HP 2000fc Reference Manual

Modular smart array
Hide thumbs Also See for 2000fc:
Table of Contents

Advertisement

HP StorageWorks
2000 Family Modular Smart Array
reference guide
Part number: 481599-003
Third edition: August 2008

Advertisement

Table of Contents
loading

Summary of Contents for HP 2000fc

  • Page 1 HP StorageWorks 2000 Family Modular Smart Array reference guide Part number: 481599-003 Third edition: August 2008...
  • Page 2 © Copyright 2008 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material.
  • Page 3: Table Of Contents

    Contents About This Guide ..........13 Intended Audience .
  • Page 4 Configuring Your System for the First Time ......29 Configuring Preferences ..........29 Configuring User Access .
  • Page 5 Configuring Network Management Services ......52 Configuring Event Notification ........53 Enabling or Disabling Event Notification .
  • Page 6 Managing Global Spares ......... . 83 Managing Volumes .
  • Page 7 Using Volume-Copy Services ........121 Copying a Volume .
  • Page 8 Monitoring System Status ......... . 149 Displaying Status Information .
  • Page 9 Displaying Notification Events ........178 Additional Status Information .
  • Page 10 Reviewing Disk Drive Error Statistics ......200 Reviewing the Event Logs .
  • Page 11 Configuring the Debug Log ......... . 224 Correcting Enclosure IDs .
  • Page 12 Comparing RAID Levels ..........252 Mixing Disk Drive Models .
  • Page 13: About This Guide

    About This Guide Intended Audience This guide is intended for use by system administrators who are experienced with the following: Direct attach storage (DAS) or storage area network (SAN) management ■ Network administration ■ Storage system configuration ■ Prerequisites Prerequisites for installing and configuring this product include familiarity with: Servers and computer networks ■...
  • Page 14: Hp Technical Support

    HP Technical Support Telephone numbers for worldwide technical support are listed on the HP support website: http://www.hp.com/support Collect the following information before calling: Technical support registration number (if applicable) ■ Product serial numbers ■ Product model names and numbers ■ Applicable error messages ■...
  • Page 15: Subscription Service

    Subscription Service HP strongly recommends that customers sign up online using the Subscriber's choice website: http://www.hp.com/go/e-updates Subscribing to this service provides you with e-mail updates on the latest product enhancements, newest versions of drivers, and firmware documentation updates as well as instant access to numerous other product resources. HP Websites For other product information, see the following HP websites: http://www.hp.com...
  • Page 16 16 HP StorageWorks 2000 Family Modular Smart Array reference guide • August 2008...
  • Page 17: Introducing And Using Smu

    CH A P T E R Introducing and Using SMU This chapter introduces HP StorageWorks MSA2000 Family Storage Management Utility (SMU), the web-browser interface for MSA2000 Family storage systems. It also describes how to configure this interface by setting system preferences, configuring users, and managing licenses.
  • Page 18: Preparing To Use Smu

    SMU also includes monitoring and diagnostic features that enhance the reliability, availability, and serviceability (RAS) of your storage system. You can configure the transmission of event notifications (alerts), which can be sent to the screen or to email addresses, and Simple Network Management Protocol (SNMP) traps, which can be sent to an SNMP application.
  • Page 19: Logging In And Out Of Smu

    Logging In and Out of SMU SMU distinguishes users by the IP addresses from which they log in. If you log in to SMU using multiple browser instances on the same management host, SMU considers all instances as a single user. Actions you take in one SMU instance are reflected in the other SMU instances on the same host.
  • Page 20 3. Click Log In. The Status Summary page displays the overall status and health of the system. Note – If you cannot navigate past the Log In page, check the browser settings described on page 18. To log out of SMU: 1.
  • Page 21: Understanding The Interface

    Understanding the Interface The topics in this section describe elements of SMU pages and provide help for navigating pages: “Interface Elements” on page 21 ■ “Navigating SMU” on page 23 ■ “Help Bar Icons” on page 24 ■ “Virtual Disk Icons” on page 24 ■...
  • Page 22 The following table describes the key elements of SMU pages. Table 1-1 Key Elements of SMU Pages Element Description Menu area This area on each page includes monitoring functions in the Monitor menu, management functions in the Manage menu, and a Log Off function.
  • Page 23: Navigating Smu

    Navigating SMU The following table describes how to navigate SMU pages. Table 1-2 SMU Navigation Task Navigation Action Select a menu item Click the menu item in the menu on the left side of each page. When you click some menu items, the menu changes to display different submenus.
  • Page 24: Help Bar Icons

    Help Bar Icons The Help Bar at the top of each page can include event notification, page refresh, and page help icons. – An event occurred that is configured to display a visual alert. ■ Click this icon to view the most recent events monitored by Event Notification. To control how you receive information about events, see “Configuring Event Notification”...
  • Page 25 Table 1-3 Virtual Disk Status Icons (Continued) Icon Description RAID-6 virtual disk is online in a degraded state. The virtual disk can perform I/O functions for data hosts and is fault tolerant, but has degraded performance due to one missing drive. This might indicate that a disk drive has failed in the virtual disk or that the virtual disk is reconstructing.
  • Page 26: System Panel

    System Panel The System Panel at the bottom of each page includes system information, the overall status of system components, controller information, and the Event Log icon. Figure 1-2 System Panel (FC Example) The following information is shown: System information – The system’s name and location. ■...
  • Page 27: Help Menu

    Help Menu The Help submenu in the Monitor menu provides the following options for getting online help: Getting Started – Shows information about configuring your browser to use SMU ■ and shows tips for using SMU. Subject Index – Provides an alphabetically ordered list of actions you can ■...
  • Page 28 HP StorageWorks 2000 Family Modular Smart Array reference guide • August 2008...
  • Page 29: Configuring Your System For The First Time

    CH A P T E R Configuring Your System for the First Time This chapter describes how to use SMU to configure your system for the first time. It contains the following sections: “Configuring Preferences” on page 29 ■ “Configuring User Access” on page 31 ■...
  • Page 30 2. Set the following options: Preference Description Page Refresh Rate Select how often you want pages to refresh based on the speed of your computer and Ethernet connection. • Fast – Use for fast computers with a fast Ethernet connection. For example, Pentium III 500 MHz or higher with a T1 connection.
  • Page 31: Configuring User Access

    Configuring User Access By default, the system provides three users that can access the system. In addition to these users, which you can modify, you can add 10 other users (13 maximum). The user configuration function enables you to define user roles by setting specific access privileges.
  • Page 32: Access Privileges

    Access Privileges User access privileges are based on the following user types: Standard – Enables access to most functions. ■ Advanced – In addition to enabling Standard functions, enables access to ■ infrequently used administrative functions. Diagnostic – In addition to enabling Standard and Advanced functions, enables ■...
  • Page 33 Note – For security reasons, create different usernames unique to your site. If you keep the default ones, change their default passwords. 4. Change the user’s password. The password is case sensitive and can include 19 characters. Allowed characters include letters, numbers, hyphens, underscores, and spaces. 5.
  • Page 34: Adding Users

    Adding Users SMU allows a maximum of 13 users, including the three default users shown in Table 2-1. To add a user: 1. Select Manage > General Config > User Configuration > Add Users. The Add System User panel displays the current list of configured users. 2.
  • Page 35: Deleting Users

    Deleting Users You can delete any user from the system, including the default users. Note – The deletion of a system user cannot be undone. To delete a user: 1. Select Manage > General Config > User Configuration > Delete Users. The System User List panel displays the current list of configured users.
  • Page 36: Viewing Installed Licenses

    Viewing Installed Licenses To view installed licenses: ● Select Manage > General Config > License Management > Installed Licenses. The Licensed Features Installed panel shows whether a license certificate file is installed and the status of licensed features. For a licensed feature that has a quantity limit, the panel shows the maximum quantity available with the license and the baseline maximum quantity available without a license.
  • Page 37: Setting System Information

    Setting System Information You can specify information about the system to enable you to identify it. The system name and location are displayed in the System Panel. To set system information: 1. Select Manage > General Config > System Information. The System Information panel is displayed.
  • Page 38 If no NTP server is present, the date and time are maintained as if NTP had not been enabled. To manually set the system date and time: 1. Select Manage > General Config > Set Date/Time. 2. In the Set System Date panel, select the current month, day, and year. 3.
  • Page 39: Configuring Host Ports

    Configuring Host Ports This section describes how to configure host ports on Fibre Channel (FC) or iSCSI controller modules. No host-port configuration is needed for SAS controller modules. Configuring FC Host Ports On the Host Port Configuration page you can view the location, link speed, and topology of each FC host port in each controller module.
  • Page 40 Setting FC Host Port Link Speed A host port’s link speed must match the speed of the host (HBA or switch) to which the port is connected. In a dual-controller system, setting the speed of host port 0 on one controller also sets the speed of host port 1 on the other controller. A speed mismatch with the host prevents the host from accessing the storage system.
  • Page 41 0–125 – Select a specific number if you want the loop ID to stay the same after ■ you power down and power up. SMU cannot determine which loop IDs are available. If the controller cannot get the specified loop ID during the loop initialization process, it tries to get a soft address.
  • Page 42 To change the host port interconnect setting: 1. Select Manage > General Config > Host Port Configuration. 2. In the Advanced Options panel, click Change FC Port Interconnect Settings. The Host Port Configuration panel displays the current interconnect setting. 3. Set Internal Host Port Interconnect to Interconnected (enabled) or Straight-through (disabled).
  • Page 43 If host port interconnects are enabled, the paired ports are connected in a loop and must be set to use loop topology. Changing the topology setting for one host port automatically changes the setting for the paired port on the partner controller. If host port interconnects are disabled, you can change the topology setting for each host port individually.
  • Page 44: Configuring Iscsi Host Ports

    Configuring iSCSI Host Ports You can configure the following settings for the iSCSI ports on each MSA2012i controller module. Figure 2-2 Host Port Configuration Settings (Common and Controller A) Settings that are common to all iSCSI ports are: Authentication – Enables or disables use of Challenge-Handshake Authentication ■...
  • Page 45: Configuring Iscsi Login Authentication

    iSNS Address – Specifies the IP address of an iSNS server. The default address ■ is all zeroes. Alternate iSNS Address – Optional. Specifies the IP address of an alternate iSNS ■ server, which can be on a different subnet. The default address is all zeroes. Settings that can differ for each port are: IP Address –...
  • Page 46: Creating A Chap Entry

    On the Manage CHAP page you can create, view, modify, and delete entries. Panels on this page have these icons: – Click to show the panel’s content. ■ Expand panel icon – Click to hide the panel’s content. ■ Collapse panel icon –...
  • Page 47: Viewing A Chap Entry

    Viewing a CHAP Entry To view a CHAP entry: 1. Select Manage > General Config > Manage CHAP. The CHAP Entries panel lists entries by node name. 2. Click the entry to view. The entry’s names and secrets are displayed in the CHAP Entry Details panel. Modifying a CHAP Entry To modify a CHAP entry’s secret or mutual-CHAP values: 1.
  • Page 48: Configuring Ethernet Management Ports

    Configuring Ethernet Management Ports You can configure addressing parameters for each controller’s Ethernet management port and the timeout value for Telnet sessions. You can also view and configure the SNMP event filter and the web page caching mode. If you accessed SMU for the first time using the default IP address, you should set the IP address for each controller.
  • Page 49: Using Static Ip Settings

    Using Static IP Settings To set IP values for Ethernet management ports: 1. Select Manage > General Config > LAN Configuration. 2. In the IP Address Assignment panel, set Source For IP Address to Manual. 3. In the IP Configuration panel for each controller, set appropriate values for your network.
  • Page 50: Setting The Snmp Event Table Filter

    Setting the SNMP Event Table Filter Your storage system supports a Simple Network Management Protocol (SNMP) management information base (MIB) that includes a table of events that have occurred on the system. You can filter the criticality of events that are included in this table.
  • Page 51: Setting The Web Page Caching Mode

    Setting the Web Page Caching Mode The web page caching mode controls how SMU handles web page names. The names interact with your browser’s caching operations to determine which pages and image files are retrieved. To set the web page caching mode: 1.
  • Page 52: Configuring Network Management Services

    Configuring Network Management Services You can configure network management services and in-band management services to limit the ways in which users and host-based management applications can access the system. If a service is disabled, it continues to run but cannot be accessed. For information about permitting users to use enabled WBI, CLI, or FTP services, see “Configuring User Access”...
  • Page 53: Configuring Event Notification

    Configuring Event Notification You can configure how and under what conditions the system alerts you when specific events occur. The system generates events having three severity levels: Critical – Something related to the system or to a virtual disk has failed and ■...
  • Page 54: Enabling Or Disabling Event Notification

    Enabling or Disabling Event Notification You can enable or disable the following notification methods for selected event categories or individual events: Visual Alerts – SMU shows a visual alert indicator that a notification event ■ has occurred. To see this, SMU must be operating on a management host. Email Alerts –...
  • Page 55: Configuring Visual Alerts

    To select event categories for notification: 1. On the Event Notification Summary page, for each category you want to be notified of, select a notification method. For example, to receive email for all critical events, in the All Critical Events row select only the Email Alerts check box.
  • Page 56: Configuring Email Alerts

    3. Select a value for Maximum Events to Display at One Time. SMU can display a maximum of 100 events at a time; the default is 10. For example, if 10 events can display at a time and 15 are pending then the pop-up window shows the first 10 events and clicking the Acknowledge button will show the remaining events and new events that might have occurred.
  • Page 57 2. Type values in the following fields: Email Address 1–4 – Email addresses that the system should send notifications ■ to. Email addresses must use the format user-name@domain-name Email Comment – Text to send with email messages. For example, you might ■...
  • Page 58: Configuring Snmp Traps

    Configuring SNMP Traps You can configure the following options for SNMP notification of events: Read and write community strings ■ IP addresses of hosts that are configured to receive SNMP traps ■ To configure SNMP traps: 1. Select Manage > Event Notification > SNMP Configuration. 2.
  • Page 59 The disadvantage of ICPM is that if a controller fails, the other controller cannot fail over (that is, take over I/O processing for the failed controller). If a controller fails, the host loses access to the volumes owned by that controller. If a controller experienced a complete hardware failure, and needed to be replaced, then user data in its write-back cache is lost.
  • Page 60: Saving The Configuration To A File

    Saving the Configuration to a File As an Advanced Manage user, you can save the storage system’s configuration settings to a file. This enables you to make a backup of your settings in case a subsequent configuration change causes a problem, or if you want to apply one system’s settings to another system.
  • Page 61: Restarting And Shutting Down A Controller

    Restarting and Shutting Down a Controller You can restart or shut down controllers when a controller is not working properly or when the system will be serviced or moved. Restarting a Controller You can restart one or both controllers when: SMU informs you that you have changed a configuration setting that requires ■...
  • Page 62: Shutting Down A Controller

    Shutting Down a Controller Shut down a controller module before you remove it from an enclosure, or before you power off its enclosure for maintenance, repair, or a move. Shutting down a controller module halts I/O to that module, ensures that any data in the write cache is written to disk, and initiates failover to the partner controller, if it is active.
  • Page 63: Managing Storage

    CH A P T E R Managing Storage This chapter describes how to use SMU to configure and manage virtual disks, spare disks, volumes, volume-to-host mappings, and to use volume snapshot features. It contains the following sections: “Creating Virtual Disks and Volumes” on page 63 ■...
  • Page 64 The following table specifies the minimum and maximum numbers of disk drives supported for each RAID level. For more information about RAID levels, see Appendix B. Table 3-1 Number of Disk Drives Supported for Each RAID Level Min. Max. RAID Level Drives Drives Note...
  • Page 65: Creating A Virtual Disk Automatically

    You can create a virtual disk automatically or manually: Automatic Virtual Disk Creation (Policy-based) creates a virtual disk based on ■ minimal information. See “Creating a Virtual Disk Automatically” on page 65. Manual Virtual Disk Creation (Detail-based) creates a virtual disk based on ■...
  • Page 66 5. Set Minimum Size Of Virtual disk to the amount of available space to use for all volumes on the new virtual disk. This value is rounded to the nearest Gbyte and is shown to the right of this field as Targeted Virtual Disk Size.
  • Page 67: Creating A Virtual Disk Manually

    Creating a Virtual Disk Manually To create a virtual disk manually: 1. Select Manage > Virtual Disk Config > Create A Vdisk. 2. Select Manual Virtual Disk Creation. 3. Type a name for the virtual disk. The name is case sensitive and can include 17 characters, but not comma, quotation mark ("), or backslash.
  • Page 68 7. Select the drives to use in the virtual disk. Only available drives are selectable. Available drives are neither in a virtual disk nor assigned as a spare. The minimum and maximum number of drives that you can select when creating a virtual disk are shown in Table 3-1.
  • Page 69 d. Click Continue. The Configure Volumes For Virtual Disk page is displayed and summarizes your selections. 10. (Optional) Set How Many Volumes to the number of standard volumes you want in your virtual disk. You can create a virtual disk that has no volumes (the default), one volume, or multiple volumes (online initialization only).
  • Page 70: Virtual Disk Initialization

    13. Click Create Virtual Disk. The system creates the virtual disk and shows the next page in the process. If you accepted the default volume options, the final page shows the progress of ■ virtual disk initialization. Proceed to “Virtual Disk Initialization” on page 70. If you changed any of the volume options, an Add Volumes To Virtual Disk page ■...
  • Page 71: Managing Virtual Disks

    Managing Virtual Disks SMU enables you to manage virtual disks in a variety of ways. You can: View the status of virtual disks and disk drives ■ Expand virtual disk capacity ■ Removing a virtual disk from quarantine ■ Verify a virtual disk ■...
  • Page 72 Critical – Either the virtual disk is being initialized or reconstructed; or, one ■ drive is down or missing in a RAID 1, 3, 5, 10, or 50 virtual disk; or, two drives are down in a RAID 6 virtual disk. Offline –...
  • Page 73 Disk Drive Status To view information about the drives in a virtual disk: 1. Select Manage > Virtual Disk Config > Vdisk Configuration > Disk Drive Status. For each virtual disk, the virtual disk panel shows a status icon; the name, RAID level, size, number of disk drives, and number of volumes;...
  • Page 74: Expanding Virtual Disk Capacity

    Expanding Virtual Disk Capacity You can expand the capacity of a virtual disk by adding drives to it. Because virtual disk expansion does not require I/O to be quiesced, the virtual disk can continue to be used while the Expand utility runs. Expanding a virtual disk adds free space after the space used by existing volumes.
  • Page 75: Checking The Progress Of A Utility

    4. Click Expand Virtual Disk. Expansion begins and the percentage completed is shown. You can perform other functions during the expansion. You can view the status of the expansion on the Vdisk Utility Progress page or on any page that shows virtual disk icons. Checking the Progress of a Utility To check the status of any running virtual disk utilities: ●...
  • Page 76: Verifying A Virtual Disk

    The quarantined virtual disk’s drives are “write locked,” and the virtual disk is not available to hosts until the virtual disk is removed from quarantine. The system waits indefinitely for the missing drives. If the drives are found, the system automatically removes the virtual disk from quarantine.
  • Page 77 The verification process checks whether the redundancy data in the virtual disk is consistent with the user data in the virtual disk. The number of inconsistencies found is noted in the “Vdisk verification complete” event (event code 21) in the event log.
  • Page 78: Changing Virtual Disk Ownership

    Changing Virtual Disk Ownership Each virtual disk is owned by one of the controllers. SMU balances the number of virtual disks each controller owns. In a dual-controller system, when a controller fails, the partner controller assumes temporary ownership of the failed controller’s virtual disks and resources. If the system uses a fault-tolerant cabling configuration, both controllers’...
  • Page 79: Changing A Virtual Disk Name

    Changing a Virtual Disk Name To change the name of a virtual disk: 1. Select Manage > Virtual Disk Config > Vdisk Configuration > Change Vdisk Name. For each virtual disk, the virtual disk panel shows a status icon; the name, RAID level, size, number of disk drives, and number of volumes;...
  • Page 80: Managing Spares

    Managing Spares Controllers in your system automatically reconstruct redundant (fault-tolerant) virtual disks (RAID 1, 3, 5, 6, 10, and 50) if a virtual disk becomes critical and a properly sized spare disk is available. A virtual disk becomes critical when one or more of its disks fails.
  • Page 81: Managing Vdisk Spares

    To configure dynamic spares: 1. Select Manage > General Config > System Configuration. 2. Set Dynamic Spare Configuration to Enabled. 3. Click Change System Configuration. When Dynamic Spare Configuration is enabled, the Dynamic Spare Rescan Rate option is displayed. Use the default rescan rate. 4.
  • Page 82 To add spares to a virtual disk: 1. Select Manage > Virtual Disk Config > Vdisk Configuration > Add Vdisk Spares. For each virtual disk, the virtual disk panel shows a status icon; the name, RAID level, size, number of disk drives, and number of volumes; and utility status, if any. 2.
  • Page 83: Managing Global Spares

    Managing Global Spares This section describes how to designate available drives as spares for use by any virtual disk. It also describes how to return spares to the pool of available drives. Adding Global Spares You can designate a maximum of eight global spares for the system. If a disk in any redundant virtual disk (RAID 1, 3, 5, 6, 10, and 50) fails, a global spare is automatically used to reconstruct the virtual disk.
  • Page 84: Managing Volumes

    Displaying Global Spares To display global spares: ● Select Manage > Virtual Disk Config > Global Spare Menu > Show Global Spares. Drives whose icons are gray with a “G” are global spares. Managing Volumes SMU lets you manage volumes in a variety of ways. You can: Add a volume ■...
  • Page 85 You can give each volume a name. Assign names that indicate how the volumes are to be used. For example, if the first volume will be used to store your customer database, give it a name such as: cust_database When you create a virtual disk, you can specify the number of volumes you want and their sizes.
  • Page 86: Adding A Volume

    Adding a Volume You must have free space in a virtual disk before you can add a volume. You can create free space by deleting a volume (see “Deleting a Volume” on page 93) or by expanding the virtual disk (see “Expanding Virtual Disk Capacity” on page 74). You can add volumes to a virtual disk until you use all of the free space.
  • Page 87: Expanding A Volume

    Expanding a Volume You can expand a standard volume or a snap pool if the virtual disk has free space and sufficient resources. Because volume expansion does not require I/O to be quiesced, the volume can continue to be used while it is expanded. To expand a volume: 1.
  • Page 88: Changing A Volume Name

    On Volume Management pages, the Volume Menu panel shows a color-coded “map” of the space used by each volume in the selected virtual disk. The color codes are: Gray – Free space ■ Green – Standard volume ■ Blue – Snap pool ■...
  • Page 89: Changing A Volume's Read-Ahead Cache Settings

    3. Select the volume to rename. 4. In the Change Volume Name field, type a new name. The name is case sensitive and can include 20 characters, but not comma, quotation mark ("), or backslash. 5. Click Change Volume Name. When processing is complete, the new name is displayed in the Volume Menu panel.
  • Page 90 3. Select the standard, snap-pool, or master volume whose cache settings you want to change. 4. Set Read Ahead Size to one of the following options: Default – Sets one chunk for the first access in a sequential read and one stripe ■...
  • Page 91: Changing A Volume's Write-Back Cache Setting

    Changing a Volume’s Write-Back Cache Setting As an Advanced Manage user, you can change a volume’s write-back cache setting. Write-back is a cache-writing strategy in which the controller receives the data to be written to disk, stores it in the memory buffer, and immediately sends the host operating system a signal that the write operation is complete, without waiting until the data is actually written to the disk drive.
  • Page 92: Changing Auto-Write-Through Triggers And Behaviors

    To change a volume’s write-back cache setting: 1. Select Manage > Volume Management > Volume Menu > Write Back Cache. For each virtual disk, the virtual disk panel shows a status icon; the name, RAID level, size, number of disk drives, and number of volumes; and utility status, if any. 2.
  • Page 93: Deleting A Volume

    Power Supply Failure Trigger – Changes to write-through if a power supply unit ■ fails. The default is Disabled. Fan Failure Trigger – Changes to write-through if a cooling fan fails. The default ■ is Disabled. Overtemp Failure Trigger – Forces a controller shutdown if a temperature is ■...
  • Page 94: Managing Host Access To Volumes

    5. Click OK to confirm the operation or Cancel to stop it. If you clicked OK, a message indicates whether the operation succeeded. If it succeeded, the volume is removed from the Volume Menu panel. Managing Host Access to Volumes Each volume has default host-access settings that were set when the volume was created;...
  • Page 95: Managing The Global Host List

    Managing the Global Host List The following topics describe managing the host list on an FC, SAS, or iSCSI storage system. Managing the Global Host List on an FC System The global host list is a list of ports on a host HBA or FC switch that can be used for volume mapping.
  • Page 96 2. Click Add New Port. If the WWN and nickname are not in the list, the port is added. If the WWN is in the list, the nickname is changed. If the nickname is in the list, you must specify a unique nickname.
  • Page 97 To add a port or change a port’s nickname: 1. In the Add Port To Global Host Port List panel, type the port WWN and a nickname. The name is case sensitive and can include 15 characters, but not comma, quotation mark ("), or backslash.
  • Page 98 To display the global host list: ● Select Manage > General Config > Manage Host List. The Global Host List panel shows the node name, any controller ID and port numbers through which the host has logged in, and the nickname (if any) for each host node.
  • Page 99: Managing Volume Mappings

    Managing Volume Mappings In the Map Hosts To Volume page you can add, change, or delete explicit mappings between volumes and hosts. Managing Volume Mappings on an FC System Caution – Volume mapping changes take effect immediately. Make changes that limit access to volumes when the volumes are not in use.
  • Page 100 b. To set read-write or read-only access on one or more ports, specify a LUN and select port access privileges. More than one host can use the same LUN to access the same volume. A mapping cannot include both read-write and read-only access.
  • Page 101 3. Select a volume. The Current Host-Volume Relationships panel shows which host nodes have access to the selected volume. For the selected volume you might see the following mappings: All Hosts – Shows the settings used by all host nodes to access the volume. This ■...
  • Page 102 6. To remove an explicit mapping: a. In the Assign Host Access Privileges panel, select a host node. b. Click Unmap It. When processing is complete, the mapping is removed from the page. Managing Volume Mappings on a SAS System Caution –...
  • Page 103 b. To set read-write or read-only access on one or more ports, specify a LUN and select the access privilege and ports. More than one host can use the same LUN to access the same volume. If a port is not selected, its access is automatically set to none.
  • Page 104: Using Snapshot Services

    Using Snapshot Services Snapshot services provide data protection by enabling you to create and save snapshots of a volume, where each snapshot preserves the volume’s data state at the point in time when the snapshot was created. Snapshots can be taken of master volumes only. A master volume is a volume that has been enabled for snapshots.
  • Page 105: Maximum Number Of Snapshots

    The snapshot service uses the single copy-on-write function to capture only data that has changed. That is, if a block is to be overwritten on the master volume, and a snapshot depends on the existing data in the block being overwritten, the data is copied from the master volume to the snap pool before the data is changed.
  • Page 106 How much modified (write) data will the snapshots have? Of the snapshots ■ that will be mounted as read-write and actually written to, factor in the average amount of data that will be modified. Add 750 Mbyte of reserve space for internal use. ■...
  • Page 107: Reverting To Original Data

    Reverting to Original Data The snapshot service has two features for reverting data back to original data: Deleting only modified data on a snapshot ■ Rolling back the data in a master volume ■ For snapshots that have been made accessible as read-write, you can delete just the modified (write) data that was written directly to a snapshot.
  • Page 108 MasterVolume-1 Snapshot-1 Preserved Data (Wed Jan 18 22:37:17 2006) Modified Data (Thur Jan 22 21:20:30 2006) When you use the rollback feature, you can choose to exclude the modified data, which will revert the data on the master volume to the preserved data when the snapshot was taken.
  • Page 109: Creating A Snap Pool

    Creating a Snap Pool Before you can convert a standard volume to a master volume or create a master volume for snapshots, a snap pool must exist. A snap pool and its associated master volumes can be in different virtual disks, but must be owned by the same controller. You can create a maximum of 16 snap pools.
  • Page 110: Setting Snap Pool Policies And Thresholds

    Setting Snap Pool Policies and Thresholds Each snap pool has three policy levels that notify you when the snap pool is reaching decreasing capacity. Each policy level has an associated policy that specifies system behavior when an associated threshold value is reached. The following table summarizes the default thresholds and policies.
  • Page 111 To set a snap pool’s policies and thresholds: 1. Select Manage > Volume Management > Snapshot Services > Set Snap-Pool Policy. For each virtual disk, the virtual disk panel shows a status icon; the name, RAID level, size, number of disk drives, and number of volumes; and utility status, if any. 2.
  • Page 112: Creating A Master Volume

    Halt Writes – Halts all writes to the master volume (each write returns an error). ■ Snapshot data is preserved. Delete Oldest Snapshots – Deletes the oldest snapshots until the amount of data ■ in the snap pool is below the threshold. 7.
  • Page 113 5. (Optional) Change the name for the new volume. The default name is . For example, MyVdisk_V1. vdisk-name_Vnumber The name is case sensitive and can include 20 characters, but not comma, quotation mark ("), or backslash. Note – If the default name exceeds 20 characters it will be truncated. 6.
  • Page 114: Taking A Snapshot

    5. Click Convert To Master Volume. When processing is complete, the volume type is updated in the Volume Menu panel. Taking a Snapshot You can take a snapshot of the data state of a selected master volume. The snapshot data is stored in the snap pool associated with the master volume. To take a snapshot: 1.
  • Page 115: Resetting A Snapshot

    Resetting a Snapshot You can reset a snapshot to replace its content with the current data state of the associated master volume. The selected snapshot is replaced with a current snapshot having the same characteristics, such as name and LUN. The snapshot data is stored in the snap pool associated with the master volume.
  • Page 116: Rolling Back A Master Volume

    Caution – Before deleting modified data you must unmount the snapshot from data hosts to avoid data corruption. To delete the modified (write) data from a snapshot: 1. Unmount the snapshot from hosts. 2. Select Manage > Volume Management > Snapshot Services > Delete Modified Data. For each virtual disk, the virtual disk panel shows a status icon;...
  • Page 117 Only one rollback is allowed on the same master volume at one time. Multiple rollbacks on subsequent volumes on the same snap pool are performed sequentially; that is, additional rollbacks are queued until the current rollback is complete. However, after the rollback is requested, the master volume is available for use as if the rollback has already completed.
  • Page 118: Deleting A Snapshot

    Deleting a Snapshot You can delete snapshots at any time, including when: The associated snap pool is reaching capacity and you want to free some space ■ The maximum number of snapshots is reached and you want to delete older ■...
  • Page 119 3. Select a volume. The Volume Information panel shows the following information, depending on the type of volume selected. Volume Type Field Description (All) Volume Type One of the following volume types: (not shown for standard Master – A standard volume that is enabled for volumes) snapshots and is associated with a snap pool.
  • Page 120 Volume Type Field Description Master Volume Status Indicates whether the snapshot is Available or Unavailable. Status Reason Shows the reason for Unavailable status: • MV Not Ready (master volume is not ready) • SP Not Ready (snap pool is not ready) •...
  • Page 121: Using Volume-Copy Services

    Volume Type Field Description Snap Data – The total amount of data associated with the specific snapshot (data copied from a master volume to a snapshot and data written directly to a snapshot). Unique Data – The amount of data that has been written to the snapshot since the last snapshot was taken.
  • Page 122 Volume Copy from a Master Volume Master Volume Transient Snapshot Data Transfer New Volume 1. Volume copy request is made with a master volume as the source. 2. A new volume is created for the volume copy, and a hidden, transient snapshot is created. 3.
  • Page 123 Some guidelines to keep in mind when performing a volume copy include: The virtual disk selected for the volume copy must be on the same controller. ■ The virtual disk selected for the volume copy must have free space that is at least ■...
  • Page 124: Copying A Volume

    Copying a Volume You can copy a master volume or a snapshot to a new standard volume. The volume-copy operation takes a snapshot of all data in the source volume and creates a destination volume that you specify. The destination volume must be in a virtual disk owned by the same controller as the source volume.
  • Page 125: Viewing The Status Of A Volume Copy

    6. If the source volume is a snapshot, select whether the copy should include or exclude data modified in the snapshot since it was taken. The default is Exclude, which means that the copy will contain only the data that existed when the snapshot was taken.
  • Page 126: Canceling A Volume Copy

    Volume is presented to all hosts not explicitly mapped – Specifies whether the ■ volume is visible to all connected hosts. If the value is Yes, the LUN is also shown. Volume Serial Number – Serial number of the volume being created. ■...
  • Page 127: Using The Scheduler

    Using the Scheduler You can use the Scheduler feature to create tasks and define schedules at which the system will automatically perform those tasks. Actions you can perform on the Scheduler page are: Create tasks to take a snapshot, reset a snapshot, or copy a volume ■...
  • Page 128: Creating A Reset Snapshot Task

    3. Select Take Snapshot. 4. Select a master volume to take snapshots of. 5. Specify a prefix to identify snapshots created by this task. The prefix is case sensitive and can include 14 characters, but not comma, quotation mark ("), or backslash. Automatically created snapshots are named , where prefix_Sxxxx...
  • Page 129: Creating A Volume Copy Task

    5. Specify a name for the task. The name is case sensitive and can include 32 characters. Allowed characters include letters, numbers, hyphens, underscores, and spaces. 6. Click Create Task. The Tasks panel is updated and task information is displayed in the Task Details panel.
  • Page 130: Viewing Task Information

    9. Click Create Task. The Tasks panel is updated and task information is displayed in the Task Details panel. Viewing Task Information To view information about existing tasks: 1. Select Manage > Scheduler > Manage Scheduler. The Tasks panel shows the name, type, and status of existing tasks. If a task fails, an error icon is displayed and the task type and status are shown in red.
  • Page 131: Deleting A Task

    Include modified data ■ Last copy created, if the task has run ■ Error message, if any ■ Deleting a Task You can delete an unscheduled task. If the task is scheduled, you must delete the schedule first. To delete a task: 1.
  • Page 132: Viewing Schedule Information

    Only On – Specifies days when the task should run. ■ You can select a combination of: any day or a day by number; a day by type or name; and all months or a month by name. For the day number, the Specific option uses a number you type in an adjacent field.
  • Page 133: Deleting A Schedule

    Deleting a Schedule To delete a schedule: 1. Select Manage > Scheduler > Manage Scheduler. 2. In the Schedules panel click a schedule name. 3. In the Schedule Details panel, click Delete Schedule. 4. Click OK to confirm the operation or Cancel to stop it. Chapter 3 Managing Storage...
  • Page 134 HP StorageWorks 2000 Family Modular Smart Array reference guide • August 2008...
  • Page 135: Managing Disk Drives And Enclosures

    CH A P T E R Managing Disk Drives and Enclosures This chapter describes how to use SMU to manage a system’s disk drives and enclosures. Topics covered in this chapter are: “Managing Disk Drives” on page 135 ■ “Managing Enclosures” on page 142 ■...
  • Page 136: Clearing Metadata From Leftover Disk Drives

    Viewing Disk Drive Status To view the status of the drives in a selected virtual disk: ● Select Manage > Virtual Disk Config > Vdisk Configuration > Disk Drive Status. For a description of the information contained on this page, see “Disk Drive Status” on page 73.
  • Page 137: Enabling Or Disabling Smart Changes

    Enabling or Disabling SMART Changes As an Advanced Manage user, you can configure the ability to change the Self- Monitoring Analysis and Reporting Technology (SMART) settings for all disk drives in the storage system. When SMART is enabled, SMART events are recorded in the event log and are counted on the Disk Error Stats page.
  • Page 138: Viewing Disk Drive Read-Cache Status

    Viewing Disk Drive Read-Cache Status To view a disk drive’s read-cache status: 1. Select Manage > Utilities > Disk Drive Utilities > Display Disk Cache. The page shows the enclosure view with a drive selected, and shows the drive’s read-cache status. The first drive in the enclosure is selected by default. 2.
  • Page 139 Viewing Disk Drive Types and Firmware Versions To view the firmware version (revision) and type of each disk drive in each enclosure connected to the system, do either of the following: ● Select Manage > Update Software > Disk Drive Firmware > Show Disk Drives. The page shows similar information to the Disk Drive List page;...
  • Page 140 3. Ensure that no other user is performing administrative functions on the storage system. 4. Verify that background scrub is disabled. “Enabling and Disabling Background Scrub for Disks” on page 189. 5. Back up the data for the virtual disk that the drive is part of. 6.
  • Page 141 6. Click Browse to select the firmware update file. 7. Click Load Device Firmware File. 8. To start the firmware update, click Start Firmware Update. To cancel the firmware update, click Cancel. The file is transferred to the controller where it is temporarily stored prior to download to the disk drives.
  • Page 142: Managing Enclosures

    Managing Enclosures Each controller module and expansion module contains an Expander Controller (EC). The storage system can query EC for information about enclosure environmental conditions such as temperature, power supply and fan status, and the presence or absence of disk drives. The system can also communicate information to the EC about RAID activities such as disk drive rebuilds and failed disk drives.
  • Page 143 Viewing Enclosure Details To view enclosure details: 1. Select Manage > General Config > Enclosure Management. 2. Pause your cursor over an enclosure icon. A pop-up shows the enclosure status and other details. Entering Enclosure Information To enter the name, location, rack number, and rack position for an enclosure: 1.
  • Page 144 Illuminating Enclosure LEDs To illuminate an enclosure LED to help you visually locate the enclosure: 1. Select Manage > General Config > Enclosure Management. 2. If there is more than one enclosure, select the enclosure to locate. 3. Click Illuminate Locator LED. To stop illuminating an enclosure LED: 1.
  • Page 145: Viewing Drive Enclosure Versions

    Correcting Enclosure IDs Rescan forces rediscovery of attached disk drives and enclosures. If both Storage Controllers are online, it also forces re-evaluation of the enclosure IDs of attached drive enclosures, so that IDs are assigned based on controller A’s enclosure cabling order.
  • Page 146: Updating Drive Enclosure Firmware

    Total Number of this Type – The number of expansion modules that have the ■ same vendor, model, and firmware revision. For example, two identical expansion modules with different firmware revisions are considered to be different types. If firmware update is not supported for an expansion module type, the Select column shows “Not Supported”...
  • Page 147 8. Click Load Device Firmware File. 9. To start the firmware update, click Start Firmware Update. To cancel the firmware update, click Cancel. The file is transferred to the RAID controller where it is temporarily stored prior to download to the enclosure. Once the firmware update process has started, a page shows the update progress of each enclosure, including when the firmware update has completed successfully.
  • Page 148 HP StorageWorks 2000 Family Modular Smart Array reference guide • August 2008...
  • Page 149: Monitoring System Status

    CH A P T E R Monitoring System Status This chapter describes how to use SMU to monitor your system to ensure that its components are working properly. Topics covered in this chapter are: “Displaying Status Information” on page 149 ■...
  • Page 150: Virtual Disk Status

    To display the Status Summary page from another SMU page: ● Select Monitor > Status > Status Summary. Virtual Disk Status You can view detailed information about a virtual disk’s status, including its disk drives and volumes. You can display virtual disk status information in two ways. To view virtual disk (vdisk) status from the menu: ●...
  • Page 151 Number Of Spares – Number of spares assigned to the virtual disk. ■ Number Of Volumes – Number of volumes in the virtual disk. ■ Virtual Disk Name – Name assigned to the virtual disk. ■ Virtual Disk Serial Number – Unique number assigned by the owning controller. ■...
  • Page 152: Host Port Status

    Host Port Status This section describes status information shown for host ports on Fibre Channel (FC), iSCSI, or SAS controller modules. FC Host Port Status The Host Port Status page shows a graphical representation of the host ports on each controller, including a color-coded status for each port.
  • Page 153 Topology – One of the following values: ■ Point-to-Point ■ Loop, if the loop is inactive ■ Private Loop, if the port is directly attached to a host ■ Public Loop, if the port is attached to a switch ■ To change this setting, see “Setting FC Host Port Topology”...
  • Page 154 Details in the lower part of the panel vary depending on the selected port's status. iSCSI Port Status Details – Selected controller and port number ■ Link Status – Link is up or down ■ Qualified Name – iSCSI qualified name (IQN) ■...
  • Page 155: Disk Drive List

    Details in the lower part of the panel vary depending on the selected port’s status. Topology – Port connection type. ■ Speed – Actual link speed in Gbit per second per PHY lane. ■ Number of Active Lanes - The number of active PHY lanes and the number of ■...
  • Page 156: Disk Drives By Enclosure

    Belongs To Virtual Disk – Different information depending on the drive’s status: ■ If used in a virtual disk, the virtual disk name. ■ If used as a spare, the type of spare. ■ If unused, Available. ■ If contains leftover metadata, Leftover. A Manage user can return leftover ■...
  • Page 157 Model – Enclosure model number ■ Version – Expander Controller software version ■ WWN – Enclosure node World Wide Name ■ For a drive the following information is displayed. Drive Status – Up if operational or Down if failed. ■ Encl –...
  • Page 158: Lan Information

    LAN Information You can view Ethernet and IP information for each controller, and information about the system. To change the LAN settings, see “Configuring Ethernet Management Ports” on page 48. To change the system information, see “Setting System Information” on page 37. To view LAN information: ●...
  • Page 159: Module Status

    Module Status You can view summary status information for each controller module and all enclosures in the storage system. More detail is available on other Monitor pages. To view module status: ● Select Monitor > Status > Module Status. The Rear Panel Chassis View shows the back of the controller enclosure and the current status of power-and-cooling modules and controller modules.
  • Page 160: Controller Versions

    The status is OK when there are no critical or warning conditions for the element type. If no enclosure polling data is available, a message is displayed stating this. For information about a critical or warning condition, view the event log; see “Viewing the Event Log”...
  • Page 161: Fru Information

    FRU Information You can view information about field-replaceable units (FRUs) other than drive modules in an enclosure. For information about installed drive modules, see “Disk Drive List” on page 155. To view FRU information: 1. Select Monitor > Status > Advanced Settings > FRU Information. The drive enclosure panel shows all enclosures in the system and the status of each enclosure.
  • Page 162 Location – Enclosure location, if set. ■ Status – Specifies whether the enclosure is OK or has an error. ■ Misc – Enclosure ID, which is 0 for a controller enclosure and increments from 1 ■ for attached drive enclosures. World Wide Name –...
  • Page 163: Temperature Status

    Temperature Status As an Advanced user, you can view the current temperature status of each temperature sensor in each controller module. Each controller has six temperature sensors. To change the temperature display mode, see “Configuring Preferences” on page 29. To view temperature status: ●...
  • Page 164: Volume Information

    Volume Information To view information about all volumes in the system: ● Select Monitor > Status > Advanced Settings > Volume Information. The Volume Information panel shows the following information. Pref Owner – Preferred owner; the controller that owns the virtual disk during ■...
  • Page 165: Misc Configuration

    Misc Configuration As an Advanced user, you can view the following categories of configuration settings: general, RAID controller, EMP, security access to services, user preferences, and Network Time Protocol (NTP). To view miscellaneous configuration settings: ● Select Monitor > Status > Advanced Settings > Misc Configuration. The information is displayed in five panels.
  • Page 166 SMART – Shows whether Self-Monitoring Analysis and Reporting Technology ■ (SMART) settings for all drives in the system can be changed. The setting can be Enabled, Disabled, or Don't Modify. The default is Enabled. For more information, see“Enabling or Disabling SMART Changes” on page 137. The RAID Controller Status panel shows the following information for each controller: Hardware Status –...
  • Page 167: Expander Status

    Auto-Logout Timeout – The number of idle minutes before SMU session times ■ out and requires you to log back in, or “No timeout.” The default is 30 minutes. Temperature Display Mode – Fahrenheit or Celsius for all temperature status ■...
  • Page 168 To view expander status information: 1. Select Monitor > Status > Advanced Settings > Expander Status. 2. Select an enclosure. The information is displayed in three panels. The Enclosure Details panel shows the following information about the selected enclosure: Name – Name assigned to the enclosure. ■...
  • Page 169 Type – Specifies one of the following: ■ Disk – Communicates between the expander and a disk drive. ■ Inter-Exp – (Controller module only) Communicates between the expander ■ and the partner’s expander. SC – (Controller module only) Communicates between the expander and the ■...
  • Page 170 Invalid Doubleword Count – Specifies the number of invalid doublewords that ■ have been received by the PHY, not including those received during Link Reset sequences. Reset Error Count – Specifies the number of times the expander performed a ■ reset.
  • Page 171: Viewing The Event Log

    Viewing the Event Log The system’s event log contains important information about the status of the system, virtual disks, and disk drives. Check it regularly to monitor the status of your system. For information about viewing the event log and about specific events and errors, see “Using Event Logs”...
  • Page 172: Rate Statistics For Virtual Disks

    Rate Statistics for Virtual Disks You can view the following I/O statistics for all virtual disks: The total IOPS and bandwidth for all virtual disks ■ The IOPS and bandwidth for each virtual disk ■ To view overall rate statistics for virtual disks: ●...
  • Page 173: Rate Statistics For Volumes

    Rate Statistics for Volumes You can view the following I/O statistics for a selected virtual disk: The total IOPS and bandwidth for all volumes in the virtual disk ■ The IOPS and bandwidth for each volume in the virtual disk ■...
  • Page 174: Real-Time Statistics For Volumes

    3. Select the volume whose statistics you want to view. Statistics shown are based on host-side activity in the interval since the page was last refreshed. The page automatically refreshes at a 60-second interval. Real-Time Statistics for Volumes As an Advanced user, you can view the overall performance of volumes and related ports.
  • Page 175 Field Description I/O Timeout Count The number of times the drive accepted an I/O request but did not complete it in the required amount of time. Excessive timeouts can indicate potential device failure (media retries or soft, recoverable errors) No Response Count The number of times the drive failed to respond to an I/O request.
  • Page 176: Disk Space Usage Statistics

    Disk Space Usage Statistics As an Advanced user, you can view information about overall disk space usage for all disk drives in the storage system. The following information is displayed about virtual disk space, excluding spares. Field Description Volume Space Space for user data storage.
  • Page 177: Resetting Statistics

    The following information is displayed about spares and unused space. Field Description Virtual Disk Spare Space Space on spare disk drives that are designated for use by a specific virtual disk. Global Spare Space Space on spare disk drives that are designated for use by any virtual disk.
  • Page 178: Displaying Notification Events

    To reset statistics: 1. Select Monitor > Statistics > Reset All Statistics. 2. Click the button for the statistics you want to reset. A message is displayed indicating whether the reset succeeded. Displaying Notification Events The Show Notification Events panel shows events that have occurred that were selected for Visual Notification.
  • Page 179: Additional Status Information

    Additional Status Information The following additional status information will help you monitor the system: Using the debug log as explained in “Troubleshooting Using SMU” on page 195. ■ LED status descriptions in the user guide. ■ Chapter 5 Monitoring System Status...
  • Page 180 HP StorageWorks 2000 Family Modular Smart Array reference guide • August 2008...
  • Page 181: Additional Configuration Functions And Utilities

    CH A P T E R Additional Configuration Functions and Utilities This chapter describes how to use SMU to run system utilities and perform advanced configuration tasks. Topics covered in this chapter are: “Updating Software” on page 181 ■ “Changing Utility Priority” on page 183 ■...
  • Page 182 Note – By default the storage system’s Partner Firmware Upgrade option is enabled, so when you upgrade one controller the system automatically upgrades the partner controller. If Partner Firmware Upgrade is disabled or if the Independent Cache Performance Mode option is enabled, after updating software on one controller you must manually upgrade the partner controller.
  • Page 183: Disabling Partner Firmware Upgrade

    Disabling Partner Firmware Upgrade If a service technician tells you to disable partner firmware upgrade: 1. Select Manage > General Config > System Configuration. 2. Set Partner Firmware Upgrade to Disabled. Changing Utility Priority You can change the priority at which the Verify, Reconstruct, Expand, and Initialize utilities run when there are active I/O operations competing for the system’s controllers.
  • Page 184: Scanning For Device Changes

    Scanning for Device Changes Rescan forces rediscovery of attached disk drives and enclosures. If both storage controllers are online, it also forces re-evaluation of the enclosure IDs of attached drive enclosures, so that IDs are assigned based on controller A’s enclosure cabling order.
  • Page 185: Resetting A Host Channel On An Fc Or Sas System

    Resetting a Host Channel on an FC or SAS System Making a configuration or cabling change on a host might cause the storage system to stop accepting I/O requests from that host. For example, this problem can occur after moving host cables from one HBA to another on the host. To fix such a problem you might need to reset controller host ports (channels).
  • Page 186: Clearing Unwritable Cache Data

    Clearing Unwritable Cache Data The controller cache contains data that cannot be written out to a virtual disk because that virtual disk is no longer accessible. The virtual disk might be offline or missing. Unwritable cache data can exist if I/O to the virtual disk does not complete because drives or enclosures fail or are removed before the data can be written.
  • Page 187: Restoring A Saved Configuration File

    Restoring a Saved Configuration File As an Advanced Manage user, if you have created a backup configuration file as explained in “Saving the Configuration to a File” on page 60, you can load (restore) the configuration data to either: The same system to revert its current configuration to the saved configuration ■...
  • Page 188: Viewing And Restoring Default Settings

    3. Click Continue. A new page is displayed whose content depends on the IP address option you selected. 4. If you selected the second option in Step 2: a. Enter network information in the fields. b. Click Continue Restore Process. 5.
  • Page 189: Enabling And Disabling Background Scrub For Disks

    Caution – Restoring default settings replaces your current configuration changes with the original manufacturer configuration settings. Some of these settings take effect immediately while others take effect after you restart the RAID controllers. Restoring default settings cannot be undone. To restore all defaults: 1.
  • Page 190: Controlling Host Access To The System's Write-Back Cache Setting

    Controlling Host Access to the System’s Write-Back Cache Setting You can prevent hosts from using SCSI commands to change the MODE SELECT system’s write-back cache setting. Some operating systems disable write cache. If host control of write-back cache is disabled, the host cannot modify the cache setting.
  • Page 191: Changing The Missing Lun Response Option

    Changing the Missing LUN Response Option Some operating systems do not look beyond LUN 0 if they do not find a LUN 0 or cannot handle noncontiguous LUNs. Missing LUN Response handles these situations by enabling the host drivers to continue probing for LUNs until they reach the LUN to which they have access.
  • Page 192: Configuring In-Band Management Services

    Configuring In-band Management Services You can manage the storage system in-band with custom applications written using the Configuration API (CAPI). If you are not using CAPI-based applications, you can disable in-band management. You can also monitor system status in-band based on SCSI Enclosure Services (SES) data.
  • Page 193: Setting Up The Debug Log

    To save log information to a file: 1. Select Manage > Utilities > Debug Utilities > Save Logs To File. 2. In the Enter Your Contact Information panel, type contact information and comments to include in the log information file. Contact information provides the support representatives who are reviewing the file a means to identify who saved the log.
  • Page 194 HP StorageWorks 2000 Family Modular Smart Array reference guide • August 2008...
  • Page 195: Troubleshooting Using Smu

    CH A P T E R Troubleshooting Using SMU This chapter describes how to use SMU to troubleshoot your storage system and its FRUs. It also describes solutions to problems you might experience when using SMU. Topics covered in this chapter include: “Problems Using SMU to Access a Storage System”...
  • Page 196: Problems Using Smu To Access A Storage System

    Problems Using SMU to Access a Storage System The following table lists problems you might encounter when using SMU to access a storage system. Table 7-1 Problems Using SMU to Access a Storage System Problem Solution You cannot access SMU. •...
  • Page 197: Determining Storage System Status And Verifying Faults

    Determining Storage System Status and Verifying Faults The System Summary page shows you the overall status of the storage system. To view storage system status: 1. Select Monitor > Status > Status Summary. 2. Check the status icon at the upper left corner of each panel. A green icon indicates that components associated with that panel are ■...
  • Page 198: Stopping I/O

    6. Review the information displayed in the status page. If the fault relates to a controller module or power module, an image of the enclosure is displayed. The module is shaded red if it has a fault or is powered off. ■...
  • Page 199: Clearing Metadata From Leftover Disk Drives

    4. In the Host-Generated I/O & Bandwidth Totals for All Virtual Disks panel, verify that both indicators display 0 (no activity). Clearing Metadata From Leftover Disk Drives A drive becomes a “leftover” when its metadata identifies the drive as being part of a nonexistent virtual disk, or when a controller forces the drive offline because it reported too many errors.
  • Page 200: Reviewing Disk Drive Error Statistics

    When you have confirmed a drive fault, record the drive’s enclosure number and slot number. To identify the physical location of a faulty drive: 1. Select Manage > Utilities > Disk Drive Utilities > Locate Disk Drive. 2. Select the faulty drive. If the drive is absent or not fully inserted, it is represented with a white rectangle and is not selectable, as shown in the following example.
  • Page 201 4. Note any error counts displayed for these statistics. Field Description SMART Event Count The number of SMART (Self-Monitoring Analysis and Reporting Technology) events that the drive recorded. These events are often used by the vendor to determine the root cause of a drive failure. Some SMART events may indicate imminent electromechanical failure.
  • Page 202: Reviewing The Event Logs

    Capturing Error Trend Data To capture error trend data for one or more drives: 1. Perform the procedure in “Reviewing Disk Drive Error Statistics” on page 200. 2. Create a baseline by clearing the current error statistics. To clear the statistics for one drive, select the drive and click Clear Selected Disk Drive Error Statistics.
  • Page 203: Reconstructing A Virtual Disk

    Reconstructing a Virtual Disk If one or more drives fail in a redundant virtual disk (RAID 1, 3, 5, 6, 10, or 50) and properly sized spares are available, the storage system automatically uses the spares to reconstruct the virtual disk. Virtual disk reconstruction does not require I/O to be quiesced, so the virtual disk can continue to be used while the Reconstruct utility runs.
  • Page 204: Isolating Data Path Faults

    Note – Reconstruction can take hours or days to complete, depending on the virtual disk RAID level and size, drive speed, utility priority, and other processes running on the storage system. You can stop reconstruction only by deleting the virtual disk. Isolating Data Path Faults When isolating data path faults, you must first isolate the fault to an internal data path or an external data path.
  • Page 205 PHYs are tested and verified before shipment as part of the manufacturing and qualification process. But subsequent problems can occur in a PHY because of installation problems such as: A bad cable between enclosures ■ A controller connector that is damaged as a result of attaching a cable and then ■...
  • Page 206 SMU provides an Expander Status page, which contains an Expander Controller Phy Detail panel. This panel shows information about each PHY in the internal data paths between the Storage Controller, Expander Controller, drives, and expansion ports. By reviewing this page you can quickly locate the internal data path that has a fault.
  • Page 207 Reviewing the Event Log for Disabled PHYs If the fault isolation firmware disables a PHY, the event log shows a message like the following:. Phy disabled. Enclosure:A00. Phy11. PhysId11 Type:Drive. Reason:Externally Disabled. When a PHY has been disabled manually, the event log shows a similar message with a different reason: Phy disabled.
  • Page 208: Isolating External Data Path Faults On An Fc Storage System

    Isolating External Data Path Faults on an FC Storage System To troubleshoot external data path faults, perform the following steps: 1. Select Monitor > Status > Advanced Settings > Host Port Status. This page provides a graphical representation of controller host port status and port details.
  • Page 209: Isolating External Data Path Faults On An Iscsi Storage System

    Isolating External Data Path Faults on an iSCSI Storage System To troubleshoot external data path faults, perform the following steps: 1. Select Monitor > Status > Advanced Settings > Host Port Status. This page provides a graphical representation of controller host port status and port details.
  • Page 210: Isolating External Data Path Faults On A Sas Storage System

    Isolating External Data Path Faults on a SAS Storage System To troubleshoot external data path faults, perform the following steps: 1. Select Monitor > Status > Advanced Settings > Host Port Status. This page provides a graphical representation of controller host port status and port details.
  • Page 211: Resetting A Host Channel On An Fc Or Sas Storage System

    Resetting a Host Channel on an FC or SAS Storage System Making a configuration or cabling change on a host might cause the storage system to stop accepting I/O requests from that host. For example, this problem can occur after moving host cables from one HBA to another on the host. To fix such a problem you might need to reset controller host ports (channels).
  • Page 212: Disabling Or Enabling A Phy

    Disabling or Enabling a PHY To disable or enable a PHY: ● In the Expander Controller Phy Detail panel, click the PHY's Disable or Enable button. When you disable a PHY, its button changes to Enable and its Status value changes to DISABLED.
  • Page 213: Using Recovery Utilities

    Using Recovery Utilities This section describes recovering data from a virtual disk that is quarantined or offline (failed). Removing a Virtual Disk From Quarantine The quarantine icon indicates that a previously fault-tolerant virtual disk is quarantined because not all of its drives were detected after a restart or rescan. For information about when and how you can recover data from a quarantined virtual disk, see“Removing a Virtual Disk From Quarantine”...
  • Page 214 To enable and use Trust Vdisk: 1. Select Manage > Utilities > Recovery Utilities > Enable Trust Vdisk. 2. Select Enabled. 3. Click Enable/Disable Trust Vdisk. The option remains enabled until you trust a virtual disk or restart the storage system.
  • Page 215: Problems Scheduling Tasks

    Problems Scheduling Tasks If your task does not run at the times you specified, check the schedule specifications. It is possible to create conflicting specifications. Start time is the first time the task will run. ■ If you use the Between option, the starting date/time must be in the Between ■...
  • Page 216: Affect Of Changing The Date And Time

    Affect of Changing the Date and Time Resetting the storage system date or time might affect scheduled tasks. Because the schedule begins with the start time, no schedules will run until the date and time are set. If the system is configured to use Network Time Protocol (NTP), and if an NTP server is available, the system time and date is obtained from the NTP server.
  • Page 217 Individual event selections do not override the Notification Enabled or Event Categories settings. If the notification is disabled, the individual event selection is ignored. Similarly, Event Categories settings have higher precedence for enabling events than individual event selection. If the critical event category is selected, all critical events cause a notification regardless of the individual critical event selection.
  • Page 218: Selecting Or Clearing All Events For Notification

    Selecting or Clearing All Events for Notification You can select or clear all individual events for any or all of the notification types. Selecting all individual events is useful if you want to select many events but not all; set all the events on this page, then go to pages for individual events and clear events you don't want.
  • Page 219: Event Severities

    Event Severities The storage system generates events having three severity levels: Informational – A problem occurred that the system corrected, or a system ■ change has been made. These events are purely informational; no action required. Warning – Something related to the system or to a virtual disk has a problem. ■...
  • Page 220 To view the event log: 1. Do one of the following: In the System Panel, click the icon. ■ In the menu, select Monitor > Status > View Event Log. ■ The event log page is displayed. 2. Click one of the following buttons in the Select Event Table To View panel to see the corresponding events.
  • Page 221: Viewing An Event Log Saved From Smu

    For example: Severity Level Date/Time Event Code Event Serial Number Message Info 2008-08-06 A29856 Time/date has been 09:35:07 changed 2008-04 Uncorrectable ECC error Critical A29809 12:12:05 in buffer memory address 0x0 on bootup Viewing an Event Log Saved From SMU You can save event log data to a file on your network as described in “Saving Log Information to a File”...
  • Page 222: Reviewing Event Logs

    For example: Event SN Date/Time Code Severity Controller Description A29856 08-06 09:35:07 Time/date has been changed A29809 08-04 12:12:05 Uncorrectable ECC error in buffer memory address 0x0 on bootup Reviewing Event Logs When reviewing events, do the following: 1. Review the critical/warning events. Identify the primary events and any that might be the cause of the primary event.
  • Page 223: Saving Log Information To A File

    Saving Log Information to a File You can save the following types of log information to a file: Device status summary, which includes basic status and configuration ■ information for the system. Event logs from both controllers when in active-active mode. ■...
  • Page 224: Configuring The Debug Log

    8. If prompted to specify the file location and name, do so using a extension. .logs The default file name is . If you intend to capture multiple event logs, store.logs be sure to name the files appropriately so that they can be identified later. Note –...
  • Page 225: Correcting Enclosure Ids

    No Debug Tracing – Collects no debug data. ■ Custom Debug Tracing – Shows that specific events are selected for inclusion in ■ the log. This is the default. If no events are selected, this option is not displayed. 3. Click Change Debug Logging Setup. 4.
  • Page 226 HP StorageWorks 2000 Family Modular Smart Array reference guide • August 2008...
  • Page 227: Snmp Configuration

    A P P E N D I X SNMP Configuration This appendix describes the Simple Network Management Protocol (SNMP) capabilities that MSA2000 Family storage systems support. This includes standard MIB-II, the Fibre Alliance SNMP Management Information Base (MIB) version 2.2 objects, and enterprise traps.
  • Page 228: Standard Mib-Ii Behavior

    An SNMP object identifier (OID) is a number assigned to devices in a network for identification purposes. OID numbering is hierarchical. Using the IETF notation of digits and dots resembling very long IP addresses, various registries such as ANSI assign high-level numbers to vendors and organizations. They, in turn, append digits to the number to identify individual devices or software processes.
  • Page 229: Fa Mib 2.2 Snmp Behavior

    FA MIB 2.2 SNMP Behavior The FA2.2 MIB objects are in compliance with the Fibre Alliance MIB v2.2 Specification (FA MIB2.2 Spec). For a full description of this MIB, go to: http://www.fibrealliance.org/fb/mib/mib2_2.htm FA MIB 2.2 is a subset of FA MIB 4.0, which is included with HP System Insight Manager (SIM) and other products.
  • Page 230 The following table lists the MIB objects, their descriptions and the value set in an MSA2000 Family storage system. Unless specified otherwise, objects are not settable. Table A-1 FA MIB 2.2 Objects, Descriptions, and Values Object Description Value Revision number for this MIB 0220 RevisionNumber Number of connectivity units...
  • Page 231 Table A-1 FA MIB 2.2 Objects, Descriptions, and Values (Continued) Object Description Value Includes the following objects as connUnitTable specified by the FA MIB2.2 Spec Unique identification for this Total of 16 bytes connUnitId connectivity unit comprised of 8 bytes of the node WWN or similar serial number-based identifier (for example,...
  • Page 232 Table A-1 FA MIB 2.2 Objects, Descriptions, and Values (Continued) Object Description Value Number of sensors in the connUnitNumSensors connUnitSensorTable Same as statusChangeTime Same as connUnitStatusChangeTime statusChangeTime Same as Same as connUnitConfiguration ChangeTime configurationChangeTime configurationChange Time Number of revisions in the connUnitNumRevs connUnitRevsTable Not supported...
  • Page 233 Table A-1 FA MIB 2.2 Objects, Descriptions, and Values (Continued) Object Description Value Includes the following objects as connUnitRevsTable specified by the FA MIB2.2 Spec connUnitId of the connectivity Same as connUnitId connUnitRevsUnitId unit that contains this revision table Unique value for each See “External Details for connUnitRevsIndex connUnitRevsEntry between...
  • Page 234 Table A-1 FA MIB 2.2 Objects, Descriptions, and Values (Continued) Object Description Value Description the sensor status as a connUnitSensorMessage connUnitSensorName message followed by the appropriate sensor reading. Temperatures display in both Celsius and Fahrenheit; for example, CPU Temperature (Controller Module A): 48C 118F).
  • Page 235 Table A-1 FA MIB 2.2 Objects, Descriptions, and Values (Continued) Object Description Value State of the port hardware unknown[1], online[2], connUnitPortState offline[3], bypassed[4] Overall protocol status for the port unknown[1], unused[2], connUnitPortStatus ok[3], warning[4], failure[5], notparticipating[6], initializing[7], bypass[8] Technology of the port transceiver unknown[1] for Fibre connUnitPortTransmitter Channel ports...
  • Page 236 Table A-1 FA MIB 2.2 Objects, Descriptions, and Values (Continued) Object Description Value String describing the addressed See “External Details for connUnitPortName port connUnitPortTable” on page 240 Port number represented on the Port number represented on connUnitPortPhysical hardware the hardware Number Not supported 0 (No statistics available)
  • Page 237 Table A-1 FA MIB 2.2 Objects, Descriptions, and Values (Continued) Object Description Value Not supported connUnitPortStatLANTable SNMP TRAPS The following SNMP traps are supported Maximum number of trap clients trapMaxClients Number of trap clients currently 1 if traps enabled; 0 if traps trapClientCount enabled not enabled...
  • Page 238: External Details For Certain Fa Mib 2.2 Objects

    External Details for Certain FA MIB 2.2 Objects Tables in this section specify values for certain objects described in Table A-1. External Details for connUnitRevsTable The following table provides external details for the objects connUnitRevsTable connUnitRevsIndex connUnitRevsDescription Table A-2 connUnitRevsTable Index and Description Values Revs Index Revs Description Firmware revision for Storage Controller (Controller Module A)
  • Page 239: External Details For Connunitsensortable

    External Details for connUnitSensorTable The following table provides external details for the connUnitSensorTable objects connUnitSensorIndex connUnitSensorName , and connUnitSensorType connUnitSensorCharacteristic Table A-3 connUnitSensorTable Index, Name, Type, and Characteristic Values Sensor Sensor Index Sensor Name Sensor Type Characteristic CPU Temperature (Controller Module A) board [8] temperature[3] CPU Temperature (Controller Module B)
  • Page 240: External Details For Connunitporttable

    Table A-3 connUnitSensorTable Index, Name, Type, and Characteristic Values (Continued) Sensor Sensor Index Sensor Name Sensor Type Characteristic Capacitor Cell 4 Voltage (Controller Module B) board [8] power[9] Capacitor Charge Current (Controller Module A) board [8] currentValue[6] Capacitor Charge Current (Controller Module B) board [8] currentValue[6] Power Supply 1 Voltage, 12V...
  • Page 241: Configuring Snmp Event Notification In Smu

    Configuring SNMP Event Notification in SMU As a Manage user you can configure and enable SNMP event notification. To do so: 1. Select the level of events to include in the FA2.2 event table; see “Setting the SNMP Event Table Filter” on page 50. 2.
  • Page 242: Enterprise Trap Mib

    -- --------------------------------------------------------------------------- -- MSA2000 Array MIB for SNMP Traps -- $Revision: 11692 $ -- Copyright (c) 2008 Hewlett-Packard Development Company, L.P. -- Copyright (c) 2005-2008 Dot Hill Systems Corp. -- Confidential computer software. Valid license from HP required for possession, -- use or copying.
  • Page 243 -- vendor OBJECT IDENTIFIER ::= { enterprises 11 } OBJECT IDENTIFIER ::= { hp 2 } hpMSA OBJECT IDENTIFIER ::= { nm 51 } -- Related traps msaEventInfoTrap TRAP-TYPE ENTERPRISE hpMSA VARIABLES { connUnitEventId, connUnitEventType, connUnitEventDescr } DESCRIPTION "An event has been generated by the storage array. Recommended severity level (for filtering): info"...
  • Page 244 msaEventErrorTrap TRAP-TYPE ENTERPRISE hpMSA VARIABLES { connUnitEventId, connUnitEventType, connUnitEventDescr } DESCRIPTION "An event has been generated by the storage array. Recommended severity level (for filtering): error" -- Trap annotations are as follows: --#TYPE "Error storage event" --#SUMMARY "Error storage event # %d, type %d, description: %s" --#ARGUMENTS {0,1,2} --#SEVERITY MAJOR --#TIMEINDEX 6...
  • Page 245: Fa Mib 2.2 And 4.0 Differences

    FA MIB 2.2 and 4.0 Differences FA MIB 2.2 is a subset of FA MIB 4.0. Therefore, SNMP elements implemented in MSA2000 Family storage systems can be accessed by a management application that uses FA MIB 4.0. The following tables are not implemented in 2.2: connUnitServiceScalars ■...
  • Page 246 HP StorageWorks 2000 Family Modular Smart Array reference guide • August 2008...
  • Page 247: Raid Levels

    A P P E N D I X RAID Levels This appendix describes the different RAID levels that virtual disks in your system can use. Topics covered in this appendix are: “Introduction” on page 247 ■ “RAID Level Descriptions” on page 249 ■...
  • Page 248 Table B-1 Example Applications and RAID Levels Application RAID Level Testing multiple operating systems or software development (where non-RAID redundancy is not an issue) Fast temporary storage or scratch disks for graphics, page layout, and image rendering Workgroup servers 1 or 1+0 (10) Video editing and production Network operating system, databases, high availability applications, workgroup servers...
  • Page 249: Raid Level Descriptions

    RAID Level Descriptions RAID levels are numbered from 0 through 6; a higher RAID level does not necessarily indicate a higher level of performance or fault tolerance. The RAID controllers support RAID levels that have proven to be the most useful for RAID applications: RAID 0, 1, 10, 3, 5, 50, and 6.
  • Page 250: Raid 3

    A mirrored virtual disk is also highly reliable, because both disk drives in a pair must fail for the virtual disk to fail. In an virtual disk with five pairs of mirrored disk drives, for example, the virtual disk can maintain its integrity even if five disks fail—as long as each pair is left with one good disk.
  • Page 251: Raid 50

    RAID 50 RAID 50 virtual disks are made up of two or more RAID 5 virtual disks, across which data is striped. RAID 50 virtual disks contain redundant information in the form of parity data, which is calculated block-by-block for all user data. As in a RAID 5 virtual disk, the parity information is distributed across the disk drives in the virtual disk and occupies the equivalent capacity of one disk drive per RAID 5.
  • Page 252: Comparing Raid Levels

    Comparing RAID Levels Table A-2 illustrates the differences between the different RAID levels. Table B-2 RAID Level Comparison Min. RAID Number Level of Drives Description Strengths Weaknesses Data striping without Highest performance No data protection: if redundancy one drive fails all data is lost Disk mirroring Very high performance...
  • Page 253: Mixing Disk Drive Models

    Table B-2 RAID Level Comparison (Continued) Min. RAID Number Level of Drives Description Strengths Weaknesses Combination of RAID 0 Better random read and Lower storage capacity (data striping) and RAID write performance and than RAID 5 5 with distributed parity data protection than RAID 5;...
  • Page 254 HP StorageWorks 2000 Family Modular Smart Array reference guide • August 2008...
  • Page 255: Host Access To Storage

    A P P E N D I X Host Access to Storage A volume in a virtual disk can be mapped through all controller host ports (target ports) to all data hosts, or through specific controller host ports to specific data hosts.
  • Page 256: Node And Port Identifiers

    Node and Port Identifiers This section describes the node and port identifiers presented by FC, iSCSI, and SAS storage systems. Each controller has a unique, permanent node WWN. Each controller host port has a unique port WWN that is based on the node WWN. The WWN format is: <port>7<A/B><multiID><OUI><midplane-SN>...
  • Page 257: Iscsi

    iSCSI Each controller has a unique, permanent hardware address. Each controller host port has a unique, user-defined IP address. The following table shows example hardware addresses and port IP addresses. Controller Hardware Address iSCSI Port IP Address 00C0FF0A8A51 0: 10.11.10.4 1: 10.10.10.5 00C0FF0A8A52 0: 10.11.10.2...
  • Page 258: Fc Direct Attach Configuration

    FC Direct Attach Configuration When a data host is directly connected to controller host ports, loop topology must be used. The host should have one HBA port connected to each controller. When the host-port interconnects are enabled, the host has access to both controllers’...
  • Page 259 The following figure shows how port WWNs and mapped volumes are presented if controller B fails. A0 & B1 WWNs, A & B volumes data data A1 & B0 WWNs A & B volumes Interconnects enabled (Failed) Figure C-2 FC Storage Presentation During Failover (Direct Attach with Interconnects Enabled) Appendix C Host Access to Storage...
  • Page 260: Fc Switch Attach Configuration

    FC Switch Attach Configuration The topology only affects how mapped volumes and port WWNs are presented if one controller fails. Whichever topology is used, each data host has dual-ported access to volumes through both controllers. Failover in a switch attach, loop configuration. If one controller fails in a ■...
  • Page 261 For a system using loop topology, the following figure shows how port WWNs and mapped volumes are presented if controller B fails. A1 & B0 WWNs, A & B volumes A0 & B1 WWNs, A & B volumes A0 & B1 WWNs, A1 &...
  • Page 262 For a system using point-to-point topology, the following figure shows how port WWNs and mapped volumes are presented if controller B fails. B0 WWN, B volumes A0 WWN, A volumes A0 WWN, B0 WWNs, A volumes B volumes FC switch A0 WWN, B0 WWN, A volumes...
  • Page 263: Iscsi Switch Attach Configuration

    iSCSI Switch Attach Configuration The high-availability configuration requires two gigabit Ethernet (GbE) switches. During active-active operation, both controllers’ mapped volumes are visible to both data hosts. A dual-controller MSA2012i storage system uses port 0 of each controller as one failover pair and port 1 of each controller as a second failover pair. If one controller fails, all mapped volumes remain visible to all hosts.
  • Page 264 The following figure shows how port IP addresses and mapped volumes are presented if controller B fails. A0 IP, A volumes B1 IP, B volumes 1-GbE switch A0 IP, B0 IP, A & B volumes A1 IP, B1 IP, A & B volumes (Failed) data data...
  • Page 265: Sas Direct Attach Configurations

    SAS Direct Attach Configurations The SAS storage system uses Unified LUN Presentation (ULP). ULP is a controller software feature that enables hosts to access mapped volumes through both controllers’ host ports (target ports) without the need for internal or external switches.
  • Page 266 If a controller fails, the hosts maintain access to all of the volumes through the host ports on the surviving controller, as shown below. A0 WWN, A & B volumes A1 WWN, data data A & B volumes (Failed) Figure 7-3 SAS Storage Presentation During Failover (High-Availability, Dual- Controller, Direct Attach with Two Hosts) In the following configuration, each host has a non-redundant connection to all mapped volumes.
  • Page 267: Smu Menu Reference

    A P P E N D I X SMU Menu Reference This appendix shows the SMU menu hierarchy. As described in “Introducing and Using SMU” on page 17, user configuration affects the SMU menu. “Standard and Advanced User Functions” on page 267 lists the SMU functions ■...
  • Page 268 Table D-1 Monitor Menu – Standard and Advanced User Functions (Continued) Submenu Page Advanced Settings • Controller Versions “Controller Versions” on page 160 • FRU Information “FRU Information” on page 161 • Disk Drive List “Disk Drive List” on page 155 •...
  • Page 269 Table D-2 Manage Menu – Standard and Advanced User Functions Submenu Page Virtual Disk Vdisk Configuration Config • Vdisk Status “Virtual Disk Status” on page 71 • Disk Drive Status “Viewing Virtual Disk and Disk Drive Status Information” on page 71 •...
  • Page 270 Table D-2 Manage Menu – Standard and Advanced User Functions (Continued) Submenu Page Volume Volume Menu Management • Volume Status “Viewing Volume Status Information” on page 87 • Add Volume “Adding a Volume” on page 86 • Delete Volume “Deleting a Volume” on page 93 •...
  • Page 271 Table D-2 Manage Menu – Standard and Advanced User Functions (Continued) Submenu Page Volume Mapping • Map Hosts To Volume “Managing Volume Mappings” on page 99 • Manage Host List “Managing the Global Host List” on page 95 (FC only) Scheduler Manage Scheduler “Using the Scheduler”...
  • Page 272 Table D-2 Manage Menu – Standard and Advanced User Functions (Continued) Submenu Page System Configuration • “Changing the Cache Redundancy Mode” on page 58 • “Managing Dynamic Spares” on page 80 • “Changing Auto-Write-Through Triggers and Behaviors” on page 92 •...
  • Page 273 Table D-2 Manage Menu – Standard and Advanced User Functions (Continued) Submenu Page Configuration Utilities • Show Changed Settings “Viewing Changed Settings” on page 188 • Save Config File “Saving the Configuration to a File” on page 60 • Restore Config File “Restoring a Saved Configuration File”...
  • Page 274: Diagnostic User Functions

    Diagnostic User Functions The SMU menu options listed in the following table are available to Diagnostic Manage users for troubleshooting purposes. This guide does not include functions for use by service personnel. Table D-3 Manage Menu – Diagnostic User Functions Submenu Page Event Notification...
  • Page 275: Event Codes

    A P P E N D I X Event Codes Information in this appendix is for reference by storage administrators and technical support personnel to aid troubleshooting. Event messages appear in the event log, which you can view using SMU or the CLI, and in debug logs.
  • Page 276 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Informational Vdisk creation status. This event is or warning logged as informational if creation immediately failed, was canceled by the user, or succeeded. This event is logged as a warning if creation failed during initialization.
  • Page 277 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Informational The assigned LUN for this volume has changed. Informational The statistics for the specified vdisk have been reset. Informational Cache parameters have been changed for the specified vdisk.
  • Page 278 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Warning The sensors monitored a temperature • Check that the storage system’s or voltage in the warning range. fans are running. • Check that the ambient temperature is not too warm.
  • Page 279 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Informational A communication failure has occurred between the controller and an EMP. Informational An error detected by the sensors has been cleared. Informational The vdisk name has been changed. Informational A lengthy SCSI maintenance command has completed.
  • Page 280 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Informational A disk channel was reset from another initiator or target. Critical A serious error, which might indicate • If the controller recovers, no hardware failure, occurred while action is required.
  • Page 281 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Informational (Active-active environment) The two controllers are communicating with each other and cache redundancy is enabled. Informational The FC loop ID for the specified vdisk was changed to be consistent with the IDs of other vdisks.
  • Page 282 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Informational The controller has modified mode parameters on one or more drives. Informational The current controller has unkilled the partner controller. The other controller will restart. Informational The partner controller is changing state (shutting down or restarting).
  • Page 283 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Informational The partner controller does not have a mirrored configuration image for the current controller, so the current controller’s local flash configuration is being used. This event is expected if the other controller is new or its configuration has been cleared.
  • Page 284 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Critical The controller experienced the A service technician can use the specified critical error. In a non- debug log to determine the redundant configuration the controller problem.
  • Page 285 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Warning The controller has detected an invalid The single disk drive port should disk drive dual-port connection. This be connected to one controller only. connection does not have the benefit of fault tolerance.
  • Page 286 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Informational New software has been loaded on the Management Controller. Informational New loader software has been loaded on the Management Controller. Informational The Management Controller has been restarted from the Storage Controller.
  • Page 287 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Warning The host FC World Wide Names Verify the WWN information for (node and port) previously presented the other controller module on all by an offline controller module in this hosts that access it.
  • Page 288 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Warning or The specified SES alert condition was Most voltage and temperature informational detected in the enclosure indicated. errors and warnings relate to the power-and-cooling module. See “Power-and-Cooling Module Faults and Recommended Actions”...
  • Page 289 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Informational The error statistics for the specified drive have been reset. Informational The cache data for a missing volume was purged. Informational A host has been added to the list of hosts that can access, or be denied access to, a LUN.
  • Page 290 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Informational A disk channel that was previously degraded or failed is now healthy. 190–201 Informational Includes component-specific environmental indicator events generated by the auto-write-through feature when an environmental change occurs.
  • Page 291 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Informational Vdisk scrub has completed. The event message reports the number of: • Data parity mismatches for RAID 3, 5, 6, and 50 • Mirror verify errors for RAID 1 and 10 •...
  • Page 292 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Informational A previously created batch of snapshots is now committed and ready for use. The number of snapshots is specified. Informational The deletion of a batch of snapshots is complete.
  • Page 293 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Critical Background master write copy-on- A probable hardware failure has write operation has failed. prevented the software from operating successfully. Isolate and There was an internal I/O error. replace and failed hardware Could not complete the write components.
  • Page 294 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Warning The specified drive type is invalid One or more drives are not allowed and not allowed in the current for this platform. They have been configuration.
  • Page 295 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action 241–242 Informational Compact flash status events generated by the auto-write-through feature whenever an environmental change occurs. If an auto-write-through- trigger condition has been met, write- back cache is disabled.
  • Page 296 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Informational A valid license has been installed for the specified feature. This event is logged for each feature license installed. Warning A license could not be installed Check license parameters against (license is invalid).
  • Page 297 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Informational Port bypass circuits currently use the Perform a system-level shutdown service port, which may limit the link and restart. Note that this will speed or interconnect mode support. cause all data to be unavailable for about 1 minute.
  • Page 298 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Warning The controller’s real-time clock Check the system date and time. If (RTC) settings might be invalid after either is incorrect, set them to the an unexpected power loss.
  • Page 299 TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Critical A temperature sensor on a controller • Check that the storage system’s FRU detected an over-temperature fans are running. condition that caused the controller to •...
  • Page 300: Disk Drive Errors And Recommended Actions

    TABLE E-1 Event Descriptions and Recommended Actions (Continued) Event Code Event Type Description Recommended Action Critical A FRU has failed or is not operating Examine the FRU specified in the correctly. This event follows some message to determine whether it other FRU specific event indicating a needs to be replaced.
  • Page 301 TABLE E-2 Disk Drive Error Conditions and Recommended Actions (Continued) Status Recommended Action If the status of the virtual disk that originally had All data in the virtual disk is lost. Use the SMU the failed drive status is FATAL FAIL, two or Trust Virtual Disk function to attempt to bring the more drive modules have failed.
  • Page 302: Power-And-Cooling Module Faults And Recommended Actions

    Power-and-Cooling Module Faults and Recommended Actions As referred to in TABLE E-1, the following table lists power-and-cooling module faults and recommended actions. TABLE E-3 Power-and-Cooling Module Faults and Recommended Actions Fault Recommended Action Power supply fan warning • Check that all of the fans are working using SMU. or failure, or •...
  • Page 303: Glossary

    Glossary The glossary defines terms and acronyms used in MSA2000 Family storage system documentation. Definitions obtained from the Storage Networking Industry Association (SNIA) Dictionary are indicated with “(SNIA)” at the end. For the complete SNIA Dictionary, go to www.snia.org/education/dictionary active-active Synonym for dual active components or controllers.
  • Page 304 cache The location in which data is stored temporarily. There are a variety of cache types. Read cache holds data in anticipation that it will be requested. Write cache holds data written by a client until it can be stored on other (typically slower) storage media such as disk or tape. (SNIA) See also write-back cache, write-through cache.
  • Page 305 controller enclosure An enclosure that contains disk drives and one or two controller modules. See controller module. controller module A FRU that contains: a Storage Controller processor; a Management Controller processor; a SAS expander and Expander Controller processor; management interfaces; a LAN subsystem; cache protected by a capacitor pack and Compact Flash memory;...
  • Page 306 data mirroring Data written to one disk drive is simultaneously written to another disk drive. If one disk fails, the other disk can be used to run the virtual disk and reconstruct the failed disk. The primary advantage of disk mirroring is 100 percent data redundancy: since the disk is mirrored, it does not matter if one of the disks fails;...
  • Page 307 enclosure management processor (EMP) An Expander Controller subsystem that provides data about an enclosure’s environmental conditions such as temperature, power supply and fan status, and the presence or absence of disk drives. Ethernet adapter An adapter that connects an intelligent device to an Ethernet network. Usually called an Ethernet network interface card, or Ethernet NIC.
  • Page 308 fault-tolerant virtual disk A virtual disk that provides protection of data in the event of a single disk drive failure by employing RAID 1, 3, 5, 6, 10, or 50. RAID 6 also provides protection against the failure of two drives. See Fibre Channel (FC).
  • Page 309 host bus adapter (HBA) An adapter that connects a host I/O bus to a computer’s memory system. Host bus adapter is the preferred term in SCSI contexts. Adapter and NIC are the preferred terms in Fibre Channel contexts. The term NIC is used in networking contexts such as Ethernet and token ring.
  • Page 310 I/O module (IOM) See controller module and expansion module. Internet Protocol. ISCSI Qualified Name. iSCSI Internet Small Computer System Interface. iSNS Internet Storage Name Service. JBOD Just a Bunch of Disks. A drive enclosure that is directly attached to a host.
  • Page 311 management host A workstation with direct or network connections to a storage system’s management ports and that is used to manage the system. management information base (MIB) A database of managed objects accessed by network management protocols. An SNMP MIB is a set of parameters that an SNMP management station can query or set in the SNMP agent of a network device (for example, a router).
  • Page 312 out-of-band management Method of accessing and managing a system using the RS-232 or Ethernet connection. ownership In an active-active configuration, one controller has ownership of the following resources: virtual disks and vdisk spares. When a controller fails, the other controller assumes temporary ownership of its resources. Hardware component that converts between digital and analog in the signal path between the Storage Controller, Expander Controller, disk drives, and SAS ports.
  • Page 313 Reliability, availability, and serviceability. These headings refer to a variety of features and initiatives all designed to maximize equipment uptime and mean time between failures, minimize downtime and the length of time necessary to repair failures, and eliminate or decrease single points of failure in favor of redundancy.
  • Page 314 SCSI Enclosure Services (SES) An ANSI X3T10 standard for management of environmental factors such as temperature, power, voltage, etc. (SNIA) In MSA2000 Family storage systems, SES data is managed by the Expander Controller and EMP. secret For use with CHAP, a password that is shared between an initiator and a target to enable authentication.
  • Page 315 standard volume A volume that is not enabled for snapshots. standby See spare. state The current operational status of a disk drive, a virtual disk, or controller. A controller module stores the states of drives, virtual disks, and the controller in its nonvolatile memory. This information is retained across power interruptions.
  • Page 316 Unified LUN Provisioning. A MSA2012sa storage system feature that makes all volumes in the system accessible to hosts through all host ports on both controllers. ULP incorporates Asymmetric Logical Unit Access (ALUA) extensions. Universal Time. A modern time system related to the conventional Greenwich Mean Time (GMT) used for time zones.
  • Page 317 world wide name (WWN) A unique 64-bit number assigned by a recognized naming authority (often via block assignment to a manufacturer) that identifies a node process or node port. (SNIA) MSA2000 Family storage systems derive WWNs from the serial numbers of controller modules and expansion modules. world wide node name (WWNN) A globally unique 64-bit identifier assigned to each Fibre Channel node...
  • Page 318 HP StorageWorks 2000 Family Modular Smart Array reference guide • August 2008...
  • Page 319: Index

    Index setting, 93 triggering conditions, 92 access level available disk drives, displaying, 135 changing, 33 default user configuration, 31 definition, 31 setting, 34 background scrub displaying current configuration, 165 access privileges enabling and disabling, 189 See also user type changing, 33 backoff space, displaying, 176 definition, 32 bad block...
  • Page 320 capacity controller expanding snap pools, 111 changing virtual disk ownership, 78 expanding volumes, 87 displaying events, 220 displaying hardware versions, 160 CAPI displaying world wide name, 164 enabling or disabling for in-band management, 192 restarting, 61 Celsius shutting down, 61 configuring temperature status display, 30 status, 159 CHAP...
  • Page 321 reviewing error statistics, 200 deleting dedicated spares, 82 capturing trend data, 202 global spares, 83 SMART, enabling and disabling, 137 mapping, 100, 102, 103 spin-up retires, 175, 201 modified data on snapshots, 116 viewing by enclosure, 156 snapshots, 118 viewing firmware version, 139 users, 35 viewing graphical representation, 156 virtual disks, 79...
  • Page 322 errors See also software displaying media errors, 175, 201 controller displaying non-media errors, 175, 201 partner, disabling automatic update, 183 PHY, 205 updating, 182 reviewing disk drive statistics, 200 disk drives displaying version, 139 Ethernet link, displaying information for controllers, 158 stopping update, 141 event codes, 275 updating, 140...
  • Page 323 configuring, 39, 44 installing, 36 interconnects, 42 managing, 35 topology, 42 requirements, 35 displaying status, 152, 153, 154 viewing currently installed, 36 link speed, configuring, 40 link speed, configuring, 40 host ports, resetting, 185, 211 LIP, remotely issuing on host ports, 185, 211 hosts, mapping to volumes, 99, 100, 102 log information, saving, 192, 223 HTTP...
  • Page 324 memory controller Network Time Protocol. See NTP updating, 181 configuring, 37 menu hierarchy, 267 settings and status, view, 167 options shown based on user configuration, 32 metadata clearing, 136, 199 offline initialization, 67 online help, 27 differences between FA 2.2 and 4.0, 245 online initialization, 67 MIB, enterprise trap, 242 optimization, cache...
  • Page 325 creating for tasks, 131 deleting, 133 quarantined virtual disk, 213 viewing information about, 132 scheduling tasks, 215 SCSI Enclosure Services. See SES rack security specifying location, 143 configuring, 52 specifying number, 143 displaying current configuration, 166 RAID levels enabling local-intranet in browser, 18 comparison, 252 descriptions, 249 displaying firmware version, 162, 168...
  • Page 326 critical, 112 standard optimization, 90 default settings, 110 standard user type error, 111 changing, 33 setting values, 111 definition, 32 trigger behavior, 110 list of available functions, 267 warning, 111 setting, 34 reserve space, 110 standard volumes thresholds converting to master, 113 default settings, 110 creating, 63 setting values, 111...
  • Page 327 creating volume-copy, 129 See also WBI deleting, 131 available menu options based on user configuration, 32 scheduling, 131, 215 browser support, 18 viewing information about, 130 browser’s local-intranet security option, 18 technical support, contacting, 27 caching web pages, 51 telnet configuring preferences, 29 enabling, 52 definition, 17...
  • Page 328 modifying, 32 preventing critical state, 75, 213 setting access level, 34 redundant setting access to system interfaces, 34 reconstructing, 203 setting passwords, 34 status, 71, 150 setting user type, 34 verifying, 77 stopping, 77 user name and role, viewing current, 22, 32 visual alerts user type configuring, 55...
  • Page 329 viewing copy status, 125 visual representation of, 88 volumes, displaying current configuration, 164 write-back cache, 92 write-back cache, enabling and disabling, 91 warning conditions, displaying for virtual disks, 159 warning events, 219 selecting to monitor, 217 warning policy, snap pool default, 110 options, 111 setting, 111...
  • Page 330 HP StorageWorks 2000 Family Modular Smart Array reference guide • August 2008...

This manual is also suitable for:

Storageworks 2000 series

Table of Contents