HP 2000i Reference Manual

HP 2000i Reference Manual

Hp storageworks 2000 g2 modular smart array reference guide (500911-002, may 2009)
Hide thumbs Also See for 2000i:
Table of Contents

Advertisement

HP StorageWorks
2000 G2 Modular Smart Array
Reference Guide
Part number: 50091 1-002
First edition: May 2009

Advertisement

Table of Contents
loading

Summary of Contents for HP 2000i

  • Page 1 HP StorageWorks 2000 G2 Modular Smart Array Reference Guide Part number: 50091 1-002 First edition: May 2009...
  • Page 2 Legal and notice information © Copyright 2009 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
  • Page 3: Table Of Contents

    Contents About this guide ............11 Intended audience .
  • Page 4 Configuring user accounts ............34 Adding users.
  • Page 5 Changing a host's name ............57 Changing host mappings.
  • Page 6 External details for connUnitRevsTable ..........83 External details for connUnitSensorTable .
  • Page 7 Figures Relationship between a master volume and its snapshots and snap pool ..... . 20 Rolling back a master volume ........... 21 Creating a volume copy from a master volume or a snapshot .
  • Page 9 Tables Document conventions ............11 SMU communication status icons .
  • Page 11: About This Guide

    HP StorageWorks 2000 G2 Modular Smart Array Cable Configuration Guide • HP StorageWorks 2312fc and 2324fc User’s Guide • HP StorageWorks 2000i G2 Modular Smart Array User’s Guide • HP StorageWorks 2000sa G2 Modular Smart Array User’s Guide • HP StorageWorks 2000 G2 Modular Smart Array CLI Reference Guide •...
  • Page 12: Hp Technical Support

    CAUTION: Indicates that failure to follow directions could result in damage to equipment or data. NOTE: Provides additional information. TIP: Provides helpful hints and shortcuts. HP technical support Telephone numbers for worldwide technical support are listed on the HP support web site: http://www.hp.com/support/.
  • Page 13: Getting Started

    Getting started Storage Management Utility (SMU) is a web-based application for configuring, monitoring, and managing the storage system. Each controller module in the storage system contains a web server, which you access when you sign in to SMU. In a dual-controller system, you can access all functions from either controller. If one controller becomes unavailable, you can continue to manage the storage system from the partner controller.
  • Page 14: Tips For Signing In And Signing Out

    Click Sign In. If the system is available, the System Overview page is displayed; otherwise, a message indicates that the system is unavailable. Tips for signing in and signing out • Do not include a leading zero in an IP address. For example, enter 10.1.4.6 not 10.1.4.06. •...
  • Page 15: Tips For Using The Help Window

    Tips for using the help window • In the main panel, click the help icon to display help for the last-selected item, whether it is a component in the Configuration View panel or a subpanel in the main panel. • In the help window, click the table of contents icon to show or hide the Contents pane.
  • Page 16: About Vdisks

    • Locale. The user’s preferred display language, which overrides the system’s default display language. Installed language sets include Chinese-simplified, Chinese-traditional, Dutch, English, French, German, Italian, Japanese, Korean, and Spanish. Table 3 Settings for default users Name Password Level Type WBI CLI FTP Base Prec. Units Temp. Auto Locale Sign...
  • Page 17: About Volumes

    When a disk fails, the system looks for a dedicated spare first. If it does not find a properly sized dedicated spare, it looks for a global spare. If it does not find a properly sized global spare and the dynamic spares option is enabled, it takes any properly sized available disk.
  • Page 18: About Volume Mapping

    • Define CHAP secret in the host iSCSI initiator. • Request host login to the storage system. The host should be displayable by the system, as well as the ports through which connections were made. If it becomes necessary to add more hosts after CHAP is enabled, additional CHAP node names and secrets can be added.
  • Page 19: About Volume Cache Options

    About volume cache options You can set options that optimize reads and writes performed for each volume. Using write-back or write-through caching NOTE: Only disable write-back caching if you fully understand how the host operating system, application, and adapter move data. If used incorrectly, you might hinder system performance. You can change a volume's write-back cache setting.
  • Page 20: About The Snapshot Feature

    • The Maximum option lets the controller dynamically calculate the maximum read-ahead cache size for the volume. For example, if a single volume exists, this setting enables the controller to use nearly half the memory for read-ahead cache. Only use Maximum when disk latencies must be absorbed by cache.
  • Page 21: About The Volume Copy Feature

    The snapshot service has two features for reverting data back to original data: • Deleting only modified data on a snapshot. For snapshots that have been made accessible as read-write, you can delete just the modified (write) data that was written directly to a snapshot. When the modified data is deleted, the snapshot data reverts to the original data that was snapped.
  • Page 22: Creating A Volume Copy From A Master Volume Or A Snapshot

    Benefits include: • Additional data protection. An independent copy of a volume (versus logical copy through snapshot) provides additional data protection against a complete master volume failure. If the source master volume fails, the volume copy can be used to restore the volume to the point in time the volume copy was taken.
  • Page 23: About The Vds And Vss Hardware Providers

    About the VDS and VSS hardware providers Virtual Disk Service (VDS) enables host-based applications to manage vdisks and volumes. Volume Shadow Copy Service (VSS) enables host-based applications to manage snapshots. For more information, see the VDS and VSS hardware provider documentation for your product. About RAID levels The RAID controllers enable you to set up and manage vdisks, whose storage may be spread across multiple disks.
  • Page 24: Raid Level Comparison

    Table 5 RAID level comparison (continued) RAID Min. Description Strengths Weaknesses level disks Block-level data striping Best cost/performance for Write performance is slower than with distributed parity transaction-oriented networks; RAID 0 or RAID 1 very high performance and data protection; supports multiple simultaneous reads and writes;...
  • Page 25: About Size Representations

    About size representations In SMU panels, parameters such as names of users and volumes have a maximum length in bytes. ASCII characters are 1 byte; most Latin (Western European) characters with diacritics are 2 bytes; most Asian characters are 3 bytes. Operating systems usually show volume size in base 2.
  • Page 26: About Storage-Space Color Codes

    About storage-space color codes SMU panels use the following color codes to identify how storage space is used. Table 9 Storage-space color codes Area Color Meaning Overview panels Total space Available/free space Used space Reserved space, used for parity and snap pools, for example Vdisk panels Space used by spares Wasted space, due to use of mixed disk sizes...
  • Page 27: About Data Protection In A Single-Controller Storage System

    About data protection in a single-controller storage system A 2000 G2 Modular Smart Array storage system can be purchased or operated with a single controller. Because single-controller mode is not a redundant configuration, this section presents some considerations concerning data protection. A volume’s default caching mode is write back, as opposed to write through.
  • Page 28 Getting started...
  • Page 29: Configuring The System

    Configuring the system Using the Configuration Wizard The Configuration Wizard helps you initially configure the system or change system configuration settings. The wizard has several steps, which are highlighted at the bottom of the panel as you complete them. The last step prompts you to confirm changes before applying them.
  • Page 30: Step 5: Setting System Information

    • File Transfer Protocol (FTP). A secondary interface for installing firmware updates, downloading logs, and installing a license. • Simple Network Management Protocol (SNMP). Used for remote monitoring of the system through your network. • Service Interface. Used for technical support only. •...
  • Page 31: Step 7: Configuring Host Ports

    Click Next to continue. Step 7: Configuring host ports In order for hosts to properly access the system, you must configure the system's host-interface options. For FC ports you can set these options: • Speed can be set to auto, which auto-negotiates the proper link speed with the host, or to 2Gb (Gbit per second) or 4Gb.
  • Page 32: Step 8: Confirming Configuration Changes

    To change iSCSI host-interface settings For each iSCSI port, set the IP address, netmask, and gateway. For all iSCSI ports, set the authentication, jumbo frames, link speed, and iSNS options. Click Next to continue. Step 8: Confirming configuration changes Confirm that the values listed in the wizard panel are correct. •...
  • Page 33: Configuring System Services

    To install a permanent license Ensure that: • The license file is saved to a network location that SMU can access. • You are signed into the controller enclosure that the file was generated for. In the Configuration View panel, right-click the system and select Tools > Install License. Click Browse to locate and select the license file.
  • Page 34: Configuring Email Notification

    Configuring email notification To configure email notification of events In the Configuration View panel, right-click the system and select Configuration > Services > Email Notification. In the main panel, set the options: • Notification Level. Select the minimum severity for which the system should send notifications: Critical (only);...
  • Page 35: Modifying Users

    • User Type. Select Standard to allow access to standard functions, or Advanced to allow access to all functions except diagnostic functions, or Diagnostic to allow access to all functions. NOTE: This release has no functions that require Advanced or Diagnostic access; a Standard user can access all functions.
  • Page 36: Removing Users

    • Temperature Preference. Specifies to use either the Celsius scale or the Fahrenheit scale for temperature values. • Auto Sign Out. Select the amount of time that the user's session can be idle before the user is automatically signed out: 5, 15, or 30 minutes, or Never (9999 minutes). The default is 30 minutes. •...
  • Page 37: Changing Host Interface Settings

    Changing host interface settings In order for hosts to properly access the system, you must configure the system's host-interface options. There are options for FC and iSCSI ports but not for SAS ports. To change FC host interface settings In the Configuration View panel, right-click the system and select Configuration > System Settings > Host Interfaces.
  • Page 38: Changing Network Interface Settings

    • Link Speed. Sets the link speed to auto, which allows the system to negotiate the proper speed, or forces it to 1 Gbit/sec (1g). The default is auto. • iSNS. Enables or disables registration with a specified Internet Storage Name Service server, which provides name-to-IP-address mapping.
  • Page 39: Configuring Advanced Settings

    Configuring advanced settings Changing disk settings Configuring SMART Self-Monitoring Analysis and Reporting Technology (SMART) provides data that enables you to monitor disks and analyze why a disk failed. When SMART is enabled, the system checks for SMART events one minute after a restart and every five minutes thereafter. SMART events are recorded in the event log. To change the SMART setting In the Configuration View panel, right-click the system and select Configuration >...
  • Page 40: Changing Cache Settings

    Changing cache settings Changing the synchronize-cache mode You can control how the storage system handles the command. Typically you SCSI SYNCHRONIZE CACHE can use the default setting. However, if the system has performance problems or problems writing to databases or other applications, contact technical support to determine if you should change this option. To change the synchronize-cache mode In the Configuration View panel, right-click the system and select Configuration >...
  • Page 41: Changing Auto-Write-Through Cache Triggers And Behaviors

    Changing auto-write-through cache triggers and behaviors You can set conditions that cause (“trigger”) a controller to change the cache mode from write-back to write-through, as described in About volume cache options on page 19. You can also specify actions for the system to take when write-through caching is triggered.
  • Page 42: Configuring Utility Priority

    TIP: If you choose to disable background scrub, you can still scrub selected vdisks by using Media Scrub Vdisk. To change the background scrub setting In the Configuration View panel, right-click the system and select Configuration > Advanced Settings > System Utilities.
  • Page 43: Changing A Vdisk's Name

    Changing a vdisk's name To change a vdisk's name In the Configuration View panel, right-click a vdisk and select Configuration > Modify Vdisk Name. The main panel shows the vdisk's name. Enter a new name. A vdisk name is case sensitive and cannot already exist in the system. A name cannot include a comma, double quote, or backslash.
  • Page 44: Changing A Volume's Cache Settings

    Changing a volume's cache settings CAUTION: • Only disable write-back caching if you fully understand how the host operating system, application, and adapter move data. If used incorrectly, you might hinder system performance. • Only change read-ahead cache settings if you fully understand how the host operating system, application, and adapter move data so that you can adjust the settings accordingly.
  • Page 45: Provisioning The System

    Provisioning the system Using the Provisioning Wizard The Provisioning Wizard helps you create a vdisk with volumes and to map the volumes to hosts. The wizard has several steps, which are highlighted at the bottom of the panel as you complete them. The last step prompts you to confirm changes before applying them.
  • Page 46: Step 3: Selecting Disks

    Step 3: Selecting disks Select disks to include in the vdisk. The Disk Selection Sets table has one row for each sub-vdisk in a RAID- 1 0 or RAID-50 vdisk, or a single row for a vdisk having another RAID level. The table also has a SPARE row where you can assign dedicated pares to the vdisk.
  • Page 47: Step 6: Confirming Vdisk Settings

    Select the access level that hosts will have to the volumes: read-write, read-only, or no-access (masked). Click Next to continue. Step 6: Confirming vdisk settings Confirm that the values listed in the wizard panel are correct. • If they are not correct, click Previous to return to previous steps and make necessary changes. •...
  • Page 48: Expanding A Vdisk

    Expanding a vdisk You can expand the capacity of a vdisk by adding disks to it. Host I/O to the vdisk can continue while the expansion proceeds. You can then create or expand a volume to use the new free space, which becomes available when the expansion is complete.
  • Page 49: Creating A Volume Set

    Creating a volume set In a vdisk that has sufficient free space, you can create multiple volumes with the same base name, size, and default mapping settings. To create a volume set In the Configuration View panel, right-click a vdisk and select Provisioning > Create Volume Set. In the main panel, set the options: •...
  • Page 50: Deleting Volumes

    Deleting volumes CAUTION: Deleting a volume removes its mappings and deletes its data. To delete volumes Verify that hosts are not accessing the volumes that you want to delete. In the Configuration View panel, either: • Right-click the system or Vdisks or a vdisk and then select Provisioning > Delete Volumes. •...
  • Page 51: Changing A Volume's Explicit Mappings

    Changing a volume's explicit mappings CAUTION: Volume mapping changes take effect immediately. Make changes that limit access to volumes when the volumes are not in use. Be sure to unmount a mapped volume from a host system before changing the mapping's LUN. To view volume mappings In the Configuration View panel, right-click a volume and select Provisioning >...
  • Page 52: Creating Multiple Snapshots

    Creating multiple snapshots You can select multiple volumes and immediately create a snapshot of each volume. To create multiple snapshots In the Configuration View panel, right-click the system or Vdisks or a vdisk and then select Provisioning > Create Snapshots. In the main panel, select each volume to take a snapshot of.
  • Page 53: Deleting A Snapshot

    Deleting a snapshot When you delete a snapshot, all data uniquely associated with that snapshot is deleted and associated space in the snap pool is freed for use. Snapshots can be deleted in any order, irrespective of the order in which they were created.
  • Page 54: Creating A Volume Copy

    Creating a volume copy With the appropriate license, you can copy a volume or a snapshot to a new standard volume. The destination volume must be in a vdisk owned by the same controller as the source volume. If the source volume is a snapshot, you can choose whether to include its modified data (data written to the snapshot since it was created).
  • Page 55: Aborting A Volume Copy

    • With Modified Data. If the source volume is a snapshot, select this option to include the snapshot’s modified data in the copy. Otherwise, the copy will contain only the data that existed when the snapshot was created. • Start Schedule. Specify a date and a time in the future for the schedule to start running. •...
  • Page 56: Adding A Host

    To roll back a volume Unmount the volume from hosts. If the roll back will include snapshot modified data, unmount the snapshot from hosts. In the Configuration View panel, right-click a volume and select Provisioning > Roll Back Volume. In the main panel, set the options: •...
  • Page 57: Changing A Host's Name

    Changing a host's name To change a host's name In the Configuration View panel, right-click a host and select Provisioning > Rename Host. Enter a new name that helps you easily identify the host; for example, MailServer_P1. A host name is case sensitive and cannot already exist in the system.
  • Page 58: Configuring Chap

    Configuring CHAP For iSCSI, you can use Challenge-Handshake Authentication Protocol (CHAP) to perform authentication between the initiator and target of a login request. To perform this identification, a database of CHAP entries must exist on each device. Each CHAP entry can specify one name-secret pair to authenticate the initiator only (one-way CHAP) or two pairs to authenticate both the initiator and the target (mutual CHAP).
  • Page 59: Using System Tools

    Using system tools Updating firmware You can view the current versions of firmware in controller modules, expansion modules (in drive enclosures), and disks, and install new versions. TIP: To ensure success of an online update, select a period of low I/O activity. This helps the update complete as quickly as possible and avoids disruptions to host and applications due to timeouts.
  • Page 60: Updating Disk Firmware

    To update expansion module firmware Obtain the appropriate firmware file and download it to your computer or network. Stop I/O to vdisks before starting the firmware update. In the Configuration View panel, right-click the system and select Tools > Update Firmware. The table titled Current Versions of All Expansion Modules (EMPs) shows the currently installed versions.
  • Page 61: Saving Logs

    If the updated disks must be power cycled: a. Shut down both controllers; see Restarting or shutting down controllers on page 62. b. Power cycle all enclosures as described in your product’s user guide. NOTE: If you loaded firmware to a Seagate 750-Gbyte Barracuda ES SATA drive, after spin-up it will be busy for about 50 seconds completing its update.
  • Page 62: Rescanning Disk Channels

    Rescanning disk channels A rescan forces a rediscovery of disks and enclosures in the storage system. If two Storage Controllers are online, rescan also reassigns the enclosure IDs of attached enclosures based on controller A's enclosure cabling order. A manual rescan may be needed after system power-up to display enclosures in the proper order.
  • Page 63: Shutting Down

    To perform a restart In the Configuration View panel, right-click the local system and select Configuration > Shut Down or Restart Controller. In the main panel, set the options: • Select the Restart operation. • Select the type of controller processor to restart. •...
  • Page 64: Verifying A Vdisk

    Verifying a vdisk If you suspect that a redundant (mirror or parity) vdisk has a problem, you can run the Verify utility to check the vdisk's integrity. For example, if the storage system was operating outside the normal temperature range, you might want to verify its vdisks. The Verify utility checks whether the redundancy data in the vdisk is consistent with the user data in the vdisk.
  • Page 65: Removing A Vdisk From Quarantine

    Removing a vdisk from quarantine A previously fault-tolerant vdisk becomes quarantined when not all of its disks are detected after a restart or rescan. A quarantined vdisk is shown with health Critical and status QTCR or QTOF. Quarantine isolates the vdisk from host access, and prevents the storage system from making the vdisk critical and starting reconstruction when disks are “missing”...
  • Page 66 Using system tools...
  • Page 67: Viewing System Status

    Viewing system status Viewing information about the system In the Configuration View panel, right-click the system and select View > Overview. The System Overview table shows: • The system’s health: OK. The system is operating normally. Degraded. Fault. Unknown. At least one component is degraded or has a fault. •...
  • Page 68: Snapshot Properties

    Snapshot properties When you select the Snapshots component a table shows each snapshot's name, serial number, source volume, snap-pool name, amounts of snap data, unique data, and shared data, and vdisk name. • Snap data is the total amount of data associated with the specific snapshot (data copied from a source volume to a snapshot and data written directly to a snapshot).
  • Page 69: Viewing Information About All Vdisks

    NOTE: If you are having a problem with the system or a vdisk, check the event log before calling technical support. Event messages might enable you to resolve the problem. When reviewing events, do the following: For any critical or warning events, look for recommended actions in the Event code reference appendix.
  • Page 70: Viewing Information About A Vdisk

    • Current Owner. Either the preferred owner during normal operation or the partner controller when the preferred owner is offline. • Disks. • Spares. Viewing information about a vdisk In the Configuration View panel, right-click a vdisk and select View > Overview. The Vdisks Overview table shows: •...
  • Page 71: Disk Properties

    • OFFL: The vdisk is offline because it is using offline initialization, or because disks are down and data may be lost. • QTCR: The vdisk is in a critical state and has been quarantined because some disks are missing. •...
  • Page 72: Volume Properties

    Volume properties When you select the Volumes component, the Volumes table shows: • The volume’s name, serial number, and size • The name of the vdisk containing the volume Snap-pool properties When you select the Snap Pools component, the Snap Pools table shows: •...
  • Page 73: Schedule Properties

    Schedule properties If any schedules exist for this volume, when you select the Schedules component, the Schedules table shows information about each schedule. For the selected schedule, the Schedule Details table shows: • Schedule Name. • Schedule Specification. • Schedule Status. •...
  • Page 74: Mapping Properties

    Mapping properties When you select the Maps component, the Maps for Volume table shows: • Type. Explicit or Default. Settings for an explicit mapping override the default mapping. • Host ID. WWPN or IQN. • Name. Host name. • Ports. Controller host ports through which the volume is mapped to the host. •...
  • Page 75: Host Properties

    Host properties When you select the Host component, the Properties for Host table shows: • Host ID. WWPN or IQN. • Name. • Discovered. If the host was discovered and its entry was automatically created, Yes. If the host entry was manually created, No.
  • Page 76 Viewing system status...
  • Page 77: Asnmp Reference

    SNMP reference This appendix describes the Simple Network Management Protocol (SNMP) capabilities that 2000 G2 Modular Smart Array storage systems support. This includes standard MIB-II, the FibreAlliance SNMP Management Information Base (MIB) version 2.2 objects, and enterprise traps. 2000 G2 Modular Smart Array storage systems can report their status through SNMP. SNMP provides basic discovery using MIB-II, more detailed status with the FA MIB 2.2, and asynchronous notification using enterprise traps.
  • Page 78: Fa Mib 2.2 Snmp Behavior

    FA MIB 2.2 SNMP behavior The FA MIB 2.2 objects are in compliance with the FibreAlliance MIB v2.2 Specification (FA MIB2.2 Spec). For a full description of this MIB, go to: http://www.emc.com/microsites/fibrealliance. FA MIB 2.2 is a subset of FA MIB 4.0, which is included with HP System Insight Manager (SIM) and other products.
  • Page 79 Table 10 FA MIB 2.2 objects, descriptions, and values (continued) Object Description Value Includes the following objects as specified by the FA MIB2.2 Spec connUnitTable Unique identification for this Total of 16 bytes comprised of 8 connUnitId connectivity unit bytes of the node WWN or similar serial number-based identifier (for example, 1000005013b0521 1) with the trailing 8 bytes equal to zero...
  • Page 80 Table 10 FA MIB 2.2 objects, descriptions, and values (continued) Object Description Value Settable: Contact information for this Default: Uninitialized Contact connUnitContact connectivity unit Settable: Location information for this Default: Uninitialized Location connUnitLocation connectivity unit Defines the event severity that will be Default: info[8] connUnitEventFilter logged by this connectivity unit.
  • Page 81 Table 10 FA MIB 2.2 objects, descriptions, and values (continued) Object Description Value Includes the following objects as specified by the FA MIB2.2 Spec connUnitPortTable connUnitId of the connectivity unit Same as connUnitId connUnitPortUnitId that contains this port Unique value for each Unique value for each port, between connUnitPortIndex connUnitPortEntry between 1...
  • Page 82 Table 10 FA MIB 2.2 objects, descriptions, and values (continued) Object Description Value Includes the following objects as specified by the FA MIB2.2 Spec connUnitEventTable connUnitId of the connectivity unit Same as connUnitId connUnitEventUnitId that contains this port Index into the connectivity unit’s Starts at 1 every time there is a table connUnitEventIndex event buffer, incremented for each...
  • Page 83: External Details For Certain Fa Mib 2.2 Objects

    Table 10 FA MIB 2.2 objects, descriptions, and values (continued) Object Description Value • Specifies the state of the row READ: rowActive[3] if traps are trapRegRowState enabled through Telnet; otherwise rowInactive[2] • WRITE: Not supported External details for certain FA MIB 2.2 objects Tables in this section specify values for certain objects described in Table External details for connUnitRevsTable...
  • Page 84: External Details For Connunitsensortable

    External details for connUnitSensorTable Table 12 connUnitSensorTable index, name, type, and characteristic values connUnitSensorIndex connUnitSensorName connUnitSensorType connUnitSensor Characteristic CPU Temperature (Controller A) board [8] temperature[3] CPU Temperature (Controller B) board [8] temperature[3] FPGA Temperature (Controller A) board [8] temperature[3] FPGA Temperature (Controller B) board [8] temperature[3] Onboard Temperature 1 (Controller A)
  • Page 85: External Details For Connunitporttable

    -- ---------------------------------------------------------------------------- -- MSA2000 Array MIB for SNMP Traps -- $Revision: 11692 $ -- Copyright (c) 2008 Hewlett-Packard Development Company, L.P. -- Copyright (c) 2005-2008 Dot Hill Systems Corp. -- Confidential computer software. Valid license from HP required for possession, -- use or copying.
  • Page 86 FROM RFC-1215 connUnitEventId, connUnitEventType, connUnitEventDescr FROM FA-MIB40; --Textual conventions for this MIB ---------------------------------------------------------------------- -- vendor OBJECT IDENTIFIER ::= { enterprises 11 } OBJECT IDENTIFIER ::= { hp 2 } hpMSA OBJECT IDENTIFIER ::= { nm 51 } -- Related traps msaEventInfoTrap TRAP-TYPE ENTERPRISE hpMSA VARIABLES { connUnitEventId,...
  • Page 87: Fa Mib 2.2 And 4.0 Differences

    -- Trap annotations are as follows: --#TYPE "Error storage event" --#SUMMARY "Error storage event # %d, type %d, description: %s" --#ARGUMENTS {0,1,2} --#SEVERITY MAJOR --#TIMEINDEX 6 ::= 3003 msaEventCriticalTrap TRAP-TYPE ENTERPRISE hpMSA VARIABLES { connUnitEventId, connUnitEventType, connUnitEventDescr } DESCRIPTION "An event has been generated by the storage array. Recommended severity level (for filtering): critical"...
  • Page 88 SNMP reference...
  • Page 89: B Event Code Reference

    Event code reference Information in this appendix is for reference by storage administrators and technical support personnel to aid troubleshooting. An event code identifies a type of event that has occurred in the storage system, and corresponds to an event message that is recorded in the system’s event log, which you can view using SMU or the CLI. You may also receive notifications, depending on your SMU event notification settings.
  • Page 90 Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Informational A rescan has completed. Informational A firmware update has completed. Informational Vdisk verification has completed. This event or warning is logged as informational if the command fails immediately, succeeds, or is aborted by the user;...
  • Page 91 Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Critical The sensors monitored a temperature or • Check that the storage system’s fans are voltage in the failure range. running. • Check that the ambient temperature is not too warm.
  • Page 92 Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code • Warning or The controller detected an error while For warning events that indicate a disk is informational communicating with the specified SCSI bad, replace that disk. device.
  • Page 93 Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Informational The specified volume’s LUN has been If you want hosts to access the volume data unassigned because it conflicts with LUNs on the inserted disks, map the volume with a assigned to other volumes.
  • Page 94 Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Informational The partner controller does not have a mirrored configuration image for the current controller, so the current controller’s local flash configuration is being used. This event is expected if the other controller is new or its configuration has been cleared.
  • Page 95 Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code 1 16 Critical After a recovery, the partner controller was To determine if data might have been lost, killed while mirroring write-back data to the check whether this event was immediately current controller.
  • Page 96 Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Informational One or more enclosures do not have a valid path to an EMP. All enclosure EMPs are disabled. Warning The host WWNs (node and port) previously Verify the WWN information for this presented by this controller module in this controller module on all hosts that access it.
  • Page 97 Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Informational The specified SES alert condition has been This event is generated when the problem cleared in the enclosure indicated. that caused event 168 is cleared. Informational The last rescan indicates that the specified enclosure was added to the system.
  • Page 98 Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code 190– Informational Includes component-specific environmental indicator events generated by the auto-write-through feature when an environmental change occurs. If an auto-write-through-trigger condition has been met, write-back cache is disabled and event 188 is also logged.
  • Page 99 Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Informational The creation of snapshots is complete. The number of snapshots is specified. Informational A previously created batch of snapshots is now committed and ready for use. The number of snapshots is specified.
  • Page 100 Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Warning The snap pool has reached the snap pool You can expand the snap pool or delete error threshold. snapshots. The system will take the action set up in the policy.
  • Page 101 Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Informational An existing disk channel target device is not Check the indicated target device for bad responding to SCSI discovery commands. hardware or bad cable, then initiate a rescan.
  • Page 102 Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Informational Port bypass circuits currently use the service Perform a system-level shutdown and restart. port, which may limit the link speed or Note that this will cause all data to be interconnect mode support.
  • Page 103 Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Informational An old serial number in SC flash memory has been updated to a new serial number. Critical A temperature sensor on a controller FRU Check that the storage system’s fans are detected an over-temperature condition that running.
  • Page 104 Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Warning The controller has an older SC version than Upgrade to an SC version that is current for the version used to create the CHAP the indicated database version.
  • Page 105: Disk Error Conditions And Recommended Actions

    As referred to in Table 14, the following table lists disk- error conditions and recommended actions. Table 15 Disk error conditions and recommended actions Status Recommended action The status of the vdisk that originally had the failed disk Use SMU to assign the new disk as either a global spare status is Good.
  • Page 106 106 Event code reference...
  • Page 107: C Using Ftp To Download Logs And Update Firmware

    Using FTP to download logs and update firmware Although SMU is the preferred interface for downloading logs, updating firmware, and installing a license, you can also use FTP to do these tasks. Downloading system logs To help service personnel diagnose a system problem, you might be asked to download and submit system log data.
  • Page 108: Updating Controller Module Firmware

    Updating controller module firmware A controller enclosure can contain one or two controller modules. In a dual-controller system, both controllers should run the same firmware version. You can update the firmware in each controller module by loading a firmware file obtained from the HP web download site, http://www.hp.com/go/msa. To install an HP ROM Flash Component or firmware Smart Component, follow the instructions on the HP web site;...
  • Page 109: Updating Expansion Module Firmware

    Updating expansion module firmware A drive enclosure can contain one or two expansion modules. Each expansion module contains an enclosure management processor (EMP). All modules of the same model should run the same firmware version. You can update the firmware in each expansion module by loading a firmware file obtained from the HP web download site, http://www.hp.com/go/msa.
  • Page 110: Updating Disk Firmware

    Updating disk firmware You can update disk firmware by loading a firmware file obtained from the HP web download site, http://www.hp.com/go/msa, or from the disk manufacturer. To install an HP ROM Flash Component or firmware Smart Component, follow the instructions on the HP web site; otherwise, to install a firmware binary file, follow the steps below.
  • Page 111: Installing A License File

    Quit the FTP session. If the updated disks must be power cycled: a. Shut down both controllers by using SMU. b. Power cycle all enclosures as described in your product’s user guide. NOTE: If you loaded firmware to a Seagate 750-Gbyte Barracuda ES SATA drive, after spin-up it will be busy for about 50 seconds completing its upgrade.
  • Page 112 112 Using FTP to download logs and update firmware...
  • Page 113: Glossary

    Glossary CHAP Challenge-Handshake Authentication Protocol. chunk size The amount of contiguous data that is written to a vdisk member before moving to the next member of the vdisk. dedicated spare A disk that is reserved for use by a specific vdisk to replace a failed disk. default mapping Host-access settings that are configured when a volume is created.
  • Page 114 snap pool A volume that stores data that is specific to snapshots of an associated master volume, including copy-on-write data and data written explicitly to the snapshots. A snap pool cannot be mapped. snapshot A “virtual” volume that preserves the state of a master volume’s data as it existed when the snapshot was created.
  • Page 115: Index

    Index Symbols dedicated spares adding and removing * (asterisk) in option name default mapping DHCP configuring asterisk (*) in option name configuring with Configuration Wizard audience disk properties state (how used) values browser disk channels buttons to avoid rescanning setup disk metadata bytes versus characters clearing...
  • Page 116 using WBI to update expansion module versions leftover disk firmware update, partner licensed features configuring managing snapshot downloading system logs status updating controller module firmware using FTP to install license file updating disk drive firmware volume copy updating expansion module firmware link speed configuring FC configuring iSCSI...
  • Page 117 Provisioning Wizard properties using to create a vdisk with volumes and mappings resetting to current data in master volume viewing information about snapshot mapping properties snapshots about quarantined vdisk creating for multiple volumes SNMP configuring traps RAID levels differences between FA MIB 2.2 and 4.0 about enterprise trap MIB read-ahead caching...
  • Page 118 about volume mapping unique data (snapshot) about Universal Time (UT) properties users volume masking about user accounts volume set adding creating change default passwords with Configuration Wizard volumes about maximum that can sign in deleting modifying removing utility priority configuring about communication status icon session hang...

Table of Contents