Lenovo ThinkServer RD240 Software User's Manual

Lenovo ThinkServer RD240 Software User's Manual

Megaraid sas software user guide
Hide thumbs Also See for ThinkServer RD240:
Table of Contents

Advertisement

ThinkServer RD230, RD240, and TD230
MegaRAID SAS Software User Guide

Advertisement

Table of Contents
loading

Summary of Contents for Lenovo ThinkServer RD240

  • Page 1 ThinkServer RD230, RD240, and TD230 MegaRAID SAS Software User Guide...
  • Page 3 ThinkServer RD230, RD240, and TD230 MegaRAID SAS Software User Guide...
  • Page 4 First Edition (June 2010) © Copyright Lenovo 2010. LENOVO products, data, computer software, and services have been developed exclusively at private expense and are sold to governmental entities as commercial items as defined by 48 C.F.R. 2.101 with limited and restricted rights to use, reproduction and disclosure.
  • Page 5 Preface This document explains how to use the MegaRAID Storage Manager™ software, WebBIOS, and Command Line Interface (CLI) utilities to ® configure, monitor, and maintain MegaRAID Serial-attached SCSI (SAS) RAID controllers and the storage-related devices connected to them. Audience This document assumes that you are familiar with SAS controllers and configuration utilities.
  • Page 6 • Chapter 5, “MegaRAID Command Tool,” explains how to use the MegaRAID Command Tool to create and manage storage configurations. The MegaRAID Command Tool is a CLI application for SAS. • Chapter 6, “MegaRAID Storage Manager Overview and Installation,” introduces the main features of MegaRAID Storage Manager software and explains how to install it.
  • Page 7: Table Of Contents

    Contents Chapter 1 Overview SAS Technology Serial-attached SCSI Device Interface Serial ATA II Features Solid State Drive Features 1.4.1 Solid State Drive Guard Dimmer Switch Feature UEFI 2.0 Support Configuration Scenarios 1.7.1 Valid Drive Mix Configurations with HDDs and SSDs Chapter 2 Introduction to RAID RAID Description...
  • Page 8 2.4.10 Disk Mirroring 2.4.11 Parity 2.4.12 Disk Spanning 2-10 2.4.13 Hot Spares 2-11 2.4.14 Disk Rebuilds 2-13 2.4.15 Rebuild Rate 2-14 2.4.16 Hot Swap 2-14 2.4.17 Drive States 2-15 2.4.18 Virtual Drive States 2-15 2.4.19 Enclosure Management 2-16 RAID Levels 2-16 2.5.1 Summary of RAID Levels...
  • Page 9 3.4.1 Enable Security 3.4.2 Change Security 3.4.3 Create Secure Virtual Drives 3.4.4 Import a Foreign Configuration Instant Secure Erase Chapter 4 WebBIOS Configuration Utility Overview Starting the WebBIOS CU WebBIOS CU Main Screen Options Creating a Storage Configuration 4.4.1 Selecting the Configuration with the Configuration Wizard 4.4.2 Using Automatic Configuration...
  • Page 10 Chapter 5 MegaRAID Command Tool Product Overview Novell NetWare, SCO, Solaris, FreeBSD, and DOS Operating System Support Command Line Abbreviations and Conventions 5.3.1 Abbreviations Used in the Command Line 5.3.2 Conventions Controller Property-Related Options 5.4.1 Display Controller Properties 5.4.2 Display Number of Controllers Supported 5.4.3 Enable or Disable Automatic Rebuild 5.4.4...
  • Page 11 Configuration-Related Options 5-19 5.9.1 Create a RAID Drive Group from All Unconfigured Good Drives 5-20 5.9.2 Add RAID 0, 1, 5, or 6 Configuration 5-21 5.9.3 Add RAID 10, 50, or 60 Configuration 5-23 5.9.4 Clear the Existing Configuration 5-23 5.9.5 Save the Configuration on the Controller 5-24...
  • Page 12 5.11.13 Display Total Number of Drives 5-34 5.11.14 Display List of Physical Devices 5-34 5.11.15 Download Firmware to the Physical Devices 5-35 5.12 Enclosure-Related Options 5-35 5.13 Flashing the Firmware 5-35 5.13.1 Flash the Firmware with the ROM File 5-36 5.13.2 Flash the Firmware in Mode 0 with the ROM File 5-36 5.14...
  • Page 13 6.5.1 Installing a CIM SAS Storage Provider on Linux 6-23 6.5.2 Installing a CIM SAS Storage Provider on Windows 6-25 Installing and Configuring an SNMP Agent 6-25 6.6.1 Installing and Configuring an SNMP Agent on Linux 6-26 6.6.2 Installing and Configuring an SNMP Agent on Solaris 6-28 6.6.3...
  • Page 14 Adding Hot Spare Drives 8-35 Changing Adjustable Task Rates 8-37 Changing Power Settings 8-39 Changing Virtual Drive Properties 8-40 Changing a Virtual Drive Configuration 8-41 8.7.1 Accessing the Modify Drive Group Wizard 8-41 8.7.2 Adding a Drive or Drives to a Configuration 8-43 8.7.3 Removing a Drive from a Configuration...
  • Page 15 Monitoring Battery Backup Units 9-22 9.8.1 Battery Learn Cycle 9-24 Monitoring Rebuilds and Other Processes 9-26 Chapter 10 Maintaining and Managing Storage Configurations 10.1 Initializing a Virtual Drive 10-1 10.2 Running a Consistency Check 10-2 10.3 Scanning for New Drives 10-3 10.4 Rebuilding a Drive...
  • Page 16 Contents...
  • Page 17 Figures Example of a ThinkServer SAS Di rect-Connect Application Example of a ThinkServerI SAS RAID Controller Configured with a ThinkServer SASx12 Expander Example of Disk Striping (RAID 0) Example of Disk Mirroring (RAID 1) Example of Distributed Parity (RAID 5) 2-10 Example of Disk Spanning 2-10...
  • Page 18 4.21 WebBIOS Span Definition Screen 4-40 4.22 WebBIOS Virtual Drive Definition Screen 4-41 4.23 RAID 10 Configuration Preview 4-44 4.24 WebBIOS Disk Group Definition Screen 4-46 4.25 WebBIOS Span Definition Screen 4-47 4.26 WebBIOS Virtual Drive Definition Screen 4-48 4.27 RAID 50 Configuration Preview 4-51 4.28...
  • Page 19 Setup Type Screen Setup Type Screen Custom Setup Screen Server Screen Host ESXi Server Name 6-14 Login on the Host Server 6-15 Physical View 6-16 Logical View 6-17 Select Server Window Server Login Window Main MegaRAID Storage Manager Window Operations Tab Virtual Drive Creation Menu Virtual Drive Creation Mode Create Virtual Drive Screen...
  • Page 20 8.27 Foreign Configuration Detected Screen 8-34 8.28 Creating a Global Hot Spare 8-36 8.29 Set Adjustable Task Rates 8-38 8.30 Set Virtual Drive Properties 8-40 8.31 Data Backup Warning 8-42 8.32 Modify Drive Group Wizard 8-43 Event Information Window Alert Notification Configuration Menu Alerts Notification Configuration Screen Alert Notification Delivery Methods Dialog Box Change Individual Events Dialog Box...
  • Page 21 Tables Valid Drive Mix Configurations Types of Parity Spanning for RAID 10, RAID 50, and RAID 60 2-11 Drive States 2-15 Virtual Drive States 2-16 RAID 0 Overview 2-18 RAID 1 Overview 2-19 RAID 5 Overview 2-20 RAID 6 Overview 2-22 RAID 00 Overview 2-23...
  • Page 22 5.16 Options for BIOS Status 5-13 5.17 Display BBU Information 5-14 5.18 Display BBU Status Information 5-14 5.19 Display BBU Capacity Information 5-16 5.20 Display BBU Design Parameters 5-16 5.21 Display Current BBU Properties 5-17 5.22 Start BBU Learning Cycle 5-17 5.23 Place Battery in Low-Power Storage Mode...
  • Page 23 5.54 Display Drives in Missing Status 5-33 5.55 Replace Configured Drive(s) and Start Automatic Rebuild 5-34 5.56 Prepare Unconfigured Drive(s) for Removal 5-34 5.57 Display Number of Drives Attached to an Controller 5-34 5.58 Display List of Physical Devices Attached to Controller(s) 5-34 5.59 Download Firmware to the Physical Devices...
  • Page 24 Contents...
  • Page 25: Overview

    Chapter 1 Overview This guide documents the utilities used to configure, monitor, and ® maintain MegaRAID Serial-attached SCSI (SAS) RAID controllers with RAID control capabilities and the storage-related devices connected to them. This guide explains how to use the MegaRAID Storage Manager™ software, WebBIOS, and Command Line Interface (CLI).
  • Page 26 SAS RAID controllers address the growing demand for increased data throughput and scalability requirements across midrange and enterprise- class server platforms. Lenovo offers a family of MegaRAID SAS RAID controllers addressing the needs for both internal and external solutions. The SAS controllers support the ANSI Serial Attached SCSI standard, version 1.1.
  • Page 27: Serial-Attached Scsi Device Interface

    Serial-attached SCSI Device Interface SAS is a serial, point-to-point, enterprise-level device interface that leverages the proven SCSI protocol set. SAS is a convergence of the advantages of SATA II, SCSI, and Fibre Channel, and is the future mainstay of the enterprise and high-end workstation storage markets. SAS offers a higher bandwidth per pin than parallel SCSI, and it improves signal and data integrity.
  • Page 28: Solid State Drive Features

    • Eliminates the master-slave construction used in parallel ATA • Allows addressing of multiple SATA II targets through an expander • Allows multiple initiators to address a single target (in a fail-over configuration) through an expander Solid State Drive Features MegaRAID firmware supports SSD drives attached to MegaRAID SAS controllers.
  • Page 29: Dimmer Switch Feature

    automatically copying data from a drive with potential to fail to a designated hot spare or newly inserted drive. Because SSDs are very reliable, non-redundant RAID 0 configurations are much more common than in the past. SSD Guard offers added data protection for RAID 0 configurations.
  • Page 30: Configuration Scenarios

    UEFI 2.0 provides MegaRAID customers with expanded platform support. The MegaRAID UEFI 2.0 driver, a boot service device driver, handles block IO requests and SCSI pass-through commands (SPT), and offers the ability to launch pre-boot MegaRAID management applications through a driver configuration protocol (DCP). The UEFI driver also supports driver diagnostic protocol, which allows administrators to access pre-boot diagnostics.
  • Page 31: Example Of A Thinkserver Sas Direct-Connect Application

    Figure 1.1 Example of a ThinkServer SAS Direct-Connect Application SAS/SATA II Device 32-Bit Memory Address/Data Flash ROM/ SAS/SATA II Device PSBRAM/ PCI Express NVSRAM RAID Controller SAS/SATA II Device Interface SAS/SATA II Device PCI Express Interface Figure 1.2 shows an example of a SAS RAID controller configured with a ThinkServer SASx12 expander that is connected to SAS disks, SATA II disks, or both.
  • Page 32: Valid Drive Mix Configurations With Hdds And Ssds

    1.7.1 Valid Drive Mix Configurations with HDDs and SSDs You can allow a virtual drive to consist of both SSDs and HDDs. For virtual drives that have both SSDs and HDDs, you can choose whether to mix SAS drives and SATA drives on the SSD devices. You can choose whether to allow a virtual drive to consist of both SSD devices and HDDs.
  • Page 33: Introduction To Raid

    Chapter 2 Introduction to RAID This chapter describes RAID (Redundant Array of Independent Disks), RAID functions and benefits, RAID components, RAID levels, and configuration strategies. In addition, it defines the RAID availability concept, and offers tips for configuration planning. RAID Description RAID is an array, or group of multiple independent physical drives that provide high performance and fault tolerance.
  • Page 34: Components And Features

    Your drives must be organized into virtual drives in a drive group and they must be able to support the RAID level that you select. Below are some common RAID functions: • Creating hot spare drives • Configuring drive groups and virtual drives •...
  • Page 35: Raid Drive Group

    2.4.3 RAID Drive Group A RAID drive group is one or more drives controlled by the RAID controller. 2.4.4 Fault Tolerance Fault tolerance is the capability of the subsystem to undergo a drive failure or failures without compromising data integrity, and processing capability.
  • Page 36 Auto-rebuild allows a failed drive to be replaced and the data automatically rebuilt by “hot-swapping” the drive in the same drive bay. The RAID drive group continues to handle requests while the rebuild occurs. 2.4.4.1 Multipathing The firmware provides support for detecting and using multiple paths from the RAID controllers to the SAS devices that are in enclosures.
  • Page 37: Consistency Check

    not stop. The controller uses different paths to balance the load on the entire system. In the MegaRAID Storage Manager utility, when multiple paths are available to a drive, the drive information will show only one enclosure. The utility shows that a redundant path is available to a drive. All drives with a redundant path display this information.
  • Page 38: Background Initialization

    Note: During a copyback operation, if the drive group involved in the copyback is deleted because of a virtual drive deletion, the destination drive reverts to an Unconfigured Good state or hot spare state. Order of Precedence – In the following scenarios, rebuild takes precedence over the copyback operation: 1.
  • Page 39: Patrol Read

    2.4.8 Patrol Read Patrol read involves the review of your system for possible drive errors that could lead to drive failure and then action to correct errors. The goal is to protect data integrity by detecting drive failure before the failure can damage data.
  • Page 40: 2.4.10 Disk Mirroring

    2.4.9.1 Stripe Width Stripe width is the number of drives involved in a drive group where striping is implemented. For example, a four-disk drive group with disk striping has a stripe width of four. 2.4.9.2 Stripe Size The stripe size is the length of the interleaved data segments that the RAID controller writes across multiple drives, not including parity drives.
  • Page 41: 2.4.11 Parity

    2.4.11 Parity Parity generates a set of redundancy data from two or more parent data sets. The redundancy data can be used to reconstruct one of the parent data sets in the event of a drive failure. Parity data does not fully duplicate the parent data sets, but parity generation can slow the write process.
  • Page 42: 2.4.12 Disk Spanning

    2.4.12 Disk Spanning Disk spanning allows multiple drives to function like one big drive. Spanning overcomes lack of disk space and simplifies storage management by combining existing resources or adding relatively inexpensive resources. For example, four 20 GB drives can be combined to appear to the operating system as a single 80 GB drive.
  • Page 43: 2.4.13 Hot Spares

    Table 2.2 Spanning for RAID 10, RAID 50, and RAID 60 Level Description Configure RAID 00 by spanning two contiguous RAID 0 virtual drives, up to the maximum number of supported devices for the controller. Configure RAID 10 by spanning two contiguous RAID 1 virtual drives, up to the maximum number of supported devices for the controller.
  • Page 44 If the hot spare is designated as having enclosure affinity, it will attempt to rebuild any failed drives on the backplane that it resides in before rebuilding any other drives on other backplanes. Note: If a rebuild to a hot spare fails for any reason, the hot spare drive will be marked as "failed".
  • Page 45: 2.4.14 Disk Rebuilds

    • You must assign the hot spare to one or more drives through the controller BIOS or use drive group management software to place it in the hot spare pool. • A hot spare must have free space equal to or greater than the drive it replaces.
  • Page 46: 2.4.15 Rebuild Rate

    An automatic drive rebuild will not start if you replace a drive during a RAID-level migration. The rebuild must be started manually after the expansion or migration procedure is complete. 2.4.15 Rebuild Rate The rebuild rate is the percentage of the compute cycles dedicated to rebuilding failed drives.
  • Page 47: 2.4.18 Virtual Drive States

    Table 2.3 Drive States (Cont.) State Description Hot Spare A drive that is powered up and ready for use as a spare in case an online drive fails. Failed A drive that was originally configured as Online or Hot Spare, but on which the firmware detects an unrecoverable error.
  • Page 48: 2.4.19 Enclosure Management

    2.4.19 Enclosure Management Enclosure management is the intelligent monitoring of the disk subsystem by software and/or hardware. The disk subsystem can be part of the host computer or can reside in an external disk enclosure. Enclosure management helps you stay informed of events in the disk subsystem, such as a drive or power supply failure.
  • Page 49: Selecting A Raid Level

    RAID 10, a combination of RAID 0 and RAID 1, consists of striped data across mirrored spans. A RAID 10 drive group is a spanned drive group that creates a striped set from a series of mirrored drives. RAID 10 allows a maximum of eight spans.
  • Page 50: Raid 0

    2.5.3 RAID 0 RAID 0 provides disk striping across all drives in the RAID drive group. RAID 0 does not provide any data redundancy, but, along with RAID 0, does offer the best performance of any RAID level. RAID 0 breaks up data into smaller segments, and then stripes the data segments across each drive in the drive group.
  • Page 51: Raid 5

    2.5.4 RAID 1 In RAID 1, the RAID controller duplicates all data from one drive to a second drive in the drive group. RAID 1 supports an even number of drives from 2 to 32 in a single span. RAID 1 provides complete data redundancy, but at the cost of doubling the required data storage capacity.
  • Page 52: Raid 5 Drive Group With Six Drives

    RAID 5 addresses the bottleneck issue for random I/O operations. Because each drive contains both data and parity, numerous writes can take place concurrently. Table 2.7 provides an overview of RAID 5. Figure 2.7 provides a graphic example of a RAID 5 drive group. Table 2.7 RAID 5 Overview Provides high data throughput, especially for large files.
  • Page 53: Raid 6

    2.5.6 RAID 6 RAID 6 is similar to RAID 5 (disk striping and parity), except that instead of one parity block per stripe, there are two. With two independent parity blocks, RAID 6 can survive the loss of two drives in a virtual drive without losing data.
  • Page 54: Example Of Distributed Parity Across Two Blocks In A Stripe (Raid 6)

    Figure 2.8 Example of Distributed Parity across Two Blocks in a Stripe (RAID 6) Segment 1 Segment 2 Segment 3 Segment 4 Parity (P1-P4) Parity (Q1-Q4) Segment 6 Segment 7 Segment 8 Parity (P5-P8) Parity (Q5-Q8) Segment 5 Segment 10 Segment 11 Segment 9 Segment 12...
  • Page 55: Raid 00 Drive Group Example With Two Drives

    Table 2.9 RAID 00 Overview Does not provide fault tolerance or high bandwidth. Weak Points All data lost if any drive fails. 2 to 256 Drives Figure 2.9 RAID 00 Drive Group Example with Two Drives RAID 00 Segment Segment 1 Segment Segment Segment...
  • Page 56: Raid 10 Overview

    span. You must use an even number of drives in each RAID 10 virtual drive in the span. Note: Other factors, such as the type of controller, can restrict the number of drives supported by RAID 10 virtual drives. Table 2.10 provides an overview of RAID 10.
  • Page 57: Raid 50 Overview

    50 is best implemented on two RAID 5 drive groups with data striped across both drive groups. RAID 50 breaks up data into smaller blocks and then stripes the blocks of data to each RAID 5 disk set. RAID 5 breaks up data into smaller blocks, calculates parity by performing an exclusive-or on the blocks and then writes the blocks of data and parity to each drive in the drive group.
  • Page 58 2.5.10 RAID 60 RAID 60 provides the features of both RAID 0 and RAID 6, and includes both parity and disk striping across multiple drive groups. RAID 6 supports two independent parity blocks per stripe. A RAID 60 virtual drive can survive the loss of two drives in each of the RAID 6 sets without losing data.
  • Page 59: Raid Configuration Strategies

    Table 2.12 RAID 60 Overview Weak Points Not well suited to tasks requiring lot of writes. A RAID 60 virtual drive has to generate two sets of parity data for each write operation, which results in a significant decrease in performance during writes. Drive performance is reduced during a drive rebuild.
  • Page 60: Maximizing Fault Tolerance

    maximize virtual drive availability (fault tolerance), virtual drive performance, and virtual drive capacity. 2.6.1 Maximizing Fault Tolerance Fault tolerance is achieved through the ability to perform automatic and transparent rebuilds using hot spare drives and hot swaps. A hot spare drive is an unused online available drive that the RAID controller instantly plugs into the system when an active drive fails.
  • Page 61: Maximizing Performance

    RAID Level Fault Tolerance Combines distributed parity with disk striping. RAID 6 can sustain two drive failures and still maintain data integrity. Parity provides redundancy for two drive failures without duplicating the contents of entire drives. If a drive fails, the RAID controller uses the parity data to reconstruct all missing information.
  • Page 62: Raid Levels And Performance

    Table 2.14 RAID Levels and Performance RAID Level Performance RAID 0 (striping) offers excellent performance. RAID 0 breaks up data into smaller blocks and then writes a block to each drive in the drive group. Disk striping writes data across multiple drives instead of just one drive. It involves partitioning each drive storage space into stripes that can vary in size from 8 KB to 1024 KB.
  • Page 63: Maximizing Storage Capacity

    RAID Level Performance RAID 50 works best when used with data that requires high reliability, high request rates, and high data transfer. It provides high data throughput, data redundancy, and very good performance. Spanning increases the capacity of the virtual drive and improves performance by doubling the number of spindles.
  • Page 64: Raid Availability

    RAID Level Capacity RAID 5 provides redundancy for one drive failure without duplicating the contents of entire drives. RAID 5 breaks up data into smaller blocks, calculates parity by performing an exclusive-or on the blocks, then writes the blocks of data and parity to each drive in the drive group.
  • Page 65: Configuration Planning

    2.7.1.1 Spare Drives You can use spare drives to replace failed or defective drives in a drive group. A replacement drive must be at least as large as the drive it replaces. Spare drives include hot swaps, hot spares, and cold swaps. A hot swap is the manual substitution of a replacement unit in a disk subsystem for a defective one, where the substitution can be performed while the subsystem is running (performing its normal functions).
  • Page 66: Number Of Drives

    Each type of data stored in the disk subsystem has a different frequency of read and write activity. If you know the data access requirements, you can more successfully determine a strategy for optimizing the disk subsystem capacity, availability, and performance. Servers that support video on demand typically read the data often, but write data infrequently.
  • Page 67: Factors To Consider For Drive Group Configuration

    redundancy, in order of importance, and then review the suggested RAID levels. Table 2.16 Factors to Consider for Drive Group Configuration Requirement Rank Suggested RAID Level(s) Storage space RAID 0, RAID 5, RAID 00 Data redundancy RAID 5, RAID 6, RAID 10, RAID 50, RAID 60 Drive performance and throughput RAID 0, RAID 00, RAID 10...
  • Page 68 2-36 Introduction to RAID...
  • Page 69: Full Disk Encryption

    Chapter 3 Full Disk Encryption This chapter describes the Full Disk Encryption (FDE) feature and consists of the following sections: • Section 3.1, “Overview” • Section 3.2, “Purpose” • Section 3.3, “Terminology” • Section 3.4, “Workflow” Overview The Full Disk Encryption feature offers the ability to encrypt data on drives and use disk-based key management to provide data security.
  • Page 70: Purpose

    Purpose Security is a growing market concern and requirement. MegaRAID customers are looking for a comprehensive storage encryption solution to protect data. You can use the FDE feature to help protect your data. Terminology Table 3.1 describes the terminology related to the FDE feature. Table 3.1 Terminology used in FDE Option...
  • Page 71: Workflow

    Option Description Security Key A key based on a user-provided string. The controller uses the security key to lock and unlock access to the secure user data. This key is encrypted into the security key blob and stored on the controller. If the security key is unavailable, user data is irretrievably lost.
  • Page 72: Change Security

    3.4.1.2 Create the Security Key You need to enter the security key to perform certain operations. You can choose a strong security key that the controller suggests. Caution: If you forget the security key, you will lose access to your data. 3.4.1.3 Create a Passphrase (Optional) The pass phrase provides additional security.
  • Page 73: Create Secure Virtual Drives

    3.4.2.1 Change the Security Key Identifier You have the option to edit the security key identifier. If you plan to change the security key, it is highly recommended that you change the security key identifier. Otherwise, you will not be able to differentiate between the security keys.
  • Page 74: Import A Foreign Configuration

    3.4.3.2 Advanced Configuration If you select advanced configuration, select the drive security method, and add the drives to the drive group. Section 8.1.3, “Creating a Virtual Drive Using Advanced Configuration” for the procedures used to import a foreign configuration. After the drive group is secured, you cannot remove the security without deleting the virtual drives.
  • Page 75: Instant Secure Erase

    Instant Secure Erase Instant Secure Erase is a method of data erasure that you can use with FDE drives. After the initial investment into a FDE disk, there is no additional cost in dollars or time to erase data using the Instant Secure Erase feature.
  • Page 76 If there is a need to replace drives – If the amount of data has outgrown the storage system, and there is no room to expand capacity by adding drives, you might choose to purchase upgrade drives. If the older drives support FDE, you can erase the data instantly so the new drives can be used.
  • Page 77: Webbios Configuration Utility

    Chapter 4 WebBIOS Configuration Utility This chapter describes the WebBIOS Configuration Utility (CU) and consists of the following sections: • Section 4.1, “Overview” • Section 4.2, “Starting the WebBIOS CU” • Section 4.3, “WebBIOS CU Main Screen Options” • Section 4.4, “Creating a Storage Configuration” •...
  • Page 78: Starting The Webbios Cu

    1. When the host computer is booting, hold down the <Ctrl> key and press the <H> key when the following text appears on the screen: Copyright© Lenovo Corporation Press <Ctrl><H> for WebBIOS The Controller Selection screen appears. 2. If the system has multiple SAS controllers, select a controller.
  • Page 79: Webbios Cu Main Screen Options

    WebBIOS CU Main Screen Options Figure 4.1 shows the screen that appears when you start the WebBIOS CU and select a controller. Figure 4.1 WebBIOS CU Main Screen In the right frame, the screen shows the virtual drives configured on the controller, and the drives that are connected to the controller.
  • Page 80: Webbios Cu Toolbar Icons

    in the menu on the left. When the physical view screen appears, it shows the drive groups that are configured on this controller. For drives in an enclosure, the screen shows the following drive information: – Enclosure – Slot – Interface type (such as SAS or SATA) –...
  • Page 81: Creating A Storage Configuration

    • Controller Selection: Select this option to view the Controller Selection screen, where you can select a different SAS controller. You can then view information about the controller and the devices connected to it, or create a new configuration on the controller. •...
  • Page 82: Selecting The Configuration With The Configuration Wizard

    subsections explain how to use the Configuration Wizard to create storage configurations: • Section 4.4.1, “Selecting the Configuration with the Configuration Wizard” • Section 4.4.2, “Using Automatic Configuration” • Section 4.4.3, “Using Manual Configuration” 4.4.1 Selecting the Configuration with the Configuration Wizard Follow these steps to start the Configuration Wizard, and select a configuration option and mode: 1.
  • Page 83: Webbios Configuration Method Screen

    2. Select a configuration option. Caution: If you choose the first or second option, all existing data in the configuration will be deleted. Make a backup of any data that you want to keep before you choose an option. – Clear Configuration: Clears the existing configuration.
  • Page 84: Using Automatic Configuration

    4. On this screen, select a configuration mode: – Manual Configuration: Allows you to control all attributes of the new storage configuration as you create drive groups and virtual drives, and set their parameters. – Automatic Configuration: Automatically creates an optimal RAID configuration.
  • Page 85: Using Manual Configuration

    2. Click Yes when you are prompted to save the configuration. 3. Click Yes when you are prompted to initialize the new virtual drive(s). WebBIOS CU begins a background initialization of the virtual drives. 4.4.3 Using Manual Configuration The following subsections contain the procedures for creating RAID drive groups for RAID levels 0, 1, 5, 6, 00, 10, 50, and 60: •...
  • Page 86: Webbios Disk Group Definition Screen

    2. Click Add To Array to move the drives to a proposed drive group configuration in the Disk Groups panel on the right, as shown in Figure 4.4. If you need to undo the changes, click the Reclaim button. Figure 4.4 WebBIOS Disk Group Definition Screen 3.
  • Page 87: Webbios Virtual Drive Definition Screen

    Figure 4.5 WebBIOS Virtual Drive Definition Screen 5. Change the virtual drive options from the defaults listed on the screen as needed. Here are brief explanations of the virtual drive options: • RAID Level: The drop-down menu lists the possible RAID levels for the virtual drive.
  • Page 88 If you do not choose this option, the controller firmware automatically switches to Writethrough mode if it detects a bad or missing BBU. Caution: Lenovo allows Writeback mode to be used with or without a either battery. It is recommended that you use a battery to protect the controller cache, or an uninterruptible power supply (UPS) to protect the entire system.
  • Page 89 • IO Policy: The IO Policy applies to reads on a specific virtual drive. It does not affect the read ahead cache. ◊ Direct: In direct I/O mode, reads are not buffered in cache memory. Data is transferred to the cache and the host concurrently.
  • Page 90: Raid 0 Configuration Preview

    Figure 4.6 RAID 0 Configuration Preview 8. Check the information in the configuration preview. 9. If the virtual drive configuration is acceptable, click Accept to save the configuration. Otherwise, click Back to return to the previous screens and change the configuration. 10.
  • Page 91: Webbios Disk Group Definition Screen

    When you select Manual Configuration and click Next, the Disk Group Definition screen appears. You use this screen to select drives to create drive groups. 1. Hold <Ctrl> while you select two ready drives in the Drives panel on the left. You must select an even number of drives. 2.
  • Page 92: Webbios Virtual Drive Definition Screen

    The Virtual Drive Definition screen appears, as shown in Figure 4.8. You use this screen to select the RAID level, stripe size, read policy, and other attributes for the new virtual drives. Figure 4.8 WebBIOS Virtual Drive Definition Screen 5. Change the virtual drive options from the defaults listed on the screen as needed.
  • Page 93 If you do not choose this option, the controller firmware automatically switches to Writethrough mode if it detects a bad or missing BBU. Caution: Lenovo allows Writeback mode to be used with or without a a battery to battery. It is recommended that you use either...
  • Page 94 supply (UPS) to protect the entire system. If you do not use a battery or a UPS, and there is a power failure, you risk losing the data in the controller cache. • IO Policy: The IO Policy applies to reads on a specific virtual drive. It does not affect the read ahead cache.
  • Page 95: Raid 1 Configuration Preview

    Figure 4.9 RAID 1 Configuration Preview 8. Check the information in the configuration preview. 9. If the virtual drive configuration is acceptable, click Accept to save the configuration. Otherwise, click Back to return to the previous screens and change the configuration. 10.
  • Page 96: Webbios Disk Group Definition Screen

    independently. If a drive fails, the RAID controller uses the parity drive to recreate all missing information. You can use RAID 5 for office automation and online customer service that require fault tolerance. In addition, RAID 5 is good for any application that has high read request rates but low write request rates.
  • Page 97: Webbios Virtual Drive Definition Screen

    4. Click Next. The Virtual Drive Definition screen appears, as shown in Figure 4.11. You use this screen to select the RAID level, stripe size, read policy, and other attributes for the new virtual drives. Figure 4.11 WebBIOS Virtual Drive Definition Screen 5.
  • Page 98 performance. If your computer regularly performs random read requests, choose a smaller stripe size. The default is 64 Kbytes. • Access Policy: Select the type of data access that is allowed for this virtual drive: ◊ RW: Allow read/write access. This is the default. ◊...
  • Page 99 Caution: Lenovo allows Writeback mode to be used with or without a battery. It is recommended that you use either a battery to protect the controller cache, or an uninterruptible power supply (UPS) to protect the entire system. If you do not use a battery or a UPS, and there is a power failure, you risk losing the data in the controller cache.
  • Page 100: Raid 5 Configuration Preview

    Figure 4.12 RAID 5 Configuration Preview 8. Check the information in the configuration preview. 9. If the virtual drive configuration is acceptable, click Accept to save the configuration. Otherwise, click Cancel to end the operation and return to the WebBIOS main menu, or click Back to return to the previous screens and change the configuration.
  • Page 101 RAID 6 is best suited for networks that perform a lot of small input/output (I/O) transactions simultaneously. It provides data redundancy, high read rates, and good performance in most environments. In the case of a failure of one drive or two drives in a virtual drive, the RAID controller uses the parity blocks to recreate all of the missing information.
  • Page 102: Webbios Disk Group Definition Screen

    Figure 4.13 WebBIOS Disk Group Definition Screen 3. When you have finished selecting drives for the drive group, click Accept DG for each. 4. Click Next. The Virtual Drive Definition screen appears, as shown in Figure 4.14. Use this screen to select the RAID level, stripe size, read policy, and other attributes for the new virtual drives.
  • Page 103: Webbios Virtual Drive Definition Screen

    Figure 4.14 WebBIOS Virtual Drive Definition Screen 5. Change the virtual drive options from the defaults listed on the screen as needed. Here are brief explanations of the virtual drive options: • RAID Level: The drop-down menu lists the possible RAID levels for the virtual drive.
  • Page 104 Writethrough mode if it detects a bad or missing BBU. Caution: Lenovo allows Writeback mode to be used with or without a battery. It is recommended that you use either a battery to protect the controller cache, or an uninterruptible power...
  • Page 105 supply (UPS) to protect the entire system. If you do not use a battery or a UPS, and there is a power failure, you risk losing the data in the controller cache. • IO Policy: The IO Policy applies to reads on a specific virtual drive. It does not affect the read ahead cache.
  • Page 106: Raid 6 Configuration Preview

    Figure 4.15 RAID 6 Configuration Preview 8. Check the information in the configuration preview. 9. If the virtual drive configuration is acceptable, click Accept to save the configuration. Otherwise, click Back to return to the previous screens and change the configuration. 10.
  • Page 107 When you select Manual Configuration and click Next, the Disk Group Definition screen appears. You use the Disk Group Definition screen to select drives to create drive groups. 1. Hold <Ctrl> while you select ready drives in the Drives panel on the left.
  • Page 108: Webbios Disk Group Definition Screen

    Figure 4.16 WebBIOS Disk Group Definition Screen 7. Repeat step 4 through step 6 until you have selected all the drives you want for the drive groups. 8. When you have finished selecting drives for the drive groups, select each drive group and then click Accept DG for each selection. 9.
  • Page 109: Webbios Span Definition Screen

    Figure 4.17 WebBIOS Span Definition Screen 10. Under the heading Array With Free Space, hold <Ctrl> while you select a drive group, and then click Add to SPAN. The drive group you select appears in the right frame under the heading Span.
  • Page 110: Webbios Virtual Drive Definition Screen

    Figure 4.18 WebBIOS Virtual Drive Definition Screen 15. Change the virtual drive options from the defaults listed on the screen as needed. Here are brief explanations of the virtual drive options: • RAID Level: The drop-down menu lists the possible RAID levels for the virtual drive.
  • Page 111 Writethrough mode if it detects a bad or missing BBU. Caution: Lenovo allows Writeback mode to be used with or without a battery. To protect the entire system, it is recommended that you use either a battery to protect the controller cache or an uninterruptible power supply (UPS).
  • Page 112 battery or a UPS, and there is a power failure, you risk losing the data in the controller cache. • IO Policy: The IO Policy applies to reads on a specific virtual drive. The policy does not affect the read ahead cache. ◊...
  • Page 113 Figure 4.19 RAID 00 Configuration Preview 18. Check the information in the configuration preview. 19. If the virtual drive configuration is acceptable, click Accept to save the configuration. Otherwise, click Cancel to end the operation and return to the WebBIOS main menu, or click Back to return to the previous screens and change the configuration.
  • Page 114 RAID 10 provides both high data transfer rates and complete data redundancy. It works best for data storage that must have 100 percent redundancy of RAID 1 (mirrored drive groups) and that also needs the enhanced I/O performance of RAID 0 (striped drive groups); it works well for medium-sized databases or any environment that requires a higher degree of fault tolerance and moderate to medium capacity.
  • Page 115 Figure 4.20 WebBIOS Drive Group Definition Screen 7. Repeat step 4 step 6 until you have selected all the drives you want for the drive groups. 8. When you have finished selecting drives for the drive groups, select each drive group and click Accept DG for each. 9.
  • Page 116 Figure 4.21 WebBIOS Span Definition Screen 10. Under the heading Array With Free Space, hold <Ctrl> while you select a drive group with two drives, and click Add to SPAN. The drive group you select displays in the right frame under the heading Span.
  • Page 117 Figure 4.22 WebBIOS Virtual Drive Definition Screen Note: The WebBIOS Configuration Utility shows the maximum available capacity while creating the RAID 10 drive group. In version 1.03 of the utility, the maximum size of the RAID 10 drive group is the sum total of the two RAID 1 drive groups.
  • Page 118 performance. If your computer regularly performs random read requests, choose a smaller stripe size. The default is 64 Kbytes. • Access Policy: Select the type of data access that is allowed for this virtual drive: ◊ RW: Allow read/write access. ◊...
  • Page 119 Caution: Lenovo allows Writeback mode to be used with or without a battery. It is recommended that you use either a battery to protect the controller cache, or an uninterruptible power supply (UPS) to protect the entire system. If you do not use a battery or a UPS, and there is a power failure, you risk losing the data in the controller cache.
  • Page 120 Figure 4.23 RAID 10 Configuration Preview 18. Check the information in the configuration preview. 19. If the virtual drive configuration is acceptable, click Accept to save the configuration. Otherwise, click Cancel to end the operation and return to the WebBIOS main menu, or click Back to return to the previous screens and change the configuration.
  • Page 121 RAID 50 is appropriate when used with data that requires high reliability, high request rates, high data transfer, and medium to large capacity. When you select Manual Configuration and click Next, the Disk Group Definition screen appears. You use this screen to select drives to create drive group.
  • Page 122 Figure 4.24 WebBIOS Disk Group Definition Screen 7. When you have finished selecting drives for the drive groups, select each drive group and click Accept DG for each. 8. Click Next. The Span Definition screen appears, as shown in Figure 4.25.
  • Page 123 Figure 4.25 WebBIOS Span Definition Screen 9. Under the heading Array With Free Space, hold <Ctrl> while you select a drive group of three or more drives, and click Add to SPAN. The drive group you select displays in the right frame under the heading Span.
  • Page 124 Figure 4.26 WebBIOS Virtual Drive Definition Screen 13. Change the virtual drive options from the defaults listed on the screen as needed. Here are brief explanations of the virtual drive options: • RAID Level: The drop-down menu lists the possible RAID levels for the virtual drive.
  • Page 125 Writethrough mode if it detects a bad or missing BBU. Caution: Lenovo allows Writeback mode to be used with or without a battery. It is recommended that you use either a battery to protect the controller cache, or an uninterruptible power supply (UPS) to protect the entire system.
  • Page 126 • IO Policy: The IO Policy applies to reads on a specific virtual drive. It does not affect the read ahead cache. ◊ Direct: In Direct I/O mode, reads are not buffered in cache memory. Data is transferred to the cache and the host concurrently.
  • Page 127 Figure 4.27 RAID 50 Configuration Preview 16. Check the information in the configuration preview. 17. If the virtual drive configuration is acceptable, click Accept to save the configuration. Otherwise, click Back to return to the previous screens and change the configuration. 18.
  • Page 128 RAID 60 can support up to eight spans and tolerate up to 16 drive failures, though less than total drive capacity is available. Two drive failures can be tolerated in each RAID 6 level drive group. RAID 60 is appropriate when used with data that requires high reliability, high request rates, high data transfer, and medium to large capacity.
  • Page 129 Figure 4.28 WebBIOS Disk Group Definition Screen 7. When you have finished selecting drives for the drive groups, select each drive group and click Accept DG for each. 8. Click Next. The Span Definition screen appears, as shown in Figure 4.29.
  • Page 130 Figure 4.29 WebBIOS Span Definition Screen 9. Under the heading Array With Free Space, hold <Ctrl> while you select a drive group of three or more drives, and click Add to SPAN. The drive group you select displays in the right frame under the heading Span.
  • Page 131 Figure 4.30 WebBIOS Virtual Drive Definition Screen 13. Change the virtual drive options from the defaults listed on the screen as needed. Here are brief explanations of the virtual drive options: • RAID Level: The drop-down menu lists the possible RAID levels for the virtual drive.
  • Page 132 Writethrough mode if it detects a bad or missing BBU. Caution: Lenovo allows Writeback mode to be used with or without a battery. It is recommended that you use either a battery to protect the controller cache, or an uninterruptible power supply (UPS) to protect the entire system.
  • Page 133 • IO Policy: The IO Policy applies to reads on a specific virtual drive. It does not affect the read ahead cache. ◊ Direct: In Direct I/O mode, reads are not buffered in cache memory. Data is transferred to the cache and the host concurrently.
  • Page 134: Selecting Full Disk Encryption Security Options

    Figure 4.31 RAID 60 Configuration Preview 16. Check the information in the configuration preview. 17. If the virtual drive configuration is acceptable, click Accept to save the configuration. Otherwise, or click Back to return to the previous screens and change the configuration. 18.
  • Page 135: Enabling The Security Key Identifier, Security Key, And Passphrase

    4.5.1 Enabling the Security Key Identifier, Security Key, and Passphrase Perform the following steps to enable the encryption settings for the security key identifier, security key, and passphrase. 1. Click Encryption Settings on the main WebBIOS screen. The Encryption Settings screen appears, as shown in Figure 4.32.
  • Page 136 Figure 4.33 Enable Drive Security - Introduction Screen 3. Click Next. The screen used to create a security key identifier appears, as shown in Figure 4.34. 4-60 WebBIOS Configuration Utility...
  • Page 137 Figure 4.34 Enable Drive Security – Enter Security Key ID Screen 4. Accept the default security key ID or enter a new security key ID. 5. Click Next. The Enable Drive Security – Enter Security Key screen appears as shown in Figure 4.35.
  • Page 138 Figure 4.35 Enable Drive Security – Enter Security Key 6. Enter a new drive security key or click Suggest to fill the new security key. Enter the new drive security key again to confirm. The security key is case-sensitive. It must be between eight and thirty-two characters and contain at least one number, one lowercase letter, one uppercase letter, and one non-alphanumeric character (e.g.
  • Page 139 Figure 4.36 Enable Drive Security – Enter Pass Phrase 8. If you want to use a pass phrase, click the checkbox Use a pass phrase in addition to the security key. 9. Enter a new pass phrase and then enter the new pass phrase again to confirm.
  • Page 140: Changing The Security Key Identifier, Security Key, And Pass Phrase

    Figure 4.37 Confirm Enable Drive Security Screen 11. Click Yes on the Confirm Enable Drive Security screen to confirm that you want to enable the drive security settings. WebBIOS enables the security key ID, security key, and pass phrase (if applicable) that you entered and returns you to the main menu. Attention: If you forget the security key, you will lose access to your data.
  • Page 141 Figure 4.38 Encryption Settings Screen 2. To change the drive security settings, select Change drive security settings... and click Accept. The Change Security Settings – Introduction screen appears as shown in Figure 4.39. This screen lists the optional actions you can perform: editing the security key identifier, editing the security key, and adding or changing the pass phrase.
  • Page 142 Figure 4.39 Change Security Settings – Introduction 3. To access the option to use the existing security key identifier or enter a new security key identifier, click Next. The Change Security Settings – Security Key ID screen appears as shown in Figure 4.41.
  • Page 143 Figure 4.40 Change Security Settings – Security Key ID 4. Choose whether you want to use the existing security key ID or enter a new security key ID. The options are: – Use the existing security key identifier (Current security key identifier).
  • Page 144 Figure 4.41 Change Security Settings – Security Key 6. Choose whether you want to use the existing security key or enter a new security key. The options are: – Use the existing drive security key. – Enter a new drive security key. 7.
  • Page 145 Figure 4.42 Authenticate Drive Security Key 9. Enter the current security key and click OK. The text box for the security key can hold up to 32 characters. The key must be at least eight characters. After you enter the correct security key, the wizard returns to the Change Security Settings –...
  • Page 146 Figure 4.43 Change Security Settings – Pass Phrase 11. If you want to use a pass phrase, click the checkbox Use a pass phrase in addition to the security key. 12. Enter a new pass phrase and then enter the new pass phrase again to confirm.
  • Page 147: Disabling The Drive Security Settings

    The Confirm Change Drive Security Settings screen appears as shown in Figure 4.44. This screen lists the changes you made and asks you whether you want to confirm these changes. Figure 4.44 Confirm Change Drive Security Settings 15. Click Yes on the Confirm Change Drive Security Settings screen, confirm that you want to change the drive security settings.
  • Page 148 1. Click Encryption Settings on the main WebBIOS screen. The Encryption Settings screen appears as shown in Figure 4.45. Figure 4.45 Encryption Settings 2. To disable the drive security settings, select Disable drive security and click Accept. The Confirm Disable Drive Security screen appears as shown in Figure 4.47.
  • Page 149: Importing Foreign Configurations

    Figure 4.46 Confirm Disable Drive Security Settings 3. On the Confirm Disable Security Settings screen, click No to confirm that you want to disable the drive security settings. WebBIOS returns you to the MSM main menu. 4.5.4 Importing Foreign Configurations After you create a security key, you can run a scan for a foreign configuration and import a locked configuration.
  • Page 150: Viewing And Changing Device Properties

    After you enable the security, you can import the locked drives. To import the locked drives, you must provide the security key used to secure them. Verify whether any drives are left to import as the locked drives can use different security keys.
  • Page 151 The information on this screen is read-only and cannot be modified directly. Most of this information is self-explanatory. The screen lists the number of virtual drives that are already defined on this controller, and the number of drives connected to the controller. If a background initialization is in progress, you can click Background Init Progress to determine its state of completion.
  • Page 152: Controller Properties Menu Options

    Figure 4.49 Third Controller Properties Screen Table 4.2 describes the entries/options listed on the second and third Controller Properties screen. It is recommended that you leave these options at their default settings to achieve the best performance, unless you have a specific reason for changing them. Table 4.2 Controller Properties Menu Options Option...
  • Page 153 Table 4.2 Controller Properties Menu Options (Cont.) Option Description Rebuild Rate Use this option to select the rebuild rate for drives connected to the selected controller. The default is 30 percent. The rebuild rate is the percentage of system resources dedicated to rebuilding a failed drive. The higher the number, the more system resources devoted to a rebuild.
  • Page 154: Viewing And Changing Virtual Drive Properties

    Table 4.2 Controller Properties Menu Options (Cont.) Option Description Spinup Delay Use this option to control the interval (in seconds) between spinup of drives connected to this controller. The delay prevents a drain on the system’s power supply that would occur if all drives spun up at the same time. The default is 12 seconds.
  • Page 155 Figure 4.50 Virtual Drive Screen The Properties panel of this screen displays the virtual drive’s RAID level, state, size, and stripe size. The Policies panel lists the virtual drive policies that were defined when the storage configuration was created. For information about these policies, see Section 4.4.3, “Using Manual Configuration.”...
  • Page 156: Viewing Drive Properties

    • Select Fast Init or Slow Init to initialize this virtual drive. A fast initialization quickly writes zeroes to the first and last 10 Mbyte regions of the new virtual drive and then completes the initialization in the background. A slow initialization is not complete until the entire virtual drive has been initialized with zeroes.
  • Page 157 Figure 4.51 shows the Physical Drive screen. Figure 4.51 Physical Drive Screen The drive properties are view-only and are self-explanatory. Note that the properties include the state of the drive. Operations you can perform are listed at the bottom of the screen. After you select an operation, click Go to start the operation.
  • Page 158: Viewing And Changing Battery Backup Unit Information

    • Select Make Global HSP to make a global hot spare, available to all of the virtual drives. • Select Make Dedicated HSP to make a hot spare dedicated to a specific virtual drive. WebBIOS displays the global hot spare as Global and the dedicated hot spare as Ded.
  • Page 159 Figure 4.52 First Controller Properties Screen 2. Click Next to view the second Controller Properties screen. The second Controller Properties screen appears, as shown in Figure 4.53. The Battery Backup field at the top left of the screen indicates whether the iBBU is present. Figure 4.53 Second Controller Properties Screen 3.
  • Page 160 (the length of time between automatic learning cycles) and the auto learn mode. Note: Lenovo recommends leaving the the learn delay interval and the auto learn mode at their default settings. 4-84 WebBIOS Configuration Utility...
  • Page 161: Viewing System Event Information

    – Setting the Learn Delay Interval The learn delay interval is the length of time between automatic learning cycles. Perform the following steps to change the interval: 1. Open the drop-down menu in the Auto Learn Mode field. 2. Select the learn mode as Auto (the default). This is so the controller performs the learning cycle automatically.
  • Page 162 (such as the creation of a new virtual drive or the removal of a drive) an event message is generated and is stored in the controller NVRAM. You can use the WebBIOS CU to view these event messages. To do this, click Events on the main WebBIOS CU screen.
  • Page 163: Managing Configurations

    4. Enter the Number of events of this type that you want to view, and click Go. The first event in the sequence appears in the right panel. 5. Click Next or Prev to page forward or backward through the sequence of events.
  • Page 164: Deleting A Virtual Drive

    4.8.2 Deleting a Virtual Drive You can delete any virtual drive on the controller if you want to reuse that space for a new virtual drive. The WebBIOS CU provides a list of configurable drive groups where there is a space to configure. If multiple virtual drives are defined on a single drive group, you can delete a virtual drive without deleting the whole drive group.
  • Page 165 Figure 4.56 Foreign Configuration Import Screen The GUID (Global Unique Identifier) entries on the drop-down list are OEM names and will vary from one installation to another. Click Preview if you want to preview the foreign configuration. The preview screen appears, as shown in Figure 4.57.
  • Page 166 Figure 4.57 Foreign Configuration Preview Screen The right panel shows the virtual drive properties of the foreign configuration. In this example, there is a RAID 1 virtual drive with 1,000 Mbytes. The left panel shows the drives that comprise the foreign configuration.
  • Page 167 4.8.3.2 Importing Foreign Configurations from Integrated RAID to MegaRAID The Integrated RAID solution simplifies the configuration options and provides firmware support in its host controllers. Lenovo offers two types of Integrated RAID (IR): Integrated Mirroring (IM) and Integrated Striping (IS).
  • Page 168: Migrating The Raid Level Of A Virtual Drive

    An IR virtual drive can have either 64 Mbytes or 512 Mbytes available for metadata at the end of the drive. This data is in Lenovo Data Format (LDF). MegaRAID virtual drives have 512 Mbytes for metadata at the end of the drive in the Disk Data format (DDF).
  • Page 169: Additional Drives Required For Raid-Level Migration

    Note: While you can apply RAID-level migration at any time, it is recommended that you do so when there are no reboots. Many operating systems issues I/O operations serially (one at a time) during boot. With a RAID-level migration running, a boot can often take more than 15 minutes.
  • Page 170 2. Click Virtual Drives. 3. When the Virtual Drive screen appears, select Migration only (and skip to step 6) or Migration with addition in the right panel. 4. If you selected Migration with addition, select one or more drives from the small window in the lower right of the screen. 5.
  • Page 171 Chapter 5 MegaRAID Command Tool The MegaRAID Command Tool (CT) is a command line interface (CLI) application for SAS. You can use this utility to configure, monitor, and maintain MegaRAID SAS RAID controllers and the devices connected to them. Note: The CT supports only the MegaRAID controller.
  • Page 172: Product Overview

    • Section 5.12, “Enclosure-Related Options” • Section 5.13, “Flashing the Firmware” • Section 5.14, “SAS Topology” • Section 5.15, “Diagnostic-Related Options” • Section 5.16, “Miscellaneous Options” Product Overview The MegaCLI Configuration Utility is a command line interface application you can use to manage MegaRAID SAS RAID controllers. You can use MegaCLI Configuration Utility to perform the following tasks: •...
  • Page 173 • Start or stop a rebuild, consistency check (CC), or initialization operation • Enable or disable a background initialization (BGI) • Stop or display an ongoing background initialization • Start or display a reconstruction • Start or stop patrol read •...
  • Page 174: Novell Netware, Sco, Solaris, Freebsd, And Dos Operating System Support

    MegaCLI.image. The floppy disk is provided so that you can distribute MegaCLI and install the executable file later as needed. For the Solaris operating system, Lenovo provides an executable file that you can execute from any folder. No installation is required.
  • Page 175: Conventions

    Table 5.1 Command Line Abbreviations Abbreviation Description WriteBack write policy WriteThrough write policy ADRA Adaptive Read Ahead read policy Read Ahead read policy NORA Normal Read policy (No read ahead) Direct I/O cache policy Cached I/O cache policy 5.3.2 Conventions There are some options for which you can specify multiple values.
  • Page 176: Controller Parameters

    Table 5.2 Conventions (Cont.) Convention Description [E0:S0,E1,S1,…] Specifies when one or more physical devices need(s) to be specified in the command line. Each [E:S] pair specifies one physical device where E means device ID of the enclosure in which a drive resides, and S means the slot number of the enclosure.
  • Page 177: Number Of Controllers Supported

    Table 5.3 Controller Parameters (Cont.) Description Displays information about the controller, including cluster state, BIOS, alarm, firmware version, BIOS version, battery charge counter value, rebuild rate, bus number/device number, present RAM, memory size, serial number of the board, and SAS address. 5.4.2 Display Number of Controllers Supported Use the command in...
  • Page 178: Set Controller Properties

    At 100 percent, the rebuild has a higher priority than any other system activity. Note: Lenovo recommends the default rebuild rate of 30 percent, and the default patrol read rate of 30 percent. Use the command in Table 5.7...
  • Page 179: Display Specified Controller Properties

    Table 5.7 Set Controller Properties (Cont.) Description Sets the properties on the selected controller(s). The possible settings are: CacheFlushInterval: Cache flush interval in seconds. Values: 0 to 255. RebuildRate: Rebuild rate. Values: 0 to 100. PatrolReadRate: Patrol read rate. Values: 0 to 100. BgiRate: Background initilization rate.
  • Page 180: Set Factory Defaults

    Table 5.8 Display Specified Controller Properties Convention MegaCli –AdpGetProp CacheFlushInterval | RebuildRate | PatrolReadRate| BgiRate | CCRate | ReconRate | SpinupDriveCount | SpinupDelay | CoercionMode | PredFailPollInterval | ClusterEnable | BatWarnDsbl | EccBucketSize | EccBucketLeakRate | EccBucketCount | AlarmDsply | AbortCCOnError | AutoDetectBackPlaneDsbl | CopyBackDsbl | LoadBalanceMode | SMARTCpyBkEnbl | SSDSMARTCpyBkEnbl |...
  • Page 181: Display Time And Date On Controller

    Table 5.11 Set Time and Date on Controller Convention MegaCli –AdpSetTime yyyymmdd HH:mm:ss -aN|-a0,1,2|-aALL Description Sets the time and date on the controller. This command uses a 24-hour format. For example, 7 p.m. displays as 19:00:00. The order of date and time is reversible. 5.4.10 Display Time and Date on Controller Use the command in...
  • Page 182: Set Patrol Read Delay Interval

    Table 5.13 Set Patrol Read Options Convention MegaCli –AdpPR –Dsbl|EnblAuto|EnblMan|Start|Stop|Info | SSDPatrolReadEnbl | SSDPatrolReadDsbl | {-SetStartTime yyyymmdd hh} | maxConcurrentPD -aN| -a0,1,2|-aALL Description Sets Patrol Read options on a single controller, multiple controllers, or all controllers: -Dsbl: Disables Patrol Read for the selected controller(s). -EnblAuto: Enables Patrol Read automatically for the selected controller(s).
  • Page 183: Bootable Virtual Drive Id

    5.6.1 Set or Display Bootable Virtual Drive ID Use the command in Table 5.15 to set or display the ID of the bootable virtual drive. Note: This option does not write a boot sector to the virtual drive. The operating system will not load if the boot sector is incorrect.
  • Page 184: Display Bbu Information

    5.7.1 Display BBU Information Use the command in Table 5.17 to display complete information about the BBU for the selected controller(s). Table 5.17 Display BBU Information Convention MegaCli -AdpBbuCmd -aN|-a0,1,2|-aALL Description Displays complete information about the BBU, such as status, capacity information, design information, and properties.
  • Page 185: Display Bbu Capacity

    Table 5.18 Display BBU Status Information (Cont.) Description Displays complete information about the BBU status, such as the temperature and voltage. The information displays in the following formats: BBU Status for Adapter: xx Battery Type: XXXXXX(string) Voltage: xx mV Current: xx mA Temperature: xx C°...
  • Page 186: Display Bbu Capacity Information

    Table 5.19 Display BBU Capacity Information Convention MegaCli -AdpBbuCmd -GetBbuCapacityInfo –aN|-a0,1,2|-aALL Description Displays BBU capacity information. The information displays in the following format: BBU Capacity Info for Adapter: x Relative State of Charge: xx% Absolute State of Charge: xx% Remaining Capacity: xx mAh Full Charge Capacity: xx mAh Run Time to Empty: xxx Min Average Time to Empty: xxx Min...
  • Page 187: Start Bbu Learning Cycle

    Table 5.21 Display Current BBU Properties Convention MegaCli -AdpBbuCmd -GetBbuProperties –aN|-a0,1,2|-aALL Description Displays current properties of the BBU. The information displays in the following formats: BBU Properties for Adapter: x Auto Learn Period: xxx Sec Next Learn Time: xxxx Sec Learn Delay Interval: xx Hours Auto-Learn Mode: Warn via Event/Disabled/Enabled 5.7.6...
  • Page 188: Options For Displaying Logs Kept At Firmware Level

    Table 5.24 Set BBU Properties Convention MegaCli -AdpBbuCmd -SetBbuProperties -f<fileName> -aN|-a0,1,2|-aALL Description Sets the BBU properties on the selected controller(s) after reading from the file. The information displays in the following formats: autoLearnPeriod = 1800Sec nextLearnTime = 12345678Sec Seconds past 1/1/2000 learnDelayInterval = 24hours Not greater than 7 days autoLearnMode = 0 0 –...
  • Page 189: Set Bbu Terminal Logging

    Table 5.25 Event Log Management (Cont.) Description Manages event log entries. The following are the settings you can select on a single controller, multiple controllers, or all controllers: -GetEventlogInfo: Displays overall event information such as total number of events, newest sequence number, oldest sequence number, shutdown sequence number, reboot sequence number, and clear sequence number.
  • Page 190: Create A Drive Group From All Of The Unconfigured Drives

    is assumed that they are connected to Enclosure 0. In this case there is no slot, so you can use the pdlist command to get the slot equivalent number. (This applies to all commands that use the Enclosure ID:Slot ID format.) MegaCLI expects the input in [:S] format for directly attached devices.
  • Page 191: Add Raid 0, 1, 5, Or 6 Configuration

    Table 5.27 Create a Drive Group from All of the Unconfigured Drives (Cont.) Description Creates one RAID drive group out of all of the unconfigured good drives, and a hot spare, if desired. This is for RAID levels 0, 5, 6, 10, 50, or 60. All free drives are used to create a new drive group and, if desired, one hot spare drive.
  • Page 192 Table 5.28 Add RAID 0, 1, 5, or 6 Configuration (Cont.) Description Adds a RAID level 0, 1, 5, or 6 configuration to a specified controller. Even if no configuration is present, you have the option to write the configuration to the controller.
  • Page 193: Add Raid 10, 50, Or 60 Configuration

    5.9.3 Add RAID 10, 50, or 60 Configuration Use the command in Table 5.29 to add a RAID 10, RAID 50, or RAID 60 configuration to the existing configuration on the selected controller. For RAID levels 0, 1, 5, or 6, see Section 5.9.2, “Add RAID 0, 1, 5, or 6 Configuration.”...
  • Page 194: Save Configuration On The Controller

    Table 5.30 Clear Existing Configuration (Cont.) Description Clears the existing configuration. 5.9.5 Save the Configuration on the Controller Use the command in Table 5.31 to save the configuration for the selected controller(s) to the given filename. Table 5.31 Save Configuration on the Controller Convention MegaCli –CfgSave –f FileName...
  • Page 195: Delete Specified Virtual Drives

    Table 5.33 Manage Foreign Configuration Information Convention MegaCli -CfgForeign -Scan | [-SecurityKey sssssssssss] | -Dsply [x] | [-SecurityKey sssssssssss] | -Preview [x] | [-SecurityKey sssssssssss] | -Import [x] | [-SecurityKey sssssssssss] | -Clear [x] | [-SecurityKey sssssssssss] -aN|-a0,1,2|-aALL Description Manages foreign configurations. The options for this command are: -Scan: Scans and displays available foreign configurations.
  • Page 196: Virtual Drive-Related Options

    5.10 Virtual Drive-Related Options You can use the commands in this section to select settings for the virtual drives and perform actions on them. 5.10.1 Display Virtual Drive Information Use the command in Table 5.36 to display virtual drive information for the selected controller(s).
  • Page 197: Display Virtual Drive Cache And Access Parameters

    5.10.3 Display the Virtual Drive Cache and Access Parameters Use the command in Table 5.38 to display cache and access parameters for the virtual drive(s) on the selected controller(s). Table 5.38 Display Virtual Drive Cache and Access Parameters Convention MegaCli –LDGetProp -Cache | -Access | -Name | -DskCache -Lx|-L0,1,2| -Lall -aN|-a0,1,2|-aALL Description...
  • Page 198: Manage Consistency Check

    5.10.5 Manage a Consistency Check Use the command in Table 5.40 to manage a data consistency check (CC) on the virtual drives for the selected controller(s). Table 5.40 Manage Consistency Check Convention MegaCli –LDCC –Start|-Abort|–ShowProg|-ProgDsply –Lx|-L0,1,2|-Lall -aN|-a0,1,2|-aALL Description Allows you to select the following actions for a data CC: -Start: Starts a CC on the virtual drive(s), then displays the progress (optional) and time remaining.
  • Page 199: Virtual Drive Reconstruction

    5.10.7 Perform a Virtual Drive Reconstruction Use the command in Table 5.42 to perform a reconstruction of the virtual drive(s) on the selected controller(s). Table 5.42 Virtual Drive Reconstruction Convention MegaCli –LDRecon {–Start –Rx [Add | Rmv PhysDrv[E0:S0,E1:S1,...] ] } |–ShowProg|-ProgDsply –Lx –aN Description Controls and manages virtual drive reconstruction.
  • Page 200: Drive-Related Options

    Table 5.44 Display Number of Virtual Drives (Cont.) Description Displays the number of virtual drives attached to the controller. The return value is the number of virtual drives. 5.11 Drive-Related Options You can use the commands in this section to select settings for the drives and perform actions on them.
  • Page 201: Set Drive State To Offline

    Table 5.47 Set Drive State to Offline Convention MegaCli –PDOffline -PhysDrv[E0:S0,E1:S1..] -aN|-a0,1,2|-aALL Description Changes the drive state to Offline. 5.11.4 Change the Drive State to Unconfigured Good Use the command in Table 5.48 to change the state of a drive from Unconfigured-Bad to Unconfigured-Good.
  • Page 202: Drive Initialization

    5.11.6 Manage a Drive Initialization Use the command in Table 5.50 to manage a drive initialization on the selected controller(s). Table 5.50 Drive Initialization Convention MegaCli –PDClear -Start |-Stop|-ShowProg |-ProgDsply - PhysDrv[E0:S0,E1:S1..] -aN|-a0,1,2|-aALL Description Manages initialization or displays initialization progress on a single controller, multiple controllers, or all controllers: -Start: Starts initialization on the selected drive(s).
  • Page 203: Locate Drive And Activate Led

    5.11.8 Locate the Drive(s) and Activate LED Use the command in Table 5.52 to locate the drive(s) for the selected controller(s) and activate the drive activity LED. Table 5.52 Locate Drive and Activate LED Convention MegaCli –PDLocate –PhysDrv[E0:S0,E1:S1..] -aN|-a0,1,2|-aALL Description Locates the drive(s) for the selected controller(s) and activates the drive activity LED.
  • Page 204: Prepare Unconfigured Drive(S) For Removal

    Table 5.55 Replace Configured Drive(s) and Start Automatic Rebuild (Cont.) Description Replaces the configured drives that are identified as missing and then starts an automatic rebuild. 5.11.12 Prepare the Unconfigured Drive for Removal Use the command in Table 5.56 to prepare the unconfigured drive(s) for removal from the selected controller(s).
  • Page 205: 5.11.15 Download Firmware To The Physical Devices

    5.11.15 Download Firmware to the Physical Devices Use the command in Table 5.58 to download firmware to the physical devices connected to the selected controller(s). Table 5.59 Download Firmware to the Physical Devices Convention MegaCli –PdFwDownload – -PhysDrv[E0:S0,E1:S1..] –-f <filename> –aN| -a0,1,2|-aAll Description Flashes the firmware with the file specified at the command line.
  • Page 206: Flash Firmware In Mode 0 With Rom File

    Table 5.61 Flash Firmware with ROM File (Cont.) Description Flashes the firmware with the ROM file specified at the command line. The –NoSigChk option forces the application to flash the firmware even if the check word on the file does not match the required check word for the controller. This option flashes the firmware only if the existing firmware version on the controller is lower than the version on the ROM image.
  • Page 207: Display Phy Connection Information

    A port can contain a single PHY or can contain multiple PHYs. A narrow port contains a single PHY, and a wide port contains multiple PHYs. Table 5.63 Display PHY Connection Information Convention MegaCli –PHYInfo -phyM –aN|-a0,1,2|-aALL Description Displays PHY connection information for physical PHY M on the controller(s). 5.15 Diagnostic-Related Options The commands in this section are used to run diagnostic tests.
  • Page 208: Start Nvram Diagnostic

    Table 5.66 Start NVRAM Diagnostic Convention MegaCli –AdpNVRAM {-Read|-Write -ffilename}|–Clear [-StartOffset 0xXXXX] [-EndOffset 0xXXXX] aN Description Starts the NVRAM diagnostic. -Read: Reads the content in NVRAM and writes the data to file filename. -Write: Reads data from file filename and writes to NVRAM. -Clear: Writes 0 to NVRAM at the specified range from start offset to end offset.
  • Page 209: Creating Storage Configurations

    Chapter 6 MegaRAID Storage Manager Overview and Installation This chapter provides a brief overview of the MegaRAID Storage Manager (MSM) software and explains how to install it on the supported operating systems. This chapter has the following sections: • Section 6.1, “Overview” •...
  • Page 210: Monitoring Storage Devices

    You can use the Configuration Wizard Auto Configuration mode to automatically create the best possible configuration with the available hardware. You can use the Guided Configuration mode, which asks you a few brief questions about the configuration, and then creates it for you. Or you can use the Manual Configuration mode, which gives you complete control over all aspects of the storage configuration.
  • Page 211: Installing Megaraid Storage Manager

    Installing MegaRAID Storage Manager This section explains how to install (or reinstall) MegaRAID Storage Manager software on your workstation or server for the supported operating systems: Microsoft® Windows, Red Hat Linux, and SUSE Linux. 6.3.1 Installing MegaRAID Storage Manager Software on Microsoft Windows Follow these steps if you need to install MegaRAID Storage Manager software on a system running Microsoft Windows Server 2003, Microsoft...
  • Page 212 Figure 6.1 Customer Information Screen 5. Enter your user name and organization name. In the bottom part of the screen, select an installation option: – If you select All users, any user with administrative privileges can use this version of MegaRAID Storage Manager software to view or change storage configurations.
  • Page 213 Figure 6.2 Setup Type Screen 8. Select one of the Setup options. The options are fully explained in the screen text. – Normally, you would select Complete if you are installing MegaRAID Storage Manager software on a server. – Select Custom Installation if you want to select individual program components.
  • Page 214 Figure 6.3 Setup Type Screen 10. Select one of the custom setup options. The options are fully explained in the screen text. – Select Client if you are installing MegaRAID Storage Manager software on a PC that will be used to view and configure servers over a network.
  • Page 215 If you select Custom, a window listing the installation features appears, as shown in Figure 6.4. Select the features you want on this screen. Figure 6.4 Custom Setup Screen 11. Click Next to proceed. 12. Click Install to install the program. 13.
  • Page 216: Installing Megaraid Storage Manager Software For Linux

    Figure 6.5 Server Screen 6.3.2 Installing MegaRAID Storage Manager Software for Linux Follow these steps if you need to install MegaRAID Storage Manager software on a system running Red Hat Linux or SUSE Linux: 1. Copy the MSM_linux_installer...tar.gz file to a temporary folder.
  • Page 217: Linux Error Messages

    not list any servers. You can use this screen to manage systems remotely. To install the software using interactive mode, execute the command ./install.sh from the installation disk. To install the product in a non-interactive or silent mode, use the command ./install.sh [-options] [ -ru popup] from the installation disk.
  • Page 218: Megaraid Storage Manager Support And Installation On Vmware

    This message indicates that the user has installed more than one copy of MegaRAID Storage Manager software. (This can be done by using the rpm-force command to install the rpm file directly, which is not recommended, instead of using the install.sh file.) In such cases, the user must uninstall all of the rpm files manually before installing MegaRAID Storage Manager software with the procedure listed previously.
  • Page 219: Uninstalling Megaraid Storage Manager For Vmware

    – End user license agreement – Operating system (VMware 3.5 or VMware 4.0) – Select the Storelib (Inbox Storelib or Storelib from MSM package) 6.4.2 Uninstalling MegaRAID Storage Manager for VMWare To uninstall the Server Component of MSM on VMWare, use the Uninstall command in the Program menu or run the script /usr/local/MegaRAID Storage Manager/uninstaller.sh.
  • Page 220 Assignment of a ESXi hostname: – Even if it is not relevant for your network, you need a FQDN (Fully Qualified Domain Name). – Example: local.lenovo.com to be entered using the local ESXi console • Configuration of a virtual network environment: –...
  • Page 221 ESXi Host. Host Overview: Figure 6.6 shows the name of the host ESXi server. In this example, the host ESXi server name is local.lenovo.com MegaRAID Storage Manager Support and Installation on VMWare 6-13...
  • Page 222 Figure 6.6 Host ESXi Server Name You can now enter the user name and password to log in on the ESXi Host, as shown in Figure 6.7. 6-14 MegaRAID Storage Manager Overview and Installation...
  • Page 223 Figure 6.7 Login on the Host Server After you log in, you can view the drives connected to the controller (the physical view), as shown in Figure 6.8. MegaRAID Storage Manager Support and Installation on VMWare 6-15...
  • Page 224 Figure 6.8 Physical View Click the Logical tab to view the virtual drives connected to the controller (the logical view), as shown in Figure 6.9. 6-16 MegaRAID Storage Manager Overview and Installation...
  • Page 225 Figure 6.9 Logical View 6.4.3.1 Limitations The following are the limitations of this installation and configuration: • There is no active event notification, for example, by popup or email • There is no status information for the controller • There is no user authentification. •...
  • Page 226 6.4.3.2 VMWare ESX 3i Management through CIM and CMPI Management of VMWare ESX 3i is possible only through a Common Information Model (CIM) provider. It is not possible to install anything on the VMWare ESX3i system, so management is performed through MSM installed on a remote machine (Linux/Windows).
  • Page 227 – MSM allows CIMOM server authentication with the user ID and the password for VMware. – Access control is not supported. There is no support for full view or view only access modes. It is always full view access, and multiple clients can have full view access at the same time on the same server.
  • Page 228 – Add an entry to map its own IP address (not the loop back address) with the Hostname. This is to ensure that the Alert Event Notifications (AENs) are delivered correctly. – For networks that has DNS configured, the “hosts” file in the machine on which MSM is installed must be edited as follows: –...
  • Page 229 – There is no email and system log support. – Monitor service support is not available. 11. For Red Hat Enterprise Linux 5, you must create the following symbolic links: Note: This step is not required for MSM version 2.90-02 or later. –...
  • Page 230 c. Enter your password when prompted. There is no password by default for the shell. If you have set any password from the “yellow” screen (DCUI), use that password. You are prompted (#) next. 2. Enable ssh for remote copy. a.
  • Page 231: Installing And Configuring A Cim Provider

    host, you have to follow this procedure to replace the Storelib library. Installing and Configuring a CIM Provider This section describes the installation and configuration of the ThinkServer MegaRAID Common Information Model (CIM) provider. The Common Information Model offers common definitions of management information for networks, applications, and services, and allows you to exchange management information across systems throughout a network.
  • Page 232 1. Install the SAS Provider using the Red Hat Package Manager (RPM) by entering the following command: rpm -ivh The RPM installs all of the neccessary files and the Managed Object Format (MOF), and it registers the libraries. The Provider is now ready to use.
  • Page 233: Installing A Cim Sas Storage Provider On Windows

    a. To start the tog-pegasus server, execute the following command: # /etc/init.d/tog-pegasus restart b. To start ThinkServerSASSever, execute the following command: # /etc/init.d/ThinkServerSASd restart 6.5.2 Installing a CIM SAS Storage Provider on Windows The following procedure describes how to install and un-install the ThinkServer CIM SAS Storage Provider on a system running on a Windows operating system.
  • Page 234: Installing And Configuring An Snmp Agent On Linux

    This section describes the installation and configuration of the ThinkServer MegaRAID SNMP agent on Linux, Solaris, and Windows operating systems. 6.6.1 Installing and Configuring an SNMP Agent on Linux This section explains how to install and configure SAS SNMP Agent for the SUSE Linux and Red Hat Linux operating systems.
  • Page 235 For example, to get a trap in 10.0.0.144, add the following to snmpd.conf. sec.name source community com2sec snmpclient 10.0.0.144 public 4. To run/stop the snmpd daemon, enter the following command: /etc/init.d/snmpd start/stop 5. To start/stop the SAS SNMP Agent daemon before issuing a SNMP query, enter the following command: /etc/init.d/ThinkServer_mrdsnmpd start/stop You can check the status of the SAS SNMP Agent daemon by...
  • Page 236: Installing And Configuring An Snmp Agent On Solaris

    2. Modify the /etc/init.d/snmpd file and change SNMPDCONF=/etc/snmp/snmpd.conf entry to SNMPDCONF=/etc/snmpd.conf. 3. Run ThinkServer SNMP rpm 6.6.2 Installing and Configuring an SNMP Agent on Solaris This section explains how to install and configure SAS SNMP Agent for the Solaris operating system. To install and configure SNMP for Solaris, perform the procedures described in the following sections: –...
  • Page 237 Uninstall the existing version by using the following commands: (to uninstall storelib library) # pkgrm storelib (to uninstall ThinkServer SAS SNMP Agent) # pkgrm sassnmp 6.6.2.3 ThinkServer SAS SNMP MIB Location After you install the ThinkServer SAS SNMP Agent package, the MIB file ThinkServer-AdapterSAS.mib is installed under /etc/ThinkServer_mrdsnmp/sas directory.
  • Page 238 6.6.2.5 Configuring snmpd.conf By default, SNMP queries (walk, get) can be executed from any remote machine without any changes to the snmpd.conf file. To quickly add a new community and client access, perform the following steps: 1. Stop the SMA service by executing the following command: # svcadm disable svc:/application/management/sma:default 2.
  • Page 239 – # arguments: community – # [default|hostname|network/bits] [oid] – # rwcommunity snmpclient 172.28.157.149 – ################################################# 3. Start the SMA service by using the following command: # svcadm enable svc:/application/management/sma:default Note: Refer to the command man snmpd.conf for more information about configuring the snmpd.conf file. 6.6.2.6 Configuring SNMP Traps To receive SNMP traps, perform the following steps:...
  • Page 240: Installing An Snmp Agent On Windows

    2. Use SNMP Manager to retrieve the SAS data (it is assumed that you have compiled ThinkServer-AdapterSAS.mib file already). The ThinkServer-AdapterSAS.mib file is available under %ProgramFiles%\Lenovo Corporation\SNMPAgent\SAS directory. 3. Use a trap utility to get the traps. Note: Before you install the Agent, make sure that SNMP Service is already installed in the system.
  • Page 241: Megaraid Storage Manager Support And Installation On Solaris 10

    4. Click Next and follow any prompts to complete the installation procedure. 6.6.3.3 Configuring SNMP Service on the Server Side Perform the following steps to configure SNMP Service on the server side. 1. Select Administrative Tools from Control Panel. 2. Select Services from the Administrative Tools window. 3.
  • Page 242: Uninstalling Megaraid Storage Manager Software For Solaris 10

    6. When prompted by the installation scripts, select Y to complete the installation. 6.7.2 Uninstalling MegaRAID Storage Manager Software for Solaris 10 Follow these steps to uninstall MegaRAID Storage Manager software on a system running Solaris 10, update 5: Step 1. Execute the Uninstaller.sh file located in /opt/MegaRaidStorageManager directory.
  • Page 243: Starting Megaraid Storage Manager Software

    Chapter 7 MegaRAID Storage Manager Window and Menus This chapter explains how to start MegaRAID Storage Manager software and describes the MegaRAID Storage Manager window and menus. This chapter has the following sections: • Section 7.1, “Starting MegaRAID Storage Manager Software” •...
  • Page 244 2. When the program starts, the Select Server window appears, as shown in Figure 7.1. Figure 7.1 Select Server Window If the circle in the server icon is orange instead of green, it means that the server is running in a degraded state—for example, because a drive used in a virtual drive has failed.
  • Page 245 Note: When connecting to a VMWare server on a different subnet, one or more Frameworks have to be running in the subnet in order to connect to the CIMOM. 3. Double-click the icon of the server that you want to access. The Server Login window appears, as shown in Figure 7.2.
  • Page 246: Megaraid Storage Manager Window

    If your user name and password are correct for the Login mode you have chosen, the main MegaRAID Storage Manager window appears. MegaRAID Storage Manager Window This section describes the MegaRAID Storage Manager window, which is shown in Figure 7.3. Figure 7.3 Main MegaRAID Storage Manager Window The following topics describe the panels and menu options that appear...
  • Page 247: Physical/Logical View Panel

    7.2.1 Physical/Logical View Panel The left panel of the MegaRAID Storage Manager window displays either the Physical view or the Logical view of the system and the devices in it, depending on which tab is selected. • The Physical view shows the hierarchy of physical devices in the system.
  • Page 248: Properties/Operations Panels

    • Battery backup unit (BBU) • Tape drive • CD-ROM Note: MegaRAID Storage Manager shows the icons for tape drive devices; however, no tape-related operations are supported by the utility. If these operations are required, use a separate backup application. A red circle to the right of an icon indicates that the device has failed.
  • Page 249: Event Log Panel

    Figure 7.4 Operations Tab 7.2.3 Event Log Panel The lower part of the MegaRAID Storage Manager window displays the system event log entries, as shown in Figure 7.3. New event log entries appear during the session. Each entry has an ID, an error level indicating the severity of the event, the timestamp and date, and a brief description of the event.
  • Page 250: Menu Bar

    7.2.4 Menu Bar Here are brief descriptions of the main selections on the MegaRAID Storage Manager menu bar. Specific menu options are described in more detail in Chapters 8, 9, and of this manual. 7.2.4.1 File Menu The File menu has an Exit option for exiting from the MegaRAID Storage Manager software.
  • Page 251 7.2.4.4 Tools Menu On the Tools menu you can select Tools->Configure->Configure Alerts to access the Event Configuration Notification screen, which you can use to set the alert delivery rules, event severity levels, exceptions, and email settings. For more information, see Section 9.2, “Configuring Alert Notifications.”...
  • Page 252 7-10 MegaRAID Storage Manager Window and Menus...
  • Page 253: Chapter 8 Configuration

    Chapter 8 Configuration storage configurations on ThinkServer SAS controllers. These controllers support storage configurations on ThinkServer SAS controllers. These controllers support RAID 0, RAID 1, RAID 5, RAID 6, RAID 10, RAID 50, and RAID 60 storage configurations. To learn more about RAID and RAID levels, see Chapter 2, “Introduction to RAID.”...
  • Page 254: Creating A New Storage Configuration

    Creating a New Storage Configuration You can use the MegaRAID Storage Manager to create new storage configurations on systems with ThinkServer SAS controllers. You can create the following types of configurations: • Simple configuration specifies a limited number of settings and has the system select drives for you.
  • Page 255 ◊ Full Initialization: A complete initialization is done on the new configuration. You cannot write data to the new virtual drive until the initialization is complete. This can take a long time if the drives are large. • Stripe size: Stripe sizes of 8, 16, 32, 64, 128, 256, 512, and 1024 Kbytes are supported.
  • Page 256: Creating A Virtual Drive Using Simple Configuration

    ◊ Direct IO: (the default) In this mode, reads are not buffered in cache memory. Data is transferred to the cache and the host concurrently. If the same data block is read again, it comes from cache memory. Cached IO provides faster processing, and Direct IO ensures that the cache and the host contain the same data.
  • Page 257 – Select the controller node and select Operations->Create Virtual Drive in the menu bar, as shown in Figure 8.1. Figure 8.1 Virtual Drive Creation Menu The dialog box for the configuration mode (simple or advanced) appears, as shown in Figure 8.2.
  • Page 258 Figure 8.2 Virtual Drive Creation Mode 2. Click Simple and press Next. The Create Virtual Drive screen appears, as shown in Figure 8.3. Configuration...
  • Page 259 Figure 8.3 Create Virtual Drive Screen 3. Select the RAID level desired for the virtual drive. When you use simple configuration, the RAID controller supports RAID levels 1, 5, and 6. In addition, it supports independent drives (configured as RAID 0). The screen text gives a brief description of the RAID level that you select.
  • Page 260 5. Click the box next to the text Use drive security if you want to set a drive security method. The Full Disk Encryption (FDE) feature provides the ability to encrypt data and use disk-based key management for your data security solution.
  • Page 261: Creating A Virtual Drive Using Advanced Configuration

    the drives. A progress bar appears as the drives spin up. If any of the selected unconfigured drives fail to spin up, a box appears to identify the drive or drives. After the configuration is completed, a dialog box notifies you that the virtual drives were created successfully.
  • Page 262 Figure 8.5 Virtual Drive Creation Menu The dialog box shown in Figure 8.6 appears. 8-10 Configuration...
  • Page 263 Figure 8.6 Virtual Drive Creation Mode 10. Click Advanced and press Next. The Create Drive Group Settings screen appears, as shown in Figure 8.7. Creating a New Storage Configuration 8-11...
  • Page 264 Figure 8.7 Create Drive Group Settings Screen 11. Select the following items on the Create Drive Group Settings screen: a. Select the RAID level desired for the drive group from the drop- down menu. To make a spanned drive, select RAID 10, RAID 50, or RAID 60 in the RAID level field.
  • Page 265 solution provides protection to the data in the event of theft or loss of drives. c. Select unconfigured drives from the list of drives and click Add> to add them to the drive group. The selected drives appear under Span 0 below Drive Group 0, as shown in Figure 8.8.
  • Page 266 Figure 8.9 Span 0 and Span 1 of Drive Group 0 g. Click Create Drive Group to make a drive group with the spans. h. Click Next to complete this step. The Virtual drive settings window appears, as shown in Figure 8.10.
  • Page 267 Figure 8.10 Virtual Drive Settings Window 12. Change any virtual drive settings, if desired. Section 8.1.1, “Selecting Virtual Drive Settings” for more information about the virtual drive settings. 13. Click Create Virtual Drive. The new virtual drive appears under the drive group, as shown in Figure 8.12.
  • Page 268 Figure 8.11 New Virtual Drive 0 14. Click Next. The Create Virtual Drive - Summary window appears, as shown in Figure 8.12. This window shows the selections you made for advanced configuration. 8-16 Configuration...
  • Page 269 Figure 8.12 Create Virtual Drive Summary Window 15. Click Back to return to the previous screen to change any selections or click Finish to accept and complete the configuration. The new storage configuration will be created and initialized. Note: If you create a large configuration using drives that are in powersave mode, it could take several minutes to spin up the drives.
  • Page 270: Enabling Drive Security

    Selecting Full Disk Encryption Security Options The Full Disk Encryption feature provides the ability to encrypt data and use disk-based key management for your data security solution. This solution provides protection to the data in the event of theft or loss of physical drives.
  • Page 271 Figure 8.13 Drive Security Settings Menu The Enable Drive Security – Introduction screen appears as shown Figure 8.14. This screen describes how the wizard will help you create a security on the controller. After you create a security key, you have the option to create secure virtual drives using the security key.
  • Page 272 passphrase for additonal security. If you create a passphrase, you must enter it whenever you boot your server. Figure 8.14 Enable Drive Security - Introduction Screen 4. On the introduction screen, click Next. The Enter Security Key ID screen appears, as shown in Figure 8.15.
  • Page 273 Figure 8.15 Enter Security Key ID Screen 5. Use the default security key identifier or enter a new security key identifier. Note: If you create more than one security key, it is highly recommended that you change the security key identifier. Otherwise, you cannot differentiate between the security keys.
  • Page 274 Figure 8.16 Enter Security Key Screen 7. Click Suggest Security Key to have the systems create the security key or enter a new security key. Enter the new security key again to confirm. Attention: If you forget the security key, you will lose access to your data.
  • Page 275 8. Click Next. The Enter Pass Phrase screen appears, as shown in Figure 8.17. Figure 8.17 Enable Drive Security - Enter Pass Phrase Screen 9. Click Use a pass phrase in addition to the security key if you want to use the pass phrase for additional security. 10.
  • Page 276: Changing The Security Key Identifier, Security Key And Pass Phrase

    Caution: Be sure to record the passphrase. If you lose the passphrase, you could lose access to your data. 11. Click Next. The Confirm Enable Drive Security screen appears, as shown in Figure 8.18, to show the changes requested to the drive security settings.
  • Page 277 1. Select the Physical View tab in the left panel of the MegaRAID Storage Manager window, and click a controller icon. 2. Right-click on the controller icon to display the menu of operations available. 3. Select Change Drive Security->Change Security Settings, as shown in Figure 8.19.
  • Page 278 The Change Security Settings – Introduction screen appears as shown in Figure 8.20. This screen lists the actions you can perform, which include editing the security key identifier, security key, and the passphrase. Figure 8.20 Change Security Settings - Introduction Screen 4.
  • Page 279 Figure 8.21 Change Security Settings - Security Key ID Screen 5. Keep the exisiting security key identifier or enter a new security key identifier. Note: If you change the security key, it is highly recommended that you change the security key identifier. Otherwise, you will not be able to differentiate between the security keys.
  • Page 280 Figure 8.22 Change Security Settings - Security Key Screen 7. Click Use the existing drive security key to use the existing drive security key or enter a new security key and then enter the new security key again to confirm. Attention: If you forget the security key, you will lose access to your data.
  • Page 281 Figure 8.23 Authenticate Drive Security Settings Screen 9. Enter the current security key to authenticate the changes. The Change Security Settings - Pass Phrase screen appears, as shown in Figure 8.24. Figure 8.24 Change Security Settings - Pass Phrase Screen 10.
  • Page 282: Disabling Drive Security

    12. Click the checkbox to confirm that you have recorded the security settings for future reference and then click Yes to confirm that you want to change the drive security settings. MSM updates the existing configuration on the controller to use the new security settings and returns you to the main menu.
  • Page 283 Figure 8.25 Change Drive Security Menu The Confirm Disable Drive Security screen appears as shown in Figure 8.26. Selecting Full Disk Encryption Security Options 8-31...
  • Page 284: Importing Or Clearing A Foreign Configuration

    Figure 8.26 Confirm Disable Drive Security Screen 4. To disable drive security, click Yes. MSM disables drive security and returns you to the main menu. 8.2.4 Importing or Clearing a Foreign Configuration A foreign configuration is a RAID configuration that already exists on a replacement set of drives that you install in a computer system.
  • Page 285 import the drives, you must provide the security key used to secure them. If the drives are locked and the controller security is disabled, you cannot import the foreign drives. Only unlocked drives can be imported. Verify whether any drives are left to import as the locked drives can use different security keys.
  • Page 286 Figure 8.27 Foreign Configuration Detected Screen 4. Click Import to import the foreign configuration from all of the foreign drives, Clear to remove the configuration from all foreign drives, or Advanced to preview and import specific foreign configurations. 5. Click OK. The operation cannot be reversed after it is started.
  • Page 287: Adding Hot Spare Drives

    Note: Start a consistency check immediately after the rebuild is complete to ensure data integrity for the virtual drives. Section 10.2, “Running a Consistency Check,” for more information about checking data consistency. 2. Scenario #2: If some of the drives in a configuration are removed and re-inserted, the controller considers the drives to have foreign configurations.
  • Page 288 1. Select the Physical View tab in the left panel of the MegaRAID Storage Manager window, and select the icon of an unused drive. For each drive, the screen displays the port number, enclosure number, slot number, drive state, drive capacity, and drive manufacturer.
  • Page 289: Changing Adjustable Task Rates

    If you selected Make Global Hotspare, skip this step and go to step 5. The hot spare will be available to any virtual drive on a specific controller. 5. Click Go to create the hot spare. The drive state for the drive changes to hot spare. Changing Adjustable Task Rates Follow these steps if you need to change the adjustable rates for rebuilds, and other system tasks that run in the background:...
  • Page 290 Figure 8.29 Set Adjustable Task Rates 3. Enter changes, as needed, to the task rates for Rebuild Rate, Background Initialization (BGI) Rate (for fast initialization), and Check Consistency Rate (for consistency checks). Each task rate can be set from 0 to 100. The higher the number, the faster the activity will run in the background, possibly impacting other system tasks.
  • Page 291: Changing Power Settings

    Changing Power Settings The RAID controller includes Dimmer Switch™ technology that conserves energy by placing certain unused drives into powersave mode. You can use the Power Settings field to choose whether to allow unconfigured drives to enter powersave mode. When this option is selected, unconfigured drives may be spun down. When not selected, these drives are not spun down.
  • Page 292: Changing Virtual Drive Properties

    Changing Virtual Drive Properties You can change a virtual drive’s Read Policy, Write Policy, and other properties at any time after the virtual drive is created. To do this, follow these steps: 1. Click the Logical view tab in the left panel of the MegaRAID Storage Manager window.
  • Page 293: Changing A Virtual Drive Configuration

    4. Change the virtual drive properties as needed in the right panel. For information about these properties, see Section 8.1.1, “Selecting Virtual Drive Settings”. 5. Click Go to accept the changes. Changing a Virtual Drive Configuration You can use the Modify Drive Group Wizard in MSM to change the configuration of a virtual drive by adding drives to the virtual drive, removing drives from it, or changing its RAID level.
  • Page 294 Figure 8.31 Data Backup Warning 4. Select Confirm at the warning and click Yes. The Modify Drive Group Wizard screen appears, as shown in Figure 8.32. 8-42 Configuration...
  • Page 295: Adding A Drive Or Drives To A Configuration

    Figure 8.32 Modify Drive Group Wizard This section has the following subsections explaining the Modify Drive Group Wizard options: • Section 8.7.2, “Adding a Drive or Drives to a Configuration” • Section 8.7.3, “Removing a Drive from a Configuration” • Section 8.7.4, “Changing the RAID Level of a Virtual Drive.”...
  • Page 296: Removing A Drive From A Configuration

    This screen states the number of drives that you have to add to change the RAID level from the current level to the new RAID level. 3. Click Next on the Modify Drive Group Wizard menu, as shown in Figure 8.32.
  • Page 297: Changing The Raid Level Of A Virtual Drive

    5. Review the configuration information. 6. Click Finish. A confirmation message appears. The message states that this operation cannot be aborted and asks whether you want to continue. 7. Click Yes to accept and complete the deletion of the drive(s) from the drive group.
  • Page 298: Saving A Storage Configuration To Drive

    1. Back up all user data on the virtual drive you intend to delete. 2. In the left panel of the MegaRAID Storage Manager window, select the Logical tab, and click the icon of the virtual drive you want to delete.
  • Page 299: Adding A Saved Storage Configuration

    To clear a configuration from a controller, follow these steps: 1. Select a controller icon in the left panel of the MegaRAID Storage Manager window. 2. On the menu bar, select Operations->Configuration->Clear Configuration. A warning message appears that states that clearing the configuration will destroy the virtual drives and result in data loss on the selected controller.
  • Page 300 8-48 Configuration...
  • Page 301: Monitoring System Events

    Chapter 9 Monitoring System Events and Storage Devices The MegaRAID Storage Manager software enables you to monitor the status of drives, virtual drives, and other storage devices. This chapter explains how to use MegaRAID Storage Manager software to perform the following monitoring tasks: •...
  • Page 302 Figure 9.1 Event Information Window Each message that appears in the event log has a severity level that indicates the importance of the event, as shown in Table 9.1, a date and timestamp, and a brief description. You can click an event to display the same information in a window.
  • Page 303: Configuring Alert Notifications

    The Log menu has four options: • Save Log: Saves the current log to a .log file. • Save Log Text: Saves the current log in .txt format. • View Saved Log: Enables you to load a local .log file. •...
  • Page 304 The Alerts Notification Configuration screen appears, as shown in Figure 9.3. The screen contains three tabs: Alert Settings, Mail Server, and Email. You can use each tab to perform tasks for that topic. Figure 9.3 Alerts Notification Configuration Screen You can select the Alert Settings tab to perform the following actions: •...
  • Page 305: Setting Alert Delivery Methods

    • Load all of the values from a previously saved backup into the dialog to edit or send to the monitor. Note: When you load a saved backup file, all unsaved changes made in the current session will be lost. You can select the Email tab to perform the following actions: •...
  • Page 306: Changing Alert Delivery Methods For Individual Events

    Figure 9.4 Alert Notification Delivery Methods Dialog Box 4. Select the desired alert delivery methods for alert notifications at the event severity level. 5. Click OK to set the delivery methods used for the severity level that you selected. 9.2.2 Changing Alert Delivery Methods for Individual Events You can change the alert delivery options for an event without changing the severity level.
  • Page 307: Changing The Severity Level For Individual Events

    Figure 9.5 Change Individual Events Dialog Box 3. Click an event in the list to select it. The current alert delivery methods appear for the selected event under the Alert Delivery Methods heading. 4. Select the desired alert delivery methods for the event. 5.
  • Page 308 1. On the Alerts Notification Configuration screen, click the Alerts Setting tab. The Alerts Setting portion of the screen appears. 2. Click Change Individual Events. The Change Individual Events dialog box appears, as shown in Figure 9.5. The dialog box shows the events by their ID number, description, and severity level.
  • Page 309: Entering Or Editing The Sender Email Address And Smtp Server

    5. Select a different severity level for the event from the menu. 6. Press ESC to return to the Alerts Notification Configuration screen. 7. Click OK. This saves all of the changes made to the events. 9.2.4 Entering or Editing the Sender Email Address and SMTP Server You can use the Alerts Notification Configuration screen to enter or edit the sender e-mail address and the SMTP server.
  • Page 310: Authenticating A Server

    9.2.5 Authenticating a Server You can use the Alerts Notification Configuration screen to authenticate the SMTP server, providing an extra level of security. The authentication check box enables the User name and Password fields when selected by default. Clearing the check box disables these fields. Perform the following steps to enter or edit the address: 1.
  • Page 311: Adding Email Addresses Of Recipients Of Alert Notifications

    Note: If you choose to load a backup configuration and the Configure Alerts dialog currently contains changes that have not yet been sent to the monitor, the changes will be lost. You are prompted to confirm your choice. 1. On the Alerts Notification Configuration screen, click the Alert Setting tab, Mail Server tab, or Email tab.
  • Page 312: Testing Email Addresses Of Recipients Of Alert Notifications

    Figure 9.8 Email Settings 2. Enter the email address you want to add in the New recipient email address field. 3. Click Add. The new email address appears in the Recipient email addresses field. 9.2.9 Testing Email Addresses of Recipients of Alert Notifications Use the Email tab portion of the Alerts Notification Configuration screen to send test messages to the email addresses that you added for the recipients of alert notifications.
  • Page 313: Removing Email Addresses Of Recipients Of Alert Notifications

    If MegaRAID Storage Manager cannot send an email message to the email address, an error message appears. 9.2.10 Removing Email Addresses of Recipients of Alert Notifications Use the Email tab portion of the Alerts Notification Configuration screen to remove email addresses of the recipients of alert notifications. 1.
  • Page 314 Figure 9.9 Controller Information Most of the information on this screen is self-explanatory. Note: • The Rebuild Rate, Patrol Read Rate, Reconstruction Rate, Consistency Check Rate, and BGI Rate (background initialization) are all user selectable. For more information, see Section 8.4, “Changing Adjustable Task Rates,”...
  • Page 315: Monitoring Drives

    Monitoring Drives When MegaRAID Storage Manager software is running, you can see the status of all drives in the left panel of the MegaRAID Storage Manager window. If the drive is operating normally, its icon looks like this: If the drive has failed, a small red circle appears to the right of the icon, like this: .
  • Page 316: Running A Patrol Read

    The information on this panel is self-explanatory. There are no user- selectable properties for physical devices. Icons for other storage devices such as CD-ROM drives and DAT drives can also appear in the left panel. The Power Status property shows On when a drive is spun up and Powersave when a drive is spun down.
  • Page 317 1. Click a controller icon in the left panel of the MegaRAID Storage Manager window. 2. Select Operations->Start Patrol Read. To change the patrol read settings, follow these steps: 3. Click the Logical tab. 4. Click a controller icon in the left panel of the MegaRAID Storage Manager window.
  • Page 318 – Auto: Patrol read runs automatically at the time interval you specify on this screen. – Manual: Patrol read runs only when you manually start it by selecting Start Patrol Read from the controller Options panel. – Disabled: Patrol read does not run. 7.
  • Page 319: Monitoring Virtual Drives

    default, rebuilds and other background tasks might run very slowly and might not complete within a reasonable time. For more information, about the patrol read task rate, see Section 8.4, “Changing Adjustable Task Rates.” Monitoring Virtual Drives When MegaRAID Storage Manager software is running, you can see the status of all virtual drives.
  • Page 320 Figure 9.12 Virtual Drive Properties The RAID level, stripe size, and access policy of the virtual drive are set when it is configured. Note: You can change the read policy, write policy, and other virtual drive properties by selecting Operations->Set Virtual Drive Properties.
  • Page 321: Monitoring Enclosures

    The LEDs on the drives in the virtual drive start blinking (except for hot spare drives). 4. To stop the LEDs from blinking, select Stop Locating Virtual Drive, and click Go. To show a graphical view of a virtual drive, click a virtual drive icon in the left panel of the MegaRAID Storage Manager window, and click the Graphical View tab.
  • Page 322: Monitoring Battery Backup Units

    Figure 9.13 Enclosure Information – Graphical View The display in the center of the screen shows how many slots of the enclosure are actually populated by drives, and the lights on the drives show the drive status. The information on the right shows you the status of the temperature sensors, fans, and power supplies in the enclosure.
  • Page 323 1. Click the Physical tab on the main menu to open the physical view. 2. Select the BBU icon in the left panel. 3. Click the Properties tab. The BBU properties, such as the battery type, temperature, and voltage, appear, as shown in Figure 9.14.
  • Page 324: Battery Learn Cycle

    • The current BBU temperature, voltage, current, and remaining capacity • If the battery is charging, the estimated time until it is fully charged 9.8.1 Battery Learn Cycle Learn Cycle is a battery calibration operation performed by the controller periodically to determine the condition of the battery. You can start battery learn cycles manually or automatically.
  • Page 325 Figure 9.15 Battery Backup Unit Operations 4. Select Set Learn Cycle Properties. The options appear in the right frame. 5. To enable automatic learn cycles, click Enable automatic learn cycles and click Go. You can delay the start of the next learn cycle by up to 7 days (168 hours) using the Delay next learn cycle field.
  • Page 326: Monitoring Rebuilds And Other Processes

    9.8.1.2 Starting a Learn Cycle Manually To start the learn cycle properties manually, perform the following steps: 1. Click the Physical tab to open the physical view. 2. Select the BBU icon in the left panel. 3. Click the Operations tab. The BBU operations appear, as shown in Figure 9.15.
  • Page 327 Operations on virtual drives appear in the left panel of the Group Show Progress window, and operations on drives appear in the right panel. The following operations appear in this window: • Background or foreground initialization of a virtual drive •...
  • Page 328 9-28 Monitoring System Events and Storage Devices...
  • Page 329: Initializing A Virtual Drive

    Chapter 10 Maintaining and Managing Storage Configurations This section explains how to use MegaRAID Storage Manager software to maintain and manage storage configurations. This chapter explains how to perform the following tasks: • Section 10.1, “Initializing a Virtual Drive” • Section 10.2, “Running a Consistency Check”...
  • Page 330: Running A Consistency Check

    4. Select the Fast Initialization check box if you want to use this option. If you leave the box unchecked, MegaRAID Storage Manager software will run a Full Initialization on the virtual drive. (For more information, see Section 8.1.1, “Selecting Virtual Drive Settings.”) 5.
  • Page 331: Scanning For New Drives

    10.3 Scanning for New Drives MegaRAID Storage Manager software normally detects newly installed drives and displays icons for them in the MegaRAID Storage Manager window. If for some reason MegaRAID Storage Manager software does not detect a new drive (or drives), you can use the Scan for Foreign Config command to find it.
  • Page 332: Making A Drive Offline Or Missing

    You can monitor the progress of the rebuild in the Group Show Progress window by selecting Group Operations->Show Progress. If the drive cannot be rebuilt, an error message appears. Continue with the next step. 3. Shut down the system, disconnect the power cord, and open the computer case.
  • Page 333: Upgrading The Firmware

    When a hot spare is available, the data on the virtual drive will be rebuilt. You can now use the removed drive for another configuration. Caution: If MegaRAID Storage Manager software detects that a drive in a virtual drive has failed, it makes the drive offline. If this happens, you must remove the drive and replace it.
  • Page 334 10-6 Maintaining and Managing Storage Configurations...
  • Page 335: Appendix A Events And Messages

    Appendix A Events and Messages This appendix lists the MegaRAID Storage Manager events that may appear in the event log. MegaRAID Storage Manager software monitors the activity and performance of all controllers in the workstation and the devices attached to them. When an event occurs, such as the start of an initialization, an event message appears in the log at the bottom of the MegaRAID Storage Manager window.
  • Page 336 Table A.2 Event Messages Number Type Event Text 0x0000 Information MegaRAID firmware initialization started (PCI ID %04x/%04x/%04x/%04x) 0x0001 Information MegaRAID firmware version %s 0x0002 Fatal Unable to recover cache data from TBBU 0x0003 Information Cache data recovered from TBBU successfully 0x0004 Information Configuration cleared...
  • Page 337 Table A.2 Event Messages (Cont.) Number Type Event Text 0x001c Information Flush rate changed to %d seconds 0x001d Information Hibernate command received from host 0x001e Information Event log cleared 0x001f Information Event log wrapped 0x0020 Fatal Multi-bit ECC error: ECAR=%x, ELOG=%x, (%s) 0x0021 Warning Single-bit ECC error: ECAR=%x, ELOG=%x, (%s)
  • Page 338 Table A.2 Event Messages (Cont.) Number Type Event Text 0x003a Information Consistency Check done on %s 0x003b Information Consistency Check done with corrections on %s 0x003c Fatal Consistency Check detected uncorrectable double medium errors (%s at %lx on %s) 0x003d Critical Consistency Check failed on %s 0x003e...
  • Page 339 Table A.2 Event Messages (Cont.) Number Type Event Text 0x0054 Progress Drive Clear progress on %s is %s 0x0055 Information Drive Clear started on %s 0x0056 Information Drive Clear completed on %s 0x0057 Warning Error on %s (Error %02x) 0x0058 Information Format complete on %s 0x0059...
  • Page 340 Table A.2 Event Messages (Cont.) Number Type Event Text 0x0071 Warning Unexpected sense: %s, CDB%s, Sense: %s 0x0072 Information State change on %s from %s to %s 0x0073 Information State change by user on %s from %s to %s 0x0074 Warning Redundant path to %s broken 0x0075...
  • Page 341 Table A.2 Event Messages (Cont.) Number Type Event Text 0x008d Information Battery Present 0x008e Warning Battery Not Present 0x008f Information New Battery Detected 0x0090 Information Battery has been replaced 0x0091 Critical Battery temperature is high 0x0092 Warning Battery voltage low 0x0093 Information Battery started charging...
  • Page 342 Table A.2 Event Messages (Cont.) Number Type Event Text 0x00ac Information Enclosure %s power supply %d inserted 0x00ad Critical Enclosure %s power supply %d removed 0x00ae Critical Enclosure %s SIM %d failed 0x00af Information Enclosure %s SIM %d inserted 0x00b0 Critical Enclosure %s SIM %d removed 0x00b1...
  • Page 343 Table A.2 Event Messages (Cont.) Number Type Event Text 0x00c6 Information Consistency Check Aborted due to ownership loss on %s 0x00c7 Information Background Initialization (BGI) Aborted Due to Ownership Loss on %s 0x00c8 Critical Battery/charger problems detected; SOH Bad 0x00c9 Warning Single-bit ECC error: ECAR=%x, ELOG=%x, (%s);...
  • Page 344 Table A.2 Event Messages (Cont.) Number Type Event Text 0x00e1 Warning SAS port %d, PHY %d has exceeded the allowed error rate 0x00e2 Warning Bad block reassigned on %s at %lx to %lx 0x00e3 Information Controller Hot Plug detected 0x00e4 Warning Enclosure %s temperature sensor %d differential detected...
  • Page 345 Table A.2 Event Messages (Cont.) Number Type Event Text 0x00fb Critical VD %s is now DEGRADED 0x00fc Fatal VD %s is now OFFLINE 0x00fd Warning Battery requires reconditioning; please initiate a LEARN cycle 0x00fe Warning VD %s disabled because RAID-5 is not supported by this RAID key 0x00ff Warning...
  • Page 346 Table A.2 Event Messages (Cont.) Number Type Event Text 0x0115 Information CopyBack aborted on PD %s and src is PD %s 0x0116 Information CopyBack complete on PD %s from PD %s 0x0117 Progress CopyBack progress on PD %s is %s 0x0118 Information CopyBack resumed on PD %s from %s...
  • Page 347 Table A.2 Event Messages (Cont.) Number Type Event Text 0x012d Warning Microcode update timeout on PD %s 0x012e Warning Microcode update failed on PD %s 0x012f Information Controller properties changed 0x0130 Information Patrol Read properties changed 0x0131 Information CC Schedule properties changed 0x0132 Information Battery properties changed...
  • Page 348 Table A.2 Event Messages (Cont.) Number Type Event Text 0x014b Information Power state change on PD %s from %s to %s 0x014c Information Enclosure %s element (SES code 0x%x) status changed 0x014d Information PD %s rebuild not possible as HDD/SSD mix is not supported in a drive group 0x014e Information...
  • Page 349: Appendix B Glossary

    Appendix B Glossary access policy A virtual drive property indicating what kind of access is allowed for a particular virtual drive. The possible values are Read/Write, Read Only, or Blocked. alarm enabled A controller property that indicates whether the controller’s onboard alarm is enabled.
  • Page 350 cache flush A controller property that indicates how often the data cache is flushed. interval caching The process of using a high speed memory buffer to speed up a computer system’s overall read/write performance. The cache can be accessed at a higher speed than a drive subsystem. To improve read performance, the cache usually contains the most recently accessed data, as well as data from adjacent drive sectors.
  • Page 351 configuration for a drive group (for example, a specific arrangement of drive group members on the device I/O buses). The copyback operation can be run automatically or manually. Typically, a drive fails or is expected to fail, and the data is rebuilt on a hot spare.
  • Page 352 • Unconfigured Good: A drive accessible to the RAID controller but not configured as a part of a virtual drive or as a hot spare. • Hot Spare: A drive that is configured as a hot spare. • Online: A drive that can be accessed by the RAID controller and will be part of the virtual drive.
  • Page 353 in a system that loads the full operating system from drive or from a network and then passes control to the operating system. foreign A RAID configuration that already exists on a replacement set of drives configuration that you install in a computer system. MegaRAID Storage Manager software allows you to import the existing configuration to the RAID controller, or you can clear the configuration so you can create a new one.
  • Page 354 IO policy A virtual drive property indicating whether Cached I/O or Direct I/O is being used. In Cached I/O mode, all reads are buffered in cache memory. In Direct I/O mode, reads are not buffered in cache memory. Data is transferred to cache and the host concurrently. If the same data block is read again, it comes from cache memory.
  • Page 355 NVRAM Acronym for non-volatile random access memory. A storage system that does not lose the data stored on it when power is removed. NVRAM is used to store firmware and configuration data on the RAID controller. NVRAM present A controller property indicating whether an NVRAM is present on the controller.
  • Page 356 RAID 1 Uses data mirroring on pairs of drives so that data written to one drive is simultaneously written to the other drive. RAID 1 works well for small databases or other small applications that require complete data redundancy. RAID 5 Uses data striping and parity data across three or more drives (distributed parity) to provide high data throughput and data redundancy, especially for applications that require random access.
  • Page 357 rebuild The regeneration of all data to a replacement drive in a redundant virtual drive after a drive failure. A drive rebuild normally occurs without interrupting normal operations on the affected virtual drive, though some degradation of performance of the drive subsystem can occur. rebuild rate The percentage of central processing unit (CPU) resources devoted to rebuilding data onto a new drive after a drive in a storage configuration...
  • Page 358 SCSI device A drive property indicating the type of the device, such as drive. type serial no. A controller property indicating the manufacturer-assigned serial number. strip size The portion of a stripe that resides on a single drive in the drive group. stripe size A virtual drive property indicating the length of the interleaved data segments that the RAID controller writes across multiple drives, not...
  • Page 359 write-back In Write-Back Caching mode, the controller sends a data transfer completion signal to the host when the controller cache has received all of the data in a drive write transaction. Data is written to the drive subsystem in accordance with policies set up by the controller. These policies include the amount of dirty/clean cache lines, the number of cache lines available, and elapsed time from the last cache flush.
  • Page 360 B-12 Glossary...
  • Page 361 Lenovo representative for information on the products and services currently available in your area. Any reference to a Lenovo product, program, or service is not intended to state or imply that only that Lenovo product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any Lenovo intellectual property right may be used instead.
  • Page 362 Trademarks Lenovo, the Lenovo logo, and ThinkServer are trademarks of Lenovo in the United States, other countries, or both. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Internet Explorer, Microsoft, Windows and Windows Vista are trademarks of the Microsoft group of companies.

This manual is also suitable for:

Thinkserver rd230Thinkserver td230

Table of Contents