Contents About this guide ............11 Intended audience .
Page 4
Configuring user accounts ............34 Adding users.
Page 5
Changing a host's name ............57 Changing host mappings.
Page 6
External details for connUnitRevsTable ..........83 External details for connUnitSensorTable .
Page 7
Figures Relationship between a master volume and its snapshots and snap pool ..... . 20 Rolling back a master volume ........... 21 Creating a volume copy from a master volume or a snapshot .
Page 9
Tables Document conventions ............11 SMU communication status icons .
CAUTION: Indicates that failure to follow directions could result in damage to equipment or data. NOTE: Provides additional information. TIP: Provides helpful hints and shortcuts. HP technical support Telephone numbers for worldwide technical support are listed on the HP support web site: http://www.hp.com/support/.
Getting started Storage Management Utility (SMU) is a web-based application for configuring, monitoring, and managing the storage system. Each controller module in the storage system contains a web server, which you access when you sign in to SMU. In a dual-controller system, you can access all functions from either controller. If one controller becomes unavailable, you can continue to manage the storage system from the partner controller.
Click Sign In. If the system is available, the System Overview page is displayed; otherwise, a message indicates that the system is unavailable. Tips for signing in and signing out • Do not include a leading zero in an IP address. For example, enter 10.1.4.6 not 10.1.4.06. •...
Tips for using the help window • In the main panel, click the help icon to display help for the last-selected item, whether it is a component in the Configuration View panel or a subpanel in the main panel. • In the help window, click the table of contents icon to show or hide the Contents pane.
• Locale. The user’s preferred display language, which overrides the system’s default display language. Installed language sets include Chinese-simplified, Chinese-traditional, Dutch, English, French, German, Italian, Japanese, Korean, and Spanish. Table 3 Settings for default users Name Password Level Type WBI CLI FTP Base Prec. Units Temp. Auto Locale Sign...
When a disk fails, the system looks for a dedicated spare first. If it does not find a properly sized dedicated spare, it looks for a global spare. If it does not find a properly sized global spare and the dynamic spares option is enabled, it takes any properly sized available disk.
• Define CHAP secret in the host iSCSI initiator. • Request host login to the storage system. The host should be displayable by the system, as well as the ports through which connections were made. If it becomes necessary to add more hosts after CHAP is enabled, additional CHAP node names and secrets can be added.
About volume cache options You can set options that optimize reads and writes performed for each volume. Using write-back or write-through caching NOTE: Only disable write-back caching if you fully understand how the host operating system, application, and adapter move data. If used incorrectly, you might hinder system performance. You can change a volume's write-back cache setting.
• The Maximum option lets the controller dynamically calculate the maximum read-ahead cache size for the volume. For example, if a single volume exists, this setting enables the controller to use nearly half the memory for read-ahead cache. Only use Maximum when disk latencies must be absorbed by cache.
The snapshot service has two features for reverting data back to original data: • Deleting only modified data on a snapshot. For snapshots that have been made accessible as read-write, you can delete just the modified (write) data that was written directly to a snapshot. When the modified data is deleted, the snapshot data reverts to the original data that was snapped.
Benefits include: • Additional data protection. An independent copy of a volume (versus logical copy through snapshot) provides additional data protection against a complete master volume failure. If the source master volume fails, the volume copy can be used to restore the volume to the point in time the volume copy was taken.
About the VDS and VSS hardware providers Virtual Disk Service (VDS) enables host-based applications to manage vdisks and volumes. Volume Shadow Copy Service (VSS) enables host-based applications to manage snapshots. For more information, see the VDS and VSS hardware provider documentation for your product. About RAID levels The RAID controllers enable you to set up and manage vdisks, whose storage may be spread across multiple disks.
Table 5 RAID level comparison (continued) RAID Min. Description Strengths Weaknesses level disks Block-level data striping Best cost/performance for Write performance is slower than with distributed parity transaction-oriented networks; RAID 0 or RAID 1 very high performance and data protection; supports multiple simultaneous reads and writes;...
About size representations In SMU panels, parameters such as names of users and volumes have a maximum length in bytes. ASCII characters are 1 byte; most Latin (Western European) characters with diacritics are 2 bytes; most Asian characters are 3 bytes. Operating systems usually show volume size in base 2.
About storage-space color codes SMU panels use the following color codes to identify how storage space is used. Table 9 Storage-space color codes Area Color Meaning Overview panels Total space Available/free space Used space Reserved space, used for parity and snap pools, for example Vdisk panels Space used by spares Wasted space, due to use of mixed disk sizes...
About data protection in a single-controller storage system A 2000 G2 Modular Smart Array storage system can be purchased or operated with a single controller. Because single-controller mode is not a redundant configuration, this section presents some considerations concerning data protection. A volume’s default caching mode is write back, as opposed to write through.
Configuring the system Using the Configuration Wizard The Configuration Wizard helps you initially configure the system or change system configuration settings. The wizard has several steps, which are highlighted at the bottom of the panel as you complete them. The last step prompts you to confirm changes before applying them.
• File Transfer Protocol (FTP). A secondary interface for installing firmware updates, downloading logs, and installing a license. • Simple Network Management Protocol (SNMP). Used for remote monitoring of the system through your network. • Service Interface. Used for technical support only. •...
Click Next to continue. Step 7: Configuring host ports In order for hosts to properly access the system, you must configure the system's host-interface options. For FC ports you can set these options: • Speed can be set to auto, which auto-negotiates the proper link speed with the host, or to 2Gb (Gbit per second) or 4Gb.
To change iSCSI host-interface settings For each iSCSI port, set the IP address, netmask, and gateway. For all iSCSI ports, set the authentication, jumbo frames, link speed, and iSNS options. Click Next to continue. Step 8: Confirming configuration changes Confirm that the values listed in the wizard panel are correct. •...
To install a permanent license Ensure that: • The license file is saved to a network location that SMU can access. • You are signed into the controller enclosure that the file was generated for. In the Configuration View panel, right-click the system and select Tools > Install License. Click Browse to locate and select the license file.
Configuring email notification To configure email notification of events In the Configuration View panel, right-click the system and select Configuration > Services > Email Notification. In the main panel, set the options: • Notification Level. Select the minimum severity for which the system should send notifications: Critical (only);...
• User Type. Select Standard to allow access to standard functions, or Advanced to allow access to all functions except diagnostic functions, or Diagnostic to allow access to all functions. NOTE: This release has no functions that require Advanced or Diagnostic access; a Standard user can access all functions.
• Temperature Preference. Specifies to use either the Celsius scale or the Fahrenheit scale for temperature values. • Auto Sign Out. Select the amount of time that the user's session can be idle before the user is automatically signed out: 5, 15, or 30 minutes, or Never (9999 minutes). The default is 30 minutes. •...
Changing host interface settings In order for hosts to properly access the system, you must configure the system's host-interface options. There are options for FC and iSCSI ports but not for SAS ports. To change FC host interface settings In the Configuration View panel, right-click the system and select Configuration > System Settings > Host Interfaces.
• Link Speed. Sets the link speed to auto, which allows the system to negotiate the proper speed, or forces it to 1 Gbit/sec (1g). The default is auto. • iSNS. Enables or disables registration with a specified Internet Storage Name Service server, which provides name-to-IP-address mapping.
Configuring advanced settings Changing disk settings Configuring SMART Self-Monitoring Analysis and Reporting Technology (SMART) provides data that enables you to monitor disks and analyze why a disk failed. When SMART is enabled, the system checks for SMART events one minute after a restart and every five minutes thereafter. SMART events are recorded in the event log. To change the SMART setting In the Configuration View panel, right-click the system and select Configuration >...
Changing cache settings Changing the synchronize-cache mode You can control how the storage system handles the command. Typically you SCSI SYNCHRONIZE CACHE can use the default setting. However, if the system has performance problems or problems writing to databases or other applications, contact technical support to determine if you should change this option. To change the synchronize-cache mode In the Configuration View panel, right-click the system and select Configuration >...
Changing auto-write-through cache triggers and behaviors You can set conditions that cause (“trigger”) a controller to change the cache mode from write-back to write-through, as described in About volume cache options on page 19. You can also specify actions for the system to take when write-through caching is triggered.
TIP: If you choose to disable background scrub, you can still scrub selected vdisks by using Media Scrub Vdisk. To change the background scrub setting In the Configuration View panel, right-click the system and select Configuration > Advanced Settings > System Utilities.
Changing a vdisk's name To change a vdisk's name In the Configuration View panel, right-click a vdisk and select Configuration > Modify Vdisk Name. The main panel shows the vdisk's name. Enter a new name. A vdisk name is case sensitive and cannot already exist in the system. A name cannot include a comma, double quote, or backslash.
Changing a volume's cache settings CAUTION: • Only disable write-back caching if you fully understand how the host operating system, application, and adapter move data. If used incorrectly, you might hinder system performance. • Only change read-ahead cache settings if you fully understand how the host operating system, application, and adapter move data so that you can adjust the settings accordingly.
Provisioning the system Using the Provisioning Wizard The Provisioning Wizard helps you create a vdisk with volumes and to map the volumes to hosts. The wizard has several steps, which are highlighted at the bottom of the panel as you complete them. The last step prompts you to confirm changes before applying them.
Step 3: Selecting disks Select disks to include in the vdisk. The Disk Selection Sets table has one row for each sub-vdisk in a RAID- 1 0 or RAID-50 vdisk, or a single row for a vdisk having another RAID level. The table also has a SPARE row where you can assign dedicated pares to the vdisk.
Select the access level that hosts will have to the volumes: read-write, read-only, or no-access (masked). Click Next to continue. Step 6: Confirming vdisk settings Confirm that the values listed in the wizard panel are correct. • If they are not correct, click Previous to return to previous steps and make necessary changes. •...
Expanding a vdisk You can expand the capacity of a vdisk by adding disks to it. Host I/O to the vdisk can continue while the expansion proceeds. You can then create or expand a volume to use the new free space, which becomes available when the expansion is complete.
Creating a volume set In a vdisk that has sufficient free space, you can create multiple volumes with the same base name, size, and default mapping settings. To create a volume set In the Configuration View panel, right-click a vdisk and select Provisioning > Create Volume Set. In the main panel, set the options: •...
Deleting volumes CAUTION: Deleting a volume removes its mappings and deletes its data. To delete volumes Verify that hosts are not accessing the volumes that you want to delete. In the Configuration View panel, either: • Right-click the system or Vdisks or a vdisk and then select Provisioning > Delete Volumes. •...
Changing a volume's explicit mappings CAUTION: Volume mapping changes take effect immediately. Make changes that limit access to volumes when the volumes are not in use. Be sure to unmount a mapped volume from a host system before changing the mapping's LUN. To view volume mappings In the Configuration View panel, right-click a volume and select Provisioning >...
Creating multiple snapshots You can select multiple volumes and immediately create a snapshot of each volume. To create multiple snapshots In the Configuration View panel, right-click the system or Vdisks or a vdisk and then select Provisioning > Create Snapshots. In the main panel, select each volume to take a snapshot of.
Deleting a snapshot When you delete a snapshot, all data uniquely associated with that snapshot is deleted and associated space in the snap pool is freed for use. Snapshots can be deleted in any order, irrespective of the order in which they were created.
Creating a volume copy With the appropriate license, you can copy a volume or a snapshot to a new standard volume. The destination volume must be in a vdisk owned by the same controller as the source volume. If the source volume is a snapshot, you can choose whether to include its modified data (data written to the snapshot since it was created).
• With Modified Data. If the source volume is a snapshot, select this option to include the snapshot’s modified data in the copy. Otherwise, the copy will contain only the data that existed when the snapshot was created. • Start Schedule. Specify a date and a time in the future for the schedule to start running. •...
To roll back a volume Unmount the volume from hosts. If the roll back will include snapshot modified data, unmount the snapshot from hosts. In the Configuration View panel, right-click a volume and select Provisioning > Roll Back Volume. In the main panel, set the options: •...
Changing a host's name To change a host's name In the Configuration View panel, right-click a host and select Provisioning > Rename Host. Enter a new name that helps you easily identify the host; for example, MailServer_P1. A host name is case sensitive and cannot already exist in the system.
Configuring CHAP For iSCSI, you can use Challenge-Handshake Authentication Protocol (CHAP) to perform authentication between the initiator and target of a login request. To perform this identification, a database of CHAP entries must exist on each device. Each CHAP entry can specify one name-secret pair to authenticate the initiator only (one-way CHAP) or two pairs to authenticate both the initiator and the target (mutual CHAP).
Using system tools Updating firmware You can view the current versions of firmware in controller modules, expansion modules (in drive enclosures), and disks, and install new versions. TIP: To ensure success of an online update, select a period of low I/O activity. This helps the update complete as quickly as possible and avoids disruptions to host and applications due to timeouts.
To update expansion module firmware Obtain the appropriate firmware file and download it to your computer or network. Stop I/O to vdisks before starting the firmware update. In the Configuration View panel, right-click the system and select Tools > Update Firmware. The table titled Current Versions of All Expansion Modules (EMPs) shows the currently installed versions.
If the updated disks must be power cycled: a. Shut down both controllers; see Restarting or shutting down controllers on page 62. b. Power cycle all enclosures as described in your product’s user guide. NOTE: If you loaded firmware to a Seagate 750-Gbyte Barracuda ES SATA drive, after spin-up it will be busy for about 50 seconds completing its update.
Rescanning disk channels A rescan forces a rediscovery of disks and enclosures in the storage system. If two Storage Controllers are online, rescan also reassigns the enclosure IDs of attached enclosures based on controller A's enclosure cabling order. A manual rescan may be needed after system power-up to display enclosures in the proper order.
To perform a restart In the Configuration View panel, right-click the local system and select Configuration > Shut Down or Restart Controller. In the main panel, set the options: • Select the Restart operation. • Select the type of controller processor to restart. •...
Verifying a vdisk If you suspect that a redundant (mirror or parity) vdisk has a problem, you can run the Verify utility to check the vdisk's integrity. For example, if the storage system was operating outside the normal temperature range, you might want to verify its vdisks. The Verify utility checks whether the redundancy data in the vdisk is consistent with the user data in the vdisk.
Removing a vdisk from quarantine A previously fault-tolerant vdisk becomes quarantined when not all of its disks are detected after a restart or rescan. A quarantined vdisk is shown with health Critical and status QTCR or QTOF. Quarantine isolates the vdisk from host access, and prevents the storage system from making the vdisk critical and starting reconstruction when disks are “missing”...
Viewing system status Viewing information about the system In the Configuration View panel, right-click the system and select View > Overview. The System Overview table shows: • The system’s health: OK. The system is operating normally. Degraded. Fault. Unknown. At least one component is degraded or has a fault. •...
Snapshot properties When you select the Snapshots component a table shows each snapshot's name, serial number, source volume, snap-pool name, amounts of snap data, unique data, and shared data, and vdisk name. • Snap data is the total amount of data associated with the specific snapshot (data copied from a source volume to a snapshot and data written directly to a snapshot).
NOTE: If you are having a problem with the system or a vdisk, check the event log before calling technical support. Event messages might enable you to resolve the problem. When reviewing events, do the following: For any critical or warning events, look for recommended actions in the Event code reference appendix.
• Current Owner. Either the preferred owner during normal operation or the partner controller when the preferred owner is offline. • Disks. • Spares. Viewing information about a vdisk In the Configuration View panel, right-click a vdisk and select View > Overview. The Vdisks Overview table shows: •...
• OFFL: The vdisk is offline because it is using offline initialization, or because disks are down and data may be lost. • QTCR: The vdisk is in a critical state and has been quarantined because some disks are missing. •...
Volume properties When you select the Volumes component, the Volumes table shows: • The volume’s name, serial number, and size • The name of the vdisk containing the volume Snap-pool properties When you select the Snap Pools component, the Snap Pools table shows: •...
Schedule properties If any schedules exist for this volume, when you select the Schedules component, the Schedules table shows information about each schedule. For the selected schedule, the Schedule Details table shows: • Schedule Name. • Schedule Specification. • Schedule Status. •...
Mapping properties When you select the Maps component, the Maps for Volume table shows: • Type. Explicit or Default. Settings for an explicit mapping override the default mapping. • Host ID. WWPN or IQN. • Name. Host name. • Ports. Controller host ports through which the volume is mapped to the host. •...
Host properties When you select the Host component, the Properties for Host table shows: • Host ID. WWPN or IQN. • Name. • Discovered. If the host was discovered and its entry was automatically created, Yes. If the host entry was manually created, No.
SNMP reference This appendix describes the Simple Network Management Protocol (SNMP) capabilities that 2000 G2 Modular Smart Array storage systems support. This includes standard MIB-II, the FibreAlliance SNMP Management Information Base (MIB) version 2.2 objects, and enterprise traps. 2000 G2 Modular Smart Array storage systems can report their status through SNMP. SNMP provides basic discovery using MIB-II, more detailed status with the FA MIB 2.2, and asynchronous notification using enterprise traps.
FA MIB 2.2 SNMP behavior The FA MIB 2.2 objects are in compliance with the FibreAlliance MIB v2.2 Specification (FA MIB2.2 Spec). For a full description of this MIB, go to: http://www.emc.com/microsites/fibrealliance. FA MIB 2.2 is a subset of FA MIB 4.0, which is included with HP System Insight Manager (SIM) and other products.
Page 79
Table 10 FA MIB 2.2 objects, descriptions, and values (continued) Object Description Value Includes the following objects as specified by the FA MIB2.2 Spec connUnitTable Unique identification for this Total of 16 bytes comprised of 8 connUnitId connectivity unit bytes of the node WWN or similar serial number-based identifier (for example, 1000005013b0521 1) with the trailing 8 bytes equal to zero...
Page 80
Table 10 FA MIB 2.2 objects, descriptions, and values (continued) Object Description Value Settable: Contact information for this Default: Uninitialized Contact connUnitContact connectivity unit Settable: Location information for this Default: Uninitialized Location connUnitLocation connectivity unit Defines the event severity that will be Default: info[8] connUnitEventFilter logged by this connectivity unit.
Page 81
Table 10 FA MIB 2.2 objects, descriptions, and values (continued) Object Description Value Includes the following objects as specified by the FA MIB2.2 Spec connUnitPortTable connUnitId of the connectivity unit Same as connUnitId connUnitPortUnitId that contains this port Unique value for each Unique value for each port, between connUnitPortIndex connUnitPortEntry between 1...
Page 82
Table 10 FA MIB 2.2 objects, descriptions, and values (continued) Object Description Value Includes the following objects as specified by the FA MIB2.2 Spec connUnitEventTable connUnitId of the connectivity unit Same as connUnitId connUnitEventUnitId that contains this port Index into the connectivity unit’s Starts at 1 every time there is a table connUnitEventIndex event buffer, incremented for each...
Table 10 FA MIB 2.2 objects, descriptions, and values (continued) Object Description Value • Specifies the state of the row READ: rowActive[3] if traps are trapRegRowState enabled through Telnet; otherwise rowInactive[2] • WRITE: Not supported External details for certain FA MIB 2.2 objects Tables in this section specify values for certain objects described in Table External details for connUnitRevsTable...
External details for connUnitSensorTable Table 12 connUnitSensorTable index, name, type, and characteristic values connUnitSensorIndex connUnitSensorName connUnitSensorType connUnitSensor Characteristic CPU Temperature (Controller A) board [8] temperature[3] CPU Temperature (Controller B) board [8] temperature[3] FPGA Temperature (Controller A) board [8] temperature[3] FPGA Temperature (Controller B) board [8] temperature[3] Onboard Temperature 1 (Controller A)
-- ---------------------------------------------------------------------------- -- MSA2000 Array MIB for SNMP Traps -- $Revision: 11692 $ -- Copyright (c) 2008 Hewlett-Packard Development Company, L.P. -- Copyright (c) 2005-2008 Dot Hill Systems Corp. -- Confidential computer software. Valid license from HP required for possession, -- use or copying.
Page 86
FROM RFC-1215 connUnitEventId, connUnitEventType, connUnitEventDescr FROM FA-MIB40; --Textual conventions for this MIB ---------------------------------------------------------------------- -- vendor OBJECT IDENTIFIER ::= { enterprises 11 } OBJECT IDENTIFIER ::= { hp 2 } hpMSA OBJECT IDENTIFIER ::= { nm 51 } -- Related traps msaEventInfoTrap TRAP-TYPE ENTERPRISE hpMSA VARIABLES { connUnitEventId,...
Event code reference Information in this appendix is for reference by storage administrators and technical support personnel to aid troubleshooting. An event code identifies a type of event that has occurred in the storage system, and corresponds to an event message that is recorded in the system’s event log, which you can view using SMU or the CLI. You may also receive notifications, depending on your SMU event notification settings.
Page 90
Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Informational A rescan has completed. Informational A firmware update has completed. Informational Vdisk verification has completed. This event or warning is logged as informational if the command fails immediately, succeeds, or is aborted by the user;...
Page 91
Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Critical The sensors monitored a temperature or • Check that the storage system’s fans are voltage in the failure range. running. • Check that the ambient temperature is not too warm.
Page 92
Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code • Warning or The controller detected an error while For warning events that indicate a disk is informational communicating with the specified SCSI bad, replace that disk. device.
Page 93
Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Informational The specified volume’s LUN has been If you want hosts to access the volume data unassigned because it conflicts with LUNs on the inserted disks, map the volume with a assigned to other volumes.
Page 94
Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Informational The partner controller does not have a mirrored configuration image for the current controller, so the current controller’s local flash configuration is being used. This event is expected if the other controller is new or its configuration has been cleared.
Page 95
Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code 1 16 Critical After a recovery, the partner controller was To determine if data might have been lost, killed while mirroring write-back data to the check whether this event was immediately current controller.
Page 96
Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Informational One or more enclosures do not have a valid path to an EMP. All enclosure EMPs are disabled. Warning The host WWNs (node and port) previously Verify the WWN information for this presented by this controller module in this controller module on all hosts that access it.
Page 97
Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Informational The specified SES alert condition has been This event is generated when the problem cleared in the enclosure indicated. that caused event 168 is cleared. Informational The last rescan indicates that the specified enclosure was added to the system.
Page 98
Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code 190– Informational Includes component-specific environmental indicator events generated by the auto-write-through feature when an environmental change occurs. If an auto-write-through-trigger condition has been met, write-back cache is disabled and event 188 is also logged.
Page 99
Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Informational The creation of snapshots is complete. The number of snapshots is specified. Informational A previously created batch of snapshots is now committed and ready for use. The number of snapshots is specified.
Page 100
Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Warning The snap pool has reached the snap pool You can expand the snap pool or delete error threshold. snapshots. The system will take the action set up in the policy.
Page 101
Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Informational An existing disk channel target device is not Check the indicated target device for bad responding to SCSI discovery commands. hardware or bad cable, then initiate a rescan.
Page 102
Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Informational Port bypass circuits currently use the service Perform a system-level shutdown and restart. port, which may limit the link speed or Note that this will cause all data to be interconnect mode support.
Page 103
Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Informational An old serial number in SC flash memory has been updated to a new serial number. Critical A temperature sensor on a controller FRU Check that the storage system’s fans are detected an over-temperature condition that running.
Page 104
Table 14 Event code descriptions and recommended actions (continued) Event Event type Description Recommended action code Warning The controller has an older SC version than Upgrade to an SC version that is current for the version used to create the CHAP the indicated database version.
As referred to in Table 14, the following table lists disk- error conditions and recommended actions. Table 15 Disk error conditions and recommended actions Status Recommended action The status of the vdisk that originally had the failed disk Use SMU to assign the new disk as either a global spare status is Good.
Using FTP to download logs and update firmware Although SMU is the preferred interface for downloading logs, updating firmware, and installing a license, you can also use FTP to do these tasks. Downloading system logs To help service personnel diagnose a system problem, you might be asked to download and submit system log data.
Updating controller module firmware A controller enclosure can contain one or two controller modules. In a dual-controller system, both controllers should run the same firmware version. You can update the firmware in each controller module by loading a firmware file obtained from the HP web download site, http://www.hp.com/go/msa. To install an HP ROM Flash Component or firmware Smart Component, follow the instructions on the HP web site;...
Updating expansion module firmware A drive enclosure can contain one or two expansion modules. Each expansion module contains an enclosure management processor (EMP). All modules of the same model should run the same firmware version. You can update the firmware in each expansion module by loading a firmware file obtained from the HP web download site, http://www.hp.com/go/msa.
Updating disk firmware You can update disk firmware by loading a firmware file obtained from the HP web download site, http://www.hp.com/go/msa, or from the disk manufacturer. To install an HP ROM Flash Component or firmware Smart Component, follow the instructions on the HP web site; otherwise, to install a firmware binary file, follow the steps below.
Quit the FTP session. If the updated disks must be power cycled: a. Shut down both controllers by using SMU. b. Power cycle all enclosures as described in your product’s user guide. NOTE: If you loaded firmware to a Seagate 750-Gbyte Barracuda ES SATA drive, after spin-up it will be busy for about 50 seconds completing its upgrade.
Page 112
112 Using FTP to download logs and update firmware...
Glossary CHAP Challenge-Handshake Authentication Protocol. chunk size The amount of contiguous data that is written to a vdisk member before moving to the next member of the vdisk. dedicated spare A disk that is reserved for use by a specific vdisk to replace a failed disk. default mapping Host-access settings that are configured when a volume is created.
Page 114
snap pool A volume that stores data that is specific to snapshots of an associated master volume, including copy-on-write data and data written explicitly to the snapshots. A snap pool cannot be mapped. snapshot A “virtual” volume that preserves the state of a master volume’s data as it existed when the snapshot was created.
Index Symbols dedicated spares adding and removing * (asterisk) in option name default mapping DHCP configuring asterisk (*) in option name configuring with Configuration Wizard audience disk properties state (how used) values browser disk channels buttons to avoid rescanning setup disk metadata bytes versus characters clearing...
Page 116
using WBI to update expansion module versions leftover disk firmware update, partner licensed features configuring managing snapshot downloading system logs status updating controller module firmware using FTP to install license file updating disk drive firmware volume copy updating expansion module firmware link speed configuring FC configuring iSCSI...
Page 117
Provisioning Wizard properties using to create a vdisk with volumes and mappings resetting to current data in master volume viewing information about snapshot mapping properties snapshots about quarantined vdisk creating for multiple volumes SNMP configuring traps RAID levels differences between FA MIB 2.2 and 4.0 about enterprise trap MIB read-ahead caching...
Page 118
about volume mapping unique data (snapshot) about Universal Time (UT) properties users volume masking about user accounts volume set adding creating change default passwords with Configuration Wizard volumes about maximum that can sign in deleting modifying removing utility priority configuring about communication status icon session hang...