Home

HP StoreEasy 3830 Gateway Storage/S-Buy User's Manual

image

Contents

1. d ADSI Edit Name fdas Ss Distinguished Name 3 Default naming context localhos CN users group CN users CN Users CN nfs DC nfs E CN nfs DC nfs CN root user CN root CN Users CN nfs DC nfs CN LostAndFound CN rootgroup group CN rootgroup CN Users CN nfs DC nfs SEA Quotas CN john user CN john CN Users CN nfs DC nfs m ised CN mary user CN mary CN Users CN nfs DC nfs E gt CN users C CN root E CN rootgroup E CN john CN mary Figure 16 NFS mapped users and groups in ADSI Edit Because the imported users and groups are now Windows users and groups as well as UNIX users and groups you can use NFS sharing so that volumes folders and files are visible in both the Windows file system and the UNIX file system When you set ownership or permissions in the Windows file system the proper ownership and permissions are set on the UNIX side Likewise setting ownership or permissions in the UNIX file system results in proper values on the Windows file system Shared access example The following example illustrates how to use the provided AD LDS scripts By following the procedures you will create a password and group file that serves as input for the nfs adlds config js script You will then create a Windows folder that you will set to be NFS shared by the group Everyone You will then mount this folder in UNIX and observe how a file created in UNIX is owned by the corresponding mapped user on the Windows system Similarly you w
2. ooooonnnccnnnncccinoncccnnoncccononnccononccconnncnnnnoss 96 Checklists for cluster server installation oooooooonnncccnnnooccnooccccooocccconncnccononcnoononnonononcononcccnnnos 96 Network reg iremenis poa is 96 Shared disk requirements eege ia 96 TUE EE 97 e RER 97 X3000 G2 Network Storage System User Guide 5 Configuring the private network adapter nnn annsenrerseerresnenerenneerensenvensenrvensennen 97 Configuring the public network adapler iii a das diva 98 Renaming the local area connection icons ceecececceeeeeseeeeeeeeeneeeeeeenaaeeeeeeseeeeeeeesneaes 98 Verifying connectivity and name resolution oooocooooccccnoncccconnnononn conan no nonnnnncranonncnannno 98 Verifying domain membership 98 Setting up a cluster account EE 98 e EE 98 reegen EE 99 Verifying disk access and functionality nnn aarsaonnensennrensnnereenserrenseeereeneeerennverennen 99 Configuring cluster service software ai 99 Using Failover Cluster Management onno onenereerennennnereeeennnenverennsneneeenennnneeeesennnn 99 EE EE 99 E NEE 99 Geographically EE 100 Cluster groups and resources including file share 100 A ee 100 Node based cluster groups acres 101 E E E aed ue cn na 101 File share resource planning issues aics ossssnindavsvansaveranyoratessasoonsentaasanac aant ridad 101 GET EE 101 Permissions and access rights on share resources cecccceeeeeeeeeeeeeeeeeeeeeseeeeeseeeeeneeeens 102 NS EE 102 Non
3. EY NOTE Dynamic disks cannot be used for clustering configurations because Microsoft Cluster only supports basic disks File system elements File system elements are composed of the folders and subfolders that are created under each logical storage element partitions logical disks and volumes Folders are used to further subdivide the available file system providing another level of granularity for management of the information space Each of these folders can contain separate permissions and share names that can be used for network access Folders can be created for individual users groups projects and so on File sharing elements The storage system supports several file sharing protocols including Distributed File System DFS Network File System NFS File Transfer Protocol FTP Hypertext Transfer Protocol HTTP and Microsoft Server Message Block SMB On each folder or logical storage element different file sharing protocols can be enabled using specific network names for access across a network to a variety of clients Permissions can then be granted to those shares based on users or groups of users in each of the file sharing protocols Volume Shadow Copy Service overview The Volume Shadow Copy Service VSS provides an infrastructure for creating point in time snapshots shadow copies of volumes VSS supports 64 shadow copies per volume Shadow Copies of Shared Folders resides within this infrastructure an
4. Workaround Confirm that the power settings for the storage system ignore the power button or disable the power button in the system BIOS Issue After installing the storage system in Chinese or Japanese some non Unicode applications display question mark characters instead of the correct characters When a storage system is first installed either by booting a new storage system or by restoring the system with the System Recovery DVD the Windows Welcome wizard offers a choice of languages The second page of the Windows Welcome wizard allows selection of settings for Country and Region Time and Currency and Keyboard Layout When the appropriate Chinese or Japanese settings are selected they are correctly reflected in the Region and Language Control Panel program however despite the correct regional settings some applications that do not support Unicode do not display characters correctly Workaround Change the regional settings to another language and location and then back to Chinese or Japanese The following steps describe how to change to English settings and then back to the desired region and language settings 1 Asa local administrator open the Region and Language Control Panel program Start gt Control Panel gt Clock Language and Region gt Region and Language 2 On the Format tab select English United States from the list of languages and regions and then click Apply 3 On the Location tab select United S
5. Monitor attempts to save unauthorized files for all users or a selected group of users e Generate storage reports instantly Other Windows disk and data management tools When you install certain tools such as Windows Support Tools or Windows Resource Kit Tools information about these tools might appear in Help and Support Center To see the tools that are available to you look in the Help and Support Center under Support Tasks click Tools and then click Tools by Category EY NOTE The Windows Support Tools and Windows Resource Kit Tools including documentation for these tools are available in English only If you install them on a non English language operating system or on an operating system with a Multilingual User Interface Pack MUI you see English content mixed with non English content in Help and Support Center To see the tools that are available to you click Start click Help and Support Center and then under Support Tasks click Tools Additional information and references for file services Backup HP recommends that you back up the print server configuration whenever a new printer is added to the network and the print server configuration is modified HP StorageWorks Library and Tape Tools HP StorageWorks Library and Tape Tools L amp TT provides functionality for firmware downloads verification of device operation maintenance procedures failure analysis corrective service actions and some utility f
6. The Failover Cluster Management tool provides complete online help for all cluster administration activities Cluster resources include administrative types of resources as well as file shares The following paragraphs include overview and planning issues for cluster groups cluster resources and clustered file shares Creating and managing these resources and groups must be managed through Failover Cluster Management Cluster group overview A default cluster group is automatically created when the cluster is first created This default cluster group contains an Internet Protocol IP Address resource a Network Name resource and the Quorum disk resource When the new cluster is created the IP address and the cluster name that were specified during setup are set up as the IP address and network name of this default cluster group A CAUTION Do not delete or rename the Cluster Group or IP Address Doing so results in losing the cluster and requires reinstallation of the cluster When creating groups the administrator s first priority is to gain an understanding of how to manage the groups and their resources Administrators may choose to create a resource group and a virtual server for each node that will contain all resources owned by that node or the administrator may choose to create a resource group and virtual server for each physical disk resource Additionally the administrator should try to balance the load of the grou
7. 5 PCle slot 3 SAS Expander 6 PCle slot 1 7 Power supply 2 standard 8 Power supply 1 standard 9 USB connectors 2 10 Video connector 11 NIC 1 connector 12 NIC 2 connector 13 Mouse connector 14 Keyboard connector Serial connector os U iLO 3 connector mi N NIC 3 connector 18 NIC 4 connector Figure 8 HP X3800 G2 rear panel LEDs and buttons Table 5 HP X3800 G2 rear panel LED and button descriptions ltem Description Status Green Normal lie Power supply LED Off System is off or power supply has failed Blue Activated 2 UID LED button Flashing blue System being managed remotely Off Deactivated 26 Storage system component identification ltem Description Status Green Network activity 3 NIC iLO 3 activity LED Flashing green Network activity Off No network activity Green Network link Off No network link A NIC iLO 3 link LED HP X3800sb G2 Network Storage Gateway Blade hardware componenis The following figures show components and LEDs located on the front panel of the X3800sb G2 Network Storage Gateway Figure 9 HP X3800sb G2 front panel components SUV connector Serial label pull tab Release button Server blade release lever Power On Standby button Hard drive bay 1 Hard drive bay 2
8. 7 Click Yes to continue If the old drive letter needs to be re used reboot the server after clicking Yes 116 System recovery 9 Support and other resources Contacting HP For worldwide technical support information see the HP support website http www hp com support Before contacting HP collect the following information e Product model names and numbers Technical support registration number if applicable e Product serial numbers e Error messages e Operating system type and revision level Detailed questions Typographic conventions Table 14 Document conventions Convention Element Blue text Table 14 Cross reference links and e mail addresses Blue underlined text http www hp com Website addresses Keys that are pressed Text typed into a GUI element such as a box Bold text y GUI elements that are clicked or selected such as menu and list items buttons tabs and check boxes Italic text Text emphasis File and directory names System output Code Monospace text Commands their arguments and argument values Code variables Monospace italic text A SE Command variables Monospace bold text Emphasized monospace text X3000 G2 Network Storage System User Guide 117 A WARNING Indicates that failure to follow directions could result in bodily harm or death A CAUTION Indicates that failure to follow directions could result in damage to equipm
9. 93 network planning 94 network requirements cluster 96 NFS share resource 104 node server 90 O online spares 52 F partitions extended 53 primary 53 permissions file level 77 list adding users and groups 78 removing users and groups 78 modifying 79 resetting 79 physical disk resources 93 103 physical configuration 19 physical storage elements 50 planning network 94 network access method 13 protocol 95 storage 94 power on server 15 Print Management 35 printer spooler creating in a cluster 105 private network adapter configuring 97 protocols non cluster aware 103 planning 95 public network adapter configuring 98 Q Quorum disk defined 9 1 recommendations 98 quota management 85 R rack stability warning 118 RAID data striping 51 LUNs in volumes 54 summary of methods 52 recycling notices 128 regulatory compliance Canadian notice 122 European Union notice 123 identification numbers 121 Japanese notices 123 Korean notices 124 Taiwanese notices 124 regulatory compliance laser 126 recycling notices 128 remote browser method connecting to network 18 Remote Desktop method connecting to network 19 remote access Telnet 19 Remote browser access storage system 18 Remote Desktop access storage system 18 Remote Desktop for Administration 33 remote support 119 resources cluster 90 S SAN environment 58 SAS SATA hard drives LEDs 28 securi
10. Today August 19 2003 2 35 PM Today August 19 2003 12 00 PM Today August 19 2003 7 00 4M Yesterday August 18 2003 5 53 PM View Copy Restore Cancel Apply Help Figure 33 Recovering a deleted file or folder Recovering an overwritten or corrupted file Recovering an overwritten or corrupted file is easier than recovering a deleted file because the file itself can be right clicked instead of the folder To recover an overwritten or corrupted file 1 2 3 Recovering a folder Right click the overwritten or corrupted file and then click Properties Click Previous Versions To view the old version click View To copy the old version to another location click Copy to replace the current version with the older version click Restore To recover a folder 1 Position the cursor so that it is over a blank space in the folder to be recovered If the cursor hovers over a file that file is selected Right click select Properties from the bottom of the menu and then click the Previous Versions tab X3000 G2 Network Storage System User Guide 75 3 Click either Copy or Restore Clicking Restore enables the user to recover everything in that folder as well as all subfolders Clicking Restore does not delete any files Backup and shadow copies Shadow copies are only available on the network via the client application and only at a file or folder level as opposed to the entire volume H
11. na recykl ciu odpadov ch elektrick ch a elektronick ch zariaden al ie inform cie z skate od spolo nosti zaoberaj cej sa likvid ciou domov ho odpadu Spanish recycling notice Eliminaci n de los equipos que ya no se utilizan en entornos dom sticos de la Uni n Europea Este s mbolo indica que este producto no debe eliminarse con los residuos dom sticos En lugar de ello debe evitar causar da os a la salud de las personas y al medio ambiente llevando los equipos que no utilice a un punto de recogida designado para el reciclaje de equipos el ctricos y electr nicos que ya no se utilizan Para obtener m s informaci n p ngase en contacto con el servicio de recogida de residuos dom sticos Swedish recycling notice Hantering av elektroniskt avfall f r hemanv ndare inom EU Den h r symbolen inneb r att du inte ska kasta din produkt i hush llsavfallet V rna i st llet om natur och milj genom att l mna in uttj nt utrustning p anvisad insamlingsplats Allt elektriskt och elektroniskt avfall g r sedan vidare till tervinning Kontakta ditt tervinningsf retag f r mer information X3000 G2 Network Storage System User Guide 133 Battery replacement notices Dutch battery notice Verklaring betreffende de batterij AN WAARSCHUWING dit apparaat bevat mogelijk een batterij Probeer de batterijen na het verwijderen niet op te laden Stel de batterijen niet bloot aan water of temperaturen boven
12. 10 KREE 52 11 Tasks and utilities needed for storage system configuration oooocccnonccccooncccononncccnnnnos 58 12 Sharing protocol cluster supra eieren 95 13 Power sequencing for cluster installation cccceecceseeseeeeeeeeeeceseeeeeeeeeenteeeeetseeeetaees 97 14 Document GORVEN MONS ad 117 X3000 G2 Network Storage System User Guide 11 1 Installing and configuring the storage system Setup overview The HP StorageWorks X3000 G2 Network Storage System comes preinstalled with the Microsoft Windows Storage Server 2008 R2 Enterprise Edition x64operating system with Microsoft iSCSI Software Target and a Microsoft Cluster Service MSCS license included IMPORTANT Windows Storage Server 2008 R2 x64 operating systems are designed to support 32 bit applic ations without modification however any 32 bit applications that are run on these operating systems should be thoroughly tested before releasing the storage system to a production environ ment e Windows Storage Server x64 editions support only x64 based versions of Microsoft Management Console MMC snap ins not 32 bit versions Check kit contents Remove the contents making sure you have all the components listed below If components are missing contact HP technical support HP StorageWorks X3000 G2 Network Storage System with operating system preloaded e Power cord s Safety and Disposal Documentation CD HP StorageWorks Storage Syste
13. Hadmae Shaving Security Shadow Copies Gute Shadow copies allow users to view the contents of shared folders as the contents existed at previous points in time Select a volume Volume Next Aun Time Shares _Used eat 6 18 2027 1 162MB on Disable Settings Shadow copies of selected volume 6 5 2002 4 27 AM 6 4 2002 3 00 PM Create Now 5 31 2002 4 18 PM Delete Now Figure 28 System administrator view of Shadow Copies for Shared Folders X3000 G2 Network Storage System User Guide 67 The shadow copy cache file The default shadow copy settings allocate 10 percent of the source volume being copied with a minimum of 350 MB and store the shadow copies on the same volume as the original volume See Figure 29 The cache file is located in a hidden protected directory titled System Volume Information off of the root of each volume for which shadow copy is enabled Figure 29 Shadow copies stored on a source volume The cache file location can be altered to reside on a dedicated volume separate from the volumes containing files shares See Figure 30 GEI Figure 30 Shadow copies stored on a separate volume 68 File server management The main advantage to storing shadow copies on a separate volume is ease of management and performance Shadow copies on a source volume must be continually monitored and
14. Microsoft Windows Storage Server 2008 R2 administration oo 33 Remote Desktop for Administration iii 33 Share and Storage Management EN 33 Single Instance E 34 A sennsnneennardaneninenbentnndk nennen ranteeteneenhdsenn annen 35 Network File System NFS User Mapping ugoe 35 SEA tende A 36 Microsoft hottix 2222746 Ee 36 A o neee 36 Phase EMS A A 37 SEH Eelere en 38 Verifying RE 39 Shared access example ugestallt geg 41 4 Storage E DE 49 X3000 G2 Network Storage System User Guide 3 Storage management elements EE 49 EH 49 Physical storage EE 50 UE 51 Fault toleran E eee 52 Online Eeer 52 Logical storage SlemEnls annette te etten atb opeen ae 52 eege 52 ER wee acct cael ace ate rca 53 KE 53 File systerin elements egenen eebe aia 54 EE 54 Volume Shadow Copy Service overview ccccsccceessceseessecseneecseeeecseeeeecnseeeecsaeeeeneesensaaeeees 54 A 55 Oe 55 Network adapter teaming o 55 ege EE Ee 55 HP Systems Insight Manager EG 55 Management Agents nnee neeeeeenereennennennnnnnnsnnnsenneereneeververeevereeevereeeneeennne nennen 56 5 File server management nanne enenenennnnnnnnennnnnnsnnennnnnn a File services features in Windows Storage Server 2008 RI 57 Storage Manager SANS ia dese OREN E EEY 57 Single Instance Storage sais 57 File Server Resource E 57 VOTE E 57 Files rvices management E 58 Configuring data storage eebe ee 58 Storage management TEE 58 Array management utilities snor rentenieren ten
15. Recover files that were accidentally deleted Previous versions can be opened and copied to a safe location e Recover from accidentally overwriting a file A previous version of that file can be accessed Compare several versions of a file while working Use previous versions to compare changes between two versions of a file Shadow copies cannot replace the current backup archive or business recovery system but they can help to simplify restore procedures Because a snapshot only contains a portion of the original data blocks shadow copies cannot protect against data loss due to media failures However the strength of snapshots is the ability to instantly recover data from shadow copies reducing the number of times needed to restore data from tape Shadow copy planning Before setup is initiated on the server and the client interface is made available to end users consider the following From what volume will shadow copies be taken How much disk space should be allocated for shadow copies e Will separate disks be used to store shadow copies How frequently will shadow copies be made Identifying the volume Shadow copies are taken for a complete volume but not for a specific directory Shadow copies work best when the server stores user files such as documents spreadsheets presentations graphics or database files 64 File server management EY NOTE Shadow copies should not be used to provide access to pre
16. Storage System User Guide 29 1 Fault UID LED am 2 Online activity LED Status ber blue green Amber flashing regularly 1 of A predictive failure alert has been received for this Hz drive Replace the drive as soon as possible off of The drive is offline a spare or not configured as part of an array Systems Insight Display LEDs The HP Systems Insight Display LEDs represent the system board layout The display enables diagnosis with the access panel installed OVER Gudd SUPPLY SUPPLY Figure 12 Systems Insight Display LEDs Table 8 Systems Insight Display LED descriptions ltem Description Status Green Network link 1 NIC link activity LED Flashing green Network link and activity ee Off No link to network If the power is off view the rear panel RJ 45 LEDs for status To determine Power cap status see Systems Insight Display LED combin 2 Power cap ations on page 31 30 Storage system component identification Item Description 3 AMP status Green AMP mode enabled Amber Failover Flashing amber invalid configuration Off AMP modes disabled All other LEDs Off Normal Amber Failure For detailed information on the activation of these LEDs see Systems Insight Display LED combinations on page 31 Systems Insight Display LED combinations When the internal health LED on the front panel illuminates either amber or
17. TT 76 Folder mana ement naaa 77 Share TE 83 SE 83 Defining Access Control E 84 Integrating local file system security into Windows domain environments nnen 84 Comparing administrative hidden and standard dote 84 ee 85 File Server Resource Manager nnn ansnnnnrsennnensennrensanerensserrensnerreenserrennverensnnvensenssensenvenenen 85 QUO A MANTE ii geet tee eegend Ee eieren daneen 85 File screening E 86 o onreine veinesoliteelrtananennteandandhantonseridaneinserdshteisneenrneiin seite kene 86 Other Windows disk and data management oos 86 Additional information and references for file services nnsnnner onser ennen ennen eneeenneeenverenneeennen 86 EE 86 HP StorageWorks Library and Tape Tools ninae banene 86 Ee 87 G laste CG E EE 89 HEEN eebe 89 Cluster terms and components nmmr eenakter dances yieonbnnbwldawsenendbiyets 90 Kl eta haesen E entend 90 A ee KANN DREES 90 e 91 Virtual EE a np eer i 91 Failover and failback EE 91 Quorum SE ia 91 sole 92 Sequence of events for cluster resources nn snnnannnnnennner eneen eneer ennen enneenneeenneerenverenverennenennn 92 Hierarchy of cluster resource components anna aannernennereesseereneneeerenneeeesennsensnnesensnneenennnenn 93 Cl ster E E 93 Braga EE 94 Network panning ia 94 Protocol planning aiee a PP A 95 Preparing for cluster installation E 95 Before beginning installation cuina ninia ea ii 96 Using multipath data paths for high availability
18. While some backup applications might be designed with the hardware provider software that enables transport others are not The administrator should determine whether or not this functionality is included in the backup application Data mining The data in use by a particular production server is often useful to different groups or departments within an organization Rather than add additional traffic to the production server a shadow copy of the data can be made available through transport to another server The shadow copy can then be processed for different purposes without any performance impact on the original server The transport process is accomplished through a series of DISKRAID command steps 1 Create a shadow copy of the source data on the source server read only 2 Mask off hide the shadow copy from the source server 3 Unmask the shadow copy to a target server 4 Optionally clear the read only flags on the shadow copy The data is now ready to use Folder and share management The storage system supports several file sharing protocols including DFS NFS FTP HTTP and Microsoft SMB This section discusses overview information as well as procedures for the setup and 76 File server management management of the file shares for the supported protocols Security at the file level and at the share level is also discussed EY NOTE Select servers can be deployed in a clustered or non clustered configuratio
19. X3000 G2 Network Storage System User Guide 31 Systems Insight Internal health LED Status Display LED and color color Online spare memory flashing Red Invalid online spare memory configuration amber Online spare Green Online spare memory enabled and not failed memory green Murrored memory Amber Bank s X failed over to the mirrored memory bank s amber Mirrored memory flashing amber Invalid mirrored memory configuration Mirrored memory green Mirrored memory enabled and not failed Overtemperature amber The Health Driver has detected a cautionary temperature level The server has detected a hardware critical temperature level Riser interlock am ber PCI riser cage is not seated Fan amber 32 One fan has failed or is removed Storage system component identification Two or more fans have failed or are removed 3 Administration tools HP StorageWorks X3000 G2 Network Storage Systems include several administration tools to simplify storage system management tasks Microsoft Windows Storage Server 2008 R2 administration tools Microsoft Windows Storage Server 2008 R2 operating systems provide a user interface for initial server configuration unified storage system management simplified setup and management of storage and shared folders and support for Microsoft SCSI Software Target It is specially tuned to provide optimal performan
20. a DNS Server Setting up a cluster account The Cluster service requires a domain user account under which the Cluster service can run This user account must be created before installing Cluster service because setup requires a user name and password This user account should be a unique domain account created specifically to administer this cluster This user account will need to be granted administrator privileges About the Quorum disk HP makes the following Quorum disk recommendations Dedicate a separate disk resource for a Quorum disk Because the failure of the Quorum disk would cause the entire cluster to fail HP strongly recommends that the disk resource be a RAID 1 configuration Create a partition with a minimum of 50 megabytes MB to be used as a Quorum disk HP recom mends a Quorum disk be 500 MB HP recommends assigning the drive letter Q for the Quorum disk It is also helpful to label the volume Quorum EY NOTE It is possible to change the Quorum disk by clicking the Quorum button This displays a list of available disks that can be used for the Quorum disk Select the appropriate disk and then click OK to continue 98 Cluster administration Configuring shared disks Use the Windows Disk Management utility to configure additional shared disk resources Verify that all shared disks are formatted as NTFS and are designated as Basic Additional shared disk resources are automatically added into the cl
21. be given access permissions to shares managed by the device The domain name of the storage system supplies the context in which the user or group is understood Permission configuration depends on the network and domain infrastructure where the server resides Filesharing protocols except NFS supply a user and group context for all connections over the network NFS supplies a machine based context When new files are created by those users or machines the appropriate ACLs are applied Configuration tools provide the ability to share permissions out to clients These shared permissions are propagated into a file system ACL and when new files are created over the network the user creating the file becomes the file owner In cases where a specific subdirectory of a share has different permissions from the share itself the NTFS permissions on the subdirectory apply instead This method results in a hierarchical security model where the network protocol permissions and the file permissions work together to provide appropriate security for shares on the device EY NOTE Share permissions and file level permissions are implemented separately It is possible for files on a file system to have different permissions from those applied to a share When this situation occurs the file level permissions override the share permissions Comparing administrative hidden and standard shares CIFS supports both administrative shares and standard shar
22. completion the Windows Storage Server 2008 R2 desktop displays the following message The user s password must be changed before logging on the first time Log on to the storage system by establishing an Administrator password 4 Click OK X3000 G2 Network Storage System User Guide 115 ON AH Type an Administrator password in the New password box Re type the Administrator password in the Confirm password box Click the blue arrow next to the Confirm password box Click OK After the Administrator password has been set the storage system completes the recovery process Remove the USB Flash drive from the X Series system or client PC Managing disks after a restoration When a system that has existing data volumes non operating system volumes is restored using the System Recovery DVD the data volumes will not have drive letters assigned to them This is by design The volume labels are retained and can be used to identify the data volumes There is no workaround for this issue however drive letters can be assigned to volumes using diskpart exe or by using Disk Management 1 Click Start gt Run enter diskmgmt mscand then click OK 2 Right click the disk and partition that you want to assign the drive letter to 3 Select Change drive Letter and Paths 4 In the Change drive Letter and Paths dialog box select Change 5 Select the appropriate drive letter then click OK 6 Click Yes to confirm the drive letter change
23. device may contain a laser that is classified as a Class 1 Laser Product in accordance with U S FDA regulations and the IEC 60825 1 The product does not emit hazardous laser radiation A WARNING Use of controls or adjustments or performance of procedures other than those specified herein or in the laser product s installation guide may result in hazardous radiation exposure To reduce the risk of exposure to hazardous radiation Do not try to open the module enclosure There are no user serviceable components inside Do not operate controls make adjustments or perform procedures to the laser device other than those specified herein e Allow only HP Authorized Service technicians to repair the unit The Center for Devices and Radiological Health CDRH of the U S Food and Drug Administration implemented regulations for laser products on August 2 1976 These regulations apply to laser products manufactured from August 1 1976 Compliance is mandatory for products marketed in the United States Dutch laser notice AN WAARSCHUWING dit apparaat bevat mogelijk een laser die is geclassificeerd als een laserproduct van Klasse 1 overeenkomstig de bepalingen van de Amerikaanse FDA en de richtlijn IEC 60825 1 Dit product geeft geen gevaarlijke laserstraling af Als u bedieningselementen gebruikt instellingen aanpast of procedures uitvoert op een andere manier dan in deze publicatie of in de installatiehandleiding van het laserpro
24. disk is the shared storage used by the cluster nodes to coordinate the internal cluster state This physical disk in the common cluster disk array plays a critical role in cluster operations The Quorum disk offers a means of persistent storage The disk must provide physical storage that can be accessed by all nodes in the cluster If a node has control of the quorum resource upon startup it can initiate the cluster In addition if the node can communicate with the node that owns the quorum resource it can join or remain in the cluster The Quorum disk maintains data integrity by X3000 G2 Network Storage System User Guide 91 Storing the most current version of the cluster database Guaranteeing that only one set of active communicating nodes is allowed to operate as a cluster Cluster concepts Figure 42 illustrates a typical cluster configuration with the corresponding storage elements The diagram progresses from the physical disks to the file shares showing the relationship between both the cluster elements and the physical devices underlying them While the diagram only illustrates two nodes the same concepts apply for multi node deployments Cluster Group FS1Eng Cluster Resource IP Address 172 18 1 99 Cluster Cluster Resource Resource File Share Network Engl Name E eng Fileserverl E engl E eng2 E eng3 Cluster Resource Physical Disk E Raidsets 1 3 Be o 000 Physical Disks 1 4 Figure 42 Cl
25. displayed Create a volume on the new logical disk Select a drive letter and enter a volume label volume size allocation unit size and mount point if desired Storage management utilities The storage management utilities preinstalled on the storage system include the HP Array Configuration Utility ACU 58 File server management Array management utilities Storage devices for RAID arrays and LUNs are created and managed using the array management utilities mentioned previously For HP Smart Arrays use the ACU EY NOTE The ACU is used to configure and manage array based storage Software RAID based storage systems use Microsoft Disk Manager to manage storage You need administrator or root privileges to run the ACU Array Configuration Utility The HP ACU supports the Smart Array controllers and hard drives installed on the storage system To open the ACU from the storage system desktop EY NOTE If this is the first time that the ACU is being run you will be prompted to select the Execution Mode for ACU Selecting Local Application Mode allows you to run the ACU from a Remote Desktop remote console or storage system web access mode Remote service mode allows you to access the ACU from a remote browser 1 Select Start gt Programs gt HP Management Tools gt Array Configuration Utility 2 If the Execution Mode for ACU is set to Remote Mode log on to the HP System Management Homepage The defa
26. e jej p ed te na k tomu ur en sb rn pracovi t kde se zab vaj recyklac elektrick ho a elektronick ho vybaven Pro v ce informac kontaktujte spole nost zab vaj c se sb rem a svozem domovn ho odpadu Danish recycling notice Bortskaffelse af brugt udstyr hos brugere i private hjem i EU Dette symbol betyder at produktet ikke m bortskaffes sammen med andet husholdningsaffald Du skal i stedet den menneskelige sundhed og milj et ved at afl evere dit brugte udstyr p et dertil beregnet indsamlingssted for af brugt elektrisk og elektronisk udstyr Kontakt n rmeste renovationsafdeling for yderligere oplysninger Dutch recycling notice Inzameling van afgedankte apparatuur van particuliere huishoudens in de Europese Unie Dit symbool betekent dat het product niet mag worden gedeponeerd bij het overige huishoudelijke afval Bescherm de gezondheid en het milieu door afgedankte apparatuur in te leveren bij een hiervoor bestemd inzamelpunt voor recycling van afgedankte elektrische en elektronische apparatuur Neem voor meer informatie contact op met uw gemeentereinigingsdienst X3000 G2 Network Storage System User Guide 129 Estonian recycling notice Aravisatavate seadmete likvideerimine Euroopa Liidu eramajapidamistes See mark n itab et seadet ei tohi visata olmepr gi hulka Inimeste tervise ja keskkonna s stmise nimel tuleb Gravisatav toode tuua elektriliste ja elektrooniliste seadmete k itlemisega eg
27. enabling disk quotas it is possible to set both the disk quota limit and the disk quota warning level The disk quota limit specifies the amount of disk space a user is allowed to use The warning level specifies the point at which a user is nearing his or her quota limit For example a user s disk quota limit can be set to 50 megabytes MB and the disk quota warning level to 45 MB In this case the user can store no more than 50 MB on the volume If the user stores more than 45 MB on the volume the disk quota system logs a system event In addition it is possible to specify that users can exceed their quota limit Enabling quotas and not limiting disk space use is useful to still allow users access to a volume but track disk space use on a X3000 G2 Network Storage System User Guide 61 per user basis It is also possible to specify whether or not to log an event when users exceed either their quota warning level or their quota limit When enabling disk quotas for a volume volume usage is automatically tracked from that point forward but existing volume users have no disk quotas applied to them Apply disk quotas to existing volume users by adding new quota entries on the Quota Entries page EY NOTE When enabling disk quotas on a volume any users with write access to the volume who have not exceeded their quota limit can store data on the volume The first time a user writes data to a quota enabled volume default values for disk sp
28. fault tolerance performance and storage capacity e Use the determined priority of system characteristics to determine the optimal striping policy and RAID level 50 Storage management overview e Include the appropriate number of physical drives in the arrays to create logical storage elements of desired sizes Arrays See Figure 25 With an array controller installed in the system the capacity of several physical drives P1 P3 can be logically combined into one or more logical units L1 called arrays When this is done the read write heads of all the constituent physical drives are active simultaneously dramatically reducing the overall time required for data transfer EY NOTE Depending on the storage system model array configuration may not be possible or necessary SE nu q EZ B WR E E E P1 P2 P3 gl0042 Figure 25 Configuring arrays from physical drives Because the read write heads are simultaneously active the same amount of data is written to each drive during any given time interval Each unit of data is termed a block The blocks form a set of data stripes over all the hard drives in an array as shown in Figure 26 S1 S2 3 S4 Figure 26 RAID O data striping S1 S4 of data blocks B1 B12 For data in the array to be readable the data block sequence within each stripe must be the same This sequencing process is performed by the array controller which sends the data bloc
29. group of users in mind However creating too many shares also has its drawbacks For example if it is sufficient to create a single share for user home directories create a homes share rather than creating separate shares for each user By keeping the number of shares and other resources low the performance of the storage system is optimized For example instead of sharing out each individual user s home directory as its own share share out the top level directory and let the users map personal drives to their own subdirectory Defining Access Control Lists The Access Control List ACL contains the information that dictates which users and groups have access to a share as well as the type of access that is permitted Each share on an NTFS file system has one ACL with multiple associated user permissions For example an ACL can define that User 1 has read and write access to a share User2 has read only access and User3 has no access to the share The ACL also includes group access information that applies to every user in a configured group ACLs are also referred to as permissions Integrating local file system security into Windows domain environments ACLs include properties specific to users and groups from a particular workgroup server or domain environment In a multidomain environment user and group permissions from several domains can apply to files stored on the same device Users and groups local to the storage system can
30. is a registered trademark of The Open Group Warranty WARRANTY STATEMENT To obtain a copy of the warranty for this product see the warranty information website http www hp com go storagewarranty Contents 1 Installing and configuring the storage system nonnen oenen 13 SO ire aaa A E EEA EA EEE E E EE 13 heek kif SOENS E 13 Determine an access E EE 13 Locate the serial number Certificate of Authenticity and End User License Agreement 14 Install the storage system hardware viii ii io 14 Connect to the storage iii ed 14 Power on the server and log EE 15 Confirm Windows activation TEE 16 Configure the storage EE 17 Complete system configuration E 17 Additional access E D 18 Using the remote browser method cccccccccsseceesseceeeseeeceeeeeeeeeeeeseeeeseneeesseeeeeseeeeeenaeeeeaes 18 Using the Remote Desktop method ri a 18 Using the Telnet ergeet EES 19 Enabling Telnet EE 19 Default storage EE 19 Physical configuration EE 19 Default boot EE 20 2 Storage system component identification ooooooooooooccccccccononanannnonnnos 21 HP X3400 G2 Network Storage Gateway hardware component nennen onee enenerenneeeenen 21 HP X3800 G2 Network Storage Gateway hardware component ccsseeceeeeseeeeeseeeeenseeeeeseeeees 23 HP X3800sb G2 Network Storage Gateway Blade hardware components anneer 27 SAS and SATA hard drive KEE 28 Systems Insight Display LEDs o 30 Systems Insight KREE 31 J Adminin AMA 33
31. location using a web browser HP SIM provides device management capabilities that consolidate and integrate management data from HP and third party devices IMPORTANT You must install and use HP SIM to benefit from the Pre Failure Warranty for processors SAS and SCSI hard drives and memory modules X3000 G2 Network Storage System User Guide 55 For additional information refer to the Management CD in the HP ProLiant Essentials Foundation Pack or the HP SIM website http www hp com go hpsim Management Agents Management Agents provide the information to enable fault performance and configuration management The agents allow easy manageability of the server through HP SIM software and thirdparty SNMP management platforms Management Agents are installed with every SmartStart assisted installation or can be installed through the HP PSP The Systems Management homepage provides status and direct access to in depth subsystem information by accessing data reported through the Management Agents For additional information refer to the Management CD in the HP ProLiant Essentials Foundation Pack or the HP website http www hp com servers manage 56 Storage management overview 5 File server management This chapter begins by identifying file services in Windows Storage Server 2008 R2 The remainder of the chapter describes the many tasks and utilities that play a role in file server management File services feature
32. management utility Create disk arrays HP Array Configuration Utility Create logical disks from the array space HP Array Configuration Utility Verify newly created logical disks Windows Disk Management Create a volume on the new logical disk Windows Disk Management Create disk arrays On storage systems with configurable storage physical disks can be arranged as RAID arrays for fault tolerance and enhanced performance and then segmented into logical disks of appropriate sizes for particular storage needs These logical disks then become the volumes that appear as drives on the storage system A CAUTION The single logical drive is configured for the storage system operating system and should not be altered in any manner If the operating system logical drive is altered the system recovery process may not function properly when using the System Recovery DVD Do not tamper with the local C volume This is a reserved volume and must be maintained as it exists The fault tolerance level depends on the amount of disks selected when the array was created A minimum of two disks is required for RAID 0 1 configuration three disks for a RAID 5 configuration and four disks for a RAID 6 ADG configuration Create logical disks from the array space Select the desired fault tolerance stripe size and size of the logical disk Verify newly created logical disks Verify that disks matching the newly created sizes are
33. of complex advanced mappings in the case of a system failure back up the mappings whenever the mappings have been edited or new mappings have been added Map consistently Groups that are mapped to each other should contain the same users and the members of the groups should be properly mapped to each other to ensure proper file access Map properly e Valid UNIX users should be mapped to valid Windows users Valid UNIX groups should be mapped to valid Windows groups e Mapped Windows user must have the Access this computer from the Network privilege or the mapping will be squashed e The mapped Windows user must have an active password or the mapping will be squashed In a clustered deployment create user name mappings using domain user accounts Because the security identifiers of local accounts are recognized only by the local server other nodes in the cluster will not be able to resolve those accounts during a failover Do not create mappings using local user and group accounts In a clustered deployment administer user name mapping on a computer that belongs to a trusted domain If NFS administration tasks are performed on a computer that belongs to a domain that is not trusted by the domain of the cluster the changes are not properly replicated among the nodes in the cluster In a clustered deployment if PCNFS password and group files are being used to provide user and group information these files must be located o
34. on the storage system However VSS can only use volumes that are NTFS formatted Also quota management is possible only on NTFS Clustered server elements HP StorageWorks X3000 Network Storage Systems support clustering These storage systems support several file sharing protocols including DFS NFS FTP HTTP and Microsoft SMB Only NFS FTP and Microsoft SMB are cluster aware protocols HTTP can be installed on each node but the protocols cannot be set up through cluster administrator and they will not fail over during a node failure Network names and IP address resources for the clustered file share resource can also be established for access across a network to a variety of clients Permissions can then be granted to those shares based on users or groups of users in each of the file sharing protocols Network adapter teaming Network adapter teaming is software based technology used to increase a server s network availability and performance Teaming enables the logical grouping of physical adapters in the same server regardless of whether they are embedded devices or Peripheral Component Interconnect PCI adapters into a virtual adapter This virtual adapter is seen by the network and server resident network aware applications as a single network connection Management tools HP Systems Insight Manager HP SIM is a web based application that allows system administrators to accomplish normal administrative tasks from any remote
35. situations that may require recovery of files or folders e Accidental file deletion the most common situation e Accidental file replacement which may occur if a user selects Save instead of Save As e File corruption It is possible to recover from all of these scenarios by accessing shadow copies There are separate steps for accessing a file compared to accessing a folder Recovering a deleted file or folder To recover a deleted file or folder within a folder 1 Access to the folder where the deleted file was stored 2 Position the cursor over a blank space in the folder If the cursor hovers over a file that file is selected 3 Right click select Properties from the bottom of the menu and then click the Previous Versions tab Select the version of the folder that contains the file before it was deleted and then click View 5 View the folder and select the file or folder to recover The view may be navigated multiple folders deep 74 File server management 6 Click Restore to restore the file or folder to its original location Click Copy to allow the placement of the file or folder to a new location General Security Previous Versions 9 To view a previous version of a folder select the version from the following list and then click View You can also save a folder to a different location or restore a previous version of a folder Folder versions test test Today August 19 2003 3 12 PM
36. the following message The user s password must be changed before logging on the first time Log on to the storage system by establishing an Administrator password Click OK Type an Administrator password in the New password box Re type the Administrator password in the Confirm password box Click the blue arrow next to the Confirm password box Click OK After the Administrator password has been set the storage system completes the installation process and restarts E Sp E Pa 7 When prompted press CTRL ALT DELETE to log on to the system If using iLO on the iLO Integrated Remote Console tab click the button labeled CAD and then click the Ctrl Alt Del menu item IMPORTANT After establishing the new Administrator password be sure to remember it and record it in a safe place if needed HP has no way of accessing the system if the new password is lost Confirm Windows activation Immediately after installing the storage system confirm that your copy of the Microsoft Windows Storage Server 2008 R2 operating system has been activated O IMPORTANT Some storage systems may not automatically activate Windows during the system installation process To check the activation status of Windows open Control Panel Start gt Control Panel and then double click System If your copy of Windows has been activated the status under Windows activation will read Windows is activated If your copy o
37. user access check box 42 Administration tools NFS Advanced Sharing EN JV Share this Folder Settings Share name NfsTest Encoding DS X IV Kerberos v5 integrity and authentication KrbSi IV Kerberos v5 authentication Krb5 If No server authentication Auth_SY5 Enable unmapped user access Ce Allow unmapped user Unix access by UID GID Allow anonymous access Anonymous UID 2 Anonymous GID 2 To set permissions For how users access this PEES folder over the network click Permissions _ Permissions coca zm Figure 17 NFS Advanced Sharing dialog box Click the Permissions button In the Type of access list select Read Write Check the Allow root access check box NFS Share Permissions KE NFS Share Path C NfsTest Name ALL MACHINES Read write ANSI Add Remove Type of access Read wite y IV Allow root access Encoding ANSI E coca Figure 18 NFS Share Permissions dialog box Click OK twice to return to the NfsTest Properties dialog box X3000 G2 Network Storage System User Guide 43 Step 5 Step 6 Step 7 In the NfsTest Properties dialog box select the Security tab This tab shows the current security settings for the folder The following steps will add permissions for Everyone to have access to the NfsTest folder To do this click Edit and then click Add Under Group or user names type Everyone and then click OK In the Permissions fo
38. usuario pueda reparar No realice m s operaciones de control ajustes o manipulaciones en el dispositivo l ser que los aqu especificados S lo permita reparar la unidad a los agentes del servicio t cnico autorizado HP Recycling notices English recycling notice Disposal of waste equipment by users in private household in the European Union This symbol means do not dispose of your product with your other household waste Instead you should protect human health and the environment by handing over your waste equipment 9 to a designated collection point for the recycling of waste electrical and electronic equipment For more information please contact your household waste disposal service 128 Regulatory compliance notices Bulgarian recycling notice To3n CUMBON BbpXy Nposykta nnn onakoBkaTa My Noka3Ba 4e NPOAYKTbT He TpAGBa Ja ce U3XBBPNA 3aeQHO c Apyrute 6uToBu otnagbun BmecTo ToBa Tpa6Ba Da npeanasute YOBELUKOTO 34paBe n OKONHaTa CDen kato npeganete OTNAAbYHOTO O6opyABaHe B npegHasHayeH 3a CbhONpaHeTO My NYHKT 3a pe nknnpaHe Ha HeEN3NON3sBaeMO eNeKTPNYECKO n enekTpoHHo GopyaBane 3a AONbNHUTeNHa UHPOPpMaLmMa ce CBbpxeTe c dupMara no uucToTa UAUTO ycnyrM n3non3BaTe Czech recycling notice Likvidace za Gent v dom cnostech v Evropsk unii Tento symbol znamen e nesm te tento produkt likvidovat spolu s jin m domovn m odpadem M sto toho byste m li chr nit lidsk zdrav a ivotn prost ed t m
39. volume IMPORTANT Shadow copies must be initially disabled on the volume before redirecting to an alternate volume If shadow copies are enabled and you disable them a message appears informing you that all existing shadow copies on the volume will be permanently deleted To redirect shadow copies to an alternate volume 1 2 2 Pp 70 Access Disk Management Select the volume or logical drive then right click on it Select Properties Select the Shadow Copies tab Select the volume that you want to redirect shadow copies from and ensure that shadow copies are disabled on that volume if enabled click Disable File server management 6 Click Settings 7 In the Located on this volume field select an available alternate volume from the list EY NOTE To change the default shadow copy schedule settings click Schedule 8 Click OK 9 On the Shadow Copies tab ensure that the volume is selected and then click Enable Shadow copies are now scheduled to be made on the alternate volume Disabling shadow copies When shadow copies are disabled on a volume all existing shadow copies on the volume are deleted as well as the schedule for making new shadow copies A CAUTION When the Shadow Copies Service is disabled all shadow copies on the selected volumes are deleted Once deleted shadow copies cannot be restored Managing shadow copies from the storage system desktop To access shadow
40. 04 Shadow copies in a cluster It is recommended that the location of the cache file be placed on a separate disk from the original data In this case a physical disk resource for the cache file disk should be created in the same cluster group as the intended Shadow Copy resource and the volume for which snapshots will be enabled The resource should be created prior to the establishment of Shadow Copies The Shadow Copy resource should be dependent on both the original physical disk resource and the physical disk resource that contains the cache file For more information see the following topics in the clustering online help Using Shadow Copies of Shared Folders in a server cluster Enable Shadow Copies for shared folders in a cluster Extend a LUN in a cluster To extend a LUN on a storage array in a cluster review the requirements and procedures from the storage array hardware provider for expanding or extending storage For additional information associated with extending a LUN in a cluster see the following Microsoft Knowledge Base articles How to extend the partition of a cluster shared disk http support microsoft com default aspx scid kb en us 304736 e How to replace a disk that is in a cluster and use of the Cluster Recovery utility http support microsoft com kb 305793 MSNFS administration on a server cluster The Microsoft Services for Network File System NFS online help provides server cluster informat
41. 120 Support and other resources A Regulatory compliance notices This section contains regulatory notices for the HP Regulatory compliance identification numbers For the purpose of regulatory compliance certifications and identification this product has been assigned a unique regulatory model number The regulatory model number can be found on the product nameplate label along with all required approval markings and information When requesting compliance information for this product always refer to this regulatory model number The regulatory model number is not the marketing name or model number of the product Product specific information HP o o Regulatory model number FCC and CISPR classification These products contain laser components See Class 1 laser statement in the Laser compliance notices section Federal Communications Commission notice Part 15 of the Federal Communications Commission FCC Rules and Regulations has established Radio Frequency RF emission limits to provide an interference free radio frequency spectrum Many electronic devices including computers generate RF energy incidental to their intended function and are therefore covered by these rules These rules place computers and related peripheral devices into two classes A and B depending upon their intended installation Class A devices are those that may reasonably be expected to be installed in a business or commercial environment Class B device
42. 17 PM A i Information 9 21 2010 3 11 17 PM A QD Information 9 21 2010 3 11 17 AM Information 9 21 2010 3 11 17 AM System Services All Running A NFSInstance ADAM_NFSIns Running Description AD LDS instance Figure 13 AD LDS Role and Instance To verify the installation of the Services for Network File System NFS Role in Server Manager under Roles click File Services In the System Services table Server for NFS is listed Phase 2 scripts Phase 2 scripts are located in the c npnas components ADLDS folder You create NFS mappings for users and groups by running the nfs adlds config js script This script takes as inputs a standard UNIX password file and a standard UNIX group file For each user or group in these files a Windows user or group account is created if one does not already exist Next the script examines the UNIX password file to extract the User ID and Group ID of each user From these a mapping is created on the Windows system that associates the User ID and Group ID with the UNIX account that has the same User ID and Group ID Similarly the script examines the UNIX group file extracts the Group ID and forms a mapping on the Windows system that associates the Group ID with the UNIX group having the same ID This mapping is what allows directories and files to be accessed from either the Windows NFS server or the UNIX NFS client using the same User ID and Group ID The nfs adlds config js script wil
43. 25 8 HP X3800 G2 rear panel LEDs and buttons 6 sccetsccsdccvesstsencenrsavecnansvsvdausvatcsnsterbeddoaned 26 9 HP X3800sb G2 front panel CGM por ii 27 10 HP X3800sb G2 front panel LEDs ana 28 11 SAS SATA hard drive LEDS cccccccceeeeccuceecccecceccccacececececcccececasecersusesecateneeetaes 29 12 Systems Insight Display LEDs ainda 30 13 AD LDS Role and Instance ici n 37 14 AD LDS script execution help screen aio 39 15 ADSI Edit Connection Settings dialog box scan dad 40 16 NFS mapped users and groups in ADSI Ed 41 17 INES Advanced Sharing dialog a 43 18 NFS Share RE 43 19 Permissions for NfsTest dialogando nette waat webs 44 20 Advanced Security Settings tortilla 45 21 Select User or Group dialog box strain 46 22 Replace owner on subcontainers and objects nnee ooanoee nonsens enneerensneeerenen 47 23 Permissions for Nislest dialog box io 47 24 Storage management process example c ccccceeeeenecceeceeeeceeeeeeeeneeeeeeseneeeeeeeseees 50 EE 51 26 RAID O data striping 51 54 of data blocks B1 B12 jicicsccccciav geindeoiadieconseinioccmnacnnces 51 27 Two arrays A1 A2 and five logical drives L1 through L5 spread over five physical CEE E E 53 28 System administrator view of Shadow Copies for Shared Folders nne 67 29 Shadow copies stored on a source volume cccceeeeeseeeeeeseeeneeeeceesneeeeeeeeseeeeeeeeeees 68 30 Shadow copies stored on a separate volume oooococoooccccoonocccononccononccconnnccconnn
44. 60 C De batterijen mogen niet worden beschadigd gedemonteerd geplet of doorboord Zorg dat u geen kortsluiting veroorzaakt tussen de externe contactpunten en laat de batterijen niet in aanraking komen met water of vuur Gebruik ter vervanging alleen door HP goedgekeurde batterijen Batterijen accu s en accumulators mogen niet worden gedeponeerd bij het normale huishoudelijke afval Als u de batterijen accu s wilt inleveren voor hergebruik of op de juiste manier wilt vernietigen kunt u gebruik maken van het openbare inzamelingssysteern voor klein chemisch afval of ze terugsturen naar HP of een geautoriseerde HP Business of Service Partner Neem contact op met een geautoriseerde leverancier of een Business of Service Partner voor meer informatie over het vervangen of op de juiste manier vernietigen van accu s 134 Regulatory compliance notices French battery notice Avis relatif aux piles AN AVERTISSEMENT cet appareil pout contenir des piles N essayez pas de recharger les piles apr s les avoir retir es Evitez de les mettre en contact avec de l eau ou de les soumettre des temp ratures sup rieures 60 C N essayez pas de d monter d craser ou de percer les piles N essayez pas de court circuiter les bornes de la pile ou de jeter cette derni re dans le feu ou l eau Remplacez les piles exclusivement par des pi ces de rechange HP pr vues pour ce produit Les piles modules de batteries
45. 700 On the UNIX system edit the etc passwd file to have an account for user with a user ID of 2701 and a group ID of 5700 Edit the etc group file to have a group account for allusers with a group ID of 5700 On the UNIX side you do not need to create a group named rootgroup because the existing group named root has a group ID of O EY NOTE If you are taking the etc group file from the UNIX system and preparing it as input for nfs adlds config js you must rename the root group to something else such as roofgroup This solves the conflict with the root user As described earlier Windows does not allow the same name to be used for both a user and a group Execute the phase 2 script c hpnas components ADLDS in a command window as follows nfs adlds config js passwd passwdfile group groupfile ldf out ldf usercmd generateusers cmd userpassword cOmpleX execute log log txt Examine log txt to ensure that there are no errors Error messages that read System error 1379 The specified local group already exists can be ignored Follow the steps in Verifying script execution on page 39 to verify that appropriate Windows user and group accounts are created and expected NFS mappings are established Create a folder C NfsTest Right click the folder and select Properties Click the NFS Sharing tab and then click the Manage NFS Sharing button Check the Share this folder check box In the Share name field type NfsTest Clear the Enable unmapped
46. A array will result in losing access to the MPIO LUNs The correct MPIO configuration can be determined by opening device manager and confirming that the LUNs presented from the MSA array are enumerated as a Multi path Disk Device If incorrectly configured the LUNs are not present in the device manager or are enumerated twice Workaround Use the MPIO control panel to remove and re add the MSA array device Issue DFS and NFS errors logged in Event Viewer There may be errors from DFS and NFS logged in the Event Viewer after the storage system is configured Workaround These errors can be ignored Issue The HP Smart Array P411 controller does not allow a LUN extend operation and the VDS provider fails Because the controller s cache status is set to disabled the Array Configuration Utility does not display the extend option This generally occurs if the Battery Backed Write Cache BBWC is not available or enabled Enabling BBWC is required for array expansion LUN extension features Workaround Set the controller s cache status to enabled Issue Data volumes are not remounted after system recovery Mounted data volumes are not remounted after performing a system recovery These data volumes are not damaged or destroyed but they are not visible after a system recovery operation Workaround In order to restore the mount points to their original locations you must record them prior to running system recovery 1 Using
47. By default iLO obtains the management IP address and subnet mask from your network s DHCP server The hostname found on the iLO tag is automatically registered with your network s DNS server 4 Using the default user information provided on the iLO Network Settings tag log on to the storage system For detailed instructions on using iLO remote management software see the HP Integrated Lights Out 2 User Guide or HP ProLiant Integrated Lights Out 3 User Guide Power on the server and log on Power on the server after installing the hardware and connecting the cables Powering on the server for the first time initiates the storage system installation process X3000 G2 Network Storage System User Guide 15 1 Power on the system by pushing the power button on the front panel If using iLO click Momentary Press on the Power Management page to power on the server then click Launch on the Status Summary page to open the iLO Integrated Remote Console and complete the installation process The storage system starts and displays an HP Network Storage System installation screen The storage system installation process takes approximately 10 15 minutes EY NOTE Your storage system comes pre installed with the Microsoft Windows Storage Server 2008 R2 operating system There is no operating system installation required When the storage system installation process nears completion the Windows Storage Server 2008 R2 desktop displays
48. Folder Contents EEE EEE oooo Read Write o For special permissions or for advanced settings Advanced click Advanced _ Cancel Apply Figure 34 Properties dialog box Security tab Several options are available on the Security tab To add users and groups to the permissions list click Add Follow the dialog box instructions To remove users and groups from the permissions list highlight the desired user or group and then click Remove e The center section of the Security tab lists permission levels When new users or groups are added to the permissions list select the appropriate boxes to configure the common file access levels 78 File server management 3 To modify ownership of files or to modify individual file access level permissions click Advanced Figure 35 illustrates the properties available on the Advanced Security Settings dialog box Advanced Security Settings for Drive E E E Permissions Auditing Owner Effective Permissions To view more information about special permissions select a permission entry and then click Edit Permission entries Type Name Permission Inherited From Apply To Allow Administrators Full Control lt not inherited gt This folder subfolders Allow SYSTEM Full Control lt not inherited gt This folder subfolders i Allow CREATOR OWNER Full Control lt not inherited gt Subfolders and files only Allow Users Read amp Execute lt not inherited
49. HP StorageWorks X3000 G2 Network Storage System User Guide SWX image version 2 00 0a Part Number 5697 0592 First edition November 2010 Legal and notice information Copyright 2010 2010 Hewlett Packard Development Company L P Confidential computer software Valid license from HP required for possession use or copying Consistent with FAR 12 211 and 12 212 Commercial Computer Software Computer Software Documentation and Technical Data for Commercial Items are licensed to the U S Government under vendor s standard commercial license The information contained herein is subject to change without notice The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services Nothing herein should be construed as constituting an additional warranty HP shall not be liable for technical or editorial errors or omissions contained herein Acknowledgments Intel ltanium Pentium Intel Inside and the Intel Inside logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries Microsoft Windows Windows XP and Windows NTO are U S registered trademarks of Microsoft Corporation Adobe and Acrobat are trademarks of Adobe Systems Incorporated Java is a US trademark of Sun Microsystems Inc Oracle is a registered US trademark of Oracle Corporation Redwood City California UNIX
50. L7KH172B4W484userl a Users WIN L KH1 72BAV4 Users Add Remove Permissions for user Allow Deny Full control Modify Read amp execute List folder contents Read Learn about access control and permissions Cancel Apply Figure 23 Permissions for NfsTest dialog box Click OK twice to dismiss the NfsTest Permissionsand Properties dialog boxes On the UNIX side you can now issue the su user command then issue the cd mnt nfstest command and create files in that directory You can also access the mounted directory as root If you want to restrict this return to the NFS Share Permissions dialog box as shown in Figure 18 on page 43 and clear the Allow root access check box X3000 G2 Network Storage System User Guide 47 48 Administration tools 4 Storage management overview This chapter provides an overview of some of the components that make up the storage structure of the storage system Storage management elements Storage is divided into four major divisions e Physical storage elements e Logical storage elements File system elements File sharing elements Each of these elements is composed of the previous level s elements Storage management example Figure 24 depicts many of the storage elements that one would find on a storage device The following sections provide an overview of the storage elements X3000 G2 Network Storage System User Guide 49 Physical Disks Single
51. M File OKB WIN STIGSHAJOAS root On the Windows system as Administrator create a file file txt in C NfsTest Windows Explorer now displays its properties Name Date modified Type Size Owner file txt 9 10 2010 3 23 PM Text Document OKB Administrators _ rootfile 9 10 2010 2 50 PM File OKB WIN STIGSHAJOAS root On the UNIX system issue a listing of the mnt nfstest directory This listing displays the following information Note that file permissions on your system may be different than those shown here rwX 1 nfsnobody nfsnobody O Sep 10 16 23 file txt rw r r 1 root root O Sep 10 15 50 rootfile The reason that the owner of file txt is nfsnobody is that the file is owned by the Windows Administrators group which is not an NFS mapped group In this step you will change the owner of file txt to user On the Windows system in Windows Explorer right click file txt select Properties and then select the Security tab Click Advanced select the Owner tab and then click Edit Click Other users or groups type user in the dialog box and then click OK RB Advanced Security Settings for file txt Owner You can take or assign ownership of this object if you have the required permissions or privileges Object name C NfsTest file txt Current owner Administrators WIN 5TIBSHAJOAS Administrators Change owner to Name A Administrator WIN 5TIBSHAJOAS Administrator amp Administrators WIN 5S
52. NOUR po X3000 G2 Network Storage System User Guide 27 Figure 10 HP X3800sb G2 front panel LEDs Table 6 HP X3800sb G2 front panel LED descriptions ltem Description Status Blue Identified 1 UID LED Blue flashing Active remote management Off No active remote management Green Normal SER Flashing Booting El Amber Degraded condition Red Critical condition Green Network linked 3 Flex 10 NIC 1 LED Green flashing Network activity Off No link or activity Green Network linked 4 Flex 10 NIC 2 LED Green flashing Network activity Off No link or activity 5 Reserved Green On 6 System power LED Amber Standby auxiliary power available Off Off SAS and SATA hard drive LEDs The following figure shows SAS SATA hard drive LEDs These LEDs are located on all HP ProLiant hot plug hard drives 28 Storage system component identification Figure 11 SAS SATA hard drive LEDs Table 7 SAS and SATA hard drive LED combinations 1 Fault UID LED am ber blue 2 Online activity LED green 16200 Status Alternating amber and blue On off or flashing The drive has failed or a predictive failure alert has been received for this drive it also has been selected by a management application Steadily blue On off or f
53. Server Cluster Implementation ses 888 Storage Elements Logical Drives Selective Storage Presentaion Visible Disks Logical are Serene Partitioning Elements NTFS Volumes File Engineering Users Sales Engineering User ale Customers System File Folders Marketing Marketing Elements Shadow Copy Shadow Copies from 02 10 03 09 30 snapshot 0 from 02 10 03 09 30 snapshot 0 ements Snapshots from 02 10 03 11 30 snapshot 1 from 02 10 03 11 30 snapshot 1 Cluster Physical Disk Resources Cluster Virtual Server Groups Cluster Network Name Elements IP Address WirtualServerA IP Addresss 172 1 1 1 WirtualServerA IP Addresss 172 1 1 2 Users Sales Users Fault tolerant ag CIFS and NFS Marketing eech CIFS SMB and File Shares is NFS File Shares Marketing File eed Engineering Sharing Snapshot 0 Snapshot 0 Elements Snapshot 1 Snapshot 1 gloos4 Figure 24 Storage management process example Physical storage elements The lowest level of storage management occurs at the physical drive level Minimally choosing the best disk carving strategy includes the following policies Analyze current corporate and departmental structure e Analyze the current file server structure and environment Plan properly to ensure the best configuration and use of storage e Determine the desired priority of
54. TIBBHAJOA5 Administrators 2 user WIN 5STIBBHAJOAS userl Other users or groups Leam about object ownership OK Cancel Apply Figure 20 Advanced Security Settings for file txt Click OK three times to return to Windows Explorer The file file txt is now owned by user X3000 G2 Network Storage System User Guide 45 Step 10 Step 11 Name Date modified Type Size Owner A Tenens 9 10 2010 3 23PM Text Document OKB WIN STI68HAJOAS user1 rootfile 9 10 2010 2 50PM File OKB WIN STI68HAJOAS root On the UNIX system issue a listing of the mnt nfstest directory Because you changed the owner of file txt on the Windows system to user the owner of the file on the UNIX side is also user Because user is in the allusers group on the Windows system the group ownership of file txt is allusers on the UNIX side rw r r 1 userl allusers O Oct 11 14 18 file txt rw r r 1 root root O Oct 11 14 17 rootfile If the group for file txt is listed as nfsnobody you must enable Microsoft hotfix 2222746 and restart the storage system as described in Shared access example on page 41 In this step you will modify the permissions on the shared folder to restrict access to the shared folder to a group smaller than Everyone by changing the ownership of the shared folder and then specifying permissions for that owner First remove the file rootfile from mnt nfstest on the UNIX system In Windows Explorer ri
55. Texas 77269 2000 e Or call 1 281 514 3333 Modification The FCC requires the user to be notified that any changes or modifications made to this device that are not expressly approved by Hewlett Packard Company may void the user s authority to operate the equipment Cables When provided connections to this device must be made with shielded cables with metallic RFI EMI connector hoods in order to maintain compliance with FCC Rules and Regulations Canadian notice Avis Canadien Class A equipment This Class A digital apparatus meets all requirements of the Canadian Interference Causing Equipment Regulations Cet appareil num rique de la class A respecte toutes les exigences du R glement sur le mat riel brouilleur du Canada 122 Regulatory compliance notices Class B equipment This Class B digital apparatus meets all requirements of the Canadian Interference Causing Equipment Regulations Cet appareil num rique de la class B respecte toutes les exigences du R glement sur le mat riel brouilleur du Canada European Union notice This product complies with the following EU directives e Low Voltage Directive 2006 95 EC e EMC Directive 2004 108 EC Compliance with these directives implies conformity to applicable harmonized European standards European Norms which are listed on the EU Declaration of Conformity issued by Hewlett Packard for this product or product family This compliance is indicated by the following
56. VA 63 extending volumes Disk Management 63 F factory image 19 failover automatic 106 defined 91 resources 9 fault tolerance 52 Federal Communications Commission notice 12 file share resources 93 103 file level permissions 77 file recovery 74 file screening management 86 File Server Resource Manager 57 85 file services management 58 file share permissions managing 102 file share resource planning 101 file share resources 93 103 file system elements 54 file sharing protocols 54 files ownership 82 folder management 77 folder recovery 74 folders auditing access 80 managing 77 142 Index G GPT partitions 53 group cluster 93 groups adding to permissions list 78 H help obtaining 117 HP Array Configuration Utility 59 Storage Manager 59 technical support 117 HP StorageWorks Initial Configuration Tasks 17 Insight Remote Support 119 installation cluster preparing for 95 IP address resource 93 J Japanese notices 123 K kit contents 13 Korean notices 124 L LAN icons renaming 98 laser compliance notices 26 load balancing 101 logical storage elements 52 54 logical storage elements 52 54 LUNs described 53 presenting to cluster node 99 M Microsoft Services for Network File System NFS 35 Microsoft Disk Manager 20 mount points creating 53 not supported with NFS 53 mounted drives and shadow copies 67 N network name resource
57. Windows Disk Manager record the mount points of the volumes within the root directory of each volume 2 After running system recovery scan the system to find data volumes that are not assigned drive letters 3 Temporarily mount the volumes that are not assigned drive letters 4 Locate the recorded list of mount points and remount the temporarily mounted volumes to the correct loc ations according to the record 112 Troubleshooting servicing and maintenance 8 System recovery This chapter describes how to use the System Recovery DVD that is provided with your storage system The System Recovery DVD The HP StorageWorks Storage System Recovery DVD that is provided with your storage system allows you to install an image or recover from a catastrophic failure At any later time you may boot from the DVD and restore the server to the factory condition This allows you to recover the system if all other means to boot the server fail While the recovery process makes every attempt to preserve the existing data volumes you should have a backup of your data if at all possible before recovering the system As of HP StorageWorks Storage System Recovery DVD version 1 2 the DON T ERASE volume is no longer used If your system has a DON T ERASE volume the System Recovery process will ignore this volume EY NOTE Some HP StorageWorks X3000 G2 Network Storage Systems do not include an internal DVD drive For these systems you mu
58. ace limit and warning level are automatically assigned by the quota system For more information about disk quotas read the online help Adding storage Expansion is the process of adding physical disks to an array that has already been configured Extension is the process of adding new storage space to an existing logical drive on the same array usually after the array has been expanded Storage growth may occur in three forms Extend unallocated space from the original logical disks or LUNs Alter LUNs to contain additional storage Add new LUNs to the system The additional space is then extended through a variety of means depending on which type of disk structure is in use Expanding storage Expansion is the process of adding physical disks to an array that has already been configured The logical drives or volumes that exist in the array before the expansion takes place are unchanged because only the amount of free space in the array changes The expansion process is entirely independent of the operating system EY NOTE See your storage array hardware user documentation for further details about expanding storage on the array Extending storage using Windows Storage Utilities Volume extension grows the storage space of a logical drive During this process the administrator adds new storage space to an existing logical drive on the same array usually after the array has been expanded An administrator
59. ad Attributes Read Extended Attributes Create Files Write Data Create Folders Append Data Write Attributes Write Extended Attributes Delete Subfolders and Files Delete Read Permissions Change Permissions JOOOoOoOoOo0o0o0000 O O O O O O O O O O O O m Figure 39 Auditing Entry dialog box for folder name NTFS Test 8 Select the desired Successful and Failed audits for the user or group 9 Click OK EY NOTE Auditing must be enabled to configure this information Use the local Computer Policy Editor to configure the audit policy on the storage system The Owner tab allows taking ownership of files Typically administrators use this area to take ownership of files when the file ACL is incomplete or corrupt By taking ownership you gain access to the files and then manually apply the appropriate security configurations 82 File server management Advanced Security Settings for Drive E E Permissions Auditing Owner Effective Permissions You can take or assign ownership of this object if you have the required permissions or privileges Current owner of this item Administrators PLA255A Administrators Change owner to Leg Administrators PL42SSA Administrators Other Users or Groups _ Replace owner on subcontainers and objects Lear more about ownership Cancel Apply Figure 40 Advanced Security Settings dialog box Owner tab The current own
60. additional details about the preconfigured storage Physical configuration The logical disks reside on physical drives as shown in the table below As of the SWX image version 1 2 the DON T ERASE volume that was created on earlier versions of HP StorageWorks Network Storage System models is no longer used O IMPORTANT The first two logical drives are configured for the storage system operating system The Operating System volume default factory settings can be customized after the operating system is up and running The following settings can be changed e RAID level can be changed to any RAID level except RAID O OS logical drive size can be changed to 60 GB or higher X3000 G2 Network Storage System User Guide 19 If the Operating System volume is customized and the System Recovery DVD is run at a later time the System Recovery process will maintain the custom settings as long as the above criteria are met RAID level other than RAID O and OS logical drive size of 60 GB or higher and the OS volume is labeled System If the storage system arrays are deleted and the System Recovery DVD is run the System Recovery process will configure the storage system using the factory default settings listed in the table below HP StorageWorks X3000 G2 Network Storage Systems do not include preconfigured data volumes The administrator must configure data storage for the storage system See Configuring data storage on page 58 for mo
61. age to a host To make a virtual disk available to a host you must present it You can present a virtual disk to a host during or after virtual disk creation The virtual disk must be completely created before the host presentation can occur If you choose host presentation during virtual disk creation the management agent cannot complete any other task until that virtual disk is created and presented Therefore HP recommends that you wait until a virtual disk is created before presenting it to a host For more information see the HP StorageWorks Command View EVA User Guide Expanding storage using the Array Configuration Utility The Array Configuration Utility enables online capacity expansion of the array and logical drive for specific MSA storage arrays such as the MSA1000 and MSA1500 For more information use the ACU online help or the procedures to Expand Array in the HP Array Configuration Utility User Guide Expand logical drive This option in the ACU increases the storage capacity of a logical drive by adding unused space on an array to the logical drive on the same array The unused space is obtained either by expanding an array or by deleting another logical drive on the same array For more information use the ACU online help or the Extend logical drive procedure in the HP Array Configuration Utility User Guide X3000 G2 Network Storage System User Guide 63 Volume shadow copies EY NOTE Select storage syst
62. ame time Administrators can install printers remotely by using the automatic detection feature which finds and installs printers on the local subnet to the local print server Administrators can log on remotely to a server at a branch location and then install printers remotely For more information see the Windows Storage Server 2008 R2 Help Network File System NFS User Mapping Network File System NFS is a network file sharing protocol that allows remote access to files over a network and is typically used in networks with computers running UNIX Linux or Mac OS operating systems NFS is supported on all HP X3000 G2 Network Storage Systems All of the following types of NFS account mapping are supported Active Directory Domain Services AD DS mapped user access Active Directory Lightweight Directory Services AD LDS mapped user access unmapped anonymous user access and unmapped UNIX user access For more detailed information about each of these access methods see the NFS Account Mapping in Windows Server 2008 R2 whitepaper which is available for download at X3000 G2 Network Storage System User Guide 35 http www microsoft com downloads en details aspx FamilylD 5f4c294c 8692 4235 8236 8ea809ae7 1f7 Configuring AD LDS To simplify AD LDS mapped user access HP provides the scripts that Microsoft describes in the NFS Account Mapping in Windows Server 2008 R2 whitepaper The whitepaper describes two phases of scri
63. ance Storage Filter runs in kernel mode The Single Instance Storage Filter service cannot be stopped If this service is disabled the linked files are not accessible If the central folder is deleted the linked files can become permanently inaccessible If you stop the Groveler service the files cannot be automatically linked but the existing linked files can still be accessible You can enable SIS on a maximum of 20 volumes per computer SIS cannot act upon any files that are referenced through junction points and it cannot be used with any file system except the NTFS file system SIS will not process files that are 32 kilobytes or less in size If you need to access data that is stored on a SIS volume which might be required for backup and recovery operations you must either run or have installed Single Instance Storage Filter on your computer Backup and recovery by using SIS has the following requirements 34 Administration tools The backup software used must support SIS enabled volumes The SIS volume SIS Common Store folder and reparse points links to the files must be restored to a Windows 2000 NIFS version 5 0 or later file system or partition that supports reparse points or junction points The Single Instance Storage Filter must be installed or enabled to access the data in the SIS volume The backup program must be capable and configured to backup and restore the reparse points or junction points links t
64. as well as setting up client groups and user name mappings These procedures are not unique to a clustered deployment and are detailed in the Microsoft Services for NFS section within the Other network file and print services chapter Changes to NFS setup information are automatically replicated to all nodes in a cluster 3 Create the file share resources X3000 G2 Network Storage System User Guide 101 4 Assign ownership of the file share resources to the resource groups a Divide ownership of the file share resource between the resource groups which are in turn distributed between the virtual servers for effective load balancing b Verify that the physical disk resource for this file share is also included in this group c Verify that the resources are dependent on the virtual servers and physical disk resources from which the file share was created Permissions and access rights on share resources File Share and NFS Share permissions must be managed using the Failover Cluster Management tool versus the individual shares on the file system themselves via Windows Explorer Administering them through the Failover Cluster Management tool allows the permissions to migrate from one node to other In addition permissions established using Explorer are lost after the share is failed or taken offline NFS cluster specific issues For convenience all suggestions are listed below Back up user and group mappings To avoid loss
65. ation Tasks and Server Manager see the online help Complete system configuration After the storage system is physically set up and the basic configuration is established you must complete additional setup tasks Depending on the deployment scenario of the storage system these steps can vary These additional steps can include e Running Microsoft Windows Update HP highly recommends that you run Microsoft Windows updates to identify review and install the latest applicable critical security updates on the storage system Creating and managing users and groups User and group information and permissions determine whether a user can access files If the storage system is deployed into a workgroup environment this user and group information is stored locally on the device By contrast if the storage system is deployed into a domain environment user and group information is stored on the domain e Joining workgroup and domains These are the two system environments for users and groups Because users and groups in a domain environment are managed through standard Windows or Active Directory domain administration methods this document discusses only local users and groups which are stored and managed on the storage system For information on managing users and groups on a domain see the domain documentation available on the Microsoft web site If the storage system is deployed in a domain environment the domain controller will sto
66. can be scheduled to occur automatically at convenient times Defragmentation can also be done once or on a recurring basis EY NOTE Scheduling defragmentation to run no later than a specific time prevents the defragmentation process from running later than that time If the defragmentation process is running when the time is reached the process is stopped This setting is useful to ensure that the defragmentation process ends before the demand for server access is likely to increase If defragmenting volumes on which shadow copies are enabled use a cluster or allocation unit size of 16 KB or larger during the format Otherwise defragmentation registers as a change by the Shadow Copy process This increase in the number of changes forces Shadow Copy to delete snapshots as the limit for the cache file is reached A CAUTION Allocation unit size cannot be altered without reformatting the drive Data on a reformatted drive cannot be recovered For more information about disk defragmentation read the online help Disk quotas Disk quotas track and control disk space use in volumes EY NOTE To limit the size of a folder or share see Quota management on page 85 Configure the volumes on the server to perform the following tasks e Prevent further disk space use and log an event when a user exceeds a specified disk space limit Log an event when a user exceeds a specified disk space warning level When
67. can consume space designated for file sharing Setting the limit too high takes up valuable storage space Setting the limit too low can cause shadow copies to be purged too soon or not created at all By storing shadow copies on a separate volume space limits can generally be set higher or set to No Limit See the online help for instructions on altering the cache file location A CAUTION If the data on the separate volume L is lost the shadow copies cannot be recovered Enabling and creating shadow copies Enabling shadow copies on a volume automatically results in several actions Creates a shadow copy of the selected volume Sets the maximum storage space for the shadow copies Schedules shadow copies to be made at 7 a m and 12 noon on weekdays EY NOTE Creating a shadow copy only makes one copy of the volume it does not create a schedule EY NOTE After the first shadow copy is created it cannot be relocated Relocate the cache file by altering the cache file location under Properties prior to enabling shadow copy See Viewing shadow copy properties on page 70 Viewing a list of shadow copies To view a list of shadow copies on a volume 1 Access Disk Management 2 Select the volume or logical drive then right click on it 3 Select Properties 4 Select Shadow Copies tab All shadow copies are listed sorted by the date and time they were created EY NOTE It is also possible t
68. ccessfully work in a cluster environment protecting it from simultaneous access from each node The basic disk must be added as a physical disk resource to an existing cluster group or a new cluster group needs to be created for the resource Cluster groups can contain more than one physical disk resource depending on the site specific requirements Ef NOTE The LUN underlying the basic disk should be presented to only one node of the cluster using selective storage presentation or SAN zoning or having only one node online at all times until the physical resource for the basic disk is established In preparing for the cluster installation All shared disks including the Quorum disk must be accessible from all nodes When testing connectivity between the nodes and the LUN only one node should be given access to the LUN at a time All shared disks must be configured as basic not dynamic All partitions on the disks must be formatted as NTFS Network planning Clusters require more sophisticated networking arrangements than a stand alone storage system A Windows NT domain or Active Directory domain must be in place to contain the cluster names virtual server names and user and group information A cluster cannot be deployed into a non domain environment All cluster deployments have at least six network addresses and four network names The cluster name Unique NETBIOS Name and IP address Node A s name and IP add
69. ce for network attached storage Windows Storage Server 2008 R2 provides significant enhancements in share and storage management scenarios as well as integration of storage system management components and functionality Remote Desktop for Administration You can remotely administer storage systems by using Remote Desktop for Administration formerly known as Terminal Services in Remote Administration mode You can use it to administer a computer from virtually any computer on your network Based on Terminal Services technology Remote Desktop for Administration is specifically designed for server management Remote Desktop for Administration does not require the purchase of special licenses for client computers that access the server It is not necessary to install Terminal Server Licensing when using Remote Desktop for Administration You can use Remote Desktop for Administration to log on to the server remotely with any of the following features Remote Desktop Connection e Remote Web Administration e Windows Server Remote Administration Applet For more information see the Windows Storage Server 2008 R2 Help Share and Storage Management With the Share and Storage Management snap in provided in this release you can more easily set up and manage shared folders and storage Share and Storage Management provides the following MMC based management of shared folders and storage e Provision Storage Wizard for creating and configur
70. cji mo na uzyska od lokalnej firmy zajmuj cej wywozem nieczysto ci Portuguese recycling notice Descarte de equipamentos usados por utilizadores dom sticos na Uni o Europeia Este s mbolo indica que n o deve descartar o seu produto juntamente com os outros lixos domiciliares Ao inv s disso deve proteger a sa de humana e o meio ambiente levando o seu equipamento para descarte em um ponto de recolha destinado reciclagem de res duos de equipamentos el ctricos e electr nicos Para obter mais informa es contacte o seu servi o de tratamento de res duos dom sticos Romanian recycling notice Casarea echipamentului uzat de c tre utilizatorii casnici din Uniunea European Acest simbol nseamn s nu se arunce produsul cu alte de euri menajere n schimb trebuie s proteja i s n tatea uman si mediul pred nd echipamentul uzat la un punct de colectare desemnat pentru reciclarea echipamentelor electrice si electronice uzate Pentru informatii suplimentare v rug m s contactati serviciul de eliminare a de eurilor menajere local 132 Regulatory compliance notices Slovak recycling notice Likvid cia vyradenych zariaden pouzivate mi v dom cnostiach v Eur pskej nii Tento symbol znamen Ze tento produkt sa nem likvidova s ostatn m domov m odpadom Namiesto toho by ste mali chr ni ludsk zdravie a ivotn prostredie odovzdan m odpadov ho zariadenia na zbernom mieste ktor je ur en
71. cluster aware file sharing protocols doses cectacatlocndvermasinaarearevactindenvs close 103 Adding new storage to aE Ee 103 Creating physical disk resources ocre 103 Creating file share resources a 103 Crealing NEE 104 Shadow Ee 104 Extend a LUN in a cluster ra vennoten geed e r 104 MSNFS administration on a server elister ini tin dad 104 Best practices for running Server for NFS in a server cluster nnn sonen sonen ennen 104 Enter 105 Creating a cluster printer TE 105 Advanced cluster administration procedures cccccsscccessececeneeeeeseeeeeeeecseteecseeeessnreeeneseeeenaas 106 Failing over and failing back orar qna Ratt 106 Restarting one cluster node missie ae ean ionndusoagouaie anne Aaa bre aen 107 Shutting down one cluster node nen use rscsvedast viesanastnasiedages atnto eraann 107 erdee en rie 107 EE 108 7 Troubleshooting servicing and maintenance nanne 109 Troubleshooting the storage E 109 WEBES Web Based Enterprise Services monarca cada ven EEGENEN 109 Maintenance and service addon dan 110 Maintenance Updates E 110 Soy SIE IMI WINES eebe 110 le 110 Certificate of AM Ri 110 Workarounds for common ISSUES ii ia 111 CAM ECON ir AE UK KEE 113 Restore the factory MAS ivi Missle wien EEN 113 Using a USB Flash Drive for System Recovery ccceesceceesseeceesececeeeececeseeecceeeeenseeesnsseeesenaeenss 114 Create a System Recovery USB Flash Drive 114 Use the USB Flash Drive for System Recove
72. conformity marking placed on the product This marking is valid for non Telecom products and EU har monized Telecom products e g Bluetooth Certificates can be obtained from http www hp com go certificates Hewlett Packard GmbH HQ TRE Herrenberger Strasse 140 71034 Boeblingen Germany Japanese notices Japanese VCCI A notice CORB TIZABRRMRECT CORE RIERA CERT DEEKIE ah WEE ELE LOE IERSE HE HREMTSLIRKRENSLEN DIEF VCCI A Japanese VCCI B notice CORBIN FTIADRARHRECT CORB RERK CEA FOCERAMELTHETM LONEN IIA PT LES a gt BSC WEL CRAENSC FERREE LEN DIEF BURDA CEs TEL R ALT FSU VCCI B Japanese VCCI marking X3000 G2 Network Storage System User Guide 123 Japanese power cord statement SI MBSE BRAI KFESE FS Acne BRAK IS HON CAE EE CR Mears use the attached power cord The attached power cord is net allowed to use with other product Korean notices Class A equipment AS 7171 4793 223412 71 ol 71712 AF SLE AXE amp 77024 Dok A SES ALEX Ol AS eege Beto gek Sada Es TUE Mde ESSE Kegel Class B equipment BS 2121 ISS ENER ol 7121 7133222 411048388 et 7171254 PARO AE BE LEMOA ALSS ze USHC Taiwanese notices BSMI Class A notice SORA LEPE gt BEY Rc RS ORE Ia AA TE CR EMES ERE ES gt 124 Regulatory compliance notices Taiwan battery recycle statement X3000 G2 Network Storage System User Guide 125 Laser compliance notices English laser notice This
73. copies from the storage system desktop The storage system desktop can be accessed by using Remote Desktop to manage shadow copies 1 On the storage system desktop double click My Computer 2 Right click the volume name and select Properties X3000 G2 Network Storage System User Guide 71 3 Click the Shadow Copies tab See Figure 31 Drive E E Properties 20x General Tools Hardware Sharing Security Shadow Copies Quota NFS Sharing Shadow copies allow users to view the contents of shared folders as the contents existed at previous points in time For information on required client software click here Select a volume Next Run Time Shares SCA Disabled 1 EA Disabled Sr Disabled 0 EGA Disabled 0 Enable Disable Settings Shadow copies of selected volume Create Now Delete Now Cancel Apply Figure 31 Accessing shadow copies from My Computer Shadow Copies for Shared Folders Shadow copies are accessed over the network by supported clients and protocols There are two sets of supported protocols SMB and NFS All other protocols are not supported this includes HTTP FTP AppleTalk and NetWare Shares For SMB support a client side application denoted as Shadow Copies for Shared Folders is required The client side application is currently only available for Windows XP and Windows 2000 SP3 No additional software is required to enabl
74. copies is unacceptable to administrators or end users it is best to use a separate volume on separate disks to store shadow copies Determining creation frequency The more frequently shadow copies are created the more likely that end users will get the version that they want However with a maximum of 64 shadow copies per volume there is a trade off between the frequency of making shadow copies and the amount of time that the earlier files will be available By default the storage system creates shadow copies at 0700 and 1200 Monday through Friday However these settings are easily modified by the administrator so that the shadow copy schedule can better accommodate end user needs Shadow copies and drive defragmentation When running Disk Defragmenter on a volume with shadow copies activated all or some of the shadow copies may be lost starting with the oldest shadow copies If defragmenting volumes on which shadow copies are enabled use a cluster or allocation unit size of 16 KB or larger Using this allocation unit size reduces the number of copy outs occurring on the snapshot Otherwise the number of changes caused by the defragmentation process can cause shadow copies to be deleted faster than expected Note however that NTFS compression is supported only if the cluster size is 4 KB or smaller 66 File server management EY NOTE To check the cluster size of a volume use the fsutil fsinfo ntfsinfo command To cha
75. d file cannot match group names in the group file Windows does not allow user names and group names to be the same An example of this is the root user which typically belongs to the root group on a UNIX system You would need to rename one of these For example in the group file you might rename the root group to rootgroup User and group names in Windows are case insensitive If the password or group files contain accounts whose names differ only in their case you will need to delete or rename entries in those files Users within the password file must have unique user IDs Groups within the group file must have unique group IDs All users included in the password file are imported Consider editing the file before running the configuration script to retain only the users that you want mapped All groups in the group file are imported Consider editing the file before running the configuration script to retain only the groups that you want mapped Script execution You configure NFS mapping for AD LDS by executing the nfs adlds config js script that is located in the c npnas components ADLDS folder Executing the script with no command line options will display the following help screen 38 Administration tools nfs adlds config js passwd passwdfile group groupfile ldf out ldf usercmd generateusers cmd execute log logname passwd location of passwd file group location of group file df output generated ldf
76. d helps alleviate data loss by creating shadow copies of files or folders that are stored on network file shares at pre determined time intervals In essence a shadow copy is a previous version of the file or folder at a specific point in time By using shadow copies a storage system can maintain a set of previous versions of all files on the selected volumes End users access the file or folder by using a separate client add on program which enables them to view the file in Windows Explorer 54 Storage management overview Shadow copies should not replace the current backup archive or business recovery system but they can help to simplify restore procedures For example shadow copies cannot protect against data loss due to media failures however recovering data from shadow copies can reduce the number of times needed to restore data from tape Using storage elements The last step in creating the element is determining its drive letter or mount point and formatting the element Each element created can exist as a drive letter assuming one is available and or as mount points on an existing folder or drive letter Either method is supported However mount points cannot be used for shares that will be shared using Microsoft Services for Unix They can be set up with both but the use of the mount point in conjunction with NFS shares causes instability with the NFS shares Formats consist of NTFS FAT32 and FAT All three types can be used
77. drive File Transfer Protocol Host bus adapter Internet small computer system interface Like an ordinary SCSI interface iSCSI is standards based and efficiently transmits block level data between a host X3000 G2 Network Storage System User Guide 139 HDD iLO LAN logical disk LUN mount point NAS NFS NIC SAN SAS SATA SNMP volume volume mapping 140 Glossary computer such as a server that hosts Exchange or SQL Server and a target device such as the HP All in One Storage System By carrying SCSI commands over IP networks iSCSI is used to facilitate data transfers over intranets and to manage storage over long distances Hard disk drive Integrated Lights Out Local area network A communications infrastructure designed to use dedicated wiring over a limited distance typically a diameter of less than five kilometers to connect to a large number of intercommunicating nodes Ethernet and token ring are the two most popular LAN technologies SNIA A logical disk contains one or more volumes and spans multiple hard drives in an array RAID configuration of storage is performed at the logical disk level Also known as a LUN Logical unit number A host s file system path or directory name where a host volume device is accessed Network attached storage Network file system The protocol used in most UNIX environments to share folders or mounts Network interface card A device that hand
78. duct wordt aangegeven loopt u het risico te worden blootgesteld aan gevaarlijke straling Het risico van blootstelling aan gevaarlijke straling beperkt u als volgt Probeer de behuizing van de module niet te openen U mag zelf geen onderdelen repareren Gebruik voor de laserapparatuur geen andere knoppen of instellingen en voer geen andere aanpassingen of procedures uit dan die in deze handleiding worden beschreven Alleen door HP geautoriseerde technici mogen het apparaat repareren 126 Regulatory compliance notices French laser notice AN AVERTISSEMENT cet appareil pout tre quip d un laser class en tant que Produit laser de classe 1 et conforme la r glementation de la FDA am ricaine et la norme 60825 1 de l IEC Ce produit n met pas de rayonnement dangereux L utilisation de commandes de r glages ou de proc dures autres que ceux qui sont indiqu s ici ou dans le manuel d installation du produit laser peut exposer l utilisateur des rayonnements dangereux Pour r duire le risque d exposition o des rayonnements dangereux Ne tentez pas d ouvrir le boitier renfermant l appareil laser Il ne contient aucune pi ce dont la maintenance puisse tre effectu e par l utilisateur Tout contr le r glage ou proc dure autre que ceux d crits dans ce chapitre ne doivent pas tre effectu s par l utilisateur Seuls les Mainteneurs Agr s HP sont habilit s o r parer l appareil laser German las
79. e Italian battery notice Istruzioni per la batteria A AVVERTENZA Questo dispositivo pu contenere una batteria Non tentare di ricaricare le batterie se rimosse Evitare che le batterie entrino in contatto con l acqua o siano esposte a temperature superiori a 60 C Non smontare schiacciare forare o utilizzare in modo improprio la batteria Non accorciare i contatti esterni o gettare in acqua o sul fuoco la batteria Sostituire la batteria solo con i ricambi HP previsti a questo scopo Le batterie e gli accumulatori non devono essere smaltiti insieme ai rifiuti domestici Per procedere al riciclaggio o al corretto smaltimento utilizzare il sistema di raccolta pubblico dei rifiuti o restituirli a HP ai Partner Ufficiali HP o ai relativi rappresentanti Per ulteriori informazioni sulla sostituzione e sullo smaltimento delle batterie contattare un Partner Ufficiale o un Centro di assistenza autorizzato Japanese battery notice AIT VIC OES AN ES ARAL yTVEARLT SRAMHVET AYFUERYALTUSMS IL HBL THES INGFUEKIZSSLEY 60 C 140 F ERIC AGGL TL IITUERA DAR URL RESINA AART HTH kk RL GL TEL I YTVEZ R RI HPPBEO Win EZEL CC SITU NIFY ND mg EE WE RTE ESA GC U S HIT RS 51 ARO ATL HP HPI Sd Etl HP wt eg AKTE La GM FUSER KUB RTE TORRE HPO HHR AA DIT RLN Bh 136 Regulatory compliance notices Spanish battery notice Declaraci n sobre las bater as AN ADVERTENCIA Este dispositivo p
80. e Confirm password box Click the blue arrow next to the Confirm password box Click OK After the Administrator password has been set the storage system completes the upgrade process Remove the DVD or iLO 2 virtual DVD from the server Using a USB Flash Drive for System Recovery Creating a System Recovery USB Flash drive is supported on Windows Vista Windows 7 Windows Storage Server 2008 and Windows Storage Server 2008 R2 operating systems only Create If you create a backup copy of the System Recovery DVD using a USB Flash Drive it can also be used to restore the system To create system recovery media using a USB Flash drive follow the instructions below a System Recovery USB Flash Drive S oN aS oS SOY SS 10 114 Obtain a blank 8GB or larger USB Flash Drive Insert the USB Flash drive into your workstation or laptop Open an elevated command prompt with Administrator privileges At the command prompt enter diskpart At the diskpart prompt enter list disk Identify the disk number that corresponds to the flash drive This is typically the last disk listed Enter select disk lt USB drive number gt For example select disk 4 Enter clean Enter create partition primary Enter select partition 1 System recovery 11 Enter format fs fat32 quick EY NOTE 12 13 14 15 16 17 If your USB Flash Drive does not support the FAT32 file system format the drive as NTFS instead Omitt
81. e UNIX users to independently retrieve previous versions of files stored on NFS shares EY NOTE Shadow Copies for Shared Folders supports retrieval only of shadow copies of network shares It does not support retrieval of shadow copies of local folders EY NOTE Shadow Copies for Shared Folders clients are not available for HTTP FTP AppleTalk or NetWare shares Consequently users of these protocols cannot use Shadow Copies for Shared Folders to independently retrieve previous versions of their files However administrators can take advantage of Shadow Copies for Shared Folders to restore files for these users 72 File server management SMB shadow copies Windows users can independently access previous versions of files stored on SMB shares by using the Shadow Copies for Shared Folders client After the Shadow Copies for Shared Folders client is installed on the user s computer the user can access shadow copies for a share by right clicking on the share to open its Properties window clicking the Previous Versions tab and then selecting the desired shadow copy Users can view copy and restore all available shadow copies Shadow Copies for Shared Folders preserves the permissions set in the access control list ACL of the original folders and files Consequently users can only access shadow copies for shares to which they have access In other words if a user does not have access to a share he also does not have acces
82. e screening to prevent certain file types or only allowing certain file types defined by the administrator and enabling indexing For more information see the Windows Storage Server 2008 R2 Help Single Instance Storage The Single Instance Storage SIS feature reduces the amount of space that is used to store data on a volume SIS does this by replacing duplicate files with logical links that point to a single copy of the file in the SIS Common Store which is a hidden folder that is located in the root directory of the volume SIS consists of two primary components that together maintain a database of file signatures These components include Groveler service The Groveler service scans the hard disk volumes on a server for duplicate copies of files If the service locates duplicate copies of files the information about the duplicates is sent to the Single Instance Storage Filter The Groveler service runs as a user level service Single Instance Storage Filter The Single Instance Storage Filter is a file system filter service that manages duplicate copies of files on hard disk volumes When notified by the Groveler service of duplicate copies of files this component copies one instance of a duplicate file into a central folder The duplicate is then replaced by a link a reparse point to the central copy The link file contains information about the original file such as its current location size and attributes The Single Inst
83. e stored as Active Directory objects and can be verified as follows 1 Click Start gt Administrative Tools gt ADSI Edit 2 On the Action menu select Connect to 3 In the Connection Settings dialog box under Computer select the radio button labeled Select or type a domain or server Server Domain port 4 In the Select or type a domain or server Server Domain port field type localhost 389 and then click OK Connection Settings EN Name Default naming context Path LDAP flocalhost 389 Default naming context Connection Point C Select or type a Distinguished Name or Naming Context Select a well known Naming Context Default naming context y Computer Select or type a domain or server Server Domain port localhost 389 ed Default Domain or server that you logged in to J Use SSL based Encryption Advanced Cancel Figure 15 ADSI Edit Connection Settings dialog box 5 Expand the Default naming context localhost 389 node to open CN nfs DC nfs and then CN Users The list of NFS mapped users and groups appears under CN Users In the figure below root john and mary are NFS mapped users rootgroup and users are NFS mapped groups These users and groups must also exist on the UNIX system in order for NFS mapping to work correctly between UNIX and Windows A0 Administration tools ADSI Edit File Action View Help es ml Xx E la gt Ales
84. each of a share s available shadow copies as a pseudo subdirectory of the share Each of these pseudo subdirectories is displayed in exactly the same way as a regular subdirectory is displayed The name of each pseudo subdirectory reflects the creation time of the shadow copy using the format GMT YYYY MM DD HH MM SS To prevent common tools from needlessly enumerating the pseudo subdirectories the name of each pseudo subdirectory begins with the dot character thus rendering it hidden The following example shows an NFS share named NFSShare with three shadow copies taken on April 27 28 and 29 of 2003 at 4 a m NFSShare GMT 2003 04 27 04 00 00 GMT 2003 04 28 04 00 00 GMT 2003 04 29 04 00 00 Access to NFS shadow copy pseudo subdirectories is governed by normal access control mechanisms using the permissions stored in the file system Users can access only those shadow copies to which they have read access at the time the shadow copy is taken To prevent users from modifying shadow copies all pseudo subdirectories are marked read only regardless of the user s ownership or access rights or the permissions set on the original files Server for NFS periodically polls the system for the arrival or removal of shadow copies and updates the root directory view accordingly Clients then capture the updated view the next time they issue a directory read on the root of the share Recovery of files or folders There are three common
85. eate quotas to limit the space allowed for a volume or folder and to generate notifications when the quota limits are approached and exceeded e Create file screens to screen the files that users can save on volumes and in folders and to send notifications when users attempt to save blocked files Schedule periodic storage reports that allow users to identify trends in disk usage and to monitor attempts to save unauthorized files or generate the reports on demand Windows SharePoint Services Windows SharePoint Services is an integrated set of collaboration and communication services designed to connect people information processes and systems within and beyond the organization firewall X3000 G2 Network Storage System User Guide 57 File services management Information about the storage system in a SAN environment is provided in the HP StorageWorks SAN Manuals page located on the HP web site at www hp com go SDGManuals Configuring data storage HP StorageWorks X3000 G2 Network Storage Systems are configured only for the operating system The administrator must configure data storage for the storage system Configuring additional data storage involves creating arrays logical disks and volumes Table 1 1 shows the general task areas to be performed as well as the utilities needed to configure storage for an HP Smart Array based storage system Table 11 Tasks and utilities needed for storage system configuration Task Storage
86. ed file share Groups should have a Network Name resource and an IP Address resource These resources are used by the network to give each group a virtual name Without this virtual reference to the group the only way to address a share that is created as a clustered resource is by node name Physical node names do not transition during a failover whereas virtual names do For example if a client maps a network share to Node1 Eng1 instead of Fileserverl Engl when Node fails and Node2 assumes ownership the map will become invalid because the reference in the map is to Node1 If the map were created to the virtual name and Node were to fail the map would still exist when the group associated with Engl failed over to Node2 The previous diagram is an example and is not intended to imply limitations of a single group or node Groups can contain multiple physical disks resources and file shares and nodes can have multiple groups as shown by the group owned by Node2 Cluster planning Requirements for taking advantage of clustering include X3000 G2 Network Storage System User Guide 93 Storage planning Network planning Protocol planning Storage planning For clustering a basic disk must be designated for the cluster and configured as the Quorum disk Additional basic disks are presented to each cluster node for data storage as physical disk resources The physical disk resources are required for the basic disks to su
87. ed heartbeats If a node stops sending heartbeats the cluster service fails over any resources that the node owns to another node For example if the node that owns the Quorum disk is shut down for any reason its heartbeat stops The other nodes detect the lack of the heartbeat and another node takes over ownership of the Quorum disk and the cluster Clustering servers greatly enhances the availability of file serving by enabling file shares to fail over to additional storage systems if problems arise Clients see only a brief interruption of service as the file share resource transitions from one server node to the other X3000 G2 Network Storage System User Guide 89 Custer Node A Ouster Node E F 1 I 1 i 1 HBA 2 Node A i as 1 i Node B HBA 1 i 1 t 1 HBA1 1 HEHEHE EEE EEE EEE EEE EEE EEE EEE EEE EEE EEE 1 nj 1 1 Node B i 1 gt POEPEN a HBA 2 ae SAN Switch SAN Switch Storage Area Network Custer Quorum Mirrorset LUN 1 Data RAID set Node B Data RAID set LUN3 NodeA LUN 2 Figure 41 Storage system cluster diagram Cluster terms and components Nodes The most basic parts of a cluster are the servers referred to as nodes A server node is any individual server in a cluster or a member of the cluster Resources Hardware and software components that are managed by the cluster service are called cluster resources Cluster resources have three defining characteristics They ca
88. el accumulateurs ne doivent pas tre jet s avec les d chets m nagers Pour permettre leur recyclage ou leur limination veuillez utiliser les syst mes de collecte publique ou renvoyez les HP votre Partenaire Agr HP ou aux agents agr s Contactez un Revendeur Agr ou Mainteneur Agr pour savoir comment remplacer el jeter vos piles German battery notice Hinweise zu Batterien und Akkus WA VORSICHT Dieses Produkt enth lt unter Umst nden eine Batterie oder einen Akku Versuchen Sie nicht Batterien und Akkus auBerhalb des Ger tes wieder auf zuladen Sch tzen Sie Batterien und Akkus vor Feuchtigkeit und Temperaturen ber 60 Verwenden Sie Batterien und Akkus nicht missbr uchlich nehmen Sie sie nicht auseinander und vermeiden Sie mechanische Besch digungen jeglicher Art Vermeiden Sie Kurzschlisse und setzen Sie Batterien und Akkus weder Wasser noch Fever aus Ersetzen Sie Batterien und Akkus nur durch die von HP vorgesehenen Ersatzteile Batterien und Akkus d rfen nicht ber den normalen Hausm ll entsorgt werden Um sie der Wiederverwertung oder dem Sonderm ll zuzuf hren nutzen Sie die ffentlichen Sammelstellen oder setzen Sie sich bez glich der Entsorgung mit einem HP Partner in Verbindung Weitere Informationen zum Austausch von Batterien und Akkus oder zur sachgemiifien Entsorgung erhalten Sie bei Ihrem HP Partner oder Servicepartner X3000 G2 Network Storage System User Guid
89. elevasse kogumispunkti K simuste korral p rduge kohaliku priigikditlusettevdtte poole Finnish recycling notice Kotitalousj tteiden h vitt minen Euroopan unionin alueella T m symboli merkitsee ett laitetta ei saa h vitt muiden kotitalousj tteiden mukana Sen sijaan sinun on suojattava ihmisten terveytt ja ymp rist toimittamalla k yt st poistettu laite s hk tai elektroniikkaj tteen kierr tyspisteeseen Lis tietoja saat j tehuoltoyhti lt French recycling notice Mise au rebut d quipement par les utilisateurs priv s dans l Union Europ enne Ce symbole indique que vous ne devez pas jeter votre produit avec les ordures m nag res Il est de votre responsabilit de prot ger la sant et l environnement et de vous d barrasser de votre quipement en le remettant une d chetterie effectuant le recyclage des quipements lectriques et lectroniques Pour de plus amples informations prenez contact avec votre service d limination des ordures m nag res German recycling notice Entsorgung von Altger ten von Benutzern in privaten Haushalten in der EU Dieses Symbol besagt dass dieses Produkt nicht mit dem Haushaltsm ll entsorgt werden dort Zum Schutze der Gesundheit und der Umwelt sollten Sie stattdessen Ihre Altger te zur Entsorgung einer daf r vorgesehenen Recyclingstelle f r elektrische und elektronische Ger te bergeben Weitere Informationen erhalten Sie von Ihrem Entsorgun
90. ement Storage reports Server Manager provides access to FSRM tasks For procedures and methods beyond what are described below see the online help Quota management On the Quota Management node of the File Server Resource Manager snap in you can perform the following tasks Create quotas to limit the space allowed for a volume or folder and generate notifications when the quota limits are approached or exceeded Generate auto quotas that apply to all existing folders in a volume or folder as well as to any new subfolders created in the future e Define quota templates that can be easily applied to new volumes or folders and that can be used across an organization X3000 G2 Network Storage System User Guide 85 File screening management On the File Screening Management node of the File Server Resource Manager snap in you can perform the following tasks e Create file screens to control the types of files that users can save and to send notifications when users attempt to save blocked files Define file screening templates that can be easily applied to new volumes or folders and that can be used across an organization Create file screening exceptions that extend the flexibility of the file screening rules Storage reports On the Storage Reports node of the File Server Resource Manager snap in you can perform the following tasks Schedule periodic storage reports that allow you to identify trends in disk usage
91. ems can be deployed in a clustered as well as a non clustered configuration This chapter discusses using shadow copies in a non clustered environment The Volume Shadow Copy Service provides an infrastructure for creating point in time snapshots shadow copies of volumes Shadow Copy supports 64 shadow copies per volume A shadow copy contains previous versions of the files or folders contained on a volume at a specific point in time While the shadow copy mechanism is managed at the server previous versions of files and folders are only available over the network from clients and are seen on a per folder or file level and not as an entire volume The shadow copy feature uses data blocks As changes are made to the file system the Shadow Copy Service copies the original blocks to a special cache file to maintain a consistent view of the file at a particular point in time Because the snapshot only contains a subset of the original blocks the cache file is typically smaller than the original volume In the snapshot s original form it takes up no space because blocks are not moved until an update to the disk occurs By using shadow copies a storage system can maintain a set of previous versions of all files on the selected volumes End users access the file or folder by using a separate client add on program which enables them to view the file in Windows Explorer Accessing previous versions of files or shadow copies enables users to
92. ence the standard backup associated with a volume backup will not work to back up the previous versions of the file system To answer this particular issue shadow copies are available for backup in two situations If the backup software in question supports the use of shadow copies and can communicate with underlying block device it is supported and the previous version of the file system will be listed in the backup application as a complete file system snapshot If the built in backup application NTbackup is used the backup software forces a snapshot and then uses the snapshot as the means for backup The user is unaware of this activity and it is not self evident although it does address the issue of open files Shadow Copy Transport Shadow Copy Transport provides the ability to transport data on a Storage Area Network SAN With a storage array and a VSS aware hardware provider it is possible to create a shadow copy on one server and import it on another server This process essentially virtual transport is accomplished in a matter of minutes regardless of the size of the data A shadow copy transport can be used for a number of purposes including Tape backups An alternative to traditional backup to tape processes is transport of shadow copies from the production server onto a backup server where they can then be backed up to tape Like the other two alternatives this option removes backup traffic from the production server
93. ent or data IMPORTANT Provides clarifying information or specific instructions EY NOTE Provides additional information A TIP Provides helpful hints and shortcuts Rack stability Rack stability protects personnel and equipment A WARNING To reduce the risk of personal injury or damage to equipment Extend leveling jacks to the floor Ensure that the full weight of the rack rests on the leveling jacks e Install stabilizing feet on the rack e In multiple rack installations fasten racks together securely Extend only one rack component at a time Racks can become unstable if more than one component is extended Customer self repair HP customer self repair CSR programs allow you to repair your StorageWorks product If a CSR part needs replacing HP ships the part directly to you so that you can install it at your convenience Some parts do not qualify for CSR Your HP authorized service provider will determine whether a repair can be accomplished by CSR For more information about CSR contact your local service provider or see the CSR website 118 Support and other resources http www hp com go selfrepair HP Insight Remote Support software HP strongly recommends that you install HP Insight Remote Support software to complete the installation or upgrade of your product and to enable enhanced delivery of your HP Warranty HP Care Pack Service or HP contractual support ag
94. er If a dynamic disk goes offline the entire volume dependent on the one or more X3000 G2 Network Storage System User Guide 53 dynamic disks is unavailable There could be a potential for data loss depending on the nature of the failed LUN Volumes are created out of the dynamic disks and can be expanded on the fly to extend over multiple dynamic disks if they are spanned volumes However after a type of volume is selected it cannot be altered For example a spanning volume cannot be altered to a mirrored volume without deleting and recreating the volume unless it is a simple volume Simple volumes can be mirrored or converted to spanned volumes Fault tolerant disks cannot be extended Therefore selection of the volume type is important The same performance characteristics on numbers of reads and writes apply when using fault tolerant configurations as is the case with controller based RAID These volumes can also be assigned drive letters or be mounted as mount points off existing drive letters The administrator should carefully consider how the volumes will be carved up and what groups or applications will be using them For example putting several storage intensive applications or groups into the same dynamic disk set would not be efficient These applications or groups would be better served by being divided up into separate dynamic disks which could then grow as their space requirements increased within the allowable growth limits
95. er notice AY VORSICHT Dieses Ger t enth lt m glicherweise einen Laser der nach den US amerikanischen FDA Bestimmungen und nach IEC 60825 1 als Laserprodukt der Klasse 1 zertifiziert ist Gesundheitssch dliche Laserstrahlen werden nicht emittiert Die Anleitungen in diesem Dokument mussen befolgt werden Bei Einstellungen oder Durchf hrung sonstiger Verfahren die ber die Anleitungen in diesem Dokument bzw im Installationshandbuch des Laserger ts hinausgehen kann es zum Austritt gef hrlicher Strahlung kommen Zur Vermeidung der Freisetzung gef hrlicher Strahlungen sind die folgenden Punkte zu beachten Versuchen Sie nicht die Abdeckung des Lasermoduls zu ffnen Im Inneren befinden sich keine Komponenten die vom Benutzer gewartet werden k nnen Benutzen Sie das Laserger t ausschlie lich gem den Anleitungen und Hinweisen in diesem Dokument Lassen Sie das Ger t nur von einem HP Servicepartner reparieren Italian laser notice AN AVVERTENZA AVVERTENZA Questo dispositivo pud contenere un laser classificato come prodotto laser di Classe 1 in conformit alle normative US FDA e IEC 60825 1 Questo prodotto non emette radiazioni laser pericolose L eventuale esecuzione di comandi regolazioni o procedure difformi a quanto specificato nella presente documentazione o nella guida di installazione del prodotto pu causare l esposizione a radiazioni nocive Per ridurre i rischi di esposizione a radiazioni pericolose atte
96. er of the file or folder is listed at the top of the screen To take ownership 1 Click the appropriate user or group in the Change owner to list 2 If it is also necessary to take ownership of subfolders and files enable the Replace owner on subcontainers and objects box 3 Click OK Share management There are several ways to set up and manage shares Methods include using Windows Explorer a command line interface or Server Manger EY NOTE Select servers can be deployed in a clustered as well as a non clustered configuration This chapter discusses share setup for a non clustered deployment As previously mentioned the file sharing security model of the storage system is based on the NTFS file level security model Share security seamlessly integrates with file security In addition to discussing share management this section discusses share security Share considerations Planning the content size and distribution of shares on the storage system can improve performance manageability and ease of use X3000 G2 Network Storage System User Guide 83 The content of shares should be carefully chosen to avoid two common pitfalls either having too many shares of a very specific nature or of having very few shares of a generic nature For example shares for general use are easier to set up in the beginning but can cause problems later Frequently a better approach is to create separate shares with a specific purpose or
97. er service on a clustered print server may be hosted on any of the nodes in the cluster As with all cluster resources clients should access the print server by its virtual network name or virtual IP address Creating a cluster printer spooler Printer spoolers should be created in a separate group dedicated to this purpose for ease of management For each printer spooler a physical resource is required to instantiate the print spooler resource In some cases dedicated physical resources are not available and hence sharing of the physical resource among other members of the group is acceptable remembering that all members of a group are managed as a unit Hence the group will failover and failback as a group To create a printer spooler 1 Create a dedicated group if desired 2 Create a physical resource disk if required see note 3 Create an IP address resource for the Virtual Server to be created if required see note 4 Create a Virtual Server Resource Network Name if required see note EY NOTE If the printer spool resource is added to an existing group with a physical resource IP address and virtual server resource steps 1 4 are not required 5 Create a Print Spool resource X3000 G2 Network Storage System User Guide 105 6 To add a printer to the virtual server Double click the printers and faxes icon Right click the new screen and then click add printer A wizard starts Click create a new po
98. es e Administrative shares are shares with a last character of Administrative shares are not included in the list of shares when a client browses for available shares on a CIFS server 84 File server management Standard shares are shares that do not end in a character Standard shares are listed whenever a CIFS client browses for available shares on a CIFS server The storage system supports both administrative and standard CIFS shares To create an administrative share end the share name with the character when setting up the share Do not type a character at the end of the share name when creating a standard share Managing shares Shares can be managed using Server Manager Tasks include e Creating a new share e Deleting a share Modifying share properties e Publishing in DFS EY NOTE These functions can operate in a cluster on select servers but should only be used for non cluster aware shares Use Cluster Administrator to manage shares for a cluster The page will display cluster share resources A CAUTION Before deleting a share warn all users to exit that share and confirm that no one is using that share File Server Resource Manager File Server Resource Manager FSRM is a suite of tools that allows administrators to understand control and manage the quantity and type of data stored on their servers Some of the tasks you can perform are Quota management File screening manag
99. es for Macintosh and Service for NetWare are not supported in a cluster configuration Dynamic Disks are not supported in a cluster configuration e Errors appear on a network adapter that is not configured or does not have an active link If the network adapter is not going to be used it should be disabled Adding nodes to a cluster Only the Quorum disk should be accessible by the new node while the new node is not a member of the cluster The new node should not have access to the other LUNs in the cluster until after it has joined the cluster After the node has joined the cluster the LUNs may be presented to the new node Move the physical disk resources over to the new node to confirm functionality X3000 G2 Network Storage System User Guide 99 A CAUTION Presenting other LUNs to the non clustered system could lead to data corruption Geographically dispersed clusters Cluster nodes can be geographically dispersed to provide an additional layer of fault tolerance Geographically dispersed clusters are also referred to as stretched clusters The following rules must be followed with geographically dispersed clusters A network connection with latency of 500 milliseconds or less ensures that cluster consistency can be maintained If the network latency is over 500 milliseconds the cluster consistency cannot be easily maintained All nodes must be on the same subnet Cluster groups and resources including file shares
100. etup executable located in the C hpnas Components WEBES folder Maintenance and service HP provides specific documentation for maintaining and servicing your storage system and offers a customer self repair program Maintenance updates Regular updates to the storage system are supplied on the HP StorageWorks Service Release DVD The Service Release DVD can be obtained at http www software hp com Individual updates for each product are available for download from the HP Support web site at http h18023 www1 hp com support selfrepair na replace part asp System updates System updates to the hardware BIOS firmware drivers critical updates and hotfixes for the operating system and other related software updates are bundled on the Service Release DVD Firmware updates Firmware is software that is stored in Read Only Memory ROM Firmware is responsible for the behavior of the system when it is first switched on and for passing control of the server to the operating system When referring to the firmware on the system board of the server it is called the System ROM or the BIOS When referring to the firmware on another piece of hardware configured in the server itis called Option ROM Storage systems have hard drives Smart Array Controllers Remote Insight Lights Out Edition RILOE Remote Insight Lights Out Edition II RILOE II and Integrated Lights Out options that have firmware that can be updated It is
101. f Windows has not been activated you must manually activate it within three days of the initial storage system installation To manvally activate your copy of Windows 1 If needed change your locale settings Control Panel gt Regional and Language Options 16 Installing and configuring the storage system Record the product key located on the Certificate of Authenticity In Control Panel double click System Under Windows Activation click Activate Windows Now ne DS Follow the on screen instructions Be sure to choose the Type a different product key option when prompted for a product key Microsoft Windows Storage Server 2008 R2 cannot be fully activated online During the activation process you will be provided with a telephone number to call to complete the process Be sure to have the product key available when calling this number Configure the storage system The HP StorageWorks Initial Configuration Tasks window launches automatically on logon Use this tool to perform setup tasks such as setting the time zone network configuration changing the computer name and joining a domain When the HP StorageWorks Initial Configuration Tasks window is closed HP Server Manager is launched automatically Use HP Server Manager for further customizing of the storage system such as adding roles and features and share and storage management For detailed information about configuration options in HP StorageWorks Initial Configur
102. failover process completes any currently executing read and write operations will fail Other node s in the cluster will be placed under a heavier load by the extra work until the restarted node comes up and the resources are moved back Shutting down one cluster node A CAUTION Shutting down a cluster node must be done only after confirming that the other node s in the cluster are functioning normally Adequate warning should be given to users connected to resources of the node being shutdown Shutting down a cluster node causes all cluster resources served by that node to fail over to the other node s This causes any currently executing client read and write operations to fail until the cluster failover process completes The other node s are placed under a heavier load by the extra work until the second node is powered up and rejoins the cluster Powering down the cluster The power down process for the storage system cluster is similar to the process for a single node but with the cluster extra care must be taken with the storage subsystem and the sequence of the shutdown The power down process is divided into two main steps 1 Shutting down the cluster nodes 2 Removing power from the cluster nodes The sequence of these steps is critical The devices must be shut down before the storage subsystem Improperly shutting down the nodes and the storage subsystem causes corruption and loss of data A CAUTION Before p
103. file usercmd output cmd file to generate local users and groups userpassword provide a password to be used for all user accounts created execute import user objects to ADAM using the generated files log specify a filename to log operations Both passwd and group must be specified At least one of Idf or usercmd must be specified If userpassword is not specified all local accounts created must have passwords set manually before NFS mapping will succeed Figure 14 AD LDS script execution help screen As a best practice specify all of the above parameters so that Windows accounts and NFS mappings are created however you can provide finer control as follows If you omit the 1df option the script creates Windows accounts but not NFS mappings Likewise omitting the usercmd option creates NFS mappings but not Windows accounts The execute option controls whether Windows accounts and NFS mappings are actually made to the system Omitting the execute option will still create the output files these are the generateusers cmd and 1df out files as shown above You can then examine these files to see the actions that would have been performed had the execute option been included The userpassword option specifies the password that the script assigns when creating Windows accounts for new users You must use a password that meets the password strength requirements of your system By default Windows Storage Server 2008 R2 require
104. for high availability Dual data paths from each node enable a path failure to occur that does not force the failover of the node Clusters can be configured with single path but if a failure in the path does occur all of the node resources will be failed to the non affected node Using multipath data paths for high availability HP recommends that cluster configurations be deployed with dual data paths for high availability Clusters can be configured with single path but if a failure in the path occurs all of the node resources will be failed to the non affected node Pathing software is required in configurations where multipathing to the storage is desired or required Multipathing software allows for datapath failure to occur without forcing a node failover Checklists for cluster server installation These checklists assist in preparing for installation Step by step instructions begin after the checklists Network requirements e A unique NetBIOS cluster name e For each node deployed in the cluster the following static IP addresses are required e One for the network adapters on the private network e One for the network adapters on the public network e One for the virtual server itself A single static cluster IP address is required for the entire cluster A domain user account for Cluster service all nodes must be members of the same domain Each node should have at least two network adapters one for connection to the public netw
105. ght click the NfsTest folder select Properties and then select the Security tab Click Advanced select the Owner tab and then click Edit Click Other users or groups and type user in the Enter the object name to select field Select User or Group zl Select this object type user Group or Built in security principal Object Types From this location WIN L7KH1 F2BAVA Locations Enter the object name to select examples userl Check Names Advanced Cancel Ze Figure 21 Select User or Group dialog box Click OK to return to the Advanced Security Settings for NfsTest dialog box Check the Replace owner on subcontainers and objects check box 46 Administration tools Change owner to Name 2 Administrator WIN L7KH172BA4W444dministrator B Administrators WIN L KH172BAVA4 Administrators 2 user WIN L7KH172BAVA user1 Other users or groups Figure 22 Replace owner on subcontainers and objects Click OK four times to dismiss the Properties dialog box Return to the Properties dialog box select the Security tab and then click Edit Select Everyone in the list of groups and user names and then click Remove Next click Add and add user1 Select full control for its permissions WR Permissions for NfsTest xi Security Object name C NfsTest Group or user names E CREATOR OWNER SA SYSTEM a Administrators WIN L7KHT 72BAVA Administrators 2 user WIN
106. gsunternehmen f r Hausm ll 130 Regulatory compliance notices Greek recycling notice D Aur ro ouuBoho onpaiver dr Sev np nel va anoppiwere To npol v pe Ta Aoind oikiak anoppiggara AvriOera np ne va npootat yete Ty avBpwnivn uyela Kal To nepiPaddov napadidovtag Tov axpnoro efonkiou oag oe eEouoiobornu vo onpeio cuUAAOyAg yia Tnv avak kAwon axpnotou nAekTpIKOU Kal nhekrpoviko eEonAiopou To nepioodrepeg nA npopopieg ENIKOIVWVIOTE HE THY unnpeocla andoppiwns ANOPPIMMATWV TNG NEPIOXAS cas Hungarian recycling notice A hullad k anyagok megsemmisit se az Eur pai Uni h ztart saiban Ez a szimb lum azt jelzi hogy a k sz l ket nem szabad a h ztart si hullad kkal egy tt kidobni Ehelyett a leselejtezett berendez seknek az elektromos vagy elektronikus hullad k tv tel re kijel lt helyen t rt n beszolg ltat s val meg vja az emberi eg szs get s a k rnyezetet Tov bbi inform ci t a helyi k ztisztas gi v llalatt l kaphat Italian recycling notice Smaltimento di apparecchiature usate da parte di utenti privati nell Unione Europea Questo simbolo avvisa di non smaltire il prodotto con i normali rifi uti domestici Rispettare la salute umana e l ambiente conferendo l apparecchiatura dismessa a un centro di raccolta designato per il riciclo di apparecchiature elettroniche ed elettriche Per ulteriori informazioni rivolgersi al servizio per lo smaltimento dei rifi uti domestici Latv
107. gt This folder subfolders Allow Users Create Folders lt not inherited gt This folder and subfol Allow Users Create Files W lt not inherited gt Subfolders only Allow Everyone Read amp Execute lt not inherited gt This folder only Add Edit Remove J Replace permission entries on all child objects with entries shown here that apply to child objects Learn more about access control Cancel Apply Figure 35 Advanced Security settings dialog box Permissions tab Other functionality available in the Advanced Security Settings dialog box is illustrated in Figure 35 and includes Add a new user or group Click Add and then follow the dialog box instructions Remove a user or group Click Remove Replace permission entries on all child objects with entries shown here that apply to child objects This allows all child folders and files to inherit the current folder permissions by default Modify specific permissions assigned to a particular user or group Select the desired user or group and then click Edit X3000 G2 Network Storage System User Guide 79 4 Enable or disable permissions by selecting the Allow box to enable permission or the Deny box to disable permission If neither box is selected permission is automatically disabled Figure 36 illustrates the Edit screen and some of the permissions Permission Entry for Drive E E 21x Object Name Change A
108. he failover of resources can be controlled with in a multinode cluster to provide a controlled balanced failover methodology that balances the increased work load Because operating environments differ the administrator must indicate whether the system will automatically fail the resources organized by resource groups back to their original node or will leave the resources failed over waiting for the resources to be moved back manually EY NOTE If the storage system is not set to automatically fail back the resources to their designated owner the resources must be moved back manually each time a failover occurs 106 Cluster administration Restarting one cluster node A CAUTION Restarting a cluster node should be done only after confirming that the other node s in the cluster are functioning normally Adequate warning should be given to users connected to resources of the node being restarted Attached connections can be viewed through Server Manager on the storage system Desktop using Terminal Services From Server Manager select File Sharing gt Shared Folders gt Sessions The physical process of restarting one of the nodes of a cluster is the same as restarting a storage system in single node environment However additional caution is needed Restarting a cluster node causes all cluster resources served by that node to fail over to the other nodes in the cluster based on the failover policy in place Until the
109. ian recycling notice Europos S jungos nam kio vartotoj rangos atliek alinimas is simbolis nurodo kad gaminio negalima i mesti kartu su kitomis buitin mis atliekomis Kad apsaugotum te moni sveikat ir aplink pasenusi nenaudojam jranga turite nuve ti elektrini ir elektronini atliek surinkimo punkt Daugiau informacijos teiraukit s buitini atliek surinkimo tarnybos X3000 G2 Network Storage System User Guide 131 Lithuanian recycling notice Nolietotu iek rtu izn cin Sanas noteikumi lietot jiem Eiropas Savien bas priv taj s m jsaimniec b s Sis simbols nor da ka ier ci nedr kst utiliz t kop ar citiem m jsaimniec bas atkritumiem Jums j r p jas par cilv ku vesel bas un vides aizsardz bu nododot lietoto apr kojumu otrreiz jai p rstr dei pa lietotu elektrisko un elektronisko ier u sav k anas punkt Lai ieg tu pla ku inform ciju l dzu sazinieties ar savu m jsaimniec bas atkritumu likvid anas dienestu Polish recycling notice Utylizacja zu ytego sprz tu przez u ytkownik w w prywatnych gospodarstwach domowych w krajach Unii Europejskiej Ten symbol oznacza e nie wolno wyrzuca produktu wraz z innymi domowymi odpadkami Obowi zkiem u ytkownika jest ochrona zdrowa ludzkiego i rodowiska przez przekazanie zu ytego sprz tu do wyznaczonego punktu zajmuj cego si recyklingiem odpad w powsta ych ze sprz tu elektrycznego i elektronicznego Wi cej informa
110. iles that change daily If the frequency of changes to each file is greater than the amount of space allocated to storing shadow copies no shadow copy is created Administrators should also consider user expectations of how many versions they will want to have available End users might expect only a single shadow copy to be available or they might expect three days or three weeks worth of shadow copies The more shadow copies users expect the more storage space administrators must allocate for storing them Setting the limit too low also affects backup programs that use shadow copy technology because these programs are also limited to using the amount of disk space specified by administrators EY NOTE Regardless of the volume space that is allocated for shadow copies there is a maximum of 64 shadow copies for any volume When the 65th shadow copy is taken the oldest shadow copy is purged The minimum amount of storage space that can be specified is 350 megabytes MB The default storage size is 10 percent of the source volume the volume being copied If the shadow copies are stored on a separate volume change the default to reflect the space available on the storage volume instead of the source volume Remember that when the storage limit is reached older versions of the shadow copies are deleted and cannot be restored X3000 G2 Network Storage System User Guide 65 A CAUTION To change the storage volume shadow copies
111. ill create a file in Windows change its ownership to an NFS mapped user and observe that it is owned by the proper user and group in UNIX Finally you will restrict the properties of the Windows shared folder so that it is accessible by a single user instead of the group Everyone EY NOTE This example assumes that the system is not part of an Active Directory domain or is part of an Active Directory domain but will be using AD LDS for user name mapping IMPORTANT To ensure proper NFS user name mapping behavior when AD LDS is used for user name mapping you must enable Microsoft hotfix 2222746 which is installed on the storage system but is not enabled it by default You can enable it by setting the following registry subkey HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet services NfsServer NImNsm AutoCorrectPrimaryGroup Type REG_DWORD Value Ox After setting the registry subkey restart the storage system X3000 G2 Network Storage System User Guide Ai Step 1 Step 2 Step 3 Step 4 If you have not already run the Phase 1 script factory setup adlds cmd do so now The script is located in the c npnas components postinstaller adlds folder On the Windows system in the C npnas components ADLDS folder create a file named passwdfile containing root x 0 0 root root bin bash userl x 2701 5700 A sample user home userl bin sh Create a file named groupfile containing rootgroup x 0 allusers x 5
112. ill not have a cluster resource and will not failover with any cluster group In the case of a failover a client cannot use the virtual name or virtual IP address to access the share since the protocol cannot failover with the cluster group The client must wait until the initial node is brought back online to access the share HP recommends placing cluster aware and non cluster aware protocols on different file shares Table 12 Sharing protocol cluster support Cluster Aware sup Supported on cluster ports failover nodes Protocol Client Variant CIFS SMB Windows Yes Yes NES UNIX Yes Yes Linux Web FTP Many NCP Novell AppleTalk Apple Standards based SCSI initiator SCSI EY NOTE AppleTalk is not supported on clustered disk resources AppleTalk requires local memory for volume indexing On failover events the memory map is lost and data corruption can occur Preparing for cluster installation This section provides the steps necessary to cluster HP StorageWorks X3000 Network Storage Systems X3000 G2 Network Storage System User Guide 95 Before beginning installation Confirm that the following specifications have been met before proceeding The Quorum disk has been created from shared storage and is at least 50 MB 500 MB is recom mended Additional LUNs may also be presented for use as shared disk resources Cluster configurations should be deployed with dual data paths
113. important to update the firmware also called flashing the ROM as part of regular server maintenance In addition checking for specific firmware updates in between regular updates helps to keep the server performing optimally HP recommends checking for a firmware update before sending a part back to HP for replacement Certificate of Authenticity The Certificate of Authenticity COA label is used to Upgrade the factory installed operating system using the Microsoft Upgrade program for license validation e Reinstall the operating system because of a failure that has permanently disabled it The COA label location varies by server model On rack mounted server models the COA label is located either on the front section of the right panel or on the right front corner of the top panel On 110 Troubleshooting servicing and maintenance tower models the COA label is located toward the rear of the top panel of the server On blade models the COA label is located on top of the server blade Workarounds for common issues The following list documents common issues related to HP StorageWorks X3000 G2 Network Storage Systems and their recommended workarounds For issues and workarounds specific to a particular product release see the HP StorageWorks X3000 G2 Network Storage System Release Notes for your product version Issue On some storage systems a momentary press of the power button results in an operating system shutdown
114. ing storage for file sharing and block sharing including creating LUNs on storage subsystems as well as creating and formatting volumes on LUNs or server disks X3000 G2 Network Storage System User Guide 33 EY NOTE You must have a VDS Hardware Provider that is appropriate for your storage system installed in order to provision storage on an iSCSI target If you have Microsoft iSCSI Software Target running on a Windows Storage Server 2008 R2 storage system install the Microsoft iSCSI Software Target VDS Hardware Provider on the client computer Provision a Shared Folder Wizard for creating and configuring shared folders that can be accessed by using either the server message block SMB or NFS protocol Single Instance Storage SIS can be enabled or disabled for each volume that is displayed in Share and Storage Management SIS recovers disk space by reducing the amount of redundant data stored on a volume It identifies identical files storing only a single copy of the file in the SIS Common Store and replacing the files with pointers to the file in the SIS Common Store The Share and Storage Management snap in makes it possible to complete most of the administrative tasks that are required to create and manage shared folders and volumes without having to use the Shared Folder Management Storage Manager for SANs or Disk Management snap ins These tasks include configuring quotas to restrict the quantity of data configuring fil
115. ing the quick parameter lengthens the format time considerably Enter active to mark the partition as active Enter assign letter lt drive letter gt to assign a drive letter to the USB drive For example assign letter U Insert the System Recovery DVD provided with the system Using Windows Explorer or a comparable utility open the DVD so that all contents are visible Select all of the files including bootmgr Copy all files to the root of the USB drive Use the USB Flash Drive for System Recovery A CAUTION During the recovery process the System Recovery USB Flash drive overwrites the original OS logical drives All data on these drives will be erased 1 Do one of the following a To use the direct connect access method connect a keyboard monitor and mouse directly to the server using a local I O cable b To use the remote management access method access the server using Integrated Lights Out 2 iLO 2 from a client PC 2 Do one of the following a Insert the System Recovery USB Flash drive in a USB port on the X Series system being restored b Insert the System Recovery USB Flash drive in the client PC connected to the iLO port of the X Series System being restored 3 Click Restore Factory Image The upgrade process completes with little user intervention required The server automatically reboots more than once IMPORTANT Do not interrupt the upgrade process When the upgrade process nears
116. ingful volume labels with the intended drive letter embedded in the volume label if possible For example volume e might be named Disk E Volume labels often serve as the only means of identification Record all volume labels and drive letters in case the system needs to be restored When managing basic disks only the last partition on the disk can be extended unless the disk is changed to dynamic Basic disks can be converted to dynamic but cannot be converted back to basic without deleting all data on the disk Basic disks can contain up to four primary partitions or three primary partitions and one extended partition Format drives with a 16 K allocation size for best support of shadow copies performance and defragmentation NTFS formatted drives are recommended because they provide the greatest level of support for shadow copies encryption and compression Only basic disks can be formatted as FAT or FAT32 Read the online Disk Management help found in the utility File server management Scheduling defragmentation Defragmentation is the process of analyzing local volumes and consolidating fragmented files and folders so that each occupies a single contiguous space on the volume This improves file system performance Because defragmentation consolidates files and folders it also consolidates the free space on a volume This reduces the likelihood that new files will be fragmented Defragmentation for a volume
117. ion for the following topics Configuring shared folders on a server cluster e Configuring an NFS share as a cluster resource e Modifying an NFS shared cluster resource e Deleting an NFS shared cluster resource Using Microsoft Services for NFS with server clusters e Understanding how Server for NFS works with server clusters e Using Server for NFS on a server cluster Configuring User Name Mapping on a server cluster For further details see the online help for Microsoft Services for Network File System Best practices for running Server for NFS in a server cluster Stop Server for NFS before stopping the server cluster e Ensure share availability when a node fails 104 Cluster administration Use the appropriate tool to manage Network File System NFS share cluster resources Avoid conflicting share names Ensure the availability of audit logs Move file shares or take them offline before stopping Server for NFS Take resources offline before modifying Administer Server for NFS only from computers in a trusted domain Restart the Server for NFS service after the cluster service restarts Choose the appropriate sharing mode Use the command line properly when creating or modifying NFS share cluster resources Use hard mounts Use the correct virtual server name Print services in a cluster The Windows Storage Server 2008 R2 Cluster service implementation increases availability of critical print servers A print spool
118. itions that they contain Disk Management is used to initialize disks create volumes format volumes with the FAT FAT32 or NTFS file systems and create fault tolerant disk systems Most disk related tasks can be performed in Disk Management without restarting the system or interrupting users Most configuration changes take effect immediately A complete online help facility is provided with the Disk Management utility for assistance in using the product EY NOTE When the Disk Management utility is accessed through a Remote Desktop connection this connec tion can only be used to manage disks and volumes on the server Using the Remote Desktop connection for other operations during an open session closes the session When closing Disk Management through a Remote Desktop connection it may take a few moments for the remote session to log off Guidelines for managing disks and volumes 60 The single logical drive is configured for the storage system operating system and should not be altered in any manner If this logical drive is altered the system recovery process may not function properly when using the System Recovery DVD Do not tamper with the local C volume This is a reserved volume and must be maintained as it exists HP does not recommend spanning array controllers with dynamic volumes The use of software RAID based dynamic volumes is not recommended Use the array controller instead it is more ef ficient Use mean
119. ks to the drive write heads in the correct order A natural consequence of the striping process is that each hard drive in a given array contains the same number of data blocks EY NOTE If one hard drive has a larger capacity than other hard drives in the same array the extra capacity is wasted because it cannot be used by the array X3000 G2 Network Storage System User Guide 51 Fault tolerance Drive failure although rare is potentially catastrophic For example using simple striping as shown in Figure 26 failure of any hard drive leads to failure of all logical drives in the same array and hence to data loss To protect against data loss from hard drive failure storage systems should be configured with fault tolerance HP recommends adhering to RAID 5 configurations The table below summarizes the important features of the different kinds of RAID supported by the Smart Array controllers The decision chart in the following table can help determine which option is best for different situations Table 10 Summary of RAID methods RAID 0 Strip RAID 5 Distrib ing no cht LEONE ied Date RAID 6 ADG tolerance romng Guarding Maximum number of hard N A drives Storage system dependent Tolerant of single hard Yes Yes drive failure If the failed drives are not mirrored to each other Tolerant of multiple simul taneous hard drive fail ures Yes two drives can fail Online spares Further p
120. l also add Windows users to the appropriate Windows groups for the newly created user and group accounts It does this by examining the relationships between users and groups in the password and group files that were given as inputs to the script Password and Group file syntax You can create the password and group files yourself or copy them from the NFS client at etc passwd and etc group Each line of a standard UNIX password file follows this format user password UID GID comment home directory command shell All fields are required but the only fields that are used are the user UID and GID fields If you are creating these files yourself you may want to leave the other fields blank X3000 G2 Network Storage System User Guide 37 Each line of a standard UNIX group file follows this format group password GID group list All fields are required but only the group GID and group list fields are used The GID field value must match the GID field value in the password file for those users that belong to the group EY NOTE If you create the group and password files you must have corresponding users and groups on the UNIX system The correspondence is through the numeric UID and GID however the user names and group names can be different For example the UNIX root group can be associated with a Windows group named rootgroup as long as its group ID of O is the same between them IMPORTANT User names in the passwor
121. l c00300504 c00300504 pdf IMPORTANT Some troubleshooting procedures found in ProLiant server guides may not apply to HP StorageWorks X3000 G2 Network Storage Systems If necessary check with your HP Support representative for further assistance For software related components and issues online help or user guide documentation may offer troubleshooting assistance The release notes for the storage system product line is updated frequently The document contains issues and workarounds to a number of categories for the storage systems Known issues and workarounds for the storage system products and the service release are addressed in release notes To view the latest release notes go to http www hp com go nas select your product family product model click Support for your product and then click Manuals WEBES Web Based Enterprise Services WEBES is a tool suite aimed at preventing or reducing your system s down time The tool suite has the following components X3000 G2 Network Storage System User Guide 109 CCAT Computer Crash Analysis Tool SEA System Event Analyzer If you have a warranty or service contract with HP you are entitled to these tools free of charge You must however upgrade the tools at least once a year because the software expires after one year For more information about WEBES see http h18023 www 1 hp com support svctools webes To install WEBES on your storage system run the s
122. lashing The drive is operating normally and it has been se lected by a management application Amber flashing regularly 1 Hz On A predictive failure alert has been received for this drive Replace the drive as soon as possible Off On The drive is online but it is not active currently Amber flashing regularly 1 Hz Flashing regularly 1 Hz Do not remove the drive Removing a drive may terminate the current operation and cause data loss The drive is part of an array that is undergoing ca pacity expansion or stripe migration but a predictive failure alert has been received for this drive To minimize the risk of data loss do not replace the drive until the expansion or migration is complete Flashing regularly 1 Hz Do not remove the drive Removing a drive may terminate the current operation and cause data loss The drive is rebuilding or it is part of an array that is undergoing capacity expansion or stripe migra tion Amber flashing regularly 1 Hz Flashing irregularly The drive is active but a predictive failure alert has been received for this drive Replace the drive as soon as possible Of Steadily amber Flashing irregularly Off The drive is active and it is operating normally A critical fault condition has been identified for this drive and the controller has placed it offline Re place the drive as soon as possible X3000 G2 Network
123. les communication between a device and other devices on a network Storage area network A network of storage devices available to one or more servers Serial Attached SCSI Serial Advanced Technology Attachment Simple Network Management Protocol A widely used network monitoring and control protocol Data is passed from SNMP agents which are hardware and or software processes reporting activity in each network device hub router bridge and so on to the workstation console used to oversee the network The agents return information contained in a MIB Management Information Base which is a data structure that defines what is obtainable from the device and what can be controlled turned off on and so on Volume on disk An accessible storage area on disk either physical or virtual The process by which volume permissions read only read write or none and LUNs are assigned to a host port Index A access rights managing 102 Accessing the storage system Remote Desktop method 18 Accessing the storage system remote browser method 18 ACL defining 84 Active Directory Lightweight Directory Services AD LDS 36 ActiveX enabling 18 Array Configuration Utility 59 array controller purpose 5 arrays defined 51 B backup with shadow copies 76 basic disks 53 54 basic disks 53 54 battery replacement notices 134 boot sequence 20 C cache file shadow copies 68 Canadian notice 122 Certificate
124. luster group exists it can only be owned by one node and the other node would not serve any network traffic File share resource planning issues CIFS and NFS are cluster aware protocols that support the Active Active cluster model allowing resources to be distributed and processed on both nodes at the same time For example some NFS file share resources can be assigned to a group owned by a virtual server for Node A and additional NFS file share resources can be assigned to a group owned by a virtual server for Node B Configuring the file shares as cluster resources provides for high availability of file shares Because the resources are placed into groups ownership of the files can easily move from one node to the other as circumstances require If the cluster node owning the group of file shares should be shut down or fail the other node in the cluster will begin sharing the directories until the original owner node is brought back on line At that time ownership of the group and its resources can be brought back to the original owner node Resource planning 1 Create a cluster group for each node in the cluster with an IP address resource and a network name resource Cluster resource groups are used to balance the processing load on the servers Distribute ownership of the groups between the virtual servers 2 For NFS environments configure the NFS server NFS specific procedures include entering audit and file lock information
125. m Recovery DVD End User License Agreement e Certificate of Authenticity Card Slide rail assembly HP Proliant Essentials Integrated Lights Out Advanced Pack EY NOTE HP Storage Works X3800 G2 Network Storage Systems support Integrated Lights Out 3 iLO 3 remote management software All other storage system models support iLO 2 Determine an access method Before you install the storage system you need to decide on an access method X3000 G2 Network Storage System User Guide 13 The type of access you select is determined by whether or not the network has a Dynamic Host Configuration Protocol DHCP server If the network has a DHCP server you can install the storage system through the direct attachment or remote management methods If your network does not have a DHCP server you must access the storage system through the direct attachment method The direct attachment method requires a display keyboard and mouse These components are not provided with the storage system IMPORTANT Only the direct attach and remote management access methods can be used to install the storage system After the storage system installation process is complete and the system s IP address has been assigned you can then additionally use the remote browser and remote desktop methods to access the storage system Locate the serial number Certificate of Authenticity and End User License Agreement For technical support purpose
126. managing it from any client Installed for remote administration Remote Desktop 18 Installing and configuring the storage system allows only two concurrent sessions Leaving a session running takes up one license and can affect other users If two sessions are running additional users will be denied access To connect the storage system to a network using the Remote Desktop method 1 On the PC client select Start gt Run At Open type mst sc then click OK 2 Enter the IP address of the storage system in the Computer box and click Connect 3 Log on to the storage system with the administrator user name and password Using the Telnet method Telnet is a utility that lets users connect to machines log on and obtain a command prompt remotely Telnet is preinstalled on the storage system but must be activated before use A CAUTION For security reasons Telnet is disabled by default The service needs to be modified to enable access to the storage system with Telnet Enabling Telnet The Telnet service needs to be enabled prior to its access 1 In Server Manager expand the Configuration node in the left panel 2 Click System and Network Settings 3 Under System Settings Configuration click Telnet 4 Check the Enable Telnet access to this server check box and then click OK Default storage settings HP StorageWorks X3000 G2 Network Storage Systems are preconfigured with default storage settings This section provides
127. may have gained this new storage space by either expansion or by deleting another logical drive on the same array Unlike drive expansion the operating system must be aware of changes to the logical drive size You extend a volume to e Increase raw data storage 62 File server management Improve performance by increasing the number of spindles in a logical drive volume Change fault tolerance RAID configurations For more information about RAID levels see the Smart Array Controller User Guide or the document titled Assessing RAID ADG vs RAID 5 vs RAID 1 0 Both are available at the Smart Array controller web page or at http h18000 www1 hp com products servers proliantstorage arraycontrollers documentation html Extend volumes using Disk Management The Disk Management snap in provides management of hard disks volumes or partitions It can be used to extend a dynamic volume only EY NOTE Disk Management cannot be used to extend basic disk partitions Guidelines for extending a dynamic volume Use the Disk Management utility You can extend a volume only if it does not have a file system or if it is formatted NTFS You cannot extend volumes formatted using FAT or FAT32 You cannot extend striped volumes mirrored volumes or RAID 5 volumes For more information see the Disk Management online help Expanding storage for EVA arrays using Command View EVA Presenting a virtual disk offers its stor
128. must be deleted The existing file change history that is kept on the original storage volume is lost To avoid this problem verify that the storage volume that is initially selected is large enough Identifying the storage area To store the shadow copies of another volume on the same file server a volume can be dedicated on separate disks For example if user files are stored on H another volume such as s can be used to store the shadow copies Using a separate volume on separate disks provides better performance and is recommended for heavily used storage systems If a separate volume will be used for the storage area where shadow copies are stored the maximum size should be changed to No Limit to reflect the space available on the storage area volume instead of the source volume where the user files are stored Disk space for shadow copies can be allocated on either the same volume as the source files or a different volume There is a trade off between ease of use and maintenance versus performance and reliability that the system administrator must consider By keeping the shadow copy on the same volume there is a potential gain in ease of setup and maintenance however there may be a reduction in performance and reliability A CAUTION If shadow copies are stored on the same volume as the user files note that a burst of disk input output I O can cause all shadow copies to be deleted If the sudden deletion of shadow
129. n This section discusses share setup for a non clustered deployment Folder management Volumes and folders on any system are used to organize data Regardless of system size systematic structuring and naming conventions of volumes and folders eases the administrative burden Moving from volumes to folders to shares increases the level of granularity of the types of data stored in the unit and the level of security access allowed Folders can be managed using Server Manager Tasks include Accessing a specific volume or folder Creating a new folder Deleting a folder Modifying folder properties Creating a new share for a volume or folder Managing shares for a volume or folder Managing file level permissions Security at the file level is managed using Windows Explorer File level security includes settings for permissions ownership and auditing for individual files To enter file permissions 1 Using Windows Explorer access the folder or file that needs to be changed and then right click the folder X3000 G2 Network Storage System User Guide 77 2 Click Properties and then click the Security tab Drive E E Properties 21x Shadow Copies Quota NFS Sharing l General Tools Hardware Sharing Security Group or user names Leg Administrators ER CREATOR OWNER Leg Everyone GAR Leg Users Add Remove Permissions for SYSTEM Allow Deny Full Control Modify Read amp Execute List
130. n be brought online and taken offline They can be managed in a cluster They can be owned by only one node at a time Examples of cluster resources are IP addresses network names physical disk resources and file shares Resources represent individual system components These resources are organized into groups and managed as a group Some resources are created automatically by the system and other resources must be set up manually Resource types include e IP address resource Cluster name resource Cluster quorum disk resource e Physical disk resource e Virtual server name resources 90 Cluster administration CIFS file share resources NFS file share resources e FTP file share resources e iSCSI resources Cluster groups Cluster resources are placed together in cluster groups Groups are the basic unit of failover between nodes Resources do not fail over individually they fail over with the group in which they are contained Virtual servers A virtual server is a cluster group that consists of a static IP Address resource and a Network Name resource Several virtual servers can be created By assigning ownership of the virtual servers to the different server nodes the processing load on the storage systems can be distributed between the nodes of a cluster The creation of a virtual server allows resources dependent on the virtual server to fail over and fail back between the cluster nodes Cluster resources are as
131. n each node of the system Example If the password and group files are located at c maps on node 1 then they must also be at c maps on node 2 The contents of the password and group files must be the same on both nodes as well These password and group files on each server node must be updated periodically to maintain consistency and prevent users or groups from being inadvertently squashed 102 Cluster administration Non cluster aware file sharing protocols Services for Macintosh SFM File and Print Services for NetWare HTTP file sharing protocols are not cluster aware and will experience service interruption if installed on a clustered resource during failover events of the resource Service interruptions will be similar to those experienced during a server outage Data that has not been saved to disk prior to the outage will experience data loss In the case of SFM it is not supported because SFM maintains state information in memory Specifically the Macintosh volume index is located in paged pool memory Using SFM in clustered mode is not supported and may result in data loss similar in nature to a downed server should the resource it is based on fails over to the opposing node Adding new storage to a cluster Present the new storage to one node in the cluster This can be accomplished through selective storage presentation or through SAN zoning The tasks described below are used to add storage to a cluster See the online hel
132. nersi alle sequenti precauzioni Non cercare di aprire il contenitore del modulo All interno non vi sono componenti soggetti a manutenzione da parte dell utente Non esequire operazioni di controllo regolazione o di altro genere su un dispositivo laser ad eccezione di quelle specificate da queste istruzioni Affidare gli interventi di riparazione dell unit esclusivamente ai tecnici del Assistenza autorizzata HP X3000 G2 Network Storage System User Guide 127 Japanese laser notice A BE ARIE US FDA EI ES KUIEC 60825 11244 3 lt Class 11L F HANEENT WSRAMHVET ARTIE IRE REL F HISALECA RBRBLUL F RAOIVAL IL AAEIXMENTUSUHAOAH CH WE PALLHA Ak ERZAR eeh SIRS AYET AIS ED ein Lt UFOMBS FoT il ES 12 LY FO V ve RITE TEEN 2 FAY RA SIV ARAU HE EENT EtA HERL REATUOD AROR AT VH FAAS ME ALENT HPOERY E ARMA On kO SE AEN TIES Spanish laser notice AN ADVERTENCIA Este dispositivo podr a contener un l ser clasificado como producto de l ser de Clase 1 de acuerdo con la normativa de la FDA de EE UU e IEC 60825 1 El producto no emite radiaciones l ser peligrosas El uso de controles ajustes o manipulaciones distintos de los especificados aqu o en la gu a de instalaci n del producto de l ser puede producir una exposici n peligrosa a las radiaciones Para evitar el riesgo de exposici n a radiaciones peligrosas No intente abrir la cubierta del m dulo Dentro no hay componentes que el
133. nessee hennen 59 Array Configuration Dil rar 59 Disk Management Cul tn 60 Guidelines for managing disks and volumes ns snsensonrnsnaansrennserrsnanrsnesvaeredenwessneusenenenntnne 60 Scheduling defragmenteren nietes ios 61 febrer iio 61 EE 62 GE 62 Extending storage using Windows Storage Utilities annen erneer eenn 62 Expanding storage for EVA arrays using Command View EVA 63 Expanding storage using the Array Configuration Utility nnen nnee renner 63 KEE 64 Shadow copy planning WE 64 RE 64 Allocating disk Space papada tines 65 Identifying the storage E 66 Determining creation frequency csssccceseeeeseeeseeeeeesececeeseeceaeecsaeeeseeeestaeeenseeeneeeneeeeas 66 Shadow copies and drive defragmentation cooooccnnoccccconcccnnonnnnononnncononccnononon con nrn cana nnnnnnos 66 ee specan niena E E EREE Ea EE A 67 EE 67 The shadow copy cache He 68 GE 69 EE 69 E TE 70 Viewing Shadow copy properties micos 70 Redirecting shadow copies to an alternate volume ooooococinooccconocccconccccnonnccconnncncononononnnos 70 Disabling ET 71 Managing shadow copies from the storage system desktop nnen eneeereneeernnen 71 Shadow Copies for Shared Folders iia ad 72 SMB shadow copies Stee eneen 73 SE 74 Recovery of files or E 74 Recovering a deleted file or folder nod 74 Recovering an overwritten or corrupted He 75 Recovering a fold r A 75 Backup and shadow copies irc aint asa 76 Shadow Copy Transpor EE 76
134. nge the cluster size on a volume that contains data back up the data on the volume reformat it using the new cluster size and then restore the data Mounted drives A mounted drive is a local volume attached to an empty folder called a mount point on an NTFS volume When enabling shadow copies on a volume that contains mounted drives the mounted drives are not included when shadow copies are taken In addition if a mounted drive is shared and shadow copies are enabled on it users cannot access the shadow copies if they traverse from the host volume where the mount point is stored to the mounted drive For example assume there is a folder F data users and the Users folder is a mount point for G If shadow copies are enabled on both F and G F data is shared as serverl data and G data users is shared as serverl users In this example users can access previous versions of serverl data and serverl users but not serverl data users Managing shadow copies The vssadmin tool provides a command line capability to create list resize and delete volume shadow copies The system administrator can make shadow copies available to end users through a feature called Shadow Copies for Shared Folders The administrator uses the Properties menu see Figure 28 to turn on the Shadow Copies feature select the volumes to be copied and determine the frequency with which shadow copies are made aixi Seed Tode
135. nononnnnnnns 68 31 Accessing shadow copies from My Computer c ccceeeceeeeeeeceeeneeeeeeseeeeeeeeeeneeeees 72 X3000 G2 Network Storage System User Guide 9 BP Een teren ere ee Ee dee ENEE 73 33 Recovering a deleted file or folder ooooooonooccnnnocconococcccononoconononnonnnronononorannoncnnos 75 34 Properties dialog box ECU e 78 35 Advanced Security settings dialog box Permissions job 79 36 User or group Permission Entry dialog box annanne eren onnenneereereneeeeeneennnenn 80 37 Advanced Security Settings dialog box Auditing job 81 38 Select User or Group dialog Dri 81 39 Auditing Entry dialog box for folder name NTFS Test onsen oensennne sereen eenenenenn 82 40 Advanced Security Settings dialog box Owner job 83 41 Storage system A eee 90 42 Cluster concepts diagram A ads 92 Tables 1 Storage system RAID confunda 20 2 HP X3400 G2 front panel LED descriptions mmm nente 22 3 HP X3400 G2 rear panel LED descriptions ett EENEG 23 4 HP X3800 G2 front panel LED and button descriptions nnen enen erneer ennen 25 5 HP X3800 G2 rear panel LED and button descriptions nnen eener nennen enen 26 6 HP X3800sb G2 front panel LED descriptions susi dedos 28 7 SAS and SATA hard drive LED combin lons amen dieten 29 8 Systems Insight Display LED descriptions nnee oonnenennneerenseneen oneven veneeeensensensen 30 9 Systems Insight Display LEDs and internal health LED combinations nanne 31
136. nt ia hen eege 125 Ms AP 125 aser compliance EE A la 126 English laser onee locations 126 NW pai iia 126 French laser notice aan 127 German laser NOCE ageet 127 lalian laser notice EE 127 ET 128 Spanish laser notice dee See eege 128 GE 128 English recycling neee snee eneen entente 128 EE TER 129 A ergeet ee 129 Danish recycling notice ib 129 fleece 129 RE 130 el 130 SEENEN 130 Germon recycling notice eege anda 130 X3000 G2 Network Storage System User Guide 7 ee o AA E 131 Hungarian recreado da 131 altan recycling He nana canada 131 A eer E trey Ener Miter E E ren 131 Lithuanian recycling ONCE stsis0cihintzaanecieetanynietonsnloravardicsi nessa laaveesandlaeentebainveseeteneyeenamnesapahees 132 A e n e a E a E E E E A E 132 Portuguese recycling notice nidad 132 Romanian recycling notice a 132 Slovak recycling notice dan ne ee ne en re ee aa 133 Spanish recycling a e er OE PEO O A 138 Swedish recycling notice caia rara 133 Battery ee 134 Dolce battery TE 134 French battery EE 135 German batery NOCE condition 135 lalian ee 136 Japanese battery notice veintidos 136 Spanish batery EE 137 A ee 139 Figures 1 HP X3400 G2 front panel components nina 21 2 HP X3400 G2 front panel LEDs ooo 22 3 HP X3400 G2 rear panel components mi cd 22 4 HP X3400 G2 rear panel LEDs EE 23 5 HP X3800 G2 front panel components arranca inde aci 24 6 HP X3800 G2 front panel LEDs and Bultons candado 25 7 HP X3800 G2 rear panel components tee EE
137. ntroller subsystem but cannot span multiple storage controller subsystems Al A2 JN y A d y pues L3 gt LI fe L4 gl0045 Figure 27 Two arrays A1 A2 and five logical drives L1 through L5 spread over five physical drives EY NOTE This type of configuration may not apply to all storage systems and serves only as an example Through the use of basic disks you can create primary partitions or extended partitions Partitions can only encompass one LUN Through the use of dynamic disks you can create volumes that span multiple LUNs You can use the Windows Disk Management utility to convert disks to dynamic and back to basic and to manage the volumes residing on dynamic disks Other options include the ability to delete extend mirror and repair these elements Partitions Partitions exist as either primary partitions or extended partitions The master boot record MBR disk partitioning style supports volumes up to 2 terabytes in size and up to 4 primary partitions per disk or three primary partitions one extended partition and unlimited logical drives Extended partitions allow the user to create multiple logical drives These partitions or logical disks can be assigned drive letters or be used as mount points on existing disks If mount points are used it should be noted that Services for UNIX SFU does not support mount points at this time The use of mount points in conjunction with NFS shares is not s
138. o create new shadow copies or delete shadow copies from this page X3000 G2 Network Storage System User Guide 69 Set schedules Shadow copy schedules control how frequently shadow copies of a volume are made There are a number of factors that can help determine the most effective shadow copy schedule for an organization These include the work habits and locations of the users For example if users do not all live in the same time zone or they work on different schedules it is possible to adjust the daily shadow copy schedule to allow for these differences Do not schedule shadow copies more frequently than once per hour EY NOTE When deleting a shadow copy schedule that action has no effect on existing shadow copies Viewing shadow copy properties The Shadow Copy Properties page lists the number of copies the date and time the most recent shadow copy was made and the maximum size setting EY NOTE For volumes where shadow copies do not exist currently it is possible to change the location of the cache file Managing the cache files on a separate disk is recommended A CAUTION Use caution when reducing the size limit for all shadow copies When the size is set to less than the total size currently used for all shadow copies enough shadow copies are deleted to reduce the total size to the new limit A shadow copy cannot be recovered after it has been deleted Redirecting shadow copies to an alternate
139. o the files and the SIS volume and the SIS Common Store folder must be selected To enable Single Instance Storage on a volume In Server Manager select Roles gt File Services gt Share and Storage Management Select the Volumes tab Right click a volume and select Properties Select the Advanced tab Select the Enable SIS on this volume check box Click OK Se A NS For more information see the Windows Storage Server 2008 R2 Help Print Management Print Management is an MMC snap in that you can use to view and manage printers and print servers in your organization You can use Print Management from any computer running Windows Storage Server 2008 R2 and you can manage all network printers on print servers running Windows 2000 Server Windows Server 2003 Windows Storage Server 2003 Windows Storage Server 2003 R2 Windows Storage Server 2008 or Windows Storage Server 2008 R2 Print Management provides details such as the queue status printer name driver name and server name You can also set custom views by using the Print Management filtering capability For example you can create a view that displays only printers in a particular error state You can also configure Print Management to send e mail notifications or run scripts when a printer or print server needs attention The filtering capability also allows you to bulk edit print jobs such as canceling all print jobs at once You can also delete multiple printers at the s
140. odria contener una bater a No intente recargar las bater as si las extrae Evite el contacto de las bater as con agua y no las exponga a temperaturas superiores a los 60 C 140 F No utilice incorrectamente ni desmonte aplaste o pinche las bater as No cortocircuite los contactos externos ni la arroje al fuego o al agua Sustituya las bater as s lo por el repuesto designado por HP Las bater as los paquetes de bater as y los acumuladores no se deben eliminar junto con los desperdicios generales de la casa Con el fin de tirarlos al contenedor de reciclaje adecuado utilice los sistemas p blicos de recogida o devu lvalas a HP un distribuidor autorizado de HP o sus agentes Para obtener m s informaci n sobre la sustituci n de la bater a o su eliminaci n correcta consulte con su distribuidor o servicio t cnico autorizado X3000 G2 Network Storage System User Guide 137 138 Regulatory compliance notices Glossary The following glossary terms and definitions are provided as a reference for storage products ACL ADS array backups CIFS CLI cluster CSR data protection DHCP DNS fault tolerance FTP HBA iSCSI Access control list Active Directory Service A synonym of storage array storage system and virtual array A group of disks in one or more disk enclosures combined with controller software that presents disk storage capacity as one or more virtual disks A
141. of Authenticity COA 14 CIFS share support 85 cluster adding new storage 103 analysis 99 concepts 92 concepts diagram 92 diagram 90 dual data paths 96 geographically dispersed 100 group 100 groups node based 101 installation 97 installation checklist 96 load balancing 101 managing access rights 102 managing file share permissions 102 network requirements 96 nodes powering down 107 powering up 108 restarting 107 overview 89 preparing for installation 95 printer spooler 105 protocols non cluster aware 103 resources 100 resources defined 90 setting up user account 98 clustered server elements 55 Command View EVA expanding storage 63 configuration server 7 configuring private network adapter 97 shared disks 99 connectivity verifying 98 contacting HP 117 conventions document 117 text symbols 118 customer self repair 118 D data blocks 51 data striping 51 X3000 G2 Network Storage System User Guide 141 Declaration of Conformity 122 default storage settings 19 disk access verifying 99 Disk Management extending volumes 63 Disposal of waste equipment European Union 128 document conventions 117 domain membership verifying 98 dual data paths 96 dynamic disks clustering 54 dynamic disks spanning multiple LUNs 53 E End User license Aggreement EULA 14 European Union notice 123 expanding storage Array Configuration Utility 63 Command View E
142. ork and the other for the node to node private cluster network If only one network adapter is used for both connections the configuration is unsupported A separate private network adapter is required for HCL certification Shared disk requirements EY NOTE Do not allow more than one node access the shared storage devices at the same time until Cluster service is installed on at least one node and that node is online This can be accomplished through selective storage presentation SAN zoning or having only one node online at all times All shared disks including the Quorum disk must be accessible from all nodes When testing connectivity between the nodes and the LUN only one node should be given access to the LUN ata time All shared disks must be configured as basic not dynamic 96 Cluster administration e All partitions on the disks must be formatted as NTFS Cluster installation During the installation process nodes are shut down and rebooted These steps guarantee that the data on disks that are attached to the shared storage bus is not lost or corrupted This can happen when multiple nodes try to simultaneously write to the same disk that is not yet protected by the cluster software Use Table 13 to determine which nodes and storage devices should be presented during each step Table 13 Power sequencing for cluster installation Step Additional Nodes Storage Comments Setting up net wo
143. owering down the cluster nodes follow the proper shutdown procedure as previously illustrated See Shutting down one cluster node Only one cluster node should be shut down at a time X3000 G2 Network Storage System User Guide 107 Powering up the cluster The power up process for the storage system cluster is more complex than it is for a single node because extra care must be taken with the storage subsystem The sequence of the power up steps is critical Improper power up procedures can cause corruption and loss of data A CAUTION Do not power up the cluster nodes without first powering up the storage subsystem and verifying it is operating normally Nodes should be powered up separately allowing one node to form the cluster prior to powering up the additional node s To power up the cluster nodes 1 After the storage subsystem is confirmed to be operating normally power up a single node Wait for the node to come completely up before powering up the subsequent node s If more than one node is powered up at the same time the first node that completes the sequence gains ownership of the cluster quorum and controls the cluster database Designate a particular node as the usual cluster quorum owner by always powering up that node first and letting it completely restart before powering up additional cluster node s 2 Power up the additional cluster node s Each node should be allowed to start fully prior to star
144. p for clustering for additional details Creating physical disk resources A physical disk resource must reside within a cluster group An existing cluster group can be used or a new cluster group must be created For information on creating disk resources see the cluster online help topic Physical Disk resource type EY NOTE e Physical disk resources usually do not have any dependencies set e In multi node clusters it is necessary to specify the node to move the group to When a cluster group is moved to another node all resources in that group are moved When a physical disk resource is owned by a node the disk appears as an unknown unreadable disk to all other cluster nodes This is a normal condition When the physical disk resource moves to another node the disk resource then becomes readable Creating file share resources To create a file share resource see two clustering online help topics Create a cluster managed file share Using a server cluster with large numbers of file shares Ef NOTE A file share resource must reside in the same cluster group as the physical disk resource it will reside on e The physical disk resource specified in this step must reside in the same cluster group as specified in the beginning of this wizard X3000 G2 Network Storage System User Guide 103 Creating NFS share resources To create an NFS share resource see MSNFS administration on a server cluster on page 1
145. pply onto This folder only DI Permissions Allow Deny Full Control Traverse Folder Execute File List Folder Read Data Read Attributes Read Extended Attributes Create Files Write Data Create Folders Append Data Write Attributes Write Extended Attributes Delete Subfolders and Files Delete Read Permissions led IBOOOOOO888AaO JOOOOOoOo0o0o0o000 CL we zm sm eee te ted r Apply the s to objects and or Clear All containers within this container only Figure 36 User or group Permission Entry dialog box Another area of the Advanced Security Settings is the Auditing tab Auditing allows you to set rules for the auditing of access or attempted access to files or folders Users or groups can be added deleted viewed or modified through the Advanced Security Settings Auditing tab 80 File server management Advanced Security Settings for Drive E E Figure 37 Advanced Security Settings dialog box Auditing tab 5 Click Add to display the Select User or Group dialog box Select User or Group Ce AE A Kee A Figure 38 Select User or Group dialog box EY NOTE Click Advanced to search for users or groups 6 Select the user or group X3000 G2 Network Storage System User Guide 81 7 Click OK The Auditing Entry dialog box is displayed Auditing Entry for NTSF Test This folder subfolders and files Traverse Folder Execute File List Folder d Read Data Re
146. provides illustrations of the storage system hardware components EY NOTE The keyboard mouse and monitor are used only for the direct attached method of accessing the server They are not provided with your storage system HP X3400 G2 Network Storage Gateway hardware componenis The following figures show components and LEDs located on the front and rear panels of the X3400 G2 Network Storage Gateway Figure 1 HP X3400 G2 front panel components DVD RW drive Serial label pull tab Two 2 USB ports Four 4 3 5 hotplug SAS SATA hard drive bays SNS EY NOTE See SAS and SATA hard drive LED combinations on page 29 for HDD LED status descriptions X3000 G2 Network Storage System User Guide 21 m m Figure 2 HP X3400 G2 front panel LEDs Table 2 HP X3400 G2 front panel LED descriptions ltem Description Status Green System health is normal Amber System health is degraded EED Red System health is critical Off System health is normal when in standby mode Green Network link exists 2 NIC 1 link activity LED e 3 NIC 2 link activity LED Flashing green Network link and activity exist Off No network link exists Green Drive activity is normal ENEE LED Off No drive activity exists Green Normal system on 5 Power On Standby button and system LED Amber System is in standby but power is still applied power Off Power cord i
147. ps and their resources on the cluster between the nodes 100 Cluster administration Node based cluster groups Creating only one resource group and one virtual server for each node facilitates group and resource administration This setup allows administrators to include all file share resources under one group Clients access all of the resources owned by one node through a virtual server name In node based cluster groups each group has its own network name and IP address The administrator decides on which node to place each physical disk resource This configuration provides a very coarse level of granularity All resources within a group must remain on the same node Only two IP addresses and network names are required This configuration creates less overhead for resource and network administration A possible disadvantage of this approach is that the resource groups can potentially grow large when many file shares are created Load balancing The creation of separate cluster groups for each virtual server provides more flexibility in balancing the processing load on the cluster between the two nodes Each cluster group can be assigned to a cluster node with the preferred owner parameter For example if there are two cluster groups the cluster could be set up to have the first cluster group owned by Node A and the second cluster group owned by Node B This allows the network load to be handled by both devices simultaneously If only one c
148. pts Phase 1 scripts are used to install and prepare your system for NFS account mapping Phase 2 scripts are used to configure specific users and groups for NFS account mapping For more detailed information about the Phase 1 and Phase 2 scripts see the Microsoft Knowledge Base article Description of scripts to use to simplify user account mapping between a UNIX client and a Windows based server at http support microsoft com kb 973840 Microsoft hotfix 2222746 Phase 1 HP supports Microsoft hotfix 2222746 This hotfix applies to Windows Storage Server 2008 R2 as well as the products listed in the KB article The hotfix addresses the following problem File permissions are incorrectly set when you share a folder on a Windows Server 2008 based or Windows Storage Server 2008 based NFS server For full details of this hotfix see http support microsoft com kb 2222746 The incorrect behavior that the hotfix addresses occurs when using AD LDS mapped user access HP has installed this hotfix on the storage system but has not enabled it by default You can enable it by setting the following registry key HKEY_LOCAL MACHINE SYSTEM CurreniControlSef services NfsServer NlmNsm AutoCorrectPrimaryGroup Type REG _ DWORD Value Ox After enabling the hotfix by setting the registry subkey you must restart the storage system in order for the hotfix to take effect scripts Phase 1 scripts are located in the c hpnas components post instal le
149. py Service 64 volumes planning 53 vssadmin tool 67 W warning rack stability 118 WEBES Web Based Enterprise Services 109 websites customer self repair 118 Windows activation 16
150. r NfsTest dialog box check the Allow check box for Full control under Permissions for Everyone WR Permissions for NfsTest E Security Object name _C UNfsTest Group or user names SR CREATOR OWNER SR SYSTEM a Administrators WIN 5TIBBHAJOAS Administrators D Everyone a Users WIN STI68H4J0454 Users Add Remove Permissions for Everyone Allow Deny Full control Modify Read amp execute List folder contents Read KEES Lear about access control and permissions Cancel Apply Figure 19 Permissions for NfsTest dialog box Click OK to dismiss the Permissions for NfsTest dialog box and then click OK to dismiss the NfsTest Properties dialog box On the UNIX system as root mount the NFS share A typical command is as follows where 10 30 15 20 is the IP address of the Windows system gt mkdir mnt nfstest gt mount t nfs 10 30 15 20 NfsTest mnt nfstest As root create a file in the mounted directory gt touch mnt nfstest rootfile On the Windows system open Windows Explorer to C NfsTest Properties for rooffile are displayed To display the owner of rooffile add the Owner column right click the column header select More 44 Administration tools Step 8 Step 9 check the Owner check box and then click OK Note that root is part of the owner name This verifies that NFS mapping is functional for the root user Name Date modified Type Size Owner __jrootfile 9 10 2010 2 50 P
151. r adlds folder You enable AD LDS NFS mapping by running factory setup adlds cmd The command is run without any arguments The script installs two Roles and one Instance e Active Directory Lightweight Directory Services AD LDS Role An AD LDS Instance named NFSinstance Services for Network File System NFS under the File Services Role To verify the installation of the AD LDS Role and Instance in Administrative Tools select Server Manager If the AD LDS Role was successfully installed you will see Active Directory Lightweight Directory Services listed under Roles Click on it and you will see NFSInstance listed under SystemServices if that instance was successfully installed 36 Administration tools E Server Manager File Action View Help es H ER Server Manager WIN L KH172BAVA Services and Support E 5 Roles Active Directory Lightweight Directory Services ke Provides a store for application specific directory data Summary E Active Directory Lightweight Directory Services 3 File Services E Share and Storage Management 4 lt 3 DFS Management E Ze Print and Document Services E V Web Server IIS aj Features E a Diagnostics E E Configuration E 3 Storage 2 i Events 4 informational in the last 24 hours 7 Number of events 4 Event ID Date and Time Source Information 9 21 2010 3 11
152. re ensure that you have the following e Windows based PC loaded with Internet Explorer 5 5 or later on the same local network as the storage system DHCP enabled network Server name or IP address of the storage system To connect the server to a network using the remote browser method ensure that the client is configured to download signed ActiveX controls To connect the storage system to a network using the remote browser method 1 On the remote client machine open Internet Explorer and enter https and the server name of the storage system followed by a hyphen and then 3202 For example https labserver 3202 Press Enter EY NOTE If you are able to determine the IP address from your DHCP server you can substitute the IP address for the server name For example 192 100 0 1 3202 2 Click OK on the Security Alert prompt 3 Log on to the storage system with the administrator user name and password IMPORTANT If you are using the remote browser method to access the storage system always close the remote session before closing your Internet browser Closing the Internet browser does not close the remote session Failure to close your remote session impacts the limited number of remote sessions allowed on the storage system at any given time Using the Remote Desktop method Remote Desktop provides the ability for you to log onto and remotely administer your server giving you a method of
153. re information The system reserved partition contains the operating system boot loader and allows you to enable BitLocker Drive Encryption for the Operating System volume Table 1 Storage system RAID configurations Server model Logical Disk 1 HP StorageWorks X3400 G2 Network Storage Gateway HP StorageWorks X3800 G2 Network Storage Gateway HP StorageWorks X3800sb G2 Network Storage Gateway Blade Operating System Volume e RAID 1 0 e Physical Drives 0 1 EY NOTE In the HP Array Configuration Utility ACU logical disks are labeled 1 and 2 In Microsoft Disk Manager logical disks are displayed as O and 1 For HP Smart Array configuration information see http h18004 www1 hp com products servers proliantstorage arraycontrollers If the operating system has a failure that might result from corrupt system files a corrupt registry or the system hangs during boot see System recovery on page 113 Default boot sequence The BIOS supports the following default boot sequence 1 DVD ROM 2 Bootable USB flash drive 3 HDD 4 PXE network boot Under normal circumstances the storage systems boot up from the OS logical drive e If the system experiences a drive failure the drive displays an amber disk failure LED Ifa single drive failure occurs it is transparent to the operating system 20 Installing and configuring the storage system 2 Storage system component identification This chapter
154. re new accounts on the domain however remote systems will store new accounts locally unless they are granted permissions to create accounts on the domain Using Ethernet NIC teaming optional All models are equipped with an HP or Broadcom NIC Teaming utility The utility allows administrators to configure and monitor Ethernet network interface controller NIC teams in a Windows based operating system These teams provide options for increasing fault tolerance and throughput Adjusting logging for system application and security events e Installing third party software applications For example these might include an antivirus applic ation that you install e Registering the server To register the server refer to the HP Registration website http re gister hp com X3000 G2 Network Storage System User Guide 17 Additional access methods After the storage system installation process is complete and the system s IP address has been assigned you can then additionally use the remote browser Remote Desktop and Telnet methods to access the storage system Using the remote browser method The storage system ships with DHCP enabled on the network port If the server is placed on a DHCP enabled network and the IP address or server name is known the server can be accessed through a client running Internet Explorer 5 5 or later on that network using the TCP IP 3202 port IMPORTANT Before you begin this procedu
155. read only copy of data copied to media such as hard drives or magnetic tape for data protection A full backup copies all the data selected to be backed up An incremental backup copies only data selected to be backed up that has changed since the last full backup Backups provide data protection in the event of system or hard drive failure because the data is stored on media separate from the system hard drives Common Internet File System The protocol used in Windows environments for shared folders Command line interface An interface comprised of various commands which are used to control operating system responses A group of logically integrated servers that enables high availability increases capacity or distributes processing Customer self repair A method of protecting data from being corrupted or lost as a result of hard drive failure Methods used to provide data protection include RAID and backups Dynamic host configuration protocol Domain name system The capacity to cope with internal hardware problems without interrupting the system s data availability often by using backup systems brought online when a failure is detected Many systems provide fault tolerance by using RAID architecture to give protection against loss of data when a single disk drive fails Using RAID 1 3 5 6 10 or 50 techniques the RAID controller can reconstruct data from a failed disk drive and write it to a spare or replacement disk
156. red the server is experiencing a health event Combinations of illuminated system LEDs and the internal health LED indicate system status Table 9 Systems Insight Display LEDs and internal health LED combinations Systems Insight Internal health LED Status Display LED and color color One or more of the following conditions may exist e Processor in socket X has failed Red Processor X is not installed in the socket Processor failure socket X amber e Processor X is unsupported e ROM detects a failed processor during POST Amber Processor in socket X is in a pre failure condition One or more of the following conditions may exist PPM failure slot X e PPM in slot X has failed Red a amber e PPM is not installed in slot X but the corresponding pro cessor is installed DIMM failure slot X Red DIMM in slot X has failed amban Amber DIMM in slot X is in a pre failure condition DIMM failure all One or more DIMMs has failed Test each bank of DIMMs by slots in one bank Red removing all other DIMMs Isolate the failed DIMM by replacing amber each DIMM in a bank with a known working DIMM DIMM failure all One or more DIMMs has failed Test each bank of DIMMs by slots in all banks Red removing all other DIMMs Isolate the failed DIMM by replacing amber each DIMM in a bank with a known working DIMM OMS spare Amber Bank X failed over to the online spare memory bank memory amber
157. reement HP Insight Remote Support supplements your monitoring 24x7 to ensure maximum system availability by providing intelligent event diagnosis and automatic secure submission of hardware event notifications to HP which will initiate a fast and accurate resolution based on your product s service level Notifications may be sent to your authorized HP Channel Partner for on site service if configured and available in your country The software is available in two variants HP Insight Remote Support Standard This software supports server and storage devices and is optimized for environments with 1 50 servers Ideal for customers who can benefit from proactive notification but do not need proactive service delivery and integration with a management platform e HP Insight Remote Support Advanced This software provides comprehensive remote monitoring and proactive service support for nearly all HP servers storage network and SAN environments plus selected non HP servers that have a support obligation with HP It is integrated with HP Systems Insight Manager A dedicated server is recommended to host both HP Systems Insight Manager and HP Insight Remote Support Advanced Details for both versions are available at http www hp com go insightremotesupport To download the software go to Software Depot http www software hp com Select Insight Remote Support from the menu on the right X3000 G2 Network Storage System User Guide 119
158. remote management method to connect to the storage system 14 Installing and configuring the storage system IMPORTANT Only the direct attach and remote management access methods can be used to install the storage system After the storage system installation process is complete and the system s IP address has been assigned you can then additionally use the remote browser and remote desktop methods to access the storage system e Direct attach Connect the following cables to the back panel of the storage system in the follow ing sequence keyboard mouse network cable monitor cable and power cable For blade products connect the cables to the server blade by using an HP c Class Blade SUV cable This access method is mandatory if your network does not have a Dynamic Host Configuration Protocol DHCP server EY NOTE The keyboard mouse and monitor are not provided with the storage system HP c Class Blade SUV cable require USB compatible devices Remote management Access the storage system using the Integrated Lights Out remote manage ment method 1 Ensure that a network cable is connected to the iLO port located on the back of the storage system 2 Locate the iLO Network Settings tag attached to the storage system and record the default user name password and DNS name 3 From a remote computer open a standard Web browser and enter the iLO management hostname of the storage system EY NOTE
159. ress Node B s name and IP address e At least one virtual server name and IP address for virtual server A e Cluster Interconnect static IP addresses for Node A and Node B In multi node deployments additional network addresses are required For each additional node three static IP addresses are required Virtual names and addresses are the only identification used by clients on the network Because the names and addresses are virtual their ownership can transition from one node to the other during a failover preserving access to the resources in the cluster group A cluster uses at least two network connections on each node 94 Cluster administration e The private cluster interconnect or heartbeat crossover cable connects to one of the network ports on each cluster node In more than two node deployments a private VLAN on a switch or hub is required for the cluster interconnect The public client network subnet connects to the remaining network ports on each cluster node The cluster node names and virtual server names have IP addresses residing on these subnets EY NOTE If the share is to remain available during a failover each cluster node must be connected to the same network subnet It is impossible for a cluster node to serve the data to a network to which it is not connected Protocol planning Not all file sharing protocols can take advantage of clustering If a protocol does not support clustering it w
160. rks On Not Presented Verify that all storage devices on the shared bus are not presented Power on all nodes Setting up shared disks in cluding the Qur om disk Presented Shut down all nodes Present the shared storage then power on the first node Verifying disk configuration Presented Shut down first node power on next node Repeat this process for all cluster nodes Configuring the first node Presented Shut down all nodes power on the first node Configuring addi tional nodes Presented Power on the next node after the first node is successfully configured Com plete this process for all cluster nodes Post installation Presented At this point all cluster nodes should be on To configure the Cluster service on the storage system an account must have administrative permissions on each node Setting up networks Verify that all network connections are correct with private network adapters connected to other private network adapters only and public network adapters connected to the public network Configuring the private network adapter The following procedures are best practices provided by Microsoft and should be configured on the private network adapter On the General tab of the private network adapter ensure that only TCP IP is selected Ensure that the Register this connection s address in DNS is not selected in the DNS tab under advanced
161. rotection against data loss can be achieved by assigning an online spare or hot spare to any configuration except RAID O This hard drive contains no data and is contained within the same storage subsystem as the other drives in the array When a hard drive in the array fails the controller can then automatically rebuild information that was originally on the failed drive onto the online spare This quickly restores the system to full RAID level fault tolerance protection However unless RAID Advanced Data Guarding ADG is being used which can support two drive failures in an array in the unlikely event that a third drive in the array should fail while data is being rewritten to the spare the logical drive still fails Logical storage elements Logical storage elements consist of those components that translate the physical storage elements to file system elements The storage system uses the Window Disk Management utility to manage the various types of disks presented to the file system There are two types of LUN presentation basic disk and dynamic disk Each of these types of disk has special features that enable different types of management Logical drives LUNs While an array is a physical grouping of hard drives a logical drive consists of components that translate physical storage elements into file system elements 52 Storage management overview It is important to note that a LUN may span all physical drives within a storage co
162. rt and then click Next Enter the IP address of the network printer Update the Port Name if desired click Next and then click Finish Select the appropriate driver and then click Next mpanoge If presented with a dialog to replace the driver present click keep the driver and then click Next h Name the printer and then click Next i Provide a share name for the printer for network access and then click Next j Provide location information and comments and then click Next k Click Yes to print a test page click Next and then click Finish A dialog box appears regarding the test page Select the appropriate answer The Printer Spool is now a clustered resource Advanced cluster administration procedures Failing over and failing back As previously mentioned when a node goes offline all resources dependent on that node are automatically failed over to another node Processing continues but in a reduced manner because all operations must be processed on the remaining node s In clusters containing more than two nodes additional fail over rules can be applied For instance groups can be configured to fail over different nodes to balance the additional work load imposed by the failed node Nodes can be excluded from the possible owners list to prevent a resource from coming online on a particular node Lastly the preferred owners list can be ordered to provide an ordered list of failover nodes Using these tools t
163. ry usus unnsarennnnensnnversenerensnnerensnerrenseerrennen 115 Managing disks EE 116 9 Support and other resources cccccccononooonccccnccnncnnnnnonononononanineninnninons 117 Contacting el 117 Typographic Serven ans zonden bereisde EE 117 Rack ref 118 C stom r Sel RDE vonniste nnen erosie 118 HP Insight Remote Support software nnsssusnnnnessnneee snoer ennnersennverensnvereenneerenneerennneennnnevensnn 119 A Regulatory compliance NOTICES wennen dette Ka Regulatory compliance identification numbers esmee nad dine opeten aandere 121 Federal Communications Commission notice cccssesseeeeeeeeenneeeeeeesneeeeeeeeeseeeeeesesnneeeeeensnnaaeees 121 FCC WEE 121 Class A equipment cn ario tdi 121 Class B equipment EE 122 Declaration of Conformity for products marked with the FCC logo United States only 122 Moi id 122 EEN 122 Canadian notice Avis Canadien ccocccccccnnnnnnnnnnonononononononnnronnrnonnnnonnnnonnnnonnnnnnnnononononnnnnannnnnns 122 e IN 122 Class B equipment EE 123 European Union notice ccccsseesseeeseeeeeeeeeeceeeeceeeecccecceeeeeecececeneaecaaaeasaeeeaeeeseeeeeeseeeeeeeeeeeeeeess 123 JAPANESE notices ia 123 Japanese ee 123 Japanese VECEB Notice vii 123 Japanese VCCI marking EEN 123 Japanese RE 124 A OO 124 Class A equipment samen a ave hate aire iteiten T T 124 Class B equipment E 124 Taiwanese MO dd 124 BSMI Class A notice ana 124 Taiwan battery recycle stateme
164. s These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmtul interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures e Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit that is different from that to which the receiver is connected Consult the dealer or an experienced radio or television technician for help Declaration of Conformity for products marked with the FCC logo United States only This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 this device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation For questions regarding this FCC declaration contact us by mail or telephone Hewlett Packard Company P O Box 692000 Mail Stop 510101 Houston
165. s are those that may reasonably be expected to be installed in a residential environment for example personal computers The FCC requires devices in both classes to bear a label indicating the interference potential of the device as well as additional operating instructions for the user FCC rating label The FCC rating label on the device shows the classification A or B of the equipment Class B devices have an FCC logo or ID on the label Class A devices do not have an FCC logo or ID on the label After you determine the class of the device refer to the corresponding statement Class A equipment This equipment has been tested and found to comply with the limits for a Class A digital device pursuant to Part 15 of the FCC rules These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications Operation X3000 G2 Network Storage System User Guide 121 of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at personal expense Class B equipment This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rule
166. s locate the storage system s serial number Certificate of Authenticity COA and End User License Agreement EULA Record the serial number and COA product key and make a print copy of the EULA as needed The storage system s serial number is located in several places Top of the storage system or blade Back of the storage system e Inside the storage system shipping box Outside of the storage system shipping box The storage system s Certificate of Authenticity COA card is located inside the storage system shipping box There is also a COA sticker with product key affixed to the top of the storage system or blade The storage system s printed End User License Agreement EULA is located in the media kit that is shipped with the storage system There is also an electronic copy of the EULA installed with the storage system at SystemDrive Windows System32 license rtf Install the storage system hardware If your storage system is fully racked and cabled move ahead to Connect to the storage system For X3400 and X3800 G2 storage systems install the rail kit and insert and secure the storage system into the rack by following the HP Rack Rail Kit Installation Instructions ForX3800sb G2 G2 storage systems install the server blade by following the procedures documented in the provided HP StorageWorks X3800sb G2 Network Storage Gateway Blade Quick Start Guide Connect to the storage system Use either the direct connect or
167. s in Windows Storage Server 2008 R2 Storage Manager for SANs The Storage Manager for SANs also called Simple SAN snap in enables you to create and manage the LUNs that are used to allocate space on storage arrays Storage Manager for SANs can be used on SANs that support Virtual Disk Server VDS It can be used in both Fibre Channel and iSCSI environments For more information on Storage Manager for SANs see the online help Single Instance Storage Single Instance Storage SIS provides a copy on write link between multiple files Disk space is recovered by reducing the amount of redundant data stored on a server If a user has two files sharing disk storage by using SIS and someone modifies one of the files users of the other files do not see the changes The underlying shared disk storage that backs SIS links is maintained by the system and is only deleted if all the SIS links pointing to it are deleted SIS automatically determines that two or more files have the same content and links them together File Server Resource Manager File Server Resource Manager is a suite of tools that allows administrators to understand control and manage the quantity and type of data stored on their servers By using File Server Resource Manager administrators can place quotas on volumes actively screen files and folders and generate comprehensive storage reports By using File Server Resource Manager you can perform the following tasks Cr
168. s not attached or the power supply has failed Blue Identification is activated 6 UID button LED Flashing blue System is being managed remotely Off Identification is deactivated Figure 3 HP X3400 G2 rear panel components 22 Storage system component identification 1 Power cord connector 2 Mouse connector 3 10 100 1000 NIC 1 connector shared iLO 2 management port 4 10 100 1000 NIC 2 connector 5 Serial connector 6 Low profile PCle slot cover x16 slot open 7 Fulksized PCle slot occupied by Smart Array P212 controller 8 Dedicated iLO 2 management port this port is optional and must be purchased separately 9 Video connector 10 USB connectors 2 11 Keyboard connector Figure 4 HP X3400 G2 rear panel LEDs Table 3 HP X3400 G2 rear panel LED descriptions ltem Description Status Blue Activated 1 UID button LED Flashing System is being managed remotely Off Deactivated Green or flashing green Activity exists a Nee No Off No activity exists Green Link exists Off No link exists 3 NIC iLO 2 activity HP X3800 G2 Network Storage Gateway hardware componenis The following figures show components and LEDs located on the front and rear panels of the X3800 G2 Network Storage Gateway X3000 G2 Network Storage System User Guide 23 Figure 5 HP X3800 G2 front panel componen
169. s strong passwords If you specify a password that does not meet the requirements the script will not inform you It will create the Windows account with a blank password and establish the NFS mapping Until you change the password to a non blank value NFS mapping is disabled for that Windows account Any attempts in UNIX to use that mapped user will result in Permissions Denied or Input Output errors EY NOTE If users are created with a blank password because the userpassword option was not given or the specified password does not meet the password strength requirements of the system those users can log into the system console without the security that a strong password provides Verifying script execution The following steps describe how to verify that the proper Windows accounts were created and the NFS mappings were made when the nfs adlds config js script is run If there are problems examine the log file specified by using the 1og option After the script is successtully executed the users in the password file exist as Windows Users and the groups from the group file exist as Windows Groups You can verify this with Server Manager 1 Click Start right click Computer and then select Manage 2 Expand the Configuration and Local Users and Groups nodes The imported users and groups are listed in the Users and Groups folders respectively X3000 G2 Network Storage System User Guide 39 The newly created NFS mappings ar
170. s to the share s shadow copies The Shadow Copies for Shared Folders client pack installs a Previous Versions tab in the Properties window of files and folders on network shares Users access shadow copies with Windows Explorer by selecting View Copy or Restore from the Previous Versions tab See Figure 32 Both individual files and folders can be restored test txt Properties 2 x General Security Previous Versions Summary To view a previous version of a file select the version from the following list and then click View You can also save a file to a different location or restore a previous version of a file File versions View Copy Restore Cancel Apply Help Figure 32 Client GUI When users view a network folder hosted on the storage system for which shadow copies are enabled old versions prior to the snapshot of a file or directory are available Viewing the properties of the file or folder presents users with the folder or file history a list of read only point in time copies of the file or folder contents that users can then open and explore like any other file or folder Users can view files in the folder history copy files from the folder history and so on X3000 G2 Network Storage System User Guide 73 NFS shadow copies UNIX users can independently access previous versions of files stored on NFS shares via the NFS client no additional software is required Server for NFS exposes
171. settings for Internet Protocol TCP IP Properties e In all cases set static IP addresses for the private network connector X3000 G2 Network Storage System User Guide 97 Configuring the public network adapter While the public network adapter s IP address can be automatically obtained if a DHCP server is available this is not recommended for cluster nodes HP strongly recommends setting static IP addresses for all network adapters in the cluster both private and public If IP addresses are obtained though DHCP access to cluster nodes could become unavailable if the DHCP server goes down If DHCP must be used for the public network adapter use long lease periods to assure that the dynamically assigned lease address remains valid even if the DHCP service is temporarily lost Keep in mind that Cluster service recognizes only one network interface per subnet Renaming the local area connection icons HP recommends changing the names of the network connections for clarity The naming helps identify a network and correctly assign its role For example Cluster interconnect for the private network and Public connection for the public network Verifying connectivity and name resolution To verify name resolution ping each node from a client using the node s machine name instead of its IP address Verifying domain membership All nodes in the cluster must be members of the same domain and able to access a domain controller and
172. signed to the virtual server to ensure non disruptive service of the resources to the clients Failover and failback Failover of cluster groups and resources happens When a node hosting the group becomes inactive When all of the resources within the group are dependent on one resource and that resource fails e When an administrator forces a failover A resource and all of its dependencies must be located in the same group so that if a resource fails over all of its dependent resources fail over When a resource is failed over the cluster service performs certain procedures First all of the resources are taken offline in an order defined by the resource dependencies Secondly the cluster service attempts to transfer the group to the next node on the preferred owner s list If the transfer is successful the resources are brought online in accordance with the resource dependency structure The system failover policy defines how the cluster detects and responds to the failure of individual resources in the group After a failover occurs and the cluster is brought back to its original state failback can occur automatically based on the policy After a previously failed node comes online the cluster service can fail back the groups to the original host The failback policy must be set before the failover occurs so that failback works as intended Quorum disk Each cluster must have a shared disk called the Quorum disk The Quorum
173. st either use an external DVD drive to run the System Recovery DVD or create a USB Flash Drive that can then be used to complete the system recovery process For more information see Using a USB Flash Drive for System Recovery During the recovery process the DVD overwrites the original OS logical drives All data on these drives is erased Restore the factory image 1 Do one of the following a To use the direct connect access method connect a keyboard monitor mouse and DVD drive if needed directly to the server using a local I O cable b To use the remote management access method access the server using Integrated Lights Out 2 iLO 2 from a client PC 2 Do one of the following a Insert the System Recovery DVD in the DVD drive b Insert the System Recovery DVD in the client PC X3000 G2 Network Storage System User Guide 113 3 Oo nNou s Click Restore Factory Image The upgrade process completes with little user intervention required The server automatically reboots more than once IMPORTANT Do not interrupt the upgrade process When the upgrade process nears completion the Windows Storage Server 2008 R2 desktop displays the following message The user s password must be changed before logging on the first time Log on to the storage system by establishing an Administrator password Click OK Type an Administrator password in the New password box Re type the Administrator password in th
174. tates for the current location and then click Apply 4 On the Keyboards and Languages tab select English for the display language and then click OK You will then be prompted to log off Click Log off now 5 Log in as the local administrator and open the Region and Language program again 6 On the Administrative tab click Change system locale and select English United States as the current system locale You will be prompted to restart Windows Click Restart now 7 When Windows restarts log in as local administrator and open the Region and Language program again Repeat steps 2 through 6 but this time select the appropriate Chinese or Japanese setting Log off and restart Windows when prompted Issue The pie chart under Server Manager gt Storage Management may indicate a larger amount of disk space than actually exists This issue may occur if both of the following are true A hard quota is set and enabled on the root folder of one or more volumes e A volume with a hard quota on the root folder also has Single Instance Storage SIS enabled This is due to an interoperability issue between directory quotas and SIS Workaround Disable the hard quota on the root folder of the volume or change the hard quota to be a soft quota X3000 G2 Network Storage System User Guide 111 Issue Adding the hardware ID in MPIO properties results in losing access to MPIO LUNs In rare cases configuring MPIO when connected to an MS
175. ting a subsequent node 108 Cluster administration 7 Troubleshooting servicing and maintenance Troubleshooting the storage system The Support and troubleshooting task at the HP Support amp Drivers web site http www hp com o support can be used to troubleshoot problems with the storage system After entering the storage system name and designation for example ML110 G5 storage system or component information for example Array Configuration Utility use the following links for troubleshooting information Download drivers and software This area provides drivers and software for your operating system Troubleshoot a problem This area provides a listing of customer notices advisories and bulletins applicable for the product or component Manuals This area provides the latest user documentation applicable to the product or component User guides can be a useful source for troubleshooting information For most storage system hardware platforms the following ProLiant server manuals may be useful for troubleshooting as sistance e HP ProLiant Server User Guide or HP ProLiant Server Maintenance and Service Guide These guides contain specific troubleshooting information for the server e HP Proliant Servers Troubleshooting Guide The guide provides common procedures and solutions for many levels of troubleshooting with a ProLiant server The guide is available at Ge ee www2 hp com bc docs support SupportManua
176. ts 1 Quick release levers 2 2 Systems Insight Display EY NOTE See Systems Insight Display LEDs on page 30 and Systems Insight Display LED combinations on page 31 for LED status information 3 Eight 8 2 5 SFF SAS SATA hot plug hard drive bays EY NOTE See SAS and SATA hard drive LED combinations on page 29 for HDD LED status descriptions 4 DVD RW drive 5 Video connector 6 USB connectors 2 24 Storage system component identification RO OT GL gll Bor e zl ronn rowa re Y Figure 6 HP X3800 G2 front panel LEDs and buttons Table 4 HP X3800 G2 front panel LED and button descriptions ltem Description Status Blue Activated 1 UID LED and button Flashing blue System being remotely managed Off Deactivated Green Normal bag Amber System degraded Er Red System critical To identify components in degraded or critical state see 3 Power On Standby Green System on button and system power Amber System in standby but power is still applied LED Off Power cord not attached or power supply failure re aC x Boss oad Ces CC sB o hI e Ce Ip AAA laz CH ES ES mo BAC t Figure 7 HP X3800 G2 rear panel components 1 PCle slot 5 X3000 G2 Network Storage System User Guide 25 2 PCle slot 6 3 PCle slot 4 occupied by P812 Smart Array controller 4 PCle slot 2
177. ty auditing 80 file level permissions 77 ownership of files 82 serial number 14 server power on 15 Services for UNIX 53 55 Services for UNIX 53 55 setting up overview 13 setup completion 17 shadow copies in a cluster 104 uses 64 X3000 G2 Network Storage System User Guide 143 shadow copies 54 backups 76 cache file 68 defragmentation 66 described 64 disabling 7 file or folder recovery 74 managing 67 mounted drives 67 on NFS shares 74 on SMB shares 73 planning 64 redirecting 70 scheduling 70 viewing list 69 Shadow Copies for Shared Folders 72 Share and Storage Management 33 share management 83 shared disks configuring 99 shares administrative 85 managing 83 standard 85 Single Instance Storage 57 Single Instance Storage SIS 34 storage configurations 19 storage management elements 49 overview 49 process 50 Storage Manager for SANs 57 storage reports 86 storage system hardware components 23 27 storage adding to a cluster 103 symbols in text 118 system updates 110 7 Taiwanese notices 124 technical support HP 117 Telnet enabling 19 Telnet 19 text symbols 118 troubleshooting 109 typographic conventions 117 U user account setting up 98 users adding to permission list 78 144 Index V verifying connectivity 98 disk access 99 domain membership 98 name resolution 98 virtual server defined 91 Volume Shadow Co
178. ult user name is administrator and the password is the Windows Storage Server 2008 R2 administrator password that is set by the storage system administrator To open the ACU in browser mode EY NOTE Confirm that the ACU Execution Mode is set to remote service 1 Open a browser and enter the server name or IP address of the destination server For example http servername 2301 or http 192 0 0 1 2301 2 Log on to the HP System Management Homepage The default user name is administrator and the default password is hpinvent 3 Click Array Configuration Utility on the left side of the window The ACU opens and identifies the controllers that are connected to the system Some ACU guidelines to consider Do not modify the single logical drive of the storage system it is configured for the storage system operating system Spanning more than 14 disks with a RAID 5 volume is not recommended e Designate spares for RAID sets to provide greater protection against failures RAID sets cannot span controllers X3000 G2 Network Storage System User Guide 59 A single array can contain multiple logical drives of varying RAID settings Extending and expanding arrays and logical drives is supported The HP Array Configuration Utility User Guide is available for download at hitp www hp com support manuals Disk Management utility The Disk Management tool is a system utility for managing hard disks and the volumes or part
179. unctions It also provides seamless integration with HP hardware support by generating and e mailing support tickets that deliver a snapshot of the storage system 86 File server management For more information and to download the utility see the StorageWorks L amp TT web site at http h18006 www 1 hp com products storageworks tt Antivirus The server should be secured by installing the appropriate antivirus software X3000 G2 Network Storage System User Guide 87 88 File server management 6 Cluster administration One important feature of HP StorageWorks X3000 G2 Network Storage System models is that they can operate as a single node or as a cluster This chapter discusses cluster installation and cluster management issues Cluster overview A failover cluster is a group of independent computers that work together to increase the availability of applications and services The clustered servers called nodes are connected by physical cables and by software If one of the cluster nodes fails another node begins to provide service a process known as failover Users experience a minimum of disruptions in service Up to eight server nodes can be connected to each other and deployed as a no single point of failure NSPOF cluster Utilizing a private network allows communication amongst themselves in order to track the state of each cluster node Each node sends out periodic messages to the other nodes these messages are call
180. up and relate to the actual directory on the drive on which the share is being created An IP Address resource is formed in the group and relates to the IP address by which the group s virtual server is identified on the network A Network Name resource is formed in the group and relates to the name published on the network by which the group is identified The Group is owned by one of the nodes of the cluster but may transition to the other nodes during failover conditions The diagram illustrates a cluster containing two nodes Each node has ownership of one group Contained within each group are file shares that are known on the network by the associated Network Name and IP address In the specific case of Node file share Eng relates to E Eng1 This file share is known on the network as Fileserverl Eng1 with an IP address of 172 18 1 99 For cluster resources to function properly two very important requirements should be adhered to Dependencies between resources of a group must be established Dependencies determine the order of startup when a group comes online In the above case the following order should be maintained 1 File Share Dependent on Physical Disk Resource and Network Name 2 Network Name Dependent on IP Address Failure to indicate the dependencies of a resource properly may result in the file share attempting to come online prior to the physical disk resource being available resulting in a fail
181. upported The GUID partition table GPT disk partitioning style supports volumes up to 18 exabytes in size and up to 128 partitions per disk Unlike MBR partitioned disks data critical to platform operation is located in partitions instead of unpartitioned or hidden sectors In addition GPT partitioned disks have redundant primary and backup partition tables for improved partition data structure integrity On the Volumes tab in the disk properties dialog box in Disk Management disks with the GPT partitioning style are displayed as GUID Partition Table GPT disks and disks with the MBR partitioning style are displayed as Master Boot Record MBR disks Volumes When planning dynamic disks and volumes there is a limit to the amount of growth a single volume can undergo Volumes are limited in size and can have no more than 32 separate LUNs with each LUN not exceeding 2 terabytes TB and volumes totaling no more than 64 TB of disk space The RAID level of the LUNs included in a volume must be considered All of the units that make up a volume should have the same high availability characteristics In other words the units should all be of the same RAID level For example it would not be a good practice to include both a RAID 1 0 and a RAID 5 array in the same volume set By keeping all the units the same the entire volume retains the same performance and high availability characteristics making managing and maintaining the volume much easi
182. uster as physical disk resources during the installation of cluster services Verifying disk access and functionality Write a file to each shared disk resource to verify functionality At this time shut down the first node power on the next node and repeat the Verifying Disk Access and Functionality step above for all cluster nodes When it has been verified that all nodes can read and write from the disks turn off the cluster nodes and power on the first and then continue with this guide Contiguring cluster service software Failover Cluster Management provides the ability to manage monitor create and modify clusters and cluster resources Using Failover Cluster Management Failover Cluster Management shows information about the groups and resources on all of your clusters and specific information about the clusters themselves Creating a cluster During the creation of the cluster Failover Cluster Management will analyze and verify the hardware and software configuration and identify potential problems A comprehensive and easy to read report is created listing any potential configuration issues before the cluster is created Some issues that can occur are No shared disk for the Quorum disk A shared disk must be created with a NTFS partition at least 50 MB in size Use of DHCP addresses for network connections All Network adapters must be configured with static IP addresses in a cluster configuration e File Servic
183. uster concepts diagram Sequence of events for cluster resources The sequence of events in the diagram includes ODO Physical Disks 9 12 Cluster Group FS1Market Cluster Resource IP Address Cluster 172 18 1 98 Resource Disk G Cluster Cluster Resource Resource File Share Network Marl uste Name F Marl geluster NA rileserver File Share Mar4 G Mar4 Cluster Resource Cluster Resource Physical Disk F Physical Disk G hd an 0000 gog Physical Disks 13 16 Physical Disks 20 23 1 Physical disks are combined into RAID arrays and LUNs 2 LUNS are designated as basic disks formatted and assigned a drive letter via Disk Manager 92 Cluster administration Physical Disk resources are created for each basic disk inside Failover Cluster Management Directories and folders are created on assigned drives Cluster components virtual servers file shares are created organized in groups and placed within the folders using Failover Cluster Management exclusively Hierarchy of cluster resource components Figure 42 depicts the cluster resource hierarchy as follows Physical Disk resources are placed in a cluster group and relate to the basic disk When a Physical Disk resource is created through Failover Cluster Management the resource should be inserted into an existing cluster group or a corresponding group should be created for the resource to reside in File share resources are placed in a gro
184. vious versions of application or e mail databases Shadow copies are designed for volumes that store user data such as home directories and My Documents folders that are redirected by using Group Policy or other shared folders in which users store data Shadow copies work with compressed or encrypted files and retain whatever permissions were set on the files when the shadow copies were taken For example if a user is denied permission to read a file that user would not be able to restore a previous version of the file or be able to read the file after it has been restored Although shadow copies are taken for an entire volume users must use shared folders to access shadow copies Administrators on the local server must also specify the servername sharenam path to access shadow copies If administrators or end users want to access a previous version of a file that does not reside in a shared folder the administrator must first share the folder EY NOTE Shadow copies are available only on NTFS not FAT or FAT32 volumes Files or folders that are recorded by using Shadow Copy appear static even though the original data is changing Allocating disk space When determining the amount of space to allocate for storing shadow copies consider both the number and size of files that are being copied as well as the frequency of changes between copies For example 100 files that only change monthly require less storage space than 10 f

Download Pdf Manuals

image

Related Search

Related Contents

Operating instructions K3G190RC0503  Philips 40PFL9904 LCD TV User Manual  Thomson NEO7  Cahier des charges  du Corb - Ramoge  Water Pump Bomba de Agua Pompe a Eau  Delta 9192-RB-DST Installation Guide  diviseuse-bouleuse volumetrique notice d`utilisation et d`entretien  

Copyright © All rights reserved.
Failed to retrieve file