HP StorageWorks X1800sb - Network Storage Blade User Manual
HP StorageWorks X1800sb - Network Storage Blade User Manual

HP StorageWorks X1800sb - Network Storage Blade User Manual

Hp storageworks x1800sb and x3800sb network storage blade user guide (572092-001, june 2009)
Hide thumbs Also See for StorageWorks X1800sb - Network Storage Blade:
Table of Contents

Advertisement

Quick Links

HP StorageWorks
X1800sb and X3800sb Network Storage Blade
user guide
Part number: 572092-001
First edition: June 2009

Advertisement

Table of Contents
loading

Summary of Contents for HP StorageWorks X1800sb - Network Storage Blade

  • Page 1 HP StorageWorks X1800sb and X3800sb Network Storage Blade user guide Part number: 572092-001 First edition: June 2009...
  • Page 2 Legal and notice information © Copyright 1999, 2009 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S.
  • Page 3: Table Of Contents

    Contents About this guide ................. 11 Intended audience ........................11 Related documentation ......................11 Document conventions and symbols ..................... 11 Rack stability ..........................12 HP technical support ......................... 13 Customer self repair ........................13 Subscription service ........................13 HP websites ..........................13 Documentation feedback ......................
  • Page 4 Single Instance Storage ....................... 27 File Server Resource Manager ....................27 Windows SharePoint Services ....................27 File services management ......................28 Configuring data storage ....................28 Storage management utilities ....................28 Array management utilities .................... 29 Array Configuration Utility .................... 29 Disk Management utility ....................
  • Page 5 Other Windows disk and data management tools ................. 57 Additional information and references for file services ..............57 Backup ..........................57 HP StorageWorks Library and Tape Tools ................57 Antivirus ..........................58 4 Cluster administration ............... 59 Cluster overview ........................59 Cluster terms and components ....................
  • Page 6 Creating physical disk resources ..................73 Creating file share resources ..................73 Creating NFS share resources ..................74 Shadow copies in a cluster ....................74 Extend a LUN in a cluster ....................74 MSNFS administration on a server cluster ................74 Best practices for running Server for NFS in a server cluster ..........
  • Page 7 Taiwan battery recycle statement ..................86 Laser compliance notices ......................87 English laser notice ......................87 Dutch laser notice ....................... 87 French laser notice ......................88 German laser notice ......................88 Italian laser notice ......................88 Japanese laser notice ......................89 Spanish laser notice ......................
  • Page 8 Figures Storage management process example ..............20 Configuring arrays from physical drives ..............21 RAID 0 (data striping) (S1-S4) of data blocks (B1-B12) ..........21 Two arrays (A1, A2) and five logical drives (L1 through L5) spread over five physical drives ........................
  • Page 9 Tables Document conventions ..................... 11 Summary of RAID methods ..................22 Tasks and utilities needed for storage system configuration ........... 28 Sharing protocol cluster support ................65 Power sequencing for cluster installation ..............67 X1800sb and X3800sb Network Storage Blade...
  • Page 11: About This Guide

    About this guide This guide provides information about the following HP StorageWorks Network Storage Systems: • HP StorageWorks X1800sb Network Storage Blade • HP StorageWorks X3800sb Network Storage Gateway Blade The HP StorageWorks X1800sb Network Storage Blade and HP StorageWorks X3800sb Network Storage Gateway Blade are based on HP ProLiant BL460c G6 Server Blade hardware.
  • Page 12: Rack Stability

    Convention Element • Keys that are pressed • Text typed into a GUI element, such as a box Bold text • GUI elements that are clicked or selected, such as menu and list items, buttons, tabs, and check boxes Italic text Text emphasis •...
  • Page 13: Hp Technical Support

    WARNING! To reduce the risk of personal injury or damage to equipment: • Extend leveling jacks to the floor. • Ensure that the full weight of the rack rests on the leveling jacks. • Install stabilizing feet on the rack. •...
  • Page 14: Documentation Feedback

    • http://www.hp.com/go/storage • http://www.hp.com/service_locator • http://www.hp.com/support/manuals • http://www.hp.com/support/downloads Documentation feedback HP welcomes your feedback. To make comments and suggestions about product documentation, please send a message to storagedocsFeedback@hp.com. All submissions become the property of HP. About this guide...
  • Page 15: Administration Tools

    1 Administration tools HP StorageWorks X1000 and X3000 Network Storage Systems include several administration tools to simplify storage system management tasks. HP StorageWorks X1000 Network Storage Systems include the HP X1000 Automated Storage Manager (ASM) in addition to HP storage utilities and Microsoft®...
  • Page 16: Share And Storage Management

    Remote Desktop for Administration does not require the purchase of special licenses for client computers that access the server. It is not necessary to install Terminal Server Licensing when using Remote Desktop for Administration. You can use Remote Desktop for Administration to log on to the server remotely with any of the following features: •...
  • Page 17: Single Instance Storage

    Mapping Setup Wizard. After completing the initial Microsoft Services for NFS configuration, you can use the Microsoft Services for NFS console for ongoing maintenance and administration. If you are using Windows Storage Server 2008 in an environment that does not include an Active Directory directory service domain, you can install Active Directory Application Mode (ADAM) on your storage system to provide user name mapping for NFS.
  • Page 18: Print Management

    Print Management Print Management is an MMC snap-in that you can use to view and manage printers and print servers in your organization. You can use Print Management from any computer running Windows Storage Server 2008, and you can manage all network printers on print servers running Windows 2000 Server, Windows Server 2003, Windows Storage Server 2003, Windows Storage Server 2003 R2, or Windows Storage Server 2008.
  • Page 19: Storage Management Overview

    2 Storage management overview This chapter provides an overview of some of the components that make up the storage structure of the storage system. Storage management elements Storage is divided into four major divisions: • Physical storage elements • Logical storage elements •...
  • Page 20: Physical Storage Elements

    Figure 1 Storage management process example Physical storage elements The lowest level of storage management occurs at the physical drive level. Minimally, choosing the best disk carving strategy includes the following policies: • Analyze current corporate and departmental structure. • Analyze the current file server structure and environment.
  • Page 21: Arrays

    • Include the appropriate number of physical drives in the arrays to create logical storage elements of desired sizes. Arrays Figure 2. With an array controller installed in the system, the capacity of several physical drives (P1–P3) can be logically combined into one or more logical units (L1) called arrays. When this is done, the read/write heads of all the constituent physical drives are active simultaneously, dramatically reducing the overall time required for data transfer.
  • Page 22: Fault Tolerance

    Fault tolerance Drive failure, although rare, is potentially catastrophic. For example, using simple striping as shown Figure 3, failure of any hard drive leads to failure of all logical drives in the same array, and hence to data loss. To protect against data loss from hard drive failure, storage systems should be configured with fault tolerance.
  • Page 23: Partitions

    It is important to note that a LUN may span all physical drives within a storage controller subsystem, but cannot span multiple storage controller subsystems. Figure 4 Two arrays (A1, A2) and five logical drives (L1 through L5) spread over five physical drives NOTE: This type of configuration may not apply to all storage systems and serves only as an example.
  • Page 24: File System Elements

    is important. The same performance characteristics on numbers of reads and writes apply when using fault-tolerant configurations, as is the case with controller-based RAID. These volumes can also be assigned drive letters or be mounted as mount points off existing drive letters. The administrator should carefully consider how the volumes will be carved up and what groups or applications will be using them.
  • Page 25: Using Storage Elements

    Using storage elements The last step in creating the element is determining its drive letter or mount point and formatting the element. Each element created can exist as a drive letter, assuming one is available, and/or as mount points on an existing folder or drive letter. Either method is supported. However, mount points cannot be used for shares that will be shared using Microsoft Services for Unix.
  • Page 26: Management Agents

    Management Agents Management Agents provide the information to enable fault, performance, and configuration management. The agents allow easy manageability of the server through HP SIM software, and thirdparty SNMP management platforms. Management Agents are installed with every SmartStart assisted installation or can be installed through the HP PSP. The Systems Management homepage provides status and direct access to in-depth subsystem information by accessing data reported through the Management Agents.
  • Page 27: File Server Management

    3 File server management This chapter begins by identifying file services in Windows Storage Server 2008. The remainder of the chapter describes the many tasks and utilities that play a role in file server management. File services features in Windows Storage Server 2008 Storage Manager for SANs The Storage Manager for SANs (also called Simple SAN) snap-in enables you to create and manage the LUNs that are used to allocate space on storage arrays.
  • Page 28: File Services Management

    File services management Information about the storage system in a SAN environment is provided in the HP StorageWorks SAN Manuals page located on the HP web site at www.hp.com/go/SDGManuals. Configuring data storage HP StorageWorks X1000 and X3000 Network Storage Systems are configured only for the operating system.
  • Page 29: Array Management Utilities

    Array management utilities Storage devices for RAID arrays and LUNs are created and managed using the array management utilities mentioned previously. For HP Smart Arrays use the ACU. NOTE: The ACU is used to configure and manage array-based storage. Software RAID-based storage systems use Microsoft Disk Manager to manage storage.
  • Page 30: Disk Management Utility

    • Extending and expanding arrays and logical drives is supported. The HP Array Configuration Utility User Guide is available for download at http://www.hp.com/ support/manuals. Disk Management utility The Disk Management tool is a system utility for managing hard disks and the volumes, or partitions, that they contain.
  • Page 31: Scheduling Defragmentation

    Scheduling defragmentation Defragmentation is the process of analyzing local volumes and consolidating fragmented files and folders so that each occupies a single, contiguous space on the volume. This improves file system performance. Because defragmentation consolidates files and folders, it also consolidates the free space on a volume.
  • Page 32: Adding Storage

    per-user basis. It is also possible to specify whether or not to log an event when users exceed either their quota warning level or their quota limit. When enabling disk quotas for a volume, volume usage is automatically tracked from that point forward, but existing volume users have no disk quotas applied to them.
  • Page 33: Extending Storage Using Windows Storage Utilities

    Extending storage using Windows Storage Utilities Volume extension grows the storage space of a logical drive. During this process, the administrator adds new storage space to an existing logical drive on the same array, usually after the array has been expanded. An administrator may have gained this new storage space by either expansion or by deleting another logical drive on the same array.
  • Page 34: Volume Shadow Copies

    Expand logical drive This option in the ACU increases the storage capacity of a logical drive by adding unused space on an array to the logical drive on the same array. The unused space is obtained either by expanding an array or by deleting another logical drive on the same array. For more information, use the ACU online help, or the “Extend logical drive”...
  • Page 35: Identifying The Volume

    • How frequently will shadow copies be made? Identifying the volume Shadow copies are taken for a complete volume, but not for a specific directory. Shadow copies work best when the server stores user files, such as documents, spreadsheets, presentations, graphics, or database files.
  • Page 36: Identifying The Storage Area

    NOTE: Regardless of the volume space that is allocated for shadow copies, there is a maximum of 64 shadow copies for any volume. When the 65th shadow copy is taken, the oldest shadow copy is purged. The minimum amount of storage space that can be specified is 350 megabytes (MB). The default storage size is 10 percent of the source volume (the volume being copied).
  • Page 37: Shadow Copies And Drive Defragmentation

    Shadow copies and drive defragmentation When running Disk Defragmenter on a volume with shadow copies activated, all or some of the shadow copies may be lost, starting with the oldest shadow copies. If defragmenting volumes on which shadow copies are enabled, use a cluster (or allocation unit) size of 16 KB or larger.
  • Page 38: The Shadow Copy Cache File

    Figure 5 System administrator view of Shadow Copies for Shared Folders The shadow copy cache file The default shadow copy settings allocate 10 percent of the source volume being copied (with a minimum of 350 MB), and store the shadow copies on the same volume as the original volume. (See Figure 6).
  • Page 39: Enabling And Creating Shadow Copies

    Figure 7 Shadow copies stored on a separate volume The main advantage to storing shadow copies on a separate volume is ease of management and performance. Shadow copies on a source volume must be continually monitored and can consume space designated for file sharing. Setting the limit too high takes up valuable storage space. Setting the limit too low can cause shadow copies to be purged too soon, or not created at all.
  • Page 40: Viewing A List Of Shadow Copies

    NOTE: After the first shadow copy is created, it cannot be relocated. Relocate the cache file by altering the cache file location under Properties prior to enabling shadow copy. See “Viewing shadow copy properties” on page 40. Viewing a list of shadow copies To view a list of shadow copies on a volume: Access Disk Management.
  • Page 41: Redirecting Shadow Copies To An Alternate Volume

    CAUTION: Use caution when reducing the size limit for all shadow copies. When the size is set to less than the total size currently used for all shadow copies, enough shadow copies are deleted to reduce the total size to the new limit. A shadow copy cannot be recovered after it has been deleted. Redirecting shadow copies to an alternate volume IMPORTANT: Shadow copies must be initially disabled on the volume before redirecting to an alternate volume.
  • Page 42: Managing Shadow Copies From The Storage System Desktop

    Managing shadow copies from the storage system desktop To access shadow copies from the storage system desktop: The storage system desktop can be accessed by using Remote Desktop to manage shadow copies. On the storage system desktop, double-click My Computer. Right-click the volume name, and select Properties.
  • Page 43: Smb Shadow Copies

    NOTE: Shadow Copies for Shared Folders clients are not available for HTTP, FTP, AppleTalk, or NetWare shares. Consequently, users of these protocols cannot use Shadow Copies for Shared Folders to independently retrieve previous versions of their files. However, administrators can take advantage of Shadow Copies for Shared Folders to restore files for these users.
  • Page 44: Nfs Shadow Copies

    Figure 9 Client GUI When users view a network folder hosted on the storage system for which shadow copies are enabled, old versions (prior to the snapshot) of a file or directory are available. Viewing the properties of the file or folder presents users with the folder or file history—a list of read-only, point-in-time copies of the file or folder contents that users can then open and explore like any other file or folder.
  • Page 45: Recovery Of Files Or Folders

    Access to NFS shadow copy pseudo-subdirectories is governed by normal access-control mechanisms using the permissions stored in the file system. Users can access only those shadow copies to which they have read access at the time the shadow copy is taken. To prevent users from modifying shadow copies, all pseudo-subdirectories are marked read-only, regardless of the user's ownership or access rights, or the permissions set on the original files.
  • Page 46: Recovering An Overwritten Or Corrupted File

    Figure 10 Recovering a deleted file or folder Recovering an overwritten or corrupted file Recovering an overwritten or corrupted file is easier than recovering a deleted file because the file itself can be right-clicked instead of the folder. To recover an overwritten or corrupted file: Right-click the overwritten or corrupted file, and then click Properties.
  • Page 47: Backup And Shadow Copies

    Backup and shadow copies Shadow copies are only available on the network via the client application, and only at a file or folder level as opposed to the entire volume. Hence, the standard backup associated with a volume backup will not work to back up the previous versions of the file system. To answer this particular issue, shadow copies are available for backup in two situations.
  • Page 48: Folder Management

    NOTE: Select servers can be deployed in a clustered or non-clustered configuration. This section discusses share setup for a non-clustered deployment. Folder management Volumes and folders on any system are used to organize data. Regardless of system size, systematic structuring and naming conventions of volumes and folders eases the administrative burden. Moving from volumes to folders to shares increases the level of granularity of the types of data stored in the unit and the level of security access allowed.
  • Page 49: Properties Dialog Box, Security Tab

    Click Properties, and then click the Security tab. Figure 11 Properties dialog box, Security tab Several options are available on the Security tab: • To add users and groups to the permissions list, click Add. Follow the dialog box instructions. •...
  • Page 50: Advanced Security Settings Dialog Box, Permissions Tab

    To modify ownership of files, or to modify individual file access level permissions, click Advanced. illustrates the properties available on the Advanced Security Settings dialog box. Figure 12 Figure 12 Advanced Security settings dialog box, Permissions tab Other functionality available in the Advanced Security Settings dialog box is illustrated in Figure and includes: •...
  • Page 51: User Or Group Permission Entry Dialog Box

    Enable or disable permissions by selecting the Allow box to enable permission or the Deny box to disable permission. If neither box is selected, permission is automatically disabled. Figure 13 illustrates the Edit screen and some of the permissions. Figure 13 User or group Permission Entry dialog box Another area of the Advanced Security Settings is the Auditing tab.
  • Page 52: Advanced Security Settings Dialog Box, Auditing Tab

    Figure 14 Advanced Security Settings dialog box, Auditing tab Click Add to display the Select User or Group dialog box. Figure 15 Select User or Group dialog box NOTE: Click Advanced to search for users or groups. Select the user or group. File server management...
  • Page 53: Auditing Entry Dialog Box For Folder Name Ntfs Test

    Click OK. The Auditing Entry dialog box is displayed. Figure 16 Auditing Entry dialog box for folder name NTFS Test Select the desired Successful and Failed audits for the user or group. Click OK. NOTE: Auditing must be enabled to configure this information. Use the local Computer Policy Editor to configure the audit policy on the storage system.
  • Page 54: Share Management

    Figure 17 Advanced Security Settings dialog box, Owner tab The current owner of the file or folder is listed at the top of the screen. To take ownership: Click the appropriate user or group in the Change owner to list. If it is also necessary to take ownership of subfolders and files, enable the Replace owner on subcontainers and objects box.
  • Page 55: Defining Access Control Lists

    The content of shares should be carefully chosen to avoid two common pitfalls: either having too many shares of a very specific nature, or of having very few shares of a generic nature. For example, shares for general use are easier to set up in the beginning, but can cause problems later. Frequently, a better approach is to create separate shares with a specific purpose or group of users in mind.
  • Page 56: Managing Shares

    • Standard shares are shares that do not end in a $ character. Standard shares are listed whenever a CIFS client browses for available shares on a CIFS server. The storage system supports both administrative and standard CIFS shares. To create an administrative share, end the share name with the $ character when setting up the share.
  • Page 57: File Screening Management

    File screening management On the File Screening Management node of the File Server Resource Manager snap-in, you can perform the following tasks: • Create file screens to control the types of files that users can save and to send notifications when users attempt to save blocked files.
  • Page 58: Antivirus

    For more information, and to download the utility, see the StorageWorks L&TT web site at http:// h18006.www1.hp.com/products/storageworks/ltt. Antivirus The server should be secured by installing the appropriate antivirus software.anything File server management...
  • Page 59: Cluster Administration

    4 Cluster administration HP StorageWorks X3000 Network Storage Systems support clustering; HP StorageWorks X1000 Network Storage Systems do not. One important feature of HP StorageWorks X3000 Network Storage System models is that they can operate as a single node or as a cluster. This chapter discusses cluster installation and cluster management issues.
  • Page 60: Cluster Terms And Components

    Figure 18 Storage system cluster diagram Cluster terms and components Nodes The most basic parts of a cluster are the servers, referred to as nodes. A server node is any individual server in a cluster, or a member of the cluster. Resources Hardware and software components that are managed by the cluster service are called cluster resources.
  • Page 61: Cluster Groups

    • CIFS file share resources • NFS file share resources • FTP file share resources • iSCSI resources Cluster groups Cluster resources are placed together in cluster groups. Groups are the basic unit of failover between nodes. Resources do not fail over individually; they fail over with the group in which they are contained. Virtual servers A virtual server is a cluster group that consists of a static IP Address resource and a Network Name resource.
  • Page 62: Cluster Concepts

    • Storing the most current version of the cluster database • Guaranteeing that only one set of active communicating nodes is allowed to operate as a cluster Cluster concepts Figure 19 illustrates a typical cluster configuration with the corresponding storage elements. The diagram progresses from the physical disks to the file shares, showing the relationship between both the cluster elements and the physical devices underlying them.
  • Page 63: Hierarchy Of Cluster Resource Components

    Physical Disk resources are created for each basic disk inside Cluster Administrator. Directories and folders are created on assigned drives. Cluster components (virtual servers, file shares) are created, organized in groups, and placed within the folders using Cluster Administrator exclusively. Hierarchy of cluster resource components Figure 19 depicts the cluster resource hierarchy as follows:...
  • Page 64: Storage Planning

    • Storage planning • Network planning • Protocol planning Storage planning For clustering, a basic disk must be designated for the cluster and configured as the Quorum disk. Additional basic disks are presented to each cluster node for data storage as physical disk resources. The physical disk resources are required for the basic disks to successfully work in a cluster environment, protecting it from simultaneous access from each node.
  • Page 65: Protocol Planning

    • The private cluster interconnect or “heartbeat” crossover cable connects to one of the network ports on each cluster node. In more than two node deployments, a private VLAN on a switch or hub is required for the cluster interconnect. •...
  • Page 66: Preparing For Cluster Installation

    NOTE: AppleTalk is not supported on clustered disk resources. AppleTalk requires local memory for volume indexing. On failover events, the memory map is lost and data corruption can occur. Preparing for cluster installation This section provides the steps necessary to cluster HP StorageWorks X3000 Network Storage Systems. Before beginning installation Confirm that the following specifications have been met before proceeding: •...
  • Page 67: Shared Disk Requirements

    Shared disk requirements NOTE: Do not allow more than one node access the shared storage devices at the same time until Cluster service is installed on at least one node and that node is online. This can be accomplished through selective storage presentation, SAN zoning, or having only one node online at all times.
  • Page 68: Setting Up Networks

    Setting up networks Verify that all network connections are correct, with private network adapters connected to other private network adapters only, and public network adapters connected to the public network. Configuring the private network adapter The following procedures are best practices provided by Microsoft and should be configured on the private network adapter.
  • Page 69: Configuring Shared Disks

    • Dedicate a separate disk resource for a Quorum disk. Because the failure of the Quorum disk would cause the entire cluster to fail, HP strongly recommends that the disk resource be a RAID 1 configuration. • Create a partition with a minimum of 50 megabytes (MB) to be used as a Quorum disk. HP recom- mends a Quorum disk be 500 MB.
  • Page 70: Adding Nodes To A Cluster

    • Use of DHCP addresses for network connections. All Network adapters must be configured with static IP addresses in a cluster configuration. • File Services for Macintosh and Service for NetWare are not supported in a cluster configuration. • Dynamic Disks are not supported in a cluster configuration. •...
  • Page 71: Node-Based Cluster Groups

    When creating groups, the administrator's first priority is to gain an understanding of how to manage the groups and their resources. Administrators may choose to create a resource group and a virtual server for each node that will contain all resources owned by that node, or the administrator may choose to create a resource group and virtual server for each physical disk resource.
  • Page 72: Permissions And Access Rights On Share Resources

    For NFS environments, configure the NFS server. NFS specific procedures include entering audit and file lock information as well as setting up client groups and user name mappings. These procedures are not unique to a clustered deployment and are detailed in the Microsoft Services for NFS section within the “Other network file and print services”...
  • Page 73: Non Cluster Aware File Sharing Protocols

    Example: If the password and group files are located at c:\maps on node 1, then they must also be at c:\maps on node 2. The contents of the password and group files must be the same on both nodes as well. These password and group files on each server node must be updated periodically to maintain consistency and prevent users or groups from being inadvertently squashed.
  • Page 74: Creating Nfs Share Resources

    NOTE: • A file share resource must reside in the same cluster group as the physical disk resource it will reside on. • The physical disk resource specified in this step must reside in the same cluster group as specified in the beginning of this wizard.
  • Page 75: Best Practices For Running Server For Nfs In A Server Cluster

    • Configuring User Name Mapping on a server cluster For further details, see the online help for Microsoft Services for Network File System. Best practices for running Server for NFS in a server cluster • Stop Server for NFS before stopping the server cluster. •...
  • Page 76: Advanced Cluster Administration Procedures

    To add a printer to the virtual server: Double-click the printers and faxes icon. Right-click the new screen, and then click add printer. A wizard starts. Click create a new port, and then click Next. Enter the IP address of the network printer. Update the Port Name if desired, click Next, and then click Finish.
  • Page 77: Restarting One Cluster Node

    Restarting one cluster node CAUTION: Restarting a cluster node should be done only after confirming that the other node(s) in the cluster are functioning normally. Adequate warning should be given to users connected to resources of the node being restarted. Attached connections can be viewed through Server Manager on the storage system Desktop using Terminal Services.
  • Page 78: Powering Up The Cluster

    Powering up the cluster The power up process for the storage system cluster is more complex than it is for a single node because extra care must be taken with the storage subsystem. The sequence of the power up steps is critical. Improper power up procedures can cause corruption and loss of data.
  • Page 79: Troubleshooting, Servicing, And Maintenance

    5 Troubleshooting, servicing, and maintenance Troubleshooting the storage system The “Support and troubleshooting” task at the HP Support & Drivers web site (http://www.hp.com/ go/support) can be used to troubleshoot problems with the storage system. After entering the storage system name and designation (for example, ML110 G5 storage system) or component information (for example, Array Configuration Utility), use the following links for troubleshooting information: •...
  • Page 80: Maintenance And Service

    • CCAT (Computer Crash Analysis Tool) • SEA (System Event Analyzer) If you have a warranty or service contract with HP you are entitled to these tools free of charge. You must, however, upgrade the tools at least once a year because the software expires after one year. For more information about WEBES, see http://h18023.www1.hp.com/support/svctools/webes/.
  • Page 81: System Recovery

    6 System recovery This chapter describes how to use the System Recovery DVD that is provided with your storage system. The System Recovery DVD The HP StorageWorks Storage System Recovery DVD that is provided with your storage system allows you to install an image or recover from a catastrophic failure. At any later time, you may boot from the DVD and restore the server to the factory condition.
  • Page 82 Select the appropriate drive letter, then click OK. Click Yes to confirm the drive letter change. Click Yes to continue. If the old drive letter needs to be re-used, reboot the server after clicking Yes. System recovery...
  • Page 83: A Regulatory Compliance Notices

    A Regulatory compliance notices This section contains regulatory notices for the HP StorageWorks family of products. Regulatory compliance identification numbers For the purpose of regulatory compliance certifications and identification, this product has been assigned a unique regulatory model number. The regulatory model number can be found on the product nameplate label, along with all required approval markings and information.
  • Page 84: Class B Equipment

    Or call 1-281-514-3333 Modification The FCC requires the user to be notified that any changes or modifications made to this device that are not expressly approved by Hewlett-Packard Company may void the user's authority to operate the equipment. Cables When provided, connections to this device must be made with shielded cables with metallic RFI/EMI connector hoods in order to maintain compliance with FCC Rules and Regulations.
  • Page 85: Class B Equipment

    Class B equipment This Class B digital apparatus meets all requirements of the Canadian Interference-Causing Equipment Regulations. Cet appareil numérique de la class B respecte toutes les exigences du Règlement sur le matériel brouilleur du Canada. European Union notice Products bearing the CE marking comply with the EMC Directive (89/336/EEC) and the Low Voltage Directive (73/23/EEC) issued by the Commission of the European Community.
  • Page 86: Korean Notices

    Korean notices Class A equipment Class B equipment Taiwanese notices BSMI Class A notice Taiwan battery recycle statement Recovery mark: Recovery text: • Four-in-one recycling symbol • “Please recycle waste batteries” Regulatory compliance notices...
  • Page 87: Laser Compliance Notices

    Laser compliance notices English laser notice This device may contain a laser that is classified as a Class 1 Laser Product in accordance with U.S. FDA regulations and the IEC 60825-1. The product does not emit hazardous laser radiation. WARNING! Use of controls or adjustments or performance of procedures other than those specified herein or in the laser product's installation guide may result in hazardous radiation exposure.
  • Page 88: French Laser Notice

    French laser notice German laser notice Italian laser notice Regulatory compliance notices...
  • Page 89: Japanese Laser Notice

    Japanese laser notice Spanish laser notice Recycling notices English notice X1800sb and X3800sb Network Storage Blade...
  • Page 90: Bulgarian Notice

    Bulgarian notice Czech notice Danish notice Dutch notice Regulatory compliance notices...
  • Page 91: Estonian Notice

    Estonian notice Finnish notice French notice German notice X1800sb and X3800sb Network Storage Blade...
  • Page 92: Greek Notice

    Greek notice Hungarian notice Italian notice Latvian notice Regulatory compliance notices...
  • Page 93: Lithuanian Notice

    Lithuanian notice Polish notice Portuguese notice Romanian notice X1800sb and X3800sb Network Storage Blade...
  • Page 94: Slovak Notice

    Slovak notice Spanish notice Swedish notice Turkish notice Türkiye Cumhuriyeti: EEE Yönetmeli ine Uygundur Regulatory compliance notices...
  • Page 95: Battery Replacement Notices

    Battery replacement notices Dutch battery notice X1800sb and X3800sb Network Storage Blade...
  • Page 96: French Battery Notice

    French battery notice German battery notice Regulatory compliance notices...
  • Page 97: Italian Battery Notice

    Italian battery notice Japanese battery notice X1800sb and X3800sb Network Storage Blade...
  • Page 98: Spanish Battery Notice

    Spanish battery notice Regulatory compliance notices...
  • Page 99: Index

    Index cluster adding new storage, 73 access rights, managing, 72 analysis, 69 ACL, defining, 55 concepts, 62 Array Configuration Utility, 29 concepts, diagram, 62 array controller, purpose, 21 diagram, 60 arrays, defined, 21 dual data paths, 66 audience, 11 geographically dispersed, 70 group, 70 groups,...
  • Page 100 Disk Management extending volumes, 33 help document obtaining, 13 conventions, 11 related documentation, 11 Array Configuration Utility, 29 documentation Storage Manager, 29 website, 11 technical support, 13 providing feedback, 14 domain membership, verifying, 68 dual data paths, 66 dynamic disks installation, cluster, preparing for, 66 clustering, 24...
  • Page 101 security auditing, 51 partitions file level permissions, 48 extended, 23 ownership of files, 53 primary, 23 Services for UNIX, 25 permissions Services for UNIX, 23 file level, 48 shadow copies list in a cluster, 74 adding users and groups, 49 uses, 34 removing users and groups, 49...
  • Page 102 user account, setting up, 68 users adding to permission list, 49 verifying connectivity, 68 disk access, 69 domain membership, 68 name resolution, 68 virtual server, defined, 61 Volume Shadow Copy Service, 34 volumes planning, 23 vssadmin tool, 37 warning rack stability, 12 WEBES (Web Based Enterprise Services, 79...

This manual is also suitable for:

X3800sb

Table of Contents