Availability All SSMs must One of every two One of every three be up consecutive SSMs consecutive SSMs must be up must be up Redundancy N A All SSMs must be up Two of every three consecutive SSMs must be up Warning A management group with three SSMs is the minimum configuration for fault tolerant operation Although the system allows you to configure 2 way replication on 2 SSMs this does not guarantee data availability in the event that one SSM becomes unavailable See Managers on page 168 If your volumes contain critical data configure them for 2 way replication and a priority of redundancy 224 Intel Storage System Software User Manual Working with Volumes Requirements for Volumes When creating a volume you define the following parameters Table 36 Parameters for Volumes Volume Parameter Configurable in Volume Type What it Means Type Any Whether the volume is primary or remote e Primary volumes are used for data storage Remote volumes are used for configuring Remote Copy for business continuance backup and recovery or data mining migration NOTE Remote Copy is a feature upgrade You must purchase a Remote Data Protection Pak license to use remote volumes past the 30 day trial period Volume Name Any The name of the volume that is displayed in the Console A volume name must be from 1 to 127 characters and is case sensitive Description An
322. oftware 6 1 Drivers EBSD 2 4 21 4 ELsmp sbin ebsdvm opt Storage_System Storage_System_Software 6 1 Drivers EBSD 2 4 21 4 ELsmp sysconfig opt Storage_System Storage_System_Software 6 1 Drivers EBSD 2 4 21 4 ELsmp sysconfig ebsd opt Storage_System Storage_System_Software 6 1 Drivers EBSD install sh Intel Storage System Software User Manual 323 Using the EBSD Driver for Linux Uninstalling the RPM To uninstall the ebsd rpm package from the system run rpm e ebsd For example rpm e ebsd To verify that the package has been uninstalled successfully run rpm q ebsd This returns the message package ebsd 6 x xx xxxx is not installed Using the Source RPM Package to Build a Driver for a New Kernel Version If the kernel you have is not currently supported in the binary RPM package you can create the EBSD driver using a source RPM package Prerequisites Have previously installed the binary RPM package Have the kernel source installed on the system e Go to usr src and make a link to the kernel source directory called linux for example cd usr src ln s linux linux Determining the Appropriate Source RPM Package 1 Navigate to the SRPM directory on the CD 2 Find the closest lower version to the target kernel If you have multi processors select the smp version For example For kernel version 2 4 20 select source RPM 2 4 19 For kernel versio
323. ole to the Network View and leaves you logged in to the SSM The Network View window displays the SSM with a pink square underneath indicating the logged in status Boulder 2 Figure 31 Pink Square Indicates Logged In Status Module Configuration Overview The module configuration category provides access to detailed information about the SSM backing up and restoring SSM configuration files the software reboot or power off function boot devices and feature registration The module configuration category window for the SSM is shown in Figure 32 Power Off Feature Registration Boot Devices ig Storage Module Information Backup amp Restore Time E TCP IP Network Jn SSM Administration g8 SNMP a Reporting Host Name MA 171 Apply IP Address 10 0 11 171 Model SSR212MA Serial Number 00 04 23 B2 F9 F2 Software Version 6 3 70 0006 0 Install Software Logged In User admin Change Password IDLED Off Set ID LED On tow out_ ID LED only on the Intel Storage System SSR212MA Figure 32 Viewing the Module Configuration Category 42 Intel Storage System Software User Manual Working with Storage System Modules Changing the SSM Host Name The host name on an SSM is the name that displays below the SSM icon in the Network View It is also visible when the users browse the network Change the host name of the SSM on the Module Information tab The SSM arrives configur
324. on T Library Production cae Application Application bec Server Server Read Only Primary i f sast i Remote Primary Volume i i Volume 2 Volume Storage a anci Ke Subr et Primary Remote Remote Primary Snapshot Snapshot 1 Snapshot 2 Snapshot Production Site 1 Backup Site Production Site 2 Figure 264 Off site Backup and Recovery Example Configuration How This Configuration Works for Off site Tape Backup Depending on how long you retain the copies of the remote snapshots you can retrieve data directly from recent remote snapshots rather than going to tape backups Otherwise retrieve data as you normally would from the tape backup Best Practices Retain the most recent primary snapshots in the primary cluster By keeping snapshots on your primary volume you can quickly roll back a volume to a previous snapshot without accessing off site backups When you create a schedule for Remote Copy you specify a number of primary and remote snapshots that you want to retain You can retain primary snapshots to facilitate easy rollback of the primary volume Retention of snapshots will affect the amount of space that is used in the cluster of SSMs so balance the number of snapshots to retain with the amount of space you are willing to use To roll back to a snapshot that you did not retain you can still access remote snapshots or tape backups e Retain remote snapshots in the backup location to facilitate fast re
325. ook In GJ Intel Storage System sa e BE File Name Files of Type All Files Open Install File Figure 36 Browsing for Upgrade or Patch File 6 Select the file and click Open Install File Focus returns to the Install Software window When the file name is present the Install button becomes enabled 7 Click Install The install status window opens shown in Figure 37 Status messages scroll on the window These messages can be saved to a file Optional Click Save To File and choose a name and location for the file Golden 1 10 0 33 17 Gathering the install destination information started Gathering the install destination information finished Opening the install conection started Opening the install conection finished Sending the install file started Sending the install file 0 complete updated every 10 seconds Sending the install file 100 complete updated every 10 seconds Sending the install file finished extracting returnd starting returno return 2 sleeping 5 seconds finished sleeping Post qualification tests passed Z Automatically scroll Save to File Close Figure 37 Upgrade Status Messages After the installation completes the system reboots After the system comes back online it conducts a post install qualification After the system passes the post install qualificat
326. oose your RAID configuration carefully Once RAID is configured you cannot change the RAID configuration without deleting all data on the SSM Data Replication Keeping multiple copies of your data can ensure that data will be safe and will remain available in the case of disk failure There are two ways to achieve data replication Configure RAID 1 10 5 or 50 within each SSM e Replicate data volumes across clusters of SSMs Using RAID for Data Replication Within each SSM RAID 1 or RAID 10 can ensure that 2 copies of all data exist If one of the disks in a RAID pair goes down data reads and writes can continue on the other disk Similarly RAID 5 or RAID 50 provides redundancy by spreading parity evenly across the disks in the set If one disk in the set goes down data reads and writes continue on the remaining disks in the set RAID protects against failure of disks within a module but not against failure of an entire SSM For example if network connectivity to the SSM is lost then data reads and writes to the SSM cannot continue Note Ifyou plan to create all data volumes on a single SSM use RAID 1 10 or 5 50 to replicate data within the SSM Using Volume Replication in a Cluster Note 72 A cluster is a group of SSMs across which data can be replicated Volume replication across a Cluster of SSMs protects against disk failures within an SSM and failure of an entire SSM For example if a single disk or an en
327. or example in the two site disaster recovery model one of the sites goes down On the site that is still up all managers must be running Select one of the SSMs at that site and start the virtual manager on it That site then regains quorum and can continue to operate until the other site is recovered Once the other site is recovered the managers in both sites reestablish communication and they ensure that the data in both sites is resynchronized When the data is resynchronized stop the virtual manager to return to the disaster recovery configuration Note If the downed site is not recoverable you can create a new site with new SSMs and reconstruct the cluster Call your technical support representative Two site Scenario Communication Between the Sites is Lost In this scenario the sites are both operating independently On the appropriate site depending upon your configuration select one of the SSMs and start the virtual manager on it That site then recovers quorum and operates as the primary site Once communication between the sites is restored the managers in both sites reestablish communication and they ensure that the data in both sites is resynchronized When the data is resynchronized stop the virtual manager to return to the disaster recovery configuration Intel Storage System Software User Manual Disaster Recovery Using A Virtual Manager Starting a Virtual Manager A virtual manager must be started on an SSM ideal
328. original and the original volume is deleted Prerequisites Stop applications from accessing the volume Delete all snapshots that are newer than the snapshot you are rolling back from After rolling back a volume to a snapshot you lose all data that was stored since the rolled back snapshot was created Any uncompleted remote copy snapshot that is newer than the snapshot that you are rolling back to will be cancelled 1 Q A W N Log in to the management group that contains the primary volume that you want to roll back Select the snapshot that you want to roll back to Review the snapshot Details tab to ensure you have selected the correct snapshot From the Tasks menu select Roll Back Volume The Roll Back Volume window opens shown in Figure 254 Intel Storage System Software User Manual 367 Remote Copy Roll Back olume Roll Back Volume New Volume Name Yolume_0 Description Cluster Replication Level Replication Priority Size Hard Threshold Soft Threshold Auto Grow Checksum Data Figure 254 Rolling Back a Primary Volume 6 Type a new name for the rolled back primary volume You can also change the hard threshold and soft threshold if necessary Table 65 Requirements for Rolling Back a Primary Volume Item Requirements for Changing New Primary Volume Name Must be from 1 to 127 characters Names are case sensiti
329. ority Availability Size 8 O Redundancy GB v Hard Threshold 8 GB v Soft Threshold 8 GB v Auto Grow off O Auto Checksum Data Yes Figure 169 Creating a New Primary Volume 5 Select primary as the volume type The window for a new primary volume is shown in Figure 169 For information about creating a remote volume see the Remote IP Copy User Manual If you are creating a remote volume see Creating a Remote Volume on page 346 6 Type a name for the volume Manual No 7 Optional Type a description of the volume 8 Select a replication level You must purchase the Scalability Pak to use the N way replication feature beyond the 30 day evaluation period 9 Select a replication priority If you select a replication level of None the replication priority must be Availability See Figure 170 Replication Level None Replication Priority Figure 170 Setting Replication to None 10 Type a size and select the units 11 Type a hard threshold and select the units 12 Type a soft threshold and select the units 232 Intel Storage System Software User Manual Working with Volumes Note The system automatically factors replication levels into the settings For example if you create a 500 GB volume and the replication level is 2 the system automatically allocates 1000 GB for the volume 13 Select the cluster y
330. ork has high latency The time out begins counting from the time that the SSM begins blinking in the Console The default time is set to 0 seconds so that the hot spare takes over as soon as the system detects that the SSM is unavailable For example if you set the time out to 60 seconds then the hot spare is activated 1 minute after the system detects that the SSM is unavailable Swap in Hot Spare 202 You can manually force a SSM designated as a hot spare to activate in the cluster if an SSM in that cluster is not available and the cluster is blinking red in the Console Swapping in a hot spare overrides the hot spare time out setting However the setting remains intact in the cluster and continues to apply once the cluster configuration has returned to normal Intel Storage System Software User Manual Working with Clusters Clusters and iSCSI If you plan to use iSCSI with the Storage System Software there are iSCSI features you configure at the cluster level either when you create the cluster or by editing the cluster to configure these items e iSCSI Failover If you are using an initiator that does not support multiple addresses per target such as Novell to ensure iSCSI failover you must configure a virtual IP for the SSMs in a cluster e iSNS Server If you use an iSNS server configure your cluster to register the iSCSI target with the iSNS server iSCSI Failover and Virtual IP A virtual IP address ensures t
331. ormation Optional EEE kk kk kk kk k e 145 Using the SNMP MIB kek kek ek kk kk k k K k kK KA kk K KA kk K KA kk KAK rk ene 145 Installing the Storage System MIB E EE kk kk kk KK kk 145 Disabling the SNMP Agent M E E kk kk kk k k kk K k kk K k KK KA kK KK KA KK 146 Disabling SNMP 5 2 yx5 2 al isa kekan b ae EA ZA RR RG A ko kak DAR DAN SERE Sah SETA AVE L N HAN 146 Enabling and Disabling SNMP Traps 4 E kk k k kk Kek kk kK KK kk KK 146 Enabling SNMP Traps E kk kk kk kek K k kak KK k k kk KAK kK KK KA KK Kl kk KH 147 Disabling SNMP Traps 54 421 5 232 x sees ika yan b l an r Ne a e ELE ea cin a n b na Salan E 148 Chapter 8 Reporting sikili ikisi kaka kayadakaa ke kana k ye kur adakad ka H ka k kak da a Kaka kek kak kw ka 149 Reporting OvervieW M L L L l llilii kk kk ek KEKE KAKE KAKA K KA KAK A KA KA KA KAKA KAK kK AR kk 149 Using Passive R pOllS ss silbeha d da sin nek atn k sa d ur rin nerin Hele za b db bara zak H N 150 Saving the Report to a File L kk kk kk kek kek KAK KAY 150 Passive Reporting Detail s ik as l uk s lak axak isine eens ana Eka k xek k kak ki W k aa a keke k ka kek 150 Saving LOG Files k nnc nn dak dika baha lan His k drka k neda ab x sk n a ka k qab R n neke de k n h k dak eels 152 Remote Log Files MMMAk A l E lll kk Ek kk kk kak kk ka kaka
332. oss of quorum The virtual manager is designed to be used in specific system configurations which are at risk for a loss of quorum e Regular Manager A manager which is started on an SSM and operates according to the description of managers found in Managers on page 168 Manager Either a virtual manager or a regular manager When to Use a Virtual Manager Use a virtual manager in the following configurations A management group across two sites Using a virtual manager allows continuing operation by one site if the other site fails The virtual manager provides the ability to regain quorum in the operating site if one site goes down or in one selected site if communication between the sites is lost Such capability is necessary if volumes in the management group reside on SSMs in both locations A management group in a single location with two SSMs If you create a management group with two managers in the same location that management group is in a non fault tolerant configuration One manager provides no fault tolerance Two managers also provide no fault tolerance due to loss of quorum if one manager goes down See Managers and Quorum on page 168 for more information Running two managers and adding a virtual manager to this management group provides the capability of regaining quorum if one manager goes down Disaster Recovery Using A Virtual Manager Benefits of a Virtual Manager Running a virtual manager su
333. osts that are using that IP address 1 Select TCP IP Network from the SSM configuration categories The window opens with the TCP IP tab on top 2 On the TCP IP tab select the interface from the list for which you want to configure or change the IP address 3 Click Edit The Edit TCP IP Configuration window opens shown in Figure 74 Edit TCP IP Configuration Name Motherboard Port0 Type Description Intel Corp 82546EB Gigabit Ethernet Controller Copper Mac Address 00 07 E9 40 EC DA O Disable Interface O Obtain an IP address automatically using the DHCP BOOTP protocol IP Address 10 0 11 137 Subnet Mask 255 255 240 0 Default Gateway 10 0 1 254 Cancel Figure 74 Configuring the IP Address Manually Intel Storage System Software User Manual Note Managing the Network 4 Select IP Address and complete the fields for IP Address Subnet mask and Default gateway 5 Click OK A confirmation message opens 6 Click OK A message notifying you of an automatic log out opens 7 Click OK The automatic log out occurs Wait a few moments for the IP address change to take effect 8 Log in to the newly addressed SSM If you are changing the IP address of an SSM which is a manager in a management group a window opens which displays all the IP addresses of the managers in the management group and a reminder to reconfigure the application servers that are affecte
334. ot Schedules You can edit everything in the snapshot schedule except for the name 1 Select the volume for which you want to edit the snapshot schedule The volume Tab View opens opens shown in Figure 181 Intel Storage System Software User Manual Select the schedule you want to edit Click the Snapshot Schedules tab to bring it to the front From the Tasks menu select Edit Schedule The Edit Snapshot Schedule window 255 Working with Snapshots Edit Snapshot Schedule Edit Snapshot Schedule Name Description Snapshots Schedule Name Number Snapshot Schedule Time Zone Mountain Standard Time Start At 07 06 2005 06 39 43 PM Z Recur Every 1 r Thresholds for Scheduled Snapshots Size 8 0 Hard Threshold 2 0 Soft Threshold 2 0 Retention for Scheduled Snapshots Retain Maximum Of 5 Snapshots Retain Snapshots For Figure 181 Editing a Snapshot Schedule 5 Change the desired information 6 Click OK Note Ifyou change the hard threshold be sure to review the information about snapshot thresholds and their effect on volume thresholds in Managing Capacity Using Volume and Snapshot Thresholds on page 243 Deleting Snapshot Schedules 1 Select the volume for which you want to delete the snapshot schedule The volume Tab View opens 2 Click the Snapshot Schedule tab to bring it to the front 3 Select the schedule you want to delet
335. ot details displayed include e Primary Management Group containing the primary volume from which remote snapshots are created Primary Snapshot from which the remote snapshot is copied Remote Management Group containing the remote volume to which the remote snapshot is attached Remote Snapshot target for the copied primary snapshot e Complete the incremental progress of the remote copy operation e Elapsed Time incremental time of the copy operation e Data Copied incremental quantity of data copied e Rate rate at which data is being copied or when the remote snapshot is complete the average rate for the total operation State status of the operation Viewing Status in the Remote Copy Details Window The Remote Copy Details window displays additional details about a remote snapshot 1 From the Remote Snapshot tab select the remote snapshot for which you want to view details 2 Right click and select View Remote Snapshot Details or double click the snapshot The Remote Copy Details window opens as shown in Figure 245 Intel Storage System Software User Manual 353 Remote Copy 354 Remote IP Copy Details Source Info Primary Mgmt Group Transaction_Data Start Time Primary Snapshot CredDataRS1 Remote Mgmt Group TransData_Remote Remote Snapshot May05RemSS Status Manual Scheduled MANUAL State Complete Time 5 27 05 2 12 PM Elapsed Tim
336. ote copies ensure that such factors do not cause primary and remote snapshots to become unsynchro nized Regardless of the retention policy defined for scheduled remote copies up to 2 additional snapshots may be retained by the system at any given time These two addi tional snapshots include the snapshot that is in the process of being copied and the last fully synchronized snapshot A fully synchronized snapshot is one that has completed copying so that the remote snapshot is a complete mirror of its corresponding primary snapshot Up to two additional snapshots may be retained by the system at any given time Because the system will never delete the last fully synchronized primary snapshot a remote copy schedule may retain N 2 copies for a retention policy of N the currently copying remote snapshot plus the last fully synchronized snapshot Using the example above if you have a retention policy for your remote copy schedule of two primary and five remote snapshots the system may retain up to four primary and seven remote snapshots for a period of time 340 Intel Storage System Software User Manual Remote Copy Table 61 Snapshot Retention Policy and Maximum Number of Snapshots Retained Remote Schedule Retention Policy Maximum Number of Snapshots Retained n of primary snapshots X of remote snapshots n 2 primary snapshots X 2 remote snapshots n of hours for primary snapshots x of hours for remote s
337. other two SSMs in the cluster Repairing an SSM When an SSM in a cluster has a disk failure the Network View displays the SSM and the cluster as blinking red and needing attention shown in Figure 160 n Transaction_Data a Card_Payments aile blinks red aaa rd Boulder 2 Boulder 1 Credit_05 Figure 160 SSM with Failed Disk 1 If the SSM is running a manager stop the manager See Stopping a A Manager on page 183 2 Select the SSM in the Network View 3 Right click and select Repair SSM A confirmation message opens Intel Storage System Software User Manual 215 Working with Clusters 4 Click OK The SSM leaves the management group and moves to the Available group A placeholder or ghost SSM remains in the cluster shown in Figure 161 It is labeled with an IP address instead of a host name Available SSMs i Transaction_Data a Card_Payments needing ez xa repair 10 0 12 36 gt Boulder 1 Denver 2 Denver 3 Boulder 2 Figure 161 Viewing the Ghost SSM 5 Replace the disk in the SSM After you replace the disk you must power the disk on and reconfigure RAID See Replacing a Disk on page 83 6 Add the repaired SSM to the management group The SSM returns to the management group and the ghost SSM is still in the cluster shown in Figure 161 a Transaction_Data a Card_Payments Boulder 2 Repaired s amma ied epalre 1
338. otification Methods for Monitored Variables Use Edit to configure notification methods and change the frequency that the variable is monitored if allowed Configuring Notification Methods for All Variables Note Note You can configure alert actions for one variable and then apply those settings to all the variables in the list Use the Apply Threshold Actions button to globally apply the settings Then you can customize alerting actions for a particular variable by editing that variable 1 Select from the list the variable you want to edit 2 Click Edit The Configure Variable wizard opens to Step 2 seen in Figure 119 For some variables only the notification method can be changed For example the frequency for the motherboard temperature variable is set to 15 seconds and cannot be changed 3 Optional If allowed change the frequency for the variable and click Next 4 Optional Change the alert notification method 5 Optional To apply the alert actions including the email addresses that you selected in step 4 to all variables that are monitored on the SSM select the Apply Threshold Actions to All Monitored Variables checkbox 6 Click Finish If you are requesting email notification be sure to set up the SMTP settings on the Email tab Intel Storage System Software User Manual 155 Reporting Removing a Variable from Active Monitoring Use Remove to remove variables to stop active monitoring You can
339. ou delete an active backup bond the preferred interface assumes the IP address and configuration of the deleted logical interface The other NIC is disabled and its IP address is set to 0 0 0 0 When you delete a NIC aggregation bond one of the active interfaces in the bond retains the IP address of the deleted logical interface The other NIC is disabled and its IP address is set to 0 0 0 0 1 On the TCP IP tab select the bond that you want to delete 2 Click Delete Bond Because the IP addresses change the Search for SSMs window opens For detailed information see Finding Storage System Modules on the Network on page 20 of Getting Started on page 1 3 Finish searching for the SSM using the desired method Finding the SSM might take a few minutes You can exit the search window and use the Find menu at your convenience 108 Intel Storage System Software User Manual Managing the Network Disabling a Network Interface You can disable the network interfaces on the SSM You can only disable top level interfaces This includes bonded interfaces and NICs that are not part of bonded interfaces To ensure that you always have access to the SSM do not disable the last interface If you want to disable the last interface first enable another interface Warning If you disable an interface be sure you enable another interface first That way you always have access to the SSM If you disable all the interface
340. ou want to contain the volume 14 Optional Select the auto grow setting you want 15 Optional Select whether you want to enable checksumming 16 Click OK The Storage System Software creates the volume and it is attached to the cluster shown in Figure 171 17 Select the new volume in the Network View The volume Tab View opens also shown in Figure 171 File Find Tasks View Help Available SSMs Transaction_Data EE TransData05 Boulder 3 zz Boulder 2 Boulder 1 CreditData05 SN Volume Remote Snapshot Schedules Target Information Volume List Memberships Details Snapshots Snapshot Schedules Hosts Remote Snapshot Name CreditData05 Size 8GB Replication Level 2 Way Created 07 06 20 Hard Threshold 8 GB Replication Priority Availability Cluster TransData05 shold 8 GB Type Primary Checksum Data No AutoGrow O ed fy MaRUME Tab View Status Normal Description Figure 171 Viewing a Volume in a Cluster The Volume Tab View The tabs provide access to volume information and features such as creating snapshots and associating authentication groups with the volume Details Tab Displays information about the selected volume You can add create snapshots add volumes to volume lists and edit and delete volumes from this tab Intel Storage System Software User Manual 233 Working with Volumes Snapshots Tab Displays information about the existing snap
341. p 2 Click the Management Group Information tab in the Tab View shown in Figure 128 Details Management Group Information Management Group NA Manager No Hot Spare NA Virtual Manager No Migrating Data NA Status RAID Normal Figure 128 Management Group Information Tab Intel Storage System Software User Manual 171 Working with Management Groups 3 Click the Tasks button and select Add to New or Current Management Group The Add to or create a Management Group window opens shown in Figure 129 Add to or create a Management Group x Select a management group for SSM Boulder 2 10 0 33 48 to join or create a new management group O Existing Management Group New Management Group Name Group_o Figure 129 Creating a New Management Group 4 Select New Management Group and type a name for the management group 5 Click Add The Managers IP Addresses window opens shown in Figure 130 xi For each host that is using EBSD enter the following manager IP addresses in the driver dialog box used to create and edit volumes 10 0 33 35 Save Manager IP Addresses Figure 130 List of Manager IP Addresses for Management Group 172 Intel Storage System Software User Manual Working with Management Groups 6 Click OK The SSM joins the management group and starts the manager The Console displays the newly created management group shown in Figure 131 File
342. p any applications from accessing the volume 1 Select the snapshot for which you want to delete the writable space 2 Right click and select Delete Writable Space A warning message opens 3 Click OK Editing a Snapshot You can edit the description of a snapshot You can also change the hard and soft thresholds See Creating a Snapshot on page 246 1 Log into the management group that contains the snapshot that you want to edit 2 Select the snapshot you want to edit The snapshot Tab View opens 3 From the Tasks menu select Edit Snapshot The Edit Snapshot window opens shown in Figure 178 250 Intel Storage System Software User Manual Working with Snapshots Edit Snapshot Edit Snapshot Snapshot Name Description Created Cluster Replication Level Replication Priority Size Hard Threshold Soft Threshold Auto Grow Checksum Data Figure 178 Editing a Snapshot 4 Navigate to the field you want to change and change the information Table 43 Data Requirements for Editing a Snapshot Item Requirements for Changing Description Must be from 0 to 127 characters Hard Threshold Hard threshold size must be equal to or less than the size of the volume and available storage in the cluster You cannot decrease the hard threshold Soft Threshold Soft threshold size must be equal to or less than the hard threshold size 5 Click OK when you a
343. perties of NTP servers To change the IP address of an NTP server you must remove the one no longer in use and add a new NTP server 1 Make certain that the NTP Mode is On 2 On the NTP tab select the NTP server you want to edit 3 Click Edit The Edit NTP Server window opens shown in Figure 95 ea NTP server NTP Server Preferred Not Preferred Figure 95 Editing an NTP Server 4 Change the preference of the NTP server 5 Click OK The list of NTP servers displays the changed NTP server in the list Note To change the IP address of an NTP server you must remove the server no longer in use and add a new NTP server Intel Storage System Software User Manual 127 Setting the Date and Time 128 Intel Storage System Software User Manual 6 Administrative Users and Groups The Storage System Software comes configured with two default administrative groups and one default administrative user You can add edit and delete administrative users and groups All administrative users and groups must be added and managed locally Note The user who is created during SSM configuration using the Configuration Interface becomes a member of the Full Administrator group by default Getting There 1 On the Network View double click the SSM and log in if necessary The Module Configuration window opens 2 Select SSM Administration from the configuration categories The Groups tab opens as shown in Figure
344. pgrade file from the web site of your approved supplier or from a CD Upgrading the SSM You can install upgrades on SSMs individually which is recommended If you are upgrading multiple SSMs that are not in a management group you can upgrade them simultaneously 1 Log in to the first SSM you want to upgrade 2 On the Module Information tab click Install Software The Install Software window opens shown in Figure 35 File Name jlntel Storage Server Boulder_2_Configuration_Backup Browse Version 6 3 0 Description module configuration Install SSM Version Management Group Cluster 000 Boulder 3 10 0 33 6 3 70 0007 0 available SSMS Boulder 2 10 0 33 D Golden 2 10 0 33 0 0 0 0 0 Trans_Data Not Logged In Golden 1 10 0 33 6 3 30 0001 0 Trans_Data Not Logged In Check All Clear All Install file on selected SSMs one at a time Recommended Install file on selected SSMs simultaneously Advanced Figure 35 Upgrading the SSM Software 3 Select the Install check box next to the SSM you want to upgrade You can select multiple SSMs to upgrade from the list 4 Select Install file on selected SSMs one at a time Recommended 5 Click Browse to navigate to the folder on the Console computer where you copied the upgrade or patch file as shown in Figure 36 Intel Storage System Software User Manual 45 Working with Storage System Modules L
345. pports implementation of disaster recovery configurations to support full site failover The virtual manager ensures that in the event of either a failure of an SSM running a manager or of communication breakdown between managers as described in the two site scenario quorum can be recovered and hence data remains accessible Requirements for Using a Virtual Manager 192 It is critical to use a virtual manager correctly A virtual manager is added to the management group but not started on an SSM until the management group experiences a failure and a loss of quorum To regain quorum you start the virtual manager on an SSM that is operating and in the site that is operational or primary depending upon your situation Requirement What it Means Use a Virtual Manager with an Even Number of Regular Managers Running on SSMs Total of Disaster r Managers Recovery Regul Including the Scenario A e Virtual g Manager Two sites with 4 5 shared data Two SSMs in 2 3 Management Group Add a Virtual Manager When You cannot add a virtual manager after quorum has been lost The Creating Management Group virtual manager must be added to the management group before any failure occurs A Virtual Manager Must Only Only one instance of a virtual manager must run at a time Once Be Started Once and Run you start a virtual manager you must not start that virtual manager Only Until the Site is Restored asecon
346. provide the IP addresses of the DNS servers then a maximum of three DNS servers will automatically be added to the SSM These DNS servers are listed as IP addresses in the SSM configuration window in the TCP IP Network category on the DNS tab You can remove these DNS servers but the SSM will not be able to resolve host names until you enter a new DNS server DNS and Static IP Addresses If you assigned a static IP address to the SSM and you want the SSM to recognize host names you must manually add a DNS server to the Network DNS tab Note If you initially set up the SSM to use DHCP and then change the configuration to use a static IP address the DNS server provided by DHCP will remain on the DNS tab You can remove or change this DNS server 1 On the Network View double click the SSM and log in if necessary 2 The SSM Configuration window opens Select TCP IP Network from the SSM configuration categories 114 Intel Storage System Software User Manual Managing the Network 3 Click the DNS tab to bring it to the front shown in Figure 86 Module TCPAP TCP Status DNS Routing Communication E Storage Time DNS Domain Name 3 SSM Administration DNS Servers in order j g8 SNMP K fA Reporting 10 10 10 1 10 10 10 20 Add r5DNS Suffixes in order finance companyname com Figure 86 Adding DNS Servers Adding the DNS Domain Name Add
347. pshot Schedule schedu le P rima ry Time Zone Mountain Standard Time setup Start At 05 11 2004 02 23 58 PM Remote Z Recur Every j1 setup MASetup Remote Setup Management Group Transaction_Data Volume Name Mastercard Snapshot Name Schedule Name Number Thresholds for Primary Snapshots Size 2 0 GB Hard Threshold 2 0 GB 7 Hard and soft thresholds Soft Threshold 2 0 lop will be applied to the volume Retention for Primary Snapshots Retain Maximum Of 2 Snapshots Retain Snapshots For Cancel Figure 247 Creating a New Remote Snapshot Schedule Intel Storage System Software User Manual Remote Copy Remote Snapshot Schedule The time zone displayed in the Remote Snapshot Schedule area is the time zone set on the SSM through which you are logged in to the management group Best Practice Set all SSMs in the management group to the same time zone Reset the management group time before creating a remote snapshot schedule For detailed information see Resetting the Management Group Time on page 181 1 Select a start date and time for the schedule 2 Optional Select a recurrence interval for the schedule Configuring the Primary Volume and Snapshots 1 On the Primary Setup tab specify the hard threshold and the soft threshold for the primary snapshots 2 Specify the retention policy for the primary snapshots Configuring
348. ptional You can create multiple bonded interfaces each consisting of 2 or 4 physical interfaces Use the TCP IP tab to manage the network configurations for each network interface and to bond the network interfaces Identifying the Network Interfaces The SSM comes with two onboard Gigabit Ethernet ports These ports are named Motherboard Port0 and Motherboard Port1 and are labeled on the back of the SSM as listed in Table 10 In addition the SSM can include multiple add on PCI cards each with 2 or 4 Gigabit Ethernet or Fibre Channel ports Intel Storage System SSR212MA only These add on ports are named according to the card s slot and the port number such as Slot1 Port0 Table 10 Identifying the NICs in the Motherboard Motherboard Interfaces Where labeled What the label says TCP IP Network Configuration Name Motherboard Port0 Motherboard Port1 Category in the Console e TCP IP tab e TCP Status tab Description Intel Gigabit Ethernet 90 Intel Storage System Software User Manual Managing the Network Table 10 Identifying the NICs in the Motherboard Motherboard Interfaces Configuration Interface Name Motherboard Port1 Motherboard PortO Label on the back of the SSM NICs 1 amp 2 Table 11 Identifying Add on NICs Add on Interfaces Where labeled What the label says TCP IP Network Configuration Name Slot1 Port0 Slot1 Port1 and so on Catego
349. quirements for Volume Lists h iu kk kk kk KK Ak kk kk KAK A AR 287 Planning Volume LISTS iy n das A sial ninari akan aa Hinda h n k saa a x k san Wn ahaa ra Ra qadr an hides 1al k r n ka 287 Creating a Volume List kek kk kk kK kek K k k KK KK k KAK KAK Kr kk lA 287 Adding Volumes to the Volume List EEuE Ek kk kek kk kk kk KRA ARK 288 Adding Authentication Groups to the Volume List ke 289 Completing the Volume List kk ek ek kek k a KK KK rk K KK ke 290 Editing a Volume LIST j a i kur en axana ya en ana kak anda a Hun WARA R k a WEKA A oat eterna 290 Opening the Volume List to Edit kk kk kk kek kek kk k k KAK 290 Editing Volume Permission Levels u kk kk kk kK KK K RA 291 Changing Authentication Groups in a Volume List EEeeL 292 Removing a Volume from a Volume List u kk kk kk kk k 292 Del ting a Volume LISE ms dl ll kir nan ca a iy nr ee eee ee Aq Hud P ee 293 Selecting an Authentication Group from the List keke 293 selecting a Volume List from the List kk thenacintasanites 293 Chapter 16 Feature Registration l L L L ELLEE EEE kk kk kake kk E kk kK k KK KK AKA 295 Add On Features and Applications Registration Overview Eii kez 295 Intel Storage System Software User Manual xi Contents Evaluating Features MA ANAL A LAE EEEEE
350. r or a Fibre Channel host You can configure authentication groups to use one two or all three modes if desired When creating an authentication group you choose the mode and level of client access you want Choices are e iSCSI Authentication based on the initiator node name single hosts or CHAP based authentication single or multiple hosts e EBSD Hosts with specific subnets and masks or hosts with all subnets and masks e Fibre Channel Hosts with specific World Wide Port Names Intel Storage System SSR316MJ2 only Controlling Client Access to Volumes Client Access and iSCSI Client access using iSCSI can be authenticated via the initiator node name single host or via CHAP Challenge Handshake Authentication Protocol which can support single or multiple hosts Note Our iSCSI terminology is based on the MS iSCSI Initiator terminology Configuring Authentication Groups for iSCSI When configuring client access using iSCSI you create an authentication group that allows iSCSI access The New Authentication Group window with the iSCSI tab is shown in Figure 184 New Authentication Group New Authentication Group Name CreditTransAG Description Volume List No Volume List iscsi EBSD Fibre Channel v allow access via iSCSI Authentication CHAP not required Initiator Node Name CHAP required Figure 184 Creating a New Authentication Group fo
351. r a volume changes the access rights for the authentication groups that connect to that volume Warning Before editing the volume list stop any applications from accessing volumes for which you are restricting permissions 1 In the Edit Volume List window on the volumes tab select the volume or snapshot for which you want to edit the permissions 2 Click Edit Permission Level The Edit Volume in Volume List window opens shown in Figure 206 Edit Volume in Volume List Edit Volume in Volume List Volume_List_0 Volume Name Permission Level No Access Read Access Read and Write Access Fibre Channel LUN Cancel Figure 206 Editing Permissions on a Volume 3 Change the permission level 4 Click OK when you are finished The Edit Volume List window opens 5 Click OK when you are finished editing the volume list The Tab View opens Select the Volume Lists tab shown in Figure 207 to review your changes Intel Storage System Software User Manual 291 Controlling Client Access to Volumes Changing Authentication Groups in a Volume List Removing authentication groups from a volume list Note For Fibre Channel associations you can also change the LUN number if necessary Prevents the associated application servers from accessing the volumes in that list e Is a prerequisite for deleting the volume list Warning Before editing the volume list stop any applications from acce
352. r iSCSI Access Planning iSCSI access requires planning how you want to configure authentication Single host with or without using CHAP e Multiple hosts with 1 way or 2 way CHAP 272 Intel Storage System Software User Manual Controlling Client Access to Volumes Planning iSCSI and CHAP CHAP is a standard authentication protocol The Storage System Software supports no CHAP 1 way CHAP or 2 way CHAP CHAP Glossary Target secret The target secret is required It is used in both 1 way and 2 way CHAP when the target volume challenges the iSCSI initiator e Initiator secret The initiator secret is optional It is used in 2 way CHAP when the iSCSI initiator challenges the target volume How CHAP Works No CHAP Authorized initiators can log in to the volume without proving their identity The target does not challenge the client e 1 way CHAP Initiators must log in with a target secret to access the volume This secret proves the identity of the initiator to the target 2 way CHAP Initiators must log in with a target secret to access the volume as in 1 way CHAP In addition the target must prove its identity to the initiator using the initiator secret This second step prevents target spoofing 1 Challenging for the target secret nitiator Target volume a 1 way CHAP 4 Challenging for the target secret 5 Challenging for the initiator secret initiator ag Marget volume
353. r remote snapshots that minimizes the potential for dat Production Application Serer Primary Volume Primary Snapshot Production Site 1 Primary Primary Snapshot Snapshot Production Application Primary Volume 1 Volume Remote Remote Primary Snapshot 1 Snapshot 2 Snapshot Backup Site Production Site 2 Figure 263 Restoring from Tape Backup a loss Any data written to the primary volume since the most recent remote snapshot was created will be unavailable if the primary volume is unavailable Consider how much data you are willing to lose in the event of an emergency and set the recurrence for creating remote snapshots accordingly Intel Storage System Software User Manual 377 Sample Remote Copy Configurations If you do not want a large number of remote snapshots to accumulate on your remote volume you can use more than one remote snapshot schedule each with different retention policies For example suppose you want to create remote snapshots every 4 hours to ensure that no more than 4 hours worth of data is lost in an emergency In addition you want to retain 1 week s worth of remote snapshots Retaining 4 hour snapshots for 1 week can result in the accumulation of over 40 remote snapshots Another approach would be to create 2 remote snapshot schedules for the volume One schedule to create remote snapshots every 4 hours but only retain the most recent 3 remote snapshots This will
354. r removing the SSM from data storage activities Remove all snapshots and volumes from the cluster containing the SSM See Deleting a Snapshot on page 259 and Deleting a Volume on page 239 Remove the SSM from any cluster to which it belongs See Removing an SSM from a Cluster on page 213 Stop the manager on the SSM if it is running a manager You may want to start a manager on a different SSM to maintain quorum and the best fault tolerance See Stopping a A Manager on page 183 Removing an SSM With a License Key If you have registered the SSM for add on features the license key is saved on the SSM when you remove it from the management group That key remains valid when you re add that SSM to a management group If you have backed up the configuration as described in Backing Up a Management Group Configuration on page 186 the license key is saved in the binary file used to restore the management group Removing the SSM 1 Log in to the management group from which you want to remove an SSM 2 Select the SSM to remove 184 Intel Storage System Software User Manual Working with Management Groups 3 Right click and select Remove from Management Group A confirmation message opens 4 Click OK The SSM is removed from the management group and moved to Available status Backing Up a Management Group Configuration Note Intel Storage System Software User Manual Use Backup Con
355. ractices Use remote snapshots in conjunction with local synchronous volume replication Using remote snapshots alone any data written to the primary volume since the most recent remote snapshot was created will be unavailable if the primary volume is unavailable However you can lessen the impact of primary volume failure by using synchronous volume replication Volume replication allows you to create up to 3 copies of a volume on the same cluster of SSMs as the primary volume The only limitation is that the cluster must contain at least as many SSMs as replicas of the volume Replicating the volume within the cluster ensures that if an SSM in the cluster goes down replicas of the volume elsewhere in the cluster will still be available For 3 way replication up to 2 SSMs can fail For detailed information about volume replication see the chapter on volumes in the LeftHand SAN User Manual for details Example configuration 374 This example illustrated in Figure 260 uses 3 SSMs per cluster However this scenario can use any number of SSMs Information about creating clusters and volumes can be found in the LeftHand SAN User Manual In the production location create a management group and a cluster of 3 SSMs Create volumes on the cluster and set the replication level to 2 e Configure the production application server to access the primary volume See the EBSD User Manual for instructions about configuring EBSD clients
356. rage 2 Select the Storage configuration category 3 Click the Disk Setup tab to bring it to the front as shown in Figure 63 Any drive bays that do not contain disks are labeled Off or Missing in the Status column Disks that have been inserted in the SSM but not yet added to RAID are labeled Uninitialized in the Status column Note The disks are labeled 1 through 16 Intel Storage System SSR316MJ2 or 1 through 12 Intel Storage System SSR212MA in the Disk Setup window and correspond with the disk drives from left to right starting on the left when you are looking at the SSM Disk Setup Tab for the Intel Storage System SSR3816MJ2 For the Intel Storage System SSR316MJ2 the drives are labeled 1 through 16 in the Disk Setup window and correspond with the disk drives from left to right when you are looking at the front of the Intel Storage System SSR316MJ2 as shown in Figure 64 The physical drive bays are numbered from 0 through 15 Table 6 Relationship of Software Disk Display Numbering to Hardware Drive Bay Numbering in the Intel Storage System SSR316MJ2 Disk Numbering in Disk Setup Tab Drive Numbering on Physical System Disk 1 Drive 0 Disk 2 Drive 1 Disk 3 Drive 2 Disk 4 Drive 3 Disk 16 Drive 15 Module w Time TCP IP Network Sn SSM Administration gi SNMP a Reporting RAID Setup Disk Setup Disk Model Seri
357. rd Threshold 8 GB Replication Priority Availability Cluster TransData05 Soft Threshold 8 GB Type Primary Checksum Data No Auto Grow Off Created by Script No Status Normal Description Figure 173 Volume Tab View 3 Click the Snapshots tab to bring it to the front 4 From the Tasks menu select New Snapshot The New Snapshot window opens shown in Figure 174 246 Intel Storage System Software User Manual Working with Snapshots New Snapshot New Snapshot Snapshot Name Snapshot_U Description Cluster Replication Level Replication Priority Size Hard Threshold Soft Threshold Auto Grow Checksum Data Figure 174 Creating a New Snapshot 5 Type a name for the snapshot Names are case sensitive They cannot be changed after the snapshot is created 6 Optional Type in a description of the snapshot 7 Optional Change the hard and soft thresholds for the snapshot Note The hard threshold of the snapshot becomes the hard threshold of the writable volume and defines the amount of space allocated for changes to the original volume Note Setting the hard threshold smaller than the size of the original volume allows you to create snapshots that require less space on the cluster See Managing Capacity Using Volume and Snapshot Thresholds on page 243 8 Click OK when you are finished The Snapshots tab opens with the new snapshot listed Th
358. rds gt Wizard Launch Pad 10 Intel Storage System Software User Manual Getting Started 29 The installed storage system should be listed by host name in the main window area of the Console The Wizard Launch Pad should also be displayed Select Create Volume Wizard to create a volume Intel Storage System Console File Find Tasks View Help a Available SSMs Wizard Launch Pad Welcome to the Wizard Launch Pad The Wizard Launch Pad provides wizards for common tasks to get you started Find SSMs Wizard ee The Find SSMs Wizard finds SSMs on your network Create Volume Wizard 5 The Create Volume Vizard creates a new volume Access Volume Wizard z n The Access Volume Wizard creates access privileges for a A volume Available SSMs lanageme These SSMs are available for u Z Show Launch Pad on startup Name This Wizard Launch Pad and the wizards are available via the Help menu oftware Version 30 Click on Next to continue Create Volume Wizard Welcome to the Create Volume Wizard This wizard helps you Create a volume for the first time or Add another volume to an existing management group Before you start this wizard you must Discover your SSMs on the network Run the Find SSMs Wizard You can exit the wizard at any time by clicking Cancel To continue click Next Intel Storage System Software User Manual 11 Getting Started 31
359. re User Manual Using the EBSD Driver for Linux ebsd 6 x xx xxxx 2 4 21 4 ELsmp i386 rpm 3 Configure the driver See Configuring the EBSD Driver for Linux on page 325 Querying An Existing RPM Package To determine whether an RPM package is installed run rpm q ebsd For example rpm q ebsd would return ebsd 6 x xx xxxx 1 To list the files in an RPM package run rpm ql ebsd For example rpm ql would return opt Storage_System Storage_System_Software 6 1 4 ELsmp Drivers EBSD 2 4 21 opt Storage_System Storage_System_Software 6 1 Drivers EBSD 2 4 21 4 ELsmp etc t Storage_System Storage_System_Software 6 1 Drivers EBSD 2 4 21 ismp etc ebsd conf sample v O se pk t Storage_System Storage_System_Software 6 1 Drivers EBSD 2 4 21 ssmp init d a O 1 O N t Storage_System Storage_System_Software 6 1 Drivers EBSD 2 4 21 ismp init d ebsd Xa O J O opt Storage_System Storage_System_Software 6 1 Drivers EBSD 2 4 21 4 ELsmp license opt Storage_System Storage_System_Software 6 1 Drivers EBSD 2 4 21 4 E smp modules opt Storage_System Storage_System_Software 6 1 Drivers EBSD 2 4 21 4 ELsmp modules ebsd o opt Storage_System Storage_System_Software 6 1 Drivers EBSD 2 4 21 4 ELsmp readme opt Storage_System Storage_System_Software 6 1 Drivers EBSD 2 4 21 4 ELsmp sbin opt Storage_System Storage_System_S
360. re finished The snapshot Tab View opens shown in Figure 176 on page 248 Intel Storage System Software User Manual 251 Working with Snapshots Manually Copying a Volume from a Snapshot Once you have mounted the snapshot on a host you can do the following Copy the snapshot to a read write volume Back up the data Mounting the snapshot on a host 1 Create an authentication group for the client that you want to mount the snapshot on See Creating an Authentication Group on page 279 2 Create a volume list for the snapshot and configure the snapshot for read write access See Creating a Volume List on page 287 3 Configure client access to the snapshot volume Accessing the snapshot as a source volume for data mining and other data use as a source volume for creating backups for data and file system preservation before upgrading software for protection against data and file system corruption for file level restore without tape or backup software Creating Snapshot Schedules Using the Console you can schedule recurring snapshots Recurring snapshots can be scheduled in a variety of frequencies and with a variety of retention policies Note Scripting snapshots can also take place on the client side Scripted snapshots offer greater flexibility for quiescing hosts while taking snapshots and for automating tasks associated with volumes and their snapshots Scripting of snapshots is an add on fea
361. re finished configuring the authentication group Configuring EBSD 1 On the EBSD tab shown in Figure 195 select the check box to allow access via EBSD New Authentication Group Name CreditTransAG Description Volume List No Volume List iSCSI EBSD Fibre Channel j Allow access via EBSD Authentication Hosts with the following subnets and masks Subnet Add Edit Delete Hosts with all subnets and masks Cancel Figure 195 Configuring EBSD for New Authentication Group Authenticate Hosts with Specific Subnets and Masks 1 In the Authentication box select Hosts with the following subnets and masks 2 Click Add The Add Subnet and Mask window opens shown in Figure 196 282 Intel Storage System Software User Manual Controlling Client Access to Volumes Add Subnet and Mask x Subnet Mask 255 255 255 0 w Cancel Figure 196 Adding a Subnet and Mask for EBSD Host Authentication 3 Type in the subnet 4 Select the appropriate mask 5 Click OK 6 Optional Repeat for additional subnets and masks Authenticate Hosts with All Subnets and Masks 1 In the Authentication box select Hosts with all subnets and masks Table 51 Choosing the Level of Access for Hosts using the EBSD Driver Authentication Method What Happens No hosts No application server gains
362. referred Which Physical Interface is Active When the NIC aggregation bond is created if both NICs are plugged in both interfaces are active If one interface fails the other interface continues operating For example suppose Motherboard Port0 and Slot1 Port0 are bonded in a NIC Aggregation bond If Motherboard Port0 fails then Slot1 Port0 remains active Once the link is fixed and Motherboard Port0 is operational it becomes active again Slot1 PortO remains active Table 17 SSM NIC Aggregation Failover Scenario and Corresponding NIC Status Example Failover Scenario NIC Status 1 NIC aggregation bondO is created Bondo is the master logical Motherboard Port0 and Slot1 Port0 are interface both active e Motherboard Port0 is Active e Slot1 PortO is Active 2 Motherboard Port0 interface fails e Motherboard Port0 status becomes Because NIC aggregation is Passive Failed configured Slot1 Port0 continues e Slot1 PortO status remains Active operating 3 Motherboard Port0 link failure is e Motherboard Port0 resumes Active repaired status e Slot1 PortO remains Active Summary of NIC States During Failover Table 18 shows the states of Motherboard Port0 and Slot1 Port0 when configured for NIC aggregation Table 18 NIC Status During Failover with NIC Aggregation Failover Status Status of Motherboard PortO Status of Slot1 Port0 Normal Operation Preferred No Status
363. rements for Using a Virtual Manager l E Ek kk Ak KK KA 192 Configuring a Cluster for Disaster Recovery EEcE kk kk kk k kk k s 195 Best Practice TT nea ee a oe eee ery ere eee ee 195 COMMQUPATION Steps ix lk l dia biai bak dak kar aa kenin a balan WELA G han b nar ka b Ha naka vate 195 Configuring a Virtual Manager CiiEEE kk kk kk ek Ke ka kk K k kk KAKA kK KA 197 Adding a Virtual Manager iii EEE kk k KAK KAK KA KA KAK AK KA KRA 197 Starting a Virtual Manager to Regain QUOFrUm iEiE kek kek kek kek 198 Starting a Virtual Manager uiE kk kk kk keke kk K x kK k kk KH 199 Stopping a Virtual Manage i i ikk mn kilin dn ienan Mbi E kak Ek HE k N WAR bl Ewan BURG HAA HA 200 Removing a Virtual Manager iiiudEEEE kk kk kk kK kk A KA KA KAK KA YA 200 Chapter 11 Working with Clusters A E EEdlELE kk kkkkkk kak k kk kk kk KA AKA K KK KK nnman 201 Mixing SSMs of Different Capacities in Clusters EEEEEiE Ek kk 201 Using HorSpar s meer reer eee gt _emaaeml r Ka ee ee 201 Requirements for Hot Spares 0 cccceeecceeceeeeeeceeeeesaeeeeeeaaeeseeseeeeeeeesaaaeeesssaeeseneeeaeees 202 How a Hot Spare Works eee eee ee ee eer ee ee eee 202 Clusters and iSCSI ssacncicedancernatiaacteanty temmeieanciehangsearenaasorerseadencasanth reaps eacetauaquibaretae KA KK KK kk KH 203 iSCSI Failover and Virtual P senscia la
364. remote volume in the process of creating a remote snapshot e Creating a new volume and selecting the Remote radio button on the New Volume dialog When a remote volume is created the license evaluation period begins on both the primary and remote SSMs For example suppose the primary volume is on Cluster 1 You create a remote snapshot of that primary volume to Cluster 2 SSMs in both clusters show the clock ticking for the license evaluation period Read the Remote IP Copy User Manual before working with these features Backing Out of the License Evaluation Period If you decide not to purchase the Remote Data Protection Pak you must delete any remote volumes you have configured The features you are evaluating dictate the steps required to safely back out of the evaluation configuration particularly if you want to save any volumes or snapshots in the test configuration 1 Back up any volumes you plan to retain Table 55 describes additional steps to safely back out of the Remote Data Protection Pak evaluation Intel Storage System Software User Manual 299 Feature Registration Table 55 Safely Backing Out of Remote Data Protection Pak Evaluation Feature Being Evaluated Steps to Back Out Remote snapshots removing data Delete any remote snapshots from the remote target Delete the remote volume Remote snapshots retaining the Make the remote volume into a primary volume data on the remote target Disassociat
365. rest pre computed increment that is greater than the initial setting Automatic Auto Grow Auto Grow Increments Figure 167 Example Automatic Auto Grow Chart 230 Intel Storage System Software User Manual Working with Volumes Creating a Volume A volume resides on the SSM s contained in a cluster 1 Log in to the management group for which you want to create a volume The management group Tab View opens 2 Select the cluster on which you want to create a volume The cluster Tab View opens 3 Click the Volumes tab The Volumes tab opens shown in Figure 168 File Find Tasks View Help G Available SSMs I Transaction_Data zz a TransData05 Boulder 2 Boulder 1 olumes ta Details Volumes SSMs Disk Usage Usage Graphs iSCSI Remote Snapshot Name Replication Level Size Hard Threshold Soft Threshold Figure 168 Viewing the Volumes Tab 4 From the Tasks menu click New Volume The New Volume window opens shown in Figure 169 See Table 36 on page 225 for detailed information about setting volume parameters See Requirements for Volumes on page 225 for a detailed description of each item Intel Storage System Software User Manual 231 Working with Volumes New Volume New Volume Type Primary O Remote Volume Name Volume_O Description Cluster TransData05 Replication Level 2 Way Replication Pri
366. ring a Direct Connection Between the SSM and an EBSD Hosi 119 Configuring SSM Communication EEE kk kk kk kk kek KK kk kk KRI KH 120 Selecting the Interface Used by the Storage System Software 121 Updating the List of Manager IP Addresses i kk kk kk kk KH 122 Chapter 5 Setting the Date and Time ccsssssseeeeeeeeeseneeeeeeeeeeneeseeeeeeeeeeeeeeeees 123 Reset Management Group Time uuu Ek kk kk kK kek kK KA kK k kk 123 Getting NBS ese ats sae De eee N En e e ee 123 Setting the SSM Time Zone 0 eeecceceeeseceeeeeeeeeeeeeeaeeeeeeeaaeeeseaaaeeeeseeaaaaeeseaaaeeessenesestensaneees 124 Setting SSM Date and TIME 4t 1n bila an nil mn kinar bilal ina danan h s b man b na EE SERE n k kula t ERR 124 Setting the Date and Time iuEEmm kek kk kk keke kK k kK k kk 125 Using NIP TC aqaontaragaainnsaaederaastaesanns E EE 126 Editing NTP Servers eee eer mee ene a a a eaa dans Wan k keban nae k aaay 127 Chapter 6 Administrative Users and Group cccccceeeeeeseeeeeseeeeeeeeeeeeeeeeeeeeeees 129 Getting THEre sete tee cts caso niaar rna a recess Ree Ea a Eai aaar Edea EEA E En ER 129 Managing Administrative Groups EE E kk kk kk kk kk K k kK KAK KK KA acne 130 Default Administrative Groups E EEEEE kk kk ek k kk K k kk KK KK KA KAK 130 Adding Administrative Groups
367. rka ke kK K k KK KAK KAR KK 126 Figure 94 Viewing the List of NTP Servers l iiiEE kk kk k ke kk K k kk 127 Figure 95 Editing an NTP Server sccccsssccdcn ceed acaeaysessctecqey ce aacveneancanseccetevecctniaieenessal kK k KK KA RR 127 Figure 96 SSM Administration Groups Tab ccccsccceeeeseeeeeeeeeeeeeeeeeeeeeeeeeaaaeeeeenseeeeeeeeeees 129 Figure 97 Adding an Administrative Group EiEE kk kk kk kk k kk K k kk 131 Figure 98 Adding an Administrative User to a GIrOUD EEEE Eke kk k 132 Figure 99 Adding Permissions to Administrative GIrOUDS EEi keke 133 Figure 100 Sorting Administrative Groups sicciccccsscsntsssestdceacetnestxensctcoedidecesnderentienssaceehieesannees 134 Figure 101 Editing an Administrative GIOUD EEE Ek kk kk kek kk KK k k 135 Figure 102 Adding Administrative S rS LLLu EEE kk kK KAK KK KAKA 136 Figure 103 Adding an Administrative Ser E EEE kk kk KK KK KAKA 137 Figure 104 Adding a Group to an Administrative USser EEiEEE ene 137 Figure 105 Sorting Administrative S rS E iE kk kk K k kk K k ke 138 Figure 106 Editing an Administrative Ser uuuuE EEE kk kk KK YA 139 Fig re 107 Using SNMP 4s i 5si s xata kila adi WER ra Ga bak e Sakan ree ke wan b w sla eee eee ee 141 Figure 108 Enabling the SNMP Ager kk ek kk k k kk KK KA kk 142 Figure 109 Adding an SNMP Client
368. roduct Read Write Primary ie i Primary Volume Volume 2 Storage Subr et Primary Primary Snapshot Snapshot 2 Production Site 1 Production Site 2 Figure 269 Configuration after Data Migration 386 Intel Storage System Software User Manual
369. ronized If they are not time synchronized then the snapshot schedule might run incorrectly Be sure to configure the correct time on the SSMs and then reset the management group time See Chapter 5 Setting the Date and Time Also see Resetting the Management Group Time on page 181 and Creating Snapshot Schedules You can create one or more snapshot schedules for a volume For example one schedule could be for daily snapshots intended for backup and recovery A second schedule could be for weekly snapshots used for data mining 1 Select the volume for which you want to schedule snapshots The volume Tab View opens 2 Click the Snapshot Schedules tab to bring it to the front 3 From the Tasks menu select New Schedule The New Snapshot Schedule window opens shown in Figure 179 Intel Storage System Software User Manual 253 Working with Snapshots New Snapshot Schedule New Snapshot Schedule Name Snap_Sch_ Description Snapshots Schedule Name Number rSnapshot Schedule Time Zone Greenwich Mean Time Start At 07 07 2005 12 19 20 AM j Recur Every j1 Thresholds for Scheduled Snapshots Size 8 0 Hard Threshold 3 0 Soft Threshold 3 0 Retention for Scheduled Snapshots Retain Maximum of 5 Snapshots Retain Snapshots For Figure 179 Creating a Snapshot Schedule 4 Type aname for the snapshots The name will be used with sequentia
370. rs configured for the cluster Remote Snapshot You must purchase the Remote Data Protection Pak to use remote snapshots beyond the 30 day evaluation period The Remote Snapshot tab lists details about any remote snapshots that have been created Detailed information about remote snapshots is available in the Remote Copy appendix See Viewing a List of Remote Snapshots on page 349 Editing a Cluster When editing a cluster you can change the description add or remove SSMs and change the hot spare designation of an SSM You can also edit or remove the virtual IP and iSNS servers associated with the cluster Prerequisite You must log in to the management group before you can edit any clusters within that group Getting There 1 Select the cluster you want to edit 2 From the Tasks menu on the Details tab select Edit Cluster The Edit Cluster window opens shown in Figure 159 210 Intel Storage System Software User Manual Working with Clusters Edit Cluster Edit Cluster General iSCSI Cluster Name Description SSMs Available SSMs in Cluster SSM IP RAID SSM IP RAID Boulder 3 10 0 33 18 RAID 0 Boulder 1 10 0 3313 RAID 0 Boulder 2 10 0 33 17 RAID 0 lt Add lt Add all Remove gt Remove All 29 Hot Spare None Hot Spare Time Out 0 Seconds canca Figure 159 Editing a Cluster Adding an SSM to an Exist
371. ry nithe kangale Description Intel Gigabit Ethernet e TCP IP tab e TCP Status tab Configuration Interface Name Slot1 Port0 Slot1 Port1 and so on Label on the back of the SSM Port A Port B Port C Port D The motherboard interfaces are labeled NICs 1 and 2 on the back of the SSM Figure 70 illustrates the Intel Storage System SSR316MJ2 Figure 71 illustrates the SSR212MA The PCI slots for add on interfaces are located to the right of the motherboard ports Motherboard Port 1 64 bit PCI Slot Motherboard Port 0 32 bit PCI Slots Figure 70 Network Interface Ports and Open PCI Slots on the Back of the Intel Storage System SSR316MJ2 Intel Storage System Software User Manual 91 Managing the Network EN 1Gb 1Gb i O Motherboard Port 1 Motherboard Port 2 32 bit PCI Slot Figure 71 Network interface Ports and Open PCI Slot on the Back of the Intel Storage System SSR212MA Adding Interfaces to PCI Slots You can add interface cards to the PCI slots located to the right of the motherboard NIC ports on the back of the SSM These interface cards can contain Ethernet or Fibre Channel ports The Intel Storage System SSR316MJ2 contains one open 64 bit 66 MHz PCI slot and two open 32 bit 33 MHz PCI slots The other three covered slots are occupied by Serial ATA cards The 64 bit PCI slot can hold a quad 4 port card The 32 bit slots can hold dual 2 port cards To distribute bandwidth
372. ry volume Remote Volume The volume that resides in the Remote Copy location where the remote snapshots are created The remote volume contains no data It acts as a pointer to tell the system where to make the copy of the primary snapshot It can be stored on the same cluster or a different cluster than the primary volume Remote Snapshot An identical copy of a primary snapshot The remote snapshot is located on the same cluster as the remote volume Remote Copy Pair The primary volume and its associated remote volume Failover The process by which the user transfers operation of the application server over to the remote volume This can be a manual operation or it can be scripted Acting Primary Volume The remote volume when it assumes the role of the primary volume in a failover scenario Failback After failover the process by which the user restores the primary volume and turns the acting primary back into a remote volume Failover Recovery After failover the process by which the user chooses to fail back to the primary volume or to make the acting primary into a permanent primary volume Synchronize The process of copying the most recent snapshot from the primary volume to a new remote snapshot On failback synchronization is the process of copying the most recent remote snapshot back to the primary volume The Console displays the progress of this synchronization Intel
373. s configured with the same user name and password by double clicking those SSMs in the Network view If you try to log in to an SSM that uses a different user name or password the Log In window opens shown in Figure 30 Log in to SSM Log in to SSM Golden 2 10 0 33 17 Trying the user name and password from the following SSM s failed SSM Golden 1 admin user name or password was incorrect User Name Password Cancel Figure 30 Automatic Log In Fails because SSM User Name and Password are Different 1 Type the correct User Name and Password 2 Click Log In Closing the SSM Configuration Window Log out of the SSM to close the SSM configuration window or click Done to close without logging out Logging Out of the SSM Log out to prevent access to an SSM without closing the Console This provides security if you are leaving the management workstation but do not want to close the Console 1 When the SSM Configuration window is open click Log Out as shown in Figure 27 and Figure 28 The Network view opens and the SSM you logged out of no longer displays the logged in icon the pink square Note If you are logged in to multiple SSMs you need to log out of each SSM individually Intel Storage System Software User Manual 41 Working with Storage System Modules Closing the SSM Configuration Window without Logging Out Clicking Done on the SSM configuration window returns the Cons
374. s Available 21 615 143 936 bytes cene Provous_ J J rsen 13 The software will take several minutes to load J Intel Storage Server Console Installer I Installing Java Runtime Environment 4 Intel Storage System Software User Manual Getting Started 14 Click on Done once the software completely loads 2 Intel Storage Server Console Installer The Intel Storage Server Console has been successfully installed to C Program Filesintel Storage Serverul Press Done to quit the installer zz 15 Close out of the browser window of the Resource CD If you selected Yes to run the Console the Wizard Launch Pad will display Select Find SSMs Wizard from the Wizard Launch Pad Note Ensure that you have set up an IP address on your storage system before you run the Find SSMs Wizard Instructions for setting up an IP address and password are available from the Intel Storage System Quick Start User s Guide that shipped with your Storage system Wizard Launch Pad Welcome to the Wizard Launch Pad The Wizard Launch Pad provides wizards for common tasks to get you started Find SSMs Wizard amp The Find SSMs Wizard finds SSMs on your network Create Volume Wizard w The Create Volume Wizard creates a new volume Access Volume Wizard The Access Volume Wizard creates access privileges for a volume Z Show Launch Pad on startup This Wizard Launch
375. s you must reconfigure at least one interface using the Configuration Interface to access the SSM See Configuring a Network Connection on page 310 Disabling a Network Interface 1 Select from the list on the TCP IP window the interface to disable 2 Click Edit The Edit TCP IP Configuration window opens shown in Figure 74 3 Click Disable Interface 4 Click OK A confirmation message opens If you are disabling the only interface the message warns that the SSM may be inaccessible if you continue 5 Click OK If SSM is in a Management Group If the SSM for which you are disabling the interface is a manager in a management group a window opens which displays all the IP addresses of the managers in the management group and a reminder to reconfigure the application servers that are affected by the update Configuring a Disabled Interface If one interface is still connected to the SSM but another interface is disconnected you can reconnect to the second interface using the Console See Configuring the IP Address Manually on page 94 If both interfaces to the SSM are disconnected you must attach a terminal or PC or laptop to the SSM with a null modem cable and configure at least one interface using the Configuration Interface See Connecting to the Configuration Interface on page 307 Intel Storage System Software User Manual 109 Managing the Network TCP Status Review the status of the TCP interfac
376. s 31 Figure 17 Icon Showing RAID is Normal kk kk kk kk k ke 32 Figure 18 Icon Showing RAID is OT kk kk kk kk kk Kek kk K ke kk KK kk kK 32 Figure 19 Icon Showing RAID is Degraded uiE keke keke kk kk KH 32 Figure 20 Icon Showing RAID is Rebuilding E Ek kk kk kk kk kk kek 33 Figure 21 Management Group Information Tab u kk kek 33 Figure 22 Availability Tal kk kk kk ee A KK KA RIK KAK A A KA RR 33 Fig re 23 Logging in to an SS V s xi Asli nus oal k e kya k l Ri Ek DAL ERN Ma sites Ku HEKA nA Kun d ka N b kak G H 34 Figure 24 Automatic Log in Failure Eu EEE kk kk kk KK KAK kk KK KAK KAR R 34 Figure 25 SSM Configuration Window uEELi kk kk kek kk K k K kK kk K 35 Figure 26 SSM Copy Configuration Wi ndOW i kek kk kk kk kk kk kk 36 Figure 27 SSM configuration window for the Intel Storage System SSR316MJ2 39 Figure 28 SSM configuration window for the Intel Intel Storage System SSR212MA 39 Figure 29 Logging in to an SS V sca icceedexctnsssveleevdess kk doses sted sncanc decades KK KAK KK KK KAK KA 40 Figure 30 Automatic Log In Fails because SSM User Name and Password are Different 41 Figure 31 Pink Square Indicates Logged In StatUS EEuE EEE kek 42 Figure 32 Viewing the Module Configuration Category cccccccceccceeeeeneeeeeeecceeeeeeeeeeeeeenaeee
377. s as a backup To ensure that Remote Copy continues to operate roll back the primary volume as follows 1 Preserve the current state of the primary volume that you want to roll back by creating a one time manual remote snapshot of it 2 Roll back the volume Remote snapshots remain intact 3 After the primary volume is rolled back scheduled creation of remote copies will continue Using Remote Copy for Data Migration Remote Copy allows a one time migration of data from one application server to another without interrupting the production application server This capability supports a number of uses such as data mining or content distribution 384 Intel Storage System Software User Manual Sample Remote Copy Configurations Achieving Data Migration You can use Remote Copy to make a complete copy of one or more volumes without interrupting access to the original volumes This type of data migration allows you to copy an entire data set for use by a new application or workgroup To copy data from one location to another simply create a one time remote snapshot of the volume To make the remote snapshot a read write volume make it into a primary volume Configuration for Data Migration To make a copy of a volume in a remote location configure a cluster of SSMs in the remote location with enough space to accommodate the volume See the example illustrated in Figure 268 Configuration Diagram Applicatior Workstat
378. s from being used unintentionally If an SSM is not in a management group the management group cannot use that SSM as a storage resource For example all of the SSMs in management group 1 can be pooled together for use by volumes in that group if you purchase the Scalability Pak upgrade To prevent a new SSM from being included in this pool of storage you would put it in a separate management group To contain clustering managers Within a management group one or more of the SSMs will act as the managers that control data transfer and replication This chapter discusses Managers Quorum Setting the management group time Setting the local bandwidth Backing up the management group configuration Requirements for Creating Management Groups When creating a management group you must configure the following parameters Working with Management Groups Management Group Requirement What it means Configure SSMs Before you create a management group you should configure all the SSMs for that management group When planning your storage remember that all SSMs in a cluster must be configured alike See Configuration Tasks on page 15 Log in to SSMs You must be logged in to the SSM to create a management group Starting a manager A management group must have at least one manager running So when you create a new management group the first SSM added to the group has the manager started automatically You
379. s information Editing a Management Group Note When editing a management group you can change the local bandwidth The local bandwidth setting controls the copy rate within the local management group Therefore it sets the data restripe rate for the management group If you use Remote Copy between two clusters within one management group local bandwidth will also control the remote copy rate For more information about setting the bandwidth for Remote Copy see the Remote IP Copy User Manual When Remote Copy is used to copy a snapshot from one management group to another the remote bandwidth setting of the management group containing the remote volume determines the rate per second that the manager will devote to copying data Setting or Changing the Local Bandwidth After a management group has been created you can edit the management group to change the local bandwidth This is the maximum rate per second that a manager will devote to non application processing such as moving data and synchronizing hot spare SSMs The default rate is 32768 KB 4 MB per second You cannot set the range below 2048 KB 256 KB Local Bandwidth Settings 178 The bandwidth setting is in KB kilobytes per second The industry standard for networking bandwidth is in bits per second bps Use the following table to convert megabits to kilobytes for setting the local bandwidth Table 33 Typical Network Types Network Type Bi
380. s support larger frame sizes keep the frame size at the default setting Note If you edit the frame size on a disabled or failed NIC the new setting will not be applied until the NIC is enabled or connectivity is restored Best Practice To avoid potential connectivity and performance problems with other devices on your network keep the frame size at the default setting If you decide to change the frame size set the same frame size on all SSMs on the network and set compatible frame sizes on all clients 112 Intel Storage System Software User Manual Managing the Network The frame size on the SSM should correspond to the frame size on Windows and Linux application servers Table 21 shows recommended SSM frame sizes and the corresponding frame sizes for Windows and Linux clients Table 21 Setting Corresponding Frame Sizes on SSMs and Windows or Linux Clients SSM Frame Size zz Linux p Frame 1500 Default 1542 Default 1500 Default 4046 4088 4046 8972 9014 8972 Frame sizes greater than 1500 bytes called jumbo frames can co exist with 1500 byte frames on the same subnet if the following conditions are met Every device downstream of the SSM on the subnet must support jumbo frames If you are using 802 1q virtual LANs jumbo frames and non jumbo frames must be segregated into separate VLANs Best Practice Change the speed and duplex settings while the SSM is in the Available mode and not i
381. s to bond The NICs that you select do not have to be consecutive NICs in the list m Module TCPAP TCP Status DNS Routing Communication L E Storage H Time ji EEE Name EZEZ MAC Mode IP Subnet MEA DE Lg SNMP E Reporting Motherboard Port1 Intel Co 00 07 Disabled 0 0 0 0 0 0 0 0 0 0 0 0 NIC Sloft PortO Intel Co 00 04 2 Static IP 10 0 11 255 255 10 0 1 254 NIC Slot1 Port1 Intel Co 00 04 2 Disabled 0 0 0 0 0 0 0 0 0 0 0 0 NIC Slot1 Port2 Intel Co 00 04 2 Disabled 0 0 0 0 0 0 0 0 0 0 0 0 NIC Slot1 Port3 Intel Co 00 04 2 Disabled 0 0 0 0 0 0 0 0 0 0 0 0 NIC New Bond it Delete Bond Figure 79 Selecting Motherboard Port0 and Slot1 Port0 for a New Bond 4 Click New Bond The Create Bond Configuration window opens shown in Figure 80 Intel Storage System Software User Manual 105 Managing the Network Create Bond Configuration Name Will be assigned Type active backup Y Description NA Mac Address NA IP Address 10 0 11 151 Subnet Mask 255 255 240 0 Default Gateway 10 0 1 254 Figure 80 Creating a NIC Bond 5 To create an active backup bond select active backup from the Type list or To create a NIC aggregation bond select 802 3ad from the Type list 6 Enter a static IP address for the bond The default value for the bond IP address is the IP address of one of the physical interfaces in t
382. s volume Disconnect any hosts before completing this change Volume CreditData05 in management group Transaction_Data is currently a primary volume When it is changed to a remote volume a snapshot will be created with the name below to save any data currently on the volume Do you want to make this volume a remote volume Snapshot Snapshot_1 Snapshot Description Figure 251 Creating a Snapshot Before Making a Primary Volume into a Remote Volume 5 Type a name for the snapshot that will be created This snapshot preserves any existing data on the volume 6 Optional Type a description for the snapshot 7 Click OK The snapshot is created and the volume becomes a remote volume The Edit Remote Volume window opens again with the editable fields enabled as shown in Figure 252 Intel Storage System Software User Manual 361 Remote Copy Edit Remote Volume Edit Remote Volume Type O Primary Remote Volume Name Description Created Cluster TransData_BkUp Replication Level None Replication Priority Size Hard Threshold Soft Threshold Auto Grow Checksum Data Figure 252 Finalizing the New Remote Volume 8 Optional Make any necessary changes to the new remote volume Making a Remote Volume Into a Primary Volume You can make a remote volume into a primary volume Changing the remote volume into a primary volume allows the backup application server
383. scribes the state of the interface See Table 14 for a detailed description of individual NIC status 110 Intel Storage System Software User Manual Managing the Network Table 19 Status of Information About Network Interfaces Column Description Frame Size Lists the frame size setting for the device Preferred For active backup bonds Indicates whether the device is set as preferred The preferred interface is the interface within an active backup bond that is used for data transfer during normal operation Editing the TCP Speed and Duplex You can change the speed and duplex of the 1000BASE T TCP interfaces Requirements If you change these settings you must ensure that BOTH sides of the NIC cable are configured in the same manner For example if the SSM is set for Auto Auto the switch must be set the same Ifyou edit the speed or duplex on a disabled or failed NIC the new setting will not be applied until the NIC is enabled or connectivity is restored Best Practice Change the speed and duplex settings while the SSM is in the Available mode and not ina management group Table 20 Setting SSM Speed and Duplex Settings SSM Setting Switch Setting Speed Duplex Speed Duplex Auto Auto Auto Auto 1000 Full 1000 Full 100 Full 100 Full 100 Half 100 Half 10 Full 10 Full 10 Half 10 Half 1 On the TCP Status tab select the interface you want to edit 2 Click Edit
384. ses Required k kk kk 333 Glossary for Remote CO isi xulas lanrlil lana dkin e MiR IL s kezi hak Ma sk MIn dewan n veka b dak REER 334 How Remote Copy Works b k hE dE keke kk kek kk kk kk k k kk KK kK kk KK KA KK KAK KK KK KK KH 335 Graphical Representations of Remote Copy E kk kk k kk kk K k kk KH 336 Remote Copy and Volume Replication EuEEE kk kek kek kk kk k 337 Uses for Remote COpy EE keke eke keke kek kek k kK K KK kk KK k K KK KK KK AK Kr KK HH 337 Benefits of Remote CoODy cerisier hala ancien silka kesk dika saza ka sala a S N AA ER a sixes Helb 9 kb An SA KAN kin 337 Planning for Remote CODY E kk kk kk Keke k kK kk k kK K k KK KAR KK KO 338 Planning the Remote Snapshot E Ek kek k kk K k kk 338 Using Schedules for Remote COpy E hte et kk kk agains 339 Planning the Remote Copy Schedule iEE kk kk kk kk kek k 339 Best Practices s klan kik ll aa kasan WENA bakan binin akan a b xaki na siw ban Ma sukan n b Ra Talana kaka bena k n 341 Scheduled Remote Copy Planning Checklist Eke 341 Working with Remote Snapshots cdccccsscncceecescatantansreaes kk kk kek kk kk KK kk KK KK kK Ak 342 Creating a Remote Snapshot E EEE kek kek kek kk K k kk KA KA 342 Getting There EEEE Ek kre kk ek k kk kk kk k ra kk kk kk kK k kk kk KK rk kk 343 Cr
385. shold 1 43 GB 35 83 Snapshot RemTest 20 GB 0 MB Hard Threshold VWritable OMB SOMB 0 Snapshot 551_Cred 20 GB MB Hard Threshold Writable MB MB 0 nw Oman Hot Spare Replication Level 2 VVay Replication Level 2 Way Replication Level 2 VWay ear j ERN tax Used and Max Full can temporarily exceed 100 during data migration Max Full for snapshots is vax Used Writable Max Used Hard Threshold Wrtable Hard Threshold Figure 157 Statistics for a Cluster Note Data migration referred at the bottom of the Disk Usage tab occurs during a snapshot deletion when snapshot data returns to top level or when moving an SSM into or out of an active cluster The usage table provides the following information 208 Intel Storage System Software User Manual Working with Clusters Table 34 Disk Space use Reported on Disk Usage Tab Column Heading Information Reported Space Space is block level raw space e Cluster e SSM Volume Snapshot Total raw space in the cluster Total raw space on the SSM Hard threshold of the volume Hard threshold of the snapshot and of the writable snapshot Max Used Maximum block level space ever written to Cluster e SSM Volume e Snapshot Total raw space ever used in the cluster Total raw space ever used on the SSM Total raw space ever used in the volume Total raw space
386. shots You can also create edit or delete snapshots from this tab See Chapter 13 Working with Snapshots for more information about snapshots Snapshot Schedules Tab Displays the name of the snapshot schedule the hard and soft thresholds set for the snapshots the actual schedule and any error that prevented a scheduled snapshot from taking place Hosts Tab Lists all EBSD hosts that have accessed the volume For EBSD hosts to retrieve the correct information for the volume enter the IP address of the host in Find By Module IP or Host Name No host information is displayed for iSCSI and Fibre Channel volumes Fibre Channel volumes may display FC Internal or the display may be blank iSCSI volumes display the SSM name that the iSCSI initiator is logged into Remote Snapshots Tab Displays the names of the primary and remote snapshots the management groups they reside in and the status of the copying from primary to remote Create a remote snapshot here or cancel one that is in progress Remote Snapshot Schedules Tab Displays the name of the remote snapshot schedule the hard and soft thresholds set for the remote snapshots the actual schedule and any error that prevented a scheduled remote snapshot from taking place Target Information Tab For iSCSI volumes displays the virtual IP address if configured and lists any iSNS servers For Fibre Channel volumes displays the Fibre Channel Port World Wide Name WWPN
387. sing the EBSD device If an application attempts to write to a disconnected or disabled EBSD device raw or file the application will hang Use these steps to unmount the EBSD disk 1 Execute the command umount For example umount mnt ebsd0 2 Run ebsdvm remove where the device you want to disconnect Remember device numbers can be from 0 63 This disconnects the SSM volume from the host device entry Disabling an EBSD Device 330 Disabling the EBSD device keeps the device from being accessed takes it offline saves the data on the device and maintains the device information in ebsd conf 1 Modify the etc ebsd conf file Set the enabled field for that device to false as shown in the sample entry below Sample Device Entry as Disabled Device PERE HEE ERE EE HEE HEE HHH Sample devic ntries deviceO type volume client_name myclient ip_bind 10 0 1 63 management_group my_mgtgroup auth_group public volume_name my volume 0 access_mode rw use_unicast true unicast_list 10 0 0 12 10 0 0 13 enabled false use_multicast false Intel Storage System Software User Manual Using the EBSD Driver for Linux Deleting an EBSD Device Deleting the EBSD device erases the volume s data from the SSM Warning Make sure the EBSD disks you plan to delete are NOT in use Deleting EBSD disks from the host and deleting volumes from the cluster removes all data stored in those volu
388. soft threshold at 485 GB Warning If the hard threshold is set lower than the volume size and the hard threshold is reached then other applications that are accessing the volume will hang until you increase the hard threshold In this scenario system resources will be exhausted Therefore if there are other volumes in the cluster accessed by other applications those volumes will hang as well even though those volumes hard thresholds have NOT been reached Managing the Volume Growth Capacity When you receive the alert that the soft threshold has been reached you take the following actions e Increase the volume size For our example above you increase the volume size by 20 percent to 600 GB e Increase the hard threshold by about 20 percent to 590 GB Increase the soft threshold to 585 GB See Editing a Volume on page 235 for information about changing the volume size and the soft and hard thresholds Over time as you near the capacity of the cluster you can increase the storage capacity of the cluster by adding more SSMs Note If you have file systems mounted on the host volume and you reach the soft or hard threshold deleting files from the volume does not create space on the SSM volume Using Auto Grow You can use auto grow to automatically increase the hard and soft volume thresholds by a specific amount Note Auto grow is also available in the application based scripting described in Chapter 14 Wor
389. ssing volumes for which you are restricting permissions or removing authentication groups 1 In the Edit Volume List window shown in Figure 205 select the Authentication Group tab 2 Add or remove authentication groups as required 3 Click OK when you are finished The Tab View opens Select the Volume Lists tab shown in Figure 207 to review your changes Removing a Volume from a Volume List Remove volumes from a volume list in preparation for deleting the volume list Warning Before deleting volumes from the volume list stop any applications from accessing those volumes you are removing 1 In the Edit Volume List window shown in Figure 205 on the volumes tab select the volume or snapshot you want to remove from the volume list 2 Click Remove 3 Click OK when you are finished The Tab View opens Select the Volume Lists tab shown in Figure 207 to review your changes Details i Managers Clusters 1 Authentication Groups Volume Lists Register Times Remote Snapshot Volume List Name Volumes Authentication aa Snapshot_O AG_AcctRec rem_test AG_TransDataRemote Volume_List_1 Volume_List_2 Figure 207 Viewing the Edited Volume List 292 Intel Storage System Software User Manual Controlling Client Access to Volumes Deleting a Volume List Deleting a volume list removes that list from the management group Prerequisites e Remove all volumes from the volume list Remove all
390. st Gateway The IP address of the SSM Netmask 255 255 255 255 Intel Storage System Software User Manual 119 Managing the Network 3 On the EBSD host computer use the command line to configure the host computer s Ethernet interface as follows Table 25 EBSD Host Network Interface Settings interfaca Santing Value IP Address The IP address of the EBSD host Subnet Mask The same subnet as the SSM Default Gateway The IP address of the SSM 4 On the EBSD host computer use the command line to add a route to communicate with the SSM Table 26 EBSD Host Route Settings ae al Value Device The network interface you configured in step 3 Net The IP address of the SSM Gateway The IP address of the SSM Netmask 0 0 0 0 Note If the network interfaces on the SSM and EBSD host are both 10 100 NICs then you must use crossover connection cables Configuring SSM Communication Use the Communication tab to configure the network interface used by the SSM to communicate with other SSMs on the network and to update the list of managers that the SSM can communicate with 120 Intel Storage System Software User Manual Managing the Network Module Tcpap TCP Status DNS Routing Communication E Storage H Time Storage Server Software Interface bond0 Ju SSM Administration H gi SNMP Reporting Communications Mode Multicast Off Unicast On Ma
391. startup This Wizard Launch Pad and the wizards are available via the Help menu Figure 1 Viewing the Wizard Launch Pad Find SSMs Wizard The Find SSMs Wizard guides you through the process for finding SSMs on your network See also Finding Storage System Modules on the Network on page 20 Create Volume Wizard The Create Volume Wizard guides you through the process for creating a volume See also Chapter 12 Working with Volumes Access Volume Wizard The Access Volume Wizard guides you through the process for configuring client access to your volumes See also Chapter 15 Controlling Client Access to Volumes 16 Intel Storage System Software User Manual Getting Started Console Main Window The Console main window presents a two pane view as shown in Figure 2 Network View The top pane displays the SSMs on the network The graphic display indicates the configuration of management groups clusters and volumes Tab View The bottom pane presents information about and functions associated with the selected item in the Network View Other features of the Console include the following Menu Bar The menu bar provides access to the following menus Find Use to find modules on the network Tasks Access all available storage configuration tasks tasks are also accessible through right click menus and from the Tasks button on the Tab View pane View Change the Network View in t
392. t create the file as root or root must change permissions for dev cua0 in order to create the config file in etc 1 Create the etc minirc SSM with the following parameters Begin SSM configuration Machine generated file use minicom s to change parameters pr port dev cua0 pu baudrate 19200 pu bits 8 pu parity N pu stopbits 1 pu mautobaud Yes pu backspace DEL pu hasded No purtscts No pu xonxoff Yes pu askdndir Yes End SSM configuration Start xterm as follows xterm In the xterm window start minicom as follows minicom c on l Storage System Module Press Enter when the terminal emulation session is established A prompt appears asking you to type start and hit enter at the login prompt Type start and press Enter When the session is connected to the SSM the Configuration Interface window opens shown in Figure 218 Intel Storage System Software User Manual Using the Configuration Interface Logging in to the SSM Once you have established a connection to the SSM using a terminal emulation program log in to the Configuration Interface 1 From the Configuration Interface entry window press Enter to start the log in process The Configuration Interface Login window opens shown in Figure 219 Figure 219 Enter User Name and Password 2 Type the user name and password of the administrative user
393. t for a volume Note You must provide either all three of the noted items or none of them For example you cannot provide only a soft threshold value Intel Storage System Software User Manual 263 Working with Scripting ebsdvm ebsdvm is the program that mounts the snapshot or volume Parameters for ebsdvm are shown below Table 48 lists the parameters available in ebsdvm Getting Help 1 Type ebsdvm he1p and press Enter Table 48 Parameters for ebsdvm Parameter What It Is mgmt group name Value text Name of the management group containing the source volume snapshot name Value text Name of the snapshot or volume created using commandline CommandLine auth group name Value text Name of the authentication group associated with the volume in the Console local ip Value IP address The IP address of the machine the script is running on number of managers Value number The number of managers in the management group that contains the source volume managers ip Value IP address Separator space The IP addresses of the SSM managers in the management group lock_mode Value ro rw The attribute of the volume read only or read write Scripted Commands for Volumes and Snapshots Below are examples of the Storage System Software functions that can be accomplished using application based scripts Creating a Snapshot Create a snapshot using commandli
394. t is copying to the remote snapshot the Console depicts the process with a moving graphic of pages from the primary to the remote snapshot as illustrated in Figure 231 The pages move in the direction of the data flow from primary to remote snapshot gz Remote_Backup a a Transaction_Data a a Transaction_Data_Backup a a Transaction_Data s Denver 1 wi Denver 2 j Boulder 1 Boulder 2 RemVolCD 4 Copying from the Remote snapshot primary snapshot to Primary snapshot the remote snapshot Figure 231 Icons Depicting the Primary Snapshot Copying to the Remote Snapshot Graphical Legend for Remote Copy Icons The graphical legend available from the Help menu depicts the icons associated with Remote Copy The following illustration displays the Remote Copy states icons from the graphical legend Snapshot is primary D Remote Copy graphics from the Snapshot is remote Graphical Legend in Remote snapshot pair the Console e Figure 232 Icons for Remote Copy as Displayed in the Graphical Legends Window 336 Intel Storage System Software User Manual Remote Copy Remote Copy and Volume Replication Remote Copy is asynchronous replication of data Volume replication is synchronous rep lication Volume replication is described in detail in the Chapter 12 Working with Volumes Using synchronous volume replication on multiple SSMs within a cluster in combination
395. t schedule on the new primary volume 6 Reconfigure scripts for failover on the application servers Setting Up a New Production Site Setting up a new production site involves creating a new primary volume and syncing up the acting primary volume before returning it to its original state as a remote volume The steps are the same as those for creating a new primary volume at the original production site 366 Intel Storage System Software User Manual Remote Copy Making the Backup Site into the New Production Site Turn the backup site into the new production site and designate a different backup site The steps are similar to those for initially configuring Remote Copy 1 Create a remote snapshot or a remote snapshot schedule on the acting primary volume Make a new remote volume on the new backup site as part of creating that remote snapshot or remote snapshot schedule Reconfigure scripts for failover on the application servers Rolling Back Primary and Remote Volumes Rolling back a volume from a snapshot is the method for reverting to an earlier copy of the data on a volume Rolling back destroys any snapshots that were created after the snapshot that is rolled back to Rolling Back a Primary Volume Warning Warning Rolling back a primary volume to a primary snapshot replaces the original primary volume with a read write copy of the selected primary snapshot The new volume has a different name than the
396. t you want to remove Click Deactivate The flash card status changes to Inactive It is now safe to remove the card from the SSM Power off the SSM Remove the flash card from the front of the SSM Replacing and Activating a New Boot Flash Card If you replace a boot flash card in the SSM you must activate the card before it can be used Activating the card erases any existing data on the card and then synchronizes it with the other card in the Storage System Module 1 Insert the new flash card in the front of the SSM 2 Power on the SSM 3 4 5 Log in to the SSM On the Boot Devices window select the new flash card Click Activate The flash card begins synchronizing with the other card When synchronization is complete Active displays in the Status column Intel Storage System Software User Manual 57 Working with Storage System Modules Replacing a Disk on Module DOM Intel Storage System SSR212MA only 58 1 2 Power down the SSM Remove the DOM from the SSM Refer to the Jntel Storage System SSR212MA User Guide for instructions on removing the DOM Install the new DOM in the SSM Refer to the Jnte Storage System SSR212MA User Guide for instructions on installing the DOM Attach a serial cable to the storage system and connect to a laptop Open a terminal emulation program to run a text interface such as HyperTerminal or ProComm Plus Use the following settings
397. tar gz files plus an install sh file copied to the location you specify The tar gz files correspond to the versions of Linux that are currently supported by the EBSD driver Running the install sh file from the directory containing all the tar gz files installs the appropriate driver for the Linux version on that system Skip this section if you only want to install the EBSD driver from the CD Go to Installing the EBSD Driver Using the CD or the Driver Bundles on page 320 Using the EBSD Driver for Linux With Autorun Enabled 1 Start the Windows Manager of your choice such as KDE or GNOME 2 Insert the driver CD into the CD drive of the EBSD host server Autorun should automatically start if properly configured A folder directory window also opens displaying the contents of the CDROM 3 The autorun window opens asking you to verify that you want to run Autorun The autorun window may be behind the CD folder directory 4 Click Yes to have the automatic install process run The automatic installation starts and steps you through the install process 5 On the Choose Product Component window of the automatic installation select EBSD Driver Bundles 6 Click Next The Choose Install Folder window opens 7 Choose to accept the default directory opt Storage_System Storage_System_Software 6 x Drivers EBSD or browse to the directory where you want the EBSD driver bundle installed This location can be another location on
398. tates that the items are in For example when you are logged into an SSM a pink square displays underneath the SSM When an item such as an SSM or a cluster is selected it displays a yellow outline Graphical Legend ttems j States Hardware Big Icons Small Icons SSM is manager SSM is virtual manager SSM is logged in SSM is hot spare Virtual manager not started Volume has schedule Volume schedule s has failed Snapshot is primary Snapshot is remote Remote snapshot pair Figure 4 Graphical Legend States Tab from the Help Menu Intel Storage System Software User Manual 19 Getting Started The Hardware tab shown in Figure 5 displays the icons that represent the physical storage units Graphical Legend x items States Hardware Big Icons Small Icons SSR316MJ2 aaa SSR212MA EE Unknown a Figure 5 Graphical Legend Hardware Tab from the Help Menu Finding Storage System Modules on the Network After opening the Console you must find the SSMs you want to manage Find these modules by one of two methods Use a mask to search subnets to find all available SSMs on a network See Finding by Subnet and Mask on page 22 for more information about completing the List of Subnets to Search window Enter specific IPs or host names to find individual SSMs See Finding by Module IP or Host Name on page 24 for more
399. the EBSD config file Verify the network connection to the SSMs 3 Re check cat proc ebsd client after making corrections to any issues found During Unmounting If during unmounting you get device filesystem busy you probably have a process accessing dev ebsd disk0 Restart EBSD Service Gives Error Message When the EBSD driver is loaded manually or using the ebsd service the following message appears Warning loading lib modules 2 4 9e enterprise kernel driver addon ebsd ebsd o will taint the kernel non GPL license The EBSD Driver for Linux is a custom driver and will always produce this message when installed 332 Intel Storage System Software User Manual D Remote Copy Remote Copy provides a powerful and flexible method for replicating data and keeping that replicated data available for business continuance backup and recovery data migration and data mining Remote Copy uses the existing volume and snapshot features along with replication across geographic distances to create remote snapshots The geographic distance can be local in the same data center or on the same campus metro in the same city or long distance For example the accounting department in the corporate headquarters in Chicago runs the corporate accounting application and stores the resulting data The designated backup site is in Des Moines Nightly at 11 00 p m accounting updates are replicated to the Des Moines backup facility
400. the Remote Volume and Snapshots 1 Click the Remote Setup tab to bring it to the front Primary Setup Remote Setup janagement Group TransData_Remote Y olume Name RV_RCDaily bd New Volume napshot Name Schedule Name Number Retention for Remote Snapshots Retain Maximum Of 5 Snapshots Retain Snapshots For Cancel Figure 248 The Remote Setup Tab 2 Select the management group to contain the remote volume and remote snapshots 3 Select an existing volume or click New Volume to create the remote volume See Making a Primary Volume Into a Remote Volume on page 360 4 Specify a retention policy for the remote snapshots 5 Click OK Intel Storage System Software User Manual 357 Remote Copy What the System Does If you created a new volume for the remote volume the system creates a new primary snapshot of the primary volume and a remote snapshot of the remote volume If you selected an existing volume to become the remote volume the system alerts you that all the data on the existing volume will be deleted but that a snapshot of all the existing data will be created first The snapshot that is then created retains all the volume s data 1 Type a name for that snapshot in the alert 2 Click Yes to continue The new snapshot is created and the volume becomes a remote volume The system creates a new primary snapshot of the primary volume and a remote snapshot o
401. the capability for creating mounting and deleting snapshots using scripts Remote Copy can be scripted as well Remote snapshots and snapshot schedules can be created and managed using scripts Detailed information about snapshot scripting is in Chapter 14 Working with Scripting Resuming Production After Failover After failover occurs three scenarios exist for resuming production e Failback Recovery return operations to the original primary site once it is restored Make the backup site into the new primary site e Set up a new primary site and resume operations at that site The task flow for restoring or recovering data and resuming the original Remote Copy configuration are different for each scenario Synchronizing Data After Failover After a failover there will usually be two snapshots or volumes that have conflicting data Recovering and synchronizing such data depends on multiple factors including the appli cation involved 364 Intel Storage System Software User Manual Remote Copy Example Scenario The following example illustrates only one process for synchronizing data Remember that such synchronization is optional Time Event What Happens RemoteSS_0 created in Remote Management Group 1 00 p m Regular hourly scheduled remote snapshot 1 10 p m Remote copy finishes Copying is complete 1 30 p m Primary volume goes offline OrigPrimaryVol_0 offline 1 33 p m Scripted fai
402. the frame size used by routers switches and other devices on your network see Editing the NIC Frame Size on page 112 1 On the Configuration Interface main menu tab to Network TCP Status and press Enter The Available Network Devices window opens shown in Figure 226 Available Network De Figure 226 Available Network Devices Window 2 Tab to select the network interface for which you want to set the TCP speed and duplex and press Enter The Network TCP Status window opens shown in Figure 227 Figure 227 Setting the Speed Duplex and Frame Size 3 To change the speed and duplex of an interface tab to a setting in the Speed Duplex list 4 To change the frame size select Set To in the Frame Size list Then tab to the field to the right of Set To and type a frame size The frame size value must be between 1500 bytes and 9000 bytes 5 On the Network TCP Status window tab to OK and press Enter 6 On the Available Network Devices window tab to Back and press Enter Intel Storage System Software User Manual 313 Using the Configuration Interface Removing an SSM from a Management Group Removing an SSM from a management group deletes all data from the SSM clears all information about the management group from the SSM and will reboot the SSM Warning Removing an SSM from a management group deletes al data on the SSM 1 On the Configuration Interface main menu tab to Config Management and press
403. the ghost SSM and remove it from the management group A confirmation message opens warning that the SSM cannot be found on the network 14 Click OK to confirm removing SSM from the management group Another confirmation message opens 15 Click OK The ghost SSM disappears from the Console Intel Storage System Software User Manual 217 Working with Clusters Deleting a Cluster Volumes and snapshots must be deleted or moved to a different cluster before you can delete the cluster For more information see Deleting a Volume on page 239 and Deleting a Snapshot on page 259 Prerequisite You must log in to the management group before you can delete any clusters within that group 1 Log in to the management group that contains the cluster you want to delete 2 Select the cluster you want to delete The Cluster Tab View opens 3 From the Tasks menu on the Details tab select Delete Cluster A confirmation message opens If the message says that the cluster is in use you must delete the snapshots and volumes on the cluster first 4 Click OK The cluster is deleted and the SSMs return to the management group as available Selecting a Cluster from the List The Select Cluster list window opens when you select Tasks gt Cluster from the menu and then select one of the following options 218 Intel Storage System Software User Manual 12 Working with Volumes A volume is a logical entity that is made up of stora
404. the name of the DNS domain in which the SSM resides 1 On the DNS tab type the DNS domain name 2 Click Apply when you are finished Adding a DNS Server Add up to three DNS servers for use with the SSM 1 Click Add in the DNS Server panel The Add IP Address dialog opens Type the IP address for the DNS server Click OK Repeat steps 1 through 3 to add up to three servers Q A W N Use the arrows on the DNS Server panel to order the servers The servers will be accessed in the order they appear in the list 6 Click Apply when you are finished Adding Domain Names to the DNS Suffixes Add up to six domain names to the DNS suffix list also known as the look up zone The SSM searches the suffixes first and then uses the DNS server to resolve host names 1 Click Add in the DNS Suffixes panel The Add DNS Suffix window opens Intel Storage System Software User Manual 115 Managing the Network 2 Type the DNS suffix name Use the domain name format 3 Click OK 4 Repeat steps 1 through 3 to add up to six domain names 5 Click Apply when you are finished Editing a DNS Server Change the IP address for a DNS Server in the list 1 Select the server to edit 2 Click Edit The Edit IP Address window opens 3 Type the new IP address for the DNS server 4 Click OK 5 Click Apply when you are finished Editing a Domain Name in the DNS Suffixes List Change a domain name in the DNS Suffixes list 1 Sele
405. the primary and remote snapshots This ensures that you have copies of the same number of snapshots in your primary and remote locations Any snapshots destroyed during rollback of one volume will remain intact on the other volume See Figure 265 for an illustration of this configuration Intel Storage System Software User Manual 381 Sample Remote Copy Configurations Configuration Diagram Application Workstations Clustered Application Restore Application Server Server Servers Read wWrite Primary Volume 5 00 PM Storage Subnet Snapshot 3 00 PME Snapshot 1 00 PM Snapshot 4141 00 AM Figure 265 Non destructive Rollback Example How This Configuration Works for Non Destructive Rollback You can choose to roll back either the primary snapshot or the remote snapshot Rolling back one of the snapshots will cause all the more recent snapshots of that volume to be deleted The other volume retains the full set of snapshots You can continue to make snapshots even though one side was rolled back and the other side was not When deciding whether to roll back the primary or remote volume consider the following When you roll back the primary snapshot to a primary volume any applications accessing the primary volume will no longer have access to the most current data as the primary volume has been rolled back to a previous state If the primary volume must be synchronized with other volumes accessed by the same
406. the volume reaches its full size which is the volume length The increment schedule for automatic auto grow is illustrated belowin Figure 165 Maximum instances of auto grow saa j a t 1 4 1 2 3 4 Volume Length Figure 165 Up to Ten Automatic Increments for Auto Grow Benefits of Automatic Auto Grow Some of the benefits of using the automatic auto grow with its incremental algorithm It allows small volumes to grow as little as possible while still allowing for growth to very large volume sizes without too many auto grow operations It maintains the ratio of thresholds In the following examples when using the manual setting for auto grow the hard threshold grows to 510 MB and the soft threshold grows to 495 MB The fact that these thresholds are so close may allow clients to hit the hard threshold and stall for several seconds before auto grow kicks in In contrast when the automatic algorithm reaches 512 MB for the hard threshold the soft threshold is 384 MB which would trigger the next auto grow well before it is needed 228 Intel Storage System Software User Manual Working with Volumes Auto Grow Examples The following examples illustrate the difference between automatic and manual auto grow For this example the volume parameters are Length 1 GB Hard Threshold 60 MB e Soft Threshold 45 MB Manual Auto Grow Auto grow is set for Manual to increase the soft and hard thresholds by 50 MB w
407. thresholds increase Checksum Any Whether to use checksumming to verify data transmission Volume checksumming is in addition to standard IP and ethernet checksumming Enabling checksumming for a volume increases data integrity at some cost to system performance Managing Volume Growth Capacity Note When creating a volume for which you plan to use snapshots you can set the soft threshold value to help manage capacity growth This threshold value triggers an alert providing you the opportunity to increase the capacity of the volume before it is full Volume size replication level and snapshots should be planned in conjunction if you intend to use Snapshots review Chapter 13 Working with Snapshots Creating the Volume and Setting Thresholds 226 First create the volume and designate the size This size is the logical size on the cluster For example you have a 750 GB cluster and you create a 500 GB volume e Second set the hard threshold to some size smaller than the actual volume size For our example 500 GB volume you set the hard threshold at 300 GB Third set the soft threshold lower than the hard threshold The soft threshold triggers an alert to the system administrator notifying that the soft threshold has been reached Intel Storage System Software User Manual Working with Volumes This alert gives you time to increase the volume size and hard threshold For our example set the
408. ting auth error auth info boot info cron error cron info daemons error daemons info dmesg gossip error gossip info hydra log kernel error Save Files Add Edit Delete Figure 115 Saving Log Files to a Local Machine 3 Scroll down the Choose Logs to Save list 4 Select the file or files you want to save To select multiple files use the Ctrl key 5 Click Save Files The Save dialog opens 6 Select a location for the file or files 7 Click Save In Directory The file or files are saved to the designated location Intel Storage System Software User Manual Reporting Remote Log Files Use remote log files to automatically write log files to a computer other than the SSM For example you can direct the log files for one or more SSMs to a single log server in a remote location The computer that receives the log files is called the Remote Log Target You must also configure the target computer to receive the log files Adding a Remote Log 1 Select Reporting from the configuration categories The Reporting Window opens 2 Select the Log Files tab The Log Files window opens shown in Figure 115 3 Click Add below the list of remote logs The Add Remote Log Target window opens shown in Figure 116 Add Remote Log Target Log Type Alerts log local5 mark Destination Figure 116 Adding a Remote Log 4 In the Log Type l
409. ting the Block Device EBSD Disk Once the ext2 filesystem is created the disk can be mounted For example 1 Make a mount point for the disk For example mkdir mnt ebsd0 2 Mount the EBSD disk For example mount dev ebsd disk0O mnt ebsd0 At this point you can treat the mounted disk like any other OS file directory You can copy files add and delete files and perform other file functions there Adding an EBSD Disk at Runtime 1 Modify ebsd conf 2 Run ebsdvm add all The new disk is added to dev ebsd Use it as a raw or block device See Verifying EBSD Devices on page 327 Starting the EBSD Service If enabled for the current run level the EBSD service is started when the operating system is booted You can also start the EBSD service manually using the following command s service ebsd start 328 Intel Storage System Software User Manual Using the EBSD Driver for Linux or etc init d ebsd start The EBSD service reads the file etc sysconfig ebsd to initialize the EBSD volume manager tool ebsdvm and the EBSD configuration file ebsd conf The file contains the following default information ebsdtool usr local sbin ebsdvm Note To prevent file system checking of ebsd disks set the environment variable fsck_check 0 in etc sysconfig ebsd You can modify this file for different directories and names The EBSD start service first checks for the EBSD configuration file ebsdconf environment v
410. tion SSMs Available SSMs in Cluster SSM IP RAID SSM IP__ _RAID Denver 1 10 0 33 48 Stripe Boulder 1 10 0 33 25 Stripe Denver 2 10 0 33 13 Stripe Boulder 2 10 0 33 17 Stripe lt Add lt Add All Remove gt Remove ait 3 gt Hot Spare X Hot Spare Time Out Seconds Cancel Figure 146 Adding SSMs to Cluster in Alternating Site Order Create the Volume with 2 way Replication 196 Configure the volume with 2 way replication Two way replication ensures that two copies of the data are written to the volume The fact that you added the SSMs to the cluster in alternating order ensures that a complete copy of the data exists on each site See Planning Data Replication on page 222 Intel Storage System Software User Manual Disaster Recovery Using A Virtual Manager File Find Tasks View Help a a Available SSMs i Transaction_Data 1 Card_Payments Boulder 4 7 a HEBE a HERE a EEE EEEE Denver 1 Boulder 1 Denver 2 Boulder 2 ss Denver 3 Details Managers Clusters Authentication Groups Volume Lists Register Times Remote Snapshot Name Card_Payments Figure 147 Cluster with SSMs Added in Alternating Order Configuring a Virtual Manager In order to use a virtual manager in a management group beyond the 30 day evaluation period you must purchase the Scalabili
411. tion message opens Click OK When the management group is deleted the SSMs return to available status in the Network View Q A W N Setting the Management Group Version If instructed by customer support you can set the management group version back to a previous version of the software Setting the version back requires using a special command line option before opening the Console Customer support will instruct you on using the command line option Selecting a Management Group from the List Select a management group from the list and click OK Intel Storage System Software User Manual 189 Working with Management Groups 190 Intel Storage System Software User Manual 10 Disaster Recovery Using A Virtual Manager A virtual manager provides disaster recovery for two specific system configurations A virtual manager is a manager that is added to a management group but is not started on an SSM until it is needed to regain quorum See Managers and Quorum on page 168 for detailed information about quorum fault tolerance and the number of managers Virtual manager is part of the add on module Scalability Pak See Chapter 16 Feature Registration for information about add on modules and registering features The following are definitions of the terms used in this chapter Virtual Manager A manager which is added to a management group but is not started on an SSM until a failure in the system causes a l
412. tire SSM in a cluster goes down data reads and writes can continue because an identical copy of the volume exists on other SSMs in the cluster Clustering is part of the Scalability Pak feature upgrade See Working with Clusters on page 201 for more information If you plan to create data volumes that span two or more SSMs use replication in a cluster to ensure data safety and availability Intel Storage System Software User Manual Storage Using RAID with Replication in a Cluster If you use replication in a cluster to replicate volumes across SSMs then the redundancy provided by RAID 10 uses excess capacity and may not be necessary For example e Using replication up to 3 copies of a volume can be created on a cluster of 3 SSMs The replicated configuration ensures that 2 of the 3 SSMs can go down and the volume will still be accessible Configuring RAID 10 on these SSMs means that each of these 3 copies of the volume is stored on 2 disks within the SSM for a total of 6 copies of each volume For a 50 GB volume 300 GB of disk capacity is used e In this case data safety and availability are ensured more efficiently by configuring RAID 0 on the SSMs and then achieving 2 way volume replication on clustered SSMs For a 50 GB volume 100 GB of disk capacity is used RAID 5 50 uses less disk capacity than RAID 1 10 so it can be combined with replication and still use capacity efficiently One benefit of configuring RAID
413. to his remote volume would include the following commands to make the remote volume into a primary volume and mount it in the local network to make it available to the backup application servers java commandline CommandLine jjones saxophone 10 10 45 72 volume_make_primary RemVolX_Rays 512000 512000 30 ebsdvm Remote_Images RemVolX_Rays adminusers 10 3 11 19 3 10 3 12 27 10 3 71 31 10 3 11 12 ro Intel Storage System Software User Manual 269 Working with Scripting 270 Intel Storage System Software User Manual 15 Controlling Client Access to Volumes Access to storage volumes by application servers is controlled using a combination of volume lists and authentication groups Volume lists provide the connection between authentication groups and volumes They are created at the management group level and they link designated volumes with the authentication groups that can access those volumes e Authentication groups identify the person or entity accessing the volume Creating Access to Volumes After you have configured storage and created volumes you then create access to the volumes using authentication groups and volume lists 1 Create an authentication group 2 Create a volume list and associate the authentication group to the specific volume s it can access Types of Client Access The Storage System Software supports three modes by which clients can access volumes through an iSCSI initiator the EBSD drive
414. to the snapshot when they access it For example MS Windows performs a write when the snapshot is mounted MS VSS writes to a volume that it is backing up You can see how much writable space is being used for a snapshot on the Disk Usage tab in the Cluster Tab View as shown in Figure 177 Intel Storage System Software User Manual 249 Working with Snapshots Details Volumes SSMs Disk Usage Usage Graphs iscsi Remote Snapshot Type Name Space Max Used Max Cluster TransData05 78 73 GB 1 42 GB 1 8 30 4 SSM Boulder 2 39 36 GB 726 MB 1 8 SSM Boulder 1 39 36 GB 726 MB 1 8 Volume CreditData05 6 GB Hard Threshold OMB 0 Repl Snapshot Snapshot_0 16GBi ard Threshold Writable Hard Th R 11 42 GB Max Used Writa 7 Repl Writable space listing EREE htx Used and Max Full can temporarily exceed 100 during data migration asi Wtax Full for snapshots is vax Used Wintable ax Used Hard Threshold Writable Hard Threshold Figure 177 Viewing the Writable Space Used for a Snapshot The additional writable space is deleted when the snapshot is deleted If you need to free up the extra space before the snapshot is deleted you can do so manually or through your snapshot scripts The next time an application or operating system accesses the snapshot the writable space will be recreated Deleting a Snapshot s Writable Space Prerequisite Sto
415. tool not included when attempting to access the system 142 Intel Storage System Software User Manual Using SNMP Choosing Access Conirol 1 Click Add to add an SNMP client The Add SNMP Client window opens shown in Figure 109 You can add SNMP Client either by specifying IP addresses or host names IP Network Address IP Netmask Single Host Figure 109 Adding an SNMP Client By Address 4 Click By Address Type the IP Network Address Select an IP Netmask from the list Select Single Host if the SNMP Client is a single computer Click OK The IP address and netmask appear in the Access Control list Note You can either enter a specific IP address and the IP Netmask as None to allow a specific host to access SNMP or you can specify the Network Address with its netmask value so that all hosts that match that IP and netmask combination can access SNMP By Name Click By Name Type a host name That host name must exist in DNS and the SSM must be configured with DNS for the client to be recognized by the host name See Using a DNS Server on page 114 Click OK The host name appears in the Access Control list Intel Storage System Software User Manual 143 Using SNMP Editing Access Control Entries You can change the information for the hosts granted access 1 Select a host listed in the Access Control list shown in Figure 110 7 Module SNMP Ge
416. tore of SSM Configuration scicsiecteccsiletectsscchenseseguieeeeiochencauseccnenunas kk kk kk K k 47 Backing Up Multiple SSMs with the Same Configuration UUEUEEEEEEEEE UUU UUUU U UEU 47 Backing Up the SSM Configuration File E L EEE kek kk kek 48 Restoring the SSM Configuration from a File L LEE Eke 49 Rebooting the SSM sscciass techtceayecdesesacainedcastssenasindtnescengsenacducner natu k Kak kk k KA kK KK KK KK kk KK KA KAK KA kK KA 50 led Da J a a rmn 52 Powering Off the SS V tczsari cccasecrnaieuace Sbonveancucasacescidaacsbacenmadserecses kk Kake kr kek K k kK KK KK KK KAK KK Kr kK 52 Registering Features for an SSM hK E EEuduEE Ek ek kk K k kek kk KK KK KK AK KA kK KO 53 Using the Feature Registration Tab E kk kK kK AK Ke 53 Evaluating Features Wl llllllllillk kk kk kk ek aka kak kk kak KAK KAK KAK kK KK AA kk kw kw K KK 54 Configuring Boot Devices cs ane Eek arse eee eee 54 Modules with Two Boot Devices ecceccccceeeeeeeeeseeen kk kk kk kk KAK AK KA KA KAK A KRA 54 Checking Boot Device Status in an SSM i kk kk kek k kk ke 55 Replacing a Boot Device Only in Modules with Two Boot Devices Intel Storage Sys TEM SSASTGMI2 ONY 5 i i 4 i2 sna lln n bidi silan kanan bi eel G za a S LE A na k da n k d n lace 56 Replacing a Disk on Module DOM Intel Storage System SSR212MA only 58 Chapter 3 Storage s
417. ts Per Second bps Kilobytes Per Second KB Fractional T1 256 Kbps 32 Fractional T1 1 2 768 Kbps 96 T1 1 544 Mbps 197 Bonded T1 2 3 088 Mbps 395 Bonded T1 4 6 176 Mbps 790 Ethernet 10Base T 10 Mbps 1280 T3 44 736 Mbps 5726 Intel Storage System Software User Manual Working with Management Groups Table 33 Typical Network Types Network Type Bits Per Second bps Kilobytes Per Second KB Ethernet 100Base T 100 Mbps 12 800 OC 3 155 Mbps 19 840 OC 12 622 Mbps 79 616 Ethernet 1000Base T 1 Gbps 128 000 OC 192 10 Gbps 1 280 000 Set or Change Local Bandwidth 1 Log in to the management group 2 Click Edit Management Group The Edit Management Group window opens shown in Figure 136 Edit Management Group E Edit Management Group Group Name Local Bandwidth 32768 KbiSec penne Management Groups Management Or Logged In Remote Bandwi Connected Disassociate Edit Bandwidth Cancel Figure 136 Editing a Management Group 3 Change the local bandwidth 4 Click OK The new rate displays on the Details tab in the management group Tab View Logging Out of a Management Group Logging out of a management group prevents unauthorized access to that management group and the SSMs in that group 1 Select the management group to log out of Intel Storage System Software User Manual 179 Working with Management Groups
418. ts versus Scheduled Snapshot kE kk kek 242 Requirements for Snapshots cccccccccceecsesenenneeeeeeeseeeeeeeeeeeeeeeseseeneaeeeeeeeessesenseeeeeeeseeees 242 Managing Capacity Using Volume and Snapshot Thresholds scccccceeessseeereeeeeeees 243 Easiest Method for Planning Capacity cccccceceeseeeeeeeeeeeeeeeeneeeeeeenaaeeeeeseneeeeeeneeees 243 Most Flexible Method for Planning Capacity cccccceceeeeeeeeneeeeeeeneeeseeeeeeeeeeeeeees 244 Planning Snapshots ct ia rede ued taite kk kek sete tecaet mle KA kK K KA KK KA KAK KK KA mnene 245 Source Volumes for Data Mining or Tape Backups or Data Preservation Before Upgrad Tale SOWA E SN D a r ee eee 245 Protection Against Data Corruption u kek kek kk kk kk kk KK 245 REALM El STapSROLs x 5y542 552 2o Ni SA ka eae eset ees ee AT ve a E a d z 246 The Snapshot Tab V W uELE kk kk kk kek kk KK k k kK k KK KK kK KIR 248 Mounting or Accessing a Snapshot E Ek kek kek kek kk KK KK KK Kr A kK KH O 249 Snapshot Writable Space EE kk kk kk k k kk k Kak kk KK kk KK KK KK KRA 249 Deleting a Snapshot s Writable Space EEEEEE Ek kk kk kek kK k kk kk KAK RA 250 Editing a Snapshot 4 3 453353 534 55y5 a5 K raze nen key eee bar senena wana beke erd ev n ee ben 0zn 250 Manually Copying a Volume from a Snapshot E kk kk kk kk ks 252 Creating
419. ture You must purchase the Configurable Snapshot Pak to use snapshot scripting beyond the 30 day evaluation period Requirements for Scheduling Snapshots Scheduled snapshots require particular attention to capacity management Additionally you must ensure that the time settings on theSSMs running managers and the time setting of the management group are synchronized Note Use NTP to ensure that all the SSMs in the management group have synchronized time settings 252 Intel Storage System Software User Manual Working with Snapshots Table 44 Requirements for Scheduling Snapshots Requirement What it Means Plan for capacity Scheduling snapshots should be planned with careful consideration for management capacity management as described in Managing Capacity Using Volume and Snapshot Thresholds on page 243 Pay attention to how you want to retain snapshots and the capacity in the cluster lf you want to retain lt n gt snapshots the cluster should have space for lt n 1 gt lt is possible for the new snapshot and the one to be deleted to coexist in the cluster for some period of time If there is not sufficient room in the cluster for both snapshots the scheduled snapshot will not be created and the schedule will not continue until an existing snapshot is deleted Synchronize SSM times The time setting on the SSMs running managers and the time setting of with management group the management group must be synch
420. ty Pak See Chapter 16 Feature Registration Adding a Virtual Manager Add a virtual manager to a management group 1 From the Tasks menu on the Details tab select Add or Delete Virtual Manager A confirmation dialog opens 2 Click OK to continue The virtual manager is added to the management group The Details tab lists the virtual manager as added and the virtual manager icon appears in the management group as shown in Figure 148 Intel Storage System Software User Manual 197 Disaster Recovery Using A Virtual Manager File Find Tasks View Help Available SSMs 8 Transaction_Data E a n Card_Payments Boulder 4 a hb a a Denver 1 Boulder 1 Denver 2 Boulder 2 Denver 3 Virtual manager added Details Managers Clusters Authentication Groups Volume Lists Register Times Remote Snapshot Management Group Transaction_Data Managers 2of3 Local Bandwidth 32768 Kbisec virtual Manager Yes Quorum 2 Status Normal Coordinating manager Boulder 1 Figure 148 Management Group with Virtual Manager Added The virtual manager remains added to the management group until needed Starting a Virtual Manager to Regain Quorum 198 Only start a virtual manager when it is needed to regain quorum in a management group Figure 144 illustrates the correct way to start a virtual manager when necessary to regain quorum e Two site Scenario One Site Goes Down F
421. ty in RAID 50 on the Intel Storage System SSR316MJ2 The total capacity of the Intel Storage System SSR316MJ2 in RAID 50 is the combined capacity of each RAID 5 set in the module For example suppose the Intel Storage System SSR316MJ2 is configured for RAID 50 and contains 2 sets of 4 400 GB disks The total capacity for that Intel Storage System SSR316MJ2 equals 2400 GB Figure 51 Capacity of Disk Sets in RAID 50 Set 1 se a capacity capacity 1200 GB 1200 GB SSM capacity 2400 GB Configuring RAID 5 or RAID 50 on the Intel Storage System SSR212MA RAID 5 and RAID 50 can only be configured on completely populated sets of disks This means the Intel Storage System SSR212MA must contain either 6 or 12 disks Whether the Intel Storage System SSR212MA is configured in RAID 5 or RAID 50 depends on the number of disk sets in the module Ifthe Intel Storage System SSR212MA contains 1 disk set then that set is RAID 5 Ifthe Intel Storage System SSR212MA contains 2 disk sets then both sets are RAID 50 Intel Storage System Software User Manual 67 Storage Storage Capacity in RAID 50 on the Intel Storage System SSR212MA The total capacity of the Intel Storage System SSR212MA in RAID 50 is the combined capacity of each RAID 5 set in the module For example suppose the Intel Storage System SSR212M
422. u set the time of day manually or use NTP e Using Network Time Protocol NTP Configure the SSM to use an external time service e Setting Date and Time Set the date and time on the SSM if not using an external time service Reset Management Group Time If you change the time on an SSM that is running a manager you must reset the management group time If the management group time is different than a manager SSM you run the risk of inconsistent or unexpected creation time stamps on volumes and snapshots and also that scheduled snapshots will not start at the intended time See Resetting the Management Group Time on page 181 Getting There 1 On the Network View double click the SSM and log in if necessary The SSM Configuration window opens 2 Select Time from the SSM configuration categories The Time window opens shown in Figure 91 Setting the Date and Time m Module G Storage TCP IP Network J SSM Administration L ge SNMP i Reporting SSM Time Zone SSM Date and Time NIP NTP Mode Oon Wo Set the time zone for the physical location of the SSM SSM Time Zone GMT x Figure 91 Setting the Time Zone Setting the SSM Time Zone You must set the time zone whether or not you use NTP Set the time zone for the physical location of the SSM HTTP files display the time stamp according to this local time zone 1 Choose the time zone for the location of the SSM 2 Click
423. ual manager on a different SSM This situation can occur when quorum is lost because the Console displays the SSM in a normal state even though the SSM is down Intel Storage System Software User Manual 199 Disaster Recovery Using A Virtual Manager Stopping a Virtual Manager When the situation requiring the virtual manager is resolved either the down site recovers or the communication link is restored you must stop the virtual manager Stopping the virtual manager returns the management group to a fault tolerant configuration 1 Select the SSM that is running the virtual manager 2 From the Tasks menu on either the Details tab or the Management Group Information tab select Stop Virtual Manager A confirmation message appears 3 Click OK The virtual manager is stopped However it remains part of the management group and part of the quorum Removing a Virtual Manager You can remove the virtual manager from the management group altogether 1 Select the management group that has the virtual manager 2 From the Tasks menu on the Details tab select Add or Delete Virtual Manager A confirmation message opens 3 Click OK The virtual manager is removed Note The Console will not allow you to delete a manager or virtual manager if that deletion causes a loss of quorum 200 Intel Storage System Software User Manual 11 Working with Clusters Within amanagement group you create sub groups of SSMs called clusters A
424. ume Snapshot Name Snapshot_ Snapshot Description Figure 233 Creating a New Remote Snapshot Intel Storage System Software User Manual 343 Remote Copy Creating the Primary Snapshot 1 In the Primary section of the New Remote Snapshot window click New Snapshot The New Snapshot window opens shown in Figure 234 New Snapshot New Snapshot Snapshot Name Snapshot_ 0 Description Cluster Replication Level Replication Priority Size Hard Threshold Soft Threshold Auto Grow Checksum Data Figure 234 Creating a New Primary Snapshot 2 Type a name for the primary snapshot Names are case sensitive They cannot be changed after the snapshot is created Note Make the beginning of volume and snapshot names meaningful for example SnaplExchg_03 The Console displays volume and snapshot names under the icons If a name is longer than the width of the icon the end of the name is cut off however the full name does show on the corresponding Details tab and on other relevant tab views 3 Optional Type in a description of the snapshot 4 Optional Change the hard and soft thresholds for the snapshot 5 Click OK to return to the New Remote Snapshot window The information for the primary snapshot is filled in as shown in Figure 235 At this point the primary snapshot has been created 6 If you have already created the remote
425. up Time EEE kk kek kk kk kk K k kk 181 Starting and Stopping Managers E keke kk k kk keka kk Kek k kk KK KA kK KO 181 Stopping a A Manager li idE kek ek keke k k kk kk K k kK KAK KE KAK KAK KK KA kK 183 Removing an SSM from a Management Group EEE Ek K k Kek kek 184 Removing an SSM With a License Key EEE kk kk kk kk kek 184 Removing the SSM 3s a is six ne axak Mina M na bekan sahana bin n x meka Eye L Rek c Na LAR s k a sula d ke d b k 184 Backing Up a Management Group Configuration E EE kk kk net 185 Backing Up a Management Group Configuration EE ee 186 Saving the Management Group Configuration Description 187 Restoring a Management Group huk ek kek k kk Kek natten KAK ennnen nnet 187 Requirements for Restoring a Management Group EEE E 187 Deleting a Management Group gicccaraccisnckcacsencendcinxrentaenidereinand vetauutadnoidenecoeeaisuncrededetdineense 189 Setting the Management Group Version L EEELEE Eek kk kek kk Kek kk KH 189 Selecting a Management Group from the List EE kk kk kes 189 Chapter 10 Disaster Recovery Using A Virtual Manager 191 When to Use a Virtual Manager iiiE Ek kk K k KAK kK A KA KAK AK KA KRA 191 Benefits of a Virtual Manager iidE EEE edie ere A KA KA KAK KA YA 192 Requi
426. ures and Applications E EEi Ek 303 Opening the Feature Registration Window E Eek 304 Entering License Key A Ei kk kk ak kak kaka kak kk kk teaser 304 Viewing License KeyS silan sukan nan ins aka kelan an kiya ieee Aimee 305 Opening the Configuration Interface uE kk kk 308 Enter User Name and Password scicedissccostaticiweinstes os netesaneens ieheneeeesextessneentexeie eae 309 Configuration Interface Main MenU iEE kk kk k 309 General Settings Window ELE Ek kk kk kk kek kk K Ke kk Kek 309 Selecting an Interface to Conf gUre E E EELiE EEE keke 310 Entering the Host Name and Settings for an Interface 311 xxi List of Figures Figure 224 Figure 225 Figure 226 Figure 227 Figure 228 Figure 229 Figure 230 Figure 231 Figure 232 Figure 233 Figure 234 Figure 235 Figure 236 Figure 237 Figure 238 Figure 239 Figure 240 Figure 241 Figure 242 Figure 243 Figure 244 Figure 245 Figure 246 Figure 247 Figure 248 Figure 249 Figure 250 Figure 251 Figure 252 Figure 253 Figure 254 Figure 255 Figure 256 Figure 257 Figure 258 Figure 259 Figure 260 Figure 261 Figure 262 Figure 263 Figure 264 Figure 265 Figure 266 Figure 267 Figure 268 Figure 269 xxii Selecting a Bonded Interface in the Available Network Devices Window 312 Deleting a NIC
427. ures and applications include the following e Scalability Pak Configurable Snapshot Pak Remote Data Protection Pak Client Server Clustering Pak All add on features and applications are available when you begin using the Storage System Software If you begin using an add on feature or application without first registering a 30 day evaluation period begins Throughout the evaluation period you receive reminders to register and purchase a license for the add on features and applications you want to continue using Evaluating Features Add on features and applications are active and available when you install and configure your system 30 Day Evaluation Period When you use any feature that requires registration a message opens shown in Figure 209 asking you to verify that you want to enter a 30 day evaluation period License Evaluation x 4 You are about to use an unlicensed feature You may evaluate this feature without a license for up to 30 days If you do not register the feature within that time any volumes or snapshots created using this feature will become unavailable Start Evaluation Period Cancel Figure 209 Verifying the Start of the 30 day Evaluation Period Feature Registration During this evaluation period you may configure test and modify any feature At the end of the 30 day evaluation period if you do not register and obtain a license key then all volumes and snapshots associated
428. ut the RAID for the SSM Identifies disks that make up the RAID configuration their RAID level chunk size and device name Power Supplies Number 1 Number 2 Status information about the power supplies Fibre Channel Items Intel Storage System SSR316MJ2 only Lists Fibre Channel device model channel number and status Cache Battery Items Status information about the batteries IDE Statistics Lists the drive number and capacity Intel Storage System Software User Manual 151 Reporting Saving Log Files Note 152 If Technical Support requests that you send a copy of a log file the Log Files tab is where you can save that log file as a text file The Log Files tab lists two types of logs e Log files that are stored locally on the SSM displayed on the left side of the tab e Log files that are written to a remote log server displayed on the right side of the tab Save the log files that are stored locally on the SSM For more information about remote log files see Remote Log Files on page 153 1 Select Reporting from the configuration categories The Reporting Window opens 2 Select the Log Files tab The Log Files window opens shown in Figure 115 Module Passive Logfiles Active Email Diagnostics Alerts WW Storage Time TCP IP Network Choose logs to save 1 Remote logs SSM Administration an fe SNMP Alerts log Type Destination le Repor
429. ve Hard Threshold Hard threshold size must be equal to or less than the size of the volume Soft Threshold Soft threshold size must be equal to or less than the hard threshold size 7 Click OK The Roll Back Volume confirmation message opens 368 Intel Storage System Software User Manual Remote Copy Storage System Console x Rolling the volume back to this snapshot will delete the volume Before proceeding you must manually delete all snapshots of the volume that are newer than this snapshot To preserve the volume and snapshots that you need to delete create a copy of the volume and snapshots before rolling the volume back Are you sure you want to roll the volume back to this snapshot Figure 255 Verifying the Primary Volume Roll Back 8 Click OK The primary snapshot version of the primary volume is restored as a read write volume 9 Reconfigure application servers to access the new volume Rolling Back a Remote Volume A remote volume cannot be rolled back In order to roll back a remote volume you must make the remote volume into a primary volume Using Remote Snapshots for Data Migration and Data Mining Use remote snapshots to create split mirrors for data mining and data migration A split mirror is a one time remote snapshot created from the volume containing the data you want to use or move Split mirrors are usually created for one time use and then discarded Creating
430. ve Monitoring Use active monitoring to track the health of the SSM Active monitoring allows you to set up notification through emails alerts in the Console and SNMP traps You can choose which variables to monitor and choose the notification methods for alerts related to the monitored variables For a detailed list of monitored variables see List of Monitored Variables on page 159 Note Critical variables such as the CPU temperature and motherboard temperature have thresholds that trigger a shutdown of the SSM 1 On the Network View double click the SSM and log in if necessary The SSM Configuration window opens 2 Select Reporting from the configuration categories The Reporting Window opens 3 Select the Active tab The Active Reporting window opens shown in Figure 117 154 Intel Storage System Software User Manual Reporting Module Passive Logfiles Active Email Diagnostics Alerts Storage Time TCPIIP Network an SSM Administration IH NME Monitored Variables Summary Frequency 15 seconds CPU Temperature Thresholds 2 Power Supply Status If the value exceeds 65 alert CPU Utilization Memory Utilization RAID Status Network Interface Status AGR Drive Status ave Log Files Add Edit Remove If the value exceeds 70 alert shut down Apply Threshold Actions Figure 117 Setting Active Monitoring Variables Setting N
431. ver capability in the event of a PCI card failure bond interfaces located in the motherboard with interfaces in PCI slots This ensures that if an entire PCI card fails then the bonded interface will use an interface in the motherboard to continue operating Record the configuration information of each interface before you create the bond When you delete an active backup bond the preferred interface assumes the IP address and configuration of the deleted logical interface When you delete a NIC aggregation bond one of the interfaces retains the IP address of the deleted logical interface The IP address of the other interface is set to 0 0 0 0 Create a bond on an SSM before you add the SSM to a management group Allocate a static IP address for the logical bond interface You cannot use DHCP for the bond IP Intel Storage System Software User Manual Managing the Network Warning To ensure that the bond works correctly you should configure it as follows e Create the bond on the SSM before you add it to a management group e Verify that the bond is created If you create the bond on the SSM after it is in a management group and if it does not work correctly you might e lose the SSM from the network e lose quorum in the management group for a while Creating the Bond 1 Ensure that the SSM is not in a management group 2 Log in to the SSM 3 On the TCP IP tab shown in Figure 79 select 2 or 4 NIC
432. ver reads and writes to block devices iSCSI and EBSD do not operate at the file system level of abstraction Instead they present the Storage System Software volume to an operating system such as Windows as a block device Typically then a file system is created on top of this block device so that it can be used for storage In contrast an Oracle database uses a Storage System Software volume as a raw block device 220 Intel Storage System Software User Manual Working with Volumes Storing File System Data on a Block System The Windows file system treats this block device as simply another hard drive that is it is an array of blocks which the file system can use for storing data As the iSCSI initiator or the EBSD driver passes writes from the file system the Storage System Software simply writes those blocks into the volume So when you look at the Console the allocation percentage displayed is based on how many physical blocks have been written for this volume Now when you delete a file typically the file system updates the directory information which removes that file Then the file system notes that the blocks which that file previously occupied are now freed up Subsequently when you query the file system about how much free space is available the space occupied by the deleted files appears as part of the free space since the file system knows it can overwrite that space However the file system does not inform the blo
433. view alerts generated automatically by the operating system Reporting Overview Use reporting to View real time statistical information about the SSM View and save log files Set up active monitoring of selected variables e Set up email notification View alerts Run hardware diagnostics When you select Reporting from the SSM configuration category list the Reporting category opens shown in Figure 114 Module T Storage Time TCP IP Network Ju SSM Administration g8 SNMP Passive LogFiles Active Email Diagnostics Alerts Item Value Passive Report Host Name IP Number SSM Software GUI Software Support Key Boot Devices flash 0 flash 1 NIC Data Card Description Mac Address Address Mask 06 07 2005 07 52 05 AM MDT Golden 3 10 0 7 11 Version 6 3 25 0001 0 Version 6 3 24 Build 8003 unknown call support Empty Active IC vanced tor ka more details Intel Corp 8254BEB Gig Controller Copper 00 07 E9 3F D2 1C 10 0 7 11 255 255 240 0 Refresh Figure 114 Viewing the Reporting Window Reporting Using Passive Reports Passive reports display statistics about the performance of the SSM its drives and configuration Statistics in the passive reports are point in time data gathered when you click the Refresh button on the Passive tab Select Advanced to see additional statistics 1 Select Reporting from th
434. within the group How many of those managers are required for a quorum and are operational see Managers on page 168 for information about quorums The synchronization bandwidth that is set when you edit the management group The communication mode of the management group Managers Tab All the SSMs included in the management group are listed on the managers tab SSMs that are running managers display Yes in the Manager column Information provided on the Managers tab includes Host name of the SSM e Whether that SSM is running a manager e Whether that SSM is running a virtual manager Clusters Tab All the clusters created within the management group are listed on the clusters tab For more information see Chapter 11 Working with Clusters Information provided on the Clusters tab includes Name of the cluster 176 Intel Storage System Software User Manual Working with Management Groups Authentication Groups Tab All the authentication groups that are associated with volumes in a management group are created and managed from the management group See Chapter 15 Controlling Client Access to Volumes for more information Information provided on the Authentication Groups tab includes Name of the authentication group e Authentication mode of the group The subnet mask of the authentication group if the authentication is set up for subnet and mask Volume lists associated with the group
435. wn Add Eat Remo Details about the selecte Apply Threshold Actions variable are displayed here Figure 121 Viewing the Monitoring Variable Summary on the Active Window 158 Intel Storage System Software User Manual List of Monitored Variables Reporting Table 32 shows the variables that are monitored for the SSM For each variable the table lists the following information The units of measurement e Whether the variable is permanent Permanent variables cannot be removed from active reporting e Whether you can change the frequency with which the measurements are taken The default frequency of measurements The default action that occurs if the measured value of the variable reaches a threshold Table 32 List of Variables Available for Active Monitoring Perm Specify Default Default Action il cdl vang Variable Freq Freq Threshold Boot Devices Active No Yes 30 Console alert if not Status seconds normal Inactive Failed Empty Unformatted Not recognized Unsupported Cache Battery Normal No Yes 1 minute Console alert if Status Charging changes Missing Faulty CPU Utilization Percent No Yes 1 minute Console alert at gt 90 CPU Celsius Yes No 15 Warning at 65 Temperature seconds Console alert SSR316MJ2 Critical at 70 Console alert Shutdown SSR212MA Critical at 90 Console alert Shut
436. x l gdlk k kilkisalayal sikil ka yek aaa k ze k n kuda aa d k sa ku vak kan k l na w k k Ka k dan 61 Storage OvervieW LLiEEE kk kk k keke k kr K r KAK kk kK k KK Ka kk kk tan kk kr kk k kk kik 61 Storage Requirement Senet eee nC rt ere ae eee ee ee eee KA KA 61 Geliing TMS a areas cee ceca corde anal cand sakal en b kena kanan niana n b gelal aa ar xak a san b d W kak Ra 61 Configuring and Managing RAID Euu keke kk ek k kk K k kk K KA KA KA YA 62 Benefits of RAID kk cad dilen aiia u l ne ken k n bi kan ul ani G aa aA k W n kn k ME ke bak Wak R AGA 62 RAID Configurations Defined E Eke kk kek k k kek k k kk KK kK KAK K KK KO 62 Number of Disks and RAID j i kk kk kA ein A A KA KAK AR KA RA 62 RAID Set eooe e e eeeo oe ___o _e _o o ow_XxM_Z_xzz mmm pDmmmmmmm 63 RAIDO eee meray DD MD r_rloerrarararRrRr ae 64 RAID fand RAID 10 6 22 case xc man mezn ndar nanl k za a 5R a hal kina s b k l bi lA RE RON ba ed gk G 64 RAID 5 and RAID SO si lt c meman nek Has REE Hen WERD HEWR E R he YE R N 65 Viewing the RAID Setup Report LEE Ek kk kk kk k k k kk K kk kK KA kK 68 Planning RAID Configuration EE Ek kk k k kk kk K k kk Kr KK KK kK Kr kk KK 72 Data RepllGaliOl ee eee ere ree re yin ar akan ee ee 72 Using RAID with Replication in a Cluster
437. y Optional A description of the volume Cluster Any If the management group contains more than one cluster you must specify the cluster on which the volume resides Replication Level Any The number of copies of the data to create on SSMs in the cluster The replication level must be at most the number of SSMs in the cluster or three whichever is smaller See Planning Data Replication on page 222 Replication Priority Any e Availability Default setting These volumes will remain available as long as at least one SSM out of every n n replication level remains active When the unavailable SSM returns to active status in the cluster than the volume resynchronizes across the replicas Redundancy Choose this setting to ensure that the volume will go offline if it cannot maintain two replicas For example if 2 way replication is selected and an SSM in the cluster becomes unavailable thereby preventing 2 way replication the volume goes offline until the SSM is again available Size Primary The logical block storage size of the volume Hosts and file systems will operate as if storage space equal to the volume size is available in the cluster This volume size may exceed the true allocated disk space on the cluster for data storage which facilitates adding more SSMs to the cluster later for seamless storage growth However if the volume size does exceed true allocated disk spac
438. you can change from Availability to Redundancy if all the SSMs in the cluster are available and have enough space for replicating the data Size To increase the size of the volume one of the following conditions must be met There must be sufficient unallocated space in the cluster You can move the volume to a cluster that has enough unallocated space You can add an SSM to the cluster To decrease the size of the volume lf the volume has been or is mounted by any operating system you must shrink the volume from the client operating system before shrinking the volume in the Console The size entered must be greater than the hard threshold You cannot decrease the volume size to a value less than the hard threshold You also cannot decrease the size of the volume below the size needed for data currently stored on the volume Warning Decreasing the volume size or hard threshold is not recommended If you shrink the volume in the Storage System Console before shrinking it from the client file system your data will be corrupted or lost Intel Storage System Software User Manual 235 Working with Volumes Table 39 Requirements for Changing Volume Parameters Item Requirements for Changing Hard Threshold Increase the hard threshold to turn off an alert generated when the threshold is exceeded The hard threshold must be equal to or less than the size of the volume and there must be sufficient space o
439. ze 8 0 GB v Hard Threshold i GB v Soft Threshold GB v Auto Grow Checksum Data Figure 172 Editing a Volume Changing the Volume Description 1 In the Description field change the description 2 Click OK when you are finished See Requirements for Changing Volume Parameters on page 235 for detailed requirements Changing the Cluster 1 In the cluster list select the cluster to which you want to move the volume 2 Click OK when you are finished The volume will reside on both clusters until all of the data is moved to the new cluster See Requirements for Changing Volume Parameters on page 235 for detailed requirements Intel Storage System Software User Manual 237 Working with Volumes Changing the Replication Level 1 In the Replication Level drop down select the level of replication you want 2 Click OK when you are finished See Requirements for Changing Volume Parameters on page 235 for detailed requirements Changing the Replication Priority 1 Select the replication priority you want 2 Click OK when you are finished See Requirements for Changing Volume Parameters on page 235 for detailed requirements Changing the Size 1 In the size field change the number and change the units if necessary 2 Click OK when you are finished See Requirements for Changing Volume Parameters on page 235 for detailed requirements

Download Pdf Manuals

image

Related Search

Related Contents

Whynter KS-1200 User's Manual  HCC10X e HCC210X Guida rapida all`installazione  Türterminal Europaversion Door Terminal  AB-5000 MG/UV  Instalação e configuração do scanner  マイクロプレートウォッシャー簡易取扱説明書 (ImmunoWash Model  Trennschaltverstärker IM1-22Ex-R... / IM12-22Ex-R... (DE/EN    ダウンロード(PDF 0.46MB)  MDO4000 Series Declassification and Security  

Copyright © All rights reserved.
Failed to retrieve file